Download
| Alert*
oval:org.secpod.oval:def:47527
The host is installed with Teamviewer 10.x through 13.x and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle brute-force authentication. Successful exploitation allows attackers to determine the correct value of the default 4-digit PIN. oval:org.secpod.oval:def:58719 The host is installed with Teamviewer 14.2.2558 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in Teamviewer.exe. Successful exploitation allows local attackers to obtain administrative credentials in order to elevate privil ... oval:org.secpod.oval:def:54502 The host is installed with Teamviewer through 13.1.1548 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an issue in the unicode format in which the password is stored. Successful exploitation allows attackers to obtain sensitive in ... oval:org.mitre.oval:def:6773 Untrusted search path vulnerability in TeamViewer 5.0.8703 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .tvs or .tvc file. oval:org.secpod.oval:def:64756 The host is installed with TeamViewer versions before 8.x before 8.0.258861, 9.x before 9.0.258860, 10.x before 10.0.258873, 11.x before 11.0.258870, 12.x before 12.0.258869, 13.x before 13.2.36220, 14.x before 14.7.48350 or 15.x before 15.8.3 and is prone to an improper URL handling vulnerability. ... oval:org.mitre.oval:def:7018 TeamViewer is installed (32 bit) |