Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
remotemouse emote remote mouse vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2021-27574
An issue exists in Emote Remote Mouse up to and including 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
Remotemouse Emote Remote Mouse
5
CVSSv2
CVE-2021-27570
An issue exists in Emote Remote Mouse up to and including 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
Remotemouse Emote Remote Mouse
5
CVSSv2
CVE-2021-27571
An issue exists in Emote Remote Mouse up to and including 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.
Remotemouse Emote Remote Mouse
5
CVSSv2
CVE-2021-27569
An issue exists in Emote Remote Mouse up to and including 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
Remotemouse Emote Remote Mouse
7.2
CVSSv2
CVE-2021-35448
Emote Interactive Remote Mouse 3.008 on Windows allows malicious users to execute arbitrary programs as Administrator by using the Image Transfer Folder feature to navigate to cmd.exe. It binds to local ports to listen for incoming connections.
Remotemouse Emote Interactive Studio 3.008
2 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started