Download
| Alert*
oval:org.secpod.oval:def:64081
libvncserver: vnc server library Several security issues were fixed in LibVNCServer. oval:org.secpod.oval:def:64165 libvncserver: vnc server library Several security issues were fixed in LibVNCServer. oval:org.secpod.oval:def:89003304 This update for tightvnc fixes the following issues: - CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection which might lead to code execution . - CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which might lead to code execution . - CVE-2019-15680: Fixed a null ... oval:org.secpod.oval:def:59560 The host is installed with TightVnc 1.3.10 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to handle the HandleZlibBPP function. Successful exploitation could allow attackers to perform denial of system (DoS). oval:org.secpod.oval:def:2004750 TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System . This attack appear to be exploitable via network connectivity. oval:org.secpod.oval:def:64171 libvncserver: vnc server library Several security issues were fixed in LibVNCServer. oval:org.secpod.oval:def:705527 libvncserver: vnc server library Several security issues were fixed in LibVNCServer. |