Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2023-27830

Disclosure Date: April 12, 2023 (last updated October 08, 2023)
TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.
Attacker Value
Unknown

CVE-2021-42785

Disclosure Date: November 23, 2021 (last updated October 07, 2023)
Buffer Overflow vulnerability in tvnviewer.exe of TightVNC Viewer allows a remote attacker to execute arbitrary instructions via a crafted FramebufferUpdate packet from a VNC server.
Attacker Value
Unknown

CVE-2019-8287

Disclosure Date: October 29, 2019 (last updated October 06, 2023)
TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
Attacker Value
Unknown

CVE-2019-15679

Disclosure Date: October 29, 2019 (last updated October 06, 2023)
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
Attacker Value
Unknown

CVE-2019-15678

Disclosure Date: October 29, 2019 (last updated October 06, 2023)
TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.
Attacker Value
Unknown

CVE-2019-15680

Disclosure Date: October 29, 2019 (last updated October 06, 2023)
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
Attacker Value
Unknown

CVE-2009-0388

Disclosure Date: February 04, 2009 (last updated October 04, 2023)
Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.
0
Attacker Value
Unknown

CVE-2002-1848

Disclosure Date: December 31, 2002 (last updated October 03, 2023)
TightVNC before 1.2.4 running on Windows stores unencrypted passwords in the password text control of the WinVNC Properties dialog, which could allow local users to access passwords.
0
Attacker Value
Unknown

CVE-2002-1336

Disclosure Date: December 11, 2002 (last updated October 03, 2023)
TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.
0
Attacker Value
Unknown

CVE-2002-0971

Disclosure Date: September 24, 2002 (last updated October 03, 2023)
Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box.
0