Vulnerabilities > CVE-2010-5227 - Unspecified vulnerability in Opera
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Untrusted search path vulnerability in Opera before 10.62 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .htm, .mht, .mhtml, .xht, .xhtm, or .xhtl file. NOTE: some of these details are obtained from third party information.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Opera v10.61 DLL Hijacking Exploit (dwmapi.dll). CVE-2010-5227. Local exploit for windows platform |
file | exploits/windows/local/14732.c |
id | EDB-ID:14732 |
last seen | 2016-02-01 |
modified | 2010-08-24 |
platform | windows |
port | |
published | 2010-08-24 |
reporter | Nicolas Krassas |
source | https://www.exploit-db.com/download/14732/ |
title | Opera 10.61 - DLL Hijacking Exploit dwmapi.dll |
type | local |
Nessus
NASL family | Windows |
NASL id | OPERA_1062.NASL |
description | The version of Opera installed on the remote host is earlier than 10.62. Such versions insecurely look in their current working directory when resolving DLL dependencies, such as for |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 49174 |
published | 2010-09-10 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/49174 |
title | Opera < 10.62 Path Subversion Arbitrary DLL Injection Code Execution |
code |
|
References
- http://secunia.com/advisories/41083
- http://www.exploit-db.com/exploits/14732
- http://www.opera.com/docs/changelogs/windows/1062/
- http://www.opera.com/support/kb/view/970/
- http://secunia.com/advisories/41083
- http://www.opera.com/support/kb/view/970/
- http://www.opera.com/docs/changelogs/windows/1062/
- http://www.exploit-db.com/exploits/14732