cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-15680,https://securityvulnerability.io/vulnerability/CVE-2019-15680,,"TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.",Kaspersky,Tightvnc,7.5,HIGH,0.00443999981507659,false,false,false,false,,false,false,2019-10-29T16:45:52.000Z,0 CVE-2019-15679,https://securityvulnerability.io/vulnerability/CVE-2019-15679,,"TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.",Kaspersky,Tightvnc,9.8,CRITICAL,0.01071999967098236,false,false,false,false,,false,false,2019-10-29T16:45:04.000Z,0 CVE-2019-15678,https://securityvulnerability.io/vulnerability/CVE-2019-15678,,"TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.",Kaspersky,Tightvnc,9.8,CRITICAL,0.01071999967098236,false,false,false,false,,false,false,2019-10-29T16:44:08.000Z,0 CVE-2019-8287,https://securityvulnerability.io/vulnerability/CVE-2019-8287,,"TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.",Kaspersky,Tightvnc,9.8,CRITICAL,0.015169999562203884,false,false,false,false,,false,false,2019-10-29T16:43:30.000Z,0