Mobatek

MobaXterm

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 17.04.2026 06:16:30
  • Zuletzt bearbeitet 17.04.2026 06:16:30

A vulnerability has been found in Mobatek MobaXterm Home Edition up to 26.1. This affects an unknown part in the library msimg32.dll. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The attack is considered...

  • EPSS 0.02%
  • Veröffentlicht 09.03.2026 15:24:47
  • Zuletzt bearbeitet 11.03.2026 13:53:47

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search pat...

  • EPSS 0.04%
  • Veröffentlicht 17.02.2025 12:15:27
  • Zuletzt bearbeitet 15.04.2026 00:35:42

The vulnerability exists in the password storage of Mobateks MobaXterm in versions below 25.0. MobaXTerm uses an initialisation vector (IV) consisting only of zero bytes and a master key to encrypt each password individually. In the default configura...

  • EPSS 0.07%
  • Veröffentlicht 31.10.2024 19:15:13
  • Zuletzt bearbeitet 15.04.2026 00:35:42

An issue in MobaXterm v24.2 allows a local attacker to escalate privileges and execute arbitrary code via the remove function of the MobaXterm MSI is spawning one Administrative cmd (conhost.exe)

Exploit
  • EPSS 0.38%
  • Veröffentlicht 06.12.2022 00:15:10
  • Zuletzt bearbeitet 24.04.2025 15:15:47

An access control issue in MobaXterm before v22.1 allows attackers to make connections to the server via the SSH or SFTP protocols without authentication.

  • EPSS 0.45%
  • Veröffentlicht 06.12.2022 00:15:10
  • Zuletzt bearbeitet 24.04.2025 15:15:48

When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.

  • EPSS 0.47%
  • Veröffentlicht 03.06.2021 11:15:08
  • Zuletzt bearbeitet 21.11.2024 06:00:19

MobaXterm before 21.0 allows remote servers to cause a denial of service (Windows GUI hang) via tab title change requests that are sent repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls.

Exploit
  • EPSS 0.5%
  • Veröffentlicht 14.09.2019 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:30:29

In MobaXterm 11.1 and 12.1, the protocol handler is vulnerable to command injection. A crafted link can trigger a popup asking whether the user wants to run MobaXterm to handle the link. If accepted, another popup appears asking for further confirmat...

Exploit
  • EPSS 0.9%
  • Veröffentlicht 09.07.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:58

In MobaXterm 11.1, the mobaxterm: URI handler has an argument injection vulnerability that allows remote attackers to execute arbitrary commands when the user visits a specially crafted URL. Based on the available command-line arguments of the softwa...

Exploit
  • EPSS 0.46%
  • Veröffentlicht 13.05.2019 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:48:32

In MobaTek MobaXterm Personal Edition v11.1 Build 3860, the SSH private key and its password can be retrieved from process memory for the lifetime of the process, even after the user disconnects from the remote SSH server. This affects Passwordless A...