Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openvpn openvpn 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3393
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.
Openvpn Openvpn Access Server 2.0.1
Openvpn Openvpn Access Server 2.0.2
Openvpn Openvpn 2.0
Openvpn Openvpn 2.0 Beta11
NA
CVE-2006-1629
OpenVPN 2.0 up to and including 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
Openvpn Openvpn 2.0
Openvpn Openvpn Access Server 2.0.3
Openvpn Openvpn 2.0.4
Openvpn Openvpn Access Server 2.0.5
Openvpn Openvpn Access Server 2.0.1
Openvpn Openvpn Access Server 2.0.2
NA
CVE-2005-2531
OpenVPN prior to 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote ...
Openvpn Openvpn 2.0 Beta10
Openvpn Openvpn 2.0 Beta11
Openvpn Openvpn 2.0 Beta12
Openvpn Openvpn 2.0 Beta13
Openvpn Openvpn 2.0 Beta7
Openvpn Openvpn 2.0 Beta8
Openvpn Openvpn 2.0 Beta9
Openvpn Openvpn 2.0 Rc1
Openvpn Openvpn 2.0 Rc10
Openvpn Openvpn 2.0 Rc3
Openvpn Openvpn 2.0 Rc4
Openvpn Openvpn 2.0 Rc5
Openvpn Openvpn 2.0 Rc6
Openvpn Openvpn 2.0 Test2
Openvpn Openvpn 2.0 Test20
Openvpn Openvpn 2.0 Test21
Openvpn Openvpn 2.0 Test22
Openvpn Openvpn 2.0
Openvpn Openvpn 2.0.1 Rc1
Openvpn Openvpn 2.0.1 Rc2
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0 Beta19
NA
CVE-2005-2532
OpenVPN prior to 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated malicious users to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
Openvpn Openvpn 2.0.1 Rc1
Openvpn Openvpn 2.0.1 Rc2
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0.1 Rc4
Openvpn Openvpn 2.0 Beta19
Openvpn Openvpn 2.0 Beta2
Openvpn Openvpn 2.0 Beta20
Openvpn Openvpn 2.0 Beta28
Openvpn Openvpn 2.0 Rc15
Openvpn Openvpn 2.0 Rc16
Openvpn Openvpn 2.0 Rc17
Openvpn Openvpn 2.0 Rc18
Openvpn Openvpn 2.0 Test11
Openvpn Openvpn 2.0 Test12
Openvpn Openvpn 2.0 Test14
Openvpn Openvpn 2.0 Test15
Openvpn Openvpn 2.0 Test29
Openvpn Openvpn 2.0 Test3
Openvpn Openvpn 2.0 Test5
Openvpn Openvpn 2.0 Test6
Openvpn Openvpn 2.0 Test7
Openvpn Openvpn 2.0 Beta10
NA
CVE-2005-2533
OpenVPN prior to 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.
Openvpn Openvpn 2.0 Beta10
Openvpn Openvpn 2.0 Beta11
Openvpn Openvpn 2.0 Beta12
Openvpn Openvpn 2.0 Beta13
Openvpn Openvpn 2.0 Beta8
Openvpn Openvpn 2.0 Beta9
Openvpn Openvpn 2.0 Rc1
Openvpn Openvpn 2.0 Rc10
Openvpn Openvpn 2.0 Rc4
Openvpn Openvpn 2.0 Rc5
Openvpn Openvpn 2.0 Rc6
Openvpn Openvpn 2.0 Rc7
Openvpn Openvpn 2.0 Test2
Openvpn Openvpn 2.0 Test20
Openvpn Openvpn 2.0 Test21
Openvpn Openvpn 2.0 Test22
Openvpn Openvpn 2.0.1 Rc1
Openvpn Openvpn 2.0.1 Rc2
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0.1 Rc4
Openvpn Openvpn 2.0 Beta19
Openvpn Openvpn 2.0 Beta2
NA
CVE-2005-2534
Race condition in OpenVPN prior to 2.0.1, when --duplicate-cn is not enabled, allows remote malicious users to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.
Openvpn Openvpn 2.0.1 Rc1
Openvpn Openvpn 2.0.1 Rc2
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0.1 Rc4
Openvpn Openvpn 2.0 Beta2
Openvpn Openvpn 2.0 Beta20
Openvpn Openvpn 2.0 Beta10
Openvpn Openvpn 2.0 Beta11
Openvpn Openvpn 2.0 Beta12
Openvpn Openvpn 2.0 Beta13
Openvpn Openvpn 2.0 Beta8
Openvpn Openvpn 2.0 Beta9
Openvpn Openvpn 2.0 Rc1
Openvpn Openvpn 2.0 Rc10
Openvpn Openvpn 2.0 Rc4
Openvpn Openvpn 2.0 Rc5
Openvpn Openvpn 2.0 Rc6
Openvpn Openvpn 2.0 Rc7
Openvpn Openvpn 2.0 Test2
Openvpn Openvpn 2.0 Test20
Openvpn Openvpn 2.0 Test21
Openvpn Openvpn 2.0 Test22
NA
CVE-2005-3409
OpenVPN 2.x prior to 2.0.4, when running in TCP mode, allows remote malicious users to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
Openvpn Openvpn 2.0.1 Rc5
Openvpn Openvpn 2.0.1 Rc6
Openvpn Openvpn 2.0.1 Rc7
Openvpn Openvpn 2.0 Beta12
Openvpn Openvpn 2.0 Beta13
Openvpn Openvpn 2.0 Beta20
Openvpn Openvpn 2.0 Beta28
Openvpn Openvpn 2.0 Rc1
Openvpn Openvpn 2.0 Rc10
Openvpn Openvpn 2.0 Rc17
Openvpn Openvpn 2.0 Rc18
Openvpn Openvpn 2.0 Rc5
Openvpn Openvpn 2.0 Rc6
Openvpn Openvpn 2.0 Test14
Openvpn Openvpn 2.0 Test15
Openvpn Openvpn 2.0 Test21
Openvpn Openvpn 2.0 Test22
Openvpn Openvpn 2.0 Test5
Openvpn Openvpn 2.0 Test6
Openvpn Openvpn 2.0.1 Rc1
Openvpn Openvpn 2.0.1 Rc2
Openvpn Openvpn 2.0.3 Rc1
NA
CVE-2006-2229
OpenVPN 2.0.7 and previous versions, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote malicious users to view sensitive information or cause a denial o...
Openvpn Openvpn 2.0
Openvpn Openvpn Access Server 2.0.1
Openvpn Openvpn 2.0.1 Rc7
Openvpn Openvpn Access Server 2.0.2
Openvpn Openvpn 2.0.2 Rc1
Openvpn Openvpn 2.0 Beta1
Openvpn Openvpn 2.0 Beta10
Openvpn Openvpn 2.0 Beta18
Openvpn Openvpn 2.0 Beta19
Openvpn Openvpn 2.0 Beta6
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0.1 Rc4
Openvpn Openvpn Access Server 2.0.5
Openvpn Openvpn Access Server 2.0.6
Openvpn Openvpn 2.0 Beta13
Openvpn Openvpn 2.0 Beta15
Openvpn Openvpn 2.0 Beta28
Openvpn Openvpn 2.0.1 Rc1
Openvpn Openvpn 2.0.1 Rc2
Openvpn Openvpn 2.0.3 Rc1
Openvpn Openvpn 2.0.4
Openvpn Openvpn 2.0 Beta11
9.8
CVSSv3
CVE-2017-12166
OpenVPN versions prior to 2.3.3 and 2.4.x prior to 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
Openvpn Openvpn
Debian Debian Linux 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started