{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T21:17:00.982","vulnerabilities":[{"cve":{"id":"CVE-2010-3165","sourceIdentifier":"vultures@jpcert.or.jp","published":"2010-10-25T20:01:03.800","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in Yokka NoEditor 1.33.1.1 and earlier, OuiEditor 1.6.1.1 and earlier, UnEditor 1.10.1.2 and earlier, DeuxEditor 1.7.1.2 and earlier, SQLEditorXP 3.14.1.2 and earlier, SQLEditorTE 1.9.1.3 and earlier, SQLEditor8 3.8.1.2 and earlier, and SQLEditorClassic 1.8.1.3 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory."},{"lang":"es","value":"Vulnerabilidad de ruta de búsqueda no confiable en Yokka NoEditor v1.33.1.1 y anteriores, OuiEditor v1.6.1.1 y anteriores, UnEditor v1.10.1.2 y anteriores, DeuxEditor v1.7.1.2 y anteriores, SQLEditorXP v3.14.1.2 y anteriores, SQLEditorTE v1.9.1.3 y anteriores, SQLEditor8 v3.8.1.2 y anteriores, and SQLEditorClassic v1.8.1.3 y anteriores permite a usuarios locales obtener privilegios a través de un troyano que está ubicado en el directorio de trabajo actual."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yokkasoft:deuxeditor:*:*:*:*:*:*:*:*","versionEndIncluding":"1.7.1.2","matchCriteriaId":"7341E3E4-0772-46FE-B106-BA88AEF968C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokkasoft:noeditor:*:*:*:*:*:*:*:*","versionEndIncluding":"1.33.1.1","matchCriteriaId":"158F6F31-62AF-4AC1-A36E-D92B91447CD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokkasoft:ouieditor:*:*:*:*:*:*:*:*","versionEndIncluding":"1.6.1.1","matchCriteriaId":"B0BD832B-39EB-4D60-AB81-9B0816001555"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokkasoft:sqleditor8:*:*:*:*:*:*:*:*","versionEndIncluding":"3.8.1.2","matchCriteriaId":"9EB94F7F-C129-4FD2-A935-50D423CFE533"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokkasoft:sqleditorclassic:*:*:*:*:*:*:*:*","versionEndIncluding":"1.8.1.3","matchCriteriaId":"F848F664-DADA-4934-BE54-01D602FF6748"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokkasoft:sqleditorte:*:*:*:*:*:*:*:*","versionEndIncluding":"1.9.1.3","matchCriteriaId":"4D6557AE-5A30-4AB6-961C-3EE918661423"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokkasoft:sqleditorxp:*:*:*:*:*:*:*:*","versionEndIncluding":"3.14.1.2","matchCriteriaId":"8AFFFFB6-0190-4295-8DDE-838937D5DF63"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokkasoft:uneditor:*:*:*:*:*:*:*:*","versionEndIncluding":"1.10.1.2","matchCriteriaId":"1FCBD224-6F83-41E7-9C0A-0257452B0170"}]}]}],"references":[{"url":"http://jvn.jp/en/jp/JVN07497935/index.html","source":"vultures@jpcert.or.jp"},{"url":"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000049.html","source":"vultures@jpcert.or.jp"},{"url":"http://jvn.jp/en/jp/JVN07497935/index.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000049.html","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'"}}]}