StudyMD 0
Description
StudyMD 0
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
StudyMD 0
StudyMD 0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Moeditor 0
Moeditor 0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Marky 0
Marky 0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Markright 1
Markright 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Markdownify 1
Markdownify 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Freeter 1
Freeter 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
WifiHotSpot 1
WifiHotSpot 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Sandboxie Plus 0
Sandboxie Plus 0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Sandboxie 5
Sandboxie 5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
DHCP Broadband 4
DHCP Broadband 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
BOOTP Turbo 2
BOOTP Turbo 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
WebSSH for iOS 14
WebSSH for iOS 14
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Acer Backup Manager 3
Acer Backup Manager 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Acer Updater Service 1
Acer Updater Service 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
iDailyDiary 4
iDailyDiary 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Acer ePowerSvc 6
Acer ePowerSvc 6
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
DiskBoss Service 12
DiskBoss Service 12
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
RarmaRadio 2
RarmaRadio 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
ProjeQtOr Project Management 9.1.4 contains a file upload vulnerability that allows guest users to upload malicious PHP files with arbitrary code exec...
ProjeQtOr Project Management 9.1.4 contains a file upload vulnerability that allows guest users to upload malicious PHP files with arbitrary code execution capabilities. Attackers can upload a PHP script through the profile attachment section and execute system commands by accessing the uploaded file with a specially crafted request parameter.
Executive Summary:
A critical vulnerability has been identified in ProjeQtOr Project Management software, allowing unauthenticated guest users to take complete control of the server. Attackers can exploit this flaw by uploading a malicious file, which can then be used to execute arbitrary commands, leading to a full system compromise, data theft, and service disruption. Due to the ease of exploitation and severe impact, immediate remediation is required.
Vulnerability Details
CVE-ID: CVE-2021-47819
Affected Software: ProjeQtOr Project Management Multiple Products
Affected Versions: Version 9.1.4 is confirmed vulnerable. See vendor advisory for a complete list of affected versions.
Vulnerability: The vulnerability is an unrestricted file upload flaw within the profile attachment section. The application fails to properly validate the type of files being uploaded, allowing a low-privileged or unauthenticated guest user to upload a file with a PHP extension (e.g., shell.php). An attacker can then access this uploaded file via a direct URL and use a specially crafted request parameter to execute arbitrary system commands with the permissions of the web server's user account, resulting in Remote Code Execution (RCE).
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could lead to a complete compromise of the underlying server hosting the ProjeQtOr application. The potential consequences include theft of sensitive project data, intellectual property, and personally identifiable information (PII); disruption of project management operations; and reputational damage. The compromised server could also be used as a pivot point to launch further attacks against the internal network, escalating the security incident significantly.
Remediation Plan
Immediate Action: Update ProjeQtOr Project Management Multiple Products to the latest version as recommended by the vendor. After patching, monitor for any signs of post-exploitation activity and review historical web server access logs for indicators of compromise related to suspicious file uploads.
Proactive Monitoring: System administrators should monitor web server logs for HTTP POST requests to profile attachment upload endpoints containing files with suspicious extensions (e.g., .php, .phtml, .php5). Monitor for any unexpected child processes being spawned by the web server process (e.g., sh, bash, cmd.exe, powershell.exe). Network monitoring should be used to detect unusual outbound connections from the ProjeQtOr server.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Jan 15, 2026, this vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given its critical severity and the public availability of exploit code, it is highly likely to be targeted by opportunistic threat actors scanning for vulnerable internet-facing systems. The lack of authentication required for exploitation makes it an attractive target.
Analyst Recommendation
Due to the critical 9.8 CVSS score and the unauthenticated nature of this remote code execution vulnerability, this issue presents an immediate and severe risk to the organization. We strongly recommend that all affected ProjeQtOr instances be patched immediately. Systems that were exposed to the internet prior to patching should be considered potentially compromised and subjected to a thorough security review and incident response process to hunt for evidence of malicious activity.
Update ProjeQtOr Project Management Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
DupTerminator 1
DupTerminator 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Thecus N4800Eco NAS Server Control Panel contains a command injection vulnerability that allows authenticated attackers to execute arbitrary system co...
Thecus N4800Eco NAS Server Control Panel contains a command injection vulnerability that allows authenticated attackers to execute arbitrary system commands through user management endpoints
Executive Summary:
A high-severity command injection vulnerability exists in the control panel of multiple Thecus NAS products. This flaw allows an attacker who has valid user credentials to execute arbitrary commands on the device, potentially leading to a complete system takeover, data theft, or deployment of malware.
Vulnerability Details
CVE-ID: CVE-2021-47816
Affected Software: NAS Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This is a post-authentication command injection vulnerability. An attacker with valid credentials for the NAS device's control panel can inject and execute arbitrary operating system commands. The vulnerability exists within the user management endpoints, meaning an attacker could craft a malicious request (e.g., when creating or modifying a user) that includes shell commands. The system fails to properly sanitize this input, executing the injected commands with the privileges of the web server process, which can lead to full control over the underlying operating system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could result in a complete compromise of the NAS device, which often serves as a central file repository. Potential consequences include the exfiltration of sensitive corporate or personal data, data destruction or encryption via ransomware, and disruption of business operations that rely on the stored data. The compromised device could also be used as a pivot point to launch further attacks against other systems on the internal network, significantly expanding the scope of a breach.
Remediation Plan
Immediate Action: Apply the vendor-provided security updates to all affected Thecus NAS devices immediately. Prioritize patching for any devices with management interfaces exposed to the internet. After patching, review system and access logs for any unusual activity related to the user management functions that may indicate a prior compromise.
Proactive Monitoring: Implement enhanced monitoring of NAS device logs. Specifically, monitor web server access logs for suspicious requests to user management endpoints containing shell metacharacters (e.g., ;, |, &&, $()). Monitor for unusual outbound network traffic from the NAS, unexpected new processes, or the creation of unauthorized user accounts.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: True
Analyst Notes: As of January 18, 2026, proof-of-concept (PoC) exploits for this vulnerability are publicly available. Although this CVE is not currently listed on the CISA KEV list, the combination of a high CVSS score and a public exploit increases the likelihood of opportunistic attacks. The authentication requirement is a mitigating factor, but credentials can be compromised through phishing, password spraying, or insider threats.
Analyst Recommendation
Given the high severity (CVSS 8.8) and the public availability of exploit code, this vulnerability poses a significant risk to the organization. We strongly recommend that the vendor-supplied patches be applied to all affected Thecus NAS devices as a critical priority. Until patching is complete, access to the device's management interface should be strictly controlled, and systems should be actively monitored for any signs of exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Nsauditor 3
Nsauditor 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
NBMonitor 1
NBMonitor 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Backup Key Recovery 2
Backup Key Recovery 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
GravCMS 1
GravCMS 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Grocery Crud 1
Grocery Crud 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
WibuKey Runtime 6
WibuKey Runtime 6
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Disk Sorter Enterprise 13
Disk Sorter Enterprise 13
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Sync Breeze 13
Sync Breeze 13
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Dup Scout 13
Dup Scout 13
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Disk Savvy 13
Disk Savvy 13
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Wise Care 365 5
Wise Care 365 5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
iFunbox 4
iFunbox 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda D151 and D301 routers contain an unauthenticated configuration download vulnerability that allows remote attackers to retrieve router configurat...
Tenda D151 and D301 routers contain an unauthenticated configuration download vulnerability that allows remote attackers to retrieve router configuration files
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Vianeos OctoPUS 5 contains a time-based blind SQL injection vulnerability in the 'login_user' parameter during authentication requests
Vianeos OctoPUS 5 contains a time-based blind SQL injection vulnerability in the 'login_user' parameter during authentication requests
Apply vendor patches immediately. Review database access controls and enable query logging.
NoteBurner 2.35 contains a buffer overflow vulnerability in the license code input field that allows attackers to crash the application. Attackers can...
NoteBurner 2.35 contains a buffer overflow vulnerability in the license code input field that allows attackers to crash the application. Attackers can generate a 6000-byte payload and paste it into the 'Name' and 'Code' fields to trigger an application crash.
Update NoteBurner Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Leawo Prof
Leawo Prof
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Denver SHC-150 Smart Wifi Camera contains a hardcoded telnet credential vulnerability that allows unauthenticated attackers to access a Linux shell. A...
Denver SHC-150 Smart Wifi Camera contains a hardcoded telnet credential vulnerability that allows unauthenticated attackers to access a Linux shell. Attackers can connect to port 23 using the default credential to execute arbitrary commands on the camera's operating system.
Update Denver Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
ZesleCP 3
ZesleCP 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Telegram Desktop 2
Telegram Desktop 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Remote Mouse 4
Remote Mouse 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SmartFTP Client 10
SmartFTP Client 10
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Active WebCam 11
Active WebCam 11
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Yenkee Hornet Gaming Mouse driver GM312Fltr
Yenkee Hornet Gaming Mouse driver GM312Fltr
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
WebsiteBaker 2
WebsiteBaker 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
TotalAV 5
TotalAV 5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL req...
Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Ether MP3 CD Burner 1.3.8 contains a buffer overflow vulnerability in the registration name field that allows remote code execution. Attackers can cra...
Ether MP3 CD Burner 1.3.8 contains a buffer overflow vulnerability in the registration name field that allows remote code execution. Attackers can craft a malicious payload to overwrite SEH handlers and execute a bind shell on port 3110 by exploiting improper input validation.
Executive Summary:
A critical vulnerability has been identified in multiple Ether products, which allows a remote attacker to gain complete control over an affected system. By submitting a malicious registration name, an attacker can execute arbitrary code, potentially leading to data theft, installation of malware, or a complete system takeover.
Vulnerability Details
CVE-ID: CVE-2021-47785
Affected Software: Ether Multiple Products
Affected Versions: The vulnerability is confirmed in Ether MP3 CD Burner 1.3.8. See vendor advisory for a complete list of affected products and versions.
Vulnerability: This is a stack-based buffer overflow vulnerability. The software fails to properly validate the length of user-supplied data in the registration name field. An attacker can send an overly long string as the registration name, which overwrites the program's stack and, specifically, the Structured Exception Handler (SEH) record. By controlling the SEH, the attacker can redirect the application's execution flow to malicious code (shellcode) embedded within their payload, achieving remote code execution. The described public exploit for this vulnerability results in a bind shell listening on TCP port 3110, giving the attacker direct command-line access to the compromised machine.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high risk of compromise. Successful exploitation gives an attacker full control over the affected system, allowing for the exfiltration of sensitive data, deployment of ransomware, disruption of critical services, and use of the compromised host to launch further attacks against the internal network. The potential for complete system compromise poses a severe threat to data confidentiality, integrity, and availability.
Remediation Plan
Immediate Action: Update Ether Multiple Products to the latest version. System administrators must consult the official vendor security advisory to identify the specific patch or software version that addresses this vulnerability and apply it immediately to all affected systems.
Proactive Monitoring: Security teams should actively monitor for signs of compromise. This includes inspecting network traffic for any unusual activity or connections to TCP port 3110. Application and system logs should be reviewed for crashes related to the Ether software or evidence of malformed registration attempts.
Compensating Controls: If patching cannot be performed immediately, implement compensating controls to reduce risk. Use host-based or network firewalls to block all inbound and outbound traffic on TCP port 3110. Ensure that modern memory protection mechanisms like Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are enabled system-wide, as they can make this type of exploit more difficult to execute successfully.
Exploitation Status
Public Exploit Available: true
Analyst Notes:
As of Jan 16, 2026, a public proof-of-concept exploit is available for this vulnerability. The high severity score and the detailed public information regarding exploitation (SEH overwrite, bind shell on a specific port) increase the likelihood of active attacks. Although this vulnerability is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its critical nature and public exploit code make it an attractive target for threat actors.
Analyst Recommendation
Due to the critical severity (CVSS 9.8) and the existence of a public exploit granting remote code execution, this vulnerability requires immediate attention. All organizations using affected Ether products must prioritize the deployment of vendor-supplied patches to prevent a potential compromise. The absence of this CVE from the CISA KEV list should not diminish the urgency of remediation efforts.
Update Ether Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Cyberfox Web Browser 52
Cyberfox Web Browser 52
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Odine Solutions GateKeeper 1
Odine Solutions GateKeeper 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been identified in WebSSH for iOS 14, affecting multiple products from the vendor "for". This flaw, with a CVSS score of 7.5, could potentially allow an attacker to gain unauthorized access to systems managed through the application, leading to data exposure or further network compromise. Organizations utilizing this software should prioritize the immediate application of security updates to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2021-47827
Affected Software: for Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within the WebSSH application on iOS 14. An attacker could potentially exploit this flaw by crafting a malicious request or input to the application, which is not properly sanitized. This could lead to unauthorized command execution on the target server connected via the SSH session, session hijacking, or the disclosure of sensitive credentials stored within the application. Successful exploitation requires the attacker to have some level of access or the ability to entice a user to connect to a malicious server.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5, posing a significant risk to the organization. Since SSH is commonly used for privileged administrative access to critical servers and network infrastructure, exploitation could have severe consequences. Potential impacts include unauthorized access to sensitive corporate data, deployment of malware or ransomware, lateral movement across the network, and disruption of business-critical services. A compromise of administrative credentials or sessions could lead to a complete system takeover, resulting in significant financial, reputational, and operational damage.
Remediation Plan
Immediate Action: Apply vendor security updates immediately. After patching, it is crucial to monitor for any signs of exploitation attempts that may have occurred prior to remediation by thoroughly reviewing SSH access logs and system audit trails for anomalous activity.
Proactive Monitoring: Security teams should monitor for unusual SSH connection patterns originating from iOS devices, connections from unexpected IP addresses, and abnormal commands executed on managed servers. Implement enhanced logging on jump boxes and critical servers to capture full session details for forensic review if a compromise is suspected.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. These include enforcing the use of a corporate VPN for all SSH access, mandating multi-factor authentication (MFA) on all target SSH servers, and implementing network-level access control lists (ACLs) to restrict SSH connections to trusted IP ranges only. Consider temporarily disabling the application in favor of an alternative, vetted SSH client until patches can be applied.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 18, 2026, there are no known public exploits specifically targeting this vulnerability. However, the technical details could allow a skilled attacker to develop an exploit. It is important to note that the information provided for this CVE (Vendor, Product, Description) does not align with the official public record in the National Vulnerability Database (NVD), which associates CVE-2021-47827 with a different vendor and product. Organizations should first validate the applicability of this vulnerability to their specific software inventory. The CISA KEV status is "No", indicating no known active exploitation.
Analyst Recommendation
Given the high severity score of 7.5, this vulnerability requires immediate attention. We strongly recommend that organizations identify all instances of "WebSSH for iOS 14" within their environment and apply the vendor-supplied patches without delay. Although this vulnerability is not currently listed on the CISA KEV catalog, its potential for enabling unauthorized administrative access makes it a critical threat. The remediation and monitoring steps outlined above should be implemented to protect critical infrastructure from potential compromise.