ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://fluidattacks.com/advisories/sinatra/ |
|
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-08-03T04:36:06.608Z
Reserved: 2022-02-15T00:00:00
Link: CVE-2022-25226
No data.
Status : Modified
Published: 2022-04-18T17:15:16.693
Modified: 2024-11-21T06:51:50.393
Link: CVE-2022-25226
No data.
OpenCVE Enrichment
No data.
Weaknesses