CVE-2019-18196
- EPSS 0.04%
- Published 24.10.2019 16:15:20
- Last modified 21.11.2024 04:32:48
A DLL side loading vulnerability in the Windows Service in TeamViewer versions up to 11.0.133222 (fixed in 11.0.214397), 12.0.181268 (fixed in 12.0.214399), 13.2.36215 (fixed in 13.2.36216), and 14.6.4835 (fixed in 14.7.1965) on Windows could allow a...
CVE-2019-11769
- EPSS 0.09%
- Published 11.09.2019 20:15:10
- Last modified 21.11.2024 04:21:45
An issue was discovered in TeamViewer 14.2.2558. Updating the product as a non-administrative user requires entering administrative credentials into the GUI. Subsequently, these credentials are processed in Teamviewer.exe, which allows any applicatio...
CVE-2018-16550
- EPSS 0.11%
- Published 05.09.2018 22:29:00
- Last modified 21.11.2024 03:52:57
TeamViewer 10.x through 13.x allows remote attackers to bypass the brute-force authentication protection mechanism by skipping the "Cancel" step, which makes it easier to determine the correct value of the default 4-digit PIN.
CVE-2018-14333
- EPSS 0.22%
- Published 17.07.2018 02:29:00
- Last modified 21.11.2024 03:48:50
TeamViewer through 13.1.1548 stores a password in Unicode format within TeamViewer.exe process memory between "[00 88] and "[00 00 00]" delimiters, which might make it easier for attackers to obtain sensitive information by leveraging an unattended w...
CVE-2010-3128
- EPSS 2.21%
- Published 26.08.2010 18:36:35
- Last modified 11.04.2025 00:51:21
Untrusted search path vulnerability in TeamViewer 5.0.8703 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as ...