{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T17:54:41.556","vulnerabilities":[{"cve":{"id":"CVE-2010-3160","sourceIdentifier":"vultures@jpcert.or.jp","published":"2010-10-25T20:01:02.393","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in Archive Decoder 1.23 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory."},{"lang":"es","value":"Vulnerabilidad de ruta de búsqueda no confiable en Archive Decoder v1.23 y anteriores ,permite a usuarios locales obtener privilegios a través de un troyano  que está ubicado en el directorio de trabajo actual."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:*:*:*:*:*:*:*:*","versionEndIncluding":"1.23","matchCriteriaId":"5C6517EC-C00A-4AA7-8076-7C48FE5C501B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.00:*:*:*:*:*:*:*","matchCriteriaId":"C7BBD029-DDDB-45CF-B914-120A397C37E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.01:*:*:*:*:*:*:*","matchCriteriaId":"8D060424-258B-4089-BF35-8041613F86CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.02:*:*:*:*:*:*:*","matchCriteriaId":"407A1E28-E09B-419E-AB68-34DDF059DCF1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.03:*:*:*:*:*:*:*","matchCriteriaId":"C97257CB-CF65-4AB5-8055-DD4C0E5DFB17"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.04:*:*:*:*:*:*:*","matchCriteriaId":"6B8AEADD-0765-4280-A042-96A8F7291244"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.05:*:*:*:*:*:*:*","matchCriteriaId":"DEF3214D-A207-4E8F-AA99-A8E38E3D2C8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.06:*:*:*:*:*:*:*","matchCriteriaId":"33197BC6-B1E1-4AF5-9EE6-439B3B8FC256"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.07:*:*:*:*:*:*:*","matchCriteriaId":"02BF2835-B4E9-4D40-9F32-9EAE5A4EEB31"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.08:*:*:*:*:*:*:*","matchCriteriaId":"7419C2E2-53EB-4DF2-B34E-D1FF0BBAD52F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.09:*:*:*:*:*:*:*","matchCriteriaId":"9009D1F3-2E87-4AD9-8584-858A82798933"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.11:*:*:*:*:*:*:*","matchCriteriaId":"5F5BA2F7-FA7C-4982-8278-93385527212D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.12:*:*:*:*:*:*:*","matchCriteriaId":"3B9B00CE-3C9A-4E47-B90C-5FA9218A4C8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.13:*:*:*:*:*:*:*","matchCriteriaId":"69DA5C01-6841-4D9D-BB4B-9F0D70BC4DE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.20:*:*:*:*:*:*:*","matchCriteriaId":"B0FAF0A3-9B5C-4EC0-8484-F48ACECC5C94"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.21:*:*:*:*:*:*:*","matchCriteriaId":"AF4F2E5E-2839-4B15-93AC-E7E2B2467C55"},{"vulnerable":true,"criteria":"cpe:2.3:a:ponsoftware:archive_decoder:1.22:*:*:*:*:*:*:*","matchCriteriaId":"4667D99E-EF52-4AFD-8D93-45C1E68D9F36"}]}]}],"references":[{"url":"http://jvn.jp/en/jp/JVN68536660/index.html","source":"vultures@jpcert.or.jp"},{"url":"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000044.html","source":"vultures@jpcert.or.jp"},{"url":"http://www.ponsoftware.com/en/","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"http://jvn.jp/en/jp/JVN68536660/index.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000044.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ponsoftware.com/en/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}],"evaluatorComment":"Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'"}}]}