Логотип exploitDog
bind:"CVE-2010-4167"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2010-4167"

Количество 7

Количество 7

ubuntu логотип

CVE-2010-4167

больше 14 лет назад

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

CVSS2: 6.9
EPSS: Низкий
redhat логотип

CVE-2010-4167

почти 15 лет назад

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2010-4167

больше 14 лет назад

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

CVSS2: 6.9
EPSS: Низкий
debian логотип

CVE-2010-4167

больше 14 лет назад

Untrusted search path vulnerability in configure.c in ImageMagick befo ...

CVSS2: 6.9
EPSS: Низкий
github логотип

GHSA-47hr-2rq3-9pw5

больше 3 лет назад

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

EPSS: Низкий
oracle-oval логотип

ELSA-2012-0301

больше 13 лет назад

ELSA-2012-0301: ImageMagick security and bug fix update (LOW)

EPSS: Низкий
oracle-oval логотип

ELSA-2012-0544

больше 13 лет назад

ELSA-2012-0544: ImageMagick security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2010-4167

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

CVSS2: 6.9
0%
Низкий
больше 14 лет назад
redhat логотип
CVE-2010-4167

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

CVSS2: 2.6
0%
Низкий
почти 15 лет назад
nvd логотип
CVE-2010-4167

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

CVSS2: 6.9
0%
Низкий
больше 14 лет назад
debian логотип
CVE-2010-4167

Untrusted search path vulnerability in configure.c in ImageMagick befo ...

CVSS2: 6.9
0%
Низкий
больше 14 лет назад
github логотип
GHSA-47hr-2rq3-9pw5

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2012-0301

ELSA-2012-0301: ImageMagick security and bug fix update (LOW)

больше 13 лет назад
oracle-oval логотип
ELSA-2012-0544

ELSA-2012-0544: ImageMagick security update (MODERATE)

больше 13 лет назад

Уязвимостей на страницу