Download
| Alert*
oval:org.secpod.oval:def:59562
The host is installed with TightVnc 1.3.10 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle the rfbServerCutText handler. Successful exploitation could allow attackers to perform code execution. oval:org.secpod.oval:def:89003304 This update for tightvnc fixes the following issues: - CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection which might lead to code execution . - CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which might lead to code execution . - CVE-2019-15680: Fixed a null ... |