RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
- http://seclists.org/fulldisclosure/2022/May/29
- http://securityreason.com/securityalert/8355
- http://www.cisco.com/warp/public/707/cisco-sr-20060622-cmm.shtml
- http://www.intelliadmin.com/blog/2006/05/vnc-flaw-proof-of-concept.html
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/EsselKobby/Virtual_Infosec_Africa_LAB
- https://github.com/Farrhouq/Inpt-report
- https://github.com/Linathimqalo/cloud-honeypot-analysis
- https://github.com/RootUp/AutoSploit
- https://github.com/alanshlam/HoneyNet
- https://github.com/hackerhouse-opensource/exploits
- https://github.com/inspiretravel/Honeypot-tpot-in-AWS
- https://github.com/krishpranav/autosploit