Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
remotemouse emote remote mouse vulnerabilities and exploits
(subscribe to this query)
8.1
CVSSv3
CVE-2021-27574
An issue exists in Emote Remote Mouse up to and including 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
Remotemouse Emote Remote Mouse
5.3
CVSSv3
CVE-2021-27570
An issue exists in Emote Remote Mouse up to and including 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
Remotemouse Emote Remote Mouse
5.3
CVSSv3
CVE-2021-27569
An issue exists in Emote Remote Mouse up to and including 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
Remotemouse Emote Remote Mouse
5.3
CVSSv3
CVE-2021-27571
An issue exists in Emote Remote Mouse up to and including 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.
Remotemouse Emote Remote Mouse
7.8
CVSSv3
CVE-2021-35448
Emote Interactive Remote Mouse 3.008 on Windows allows malicious users to execute arbitrary programs as Administrator by using the Image Transfer Folder feature to navigate to cmd.exe. It binds to local ports to listen for incoming connections.
Remotemouse Emote Interactive Studio 3.008
2 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started