Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p5jc-gpgq-6vfg

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.

EPSS

Процентиль: 100%
0.93085
Критический

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 19 лет назад

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.

nvd
больше 19 лет назад

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.

debian
больше 19 лет назад

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink I ...

EPSS

Процентиль: 100%
0.93085
Критический

Дефекты

CWE-287