Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
att winvnc vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0971
Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box.
Tridia Tridiavnc 1.5.1
Tridia Tridiavnc 1.5.2
Att Winvnc Server 3.3.3 R7
Tridia Tridiavnc 1.5.4
Att Winvnc Server
Tightvnc Tightvnc 1.2.0
Tightvnc Tightvnc 1.2.1
Tightvnc Tightvnc 1.2.5
Tridia Tridiavnc 1.5
NA
CVE-2001-0167
Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and previous versions allows remote malicious users to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.
Att Winvnc
1 EDB exploit
NA
CVE-2001-0168
Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and previous versions allows remote malicious users to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.
Att Winvnc
1 EDB exploit
NA
CVE-2001-1422
WinVNC 3.3.3 and previous versions generates the same challenge string for multiple connections, which allows remote malicious users to bypass VNC authentication by sniffing the challenge and response of other users.
Att Winvnc
NA
CVE-2000-1164
WinVNC installs the WinVNC3 registry key with permissions that give Special Access (read and modify) to the Everybody group, which allows users to read and modify sensitive information such as passwords and gain access to the system.
Att Winvnc 3.3.3
Att Winvnc 3.3.3r7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started