### [CVE-2019-8275](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8275) ![](https://img.shields.io/static/v1?label=Product&message=UltraVNC&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-170%3A%20Improper%20Null%20Termination&color=brighgreen) ### Description UltraVNC revision 1211 has multiple improper null termination vulnerabilities in VNC server code, which result in out-of-bound data being accessed by remote users. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212. ### POC #### Reference - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/ #### Github No PoCs found on GitHub currently.