Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
att winvnc vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2000-1164
WinVNC installs the WinVNC3 registry key with permissions that give Special Access (read and modify) to the Everybody group, which allows users to read and modify sensitive information such as passwords and gain access to the system.
Att Winvnc 3.3.3
Att Winvnc 3.3.3r7
668
VMScore
CVE-2001-1422
WinVNC 3.3.3 and previous versions generates the same challenge string for multiple connections, which allows remote malicious users to bypass VNC authentication by sniffing the challenge and response of other users.
Att Winvnc
765
VMScore
CVE-2001-0167
Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and previous versions allows remote malicious users to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.
Att Winvnc
1 EDB exploit
1000
VMScore
CVE-2001-0168
Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and previous versions allows remote malicious users to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.
Att Winvnc
1 EDB exploit
409
VMScore
CVE-2002-0971
Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box.
Tridia Tridiavnc 1.5.1
Tridia Tridiavnc 1.5.2
Att Winvnc Server 3.3.3 R7
Tridia Tridiavnc 1.5.4
Att Winvnc Server
Tightvnc Tightvnc 1.2.0
Tightvnc Tightvnc 1.2.1
Tightvnc Tightvnc 1.2.5
Tridia Tridiavnc 1.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started