{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-17T03:06:25.861","vulnerabilities":[{"cve":{"id":"CVE-2026-26959","sourceIdentifier":"security-advisories@github.com","published":"2026-02-20T00:16:16.000","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with the privileges of the current user. An attacker can exploit this by crafting a malicious App.txt settings file that points ManualAdbPath to an arbitrary executable, then convincing a victim to launch the application with a command-line argument directing it to the malicious configuration directory. This vulnerability could be leveraged through social engineering tactics, such as distributing a shortcut bundled with a crafted settings file in an archive, resulting in RCE upon application startup. Thus issue has been fixed in version 0.9.26021."},{"lang":"es","value":"ADB Explorer es una interfaz de usuario fluida para ADB en Windows. Las versiones 0.9.26020 e inferiores no validan la integridad o autenticidad de la ruta del binario de ADB especificada en la configuración ManualAdbPath antes de ejecutarlo, lo que permite la ejecución de código arbitrario con los privilegios del usuario actual. Un atacante puede explotar esto creando un archivo de configuración App.txt malicioso que apunte ManualAdbPath a un ejecutable arbitrario, y luego convenciendo a una víctima para que inicie la aplicación con un argumento de línea de comandos que la dirija al directorio de configuración malicioso. Esta vulnerabilidad podría ser aprovechada mediante tácticas de ingeniería social, como la distribución de un acceso directo empaquetado con un archivo de configuración manipulado en un archivo comprimido, lo que resultaría en RCE al iniciar la aplicación. Este problema ha sido solucionado en la versión 0.9.26021."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-829"}]}],"references":[{"url":"https://github.com/Alex4SSB/ADB-Explorer/commit/1b9fed20e875f5e74fd04e9889402f969c2d34e4","source":"security-advisories@github.com"},{"url":"https://github.com/Alex4SSB/ADB-Explorer/releases/tag/v0.9.26021","source":"security-advisories@github.com"},{"url":"https://github.com/Alex4SSB/ADB-Explorer/security/advisories/GHSA-gcgv-2jq7-74rp","source":"security-advisories@github.com"}]}}]}