Mobatek MobaXterm 12.1 Home Edition

CPE Details

Mobatek MobaXterm 12.1 Home Edition
12.1
2021-06-09
13h44 +00:00
2021-06-09
14h50 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:mobatek:mobaxterm:12.1:*:*:*:home:*:*:*

Informations

Vendor

mobatek

Product

mobaxterm

Version

12.1

Software Edition

home

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-38336 2022-12-04 23h00 +00:00 An access control issue in MobaXterm before v22.1 allows attackers to make connections to the server via the SSH or SFTP protocols without authentication.
8.1
Haute
CVE-2022-38337 2022-12-04 23h00 +00:00 When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.
9.1
Critique
CVE-2021-28847 2021-06-03 08h58 +00:00 MobaXterm before 21.0 allows remote servers to cause a denial of service (Windows GUI hang) via tab title change requests that are sent repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls.
7.5
Haute
CVE-2019-16305 2019-09-14 12h04 +00:00 In MobaXterm 11.1 and 12.1, the protocol handler is vulnerable to command injection. A crafted link can trigger a popup asking whether the user wants to run MobaXterm to handle the link. If accepted, another popup appears asking for further confirmation. If this is also accepted, command execution is achieved, as demonstrated by the MobaXterm://`calc` URI.
8.8
Haute