Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tinc-vpn tinc vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2013-1428
Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc prior to 1.0.21 and 1.1 prior to 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.
Tinc-vpn Tinc 1.0.18
Tinc-vpn Tinc 1.0.17
Tinc-vpn Tinc
Tinc-vpn Tinc 1.0.19
Tinc-vpn Tinc 1.1
1 EDB exploit
5
CVSSv2
CVE-2018-16737
tinc prior to 1.0.30 has a broken authentication protocol, without even a partial mitigation.
Tinc-vpn Tinc
Starwindsoftware Starwind Virtual San V8
4.3
CVSSv2
CVE-2018-16738
tinc 1.0.30 up to and including 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
Tinc-vpn Tinc
Debian Debian Linux 9.0
Starwindsoftware Starwind Virtual San V8
4.3
CVSSv2
CVE-2018-16758
Missing message authentication in the meta-protocol in Tinc VPN version 1.0.34 and previous versions allows a man-in-the-middle attack to disable the encryption of VPN packets.
Tinc-vpn Tinc
Debian Debian Linux 9.0
Starwindsoftware Starwind Virtual San V8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started