5 results (0.002 seconds)

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box. Vulnerabilidad en VNC, TightVNC, y TridiaVNC permite a usuarios locales ejecutar código arbitrario como LocalSystem usando el sistema de mensajes de Win32 para evitar el GUI (Interfaz Gráfico de Úsuario) y acceder al cuadro de diálogo "Añadir nuevos clientes" • http://marc.info/?l=bugtraq&m=102994289123085&w=2 http://www.iss.net/security_center/static/9979.php http://www.securityfocus.com/bid/5530 •

CVSS: 7.6EPSS: 9%CPEs: 1EXPL: 1

Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long rfbConnFailed packet with a long reason string. • https://www.exploit-db.com/exploits/16489 http://marc.info/?l=bugtraq&m=98088315825366&w=2 http://www.securityfocus.com/bid/2305 https://exchange.xforce.ibmcloud.com/vulnerabilities/6025 •

CVSS: 10.0EPSS: 21%CPEs: 1EXPL: 1

Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0. • https://www.exploit-db.com/exploits/16491 http://marc.info/?l=vnc-list&m=98080763005455&w=2 http://www.kb.cert.org/vuls/id/598581 http://www.securityfocus.com/bid/2306 https://exchange.xforce.ibmcloud.com/vulnerabilities/6026 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

WinVNC 3.3.3 and earlier generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users. • http://www.kb.cert.org/vuls/id/303080 http://www.securityfocus.com/bid/2275 http://www1.corest.com/common/showdoc.php?idxseccion=10&idx=117 https://exchange.xforce.ibmcloud.com/vulnerabilities/5992 •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

WinVNC installs the WinVNC3 registry key with permissions that give Special Access (read and modify) to the Everybody group, which allows users to read and modify sensitive information such as passwords and gain access to the system. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0253.html http://www.securityfocus.com/bid/1961 https://exchange.xforce.ibmcloud.com/vulnerabilities/5545 •