[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-3966Date: (C)2010-12-16   (M)2023-12-22


Untrusted search path vulnerability in Microsoft Windows Server 2008 R2 and Windows 7, when BranchCache is supported, allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an EML file, an RSS file, or a WPOST file, aka "BranchCache Insecure Library Loading Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1024877
SECUNIA-42609
BID-45295
OSVDB-69816
ADV-2010-3218
MS10-095
TA10-348A
oval:org.mitre.oval:def:12163

CPE    3
cpe:/o:microsoft:windows_server_2008:r2::x64
cpe:/o:microsoft:windows_7:-
cpe:/o:microsoft:windows_server_2008:r2::itanium
OVAL    2
oval:org.secpod.oval:def:1276
oval:org.mitre.oval:def:12163

© SecPod Technologies