tigervnc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tigervnc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-Bounds

<0:1.14.1-1.el9_5.1
  • H
Out-of-bounds Write

<0:1.14.1-1.el9_5.1
  • H
Access of Uninitialized Pointer

<0:1.14.1-1.el9_5.1
  • H
Out-of-bounds Write

<0:1.14.1-1.el9_5.1
  • H
Use After Free

<0:1.14.1-1.el9_5.1
  • H
Use After Free

<0:1.14.1-1.el9_5.1
  • H
Use After Free

<0:1.14.1-1.el9_5.1
  • H
Out-of-bounds Write

<0:1.14.1-1.el9_5.1
  • H
Heap-based Buffer Overflow

<0:1.14.1-1.el9_5
  • H
Use After Free

<0:1.13.1-8.el9_4.3
  • H
Buffer Over-read

<0:1.13.1-8.el9_4.3
  • H
Buffer Over-read

<0:1.13.1-8.el9_4.3
  • H
Use After Free

<0:1.13.1-8.el9
  • H
Use After Free

<0:1.13.1-8.el9
  • H
Heap-based Buffer Overflow

<0:1.13.1-3.el9_3.6
  • H
Out-of-bounds Write

<0:1.13.1-3.el9_3.6
  • H
Heap-based Buffer Overflow

<0:1.13.1-3.el9_3.6
  • H
Out-of-bounds Write

<0:1.13.1-3.el9_3.6
  • H
Out-of-bounds Read

<0:1.13.1-3.el9_3.3
  • H
Integer Overflow or Wraparound

<0:1.13.1-3.el9_3.3
  • H
Out-of-bounds Write

<0:1.13.1-3.el9_3.3
  • H
Use After Free

<0:1.12.0-5.el9_1.2
  • H
Use After Free

<0:1.12.0-5.el9_1.1
  • M
Out-of-bounds Write

<0:1.12.0-13.el9_2
  • M
Use After Free

<0:1.12.0-13.el9_2
  • M
Use After Free

<0:1.12.0-13.el9_2
  • M
Out-of-bounds Read

<0:1.12.0-13.el9_2
  • M
Out-of-bounds Write

<0:1.12.0-13.el9_2
  • M
Use After Free

<0:1.12.0-13.el9_2