CVE-2010-3199

Untrusted search path vulnerability in TortoiseSVN 1.6.10, Build 19898 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Tortoise.  NOTE: this is only a vulnerability when a file extension is associated with TortoiseProc or TortoiseMerge, which is not the default.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
VendorProductVersion
tigristortoisesvn
𝑥
≤ 1.6.10
tigristortoisesvn
0.1
tigristortoisesvn
0.2
tigristortoisesvn
0.3
tigristortoisesvn
0.4
tigristortoisesvn
0.5
tigristortoisesvn
0.5.1
tigristortoisesvn
0.6
tigristortoisesvn
0.6.1
tigristortoisesvn
0.7
tigristortoisesvn
0.8
tigristortoisesvn
0.8.1
tigristortoisesvn
0.9.1
tigristortoisesvn
0.9.2
tigristortoisesvn
0.10.0
tigristortoisesvn
0.11.0
tigristortoisesvn
0.11.2
tigristortoisesvn
0.12
tigristortoisesvn
0.12.1
tigristortoisesvn
0.14
tigristortoisesvn
0.15
tigristortoisesvn
0.15.1
tigristortoisesvn
0.15.2
tigristortoisesvn
0.16
tigristortoisesvn
0.17
tigristortoisesvn
0.18
tigristortoisesvn
0.19
tigristortoisesvn
0.20
tigristortoisesvn
0.20.1
tigristortoisesvn
0.20.2
tigristortoisesvn
0.21
tigristortoisesvn
0.22
tigristortoisesvn
0.23
tigristortoisesvn
0.24
tigristortoisesvn
0.25
tigristortoisesvn
0.26
tigristortoisesvn
1.0
tigristortoisesvn
1.0.1
tigristortoisesvn
1.0.2
tigristortoisesvn
1.0.3
tigristortoisesvn
1.0.4
tigristortoisesvn
1.0.5
tigristortoisesvn
1.0.6
tigristortoisesvn
1.0.7
tigristortoisesvn
1.0.8
tigristortoisesvn
1.1.0
tigristortoisesvn
1.1.0:rc1
tigristortoisesvn
1.1.0:rc2
tigristortoisesvn
1.1.1
tigristortoisesvn
1.1.2
tigristortoisesvn
1.1.3
tigristortoisesvn
1.1.4
tigristortoisesvn
1.1.5
tigristortoisesvn
1.1.6
tigristortoisesvn
1.1.7
tigristortoisesvn
1.2.0
tigristortoisesvn
1.2.1
tigristortoisesvn
1.2.2
tigristortoisesvn
1.2.3
tigristortoisesvn
1.2.4
tigristortoisesvn
1.2.5
tigristortoisesvn
1.2.6
tigristortoisesvn
1.3.0
tigristortoisesvn
1.3.1
tigristortoisesvn
1.3.2
tigristortoisesvn
1.3.3
tigristortoisesvn
1.3.4
tigristortoisesvn
1.3.5
tigristortoisesvn
1.4.0
tigristortoisesvn
1.4.0:rc1
tigristortoisesvn
1.4.1
tigristortoisesvn
1.4.2
tigristortoisesvn
1.4.3
tigristortoisesvn
1.4.4
tigristortoisesvn
1.4.5
tigristortoisesvn
1.4.6
tigristortoisesvn
1.4.7
tigristortoisesvn
1.4.8
tigristortoisesvn
1.5.0
tigristortoisesvn
1.5.0:alpha1
tigristortoisesvn
1.5.0:beta1
tigristortoisesvn
1.5.0:rc1
tigristortoisesvn
1.5.0:rc2
tigristortoisesvn
1.5.0:rc3
tigristortoisesvn
1.5.1
tigristortoisesvn
1.5.2
tigristortoisesvn
1.5.3
tigristortoisesvn
1.5.4
tigristortoisesvn
1.5.5
tigristortoisesvn
1.5.6
tigristortoisesvn
1.5.7
tigristortoisesvn
1.5.8
tigristortoisesvn
1.5.9
tigristortoisesvn
1.5.10
tigristortoisesvn
1.6.0
tigristortoisesvn
1.6.3
tigristortoisesvn
1.6.4
tigristortoisesvn
1.6.5
tigristortoisesvn
1.6.6
𝑥
= Vulnerable software versions
Common Weakness Enumeration