Show filters
118 Total Results
Displaying 41-50 of 118
Sort by:
Attacker Value
Unknown

CVE-2019-15678

Disclosure Date: October 29, 2019 (last updated November 27, 2024)
TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.
Attacker Value
Unknown

CVE-2019-15680

Disclosure Date: October 29, 2019 (last updated November 27, 2024)
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
Attacker Value
Unknown

CVE-2019-15681

Disclosure Date: October 29, 2019 (last updated November 27, 2024)
LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
Attacker Value
Unknown

CVE-2017-18635

Disclosure Date: September 25, 2019 (last updated November 27, 2024)
An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name.
Attacker Value
Unknown

CVE-2019-15695

Disclosure Date: March 26, 2019 (last updated November 27, 2024)
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
Attacker Value
Unknown

CVE-2019-8277

Disclosure Date: March 08, 2019 (last updated November 27, 2024)
UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
Attacker Value
Unknown

CVE-2019-8268

Disclosure Date: March 08, 2019 (last updated November 27, 2024)
UltraVNC revision 1206 has multiple off-by-one vulnerabilities in VNC client code connected with improper usage of ClientConnection::ReadString function, which can potentially result code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1207.
Attacker Value
Unknown

CVE-2019-8273

Disclosure Date: March 08, 2019 (last updated November 27, 2024)
UltraVNC revision 1211 has a heap buffer overflow vulnerability in VNC server code inside file transfer request handler, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
Attacker Value
Unknown

CVE-2019-8276

Disclosure Date: March 08, 2019 (last updated November 27, 2024)
UltraVNC revision 1211 has a stack buffer overflow vulnerability in VNC server code inside file transfer request handler, which can result in Denial of Service (DoS). This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
Attacker Value
Unknown

CVE-2019-8264

Disclosure Date: March 08, 2019 (last updated November 27, 2024)
UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside Ultra2 decoder, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204.
0