Download
| Alert*
oval:org.secpod.oval:def:43370
UltraVNC (64 bit) is installed oval:org.secpod.oval:def:53970 The host is installed with UltraVNC 1.2.0.3 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to handle an issue in RAW decoder. Successful exploitation could allow attackers to cause code execution via network connectivity. oval:org.secpod.oval:def:53962 The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer handler in VNC server code. Successful exploitation could allow attackers to cause code execution. oval:org.secpod.oval:def:53973 The host is installed with UltraVNC 1.1.9.9 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle a multiplication overflow in RRE decoder. Successful exploitation could allow attackers to cause information disclosure. oval:org.secpod.oval:def:53963 The host is installed with UltraVNC 1.2.1.0 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle issues in ultradecoder in VNC client code. Successful exploitation could allow attackers to cause denial-of-service. oval:org.secpod.oval:def:53974 The host is installed with UltraVNC 1.1.9.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle multiple memory leaks in VNC client code. Successful exploitation could allow attackers to read stack memory and obtain sensitive informati ... oval:org.secpod.oval:def:53960 The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer request handler. Successful exploitation could allow remote attackers to cause code execution. oval:org.secpod.oval:def:53971 The host is installed with UltraVNC 1.2.0.3 and is prone to multiple heap buffer overflow vulnerabilities. A flaw is present in the application, which fails to handle an issue in Ultra decoder. Successful exploitation could allow attackers to cause code execution via network connectivity. oval:org.secpod.oval:def:53961 The host is installed with UltraVNC 1.2.1.1 and is prone to multiple off-by-one vulnerabilities. A flaw is present in the application, which fails to handle issues in VNC Server code. Successful exploitation could allow remote attackers to cause code execution. oval:org.secpod.oval:def:53972 The host is installed with UltraVNC 1.1.9.9 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle a multiplication overflow in CoRRE decoder. Successful exploitation could allow attackers to cause information disclosure. oval:org.secpod.oval:def:53955 The host is installed with UltraVNC 1.2.0.3 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to handle an issue in RAW decoder. Successful exploitation could allow attackers to cause code execution via network connectivity. oval:org.secpod.oval:def:53966 The host is installed with UltraVNC 1.2.0.7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle issues in TextChat module in VNC client code. Successful exploitation could allow attackers to cause denial-of-service. oval:org.secpod.oval:def:53956 The host is installed with UltraVNC 1.2.1.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle memory leaks in VNC server code. Successful exploitation could allow attackers to read stack memory and can be abused for information discl ... oval:org.secpod.oval:def:53967 The host is installed with UltraVNC 1.2.0.7 and is prone to multiple out-of-bounds access vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of ClientConnection::CopyBuffer function connected to VNC client code. Successful exploitation could allow attacker ... oval:org.secpod.oval:def:53964 The host is installed with UltraVNC 1.2.0.6 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in FileTransfer module in VNC client code. Successful exploitation could allow attackers to cause denial-of-service. oval:org.secpod.oval:def:53975 The host is installed with UltraVNC 1.1.9.8 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to an issue in VNC client code. Successful exploitation could allow attackers to cause code execution. oval:org.secpod.oval:def:53965 The host is installed with UltraVNC 1.2.0.6 and is prone to multiple off-by-one vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of ClientConnection::ReadString function connected to VNC client code. Successful exploitation could allow attackers to cause ... oval:org.secpod.oval:def:53976 The host is installed with UltraVNC 1.1.9.8 and is prone to a buffer underflow vulnerability. A flaw is present in the application, which fails to an issue in VNC client code. Successful exploitation could allow attackers to cause code execution. oval:org.secpod.oval:def:53959 The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer offer handler. Successful exploitation could allow remote attackers to cause code execution. oval:org.secpod.oval:def:53957 The host is installed with UltraVNC 1.2.1.1 and is prone to a stack buffer overflow vulnerability. A flaw is present in the application, which fails to handle memory leaks in VNC server code. Successful exploitation could allow attackers to cause a denial of service. oval:org.secpod.oval:def:53968 The host is installed with UltraVNC 1.2.0.7 and is prone to multiple out-of-bounds access vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of SETPIXELS macro in VNC client code. Successful exploitation could allow attackers to cause code execution. oval:org.secpod.oval:def:53958 The host is installed with UltraVNC 1.2.1.1 and is prone to a null termination vulnerability. A flaw is present in the application, which fails to handle issues in VNC server code. Successful exploitation could allow remote attackers to access out-of-bound data. oval:org.secpod.oval:def:53969 The host is installed with UltraVNC 1.2.0.3 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to handle an issue in Ultra2 decoder. Successful exploitation could allow attackers to cause code execution via network connectivity. oval:org.secpod.oval:def:79250 The host is installed with UltraVNC before 1.3.8.0 and is prone to local privelege escalation vulnerability. A flaw is present in the application, which fails to handle issues in DSM plugin module. Successful exploitation could allow attackers to achieve local privilege escalation on a vulnerable sy ... |