Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-31566 | TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account. |
Sat, 08 Feb 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-08T02:40:24.901Z
Reserved: 2023-03-05T00:00:00.000Z
Link: CVE-2023-27830
Updated: 2024-08-02T12:23:29.465Z
Status : Modified
Published: 2023-04-12T15:15:12.830
Modified: 2025-02-08T03:15:10.200
Link: CVE-2023-27830
No data.
OpenCVE Enrichment
No data.
EUVD