CVE Database

Comprehensive vulnerability intelligence with advanced analytics

7.5

Kyocera Command Center RX ECOSYS M2035dn contains a directory traversal vulnerability that allows unauthenticated attackers to read sensitive system files by manipulating file paths under the /js/ path. Attackers can exploit the issue by sending requests like /js/../../../../.../etc/passwd%00.jpg (null-byte appended traversal) to access critical files such as /etc/passwd and /etc/shadow.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.71%
View Details
8.4

TeamSpeak 3.5.6 contains an insecure file permissions vulnerability that allows local attackers to replace executable files with malicious binaries. Attackers can replace system executables like ts3client_win32.exe with custom files to potentially gain SYSTEM or Administrator-level access.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
8.4

Emerson PAC Machine Edition 9.80 contains an unquoted service path vulnerability in the TrapiServer service that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious code that would execute with LocalSystem permissions during service startup.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
8.4

Connectify Hotspot 2018 contains an unquoted service path vulnerability in its ConnectifyService executable that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files (x86)\Connectify\ConnectifyService.exe' to inject malicious executables and escalate privileges.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
8.4

BlueSoleilCS 5.4.277 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path in 'C:\Program Files\IVT Corporation\BlueSoleil\BlueSoleilCS.exe' to inject malicious executables and escalate privileges.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
6.2

Cyclades Serial Console Server 3.3.0 contains a local privilege escalation vulnerability due to overly permissive sudo privileges for the admin user and admin group. Attackers can exploit the default user configuration to gain root access by manipulating system binaries and leveraging unrestricted sudo permissions.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
9.8

WAGO 750-8212 PFC200 G2 2ETH RS firmware contains a privilege escalation vulnerability that allows attackers to manipulate user session cookies. Attackers can modify the cookie's 'name' and 'roles' parameters to elevate from ordinary user to administrative privileges without authentication.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.07%
View Details
9.8

Prowise Reflect version 1.0.9 contains a remote keystroke injection vulnerability that allows attackers to send keyboard events through an exposed WebSocket on port 8082. Attackers can craft malicious web pages to inject keystrokes, opening applications and typing arbitrary text by sending specific WebSocket messages.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.02%
View Details
8.4

Private Internet Access 3.3 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious code that would execute with LocalSystem permissions during service startup.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
8.4

Cobian Backup 0.9 contains an unquoted service path vulnerability that allows local users to execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the CobianReflectorService to inject malicious code that will execute with LocalSystem permissions during service startup.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
9.8

Audio Conversion Wizard v2.01 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting memory with a specially crafted registration code. Attackers can generate a payload that overwrites the application's memory stack, potentially enabling remote code execution through a carefully constructed input buffer.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.18%
View Details
8.4

WOW21 5.0.1.9 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem permissions during service startup.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
8.4

Sandboxie-Plus 5.50.2 contains an unquoted service path vulnerability in the SbieSvc Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
9.8

Tdarr 2.00.15 contains an unauthenticated remote code execution vulnerability in its Help terminal that allows attackers to inject and chain arbitrary commands. Attackers can exploit the lack of input filtering by chaining commands like `--help; curl .py | python` to execute remote code without authentication.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.32%
View Details
8.4

VIVE Runtime Service 1.0.0.4 contains an unquoted service path vulnerability that allows local users to execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path by placing malicious executables in specific system directories to gain LocalSystem access during service startup.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
8.4

ProtonVPN 1.26.0 contains an unquoted service path vulnerability in its WireGuard service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path by placing malicious executables in specific file system locations to gain elevated privileges during service startup.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
7.2

e107 CMS version 3.2.1 contains a file upload vulnerability that allows authenticated administrators to override server files through the Media Manager import functionality. Attackers can exploit the upload mechanism by manipulating the upload URL parameter to overwrite existing files like top.php in the web application directory.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: e107 e107
EPSS: 0.07%
View Details
8.4

PTPublisher 2.3.4 contains an unquoted service path vulnerability in the PTProtect service that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted path in 'C:\Program Files (x86)\Primera Technology\PTPublisher\UsbFlashDongleService.exe' to inject malicious executables and gain system-level access.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
8.4

EaseUS Data Recovery 15.1.0.0 contains an unquoted service path vulnerability in the EaseUS UPDATE SERVICE executable. Attackers can exploit the unquoted path to inject and execute malicious code with elevated LocalSystem privileges.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
8.4

ITeC ITeCProteccioAppServer contains an unquoted service path vulnerability that allows local attackers to execute code with elevated system privileges. Attackers can insert a malicious executable in the service path to gain elevated access during service restart or system reboot.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
9.8

ImpressCMS 1.4.4 contains a file upload vulnerability with weak extension sanitization that allows attackers to upload potentially malicious files. Attackers can bypass file upload restrictions by using alternative file extensions .php2.php6.php7.phps.pht to execute arbitrary PHP code on the server.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details

Rejected reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue.

Published: Jan 13, 2026
Modified: Jan 16, 2026
EPSS: 0.16%
View Details
7.5

Beehive Forum 1.5.2 contains a host header injection vulnerability in the forgot password functionality that allows attackers to manipulate password reset requests. Attackers can inject a malicious host header to intercept password reset tokens and change victim account passwords without direct authentication.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.07%
View Details
8.8

Algo 8028 Control Panel version 3.3.3 contains a command injection vulnerability in the fm-data.lua endpoint that allows authenticated attackers to execute arbitrary commands. Attackers can exploit the insecure 'source' parameter by injecting commands that are executed with root privileges, enabling remote code execution through a crafted POST request.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.28%
View Details