3 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

RealVNC VNC 5.0.6 on Mac OS X, Linux, and UNIX allows local users to gain privileges via a crafted argument to the (1) vncserver, (2) vncserver-x11, or (3) Xvnc helper. RealVNC VNC 5.0.6 en Mac OS X, Linux y UNIX permite a usuarios locales conseguir privilegios a través de un argumento diseñado al (1) vncserver, (2) vncserver-x11, o (3) Xvnc helper • http://www.realvnc.com/products/vnc/documentation/5.0/release-notes • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 7%CPEs: 6EXPL: 0

The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to "encoding type." La función CMsgReader::readRect en el componente VNC Viewer en RealVNC VNC Free Edition v4.0 hasta v4.1.2, Enterprise Edition vE4.0 hasta vE4.4.2, y Personal Edition vP4.0 hasta vP4.4.2 permite a servidores remotos VNC ejecutar código de su elección mediante el protocolo de datos RFB manipulado, relacionado con "tipo codificado". • http://secunia.com/advisories/32317 http://secunia.com/advisories/33689 http://secunia.com/advisories/34184 http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1 http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html http://www.realvnc.com/products/free/4.1/release-notes.html http://www.realvnc.com/products/upgrade.h • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

vncviewer.exe in RealVNC Windows Client 4.1.2.0 allows remote VNC servers to cause a denial of service (application crash) via a crafted frame buffer update packet. vncviewer.exe de RealVNC Windows Client 4.1.2.0 permite a servidores VNC remotos provocar una denegación de servicio (caída de aplicación) a través de un frame buffer de paquetes de actualización. • https://www.exploit-db.com/exploits/6181 http://www.securityfocus.com/bid/30499 https://exchange.xforce.ibmcloud.com/vulnerabilities/44218 • CWE-20: Improper Input Validation •