Page 5 of 38 results (0.007 seconds)

CVSS: 9.8EPSS: 2%CPEs: 7EXPL: 0

LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution LibVNC antes del commit con ID 73cb96fec028a576a5a24417b57723b55854ad7b contiene una vulnerabilidad de uso de memoria dinámica (heap) previamente liberada en el código del servidor de la extensión de transferencia de archivos que puede resultar en la ejecución remota de código. • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html https://usn.ubuntu.com/3877-1 https://www.debian.org/security/2019/dsa-4383 • CWE-416: Use After Free •

CVSS: 9.8EPSS: 61%CPEs: 13EXPL: 0

LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution LibVNC antes del commit con ID 502821828ed00b4a2c4bef90683d0fd88ce495de contiene una vulnerabilidad de escritura de memoria dinámica (heap) fuera de límites en el código del servidor de la extensión de transferencia de archivos que puede resultar en la ejecución remota de código. • https://access.redhat.com/errata/RHSA-2019:0059 https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html https://usn.ubuntu.com/3877-1 https://usn.ubuntu.com/4547-1 https://usn.ubuntu.com/4587-1 https://www.debian.org/security/2019/dsa-4383 https://access.redhat.com/securit • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 4%CPEs: 20EXPL: 0

LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution LibVNC antes del commit con ID a83439b9fbe0f03c48eb94ed05729cb016f8b72f contiene múltiples vulnerabilidades de escritura de memoria dinámica (heap) fuera de límites en el código del cliente VNC que pueden resultar en la ejecución remota de código. • https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html https://security.gentoo.org/glsa/201908-05 https://usn.ubuntu.com/3877-1 https://usn.ubuntu.com/4547-1 https://usn.ubuntu.com/4587-1 https:// • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 11%CPEs: 7EXPL: 0

LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution LibVNC antes del commit con ID 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contiene una vulnerabilidad de escritura de memoria dinámica (heap) fuera de límites en la estructura del código del cliente VNC que puede resultar en la ejecución remota de código. • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html https://lists.debian.org/debian-lts-announce/2019/11/msg00033.html https://security.gentoo.org/glsa/201908-05 https://security.gentoo.org/glsa/202006-06 https://usn.ubuntu.com/3877-1 https://usn.ubuntu.com/4547-1 https:/& • CWE-787: Out-of-bounds Write •

CVSS: 8.1EPSS: 48%CPEs: 7EXPL: 0

LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution. LibVNC antes del commit con ID ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contiene una vulnerabilidad de uso de memoria dinámica (heap) previamente liberada en el código del servidor de la extensión de transferencia de archivos que puede resultar en la ejecución remota de código. • https://github.com/LibVNC/libvncserver/issues/241 https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html https://usn.ubuntu.com/3877-1 https://www.debian.org/security/2019/dsa-4383 • CWE-416: Use After Free •