Show filters
63 Total Results
Displaying 11-20 of 63
Sort by:
Attacker Value
Unknown

CVE-2024-24974

Disclosure Date: July 08, 2024 (last updated July 12, 2024)
The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.
Attacker Value
Unknown

CVE-2023-6247

Disclosure Date: February 29, 2024 (last updated February 29, 2024)
The PKCS#7 parser in OpenVPN 3 Core Library versions through 3.8.3 did not properly validate the parsed data, which would result in the application crashing.
0
Attacker Value
Unknown

CVE-2023-7235

Disclosure Date: February 21, 2024 (last updated February 21, 2024)
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
0
Attacker Value
Unknown

CVE-2023-7245

Disclosure Date: February 20, 2024 (last updated February 20, 2024)
The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable
0
Attacker Value
Unknown

CVE-2023-7224

Disclosure Date: January 08, 2024 (last updated January 12, 2024)
OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable
Attacker Value
Unknown

CVE-2023-46850

Disclosure Date: November 11, 2023 (last updated November 29, 2023)
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.
Attacker Value
Unknown

CVE-2023-46849

Disclosure Date: November 11, 2023 (last updated November 29, 2023)
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
Attacker Value
Unknown

CVE-2022-3761

Disclosure Date: October 17, 2023 (last updated October 25, 2023)
OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials
Attacker Value
Unknown

CVE-2020-20813

Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.
Attacker Value
Unknown

CVE-2021-4234

Disclosure Date: July 06, 2022 (last updated October 07, 2023)
OpenVPN Access Server 2.10 and prior versions are susceptible to resending multiple packets in a response to a reset packet sent from the client which the client again does not respond to, resulting in a limited amplification attack.