cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-15695,https://securityvulnerability.io/vulnerability/CVE-2019-15695,Stack Buffer Overflow Vulnerability in TigerVNC Software by TigerVNC,"TigerVNC, an open-source implementation of VNC server and client, is prone to a stack buffer overflow vulnerability in versions prior to 1.10.1. The flaw arises from inadequate sanitization of the PixelFormat data in CMsgReader::readSetCursor function. This weakness allows an attacker to manipulate the buffer offset during network connectivity, leading to potential remote code execution. Proper updating to version 1.10.1 or later is crucial to mitigate this risk.",Kaspersky,Tigervnc,7.2,HIGH,0.0040799998678267,false,,false,false,false,,,false,false,,2019-12-26T15:24:00.000Z,0 CVE-2019-15694,https://securityvulnerability.io/vulnerability/CVE-2019-15694,Heap Buffer Overflow in TigerVNC Versions Prior to 1.10.1,"TigerVNC versions prior to 1.10.1 are affected by a heap buffer overflow vulnerability that occurs within the DecodeManager::decodeRect function. This security flaw arises from a signedness error during the processing of MemOutStream, which could allow an attacker to exploit the vulnerability through network connectivity. Successful exploitation may lead to remote code execution, posing significant risks to affected systems.",Kaspersky,Tigervnc,7.2,HIGH,0.0037799999117851257,false,,false,false,false,,,false,false,,2019-12-26T14:59:01.000Z,0 CVE-2019-15693,https://securityvulnerability.io/vulnerability/CVE-2019-15693,Heap Buffer Overflow in TigerVNC Prior to 1.10.1,"TigerVNC prior to version 1.10.1 contains a heap buffer overflow vulnerability in the TightDecoder::FilterGradient function. This flaw can be exploited over a network, potentially allowing an attacker to execute arbitrary code remotely, compromising the security of affected systems. Users are encouraged to upgrade to the latest version to mitigate this risk.",Kaspersky,Tigervnc,7.2,HIGH,0.0029899999499320984,false,,false,false,false,,,false,false,,2019-12-26T14:57:33.000Z,0 CVE-2019-15692,https://securityvulnerability.io/vulnerability/CVE-2019-15692,Heap Buffer Overflow Vulnerability in TigerVNC Software by Cendio,"TigerVNC versions earlier than 1.10.1 are susceptible to a heap buffer overflow, stemming from inadequate value checks within the CopyRectDecoder function. This vulnerability could be exploited remotely, potentially allowing attackers to execute arbitrary code on affected systems through network connectivity.",Kaspersky,Tigervnc,7.2,HIGH,0.0029899999499320984,false,,false,false,false,,,false,false,,2019-12-26T14:55:47.000Z,0 CVE-2019-15691,https://securityvulnerability.io/vulnerability/CVE-2019-15691,Stack Use-After-Return Vulnerability in TigerVNC,"TigerVNC versions prior to 1.10.1 are affected by a stack use-after-return vulnerability due to improper handling of stack memory in the ZRLEDecoder. When the decoding routine encounters an exception, it may attempt to access a stack variable that has already been deallocated during stack unwinding. This flaw could allow an attacker to execute arbitrary code remotely, especially if exploited over a network connection.",Kaspersky,Tigervnc,7.2,HIGH,0.008349999785423279,false,,false,false,false,,,false,false,,2019-12-26T14:52:46.000Z,0