CVE-2024-42049
- EPSS 2.02%
- Veröffentlicht 28.07.2024 02:15:09
- Zuletzt bearbeitet 21.11.2024 09:33:28
TightVNC (Server for Windows) before 2.8.84 allows attackers to connect to the control pipe via a network connection.
- EPSS 0.09%
- Veröffentlicht 12.04.2023 15:15:12
- Zuletzt bearbeitet 08.02.2025 03:15:10
TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privile...
CVE-2021-42785
- EPSS 0.75%
- Veröffentlicht 23.11.2021 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:28:10
Buffer Overflow vulnerability in tvnviewer.exe of TightVNC Viewer allows a remote attacker to execute arbitrary instructions via a crafted FramebufferUpdate packet from a VNC server.
CVE-2019-8287
- EPSS 2.15%
- Veröffentlicht 29.10.2019 19:15:22
- Zuletzt bearbeitet 21.11.2024 04:49:39
TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15680
- EPSS 0.34%
- Veröffentlicht 29.10.2019 19:15:18
- Zuletzt bearbeitet 21.11.2024 04:29:14
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
CVE-2019-15678
- EPSS 1.49%
- Veröffentlicht 29.10.2019 19:15:17
- Zuletzt bearbeitet 21.11.2024 04:29:14
TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.
CVE-2019-15679
- EPSS 1.49%
- Veröffentlicht 29.10.2019 19:15:17
- Zuletzt bearbeitet 21.11.2024 04:29:14
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
- EPSS 48.67%
- Veröffentlicht 04.02.2009 19:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a m...
- EPSS 0.95%
- Veröffentlicht 03.03.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The vncserver wrapper for vnc before 3.3.3r2-21 uses the rand() function instead of srand(), which causes vncserver to generate weak cookies.
CVE-2002-1848
- EPSS 0.07%
- Veröffentlicht 31.12.2002 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
TightVNC before 1.2.4 running on Windows stores unencrypted passwords in the password text control of the WinVNC Properties dialog, which could allow local users to access passwords.