First published: Thu Aug 25 2016(Updated: )
UltraVNC Repeater before 1300 does not restrict destination IP addresses or TCP ports, which allows remote attackers to obtain open-proxy functionality by using a :: substring in between the IP address and port number.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC Repeater | <=1201 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.