Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tightvnc tightvnc 1.2.4 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2002-1336
TightVNC prior to 1.2.6 generates the same challenge string for multiple connections, which allows remote malicious users to bypass VNC authentication by sniffing the challenge and response of other users.
Tightvnc Tightvnc 1.2.4
Tightvnc Tightvnc 1.2.5
Tightvnc Tightvnc 1.2.1
Tightvnc Tightvnc 1.2.3
Tightvnc Tightvnc 1.2.0
445
VMScore
CVE-2002-1511
The vncserver wrapper for vnc prior to 3.3.3r2-21 uses the rand() function instead of srand(), which causes vncserver to generate weak cookies.
Tightvnc Tightvnc 1.2.0
Tightvnc Tightvnc 1.2.1
Tightvnc Tightvnc 1.2.2
Tightvnc Tightvnc 1.2.3
Tightvnc Tightvnc 1.2.4
Att Vnc 3.3.4
Att Vnc 3.3.6
Att Vnc 3.3.3
Att Vnc 3.3.3r2
Att Vnc 3.3.5
Tightvnc Tightvnc 1.2.5
187
VMScore
CVE-2002-1848
TightVNC prior to 1.2.4 running on Windows stores unencrypted passwords in the password text control of the WinVNC Properties dialog, which could allow local users to access passwords.
Tightvnc Tightvnc 1.2.2
Tightvnc Tightvnc 1.2.3
Tightvnc Tightvnc 1.2
Tightvnc Tightvnc 1.2.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started