Show filters
61 Total Results
Displaying 21-30 of 61
Sort by:
Attacker Value
Unknown

CVE-2022-0547

Disclosure Date: March 18, 2022 (last updated October 07, 2023)
OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.
Attacker Value
Unknown

CVE-2021-31606

Disclosure Date: September 27, 2021 (last updated February 23, 2025)
furlongm openvpn-monitor through 1.1.3 allows Authorization Bypass to disconnect arbitrary clients.
Attacker Value
Unknown

CVE-2021-31605

Disclosure Date: September 27, 2021 (last updated February 23, 2025)
furlongm openvpn-monitor through 1.1.3 allows %0a command injection via the OpenVPN management interface socket. This can shut down the server via signal%20SIGTERM.
Attacker Value
Unknown

CVE-2021-31604

Disclosure Date: September 27, 2021 (last updated February 23, 2025)
furlongm openvpn-monitor through 1.1.3 allows CSRF to disconnect an arbitrary client.
Attacker Value
Unknown

CVE-2021-3824

Disclosure Date: September 23, 2021 (last updated February 23, 2025)
OpenVPN Access Server 2.9.0 through 2.9.4 allow remote attackers to inject arbitrary web script or HTML via the web login page URL.
Attacker Value
Unknown

CVE-2021-3547

Disclosure Date: July 12, 2021 (last updated February 23, 2025)
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
Attacker Value
Unknown

CVE-2021-3606

Disclosure Date: July 02, 2021 (last updated February 22, 2025)
OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe).
Attacker Value
Unknown

CVE-2021-35523

Disclosure Date: June 28, 2021 (last updated February 22, 2025)
Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user.
Attacker Value
Unknown

CVE-2020-36382

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
OpenVPN Access Server 2.7.3 to 2.8.7 allows remote attackers to trigger an assert during the user authentication phase via incorrect authentication token data in an early phase of the user authentication resulting in a denial of service.
Attacker Value
Unknown

CVE-2020-15077

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
OpenVPN Access Server 2.8.7 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.