CVE-2010-3199

EUVD-2010-3198
Untrusted search path vulnerability in TortoiseSVN 1.6.10, Build 19898 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Tortoise.  NOTE: this is only a vulnerability when a file extension is associated with TortoiseProc or TortoiseMerge, which is not the default.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
Affected Products (NVD)
VendorProductVersion
tigristortoisesvn
𝑥
≤ 1.6.10
tigristortoisesvn
0.1
tigristortoisesvn
0.2
tigristortoisesvn
0.3
tigristortoisesvn
0.4
tigristortoisesvn
0.5
tigristortoisesvn
0.5.1
tigristortoisesvn
0.6
tigristortoisesvn
0.6.1
tigristortoisesvn
0.7
tigristortoisesvn
0.8
tigristortoisesvn
0.8.1
tigristortoisesvn
0.9.1
tigristortoisesvn
0.9.2
tigristortoisesvn
0.10.0
tigristortoisesvn
0.11.0
tigristortoisesvn
0.11.2
tigristortoisesvn
0.12
tigristortoisesvn
0.12.1
tigristortoisesvn
0.14
tigristortoisesvn
0.15
tigristortoisesvn
0.15.1
tigristortoisesvn
0.15.2
tigristortoisesvn
0.16
tigristortoisesvn
0.17
tigristortoisesvn
0.18
tigristortoisesvn
0.19
tigristortoisesvn
0.20
tigristortoisesvn
0.20.1
tigristortoisesvn
0.20.2
tigristortoisesvn
0.21
tigristortoisesvn
0.22
tigristortoisesvn
0.23
tigristortoisesvn
0.24
tigristortoisesvn
0.25
tigristortoisesvn
0.26
tigristortoisesvn
1.0
tigristortoisesvn
1.0.1
tigristortoisesvn
1.0.2
tigristortoisesvn
1.0.3
tigristortoisesvn
1.0.4
tigristortoisesvn
1.0.5
tigristortoisesvn
1.0.6
tigristortoisesvn
1.0.7
tigristortoisesvn
1.0.8
tigristortoisesvn
1.1.0
tigristortoisesvn
1.1.0:rc1
tigristortoisesvn
1.1.0:rc2
tigristortoisesvn
1.1.1
tigristortoisesvn
1.1.2
tigristortoisesvn
1.1.3
tigristortoisesvn
1.1.4
tigristortoisesvn
1.1.5
tigristortoisesvn
1.1.6
tigristortoisesvn
1.1.7
tigristortoisesvn
1.2.0
tigristortoisesvn
1.2.1
tigristortoisesvn
1.2.2
tigristortoisesvn
1.2.3
tigristortoisesvn
1.2.4
tigristortoisesvn
1.2.5
tigristortoisesvn
1.2.6
tigristortoisesvn
1.3.0
tigristortoisesvn
1.3.1
tigristortoisesvn
1.3.2
tigristortoisesvn
1.3.3
tigristortoisesvn
1.3.4
tigristortoisesvn
1.3.5
tigristortoisesvn
1.4.0
tigristortoisesvn
1.4.0:rc1
tigristortoisesvn
1.4.1
tigristortoisesvn
1.4.2
tigristortoisesvn
1.4.3
tigristortoisesvn
1.4.4
tigristortoisesvn
1.4.5
tigristortoisesvn
1.4.6
tigristortoisesvn
1.4.7
tigristortoisesvn
1.4.8
tigristortoisesvn
1.5.0
tigristortoisesvn
1.5.0:alpha1
tigristortoisesvn
1.5.0:beta1
tigristortoisesvn
1.5.0:rc1
tigristortoisesvn
1.5.0:rc2
tigristortoisesvn
1.5.0:rc3
tigristortoisesvn
1.5.1
tigristortoisesvn
1.5.2
tigristortoisesvn
1.5.3
tigristortoisesvn
1.5.4
tigristortoisesvn
1.5.5
tigristortoisesvn
1.5.6
tigristortoisesvn
1.5.7
tigristortoisesvn
1.5.8
tigristortoisesvn
1.5.9
tigristortoisesvn
1.5.10
tigristortoisesvn
1.6.0
tigristortoisesvn
1.6.3
tigristortoisesvn
1.6.4
tigristortoisesvn
1.6.5
tigristortoisesvn
1.6.6
𝑥
= Vulnerable software versions
Common Weakness Enumeration