CVE-2019-25600

| EUVD-2019-19942 HIGH
2026-03-22 VulnCheck GHSA-6w7v-w6gw-pm7w
7.1
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
P
Scope
X

Lifecycle Timeline

7
Re-analysis Queued
Apr 16, 2026 - 16:22 vuln.today
cvss_changed
Severity Changed
Apr 16, 2026 - 16:22 NVD
MEDIUM HIGH
CVSS Changed
Apr 16, 2026 - 16:22 NVD
6.5 (MEDIUM) 7.1 (HIGH)
PoC Detected
Mar 23, 2026 - 14:31 vuln.today
Public exploit code
Analysis Generated
Mar 22, 2026 - 13:45 vuln.today
EUVD ID Assigned
Mar 22, 2026 - 13:45 euvd
EUVD-2019-19942
CVE Published
Mar 22, 2026 - 13:38 nvd
MEDIUM 6.5

DescriptionNVD

UltraVNC Viewer 1.2.2.4 contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized string to the VNC Server input field. Attackers can paste a malicious string containing 256 repeated characters into the VNC Server field and click Connect to trigger a buffer overflow that crashes the viewer.

AnalysisAI

UltraVNC Viewer 1.2.2.4 contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized string to the VNC Server input field.

Technical ContextAI

An out-of-bounds memory access occurs when code reads from or writes to memory locations outside the intended buffer boundaries. This vulnerability is classified as Out-of-bounds Write (CWE-787).

RemediationAI

Implement proper bounds checking on all array and buffer accesses. Use memory-safe languages or static analysis tools to detect OOB issues.

Share

CVE-2019-25600 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy