{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:41:23.708","vulnerabilities":[{"cve":{"id":"CVE-2019-15678","sourceIdentifier":"vulnerability@kaspersky.com","published":"2019-10-29T19:15:17.860","lastModified":"2024-11-21T04:29:14.710","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity."},{"lang":"es","value":"El código de TightVNC versión 1.3.10, contiene un desbordamiento del búfer de la pila en el manejador rfbServerCutText, lo que puede resultar potencialmente en una ejecución de código. Este ataque parece ser explotable por medio de la conectividad de red."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vulnerability@kaspersky.com","type":"Secondary","description":[{"lang":"en","value":"CWE-122"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tightvnc:tightvnc:1.3.10:*:*:*:*:*:*:*","matchCriteriaId":"37E2BF43-0B3B-4BDD-B145-62E7333F4A93"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-478893.pdf","source":"vulnerability@kaspersky.com"},{"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html","source":"vulnerability@kaspersky.com"},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-343-08","source":"vulnerability@kaspersky.com"},{"url":"https://www.openwall.com/lists/oss-security/2018/12/10/5","source":"vulnerability@kaspersky.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-478893.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-343-08","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.openwall.com/lists/oss-security/2018/12/10/5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]}]}}]}