{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T23:55:49.309","vulnerabilities":[{"cve":{"id":"CVE-2019-8277","sourceIdentifier":"vulnerability@kaspersky.com","published":"2019-03-08T23:29:00.967","lastModified":"2024-11-21T04:49:38.077","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212."},{"lang":"es","value":"La revisión 1211 de UltraVNC contiene múltiples fugas de memoria en el código del servidor VNC, un atacante podría leer la pila de memoria pudiendo revelar información. Combinado con otra vulnerabilidad podría realizar una fuga de información y saltarse el ASLR. Este ataque parece poder realizarse a través de conexión de red. La vulnerabilidad ha sido solucionada en la revisión 1212."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vulnerability@kaspersky.com","type":"Secondary","description":[{"lang":"en","value":"CWE-665"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-665"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.2.3","matchCriteriaId":"555D034F-3D64-4ED1-9B63-F8D59199E99C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:sinumerik_access_mymachine\\/p2p:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8","matchCriteriaId":"D9345335-DF62-4472-93CD-E2C85453F91E"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:sinumerik_pcu_base_win10_software\\/ipc:*:*:*:*:*:*:*:*","versionEndExcluding":"14.00","matchCriteriaId":"7498412D-79FD-43FE-AD9B-5820FB5CF7D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:sinumerik_pcu_base_win7_software\\/ipc:*:*:*:*:*:*:*:*","versionEndIncluding":"12.01","matchCriteriaId":"1F603341-03C5-46CA-8A74-EC5A50135194"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf","source":"vulnerability@kaspersky.com"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf","source":"vulnerability@kaspersky.com","tags":["Third Party Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf","source":"vulnerability@kaspersky.com"},{"url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/","source":"vulnerability@kaspersky.com","tags":["Third Party Advisory"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11","source":"vulnerability@kaspersky.com"},{"url":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06","source":"vulnerability@kaspersky.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}