2 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

RealVNC VNC Server before 6.11.0 and VNC Viewer before 6.22.826 on Windows allow local privilege escalation via MSI installer Repair mode. vRealVNC VNC Server versiones anteriores a 6.11.0 y VNC Viewer versiones anteriores a 6.22.826 en Windows, permiten una escalada de privilegios local por medio del modo de reparación del instalador MSI • https://help.realvnc.com/hc/en-us/articles/360002253138-Release-Notes#vnc-server-6-11-0-released-0-2 •

CVSS: 9.0EPSS: 95%CPEs: 2EXPL: 6

Multiple buffer overflows in (a) UltraVNC (aka Ultr@VNC) 1.0.1 and earlier and (b) tabbed_viewer 1.29 (1) allow user-assisted remote attackers to execute arbitrary code via a malicious server that sends a long string to a client that connects on TCP port 5900, which triggers an overflow in Log::ReallyPrint; and (2) allow remote attackers to cause a denial of service (server crash) via a long HTTP GET request to TCP port 5800, which triggers an overflow in VNCLog::ReallyPrint. • https://www.exploit-db.com/exploits/16490 https://www.exploit-db.com/exploits/27568 https://www.exploit-db.com/exploits/27569 http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044901.html http://secunia.com/advisories/19513 http://securityreason.com/securityalert/674 http://www.securityfocus.com/archive/1/429930/100/0/threaded http://www.securityfocus.com/archive/1/430287/100/0/threaded http://www.securityfocus.com/archive/1/430711/100/0/threaded http://ww • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •