Total
29527 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2010-0397 | 1 Php | 1 Php | 2010-12-10 | 5.0 MEDIUM | N/A |
| The xmlrpc extension in PHP 5.3.1 does not properly handle a missing methodName element in the first argument to the xmlrpc_decode_request function, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly have unspecified other impact via a crafted argument. | |||||
| CVE-2010-0105 | 1 Apple | 1 Mac Os X | 2010-12-10 | 4.9 MEDIUM | N/A |
| The hfs implementation in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 supports hard links to directories and does not prevent certain deeply nested directory structures, which allows local users to cause a denial of service (filesystem corruption) via a crafted application that calls the mkdir and link functions, related to the fsck_hfs program in the diskdev_cmds component. | |||||
| CVE-2010-4159 | 1 Mono | 1 Mono | 2010-12-09 | 6.9 MEDIUM | N/A |
| Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3141 | 1 Microsoft | 1 Powerpoint | 2010-11-11 | 9.3 HIGH | N/A |
| Untrusted search path vulnerability in Microsoft PowerPoint 2010 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse pptimpconv.dll that is located in the same folder as a .odp, .pot, .potm, .potx, .ppa, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .pwz, .sldm, or .sldx file. | |||||
| CVE-2010-3914 | 1 Vim | 1 Gvim | 2010-11-05 | 9.3 HIGH | N/A |
| Untrusted search path vulnerability in VIM Development Group GVim before 7.3.034, and possibly other versions before 7.3.46, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse User32.dll or other DLL that is located in the same folder as a .TXT file. NOTE: some of these details are obtained from third party information. | |||||
| CVE-2010-3349 | 1 Ardour | 1 Ardour | 2010-11-03 | 6.9 MEDIUM | N/A |
| Ardour 2.8.11 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3364 | 1 Vips | 1 Vips | 2010-11-03 | 6.9 MEDIUM | N/A |
| The vips-7.22 script in VIPS 7.22.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3357 | 1 Pedro Castro | 1 Gnome-subtitles | 2010-11-03 | 6.9 MEDIUM | N/A |
| gnome-subtitles 1.0 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3354 | 1 Dropbox | 1 Dropbox | 2010-11-03 | 6.9 MEDIUM | N/A |
| dropboxd in Dropbox 0.7.110 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3157 | 1 Kmonos | 1 Xacrett | 2010-10-28 | 9.3 HIGH | N/A |
| Untrusted search path vulnerability in XacRett before 50 allows attackers to execute arbitrary code via a Trojan horse executable file, related to the explorer.exe filename and use of Windows Explorer. | |||||
| CVE-2010-3156 | 1 K2top | 1 K2editor | 2010-10-28 | 6.9 MEDIUM | N/A |
| Untrusted search path vulnerability in K2 K2Editor before 1.5.9 allows local users to gain privileges via a Trojan horse executable file in the current working directory. | |||||
| CVE-2010-3162 | 1 Masahiko Watanabe | 1 Apsaly | 2010-10-28 | 6.9 MEDIUM | N/A |
| Untrusted search path vulnerability in Apsaly before 3.74 allows local users to gain privileges via a Trojan horse executable file in the current working directory. | |||||
| CVE-2010-3163 | 1 Fenrir | 2 Grani, Sleipnir | 2010-10-27 | 6.9 MEDIUM | N/A |
| Untrusted search path vulnerability in Fenrir Sleipnir before 2.9.5 and Grani before 4.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory. | |||||
| CVE-2010-3165 | 1 Yokkasoft | 8 Deuxeditor, Noeditor, Ouieditor and 5 more | 2010-10-27 | 6.9 MEDIUM | N/A |
| Untrusted search path vulnerability in Yokka NoEditor 1.33.1.1 and earlier, OuiEditor 1.6.1.1 and earlier, UnEditor 1.10.1.2 and earlier, DeuxEditor 1.7.1.2 and earlier, SQLEditorXP 3.14.1.2 and earlier, SQLEditorTE 1.9.1.3 and earlier, SQLEditor8 3.8.1.2 and earlier, and SQLEditorClassic 1.8.1.3 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory. | |||||
| CVE-2010-3160 | 1 Ponsoftware | 1 Archive Decoder | 2010-10-27 | 6.9 MEDIUM | N/A |
| Untrusted search path vulnerability in Archive Decoder 1.23 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory. | |||||
| CVE-2010-3161 | 1 Susumu Terao | 1 Terapad | 2010-10-27 | 6.9 MEDIUM | N/A |
| Untrusted search path vulnerability in TeraPad before 1.00 allows local users to gain privileges via a Trojan horse DLL in the current working directory. | |||||
| CVE-2010-3355 | 1 Erik Hjortsberg | 1 Ember | 2010-10-22 | 6.9 MEDIUM | N/A |
| Ember 0.5.7 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3361 | 1 Shrew | 1 Vpn Client | 2010-10-22 | 6.9 MEDIUM | N/A |
| The (1) iked, (2) ikea, and (3) ikec scripts in Shrew Soft IKE 2.1.5 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3358 | 1 Henner Zeller | 1 Henplus | 2010-10-22 | 6.9 MEDIUM | N/A |
| HenPlus JDBC SQL-Shell 0.9.7 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3365 | 1 Mistelix | 1 Mistelix | 2010-10-21 | 6.9 MEDIUM | N/A |
| Mistelix 0.31 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
