Page 7 of 60782 results (0.167 seconds)

CVSS: 8.9EPSS: 0%CPEs: 1EXPL: 0

26 Jan 2026 — DLL hijacking in the WD Discovery Installer in Western Digital WD Discovery 5.2.730 on Windows allows a local attacker to execute arbitrary code via placement of a crafted dll in the installer's search path. • https://www.westerndigital.com/support/product-security/wdc-25008-wd-discovery-desktop-app-version-5-3 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

26 Jan 2026 — It can lead to overwriting config files, scripts, or other sensitive files leading to RCE. Version 10.28.1 contains a patch. • https://github.com/pnpm/pnpm/commit/5c382f0ca3b7cc49963b94677426e66539dcb3f5 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal CWE-426: Untrusted Search Path •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

26 Jan 2026 — IDT PC Audio 1.0.6499.0 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted path in the STacSV service to inject malicious code that would execute with LocalSystem account permissions during service startup. • https://www.exploit-db.com/exploits/49191 • CWE-428: Unquoted Search Path or Element •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

26 Jan 2026 — Kite 1.2020.1119.0 contains an unquoted service path vulnerability in the KiteService Windows service that allows local attackers to potentially execute arbitrary code. • https://www.exploit-db.com/exploits/49205 • CWE-428: Unquoted Search Path or Element •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

26 Jan 2026 — MiniTool ShadowMaker 3.2 contains an unquoted service path vulnerability in the MTAgentService that allows local attackers to potentially execute arbitrary code. • https://www.exploit-db.com/exploits/49336 • CWE-428: Unquoted Search Path or Element •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

26 Jan 2026 — An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file. • https://www.3ds.com/trust-center/security/security-advisories/cve-2026-1284 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

26 Jan 2026 — A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file. • https://www.3ds.com/trust-center/security/security-advisories/cve-2026-1283 • CWE-122: Heap-based Buffer Overflow •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

26 Jan 2026 — Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Continuum. This issue affects Apache Continuum: all versions. Attackers with access to the installations REST API can use this to invoke arbitrary commands on the server. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. • https://lists.apache.org/thread/hbvf1ztqw2kv51khvzm5nk3mml3nm4z1 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

26 Jan 2026 — A vulnerability was determined in code-projects Online Examination System 1.0. ... The attack may be performed from remote. • https://code-projects.org • CWE-284: Improper Access Control CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

25 Jan 2026 — Microvirt MEMU Play 3.7.0 contains an unquoted service path vulnerability in the MEmusvc Windows service that allows local attackers to potentially execute arbitrary code. • https://www.exploit-db.com/exploits/49016 • CWE-428: Unquoted Search Path or Element •