The host is installed with UltraVNC 1.2.1.1 and is prone to a null termination vulnerability. A flaw is present in the application, which fails to handle issues in VNC server code. Successful exploitation could allow remote attackers to access out-of-bound data.
The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer offer handler. Successful exploitation could allow remote attackers to cause code execution.
The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer request handler. Successful exploitation could allow remote attackers to cause code execution.
The host is installed with UltraVNC 1.2.1.1 and is prone to multiple off-by-one vulnerabilities. A flaw is present in the application, which fails to handle issues in VNC Server code. Successful exploitation could allow remote attackers to cause code execution.
The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer handler in VNC server code. Successful exploitation could allow attackers to cause code execution.
The host is installed with UltraVNC 1.2.1.0 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle issues in ultradecoder in VNC client code. Successful exploitation could allow attackers to cause denial-of-service.
The host is installed with UltraVNC 1.2.0.6 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in FileTransfer module in VNC client code. Successful exploitation could allow attackers to cause denial-of-service.
The host is installed with UltraVNC 1.2.0.6 and is prone to multiple off-by-one vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of ClientConnection::ReadString function connected to VNC client code. Successful exploitation could allow attackers to cause code execution.
The host is installed with UltraVNC 1.2.0.7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle issues in TextChat module in VNC client code. Successful exploitation could allow attackers to cause denial-of-service.
The host is installed with UltraVNC 1.2.0.7 and is prone to multiple out-of-bounds access vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of ClientConnection::CopyBuffer function connected to VNC client code. Successful exploitation could allow attackers to cause code execution.