Vulnerabilities (CVE)

Filtered by vendor Tightvnc Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-23967 1 Tightvnc 1 Tightvnc 2022-02-02 7.5 HIGH 9.8 CRITICAL
In TightVNC 1.3.10, there is an integer signedness error and resultant heap-based buffer overflow in InitialiseRFBConnection in rfbproto.c (for the vncviewer component). There is no check on the size given to malloc, e.g., -1 is accepted. This allocates a chunk of size zero, which will give a heap pointer. However, one can send 0xffffffff bytes of data, which can have a DoS impact or lead to remote code execution.
CVE-2021-42785 1 Tightvnc 1 Tightvnc 2021-11-29 7.5 HIGH 9.8 CRITICAL
Buffer Overflow vulnerability in tvnviewer.exe of TightVNC Viewer allows a remote attacker to execute arbitrary instructions via a crafted FramebufferUpdate packet from a VNC server.
CVE-2019-15678 1 Tightvnc 1 Tightvnc 2020-12-09 7.5 HIGH 9.8 CRITICAL
TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.
CVE-2019-15679 1 Tightvnc 1 Tightvnc 2020-12-09 7.5 HIGH 9.8 CRITICAL
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-8287 1 Tightvnc 1 Tightvnc 2020-12-09 7.5 HIGH 9.8 CRITICAL
TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.