In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10626.json"
[
{
"events": [
{
"introduced": "1.5.0.66"
},
{
"last_affected": "1.5.2.28"
}
]
},
{
"events": [
{
"introduced": "1.6.0.39"
},
{
"last_affected": "1.6.2.14"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.7.0.64"
}
]
}
]