Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2006-2369

EPSS 92.50% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2006-2369

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
RealVNC VNC Server 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
RealVNC VNC Server是英国RealVNC公司的一个远程访问软件的 VNC 服务器。 RealVNC VNC Server 存在授权问题漏洞,该漏洞源于采用的RFB(远程帧缓冲区)协议允许客户端与服务端协商合适的认证方法,协议的实现上存在设计错误,远程攻击者可以绕过认证无需口令实现对服务器的访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2006-2369

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2006-2369

登录查看更多情报信息。

Same Patch Batch · n/a · 2006-05-15 · 22 CVEs total

CVE-2005-4801Yet Another PHP Image Gallery (YaPIG) 多个跨站请求伪造漏洞
CVE-2006-2368Clansys index.php 跨站脚本攻击(XSS)漏洞
CVE-2006-2367Clansys index.php 跨站脚本攻击(XSS)漏洞
CVE-2006-2366Ircp libopenobex ircp_io.c 输入验证漏洞
CVE-2006-2365Vizra A_Login.PHP 跨站脚本攻击漏洞
CVE-2006-2364Adobe ColdFusion 验证功能 跨站脚本攻击漏洞
CVE-2006-2363Limbo CMS weblinks选项 SQL注入漏洞
CVE-2006-2362GNU Free Software Foundation GNU Binutils libbfd tekhex.c 缓冲区溢出漏洞
CVE-2006-2361paFileDB pafiledb_constants.php 远程文件包含漏洞
CVE-2006-2360phpBB Chart模块 SQL注入漏洞
CVE-2006-2359phpBB Chart模块 多个跨站脚本攻击漏洞
CVE-2006-2351Ipswitch WhatsUp Professional 多个跨站脚本攻击(XSS) 漏洞
CVE-2005-4800Yet Another PHP Image Gallery直接静态代码注入漏洞
CVE-2005-4799Yapig View.PHP跨站脚本攻击漏洞
CVE-2006-2358Web-Labs CMS 多个跨站脚本攻击漏洞
CVE-2006-2357Ipswitch WhatsUp Professional Login.asp 信息泄露漏洞
CVE-2006-2356Ipswitch WhatsUp Professional RenderMap.asp 信息泄露漏洞
CVE-2006-2355Ipswitch WhatsUp Professional 404错误信息 信息泄露漏洞
CVE-2006-2354Ipswitch WhatsUp ProfessionalLogin.asp 信息泄露漏洞
CVE-2006-2353Ipswitch WhatsUp Professional DeviceSelection.asp URL重定向漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2006-2369

No comments yet


Leave a comment