Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tightvnc@1:1.3.10-10?distro=trixie
purl pkg:deb/debian/tightvnc@1:1.3.10-10?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (12)
Vulnerability Summary Aliases
VCID-1hmm-y54k-3uhm security update CVE-2014-6053
VCID-6kka-th48-w7bg security flaw CVE-2002-1336
VCID-bngs-4nkn-rbh1 Multiple vulnerabilities have been found in ssvnc, the worst of which could result in the arbitrary execution of code. CVE-2018-20022
VCID-du88-cbhp-rkcc Multiple vulnerabilities have been found in ssvnc, the worst of which could result in the arbitrary execution of code. CVE-2018-20021
VCID-efft-1f56-jqeq Multiple vulnerabilities have been found in LibVNCServer, the worst of which could result in the arbitrary execution of code. CVE-2018-7225
VCID-f36q-8kzn-2feb TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account. CVE-2023-27830
VCID-p8jd-v87m-fqfp TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity. CVE-2019-15679
VCID-q4eg-8ph7-nfer libvncserver: information disclosure and ASLR bypass CVE-2019-15681
VCID-qtxu-6h7h-p3h7 TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity. CVE-2019-15680
VCID-scrt-9r4x-tyb4 Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp. CVE-2009-0388
VCID-xu9q-7vz2-pkcc TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity. CVE-2019-15678
VCID-ytfy-ze1d-n7cp TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity. CVE-2019-8287

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:30:06.298710+00:00 Debian Importer Fixing VCID-6kka-th48-w7bg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:21:18.086376+00:00 Debian Importer Fixing VCID-scrt-9r4x-tyb4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:17:23.921798+00:00 Debian Importer Fixing VCID-f36q-8kzn-2feb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:13.053038+00:00 Debian Importer Fixing VCID-efft-1f56-jqeq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:34.809654+00:00 Debian Importer Fixing VCID-du88-cbhp-rkcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:54.524392+00:00 Debian Importer Fixing VCID-1hmm-y54k-3uhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:57.027349+00:00 Debian Importer Fixing VCID-qtxu-6h7h-p3h7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:34.638390+00:00 Debian Importer Fixing VCID-bngs-4nkn-rbh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:08.679477+00:00 Debian Importer Fixing VCID-q4eg-8ph7-nfer https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:30.800292+00:00 Debian Importer Fixing VCID-p8jd-v87m-fqfp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:21.234896+00:00 Debian Importer Fixing VCID-ytfy-ze1d-n7cp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:33.366606+00:00 Debian Importer Fixing VCID-xu9q-7vz2-pkcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:19:03.772169+00:00 Debian Importer Fixing VCID-6kka-th48-w7bg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:12:21.059991+00:00 Debian Importer Fixing VCID-scrt-9r4x-tyb4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:17.432674+00:00 Debian Importer Fixing VCID-f36q-8kzn-2feb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:32.653586+00:00 Debian Importer Fixing VCID-efft-1f56-jqeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:46.166215+00:00 Debian Importer Fixing VCID-du88-cbhp-rkcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:27.906877+00:00 Debian Importer Fixing VCID-1hmm-y54k-3uhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:27.696026+00:00 Debian Importer Fixing VCID-qtxu-6h7h-p3h7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:14.636223+00:00 Debian Importer Fixing VCID-bngs-4nkn-rbh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:32.478490+00:00 Debian Importer Fixing VCID-q4eg-8ph7-nfer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:02.779814+00:00 Debian Importer Fixing VCID-p8jd-v87m-fqfp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:34.454353+00:00 Debian Importer Fixing VCID-ytfy-ze1d-n7cp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:39.061515+00:00 Debian Importer Fixing VCID-xu9q-7vz2-pkcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:17.061394+00:00 Debian Importer Fixing VCID-f36q-8kzn-2feb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:17.020046+00:00 Debian Importer Fixing VCID-ytfy-ze1d-n7cp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.972699+00:00 Debian Importer Fixing VCID-q4eg-8ph7-nfer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.929860+00:00 Debian Importer Fixing VCID-qtxu-6h7h-p3h7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.876837+00:00 Debian Importer Fixing VCID-p8jd-v87m-fqfp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.828774+00:00 Debian Importer Fixing VCID-xu9q-7vz2-pkcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.783078+00:00 Debian Importer Fixing VCID-efft-1f56-jqeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.742401+00:00 Debian Importer Fixing VCID-bngs-4nkn-rbh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.696842+00:00 Debian Importer Fixing VCID-du88-cbhp-rkcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.652785+00:00 Debian Importer Fixing VCID-1hmm-y54k-3uhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.611523+00:00 Debian Importer Fixing VCID-scrt-9r4x-tyb4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.569190+00:00 Debian Importer Fixing VCID-6kka-th48-w7bg https://security-tracker.debian.org/tracker/data/json 38.1.0