[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:43370
UltraVNC (64 bit) is installed

oval:org.secpod.oval:def:53970
The host is installed with UltraVNC 1.2.0.3 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to handle an issue in RAW decoder. Successful exploitation could allow attackers to cause code execution via network connectivity.

oval:org.secpod.oval:def:53962
The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer handler in VNC server code. Successful exploitation could allow attackers to cause code execution.

oval:org.secpod.oval:def:53973
The host is installed with UltraVNC 1.1.9.9 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle a multiplication overflow in RRE decoder. Successful exploitation could allow attackers to cause information disclosure.

oval:org.secpod.oval:def:53963
The host is installed with UltraVNC 1.2.1.0 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle issues in ultradecoder in VNC client code. Successful exploitation could allow attackers to cause denial-of-service.

oval:org.secpod.oval:def:53974
The host is installed with UltraVNC 1.1.9.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle multiple memory leaks in VNC client code. Successful exploitation could allow attackers to read stack memory and obtain sensitive informati ...

oval:org.secpod.oval:def:53960
The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer request handler. Successful exploitation could allow remote attackers to cause code execution.

oval:org.secpod.oval:def:53971
The host is installed with UltraVNC 1.2.0.3 and is prone to multiple heap buffer overflow vulnerabilities. A flaw is present in the application, which fails to handle an issue in Ultra decoder. Successful exploitation could allow attackers to cause code execution via network connectivity.

oval:org.secpod.oval:def:53961
The host is installed with UltraVNC 1.2.1.1 and is prone to multiple off-by-one vulnerabilities. A flaw is present in the application, which fails to handle issues in VNC Server code. Successful exploitation could allow remote attackers to cause code execution.

oval:org.secpod.oval:def:53972
The host is installed with UltraVNC 1.1.9.9 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle a multiplication overflow in CoRRE decoder. Successful exploitation could allow attackers to cause information disclosure.

oval:org.secpod.oval:def:53955
The host is installed with UltraVNC 1.2.0.3 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to handle an issue in RAW decoder. Successful exploitation could allow attackers to cause code execution via network connectivity.

oval:org.secpod.oval:def:53966
The host is installed with UltraVNC 1.2.0.7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle issues in TextChat module in VNC client code. Successful exploitation could allow attackers to cause denial-of-service.

oval:org.secpod.oval:def:53956
The host is installed with UltraVNC 1.2.1.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle memory leaks in VNC server code. Successful exploitation could allow attackers to read stack memory and can be abused for information discl ...

oval:org.secpod.oval:def:53967
The host is installed with UltraVNC 1.2.0.7 and is prone to multiple out-of-bounds access vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of ClientConnection::CopyBuffer function connected to VNC client code. Successful exploitation could allow attacker ...

oval:org.secpod.oval:def:53964
The host is installed with UltraVNC 1.2.0.6 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in FileTransfer module in VNC client code. Successful exploitation could allow attackers to cause denial-of-service.

oval:org.secpod.oval:def:53975
The host is installed with UltraVNC 1.1.9.8 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to an issue in VNC client code. Successful exploitation could allow attackers to cause code execution.

oval:org.secpod.oval:def:53965
The host is installed with UltraVNC 1.2.0.6 and is prone to multiple off-by-one vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of ClientConnection::ReadString function connected to VNC client code. Successful exploitation could allow attackers to cause ...

oval:org.secpod.oval:def:53976
The host is installed with UltraVNC 1.1.9.8 and is prone to a buffer underflow vulnerability. A flaw is present in the application, which fails to an issue in VNC client code. Successful exploitation could allow attackers to cause code execution.

oval:org.secpod.oval:def:53959
The host is installed with UltraVNC 1.2.1.1 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in file transfer offer handler. Successful exploitation could allow remote attackers to cause code execution.

oval:org.secpod.oval:def:53957
The host is installed with UltraVNC 1.2.1.1 and is prone to a stack buffer overflow vulnerability. A flaw is present in the application, which fails to handle memory leaks in VNC server code. Successful exploitation could allow attackers to cause a denial of service.

oval:org.secpod.oval:def:53968
The host is installed with UltraVNC 1.2.0.7 and is prone to multiple out-of-bounds access vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of SETPIXELS macro in VNC client code. Successful exploitation could allow attackers to cause code execution.

oval:org.secpod.oval:def:53958
The host is installed with UltraVNC 1.2.1.1 and is prone to a null termination vulnerability. A flaw is present in the application, which fails to handle issues in VNC server code. Successful exploitation could allow remote attackers to access out-of-bound data.

oval:org.secpod.oval:def:53969
The host is installed with UltraVNC 1.2.0.3 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to handle an issue in Ultra2 decoder. Successful exploitation could allow attackers to cause code execution via network connectivity.

oval:org.secpod.oval:def:79250
The host is installed with UltraVNC before 1.3.8.0 and is prone to local privelege escalation vulnerability. A flaw is present in the application, which fails to handle issues in DSM plugin module. Successful exploitation could allow attackers to achieve local privilege escalation on a vulnerable sy ...

*CPE
cpe:/a:ultravnc:ultravnc:::x64

© SecPod Technologies