Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tightvnc@1:1.3.10-7?distro=trixie
purl pkg:deb/debian/tightvnc@1:1.3.10-7?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (12)
Vulnerability Summary Aliases
VCID-1hmm-y54k-3uhm security update CVE-2014-6053
VCID-6kka-th48-w7bg security flaw CVE-2002-1336
VCID-bngs-4nkn-rbh1 Multiple vulnerabilities have been found in ssvnc, the worst of which could result in the arbitrary execution of code. CVE-2018-20022
VCID-du88-cbhp-rkcc Multiple vulnerabilities have been found in ssvnc, the worst of which could result in the arbitrary execution of code. CVE-2018-20021
VCID-efft-1f56-jqeq Multiple vulnerabilities have been found in LibVNCServer, the worst of which could result in the arbitrary execution of code. CVE-2018-7225
VCID-f36q-8kzn-2feb TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account. CVE-2023-27830
VCID-p8jd-v87m-fqfp TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity. CVE-2019-15679
VCID-q4eg-8ph7-nfer libvncserver: information disclosure and ASLR bypass CVE-2019-15681
VCID-qtxu-6h7h-p3h7 TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity. CVE-2019-15680
VCID-scrt-9r4x-tyb4 Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp. CVE-2009-0388
VCID-xu9q-7vz2-pkcc TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity. CVE-2019-15678
VCID-ytfy-ze1d-n7cp TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity. CVE-2019-8287

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:30:06.288650+00:00 Debian Importer Fixing VCID-6kka-th48-w7bg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:21:18.075999+00:00 Debian Importer Fixing VCID-scrt-9r4x-tyb4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:17:23.912022+00:00 Debian Importer Fixing VCID-f36q-8kzn-2feb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:13.042964+00:00 Debian Importer Fixing VCID-efft-1f56-jqeq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:34.797781+00:00 Debian Importer Fixing VCID-du88-cbhp-rkcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:54.515029+00:00 Debian Importer Fixing VCID-1hmm-y54k-3uhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:57.014040+00:00 Debian Importer Fixing VCID-qtxu-6h7h-p3h7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:34.625459+00:00 Debian Importer Fixing VCID-bngs-4nkn-rbh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:08.666907+00:00 Debian Importer Fixing VCID-q4eg-8ph7-nfer https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:30.786284+00:00 Debian Importer Fixing VCID-p8jd-v87m-fqfp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:21.222291+00:00 Debian Importer Fixing VCID-ytfy-ze1d-n7cp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:33.359644+00:00 Debian Importer Fixing VCID-xu9q-7vz2-pkcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:19:03.761724+00:00 Debian Importer Fixing VCID-6kka-th48-w7bg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:12:21.049279+00:00 Debian Importer Fixing VCID-scrt-9r4x-tyb4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:17.427369+00:00 Debian Importer Fixing VCID-f36q-8kzn-2feb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:32.646953+00:00 Debian Importer Fixing VCID-efft-1f56-jqeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:46.153619+00:00 Debian Importer Fixing VCID-du88-cbhp-rkcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:27.895728+00:00 Debian Importer Fixing VCID-1hmm-y54k-3uhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:27.681560+00:00 Debian Importer Fixing VCID-qtxu-6h7h-p3h7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:14.622735+00:00 Debian Importer Fixing VCID-bngs-4nkn-rbh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:32.471401+00:00 Debian Importer Fixing VCID-q4eg-8ph7-nfer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:02.767973+00:00 Debian Importer Fixing VCID-p8jd-v87m-fqfp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:34.440644+00:00 Debian Importer Fixing VCID-ytfy-ze1d-n7cp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:39.047908+00:00 Debian Importer Fixing VCID-xu9q-7vz2-pkcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:17.041662+00:00 Debian Importer Fixing VCID-f36q-8kzn-2feb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.996606+00:00 Debian Importer Fixing VCID-ytfy-ze1d-n7cp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.950293+00:00 Debian Importer Fixing VCID-q4eg-8ph7-nfer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.907072+00:00 Debian Importer Fixing VCID-qtxu-6h7h-p3h7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.852431+00:00 Debian Importer Fixing VCID-p8jd-v87m-fqfp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.805521+00:00 Debian Importer Fixing VCID-xu9q-7vz2-pkcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.764347+00:00 Debian Importer Fixing VCID-efft-1f56-jqeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.719675+00:00 Debian Importer Fixing VCID-bngs-4nkn-rbh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.673035+00:00 Debian Importer Fixing VCID-du88-cbhp-rkcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.632029+00:00 Debian Importer Fixing VCID-1hmm-y54k-3uhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.590438+00:00 Debian Importer Fixing VCID-scrt-9r4x-tyb4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:16.546423+00:00 Debian Importer Fixing VCID-6kka-th48-w7bg https://security-tracker.debian.org/tracker/data/json 38.1.0