Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Unknown
CVE-2025-0714
Disclosure Date: February 17, 2025 (last updated February 19, 2025)
The vulnerability exists in the password storage of Mobateks MobaXterm in versions below 25.0. MobaXTerm uses an initialisation vector (IV) consisting only of zero bytes and a master key to encrypt each password individually. In the default configuration, on opening MobaXTerm, the user is prompted for their password. A derivative of the password is used as the master key. As both the master key and the IV are the same for each stored password, the AES CFB ciphertext depends only on the plaintext (the password). The static IV and master key make it easier to obtain sensitive information and to decrypt data when it is stored at rest.
0
Attacker Value
Unknown
CVE-2023-40359
Disclosure Date: August 14, 2023 (last updated October 08, 2023)
xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a pointer/overflow issue. This can only occur for xterm installations that are configured at compile time to use a certain experimental feature.
0
Attacker Value
Unknown
CVE-2022-38337
Disclosure Date: December 06, 2022 (last updated October 08, 2023)
When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.
0
Attacker Value
Unknown
CVE-2022-38336
Disclosure Date: December 06, 2022 (last updated October 08, 2023)
An access control issue in MobaXterm before v22.1 allows attackers to make connections to the server via the SSH or SFTP protocols without authentication.
0
Attacker Value
Unknown
CVE-2022-45063
Disclosure Date: November 10, 2022 (last updated November 08, 2023)
xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions.
0
Attacker Value
Unknown
CVE-2022-24130
Disclosure Date: January 31, 2022 (last updated February 23, 2025)
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
0
Attacker Value
Unknown
CVE-2021-28847
Disclosure Date: June 03, 2021 (last updated November 28, 2024)
MobaXterm before 21.0 allows remote servers to cause a denial of service (Windows GUI hang) via tab title change requests that are sent repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls.
0
Attacker Value
Unknown
CVE-2021-27135
Disclosure Date: February 10, 2021 (last updated November 08, 2023)
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
0
Attacker Value
Unknown
CVE-2019-16305
Disclosure Date: September 14, 2019 (last updated November 27, 2024)
In MobaXterm 11.1 and 12.1, the protocol handler is vulnerable to command injection. A crafted link can trigger a popup asking whether the user wants to run MobaXterm to handle the link. If accepted, another popup appears asking for further confirmation. If this is also accepted, command execution is achieved, as demonstrated by the MobaXterm://`calc` URI.
0
Attacker Value
Unknown
CVE-2019-13475
Disclosure Date: July 09, 2019 (last updated November 27, 2024)
In MobaXterm 11.1, the mobaxterm: URI handler has an argument injection vulnerability that allows remote attackers to execute arbitrary commands when the user visits a specially crafted URL. Based on the available command-line arguments of the software, one can simply inject -exec to execute arbitrary commands. The additional arguments -hideterm and -exitwhendone in the payload make the attack less visible.
0