Untrusted search path vulnerability in Apsaly before 3.74 allows local users to gain privileges via a Trojan horse executable file in the current working directory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Apsaly | Masahiko_watanabe | * | 3.70 (including) |
Apsaly | Masahiko_watanabe | 1.20 (including) | 1.20 (including) |
Apsaly | Masahiko_watanabe | 1.40 (including) | 1.40 (including) |
Apsaly | Masahiko_watanabe | 2.00 (including) | 2.00 (including) |
Apsaly | Masahiko_watanabe | 2.10 (including) | 2.10 (including) |
Apsaly | Masahiko_watanabe | 2.20 (including) | 2.20 (including) |
Apsaly | Masahiko_watanabe | 2.30 (including) | 2.30 (including) |
Apsaly | Masahiko_watanabe | 2.40 (including) | 2.40 (including) |
Apsaly | Masahiko_watanabe | 2.50 (including) | 2.50 (including) |
Apsaly | Masahiko_watanabe | 2.60 (including) | 2.60 (including) |
Apsaly | Masahiko_watanabe | 2.70 (including) | 2.70 (including) |
Apsaly | Masahiko_watanabe | 2.72 (including) | 2.72 (including) |
Apsaly | Masahiko_watanabe | 3.00 (including) | 3.00 (including) |
Apsaly | Masahiko_watanabe | 3.10 (including) | 3.10 (including) |
Apsaly | Masahiko_watanabe | 3.40 (including) | 3.40 (including) |
Apsaly | Masahiko_watanabe | 3.60 (including) | 3.60 (including) |