{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T21:45:44.679","vulnerabilities":[{"cve":{"id":"CVE-2010-2600","sourceIdentifier":"cve@mitre.org","published":"2010-09-15T18:00:42.527","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in BlackBerry Desktop Software before 6.0.0.47 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL that is located in the same folder as a file that is processed by Blackberry."},{"lang":"es","value":"Vulnerabilidad ruta de búsqueda no confiable en BlackBerry Desktop Software anterior a v6.0.0.47 permite a los usuarios locales, y posiblemente a los atacantes remotos, ejecutar código a su elección y y producir un ataque de secuestro de DLL, a través de un troyano DLL que está ubicado en la misma carpeta que un fichero que sea procesado por Blackberry."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rim:blackberry_desktop_software:*:*:*:*:*:*:*:*","versionEndIncluding":"6.0","matchCriteriaId":"83FAB36B-C391-48CD-9288-B863B4AEEDF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:rim:blackberry_desktop_software:3.0:*:*:*:*:*:*:*","matchCriteriaId":"A5D351E1-40DE-4B6B-B4F1-E8DC8CAE2394"},{"vulnerable":true,"criteria":"cpe:2.3:a:rim:blackberry_desktop_software:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2F6E498C-19BA-4446-B294-48C43B683503"},{"vulnerable":true,"criteria":"cpe:2.3:a:rim:blackberry_desktop_software:4.5:*:*:*:*:*:*:*","matchCriteriaId":"2678689F-7A01-4A7A-9FF7-EE1D88745190"},{"vulnerable":true,"criteria":"cpe:2.3:a:rim:blackberry_desktop_software:4.6:*:*:*:*:*:*:*","matchCriteriaId":"41DF363C-8CD9-405A-A91F-76960CA343C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:rim:blackberry_desktop_software:4.7:*:*:*:*:*:*:*","matchCriteriaId":"2F948832-AAF4-43E8-A070-E7C225E869A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:rim:blackberry_desktop_software:5.0:*:*:*:*:*:*:*","matchCriteriaId":"6E268C82-6292-4969-9179-5B007BFDD6BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:rim:blackberry_desktop_software:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1469FEE3-BE68-4028-8BD1-C60B7831955E"}]}]}],"references":[{"url":"http://secunia.com/advisories/41346","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/41398","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.blackberry.com/btsc/KB24242","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/43139","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1024425","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6843","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/41346","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/41398","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.blackberry.com/btsc/KB24242","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/43139","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1024425","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6843","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'"}}]}