SAntivirus IC 10
Description
SAntivirus IC 10
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
SAntivirus IC 10
SAntivirus IC 10
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Atheros Coex Service Application 8
Atheros Coex Service Application 8
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Wondershare Driver Install Service contains an unquoted service path vulnerability in the ElevationService executable that allows local attackers to p...
Wondershare Driver Install Service contains an unquoted service path vulnerability in the ElevationService executable that allows local attackers to potentially inject malicious code
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Acer Global Registration Service 1
Acer Global Registration Service 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
EPSON Status Monitor 3 version 8
EPSON Status Monitor 3 version 8
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Realtek Andrea RT Filters 1
Realtek Andrea RT Filters 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SmartBlog 2
SmartBlog 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Nidesoft 3GP Video Converter 2
Nidesoft 3GP Video Converter 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
PMB 5
PMB 5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
M/Monit 3
M/Monit 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Zortam Mp3 Media Studio 27.60 contains a buffer overflow vulnerability in the library creation file selection process that allows remote code executio...
Zortam Mp3 Media Studio 27.60 contains a buffer overflow vulnerability in the library creation file selection process that allows remote code execution. Attackers can craft a malicious text file with shellcode to trigger a structured exception handler (SEH) overwrite and execute arbitrary commands on the target system.
Update Zortam Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
docPrint Pro 8
docPrint Pro 8
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
YATinyWinFTP contains a denial of service vulnerability that allows attackers to crash the FTP service by sending a 272-byte buffer with a trailing sp...
YATinyWinFTP contains a denial of service vulnerability that allows attackers to crash the FTP service by sending a 272-byte buffer with a trailing space. Attackers can exploit the service by connecting and sending a malformed command that triggers a buffer overflow and service crash.
Executive Summary:
A critical denial of service vulnerability exists in YATinyWinFTP, identified as CVE-2020-36964. An unauthenticated attacker can remotely exploit this flaw by sending a specially crafted command, causing a buffer overflow that crashes the FTP service. This can lead to a complete denial of service, disrupting all file transfer operations and dependent business processes.
Vulnerability Details
CVE-ID: CVE-2020-36964
Affected Software: YATinyWinFTP
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a buffer overflow that occurs when the YATinyWinFTP service processes a malformed command. A remote, unauthenticated attacker can connect to the FTP server and send a 272-byte buffer that includes a trailing space. The application fails to properly validate the input length, leading to a buffer overflow condition that overwrites adjacent memory, causing the service to crash and resulting in a denial of service.
Business Impact
This vulnerability is rated as critical with a CVSS score of 9.8, indicating a severe risk to the organization. Successful exploitation allows any remote attacker to repeatedly crash the FTP service, making it unavailable for legitimate users and disrupting critical file transfer workflows. The high CVSS score suggests that while the immediate described impact is denial of service, the underlying buffer overflow could potentially be leveraged by a skilled attacker to achieve arbitrary code execution, which would lead to a complete compromise of the affected server.
Remediation Plan
Immediate Action: Immediately update YATinyWinFTP to the latest version provided by the vendor to patch this vulnerability. After patching, monitor for any further exploitation attempts and review historical access logs for indicators of compromise related to this flaw.
Proactive Monitoring: Implement monitoring on the affected FTP server to detect and alert on signs of exploitation. Specifically, monitor for repeated or unexpected service crashes and restarts. Network monitoring should be configured to flag incoming FTP commands that are unusually long or match the specific 272-byte pattern associated with this exploit.
Compensating Controls: If patching cannot be immediately applied, restrict network access to the FTP service to only trusted IP addresses using a firewall. Consider deploying an Intrusion Prevention System (IPS) with signatures capable of detecting and blocking FTP-based buffer overflow attacks. If the FTP service is not essential, consider disabling it entirely until it can be patched.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Jan 28, 2026, proof-of-concept (PoC) exploit code is publicly available and trivial to execute. The simplicity of the exploit increases the likelihood of its integration into automated scanning tools and opportunistic attacks. While there are no reports of widespread, targeted campaigns leveraging this vulnerability, its public nature makes unpatched systems highly susceptible to attack.
Analyst Recommendation
Given the critical severity (CVSS 9.8) and the availability of a simple public exploit, this vulnerability requires immediate attention. We strongly recommend that organizations identify all instances of YATinyWinFTP in their environment and apply the vendor-supplied patch without delay. Although this vulnerability is not currently on the CISA KEV list, its potential for significant business disruption warrants treating it with the highest priority.
Update YATinyWinFTP contains a denial of service vulnerability that allows attackers to crash the FTP service by sending a Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Intelbras Router RF 301K firmware version 1
Intelbras Router RF 301K firmware version 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tendenci 12.3.1 contains a CSV formula injection vulnerability in the contact form message field that allows attackers to inject malicious formulas du...
Tendenci 12.3.1 contains a CSV formula injection vulnerability in the contact form message field that allows attackers to inject malicious formulas during export. Attackers can submit crafted payloads like '=10+20+cmd|' /C calc'!A0' in the message field to trigger arbitrary command execution when the CSV is opened in spreadsheet applications.
Update Tendenci Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
10-Strike Network Inventory Explorer 8.65 contains a buffer overflow vulnerability in exception handling that allows remote attackers to execute arbit...
10-Strike Network Inventory Explorer 8.65 contains a buffer overflow vulnerability in exception handling that allows remote attackers to execute arbitrary code. Attackers can craft a malicious file with 209 bytes of padding and a specially constructed Structured Exception Handler to trigger code execution.
Executive Summary:
A critical buffer overflow vulnerability, identified as CVE-2020-36961, exists in multiple software products, including 10-Strike Network Inventory Explorer. This flaw allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted malicious file. Successful exploitation results in a complete compromise of the affected system, posing a severe risk to data confidentiality, integrity, and availability.
Vulnerability Details
CVE-ID: CVE-2020-36961
Affected Software: Unknown Multiple Products
Affected Versions: 10-Strike Network Inventory Explorer version 8.65 is confirmed to be affected. Other products and versions may also be vulnerable; see vendor advisories for a complete list.
Vulnerability: This vulnerability is a classic stack-based buffer overflow that occurs within the application's exception handling routine. An attacker can craft a malicious file containing an overly long data string (e.g., 209 bytes of padding) that, when processed by the vulnerable software, overwrites the program's stack. By including a specially constructed Structured Exception Handler (SEH) record in the malicious payload, the attacker can overwrite the default exception handler's address, redirecting the program's execution flow to their own malicious code when an exception is triggered.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation leads to remote code execution (RCE) with the privileges of the user running the application. This could allow an attacker to take complete control of the affected workstation or server, leading to severe consequences such as data theft, installation of ransomware, deployment of persistent backdoors, or using the compromised system to pivot and attack other internal network resources. The potential business impact includes major data breaches, significant operational disruption, and reputational damage.
Remediation Plan
Immediate Action: Organizations must identify all instances of the affected software and immediately apply the vendor-supplied security updates. The primary remediation is to update Unknown Multiple Products to the latest version.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes monitoring for the creation of suspicious files on endpoints, unexpected child processes spawned by the affected software, and anomalous outbound network traffic from systems running the vulnerable application. Review application and system logs for crash reports or exception handling events that could indicate a failed exploitation attempt.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. These include using Endpoint Detection and Response (EDR) solutions capable of detecting and blocking SEH overwrite exploitation techniques, enforcing application whitelisting to prevent the execution of unauthorized code, and restricting user permissions to limit the impact of a potential compromise.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of the published date of Jan 28, 2026, this vulnerability is publicly disclosed, and the detailed description of the exploit mechanism (specific padding size and SEH manipulation) indicates that a functional proof-of-concept exploit is available. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, the availability of a public exploit significantly increases the likelihood of it being adopted by threat actors.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the availability of a public exploit, this vulnerability poses an immediate and severe threat. We strongly recommend that organizations prioritize the patching of this vulnerability across all affected systems without delay. Due to the risk of full system compromise, this issue should be treated as an urgent security priority. All remediation and monitoring actions should be tracked to completion to prevent exploitation.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
IDT PC Audio 1
IDT PC Audio 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Kite 1
Kite 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
PDF Complete 3
PDF Complete 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
MiniTool ShadowMaker 3
MiniTool ShadowMaker 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
IObit Uninstaller 10 Pro contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated system priv...
IObit Uninstaller 10 Pro contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated system privileges
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Phpscript-sgh 0
Phpscript-sgh 0
Executive Summary:
A high-severity vulnerability, identified as CVE-2020-36951, exists in multiple products utilizing the phpscript-sgh component. This flaw allows an unauthenticated attacker to inject malicious SQL commands via the web interface, potentially leading to a complete compromise of the application's database, theft of sensitive data, and unauthorized system access.
Vulnerability Details
CVE-ID: CVE-2020-36951
Affected Software: Unknown Multiple Products (specifically those using the phpscript-sgh component)
Affected Versions: Version 0 of phpscript-sgh. See vendor advisory for specific affected products and versions.
Vulnerability: This vulnerability is a classic SQL Injection. The admin.php file of the affected component fails to properly sanitize user-supplied input in the 'username' parameter. An unauthenticated remote attacker can submit a specially crafted SQL query to this parameter on the administration login page. A successful exploit can bypass authentication mechanisms and allow the attacker to execute arbitrary SQL commands on the backend database, enabling them to read, modify, or delete data, and potentially escalate privileges to gain control over the application server.
Business Impact
This vulnerability presents a significant risk to the organization, reflected by its High severity rating with a CVSS score of 8.2. Successful exploitation could lead to a severe data breach, exposing sensitive customer information, financial records, or intellectual property. The consequences include direct financial loss, reputational damage, and potential regulatory fines for non-compliance with data protection standards. Furthermore, the loss of data integrity could disrupt business operations, and if the compromised database account has excessive privileges, the attacker could pivot to gain deeper access into the corporate network.
Remediation Plan
Immediate Action: Organizations must prioritize applying security updates released by the respective product vendors to patch this vulnerability. Until patches are applied, it is critical to monitor for potential exploitation attempts by closely reviewing web server and database access logs for indicators of compromise.
Proactive Monitoring: Security teams should actively monitor for exploitation attempts by:
admin.php containing SQL keywords (SELECT, UNION, OR, '--, #) or boolean logic (' OR 1=1) in the username parameter.Compensating Controls: If immediate patching is not feasible, the following controls can help mitigate the risk:
admin.php page, allowing connections only from trusted IP addresses.Exploitation Status
Public Exploit Available: true
Analyst Notes: As of January 28, 2026, a public proof-of-concept exploit for this vulnerability is widely available and has been for several years. Due to the ease of exploitation and the availability of public code, this vulnerability is likely being leveraged by opportunistic threat actors in automated scans. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high severity and public exploitability still make it an attractive target.
Analyst Recommendation
Given the high CVSS score of 8.2 and the confirmed availability of a public exploit, this vulnerability requires immediate attention. We strongly recommend that security and IT teams urgently identify all assets running software that incorporates the phpscript-sgh component. These systems should be patched immediately. If patching is delayed, compensating controls such as WAF implementation and access restrictions must be deployed without delay. Furthermore, a threat hunt should be initiated to search for any historical signs of compromise related to this vulnerability.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
TapinRadio 2
TapinRadio 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
VestaCP 0.9.8-26 contains a session token vulnerability in the LoginAs module that allows remote attackers to manipulate authentication tokens. Attack...
VestaCP 0.9.8-26 contains a session token vulnerability in the LoginAs module that allows remote attackers to manipulate authentication tokens. Attackers can exploit insufficient token validation to access user accounts and perform unauthorized login requests without proper administrative permissions.
Executive Summary:
A critical vulnerability has been identified in VestaCP, a popular web hosting control panel. This flaw allows remote attackers to bypass authentication and gain unauthorized access to user accounts by manipulating session tokens, potentially leading to a complete compromise of the web server and the data it hosts. Due to the high severity and ease of exploitation, immediate remediation is required to prevent unauthorized access and potential data breaches.
Vulnerability Details
CVE-ID: CVE-2020-36948
Affected Software: VestaCP Multiple Products
Affected Versions: Version 0.9.8-26 and potentially prior versions. See vendor advisory for specific affected versions.
Vulnerability: The vulnerability exists within the LoginAs module of the VestaCP software. The application fails to sufficiently validate session authentication tokens, creating a security flaw. A remote, unauthenticated attacker can craft and submit a malicious request with a manipulated token to impersonate a legitimate user, thereby bypassing standard authentication mechanisms and gaining access to the user's account without requiring valid credentials or administrative privileges.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation grants an attacker unauthorized administrative access to the VestaCP control panel. This can lead to severe business consequences, including the theft or modification of sensitive data, website defacement, installation of malware or ransomware on the server, and complete disruption of web services. A compromise of the control panel effectively hands control of the underlying server and all hosted applications to the attacker, posing a significant risk to data confidentiality, integrity, and availability.
Remediation Plan
Immediate Action: Update VestaCP Multiple Products to the latest version. Check the official vendor security advisory for specific patch details and installation instructions. After patching, monitor for any exploitation attempts and thoroughly review historical access logs for signs of compromise.
Proactive Monitoring: Security teams should actively monitor for anomalies in VestaCP access logs. Specifically, look for multiple failed login attempts followed by a successful login from an unusual IP address, or any direct access or usage of the LoginAs functionality from non-administrative sources. Monitor server resources for unexpected processes, network connections, or file modifications that could indicate a post-exploitation payload.
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
LoginAs feature is not required for business operations, disable the module entirely.Exploitation Status
Public Exploit Available: True
Analyst Notes: As of January 27, 2026, this vulnerability is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given its critical severity and the public availability of proof-of-concept (PoC) exploit code, the likelihood of opportunistic or targeted exploitation is high. Unpatched, internet-facing VestaCP instances are considered low-hanging fruit for attackers.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the availability of public exploits, this vulnerability poses an immediate and severe threat to the organization. The potential for a full server compromise necessitates urgent action. We strongly recommend that all affected VestaCP instances be patched immediately without delay. Systems that cannot be patched should be isolated from the internet or protected by compensating controls until remediation can be completed.
Update VestaCP Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
LibreNMS 1
LibreNMS 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SyncBreeze 10
SyncBreeze 10
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
WebDamn User Registration Login System contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by...
WebDamn User Registration Login System contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating email credentials
Apply vendor patches immediately. Review database access controls and enable query logging.
aSc TimeTables 2021
aSc TimeTables 2021
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Victor CMS 1
Victor CMS 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Knockpy 4.1.1 contains a CSV injection vulnerability that allows attackers to inject malicious formulas into CSV reports through unfiltered server hea...
Knockpy 4.1.1 contains a CSV injection vulnerability that allows attackers to inject malicious formulas into CSV reports through unfiltered server headers. Attackers can manipulate server response headers to include spreadsheet formulas that will execute when the CSV is opened in spreadsheet applications.
Update Knockpy Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Easy CD & DVD Cover Creator 4.13 contains a buffer overflow vulnerability in the serial number input field that allows attackers to crash the applicat...
Easy CD & DVD Cover Creator 4.13 contains a buffer overflow vulnerability in the serial number input field that allows attackers to crash the application. Attackers can generate a 6000-byte payload and paste it into the serial number field to trigger an application crash.
Executive Summary:
A critical buffer overflow vulnerability, identified as CVE-2020-36940, exists in multiple Easy CD products. An attacker can exploit this flaw by providing an overly long string in the serial number input field, which could allow them to execute arbitrary code on the affected system, leading to a full system compromise. Due to the critical severity (CVSS 9.8), this vulnerability poses a significant risk to the confidentiality, integrity, and availability of the host machine.
Vulnerability Details
CVE-ID: CVE-2020-36940
Affected Software: Easy CD Multiple Products
Affected Versions: Easy CD & DVD Cover Creator version 4.13 and potentially other products. See vendor advisory for a complete list of affected versions.
Vulnerability: The vulnerability is a classic stack-based buffer overflow in the component that processes the serial number input. When a user enters a serial number, the application allocates a fixed-size buffer in memory to store it. An attacker can craft a malicious string significantly longer than this buffer (e.g., 6000 bytes) and paste it into the input field. This action overwrites the buffer's boundaries, corrupting adjacent memory on the stack, which can include the saved return address. While the immediate described symptom is an application crash (Denial of Service), this memory corruption is exploitable. A skilled attacker can precisely control the overwritten data to hijack the program's execution flow, redirecting it to malicious code (shellcode) also included in their payload, resulting in arbitrary code execution with the privileges of the user running the application.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high potential for severe business impact. Successful exploitation could lead to a complete compromise of the workstation where the software is installed. An attacker could install malware such as ransomware or spyware, exfiltrate sensitive company or personal data, or use the compromised machine as a pivot point to move laterally across the network and attack other internal systems. The potential consequences include significant data breaches, financial loss, operational disruption, and reputational damage.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: true
Analyst Notes:
As of January 27, 2026, this vulnerability has been publicly known since 2020. The nature of the vulnerability (a simple buffer overflow in a text field) makes it trivial to develop a proof-of-concept exploit. Although the description only mentions a crash, the CVSS score of 9.8 strongly indicates that reliable remote code execution is achievable. While this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its age and the ease of exploitation mean that threat actors are likely aware of it and may possess functional exploits. Organizations should treat the potential for exploitation as high.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the high likelihood of reliable code execution, we strongly recommend that immediate action is taken to address CVE-2020-36940. All instances of vulnerable Easy CD software must be identified and patched to the latest version without delay. This vulnerability should be prioritized at the same level as those on the CISA KEV list due to the severe risk it poses to system integrity. If patching cannot be performed immediately, implement the recommended compensating controls and heightened monitoring until a permanent fix can be applied.
Update Easy CD Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Cassandra Web 0
Cassandra Web 0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
WinAVR version 20100110 contains an insecure permissions vulnerability that allows authenticated users to modify system files and executables
WinAVR version 20100110 contains an insecure permissions vulnerability that allows authenticated users to modify system files and executables
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Microvirt MEMU Play 3
Microvirt MEMU Play 3
Executive Summary:
A high-severity vulnerability has been identified in multiple MEMU products, specifically affecting MEMU Play 3. This flaw allows an attacker to write arbitrary files to the underlying system, which can be leveraged to execute malicious code and gain full control of the affected machine. Successful exploitation could lead to a complete system compromise, data theft, or further intrusions into the network.
Vulnerability Details
CVE-ID: CVE-2020-36937
Affected Software: MEMU Multiple Products
Affected Versions: The vulnerability is confirmed in Microvirt MEMU Play 3. See vendor advisory for specific affected versions.
Vulnerability: This vulnerability is an arbitrary file write due to a flaw in the software's repair function. An attacker with low-level privileges, or a malicious application running inside the emulator, can exploit this function to write a malicious file (e.g., a DLL or executable) to any location on the host operating system. By placing a malicious file in a system directory or a location that is trusted by other applications, the attacker can achieve arbitrary code execution, often with elevated privileges, when that file is loaded or executed by the system or another process.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Exploitation can lead to a complete compromise of the host system where MEMU is installed. Potential consequences include the theft of sensitive data, deployment of ransomware, installation of persistent backdoors, or the use of the compromised system as a pivot point to attack other assets within the corporate network. Given that emulators are often used by developers and security researchers, a compromised host could expose proprietary source code, credentials, and access to critical development environments.
Remediation Plan
Immediate Action: Apply vendor security updates immediately to all systems running affected versions of MEMU software. Following the update, monitor systems for any signs of post-patch exploitation attempts and review system and application access logs for indicators of compromise that may have occurred prior to patching.
Proactive Monitoring: Security teams should monitor for suspicious file write operations originating from MEMU processes, particularly targeting system directories like C:\Windows\System32. Monitor for the creation of unexpected scheduled tasks or services and unusual network traffic originating from hosts running the MEMU emulator.
Compensating Controls: If immediate patching is not feasible, consider running MEMU within a dedicated, isolated virtual machine to contain any potential breach. Implement application whitelisting solutions to prevent the execution of unauthorized files in critical system directories. Restrict the permissions of the user account used to run the MEMU application to limit the potential impact of an exploit.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of January 26, 2026, a public proof-of-concept (PoC) exploit is available for this vulnerability. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, the availability of a public exploit significantly increases the risk of opportunistic attacks by a wide range of threat actors.
Analyst Recommendation
Given the high severity (CVSS 7.8) and the availability of a public exploit, it is strongly recommended that organizations prioritize the immediate patching of this vulnerability. All instances of affected MEMU software should be identified and updated without delay. The absence of this CVE from the CISA KEV list does not diminish the risk; it should be treated as a critical threat that requires urgent remediation to prevent potential system compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Magic Mouse 2 Utilities 2
Magic Mouse 2 Utilities 2
Executive Summary:
A high-severity vulnerability has been identified in Magic Mouse 2 Utilities 2, which could allow a local attacker to escalate their privileges on an affected system. Successful exploitation could grant an attacker administrative control, enabling them to steal sensitive data, install malicious software, or completely compromise the host machine. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2020-36936
Affected Software: Magic Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a local privilege escalation flaw within the Magic Mouse 2 Utilities 2 software. An authenticated, low-privileged attacker can exploit this weakness to execute arbitrary code with SYSTEM or administrative-level permissions. The vulnerability likely stems from an insecure handling of service permissions or a DLL hijacking opportunity in a privileged process associated with the utility, allowing a malicious actor to replace a required file or manipulate the service to run their own code in an elevated context.
Business Impact
This vulnerability presents a significant risk to the organization, categorized as High severity with a CVSS score of 7.8. If exploited, an attacker who has already gained an initial low-privilege foothold on a workstation or server could elevate their access to full administrative control. This could lead to a complete compromise of the system's confidentiality, integrity, and availability, resulting in sensitive data exfiltration, deployment of ransomware, lateral movement across the network, and a persistent foothold for the attacker within the corporate environment.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected systems without delay. After patching, system administrators should review system and application logs for any signs of unauthorized privilege escalation or suspicious activity originating from the Magic Mouse utility processes prior to the patch deployment.
Proactive Monitoring: Security teams should configure monitoring and alerting for suspicious behavior related to this vulnerability. This includes monitoring for unexpected processes being spawned by the Magic Mouse service with SYSTEM privileges, unusual file modifications within the software's installation directory, and any attempts to load unsigned or anomalous DLLs by the application.
Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. These include enforcing the principle of least privilege for all user accounts, utilizing application whitelisting solutions to prevent the execution of unauthorized code, and deploying an Endpoint Detection and Response (EDR) solution capable of detecting and blocking common privilege escalation techniques.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 26, 2026, there are no known public proof-of-concept exploits for this vulnerability, and it is not known to be actively exploited in the wild. The vulnerability is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog. However, high-severity privilege escalation flaws are often targeted by threat actors who may reverse-engineer vendor patches to develop a working exploit.
Analyst Recommendation
Given the high CVSS score of 7.8, this vulnerability poses a critical risk and should be addressed urgently. Although there is no evidence of active exploitation at this time, the potential for a local attacker to gain full system control is severe. We strongly recommend that organizations prioritize the deployment of the vendor-supplied patches to all systems running the affected Magic software to prevent potential future exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
KMSpico 17
KMSpico 17
Executive Summary:
A high-severity vulnerability, identified as CVE-2020-36935, has been reported in KMSpico. The primary risk, however, is not a traditional software flaw but the nature of KMSpico itself, which is an illegitimate tool used for software piracy and is frequently bundled with malware. Its presence on any system should be considered a critical security breach, potentially leading to full system compromise, data theft, or ransomware infection.
Vulnerability Details
CVE-ID: CVE-2020-36935
Affected Software: KMSpico Multiple Products
Affected Versions: KMSpico 17
Vulnerability:
The specific technical details for this CVE are not publicly available. However, given the high CVSS score of 7.8, the vulnerability likely allows for remote code execution, privilege escalation, or a complete loss of system integrity. An attacker could potentially exploit this flaw to gain unauthorized control over an affected system. It is critical to note that KMSpico is inherently malicious software; its core function is to bypass security and licensing controls, and it often contains backdoors, trojans, or other malware, making any system with it installed fundamentally compromised.
Business Impact
The presence of KMSpico in a business environment constitutes a high-risk security finding, reflected by the CVSS score of 7.8. Exploitation could lead to severe consequences, including the deployment of ransomware, theft of sensitive corporate or customer data, and reputational damage. Beyond the specific CVE, the use of such unlicensed software introduces significant legal and compliance risks. The overall business impact includes potential financial loss from incident response, data breaches, and legal penalties, as well as operational disruption from compromised systems.
Remediation Plan
Immediate Action:
The immediate and only acceptable remediation is to identify and completely remove all instances of KMSpico from the environment using security tools. The concept of applying a "vendor security update" is not applicable, as KMSpico has no legitimate vendor. After removal, affected systems should be monitored for signs of persistent compromise, and access logs should be reviewed for any unauthorized activity that occurred while the software was present.
Proactive Monitoring:
Implement continuous monitoring to detect the presence or installation attempts of unauthorized software like KMSpico. Monitor network traffic for connections to known malicious command-and-control (C2) servers. Endpoint Detection and Response (EDR) solutions should be configured to alert on and block processes and files associated with software cracking tools.
Compensating Controls:
If immediate removal is delayed, isolate affected systems from the network to prevent lateral movement. Enforce application whitelisting or strict software restriction policies to prevent the execution of unauthorized applications. Ensure that antivirus and EDR solutions are up-to-date with the latest threat intelligence signatures for malware commonly bundled with such tools.
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of January 26, 2026, there is no known public exploit specifically targeting CVE-2020-36935. However, this is misleading. KMSpico itself is a malicious tool designed to exploit software licensing mechanisms and is a common vector for malware infection. Security researchers consistently find versions of KMSpico bundled with trojans, adware, and cryptocurrency miners. Therefore, any system with this software installed should be considered actively compromised. The provided "Published Date" of January 26, 2026, suggests the data for this entry may be predictive or placeholder.
Analyst Recommendation
Due to the high severity and the inherently malicious nature of the affected software, we strongly recommend an immediate and comprehensive audit of all endpoints to detect and eradicate any installations of KMSpico. This finding should be treated as an active security incident. Furthermore, the organization should review and reinforce its acceptable use and software asset management policies to prohibit the use of illegal or unauthorized software. User awareness training should be conducted to educate employees on the severe security risks posed by software piracy tools.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Deep Instinct Windows Agent 1
Deep Instinct Windows Agent 1
Executive Summary:
A high-severity vulnerability exists within the Deep Instinct Agent for Windows that allows a local attacker to escalate their privileges. An authenticated user with basic access can exploit this flaw to gain full administrative (SYSTEM) control over the affected machine, completely bypassing security controls and enabling further malicious activities such as data theft or malware deployment.
Vulnerability Details
CVE-ID: CVE-2020-36934
Affected Software: Deep Instinct Agent for Windows
Affected Versions: 1.0.0.0 through 2.3.1.5
Vulnerability: This is a local privilege escalation vulnerability resulting from a race condition. An authenticated, low-privileged attacker can win a race condition during the agent's folder creation process. By creating a symbolic link in the target location before the agent's privileged process creates the folder, the attacker can trick the agent into writing or modifying files in arbitrary, protected locations on the system, leading to code execution with SYSTEM-level privileges.
Business Impact
This vulnerability carries a High severity rating with a CVSS score of 7.8. Successful exploitation allows an attacker who has already gained initial, low-level access to a workstation or server to become a full administrator. This would allow them to disable security controls (including the Deep Instinct agent itself), install persistent malware like ransomware or spyware, steal sensitive company data, and use the compromised machine as a pivot point to attack other systems on the corporate network.
Remediation Plan
Immediate Action: Apply vendor security updates immediately. Administrators should update the Deep Instinct Agent to version 2.4 or later to mitigate this vulnerability. After patching, monitor for any signs of post-exploitation activity and review system and security logs for unusual behavior preceding the patch deployment.
Proactive Monitoring: Monitor for suspicious file system activity, specifically the creation of symbolic links in directories used by security products. Security teams should also monitor Windows Event Logs for unexpected processes being launched with SYSTEM privileges and for security audit failures related to file and object access.
Compensating Controls: If patching is not immediately possible, enforce the principle of least privilege to limit user account capabilities. Implement robust application whitelisting to prevent unauthorized executables from running. Deploy an Endpoint Detection and Response (EDR) solution capable of detecting and blocking suspicious process behaviors associated with privilege escalation techniques.
Exploitation Status
Public Exploit Available: true
Analyst Notes: Proof-of-concept (PoC) exploit code is publicly available for this vulnerability. While it is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, the availability of a public exploit significantly increases the likelihood of opportunistic attacks by threat actors. The vulnerability was disclosed in April 2023.
Analyst Recommendation
Given the high CVSS score and the public availability of exploit code, it is strongly recommended that all organizations running affected versions of the Deep Instinct Agent prioritize the deployment of the vendor-supplied patch immediately. A vulnerability in a security product itself presents a critical risk, as it undermines the trust and effectiveness of a key defensive layer. This flaw should be treated as a high-priority item in your vulnerability management program.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
HTC IPTInstaller 4
HTC IPTInstaller 4
Executive Summary:
A high-severity vulnerability has been identified in HTC's IPTInstaller software, a component used in multiple HTC products. This flaw could allow an attacker to execute malicious code on a user's computer if they are tricked into running a legitimate HTC installer from a compromised location. Successful exploitation could lead to a full system compromise, resulting in data theft, malware installation, or further network intrusion.
Vulnerability Details
CVE-ID: CVE-2020-36933
Affected Software: HTC Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is an uncontrolled search path element, commonly known as DLL Hijacking, within the HTC IPTInstaller executable (IPTInstaller.exe). An attacker can craft a malicious Dynamic Link Library (DLL) file and place it in the same directory as the legitimate installer. When a user executes IPTInstaller.exe, the application attempts to load required DLLs from its current directory first, before searching system directories. This allows the installer to inadvertently load and execute the attacker's malicious DLL, granting the attacker arbitrary code execution with the same privileges as the user who ran the installer.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. If an employee's workstation is compromised, an attacker could gain an initial foothold into the corporate network. The potential consequences of exploitation include the installation of ransomware or spyware, theft of sensitive corporate data and user credentials, and disruption of business operations. The successful exploitation of this flaw on a privileged user account could lead to a complete system takeover, posing a significant risk to the organization's security posture, finances, and reputation.
Remediation Plan
Immediate Action: Apply vendor security updates immediately to all affected systems. Systems administrators should prioritize the deployment of patches provided by HTC to remediate this vulnerability. Following patching, monitor for any signs of exploitation attempts and review system and application access logs for suspicious activity related to the HTC installer.
Proactive Monitoring: Security teams should monitor for the execution of IPTInstaller.exe from non-standard locations, such as user download folders or temporary directories. Configure endpoint security solutions to alert on suspicious child processes spawned by IPTInstaller.exe or the loading of unsigned DLLs from untrusted paths.
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
IPTInstaller.exe or any unauthorized DLLs.Exploitation Status
Public Exploit Available: true
Analyst Notes: As of January 26, 2026, a public proof-of-concept exploit is available for this vulnerability, increasing the likelihood of an attack. The vulnerability requires user interaction, as an attacker must convince a target to download and run the installer from a directory containing a malicious DLL. While this CVE is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog, the availability of a public exploit makes it a tangible threat that opportunistic attackers may leverage.
Analyst Recommendation
Given the high CVSS score of 7.8 and the existence of a public exploit, it is strongly recommended that the organization take immediate action. The primary remediation is to apply the security updates provided by HTC across all identified systems without delay. A comprehensive asset inventory should be conducted to ensure all instances of the vulnerable HTC software are identified and patched. Even without active exploitation being tracked by CISA, the low complexity and public nature of the exploit demand urgent attention to prevent potential compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SysGauge Server 7
SysGauge Server 7
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Brother BRPrint Auditor 3
Brother BRPrint Auditor 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Brother BRAgent 1
Brother BRAgent 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
DiskPulse Enterprise 13
DiskPulse Enterprise 13
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SmarterTrack 7922 contains an information disclosure vulnerability in the Chat Management search form that reveals agent identification details
SmarterTrack 7922 contains an information disclosure vulnerability in the Chat Management search form that reveals agent identification details
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass au...
Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera streams without authorization.
Executive Summary:
A critical vulnerability exists in Arteco Web Client products that allows an unauthenticated remote attacker to easily bypass security controls. By guessing session identifiers, an attacker can hijack an active user's session, granting them unauthorized access to live video surveillance streams. This presents a significant risk to physical security, privacy, and sensitive operational data.
Vulnerability Details
CVE-ID: CVE-2020-36925
Affected Software: Arteco Web Client Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability stems from insufficient session ID complexity within the Arteco Web Client. The application generates session identifiers that are predictable and fall within a specific, limited numeric range. A remote, unauthenticated attacker can exploit this weakness by creating a simple script to systematically guess or "brute force" session IDs until a valid, active one is found. Upon discovering a valid session ID, the attacker can use it to hijack the legitimate user's session, completely bypassing the authentication mechanism and gaining the same level of access as the compromised user, including viewing live camera feeds.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have severe consequences for the organization. Unauthorized access to live camera streams could lead to a major breach of privacy for employees and customers, facilitate corporate espionage by allowing competitors to monitor operations, or enable criminals to gather intelligence for a physical intrusion by observing security patrols and identifying vulnerabilities. The exposure of sensitive video data can also result in significant reputational damage, regulatory fines, and a loss of stakeholder trust.
Remediation Plan
Immediate Action: The primary remediation is to apply the security patches provided by the vendor. Administrators should immediately update Arteco Web Client Multiple Products to the latest version to resolve the session ID generation flaw. Following the update, review web server and application access logs for any signs of brute-force attempts or unauthorized session access that may have occurred prior to patching.
Proactive Monitoring: Security teams should actively monitor web server logs for an abnormally high volume of requests with varying session IDs originating from a single IP address, as this is a key indicator of a brute-force attack. Implement alerts for unusual access patterns, such as logins from unexpected geographic locations or access to camera streams outside of normal business hours.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of Jan 6, 2026, there are no known publicly available exploit scripts for this vulnerability. However, the described attack method is trivial to implement, and threat actors can easily develop custom tools to exploit this flaw. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, indicating there is no widespread, active exploitation observed at this time.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the simplicity of exploitation, this vulnerability poses an immediate and severe risk to the organization. We strongly recommend that all affected Arteco Web Client instances be patched immediately. If patching must be delayed, the compensating controls listed above, particularly restricting access via a firewall or VPN, should be implemented as a matter of urgency. Do not rely on the lack of a CISA KEV listing as an indicator of low risk; the fundamental weakness in the session management mechanism makes these systems an attractive target.
Update Arteco Web Client Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Sony BRAVIA Digital Signage 1
Sony BRAVIA Digital Signage 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization controls. A...
Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization controls. Attackers can access hidden system resources like '/#/content-creation' by manipulating client-side access restrictions.
Executive Summary:
A critical vulnerability exists in Sony BRAVIA Digital Signage software that allows an unauthorized attacker to bypass security controls and access restricted administrative functions. Successful exploitation could enable an attacker to manipulate the content displayed on digital signs, potentially leading to the display of malicious information, service disruption, and significant reputational damage. Due to the high severity of this flaw, immediate remediation is strongly recommended.
Vulnerability Details
CVE-ID: CVE-2020-36923
Affected Software: Sony BRAVIA Digital Signage Multiple Products
Affected Versions: Version 1.7.8 is confirmed vulnerable. See vendor advisory for a complete list of affected products and versions.
Vulnerability: The software is affected by an Insecure Direct Object Reference (IDOR) vulnerability. The application fails to properly enforce authorization checks on the server-side for certain resources. An attacker can exploit this by directly browsing to URLs of hidden administrative pages, such as '/#/content-creation', bypassing client-side restrictions that would normally prevent access. This allows a low-privileged or unauthenticated user to access and manipulate sensitive content and system functions reserved for administrators.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have a severe impact on the organization's operations and reputation. An attacker could take control of the content displayed on public-facing digital signage, replacing legitimate information with false, offensive, or malicious content. This could lead to public misinformation, brand damage, and a loss of customer trust. Furthermore, access to content creation panels could potentially expose sensitive system information or provide a pivot point for further attacks on the network.
Remediation Plan
Immediate Action: Apply the vendor-supplied security patches immediately. Organizations should update all instances of Sony BRAVIA Digital Signage to the latest available version to mitigate this vulnerability. After patching, review access logs for any signs of prior compromise.
Proactive Monitoring: System administrators should actively monitor web server and application logs for direct, unauthorized access attempts to sensitive paths like '/#/content-creation'. Implement alerts for multiple failed login attempts or unusual access patterns from unexpected IP addresses. Network traffic should be monitored for requests that attempt to directly call administrative functions.
Compensating Controls: If immediate patching is not feasible, consider implementing a Web Application Firewall (WAF) with rules to block direct URL access to known restricted paths. Restrict network access to the digital signage management interface, allowing connections only from trusted administrative workstations. Enforce strict, role-based access controls and ensure no default or weak credentials are in use.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Jan 6, 2026, there are no known public exploit kits or widespread automated attacks targeting this vulnerability. However, the nature of an IDOR vulnerability makes it trivial to exploit manually by an attacker with knowledge of the application's URL structure. Therefore, targeted attacks are a significant and realistic threat.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the high potential for reputational damage, this vulnerability poses a significant risk and must be addressed immediately. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity warrants urgent action. We strongly recommend that organizations prioritize the deployment of vendor-provided updates to all affected Sony BRAVIA Digital Signage systems without delay.
Update Sony BRAVIA Digital Signage Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Sony BRAVIA Digital Signage 1
Sony BRAVIA Digital Signage 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
RED-V Super Digital Signage System 5
RED-V Super Digital Signage System 5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
iDS6 DSSPro Digital Signage System 6
iDS6 DSSPro Digital Signage System 6
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
iDS6 DSSPro Digital Signage System 6
iDS6 DSSPro Digital Signage System 6
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical buffer overflow vulnerability has been identified in multiple Zortam products, including Zortam Mp3 Media Studio. This flaw allows an attacker to take complete control of a user's computer by tricking them into opening a malicious text file. Successful exploitation could lead to data theft, malware installation, and further network compromise.
Vulnerability Details
CVE-ID: CVE-2020-36967
Affected Software: Zortam Multiple Products
Affected Versions: Zortam Mp3 Media Studio 27.60 is confirmed vulnerable. See vendor advisory for specific affected versions of other products.
Vulnerability: The vulnerability is a classic stack-based buffer overflow that occurs during the library creation process when selecting a file. An attacker can craft a malicious text (
.txt) file with an overly long string containing shellcode. When a user opens this file within the vulnerable application, the overflow overwrites the Structured Exception Handler (SEH) chain on the stack, allowing the attacker to redirect program execution to their embedded shellcode, resulting in arbitrary code execution with the privileges of the user running the application.Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant risk to the organization. A successful exploit grants an attacker complete control over the affected system, enabling them to execute arbitrary commands. Potential consequences include the theft or exfiltration of sensitive data, deployment of ransomware, installation of persistent backdoors for long-term access, and using the compromised machine as a pivot point to attack other systems on the internal network. The business impact could range from operational disruption and financial loss to severe reputational damage.
Remediation Plan
Immediate Action: Update Zortam Multiple Products to the latest version. Check the vendor security advisory for specific patch details and patched version numbers. After patching, monitor for any residual signs of exploitation and review application and system access logs for suspicious activity preceding the update.
Proactive Monitoring: Security teams should monitor for anomalous process behavior originating from Zortam applications, such as unexpected child processes (e.g.,
cmd.exe,powershell.exe). Scrutinize application crash logs for exceptions related to the library creation function. Network monitoring should be in place to detect any unusual outbound connections from workstations running this software.Compensating Controls: If immediate patching is not feasible, consider the following controls:
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Jan 28, 2026, multiple proof-of-concept (PoC) exploits are publicly available for this vulnerability. While the CISA KEV status is "No," the public availability of a simple and reliable exploit for a remote code execution flaw means it is a prime candidate for use in targeted phishing campaigns. The attack requires user interaction, making social engineering the most likely delivery vector.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the public availability of exploit code, this vulnerability must be remediated with the highest priority. We strongly recommend that all affected Zortam products are updated to a patched version immediately. Although this CVE is not currently on the CISA KEV list, its severity and the ease of exploitation present a clear and present danger. All systems running vulnerable versions should be considered at high risk of compromise and should be patched or have compensating controls applied without delay.