Количество 14
Количество 14
GHSA-25ff-c5j2-v9ch
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15695
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15695
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15695
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15695
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflo ...
BDU:2021-01411
Уязвимость функции CMsgReader::readSetCursor программного обеспечения VNC TigerVNC, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
openSUSE-SU-2020:0087-1
Security update for tigervnc
SUSE-SU-2020:1749-1
Security update for tigervnc
SUSE-SU-2020:0266-1
Security update for tigervnc
SUSE-SU-2020:0159-1
Security update for tigervnc
SUSE-SU-2020:0113-1
Security update for tigervnc
SUSE-SU-2020:0112-1
Security update for tigervnc
ELSA-2020-3875
ELSA-2020-3875: tigervnc security and bug fix update (MODERATE)
ELSA-2020-1497
ELSA-2020-1497: tigervnc security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-25ff-c5j2-v9ch TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | 3% Низкий | больше 3 лет назад | ||
CVE-2019-15695 TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | CVSS3: 7.2 | 3% Низкий | около 6 лет назад | |
CVE-2019-15695 TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | CVSS3: 7.2 | 3% Низкий | около 6 лет назад | |
CVE-2019-15695 TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | CVSS3: 7.2 | 3% Низкий | около 6 лет назад | |
CVE-2019-15695 TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflo ... | CVSS3: 7.2 | 3% Низкий | около 6 лет назад | |
BDU:2021-01411 Уязвимость функции CMsgReader::readSetCursor программного обеспечения VNC TigerVNC, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.2 | 3% Низкий | около 6 лет назад | |
openSUSE-SU-2020:0087-1 Security update for tigervnc | около 6 лет назад | |||
SUSE-SU-2020:1749-1 Security update for tigervnc | больше 5 лет назад | |||
SUSE-SU-2020:0266-1 Security update for tigervnc | около 6 лет назад | |||
SUSE-SU-2020:0159-1 Security update for tigervnc | около 6 лет назад | |||
SUSE-SU-2020:0113-1 Security update for tigervnc | около 6 лет назад | |||
SUSE-SU-2020:0112-1 Security update for tigervnc | около 6 лет назад | |||
ELSA-2020-3875 ELSA-2020-3875: tigervnc security and bug fix update (MODERATE) | больше 5 лет назад | |||
ELSA-2020-1497 ELSA-2020-1497: tigervnc security update (MODERATE) | почти 6 лет назад |
Уязвимостей на страницу