Search for packages
| purl | pkg:deb/debian/tightvnc@1:1.3.9-9.1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1hmm-y54k-3uhm | security update |
CVE-2014-6053
|
| VCID-bngs-4nkn-rbh1 | Multiple vulnerabilities have been found in ssvnc, the worst of which could result in the arbitrary execution of code. |
CVE-2018-20022
|
| VCID-du88-cbhp-rkcc | Multiple vulnerabilities have been found in ssvnc, the worst of which could result in the arbitrary execution of code. |
CVE-2018-20021
|
| VCID-efft-1f56-jqeq | Multiple vulnerabilities have been found in LibVNCServer, the worst of which could result in the arbitrary execution of code. |
CVE-2018-7225
|
| VCID-p8jd-v87m-fqfp | TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity. |
CVE-2019-15679
|
| VCID-q4eg-8ph7-nfer | libvncserver: information disclosure and ASLR bypass |
CVE-2019-15681
|
| VCID-qtxu-6h7h-p3h7 | TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity. |
CVE-2019-15680
|
| VCID-xu9q-7vz2-pkcc | TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity. |
CVE-2019-15678
|
| VCID-ytfy-ze1d-n7cp | TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity. |
CVE-2019-8287
|