{"id":"UBUNTU-CVE-2019-15679","details":"TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.","modified":"2026-04-27T15:58:48.791263Z","published":"2019-10-29T19:15:00Z","upstream":["CVE-2019-15679"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15679"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2018/12/10/5"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-15679"}],"affected":[{"package":{"name":"tightvnc","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/tightvnc@1.3.9-6.5+deb8u1build0.14.04.1~esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.9-6.5+deb8u1build0.14.04.1~esm1"}]}],"versions":["1.3.9-6.4","1.3.9-6.4ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"tightvncserver","binary_version":"1.3.9-6.5+deb8u1build0.14.04.1~esm1"},{"binary_name":"xtightvncviewer","binary_version":"1.3.9-6.5+deb8u1build0.14.04.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"x11vnc","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/x11vnc@0.9.13-1.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.9.13-1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"x11vnc","binary_version":"0.9.13-1.1"},{"binary_name":"x11vnc-data","binary_version":"0.9.13-1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"ssvnc","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ssvnc@1.0.29-2+deb8u1build0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.29-2build1","1.0.29-2+deb8u1build0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"ssvnc","binary_version":"1.0.29-2+deb8u1build0.16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"tightvnc","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/tightvnc@1.3.10-0ubuntu3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.3.10-0ubuntu2","1.3.10-0ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_name":"tightvncserver","binary_version":"1.3.10-0ubuntu3"},{"binary_name":"xtightvncviewer","binary_version":"1.3.10-0ubuntu3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"vncsnapshot","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/vncsnapshot@1.2a-5.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2a-5.1"],"ecosystem_specific":{"binaries":[{"binary_name":"vncsnapshot","binary_version":"1.2a-5.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"x2vnc","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/x2vnc@1.7.2-5?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.2-5"],"ecosystem_specific":{"binaries":[{"binary_name":"x2vnc","binary_version":"1.7.2-5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"ssvnc","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/ssvnc@1.0.29-3build1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.29-3","1.0.29-3build1"],"ecosystem_specific":{"binaries":[{"binary_name":"ssvnc","binary_version":"1.0.29-3build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"tightvnc","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/tightvnc@1.3.10-0ubuntu4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.3.10-0ubuntu3","1.3.10-0ubuntu4"],"ecosystem_specific":{"binaries":[{"binary_name":"tightvncserver","binary_version":"1.3.10-0ubuntu4"},{"binary_name":"xtightvncviewer","binary_version":"1.3.10-0ubuntu4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"vncsnapshot","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/vncsnapshot@1.2a-5.1build1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2a-5.1","1.2a-5.1build1"],"ecosystem_specific":{"binaries":[{"binary_name":"vncsnapshot","binary_version":"1.2a-5.1build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"x2vnc","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/x2vnc@1.7.2-6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.2-6"],"ecosystem_specific":{"binaries":[{"binary_name":"x2vnc","binary_version":"1.7.2-6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"ssvnc","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ssvnc@1.0.29-5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.29-4build1","1.0.29-5"],"ecosystem_specific":{"binaries":[{"binary_name":"ssvnc","binary_version":"1.0.29-5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"tightvnc","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/tightvnc@1.3.10-0ubuntu5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.3.10-0ubuntu5"],"ecosystem_specific":{"binaries":[{"binary_name":"tightvncserver","binary_version":"1.3.10-0ubuntu5"},{"binary_name":"xtightvncviewer","binary_version":"1.3.10-0ubuntu5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"veyon","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/veyon@4.3.1+repack1-2build2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.2.4+repack1-2","4.2.5+repack1-1","4.3.1+repack1-1","4.3.1+repack1-2","4.3.1+repack1-2build1","4.3.1+repack1-2build2"],"ecosystem_specific":{"binaries":[{"binary_name":"libveyon-core","binary_version":"4.3.1+repack1-2build2"},{"binary_name":"veyon-configurator","binary_version":"4.3.1+repack1-2build2"},{"binary_name":"veyon-master","binary_version":"4.3.1+repack1-2build2"},{"binary_name":"veyon-plugins","binary_version":"4.3.1+repack1-2build2"},{"binary_name":"veyon-service","binary_version":"4.3.1+repack1-2build2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"vncsnapshot","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/vncsnapshot@1.2a-5.1build2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2a-5.1build1","1.2a-5.1build2"],"ecosystem_specific":{"binaries":[{"binary_name":"vncsnapshot","binary_version":"1.2a-5.1build2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"x2vnc","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/x2vnc@1.7.2-6?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.2-6"],"ecosystem_specific":{"binaries":[{"binary_name":"x2vnc","binary_version":"1.7.2-6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"ssvnc","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ssvnc@1.0.29-6?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.29-5","1.0.29-5build1","1.0.29-6"],"ecosystem_specific":{"binaries":[{"binary_name":"ssvnc","binary_version":"1.0.29-6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"tightvnc","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/tightvnc@1:1.3.10-5?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:1.3.10-3","1:1.3.10-5"],"ecosystem_specific":{"binaries":[{"binary_name":"tightvncpasswd","binary_version":"1:1.3.10-5"},{"binary_name":"tightvncserver","binary_version":"1:1.3.10-5"},{"binary_name":"xtightvncviewer","binary_version":"1:1.3.10-5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"veyon","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/veyon@4.5.3+repack1-1build2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.5.3+repack1-1build1","4.5.3+repack1-1build2"],"ecosystem_specific":{"binaries":[{"binary_name":"libveyon-core","binary_version":"4.5.3+repack1-1build2"},{"binary_name":"veyon-configurator","binary_version":"4.5.3+repack1-1build2"},{"binary_name":"veyon-master","binary_version":"4.5.3+repack1-1build2"},{"binary_name":"veyon-plugins","binary_version":"4.5.3+repack1-1build2"},{"binary_name":"veyon-service","binary_version":"4.5.3+repack1-1build2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"vncsnapshot","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/vncsnapshot@1.2a-5.1build2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2a-5.1build2"],"ecosystem_specific":{"binaries":[{"binary_name":"vncsnapshot","binary_version":"1.2a-5.1build2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"x2vnc","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/x2vnc@1.7.2-6?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.2-6"],"ecosystem_specific":{"binaries":[{"binary_name":"x2vnc","binary_version":"1.7.2-6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"ssvnc","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/ssvnc@1.0.29-6ubuntu3?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.29-6","1.0.29-6ubuntu1","1.0.29-6ubuntu2","1.0.29-6ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_name":"ssvnc","binary_version":"1.0.29-6ubuntu3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"tightvnc","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/tightvnc@1:1.3.10-8?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:1.3.10-7","1:1.3.10-7build1","1:1.3.10-7build2","1:1.3.10-8"],"ecosystem_specific":{"binaries":[{"binary_name":"tightvncpasswd","binary_version":"1:1.3.10-8"},{"binary_name":"tightvncserver","binary_version":"1:1.3.10-8"},{"binary_name":"xtightvncviewer","binary_version":"1:1.3.10-8"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"veyon","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/veyon@4.7.5+repack1-1ubuntu5?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.7.5+repack1-1build2","4.7.5+repack1-1ubuntu1","4.7.5+repack1-1ubuntu3","4.7.5+repack1-1ubuntu4","4.7.5+repack1-1ubuntu5"],"ecosystem_specific":{"binaries":[{"binary_name":"libveyon-core","binary_version":"4.7.5+repack1-1ubuntu5"},{"binary_name":"veyon-configurator","binary_version":"4.7.5+repack1-1ubuntu5"},{"binary_name":"veyon-master","binary_version":"4.7.5+repack1-1ubuntu5"},{"binary_name":"veyon-plugins","binary_version":"4.7.5+repack1-1ubuntu5"},{"binary_name":"veyon-service","binary_version":"4.7.5+repack1-1ubuntu5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"vncsnapshot","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/vncsnapshot@1.2a-5.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2a-5.2"],"ecosystem_specific":{"binaries":[{"binary_name":"vncsnapshot","binary_version":"1.2a-5.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"x2vnc","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/x2vnc@1.7.2-6build1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.2-6","1.7.2-6build1"],"ecosystem_specific":{"binaries":[{"binary_name":"x2vnc","binary_version":"1.7.2-6build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"ssvnc","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/ssvnc@1.0.29-7?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.29-6.1","1.0.29-7"],"ecosystem_specific":{"binaries":[{"binary_name":"ssvnc","binary_version":"1.0.29-7"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"tightvnc","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/tightvnc@1:1.3.10-10?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:1.3.10-9","1:1.3.10-10"],"ecosystem_specific":{"binaries":[{"binary_name":"tightvncpasswd","binary_version":"1:1.3.10-10"},{"binary_name":"tightvncserver","binary_version":"1:1.3.10-10"},{"binary_name":"xtightvncviewer","binary_version":"1:1.3.10-10"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"veyon","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/veyon@4.9.7+repack1-1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.7.5+repack1-1ubuntu6","4.7.5+repack1-1ubuntu7","4.9.7+repack1-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libveyon-core","binary_version":"4.9.7+repack1-1"},{"binary_name":"veyon-configurator","binary_version":"4.9.7+repack1-1"},{"binary_name":"veyon-master","binary_version":"4.9.7+repack1-1"},{"binary_name":"veyon-plugins","binary_version":"4.9.7+repack1-1"},{"binary_name":"veyon-service","binary_version":"4.9.7+repack1-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"vncsnapshot","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/vncsnapshot@1.2a-7?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2a-6","1.2a-7"],"ecosystem_specific":{"binaries":[{"binary_name":"vncsnapshot","binary_version":"1.2a-7"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"x2vnc","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/x2vnc@1.7.2+git20100909.01ced3d-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.2+git20100909.01ced3d-1","1.7.2+git20100909.01ced3d-2"],"ecosystem_specific":{"binaries":[{"binary_name":"x2vnc","binary_version":"1.7.2+git20100909.01ced3d-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"ssvnc","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/ssvnc@1.0.29-7build1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.29-7","1.0.29-7build1"],"ecosystem_specific":{"binaries":[{"binary_name":"ssvnc","binary_version":"1.0.29-7build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"tightvnc","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/tightvnc@1:1.3.10-10build1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:1.3.10-10","1:1.3.10-10build1"],"ecosystem_specific":{"binaries":[{"binary_name":"tightvncpasswd","binary_version":"1:1.3.10-10build1"},{"binary_name":"tightvncserver","binary_version":"1:1.3.10-10build1"},{"binary_name":"xtightvncviewer","binary_version":"1:1.3.10-10build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"veyon","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/veyon@4.9.7+repack1-1build1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.9.7+repack1-1","4.9.7+repack1-1build1"],"ecosystem_specific":{"binaries":[{"binary_name":"libveyon-core","binary_version":"4.9.7+repack1-1build1"},{"binary_name":"veyon-configurator","binary_version":"4.9.7+repack1-1build1"},{"binary_name":"veyon-master","binary_version":"4.9.7+repack1-1build1"},{"binary_name":"veyon-plugins","binary_version":"4.9.7+repack1-1build1"},{"binary_name":"veyon-service","binary_version":"4.9.7+repack1-1build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"vncsnapshot","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/vncsnapshot@1.2a-7build1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2a-7","1.2a-7build1"],"ecosystem_specific":{"binaries":[{"binary_name":"vncsnapshot","binary_version":"1.2a-7build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}},{"package":{"name":"x2vnc","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/x2vnc@1.7.2+git20100909.01ced3d-2build1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.2+git20100909.01ced3d-2","1.7.2+git20100909.01ced3d-2build1"],"ecosystem_specific":{"binaries":[{"binary_name":"x2vnc","binary_version":"1.7.2+git20100909.01ced3d-2build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}