CVE-2023-34634

Greenshot 1.2.10 and below allows arbitrary code execution because .NET content is insecurely deserialized when a .greenshot file is opened.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getgreenshot:greenshot:*:*:*:*:*:*:*:*

History

02 Oct 2025, 18:56

Type Values Removed Values Added
CPE cpe:2.3:a:greenshot:greenshot:*:*:*:*:*:*:*:* cpe:2.3:a:getgreenshot:greenshot:*:*:*:*:*:*:*:*
First Time Getgreenshot
Getgreenshot greenshot
References () http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry, Permissions Required
References () http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html - () http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html - Permissions Required
References () https://greenshot.atlassian.net/browse/BUG-3061 - Third Party Advisory () https://greenshot.atlassian.net/browse/BUG-3061 - Third Party Advisory, Issue Tracking

Information

Published : 2023-08-01 14:15

Updated : 2025-10-02 18:56


NVD link : CVE-2023-34634

Mitre link : CVE-2023-34634

CVE.ORG link : CVE-2023-34634


JSON object : View

Products Affected

getgreenshot

  • greenshot