Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openvpn openvpn access server vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2006-1629
OpenVPN 2.0 up to and including 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
Openvpn Openvpn 2.0
Openvpn Openvpn Access Server 2.0.3
Openvpn Openvpn 2.0.4
Openvpn Openvpn Access Server 2.0.5
Openvpn Openvpn Access Server 2.0.1
Openvpn Openvpn Access Server 2.0.2
668
VMScore
CVE-2005-3393
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.
Openvpn Openvpn Access Server 2.0.1
Openvpn Openvpn Access Server 2.0.2
Openvpn Openvpn 2.0
Openvpn Openvpn 2.0 Beta11
NA
CVE-2023-46849
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an malicious user to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
Openvpn Openvpn
Openvpn Openvpn Access Server
Openvpn Openvpn Access Server 2.12.1
Openvpn Openvpn Access Server 2.12.0
Debian Debian Linux 12.0
Fedoraproject Fedora 39
605
VMScore
CVE-2014-8104
OpenVPN 2.x prior to 2.0.11, 2.1.x, 2.2.x prior to 2.2.3, and 2.3.x prior to 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
Mageia Mageia 4.0
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Opensuse Opensuse 12.3
Openvpn Openvpn 2.0 Test1
Openvpn Openvpn 2.0 Test11
Openvpn Openvpn 2.0 Test19
Openvpn Openvpn 2.0 Test20
Openvpn Openvpn 2.0 Test27
Openvpn Openvpn 2.0 Test29
Openvpn Openvpn 2.0 Test7
Openvpn Openvpn 2.0 Test9
Openvpn Openvpn 2.0 Rc15
Openvpn Openvpn 2.0 Rc17
Openvpn Openvpn 2.0 Rc4
Openvpn Openvpn 2.0 Rc6
Openvpn Openvpn 2.0.1 Rc1
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0.1 Rc5
Openvpn Openvpn Access Server 2.0.3
1 Article
605
VMScore
CVE-2014-9104
Multiple cross-site request forgery (CSRF) vulnerabilities in the XML-RPC API in the Desktop Client in OpenVPN Access Server 1.5.6 and previous versions allow remote malicious users to hijack the authentication of administrators for requests that (1) disconnecting established VPN...
Openvpn Openvpn Access Server
668
VMScore
CVE-2020-8953
OpenVPN Access Server 2.8.x prior to 2.8.1 allows LDAP authentication bypass (except when a user is enrolled in two-factor authentication).
Openvpn Openvpn Access Server
383
VMScore
CVE-2020-11462
An issue exists in OpenVPN Access Server prior to 2.7.0 and 2.8.x prior to 2.8.3. With the full featured RPC2 interface enabled, it is possible to achieve a temporary DoS state of the management interface when sending an XML Entity Expansion (XEE) payload to the XMLRPC based RPC2...
Openvpn Openvpn Access Server
445
VMScore
CVE-2020-36382
OpenVPN Access Server 2.7.3 to 2.8.7 allows remote malicious users to trigger an assert during the user authentication phase via incorrect authentication token data in an early phase of the user authentication resulting in a denial of service.
Openvpn Openvpn Access Server
445
VMScore
CVE-2020-15074
OpenVPN Access Server older than version 2.8.4 and version 2.9.5 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp.
Openvpn Openvpn Access Server
445
VMScore
CVE-2021-4234
OpenVPN Access Server 2.10 and prior versions are susceptible to resending multiple packets in a response to a reset packet sent from the client which the client again does not respond to, resulting in a limited amplification attack.
Openvpn Openvpn Access Server
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »