TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.
Metrics
Affected Vendors & Products
References
History
Sat, 08 Feb 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-08T02:40:24.901Z
Reserved: 2023-03-05T00:00:00.000Z
Link: CVE-2023-27830

Updated: 2024-08-02T12:23:29.465Z

Status : Modified
Published: 2023-04-12T15:15:12.830
Modified: 2025-02-08T03:15:10.200
Link: CVE-2023-27830

No data.