{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T11:34:33.879","vulnerabilities":[{"cve":{"id":"CVE-2010-3162","sourceIdentifier":"vultures@jpcert.or.jp","published":"2010-10-25T20:01:03.160","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in Apsaly before 3.74 allows local users to gain privileges via a Trojan horse executable file in the current working directory."},{"lang":"es","value":"Vulnerabilidad de ruta de búsqueda no confiable en Apsaly anteriores a v3.74 permite a usuarios locales obtener privilegios a través de un troyano  que está ubicado en el directorio de trabajo actual."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:*:*:*:*:*:*:*:*","versionEndIncluding":"3.70","matchCriteriaId":"7B65DBC7-FB43-4F6D-82D4-D4AFA45889D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:1.20:*:*:*:*:*:*:*","matchCriteriaId":"7096C6D9-080B-498E-B694-297C34E133A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:1.40:*:*:*:*:*:*:*","matchCriteriaId":"A242E09A-C6DB-4B0C-9E9F-F535A23ECF7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.00:*:*:*:*:*:*:*","matchCriteriaId":"20B5AB7E-FD8A-4677-8C1D-5919F0CC9A1B"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.10:*:*:*:*:*:*:*","matchCriteriaId":"B40DD8B1-1217-4F01-A660-BEF096861A1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.20:*:*:*:*:*:*:*","matchCriteriaId":"A5044E01-9429-4EF4-A071-C9A97664D98D"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.30:*:*:*:*:*:*:*","matchCriteriaId":"41A126E7-6365-408E-86A5-CB1AF304E062"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.40:*:*:*:*:*:*:*","matchCriteriaId":"8BE69F49-35B9-4EBA-805C-D615FD6663C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.50:*:*:*:*:*:*:*","matchCriteriaId":"4D3F4CD7-38B5-4618-A76D-0619262CDAB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.60:*:*:*:*:*:*:*","matchCriteriaId":"5BBF560D-691D-42FB-BC0C-FA84C48B181D"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.70:*:*:*:*:*:*:*","matchCriteriaId":"B946CFEC-8C8A-4550-88AC-87E3C31D05CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:2.72:*:*:*:*:*:*:*","matchCriteriaId":"5C915C9A-8695-4F38-9E19-12AACCF29F2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:3.00:*:*:*:*:*:*:*","matchCriteriaId":"FAB46FC7-6E64-40A0-BE5D-E104DAACFF11"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:3.10:*:*:*:*:*:*:*","matchCriteriaId":"8A8812F0-3D50-4BC0-A35A-350184B86DFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:3.40:*:*:*:*:*:*:*","matchCriteriaId":"1E15A55F-99FA-4918-A8CD-03CC4450C72E"},{"vulnerable":true,"criteria":"cpe:2.3:a:masahiko_watanabe:apsaly:3.60:*:*:*:*:*:*:*","matchCriteriaId":"3F3ABDBE-E950-49D0-BE8C-26A195084193"}]}]}],"references":[{"url":"http://jvn.jp/en/jp/JVN71138390/index.html","source":"vultures@jpcert.or.jp"},{"url":"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000046.html","source":"vultures@jpcert.or.jp"},{"url":"http://www.venus.dti.ne.jp/mw31/apsaly/Vulnerability.html","source":"vultures@jpcert.or.jp","tags":["Patch"]},{"url":"http://jvn.jp/en/jp/JVN71138390/index.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000046.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.venus.dti.ne.jp/mw31/apsaly/Vulnerability.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}],"evaluatorComment":"Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'"}}]}