Jun 01, 2010 What's new in Grand Theft Auto IV Patch 1.0.7.0: fixed a bug causing tree leaves to look transparent; fixed a bug that prevented uploading of rendered videos to Social Club when attaching certain music tracks. The example below defines a path that starts at position 150,0 with a line to position 75,200 then from there, a line to 225,200 and finally closing the path back to 150,0.
|
Patch Viewer 1.0.9 Update
|
|
MSI: not compatible with w2K and xp
|
|
|
|
Remark bins: Never extract the exe direct (via iexplorer) from the zip.
If you extract them direct, uac mark the files as unsecure... and winvnc server doesn't work proper.
First save as zip then open via explorer...
Viewer Translations ( rename dll to vnclang.dll)
|
Mirror Driver
|
SourceCode
|
Changes
**********************************************
* Ultr@VNC - Latest modifications - History
** V1.2.0.9 November 2015
*added XZ encoder (small bandwidth)
*crash fix
*auto mode: better initial settings to avoid coder switch on start
*fix 10 second delay win8 with keyboardhelper
*w8hook embedded
*option Gii encoder adde
*memory leaks
*added tight encoder patch from Turbovnc project
*reconnect timeout in invers mode was increasing on each try, max set to 3 minutes*crashes detected by crashrpt fixed
** V1.2.0.6 June 2015
*fix timeout multiple viewers
*scale server window, also when directx is not available
*fix multiple initial screen sends
*fix win8 and w8hook loop/hung high cpu
*added dpi aware for viewer
** V1.2.0.5 Dec 2014
*add viewer idle timer
*add server id to password box
*server deadlock fixed ( existed already for 2 years)
*server tray install/uninstall/start stop service
*minimize viewer and high cpu
*save plugin options corrected
*update uvnc_settings.exe ( added new settings, help pages, service buttons)
*update repeater (could be locked by port scans)
** V1.2.0.4 Nov 2014
-Save config plugin fix
-clipboard deadlock
-allow filetransfer when file is open
-sdtime removed ( performance)
-alt-grf win8 fix
** V1.2.0.3 Aug 2014
SECURITY UPDATE
impact: all pre 1.2.0.3 versions
exploit: localuser (guest) can gain local admin access on win8
** V1.2.0.2
*viewer portable
*you can set a single port java/rfb
*server deadlock fixes for slower connections
*ignore cursor when not in view window ( crashed java viewer)
*fast keyboard input could cause 100% cpu usahe on win8, fixed
** V1.2.0.1 Aug 2014
*service, fix error 1314, server sometimes failed to start desktop part and closed winvnc.
*security: increase timeout after each wrong password to make brute force hacking harder
*color correction 16bit and mirror driver*memory leak with mirror driver fixed in previous fix J
*save setting permission fix
*added support for new repeater with keepalive
*tooltip buffer overrun fix, cause server to fail when sting in systray was to long
( multiple ethernet card. Long hostnames etc…)
**V1.1.9.6 Dec 2013
*auto alpha blending based on OS*zrle deadlock fix
*tight encoding fixed
*show screenbuildup on first run
*server fix bug that crashed iexplorer 8
**V1.1.9.4 Okt 2013
*viewer mod for vmware ( wrong colors)
*update lijpeg-turbo to 1.3.0
**V1.1.9.3 Aug 2013
-Missing screen refresh ( when driver selected but not used)
-Factory reset ( when temp was not writable)
**V1.1.9.2 Aug 2013
-Mirror driver and begative screen coordinates (left secondary desktop)
**V1.1.9.0 May 2013
-fixed change ip detection, sometimes server was disconnected after a few seconds by a false positive
-new installer xp64 wasn’t supported
**V1.1.8.9 April 2013
-Viewer timeout option grayscreen fix
-server leaks fixed
**V1.1.8.8 March 2013
-server crash
-server grayscreen on startup loop fixed
**V1.1.8.7 March 2013
-filetransfer bug fix (x64)
**V1.1.8.6 March 2013
-autoreconnect and auth fail fix
-viewer with option window open fails to close
-viewer messagebox sometimes hidden behind window
**V1.1.8.5 March 2013
deadlock softcursor fixed (viewer)
**V1.1.8.4 March 2013
server
-u2 encode on 16 color display crash
viewer
-fullscreen bar center
-recoonect set by default
**V1.1.8.3 March 2013
-Fix server /NULL crash
-Fix radio button u2 viewer
**V1.1.8.2 March 2013
-fix lock after gray screen
**v1.1.8.2 (March 2013)
-disconnect after gray screen
**v1.1.8 (Nov 2012)
-addad support windows 8
( new capture engine)
-several bug fixes
-better multi monitor support
-new vncpasswd + encryption.
Instead of using the password as part of the encryption, we now check the password insite the encryption by the server. This allow the server to balcklist servers
after x fault password.
WARNING: If using encryption plugin + vncpassword you better upgrade. No protection against Brute force password hacking.
**v1.0.9.6.2 (Feb 2012)
-removed beeps
-Capture alpha-Blending default value.
-Viewer crash fixed
-Grayscale fixed
-msi installers
server
*crash chat x64
*AuthRequired=0, passwd=NULL: Warning message block service
*About x64 say win32
*viewer 1082 and server 1096 with localcursor ( no connect, 100% cpu)
*serversite scaling and multiple viewers, framebuffer size get overwritten
(Scale is now lock when multiple viewers are connected to avoid a
framebuffer change, first connected viewer set scale. Site effect is that
the viewer report the unused, incorrect scale, but at least it doesn't crash anymore)
*-connect ip, passed to winvnc running as service is not remembered for
autoreconnect.
*-stopreconnect
stop the autoreconnect function of the server.
*server mouse moves jump on viewer when screen is idle.
*old plugin zrle crash
viewer
*plugin (SecureVNCPlugin) used by viewer
server without plugin
give incorrect viewer message. And doesn't ask to reject the connection.
*monitor value is saved, but vncviewer read it as bool (true/false)
Only 0/1 are correct imported
*old plugins fail when zrle encoding is used
*old plugins give incorrect info in statusbox
*-autoreconnect timeout, -reconnectcounter number
(available from gui and commandline)
-autoreconnect timeout was incorrect, updated
*old plugin detection
*Messagebox was sometimes displayed on invisable desktop
*auth dll error messages for missing dll's incorrect
*mslogon and no groups, didn't checked admin account for access
*lock /logout screen on exit viewer option blocked shutdown server.
javaviewer
*mslogon fixed
added special build: only one port for javaviewer (rfb port is used for java download and rfb data)
Patch Viewer 1.0.9 Pc
License
Patch Viewer 1.0.9 Mac
GNU GENERAL PUBLIC LICENSE (GPL)
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
http://www.gnu.org/licenses
Patch Viewer 1.0.9 Free
xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message. Publish Date : 2011-04-08 Last Update Date : 2017-08-16
- CVSS Scores & Vulnerability Types
- Additional Vendor Supplied Data
If you are a vendor and you have additional data which can be automatically imported into our database, please contact admin @ cvedetails.com - Related OVAL Definitions
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability. - Products Affected By CVE-2011-0465
- Number Of Affected Versions By Product
- References For CVE-2011-0465
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2011-0465There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |
Comments are closed.