Количество 5
Количество 5
CVE-2023-27830
TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.
CVE-2023-27830
TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.
CVE-2023-27830
TightVNC before v2.8.75 allows attackers to escalate privileges on the ...
GHSA-w347-2542-wgjq
TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.
BDU:2023-06396
Уязвимость системы удалённого доступа к рабочему столу компьютера TightVNC, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-27830 TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account. | CVSS3: 9 | 0% Низкий | почти 3 года назад | |
CVE-2023-27830 TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account. | CVSS3: 9 | 0% Низкий | почти 3 года назад | |
CVE-2023-27830 TightVNC before v2.8.75 allows attackers to escalate privileges on the ... | CVSS3: 9 | 0% Низкий | почти 3 года назад | |
GHSA-w347-2542-wgjq TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account. | CVSS3: 9 | 0% Низкий | почти 3 года назад | |
BDU:2023-06396 Уязвимость системы удалённого доступа к рабочему столу компьютера TightVNC, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии | CVSS3: 9 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу