CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In October 2010(Gain Privilege)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2010-4026 +Priv 2010-10-28 2010-11-11
6.2
None Local High Not required Complete Complete Complete
Unspecified vulnerability in the service API in HP Palm webOS 1.4.1 allows local users to gain privileges by leveraging the ability to perform certain service calls.
2 CVE-2010-3992 +Priv 2010-10-28 2010-11-11
9.0
None Remote Low ??? Complete Complete Complete
Unspecified vulnerability in HP Insight Control Server Migration before 6.2 allows remote authenticated users to gain privileges via unknown vectors.
3 CVE-2010-3983 264 +Priv 2010-10-18 2010-11-03
9.0
None Remote Low ??? Complete Complete Complete
CmcApp in SAP BusinessObjects Enterprise XI 3.2 allows remote authenticated users to gain privileges via vectors involving the Program Job Server and the Program Login property.
4 CVE-2010-3889 +Priv 2010-10-08 2018-08-13
7.2
None Local Low Not required Complete Complete Complete
Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local users to gain privileges via unknown vectors, as exploited in the wild in July 2010 by the Stuxnet worm, and identified by Microsoft researchers and other researchers.
5 CVE-2010-3888 +Priv 2010-10-08 2010-10-11
7.2
None Local Low Not required Complete Complete Complete
Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local users to gain privileges via unknown vectors, as exploited in the wild in July 2010 by the Stuxnet worm, and identified by Kaspersky Lab researchers and other researchers.
6 CVE-2010-3781 264 Exec Code +Priv 2010-10-06 2017-09-19
6.0
None Remote Medium ??? Partial Partial Partial
The PL/php add-on 1.4 and earlier for PostgreSQL does not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, a related issue to CVE-2010-3433.
7 CVE-2010-3733 264 +Priv 2010-10-05 2017-09-19
7.2
None Local Low Not required Complete Complete Complete
The Engine Utilities component in IBM DB2 UDB 9.5 before FP6a uses world-writable permissions for the sqllib/cfg/db2sprf file, which might allow local users to gain privileges by modifying this file.
8 CVE-2010-3716 20 +Priv 2010-10-25 2010-10-27
6.0
None Remote Medium ??? Partial Partial Partial
The be_user_creation task in TYPO3 4.2.x before 4.2.15 and 4.3.x before 4.3.7 allows remote authenticated users to gain privileges via a crafted POST request that creates a user account with arbitrary group memberships.
9 CVE-2010-3433 264 Exec Code +Priv 2010-10-06 2017-09-19
6.0
None Remote Medium ??? Partial Partial Partial
The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
10 CVE-2010-3394 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
The (1) texmacs and (2) tm_mupad_help scripts in TeXmacs 1.0.7.4 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
11 CVE-2010-3393 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
magics-config in Magics++ 2.10.0 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
12 CVE-2010-3389 +Priv 2010-10-20 2012-02-02
6.9
None Local Medium Not required Complete Complete Complete
The (1) SAPDatabase and (2) SAPInstance scripts in OCF Resource Agents (aka resource-agents or cluster-agents) 1.0.3 in Linux-HA place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
13 CVE-2010-3387 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
** DISPUTED ** vdrleaktest in Video Disk Recorder (VDR) 1.6.0 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: a third party disputes this issue because the script erroneously uses a semicolon in a context where a colon was intended.
14 CVE-2010-3386 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
usttrace in LTTng Userspace Tracer (aka UST) 0.7 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
15 CVE-2010-3385 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
TuxGuitar 1.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
16 CVE-2010-3384 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
The (1) torcs, (2) nfsperf, (3) accc, (4) texmapper, (5) trackgen, and (6) nfs2ac scripts in TORCS 1.3.1 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
17 CVE-2010-3383 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
18 CVE-2010-3382 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
tauex in Tuning and Analysis Utilities (TAU) 2.16.4 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
19 CVE-2010-3381 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
The (1) tangerine and (2) tangerine-properties scripts in Tangerine 0.3.2.2 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
20 CVE-2010-3378 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
The (1) scilab, (2) scilab-cli, and (3) scilab-adv-cli scripts in Scilab 5.2.2 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
21 CVE-2010-3377 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
The (1) runSalome, (2) runTestMedCorba, (3) runLightSalome, and (4) hxx2salome scripts in SALOME 5.1.3 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
22 CVE-2010-3376 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
The (1) proofserv, (2) xrdcp, (3) xrdpwdadmin, and (4) xrd scripts in ROOT 5.18/00 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
23 CVE-2010-3374 +Priv 2010-10-04 2010-10-05
6.9
None Local Medium Not required Complete Complete Complete
Qt Creator before 2.0.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
24 CVE-2010-3369 +Priv 2010-10-20 2010-12-14
6.9
None Local Medium Not required Complete Complete Complete
The (1) mdb and (2) mdb-symbolreader scripts in mono-debugger 2.4.3, and other versions before 2.8.1, place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
25 CVE-2010-3366 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
Mn_Fit 5.13 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
26 CVE-2010-3365 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
Mistelix 0.31 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
27 CVE-2010-3364 +Priv 2010-10-20 2010-11-03
6.9
None Local Medium Not required Complete Complete Complete
The vips-7.22 script in VIPS 7.22.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
28 CVE-2010-3363 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
roarify in roaraudio 0.3 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
29 CVE-2010-3362 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
lastfm 1.5.4 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
30 CVE-2010-3361 +Priv 2010-10-20 2010-10-22
6.9
None Local Medium Not required Complete Complete Complete
The (1) iked, (2) ikea, and (3) ikec scripts in Shrew Soft IKE 2.1.5 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
31 CVE-2010-3360 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
Hipo 0.6.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
32 CVE-2010-3358 +Priv 2010-10-20 2010-10-22
6.9
None Local Medium Not required Complete Complete Complete
HenPlus JDBC SQL-Shell 0.9.7 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
33 CVE-2010-3357 +Priv 2010-10-20 2010-11-03
6.9
None Local Medium Not required Complete Complete Complete
gnome-subtitles 1.0 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
34 CVE-2010-3355 +Priv 2010-10-20 2010-10-22
6.9
None Local Medium Not required Complete Complete Complete
Ember 0.5.7 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
35 CVE-2010-3354 +Priv 2010-10-20 2010-11-03
6.9
None Local Medium Not required Complete Complete Complete
dropboxd in Dropbox 0.7.110 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
36 CVE-2010-3353 +Priv 2010-10-20 2010-10-21
6.9
None Local Medium Not required Complete Complete Complete
Cowbell 0.2.7.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
37 CVE-2010-3351 +Priv 2010-10-20 2011-09-15
6.9
None Local Medium Not required Complete Complete Complete
startBristol in Bristol 0.60.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
38 CVE-2010-3350 20 +Priv 2010-10-20 2017-08-17
6.9
None Local Medium Not required Complete Complete Complete
bareFTP 0.3.4 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
39 CVE-2010-3349 +Priv 2010-10-20 2010-11-03
6.9
None Local Medium Not required Complete Complete Complete
Ardour 2.8.11 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
40 CVE-2010-3290 +Priv 2010-10-23 2017-08-17
6.5
None Remote Low ??? Partial Partial Partial
Unspecified vulnerability in HP Systems Insight Manager (SIM) before 6.2 allows remote authenticated users to gain privileges via unknown vectors.
41 CVE-2010-3222 119 Overflow +Priv 2010-10-13 2019-02-26
7.2
None Local Low Not required Complete Complete Complete
Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Message Buffer Overrun Vulnerability."
42 CVE-2010-3182 +Priv 2010-10-21 2017-09-19
6.9
None Local Medium Not required Complete Complete Complete
A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
43 CVE-2010-3181 +Priv 2010-10-21 2017-09-19
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory.
44 CVE-2010-3165 +Priv 2010-10-25 2010-10-27
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in Yokka NoEditor 1.33.1.1 and earlier, OuiEditor 1.6.1.1 and earlier, UnEditor 1.10.1.2 and earlier, DeuxEditor 1.7.1.2 and earlier, SQLEditorXP 3.14.1.2 and earlier, SQLEditorTE 1.9.1.3 and earlier, SQLEditor8 3.8.1.2 and earlier, and SQLEditorClassic 1.8.1.3 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory.
45 CVE-2010-3164 +Priv 2010-10-25 2017-08-17
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in Fenrir Sleipnir 2.9.4 and earlier and Grani 4.3 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory.
46 CVE-2010-3163 +Priv 2010-10-25 2010-10-27
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in Fenrir Sleipnir before 2.9.5 and Grani before 4.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
47 CVE-2010-3162 +Priv 2010-10-25 2010-10-28
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in Apsaly before 3.74 allows local users to gain privileges via a Trojan horse executable file in the current working directory.
48 CVE-2010-3161 +Priv 2010-10-25 2010-10-27
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in TeraPad before 1.00 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
49 CVE-2010-3160 +Priv 2010-10-25 2010-10-27
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in Archive Decoder 1.23 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory.
50 CVE-2010-3159 426 +Priv 2010-10-25 2020-08-12
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in Explzh 5.67 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory.
Total number of vulnerabilities : 60   Page : 1 (This Page)2
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.