Untrusted search path vulnerability in Archive Decoder 1.23 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Archive_decoder | Ponsoftware | 1.08 | 1.08 |
Archive_decoder | Ponsoftware | 1.20 | 1.20 |
Archive_decoder | Ponsoftware | 1.22 | 1.22 |
Archive_decoder | Ponsoftware | 1.12 | 1.12 |
Archive_decoder | Ponsoftware | 1.07 | 1.07 |
Archive_decoder | Ponsoftware | 1.04 | 1.04 |
Archive_decoder | Ponsoftware | 1.01 | 1.01 |
Archive_decoder | Ponsoftware | 1.13 | 1.13 |
Archive_decoder | Ponsoftware | 1.02 | 1.02 |
Archive_decoder | Ponsoftware | 1.00 | 1.00 |
Archive_decoder | Ponsoftware | 1.05 | 1.05 |
Archive_decoder | Ponsoftware | * | 1.23 |
Archive_decoder | Ponsoftware | 1.06 | 1.06 |
Archive_decoder | Ponsoftware | 1.21 | 1.21 |
Archive_decoder | Ponsoftware | 1.09 | 1.09 |
Archive_decoder | Ponsoftware | 1.03 | 1.03 |
Archive_decoder | Ponsoftware | 1.11 | 1.11 |