CVE-2010-3160
Published Oct 25, 2010
Last updated 14 years ago
Overview
- Description
- Untrusted search path vulnerability in Archive Decoder 1.23 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory.
- Source
- vultures@jpcert.or.jp
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C6517EC-C00A-4AA7-8076-7C48FE5C501B", "versionEndIncluding": "1.23" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7BBD029-DDDB-45CF-B914-120A397C37E8" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D060424-258B-4089-BF35-8041613F86CC" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "407A1E28-E09B-419E-AB68-34DDF059DCF1" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C97257CB-CF65-4AB5-8055-DD4C0E5DFB17" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B8AEADD-0765-4280-A042-96A8F7291244" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEF3214D-A207-4E8F-AA99-A8E38E3D2C8B" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.06:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33197BC6-B1E1-4AF5-9EE6-439B3B8FC256" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02BF2835-B4E9-4D40-9F32-9EAE5A4EEB31" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.08:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7419C2E2-53EB-4DF2-B34E-D1FF0BBAD52F" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.09:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9009D1F3-2E87-4AD9-8584-858A82798933" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F5BA2F7-FA7C-4982-8278-93385527212D" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B9B00CE-3C9A-4E47-B90C-5FA9218A4C8E" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69DA5C01-6841-4D9D-BB4B-9F0D70BC4DE4" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0FAF0A3-9B5C-4EC0-8484-F48ACECC5C94" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF4F2E5E-2839-4B15-93AC-E7E2B2467C55" }, { "criteria": "cpe:2.3:a:ponsoftware:archive_decoder:1.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4667D99E-EF52-4AFD-8D93-45C1E68D9F36" } ], "operator": "OR" } ] } ]