UltraVNC Launcher 1.2.4.0 contains a denial of service vulnerability in the Repeater Host configuration field that allows attackers to crash the application. Attackers can paste an overly long string of 300 characters into the Repeater Host property to trigger an application crash.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/48288 | Exploit Third Party Advisory VDB Entry |
| https://www.uvnc.com/ | Product |
| https://www.vulncheck.com/advisories/ultravnc-launcher-repeaterhost-denial-of-service | Third Party Advisory |
Configurations
History
09 Feb 2026, 22:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/48288 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.uvnc.com/ - Product | |
| References | () https://www.vulncheck.com/advisories/ultravnc-launcher-repeaterhost-denial-of-service - Third Party Advisory | |
| CWE | CWE-787 | |
| First Time |
Uvnc ultravnc
Uvnc |
|
| CPE | cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:* |
05 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-05 17:16
Updated : 2026-02-09 22:09
NVD link : CVE-2020-37133
Mitre link : CVE-2020-37133
CVE.ORG link : CVE-2020-37133
JSON object : View
Products Affected
uvnc
- ultravnc
