Show filters
61 Total Results
Displaying 11-20 of 61
Sort by:
Attacker Value
Unknown
CVE-2023-7235
Disclosure Date: February 21, 2024 (last updated February 21, 2024)
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
0
Attacker Value
Unknown
CVE-2023-7245
Disclosure Date: February 20, 2024 (last updated February 20, 2024)
The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable
0
Attacker Value
Unknown
CVE-2023-46850
Disclosure Date: November 11, 2023 (last updated November 29, 2023)
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.
0
Attacker Value
Unknown
CVE-2023-46849
Disclosure Date: November 11, 2023 (last updated November 29, 2023)
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
0
Attacker Value
Unknown
CVE-2023-47101
Disclosure Date: October 30, 2023 (last updated November 08, 2023)
The installer (aka openvpn-client-installer) in Securepoint SSL VPN Client before 2.0.40 allows local privilege escalation during installation or repair.
0
Attacker Value
Unknown
CVE-2020-20813
Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.
0
Attacker Value
Unknown
CVE-2021-27406
Disclosure Date: October 14, 2022 (last updated October 08, 2023)
An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user.
0
Attacker Value
Unknown
CVE-2021-4234
Disclosure Date: July 06, 2022 (last updated October 07, 2023)
OpenVPN Access Server 2.10 and prior versions are susceptible to resending multiple packets in a response to a reset packet sent from the client which the client again does not respond to, resulting in a limited amplification attack.
0
Attacker Value
Unknown
CVE-2022-33738
Disclosure Date: July 06, 2022 (last updated October 07, 2023)
OpenVPN Access Server before 2.11 uses a weak random generator used to create user session token for the web portal
0
Attacker Value
Unknown
CVE-2022-33737
Disclosure Date: July 06, 2022 (last updated October 07, 2023)
The OpenVPN Access Server installer creates a log file readable for everyone, which from version 2.10.0 and before 2.11.0 may contain a random generated admin password
0