Description
ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://fluidattacks.com/advisories/sinatra/ |
|
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-08-03T04:36:06.608Z
Reserved: 2022-02-15T00:00:00.000Z
Link: CVE-2022-25226
No data.
Status : Modified
Published: 2022-04-18T17:15:16.693
Modified: 2024-11-21T06:51:50.393
Link: CVE-2022-25226
No data.
OpenCVE Enrichment
No data.
Weaknesses