Untrusted search path vulnerability in K2 K2Editor before 1.5.9 allows local users to gain privileges via a Trojan horse executable file in the current working directory.
Affected Software
Name |
Vendor |
Start Version |
End Version |
K2editor |
K2top |
* |
1.5.8 (including) |
References