libvncserver-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libvncserver-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Memory Leak

*
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.3
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.3
  • H
Heap-based Buffer Overflow

<0:0.9.11-15.el8_2.1
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • M
Stack-based Buffer Overflow

<0:0.9.11-14.el8
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • H
Heap-based Buffer Overflow

<0:0.9.11-9.el8_1.2
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Divide By Zero

<0:0.9.11-17.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Authentication

<0:0.9.11-14.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Improper Input Validation

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • M
Out-of-Bounds

<0:0.9.11-17.el8
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • H
Integer Overflow or Wraparound

<0:0.9.11-9.el8_1.2
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Buffer Overflow

<0:0.9.11-17.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Race Condition

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Improper Ownership Management

<0:0.9.11-14.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Information Exposure

<0:0.9.11-17.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Integer Overflow or Wraparound

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Information Exposure

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • M
Use After Free

*
  • L
Improper Initialization

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Improper Initialization

*