Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vpn client vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2002-1491
The Cisco VPN 5000 Client for MacOS prior to 5.2.2 records the most recently used login password in plaintext when saving "Default Connection" settings, which could allow local users to gain privileges.
Cisco Vpn 5000 Client 5.1.2
Cisco Vpn 5000 Client 5.2.1
828
VMScore
CVE-2010-0392
Stack-based buffer overflow in vpnconf.exe in TheGreenBow IPSec VPN Client 4.51.001, 4.65.003, and possibly other versions, allows user-assisted remote malicious users to execute arbitrary code via a long OpenScriptAfterUp parameter in a policy (.tgb) file, related to "phase...
Thegreenbow Ipsec Vpn Client 4.51.001
Thegreenbow Ipsec Vpn Client 4.65.003
935
VMScore
CVE-2007-6273
Multiple format string vulnerabilities in the configuration file in SonicWALL GLobal VPN Client 3.1.556 and 4.0.0.810 allow user-assisted remote malicious users to execute arbitrary code via format string specifiers in the (1) Hostname tag or the (2) name attribute in the Connect...
Sonicwall Global Vpn Client 3.1.556
Sonicwall Global Vpn Client 4.0.0.810
1 EDB exploit
730
VMScore
CVE-2002-1492
Buffer overflows in the Cisco VPN 5000 Client prior to 5.2.7 for Linux, and VPN 5000 Client prior to 5.2.8 for Solaris, allow local users to gain root privileges via (1) close_tunnel and (2) open_tunnel.
Cisco Vpn 5000 Client 5.2.6
Cisco Vpn 5000 Client 5.2.7
2 EDB exploits
312
VMScore
CVE-2007-1467
Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator...
Cisco Unified Meetingplace Express
Cisco Unified Personal Communicator
Cisco Vpn Client 3.5.2
Cisco Vpn Client 3.6.1
Cisco Vpn Client 4.0.2c
Cisco Vpn Client 4.8.1
Cisco Acs Solution Engine 4.1
Cisco Ciscoworks
Cisco Unified Video Advantage
Cisco Unified Videoconferencing
Cisco Vpn Client 3.5.2b
Cisco Vpn Client 3.6
Cisco Wan Manager
Cisco Wireless Lan Controllers
Cisco Security Device Manager
Cisco Unified Meetingplace
Cisco Vpn Client 3.5.1
Cisco Vpn Client 3.5.4
Cisco Vpn Client 4.0.2a
Cisco Network Analysis Module
Cisco Wireless Control System 4.0
Cisco Ip Communicator
605
VMScore
CVE-2007-4414
Cisco VPN Client on Windows prior to 4.8.02.0010 allows local users to gain privileges by enabling the "Start Before Logon" (SBL) and Microsoft Dial-Up Networking options, and then interacting with the dial-up networking dialog box.
Cisco Vpn Client
641
VMScore
CVE-2019-6145
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar...
Forcepoint Vpn Client
NA
CVE-2023-5748
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client prior to 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors.
Synology Ssl Vpn Client
605
VMScore
CVE-2018-8929
Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client prior to 1.2.4-0224 allows remote malicious users to conduct man-in-the-middle attacks via a crafted payload.
Synology Ssl Vpn Client
NA
CVE-2022-46782
An issue exists in Stormshield SSL VPN Client prior to 3.2.0. A logged-in user, able to only launch the VPNSSL Client, can use the OpenVPN instance to execute malicious code as administrator on the local machine.
Stormshield Ssl Vpn Client
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »