CVE-2010-5196

Untrusted search path vulnerability in KeePass Password Safe before 2.13 allows local users to gain privileges via a Trojan horse DwmApi.dll file in the current working directory, as demonstrated by a directory that contains a .kdbx file. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:keepass:password_safe:*:*:*:*:*:*:*:*
cpe:2.3:a:keepass:password_safe:1.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:22

Type Values Removed Values Added
References () http://secunia.com/advisories/41167 - Vendor Advisory () http://secunia.com/advisories/41167 - Vendor Advisory
References () http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/ - () http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/ -
References () http://www.keepass.info/news/n100906_2.13.html - () http://www.keepass.info/news/n100906_2.13.html -

Information

Published : 2012-09-06 10:41

Updated : 2024-11-21 01:22


NVD link : CVE-2010-5196

Mitre link : CVE-2010-5196

CVE.ORG link : CVE-2010-5196


JSON object : View

Products Affected

keepass

  • password_safe