Tightvnc

Tightvnc

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.02%
  • Veröffentlicht 28.07.2024 02:15:09
  • Zuletzt bearbeitet 21.11.2024 09:33:28

TightVNC (Server for Windows) before 2.8.84 allows attackers to connect to the control pipe via a network connection.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.04.2023 15:15:12
  • Zuletzt bearbeitet 08.02.2025 03:15:10

TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privile...

  • EPSS 0.75%
  • Veröffentlicht 23.11.2021 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:28:10

Buffer Overflow vulnerability in tvnviewer.exe of TightVNC Viewer allows a remote attacker to execute arbitrary instructions via a crafted FramebufferUpdate packet from a VNC server.

  • EPSS 2.15%
  • Veröffentlicht 29.10.2019 19:15:22
  • Zuletzt bearbeitet 21.11.2024 04:49:39

TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.

  • EPSS 0.34%
  • Veröffentlicht 29.10.2019 19:15:18
  • Zuletzt bearbeitet 21.11.2024 04:29:14

TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.

  • EPSS 1.49%
  • Veröffentlicht 29.10.2019 19:15:17
  • Zuletzt bearbeitet 21.11.2024 04:29:14

TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.

  • EPSS 1.49%
  • Veröffentlicht 29.10.2019 19:15:17
  • Zuletzt bearbeitet 21.11.2024 04:29:14

TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.

Exploit
  • EPSS 48.67%
  • Veröffentlicht 04.02.2009 19:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a m...

  • EPSS 0.95%
  • Veröffentlicht 03.03.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The vncserver wrapper for vnc before 3.3.3r2-21 uses the rand() function instead of srand(), which causes vncserver to generate weak cookies.

  • EPSS 0.07%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

TightVNC before 1.2.4 running on Windows stores unencrypted passwords in the password text control of the WinVNC Properties dialog, which could allow local users to access passwords.