Show filters
425 Total Results
Displaying 11-20 of 425
Sort by:
Attacker Value
Unknown

CVE-2020-14402

Disclosure Date: June 17, 2020 (last updated November 28, 2024)
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings.
Attacker Value
Unknown

CVE-2020-14403

Disclosure Date: June 17, 2020 (last updated November 28, 2024)
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/hextile.c allows out-of-bounds access via encodings.
Attacker Value
Unknown

CVE-2020-14398

Disclosure Date: June 17, 2020 (last updated November 28, 2024)
An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.
Attacker Value
Unknown

CVE-2020-14405

Disclosure Date: June 17, 2020 (last updated November 28, 2024)
An issue was discovered in LibVNCServer before 0.9.13. libvncclient/rfbproto.c does not limit TextChat size.
Attacker Value
Unknown

CVE-2019-20840

Disclosure Date: June 17, 2020 (last updated November 08, 2023)
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.
Attacker Value
Unknown

CVE-2020-14404

Disclosure Date: June 17, 2020 (last updated November 28, 2024)
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings.
Attacker Value
Unknown

CVE-2019-20788

Disclosure Date: April 23, 2020 (last updated November 27, 2024)
libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.
Attacker Value
Unknown

CVE-2019-15681

Disclosure Date: October 29, 2019 (last updated November 27, 2024)
LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
Attacker Value
Unknown

Integer overflow in whoopsie results in out-of-bounds heap write

Disclosure Date: August 29, 2019 (last updated November 27, 2024)
An integer overflow in whoopsie before versions 0.2.52.5ubuntu0.1, 0.2.62ubuntu0.1, 0.2.64ubuntu0.1, 0.2.66, results in an out-of-bounds write to a heap allocated buffer when processing large crash dumps. This results in a crash or possible code-execution in the context of the whoopsie process.
0
Attacker Value
Unknown

CVE-2019-13132

Disclosure Date: July 10, 2019 (last updated November 08, 2023)
In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.