cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-15680,https://securityvulnerability.io/vulnerability/CVE-2019-15680,Denial of Service in TightVNC by Null Pointer Dereference,"TightVNC version 1.3.10 contains a vulnerability due to a null pointer dereference in the HandleZlibBPP function. This flaw can be exploited remotely, potentially resulting in a Denial of Service condition for affected systems. Users are advised to review their network configurations and security protocols to mitigate the risk of exploitation.",Kaspersky,Tightvnc,7.5,HIGH,0.00443999981507659,false,,false,false,false,,,false,false,,2019-10-29T16:45:52.000Z,0 CVE-2019-15679,https://securityvulnerability.io/vulnerability/CVE-2019-15679,Heap Buffer Overflow in TightVNC Affecting Code Version 1.3.10,"TightVNC version 1.3.10 is susceptible to a heap buffer overflow in the InitialiseRFBConnection function, potentially allowing attackers to execute arbitrary code. This vulnerability can be exploited remotely through network connections, posing serious security risks to systems running this version of TightVNC.",Kaspersky,Tightvnc,9.8,CRITICAL,0.01071999967098236,false,,false,false,false,,,false,false,,2019-10-29T16:45:04.000Z,0 CVE-2019-15678,https://securityvulnerability.io/vulnerability/CVE-2019-15678,Heap Buffer Overflow in TightVNC Remote Desktop Software,TightVNC version 1.3.10 is affected by a heap buffer overflow in the rfbServerCutText handler. This vulnerability may allow an attacker to execute arbitrary code on the target machine by exploiting the network connectivity. Proper security measures and updates are crucial to mitigate potential risks from this vulnerability.,Kaspersky,Tightvnc,9.8,CRITICAL,0.01071999967098236,false,,false,false,false,,,false,false,,2019-10-29T16:44:08.000Z,0 CVE-2019-8287,https://securityvulnerability.io/vulnerability/CVE-2019-8287,Global Buffer Overflow in TightVNC by GlavSoft,"The TightVNC application, specifically version 1.3.10 developed by GlavSoft, contains a vulnerability in the HandleCoRREBBP macro function that leads to a global buffer overflow. This flaw can be exploited remotely, potentially allowing an attacker to execute arbitrary code on systems running the affected software. Given its network accessibility, it poses significant risks to users who rely on TightVNC for remote desktop connections.",Kaspersky,Tightvnc,9.8,CRITICAL,0.015169999562203884,false,,false,false,false,,,false,false,,2019-10-29T16:43:30.000Z,0