Untrusted search path vulnerability in K2 K2Editor before 1.5.9 allows local users to gain privileges via a Trojan horse executable file in the current working directory.
References
Configurations
History
No history.
Information
Published : 2010-10-25 20:00
Updated : 2025-04-11 00:51
NVD link : CVE-2010-3156
Mitre link : CVE-2010-3156
CVE.ORG link : CVE-2010-3156
JSON object : View
Products Affected
k2top
- k2editor
CWE