Logo
Explore Help
Sign In
CalvinBackup/CVEs-PoC
1
0
Fork 0
You've already forked CVEs-PoC
mirror of https://github.com/0xMarcio/cve.git synced 2026-02-12 18:42:46 +00:00
Code Issues Packages Projects Releases Wiki Activity
Files
main
CVEs-PoC/2021/CVE-2021-35448.md
0xMarcio cb00e1339f Update CVE list 2025-09-29 21:09
2025-09-29 21:09:30 +02:00

1.5 KiB
Raw Permalink Blame History

CVE-2021-35448

Description

Emote Interactive Remote Mouse 3.008 on Windows allows attackers to execute arbitrary programs as Administrator by using the Image Transfer Folder feature to navigate to cmd.exe. It binds to local ports to listen for incoming connections.

POC

Reference

  • https://www.exploit-db.com/exploits/50047

Github

  • https://github.com/ARPSyndicate/cvemon
  • https://github.com/Ardemium/InsideJob
  • https://github.com/BrahimOosterveen22/pentest
  • https://github.com/DamyonTimmermans/pentest
  • https://github.com/Goultarde/CVE-2021-3544_RemoteMouse-3.008-RCE
  • https://github.com/MrTackers/Pentesting
  • https://github.com/NaInSec/CVE-PoC-in-GitHub
  • https://github.com/SYRTI/POC_to_review
  • https://github.com/WhooAmii/POC_to_review
  • https://github.com/deathflash1411/CVEs
  • https://github.com/deathflash1411/cve-2021-35448
  • https://github.com/haspervincent/insidejob
  • https://github.com/karam14/lab-instructions
  • https://github.com/n0-traces/cve_monitor
  • https://github.com/nomi-sec/PoC-in-GitHub
  • https://github.com/roberta-vieira/Internal-Pentest-Project
  • https://github.com/soosmile/POC
  • https://github.com/trhacknon/Pocingit
  • https://github.com/vincenthasper/insidejob
  • https://github.com/zecool/cve
Reference in New Issue View Git Blame Copy Permalink
Powered by Gitea Version: 1.25.4 Page: 148ms Template: 34ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API