Remotemouse

Emote Remote Mouse

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Veröffentlicht 07.05.2021 19:31:07
  • Zuletzt bearbeitet 21.11.2024 05:58:12

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authe...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 07.05.2021 19:31:07
  • Zuletzt bearbeitet 21.11.2024 05:58:12

An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.

Exploit
  • EPSS 0.23%
  • Veröffentlicht 07.05.2021 19:31:07
  • Zuletzt bearbeitet 21.11.2024 05:58:12

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.

Exploit
  • EPSS 2.81%
  • Veröffentlicht 07.05.2021 19:31:07
  • Zuletzt bearbeitet 21.11.2024 05:58:12

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.

Exploit
  • EPSS 52.06%
  • Veröffentlicht 07.05.2021 19:31:07
  • Zuletzt bearbeitet 21.11.2024 05:58:13

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 07.05.2021 19:31:07
  • Zuletzt bearbeitet 21.11.2024 05:58:13

An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or...