Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uvnc
Uvnc ultravnc Launcher |
|
| Vendors & Products |
Uvnc
Uvnc ultravnc Launcher |
Sun, 22 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | UltraVNC Launcher 1.2.2.4 contains a buffer overflow vulnerability in the Path vncviewer.exe property field that allows local attackers to crash the application by supplying an excessively long string. Attackers can input a 300-byte payload of repeated characters through the Properties dialog to trigger a denial of service condition. | |
| Title | UltraVNC Launcher 1.2.2.4 Denial of Service Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T16:16:48.472Z
Reserved: 2026-03-22T12:59:45.501Z
Link: CVE-2019-25601
Updated: 2026-03-23T16:16:44.718Z
Status : Deferred
Published: 2026-03-22T14:16:27.530
Modified: 2026-04-16T16:19:50.757
Link: CVE-2019-25601
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:46:15Z