Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vnc vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-8272
UltraVNC revision 1211 has multiple off-by-one vulnerabilities in VNC server code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
Uvnc Ultravnc
Siemens Sinumerik Access Mymachine\\/p2p
Siemens Sinumerik Pcu Base Win10 Software\\/ipc
Siemens Sinumerik Pcu Base Win7 Software\\/ipc
9.8
CVSSv3
CVE-2019-8260
UltraVNC revision 1199 has a out-of-bounds read vulnerability in VNC client RRE decoder code, caused by multiplication overflow. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1200.
Uvnc Ultravnc
9.8
CVSSv3
CVE-2019-8261
UltraVNC revision 1199 has a out-of-bounds read vulnerability in VNC code inside client CoRRE decoder, caused by multiplication overflow. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1200.
Uvnc Ultravnc
9.8
CVSSv3
CVE-2019-8262
UltraVNC revision 1203 has multiple heap buffer overflow vulnerabilities in VNC client code inside Ultra decoder, which results in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1204.
Uvnc Ultravnc
Siemens Sinumerik Access Mymachine\\/p2p
Siemens Sinumerik Pcu Base Win10 Software\\/ipc
Siemens Sinumerik Pcu Base Win7 Software\\/ipc
9.8
CVSSv3
CVE-2019-8280
UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside RAW decoder, which can potentially result code execution. This attack appear to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204.
Uvnc Ultravnc
9.8
CVSSv3
CVE-2019-8264
UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside Ultra2 decoder, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204.
Uvnc Ultravnc
NA
CVE-2014-8750
Race condition in the VMware driver in OpenStack Compute (Nova) prior to 2014.1.4 and 2014.2 prior to 2014.2rc1 allows remote authenticated users to access unintended consoles by spawning an instance that triggers the same VNC port to be allocated to two different instances.
Openstack Nova
Openstack Nova 2014.2
NA
CVE-2008-5660
Format string vulnerability in the vinagre_utils_show_error function (src/vinagre-utils.c) in Vinagre 0.5.x prior to 0.5.2 and 2.x prior to 2.24.2 might allow remote malicious users to execute arbitrary code via format string specifiers in a crafted URI or VNC server response.
Gnome Vinagre 2.23.1
Gnome Vinagre 2.23.2
Gnome Vinagre 2.24.1
Gnome Vinagre 0.5.0
Gnome Vinagre 2.23.4
Gnome Vinagre 2.23.90
Gnome Vinagre 2.23.3
Gnome Vinagre 2.23.3.1
Gnome Vinagre 0.5.1
Gnome Vinagre 2.23.92
Gnome Vinagre 2.23.91
Gnome Vinagre 2.24.0
1 EDB exploit
NA
CVE-2011-1775
The CSecurityTLS::processMsg function in common/rfb/CSecurityTLS.cxx in the vncviewer component in TigerVNC 1.1beta1 does not properly verify the server's X.509 certificate, which allows man-in-the-middle malicious users to spoof a TLS VNC server via an arbitrary certificate...
Tigervnc Tigervnc 1.1
9.8
CVSSv3
CVE-2019-8271
UltraVNC revision 1211 has a heap buffer overflow vulnerability in VNC server code inside file transfer handler, which can potentially result code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
Uvnc Ultravnc
Siemens Sinumerik Access Mymachine\\/p2p
Siemens Sinumerik Pcu Base Win10 Software\\/ipc
Siemens Sinumerik Pcu Base Win7 Software\\/ipc
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »