Multiple untrusted search path vulnerabilities in IsoBuster 2.8 allow local users to gain privileges via a Trojan horse (1) wnaspi32.dll or (2) ntaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .img file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
Link | Resource |
---|---|
http://secunia.com/advisories/41243 | Vendor Advisory |
Configurations
Information
Published : 2012-09-07 03:32
Updated : 2012-09-10 21:00
NVD link : CVE-2010-5259
Mitre link : CVE-2010-5259
JSON object : View
CWE
Products Affected
isobuster
- isobuster