Show filters
118 Total Results
Displaying 11-20 of 118
Sort by:
Attacker Value
Unknown
CVE-2022-24750
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugins from the installed directory. Affected users should upgrade their UltraVNC to 1.3.8.1. Users unable to upgrade should not install and run UltraVNC server as a service. It is advisable to create a scheduled task on a low privilege account to launch WinVNC.exe instead. There are no known workarounds if winvnc needs to be started as a service.
0
Attacker Value
Unknown
CVE-2021-42785
Disclosure Date: November 23, 2021 (last updated February 23, 2025)
Buffer Overflow vulnerability in tvnviewer.exe of TightVNC Viewer allows a remote attacker to execute arbitrary instructions via a crafted FramebufferUpdate packet from a VNC server.
0
Attacker Value
Unknown
CVE-2021-41380
Disclosure Date: September 17, 2021 (last updated February 23, 2025)
RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a user into connecting to a fake VNC Server. The VNC Viewer application they are using will then hang, until terminated, but no memory leak occurs - the resources are freed once the hung process is terminated and the resource usage is constant during the hang. Only the process that is connected to the fake Server is affected. This is an application bug, not a security issue
0
Attacker Value
Unknown
CVE-2020-25708
Disclosure Date: November 27, 2020 (last updated February 22, 2025)
A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2020-29074
Disclosure Date: November 25, 2020 (last updated February 22, 2025)
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
0
Attacker Value
Unknown
CVE-2020-26117
Disclosure Date: September 27, 2020 (last updated February 22, 2025)
In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception.
0
Attacker Value
Unknown
CVE-2017-18922
Disclosure Date: June 30, 2020 (last updated February 21, 2025)
It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2019-20839
Disclosure Date: June 17, 2020 (last updated February 21, 2025)
libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.
0
Attacker Value
Unknown
CVE-2020-14397
Disclosure Date: June 17, 2020 (last updated February 21, 2025)
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2018-21247
Disclosure Date: June 17, 2020 (last updated February 21, 2025)
An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
0