3 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

RealVNC VNC Server before 6.11.0 and VNC Viewer before 6.22.826 on Windows allow local privilege escalation via MSI installer Repair mode. vRealVNC VNC Server versiones anteriores a 6.11.0 y VNC Viewer versiones anteriores a 6.22.826 en Windows, permiten una escalada de privilegios local por medio del modo de reparación del instalador MSI • https://help.realvnc.com/hc/en-us/articles/360002253138-Release-Notes#vnc-server-6-11-0-released-0-2 •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a user into connecting to a fake VNC Server. The VNC Viewer application they are using will then hang, until terminated, but no memory leak occurs - the resources are freed once the hung process is terminated and the resource usage is constant during the hang. Only the process that is connected to the fake Server is affected. This is an application bug, not a security issue ** EN DISPUTA ** RealVNC Viewer 6.21.406 permite que los servidores VNC remotos provoquen una denegación de servicio (caída de la aplicación) a través de datos de protocolo RFB manipulados. • https://gist.github.com/totaam/a90f2bb40f5b693ccec0ae903d021b03 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 95%CPEs: 2EXPL: 6

Multiple buffer overflows in (a) UltraVNC (aka Ultr@VNC) 1.0.1 and earlier and (b) tabbed_viewer 1.29 (1) allow user-assisted remote attackers to execute arbitrary code via a malicious server that sends a long string to a client that connects on TCP port 5900, which triggers an overflow in Log::ReallyPrint; and (2) allow remote attackers to cause a denial of service (server crash) via a long HTTP GET request to TCP port 5800, which triggers an overflow in VNCLog::ReallyPrint. • https://www.exploit-db.com/exploits/16490 https://www.exploit-db.com/exploits/27568 https://www.exploit-db.com/exploits/27569 http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044901.html http://secunia.com/advisories/19513 http://securityreason.com/securityalert/674 http://www.securityfocus.com/archive/1/429930/100/0/threaded http://www.securityfocus.com/archive/1/430287/100/0/threaded http://www.securityfocus.com/archive/1/430711/100/0/threaded http://ww • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •