Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openswan openswan 1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0590
FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x prior to 1.0.6, openswan 2.x prior to 2.1.4, and strongSwan prior to 2.1.3, allows remote malicious users to authenticate using spoofed PKCS#7 certificates in which a self-signed certifica...
Frees Wan Frees Wan 1
Frees Wan Frees Wan 2
Frees Wan Super Frees Wan 1
Openswan Openswan 1
Openswan Openswan 2
Strongswan Strongswan
4.4
CVSSv2
CVE-2008-4190
The IPSEC livetest tool in Openswan 2.4.12 and previous versions, and 2.6.x up to and including 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files. NOTE: i...
Openswan Openswan 1.0.9
Openswan Openswan 2.1.1
Xelerance Openswan 2.4.0
Xelerance Openswan 2.4.2
Xelerance Openswan 2.3.1
Xelerance Openswan 2.6.04
Xelerance Openswan 2.6.05
Xelerance Openswan 2.6.12
Xelerance Openswan 2.6.13
Openswan Openswan 2.2
Openswan Openswan 2.3
Openswan Openswan 1.0.4
Xelerance Openswan 2.6.03
Xelerance Openswan 2.6.10
Xelerance Openswan 2.6.11
Openswan Openswan 2.1.5
Openswan Openswan 2.1.6
Openswan Openswan 1.0.6
Openswan Openswan 1.0.5
Xelerance Openswan 2.6.08
Xelerance Openswan 2.6.09
Xelerance Openswan 2.6.16
1 EDB exploit
4
CVSSv2
CVE-2011-4073
Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 up to and including 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_ou...
Xelerance Openswan 2.4.2
Xelerance Openswan 2.4.10
Xelerance Openswan 2.4.4
Xelerance Openswan 2.5.0
Xelerance Openswan 2.5.12
Xelerance Openswan 2.5.13
Xelerance Openswan 2.5.14
Xelerance Openswan 2.5.15
Xelerance Openswan 2.6.09
Xelerance Openswan 2.6.10
Xelerance Openswan 2.6.11
Xelerance Openswan 2.6.12
Xelerance Openswan 2.6.27
Xelerance Openswan 2.6.30
Xelerance Openswan 2.6.26
Xelerance Openswan 2.6.25
Xelerance Openswan 2.4.5
Xelerance Openswan 2.4.3
Xelerance Openswan 2.4.6
Xelerance Openswan 2.4.7
Xelerance Openswan 2.5.04
Xelerance Openswan 2.5.05
3.6
CVSSv2
CVE-2011-2147
Openswan 2.2.x does not properly restrict permissions for (1) /var/run/starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/subsys/ipsec, which allows local users to kill arbitrary processes by writing a PID to a file, or possibly bypass disk quotas by writin...
Openswan Openswan 2.2.0
Openswan Openswan 2.2.1
7.2
CVSSv2
CVE-2005-0162
Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x prior to 1.0.9, and Openswan 2.x prior to 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated malicious users to execute arbitrary code.
Xelerance Openswan 2.3.0
Openswan Openswan
6.5
CVSSv2
CVE-2010-3752
programs/pluto/xauth.c in the client in Openswan 2.6.25 up to and including 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-...
Xelerance Openswan 2.6.25
Xelerance Openswan 2.6.26
Xelerance Openswan 2.6.27
Xelerance Openswan 2.6.28
6.5
CVSSv2
CVE-2010-3302
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 up to and including 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet.
Xelerance Openswan 2.6.25
Xelerance Openswan 2.6.26
Xelerance Openswan 2.6.27
Xelerance Openswan 2.6.28
5
CVSSv2
CVE-2009-2185
The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 prior to 2.8.10, 4.2 prior to 4.2.16, and 4.3 prior to 4.3.2; and (b) openSwan 2.6 prior to 2.6.22 and 2.4 prior to 2.4.15 allows remote malicious users to cause a d...
Strongswan Strongswan 2.8.6
Strongswan Strongswan 2.8.5
Strongswan Strongswan 4.2.6
Strongswan Strongswan 4.2.2
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.12
Strongswan Strongswan 2.8.9
Strongswan Strongswan 4.2.15
Xelerance Openswan 2.6.18
Xelerance Openswan 2.6.13
Xelerance Openswan 2.6.06
Xelerance Openswan 2.6.07
Xelerance Openswan 2.4.9
Xelerance Openswan 2.4.1
Strongswan Strongswan 2.8.2
Strongswan Strongswan 2.8.1
Strongswan Strongswan 4.2.5
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.1
Xelerance Openswan 2.6.16
Xelerance Openswan 2.6.20
5
CVSSv2
CVE-2009-0790
The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 prior to 2.6.21 and 2.4 prior to 2.4.14, and Strongswan 4.2 prior to 4.2.14 and 2.8 prior to 2.8.9, allows remote malicious users to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R...
Strongswan Strongswan 4.2.0
Strongswan Strongswan 4.2.1
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.2.11
Strongswan Strongswan 2.8.2
Strongswan Strongswan 2.8.3
Strongswan Strongswan 2.4.1
Strongswan Strongswan 2.4.0a
Xelerance Openswan 2.6.07
Xelerance Openswan 2.6.08
Xelerance Openswan 2.6.16
Xelerance Openswan 2.4.0
Xelerance Openswan 2.4.3
Xelerance Openswan 2.4.5
Strongswan Strongswan 2.6.1
Strongswan Strongswan 2.6.2
Strongswan Strongswan 4.2.4
Strongswan Strongswan 4.2.5
Strongswan Strongswan 4.2.7
Strongswan Strongswan 2.8.8
Strongswan Strongswan 2.8.6
Strongswan Strongswan 2.8.7
6.9
CVSSv2
CVE-2008-4966
linux-patch-openswan 2.4.12 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/snap##### and (b) /tmp/nightly##### temporary files, related to the (1) maysnap and (2) maytest scripts.
Openswan Linux-patch-openswan 2.4.12
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »