Browse all 3 CVE security advisories affecting LibVNC. AI-powered Chinese analysis, POCs, and references for each vulnerability.
LibVNC is a widely used open-source implementation of the VNC protocol, enabling remote desktop access and control across networks. Historically, it has been susceptible to multiple remote code execution vulnerabilities, often through buffer overflows in protocol handling, as well as cross-site scripting issues in web-based implementations. Privilege escalation vulnerabilities have also been identified in certain configurations. With three CVEs currently recorded, the library's security posture reflects common challenges in network protocol implementations. While no major public security incidents have been widely documented, the consistent discovery of vulnerabilities underscores the importance of regular updates and careful implementation in security-sensitive environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-32854 | LibVNCServer httpd proxy NULL Pointer Dereference — LibVNCServerCWE-476 | 7.5 | - | 2026-03-24 |
| CVE-2026-32853 | LibVNCServer UltraZip Encoding Heap Out-of-bounds Read — LibVNCServerCWE-125 | 9.1 | - | 2026-03-24 |
| CVE-2019-15690 | LibVNCServer 安全漏洞 — LibVNCServerCWE-122 | 8.8 | High | 2025-01-24 |
This page lists every published CVE security advisory associated with LibVNC. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.