Libvnc Libvncserver vulnerabilities
3 known vulnerabilities affecting libvnc/libvncserver.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2026-32854MEDIUMCVSS 6.3≤ 0.9.152026-03-24
CVE-2026-32854 [MEDIUM] CWE-476 CVE-2026-32854: LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vu
LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in th
cvelistv5nvd
CVE-2026-32853MEDIUMCVSS 6.9≤ 0.9.152026-03-24
CVE-2026-32853 [MEDIUM] CWE-125 CVE-2026-32853: LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read v
LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle head
cvelistv5nvd
CVE-2019-15690HIGHCVSS 8.8≥ *, ≤ 0.9.122025-01-24
CVE-2019-15690 [HIGH] CWE-122 CVE-2019-15690: LibVNCServer 0
LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution.
Timeline: 2020-03-23: Advisory published by Kaspersky
cvelistv5