CVE-2010-3163
25.10.2010, 20:01
Untrusted search path vulnerability in Fenrir Sleipnir before 2.9.5 and Grani before 4.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory.Enginsight
Vendor | Product | Version |
---|---|---|
fenrir | sleipnir | 𝑥 ≤ 2.9.4 |
fenrir | sleipnir | 2.5.0 |
fenrir | sleipnir | 2.5.1 |
fenrir | sleipnir | 2.5.2 |
fenrir | sleipnir | 2.5.3 |
fenrir | sleipnir | 2.5.4 |
fenrir | sleipnir | 2.5.5 |
fenrir | sleipnir | 2.5.6 |
fenrir | sleipnir | 2.5.7 |
fenrir | sleipnir | 2.5.8 |
fenrir | sleipnir | 2.5.9 |
fenrir | sleipnir | 2.5.10 |
fenrir | sleipnir | 2.5.11 |
fenrir | sleipnir | 2.5.12 |
fenrir | sleipnir | 2.5.13 |
fenrir | sleipnir | 2.5.14 |
fenrir | sleipnir | 2.5.15 |
fenrir | sleipnir | 2.5.16 |
fenrir | sleipnir | 2.5.17 |
fenrir | sleipnir | 2.6.0 |
fenrir | sleipnir | 2.6.1 |
fenrir | sleipnir | 2.6.2 |
fenrir | sleipnir | 2.7.0 |
fenrir | sleipnir | 2.7.1 |
fenrir | sleipnir | 2.7.1:r2 |
fenrir | sleipnir | 2.7.2 |
fenrir | sleipnir | 2.8 |
fenrir | sleipnir | 2.8.2 |
fenrir | sleipnir | 2.8.3 |
fenrir | sleipnir | 2.8.4 |
fenrir | sleipnir | 2.8.5 |
fenrir | sleipnir | 2.9 |
fenrir | sleipnir | 2.9.1 |
fenrir | sleipnir | 2.9.2 |
fenrir | sleipnir | 2.9.3 |
fenrir | grani | 𝑥 ≤ 4.3 |
fenrir | grani | 3.0 |
fenrir | grani | 3.1 |
fenrir | grani | 3.2 |
fenrir | grani | 3.5 |
fenrir | grani | 4.0 |
fenrir | grani | 4.1 |
fenrir | grani | 4.2 |
𝑥
= Vulnerable software versions
References