Lucene search

K
RemotemouseEmote Remote Mouse

6 matches found

CVE
CVE
added 2021/05/07 7:31 p.m.33 views

CVE-2021-27573

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.

9.8CVSS9.8AI score0.55269EPSS
CVE
CVE
added 2021/05/07 7:31 p.m.28 views

CVE-2021-27572

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.

8.1CVSS8.9AI score0.02807EPSS
CVE
CVE
added 2021/05/07 7:31 p.m.27 views

CVE-2021-27570

An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.

5.3CVSS6.4AI score0.00114EPSS
CVE
CVE
added 2021/05/07 7:31 p.m.27 views

CVE-2021-27574

An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.

8.1CVSS8.4AI score0.00203EPSS
CVE
CVE
added 2021/05/07 7:31 p.m.26 views

CVE-2021-27569

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.

5.3CVSS6.3AI score0.00064EPSS
CVE
CVE
added 2021/05/07 7:31 p.m.23 views

CVE-2021-27571

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.

5.3CVSS6.4AI score0.00225EPSS