Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2023-46849
Disclosure Date: November 11, 2023 (last updated November 29, 2023)
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
0
Attacker Value
Unknown
CVE-2017-5868
Disclosure Date: May 26, 2017 (last updated November 26, 2024)
CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via "%0A" characters in the PATH_INFO to __session_start__/.
0
Attacker Value
Unknown
CVE-2014-8104
Disclosure Date: December 03, 2014 (last updated October 05, 2023)
OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
0
Attacker Value
Unknown
CVE-2014-5455
Disclosure Date: August 25, 2014 (last updated October 05, 2023)
Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder.
0
Attacker Value
Unknown
CVE-2013-2061
Disclosure Date: November 18, 2013 (last updated October 05, 2023)
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
0
Attacker Value
Unknown
CVE-2008-3459
Disclosure Date: August 04, 2008 (last updated October 04, 2023)
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.
0