<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2010-4804_MicroStation_7.1%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2010-4804 MicroStation 7.1權限提升漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2010-4804_MicroStation_7.1%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2010-4804_MicroStation_7.1%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-17T03:06:14Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2010-4804_MicroStation_7.1%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E&amp;diff=953&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; # CVE-2010-5230 Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local users to gain privileges via a Trojan horse (1) mptools.dll, (2)...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2010-4804_MicroStation_7.1%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E&amp;diff=953&amp;oldid=prev"/>
		<updated>2021-04-03T06:16:07Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; # CVE-2010-5230 Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local users to gain privileges via a Trojan horse (1) mptools.dll, (2)...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# CVE-2010-5230&lt;br /&gt;
Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local users to gain privileges via a Trojan horse (1) mptools.dll, (2) baseman.dll, (3) wintab32.dll, or (4) wintab.dll file in the current working directory, as demonstrated by a directory that contains a .hln or .rdl file. NOTE: some of these details are obtained from third party information.&lt;br /&gt;
&lt;br /&gt;
Hi folks,&lt;br /&gt;
&lt;br /&gt;
After playing with windows DLL hijack toolkit,I got exploit POC for Pipe&lt;br /&gt;
design software Bentaly Microstation 7.1,Nero 8.2.8.0,Quicktime pictureviwer&lt;br /&gt;
7.6.5&lt;br /&gt;
&lt;br /&gt;
 Bentley Microstation 7.1:&lt;br /&gt;
&lt;br /&gt;
File :Ustation.exe  File type:hln  Hijack Dll:mptools.dll&lt;br /&gt;
File :Ustation.exe  File type:rdl   Hijack&lt;br /&gt;
Dll:baseman.dll,wintab32.dll,wintab.dll&lt;br /&gt;
&lt;br /&gt;
Nero 8.2.8.0&lt;br /&gt;
&lt;br /&gt;
File :nero.exe  File type:nab Hijack Dll:bcgpoleacc.dll&lt;br /&gt;
&lt;br /&gt;
Quicktime pictureviwer 7.6.5&lt;br /&gt;
&lt;br /&gt;
File :pictureviewer.exe   File type:mac,pct,pic,pict,pnt,pntg,qti,qtif&lt;br /&gt;
Hijack Dll:cfnetwork.dll&lt;br /&gt;
File :pictureviewer.exe   File type:pct,pic,pict,pnt,pntg,qti,qtif&lt;br /&gt;
Hijack Dll:corefoundation.dll&lt;br /&gt;
&lt;br /&gt;
Download Link Generated POC's&lt;br /&gt;
&lt;br /&gt;
https://paper.seebug.org/papers/old_sebug_paper/Exploits-Archives/2010-exploits/1008-exploits/Microstation_dllhijact_exploit.rar&lt;br /&gt;
&lt;br /&gt;
https://paper.seebug.org/papers/old_sebug_paper/Exploits-Archives/2010-exploits/1008-exploits/Nero_dllhijack_exploit.rar&lt;br /&gt;
&lt;br /&gt;
https://paper.seebug.org/papers/old_sebug_paper/Exploits-Archives/2010-exploits/1008-exploits/quicktime_pictureviwer_dllhijact_exploit.rar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For test cases-&lt;br /&gt;
http://reach2kalyan.blogspot.com/2010/08/playing-with-dll-hijack-bug.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kalyan&lt;br /&gt;
http://reach2kalyan.blogspot.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
https://github.com/JustYoomoon/Exploit/blob/main/CVE-2010-5230.zip&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>