tigervnc-server-applet vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tigervnc-server-applet package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Heap-based Buffer Overflow

<0:1.9.0-15.el8_2.12
  • H
Use After Free

<0:1.9.0-15.el8_2.11
  • H
Buffer Over-read

<0:1.9.0-15.el8_2.11
  • H
Buffer Over-read

<0:1.9.0-15.el8_2.11
  • H
Use After Free

<0:1.9.0-15.el8_2.11
  • H
Buffer Over-read

<0:1.9.0-15.el8_2.11
  • H
Buffer Over-read

<0:1.9.0-15.el8_2.11
  • H
Use After Free

<0:1.9.0-15.el8_2.11
  • H
Buffer Over-read

<0:1.9.0-15.el8_2.11
  • H
Buffer Over-read

<0:1.9.0-15.el8_2.11
  • H
Heap-based Buffer Overflow

<0:1.9.0-15.el8_2.9
  • H
Heap-based Buffer Overflow

<0:1.9.0-15.el8_2.9
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.9
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.9
  • H
Heap-based Buffer Overflow

<0:1.9.0-15.el8_2.9
  • H
Heap-based Buffer Overflow

<0:1.9.0-15.el8_2.9
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.9
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.9
  • H
Heap-based Buffer Overflow

<0:1.9.0-15.el8_2.9
  • H
Heap-based Buffer Overflow

<0:1.9.0-15.el8_2.9
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.9
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.9
  • H
Integer Overflow or Wraparound

<0:1.9.0-15.el8_2.6
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.6
  • H
Integer Overflow or Wraparound

<0:1.9.0-15.el8_2.6
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.6
  • H
Integer Overflow or Wraparound

<0:1.9.0-15.el8_2.6
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.6
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.4
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.4
  • H
Out-of-bounds Write

<0:1.9.0-15.el8_2.4
  • H
Out-of-bounds Write

<0:1.9.0-16.el8_1.4
  • H
Use After Free

<0:1.9.0-15.el8_2.3
  • H
Use After Free

<0:1.9.0-15.el8_2.3
  • H
Use After Free

<0:1.9.0-16.el8_1.3
  • H
Use After Free

<0:1.9.0-15.el8_2.3
  • H
Use After Free

<0:1.9.0-15.el8_2.1
  • H
Use After Free

<0:1.9.0-15.el8_2.1
  • H
Use After Free

<0:1.9.0-15.el8_2.1
  • H
Use After Free

<0:1.9.0-16.el8_1.1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Operation on a Resource after Expiration or Release

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Stack-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1
  • M
Heap-based Buffer Overflow

<0:1.9.0-14.el8_1