Untrusted search path vulnerability in K2 K2Editor before 1.5.9 allows local users to gain privileges via a Trojan horse executable file in the current working directory.
Affected Software
| Name | Vendor | Start Version | End Version |
|---|
| K2editor | K2top | * | 1.5.8 (including) |
References