Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fcjm-23wr-m9g6

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.

TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.

EPSS

Процентиль: 79%
0.01298
Низкий

Связанные уязвимости

redhat
почти 23 года назад

TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.

nvd
больше 22 лет назад

TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.

debian
больше 22 лет назад

TightVNC before 1.2.6 generates the same challenge string for multiple ...

EPSS

Процентиль: 79%
0.01298
Низкий