NA

CVE-2023-27830

Published: 12/04/2023 Updated: 24/04/2023
CVSS v3 Base Score: 9 | Impact Score: 6 | Exploitability Score: 2.3
VMScore: 0

Vulnerability Summary

TightVNC before v2.8.75 allows malicious users to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tightvnc tightvnc