9.1
CVE-2024-42049
- EPSS 2.02%
- Published 28.07.2024 02:15:09
- Last modified 21.11.2024 09:33:28
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
TightVNC (Server for Windows) before 2.8.84 allows attackers to connect to the control pipe via a network connection.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendortightvnc
≫
Product
tightvnc
Default Statusunknown
Version <
2.8.84
Version
0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.02% | 0.83 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.