Логотип exploitDog
bind:CVE-2022-25226
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-25226

Количество 2

Количество 2

nvd логотип

CVE-2022-25226

почти 4 года назад

ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.

CVSS3: 10
EPSS: Высокий
github логотип

GHSA-mvv3-c6h9-hj2q

почти 4 года назад

ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.

CVSS3: 10
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-25226

ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.

CVSS3: 10
77%
Высокий
почти 4 года назад
github логотип
GHSA-mvv3-c6h9-hj2q

ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.

CVSS3: 10
77%
Высокий
почти 4 года назад

Уязвимостей на страницу