296,172
Total vulnerabilities in the database
SunPCi II VNC uses a weak authentication scheme, which allows remote attackers to obtain the VNC password by sniffing the random byte challenge, which is used as the key for encrypted communications.
CVSS v2:
No CWE or OWASP classifications available.