{"version":"1.0","provider_name":"Xiarch Solutions Private Limited","provider_url":"https:\/\/xiarch.com\/blog","author_name":"Xiarch Security","author_url":"https:\/\/xiarch.com\/blog\/author\/vector\/","title":"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications! - Xiarch Solutions Private Limited","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"gVUNHsjo8k\"><a href=\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/\">6 Unfixed Vulnerabilities Identified in Remote Mouse Applications!<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/embed\/#?secret=gVUNHsjo8k\" width=\"600\" height=\"338\" title=\"&#8220;6 Unfixed Vulnerabilities Identified in Remote Mouse Applications!&#8221; &#8212; Xiarch Solutions Private Limited\" data-secret=\"gVUNHsjo8k\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/bugs-find-in-remote-mouse-applications-featured-image.jpg","thumbnail_width":1000,"thumbnail_height":524,"description":"On Wednesday, the security researcher finds out 6 unpatched flaws in remote mouse applications and they collectively named it Mouse Trap. These six zero-days vulnerabilities were discovered in the application identified as Remote Mouse and it will permit the attacks while executing the code without the user consent. The expert also says that it is [&hellip;]"}