Vulnerabilities
Vulnerable Software
Tightvnc:  >> Tightvnc  >> 1.3.10  Security Vulnerabilities
TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.
CVSS Score
9.0
EPSS Score
0.001
Published
2023-04-12
Buffer Overflow vulnerability in tvnviewer.exe of TightVNC Viewer allows a remote attacker to execute arbitrary instructions via a crafted FramebufferUpdate packet from a VNC server.
CVSS Score
9.8
EPSS Score
0.01
Published
2021-11-23
TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
CVSS Score
9.8
EPSS Score
0.02
Published
2019-10-29
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
CVSS Score
7.5
EPSS Score
0.003
Published
2019-10-29
TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.
CVSS Score
9.8
EPSS Score
0.015
Published
2019-10-29
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
CVSS Score
9.8
EPSS Score
0.015
Published
2019-10-29


Contact Us

Shodan ® - All rights reserved