Untrusted Search Path Vulnerabilities in IsoBuster 2.8

Untrusted Search Path Vulnerabilities in IsoBuster 2.8

CVE-2010-5259 · MEDIUM Severity

AV:L/AC:M/AU:N/C:C/I:C/A:C

Multiple untrusted search path vulnerabilities in IsoBuster 2.8 allow local users to gain privileges via a Trojan horse (1) wnaspi32.dll or (2) ntaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .img file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Learn more about our User Device Pen Test.