Denial of Service Vulnerability in UltraVNC Launcher by UltraVNC
CVE-2020-37132
Key Information:
- Vendor
Ultravnc Team
- Status
- Vendor
- CVE Published:
- 5 February 2026
Badges
What is CVE-2020-37132?
UltraVNC Launcher version 1.2.4.0 is vulnerable to a denial of service attack due to improper handling of password configuration properties. An attacker with local access can input an excessively long 300-character string into the password field, leading to an application crash. This exploit disrupts the normal functioning of the launcher, hindering user access and operation. Proper input validation and length restrictions are critical for mitigating this issue.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
UltraVNC Launcher 1.2.4.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
