📦 Trojan
by Jrohy
🔍 What is Trojan?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
An unauthenticated remote attacker can exploit the /auth/register initialization interface in Trojan versions 2.0.0 through 2.15.3 to escalate privileges and gain unauthorized access. This affects all...
CVE-2025-5525 is a critical command injection vulnerability in Jrohy trojan versions up to 2.15.3. Attackers can execute arbitrary operating system commands remotely by manipulating the LogChan functi...