CVE-2023-27830
12.04.2023, 15:15
TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.Enginsight
Vendor | Product | Version |
---|---|---|
tightvnc | tightvnc | 𝑥 < 2.8.75 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References