In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:9
tightvnc
to version 1:1.3.9-9+deb9u1 or higher.
Note: Versions mentioned in the description apply only to the upstream tightvnc
package and not the tightvnc
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15679. Reason: This candidate is a duplicate of CVE-2019-15679. Notes: All CVE users should reference CVE-2019-15679 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.