Description
ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:47:13.477Z
Reserved: 2019-10-16T00:00:00.000Z
Link: CVE-2019-17662
No data.
Status : Modified
Published: 2019-10-16T18:15:25.513
Modified: 2024-11-21T04:32:43.637
Link: CVE-2019-17662
No data.
OpenCVE Enrichment
No data.