Vulnerabilities > Realvnc
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-09-30 | CVE-2022-41975 | Unspecified vulnerability in Realvnc VNC Server and VNC Viewer RealVNC VNC Server before 6.11.0 and VNC Viewer before 6.22.826 on Windows allow local privilege escalation via MSI installer Repair mode. | 7.8 |
2022-06-10 | CVE-2022-27502 | Unspecified vulnerability in Realvnc VNC Server RealVNC VNC Server 6.9.0 through 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM. | 7.2 |
2021-09-17 | CVE-2021-41380 | Improper Input Validation vulnerability in Realvnc VNC Viewer 6.21.406 RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. | 6.5 |
2013-12-28 | CVE-2013-6886 | Permissions, Privileges, and Access Controls vulnerability in Realvnc 5.0.6 RealVNC VNC 5.0.6 on Mac OS X, Linux, and UNIX allows local users to gain privileges via a crafted argument to the (1) vncserver, (2) vncserver-x11, or (3) Xvnc helper. | 7.2 |
2009-01-16 | CVE-2008-4770 | Improper Input Validation vulnerability in Realvnc The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to "encoding type." | 10.0 |
2008-08-06 | CVE-2008-3493 | Improper Input Validation vulnerability in Realvnc Windows Client 4.1.2.0 vncviewer.exe in RealVNC Windows Client 4.1.2.0 allows remote VNC servers to cause a denial of service (application crash) via a crafted frame buffer update packet. | 5.0 |