Количество 14
Количество 14
GHSA-vmc8-ggh9-8p8j
TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15691
TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15691
TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15691
TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
CVE-2019-15691
TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-retu ...
BDU:2021-01414
Уязвимость декодера ZRLEDecoder программного обеспечения VNC TigerVNC, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
openSUSE-SU-2020:0087-1
Security update for tigervnc
SUSE-SU-2020:1749-1
Security update for tigervnc
SUSE-SU-2020:0266-1
Security update for tigervnc
SUSE-SU-2020:0159-1
Security update for tigervnc
SUSE-SU-2020:0113-1
Security update for tigervnc
SUSE-SU-2020:0112-1
Security update for tigervnc
ELSA-2020-3875
ELSA-2020-3875: tigervnc security and bug fix update (MODERATE)
ELSA-2020-1497
ELSA-2020-1497: tigervnc security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-vmc8-ggh9-8p8j TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | CVSS3: 7.2 | 4% Низкий | больше 3 лет назад | |
CVE-2019-15691 TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | CVSS3: 7.2 | 4% Низкий | около 6 лет назад | |
CVE-2019-15691 TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | CVSS3: 7.2 | 4% Низкий | около 6 лет назад | |
CVE-2019-15691 TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | CVSS3: 7.2 | 4% Низкий | около 6 лет назад | |
CVE-2019-15691 TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-retu ... | CVSS3: 7.2 | 4% Низкий | около 6 лет назад | |
BDU:2021-01414 Уязвимость декодера ZRLEDecoder программного обеспечения VNC TigerVNC, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.2 | 4% Низкий | около 6 лет назад | |
openSUSE-SU-2020:0087-1 Security update for tigervnc | около 6 лет назад | |||
SUSE-SU-2020:1749-1 Security update for tigervnc | больше 5 лет назад | |||
SUSE-SU-2020:0266-1 Security update for tigervnc | около 6 лет назад | |||
SUSE-SU-2020:0159-1 Security update for tigervnc | около 6 лет назад | |||
SUSE-SU-2020:0113-1 Security update for tigervnc | около 6 лет назад | |||
SUSE-SU-2020:0112-1 Security update for tigervnc | около 6 лет назад | |||
ELSA-2020-3875 ELSA-2020-3875: tigervnc security and bug fix update (MODERATE) | больше 5 лет назад | |||
ELSA-2020-1497 ELSA-2020-1497: tigervnc security update (MODERATE) | почти 6 лет назад |
Уязвимостей на страницу