Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2010-5233 | 1 Virtualdj | 1 Virtual Dj | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in Virtual DJ 6.1.2 Trial b301 allows local users to gain privileges via a Trojan horse HDJAPI.dll file in the current working directory, as demonstrated by a directory that contains a .mp3 file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5235 | 1 Izarc | 1 Izarc | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in IZArc Archiver 4.1.2 allows local users to gain privileges via a Trojan horse ztv7z.dll file in the current working directory, as demonstrated by a directory that contains a .arj file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5236 | 1 Roxio | 1 Easy Media Creator | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in Roxio Easy Media Creator Home 9.0.136 allows local users to gain privileges via a Trojan horse homeutils9.dll file in the current working directory, as demonstrated by a directory that contains a .roxio, .c2d, or .gi file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5238 | 1 Cyberlink | 1 Powerdirector | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in CyberLink PowerDirector 8.00.3022 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .pdl, .iso, .pds, .p2g, or .p2i file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5240 | 1 Corel | 2 Coreldraw X5, Photo-paint X3 | 2012-09-07 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in Corel PHOTO-PAINT and CorelDRAW X5 15.1.0.588 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) CrlRib.dll file in the current working directory, as demonstrated by a directory that contains a .cdr, .cpt, .cmx, or .csl file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5241 | 1 Autodesk | 1 Autocad | 2012-09-07 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in Autodesk AutoCAD 2010 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) IBFS32.DLL file in the current working directory, as demonstrated by a directory that contains a .dwg file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2010-5246 | 1 Maxthon | 1 Maxthon Browser | 2012-09-07 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in Maxthon Browser 1.6.7.35 and 2.5.15 allow local users to gain privileges via a Trojan horse (1) RSRC32.dll or (2) dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .html file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2010-5256 | 1 Cdisplay | 1 Cdisplay | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in CDisplay 1.8.1 allows local users to gain privileges via a Trojan horse TRACE32.DLL file in the current working directory, as demonstrated by a directory that contains a .cba file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5260 | 1 Agrinsoft | 1 Argin All Dvd Ripper | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in Agrin All DVD Ripper 4.0 allows local users to gain privileges via a Trojan horse wnaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .ifo file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5261 | 1 Snowfoxsoft | 1 Snowfox Total Video Converter | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in SnowFox Total Video Converter 2.5.1 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .avi file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5262 | 1 Gromada | 1 Multimedia Conversion Library | 2012-09-07 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in libmcl-5.4.0.dll in Gromada Multimedia Conversion Library 5.4.0 allow local users to gain privileges via a Trojan horse (1) libgif-1.1.0.dll or (2) libhav-1.0.1.dll file in the current working directory. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2010-5265 | 1 Nirsoft | 1 Smartsniff | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in SmartSniff 1.71 allows local users to gain privileges via a Trojan horse wpcap.dll file in the current working directory, as demonstrated by a directory that contains a .cfg or .ssp file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5266 | 1 Videocharge | 1 Videocharge Studio | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in VideoCharge Studio 2.9.0.632 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .vsc file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5267 | 1 Munsoft | 1 Easy Office Recovery | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in MunSoft Easy Office Recovery 1.1 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .doc, .xls, or .ppt file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5270 | 1 Adobe | 1 Device Central Cs4 | 2012-09-07 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in Adobe Device Central CS4 2.0.0 0476 allow local users to gain privileges via a Trojan horse (1) ibfs32.dll or (2) amt_cdb.dll file in the current working directory, as demonstrated by a directory that contains a .adcp file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5272 | 1 Altova | 1 Databasespy 2011 | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in Altova DatabaseSpy 2011 Enterprise Edition SP1 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .qprj file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5274 | 1 Pkware | 1 Pkzip | 2012-09-07 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in PKZIP before 12.50.0014 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .zip file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2012-4219 | 1 Phpmyadmin | 1 Phpmyadmin | 2012-09-06 | 5.0 MEDIUM | N/A |
show_config_errors.php in phpMyAdmin 3.5.x before 3.5.2.1 allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message, related to lack of inclusion of the common.inc.php library file. | |||||
CVE-2012-3292 | 1 Globus | 1 Globus Toolkit | 2012-09-06 | 7.6 HIGH | N/A |
The GridFTP in Globus Toolkit (GT) before 5.2.2, when certain autoconf macros are defined, does not properly check the return value from the getpwnam_r function, which might allow remote attackers to gain privileges by logging in with a user that does not exist, which causes GridFTP to run as the last user in the password file. | |||||
CVE-2012-3426 | 1 Openstack | 3 Essex, Horizon, Keystone | 2012-09-06 | 4.9 MEDIUM | N/A |
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password. |