CVE-2023-47250
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In mprivacy-tools before 2.0.406g in m-privacy TightGate-Pro Server, broken Access Control on X11 server sockets allows authenticated attackers (with access to a VNC session) to access the X11 desktops of other users by specifying their DISPLAY ID. This allows complete control of their desktop, including the ability to inject keystrokes and perform a keylogging attack.
| Vendor | n/a |
| Product | n/a |
| Published | Nov 22, 2023 |
| Last Updated | Aug 2, 2024 |
Stay Ahead of the Next One
Get instant alerts for n/a n/a
Be the first to know when new unknown vulnerabilities affecting n/a n/a are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
n/a / n/a
n/a
References
sec-consult.com: https://sec-consult.com/en/vulnerability-lab/advisories/index.html m-privacy.de: https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ sec-consult.com: https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ seclists.org: http://seclists.org/fulldisclosure/2023/Nov/13 packetstormsecurity.com: http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html