Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
londontrustmedia private internet access vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv3
CVE-2019-12571
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v0.9.8 beta (build 02099) for macOS could allow an authenticated, local malicious user to overwrite arbitrary files. When the client initiates a connection, the XML /tmp/pia-watcher.plist file is c...
Londontrustmedia Private Internet Access Vpn Client 0.9.8
7.1
CVSSv3
CVE-2019-12573
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux and macOS could allow an authenticated, local malicious user to overwrite arbitrary files. The openvpn_launcher binary is setuid root. This binary supports the --log option, which acc...
Londontrustmedia Private Internet Access Vpn Client 82
7.8
CVSSv3
CVE-2019-12574
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v1.0 for Windows could allow an authenticated, local malicious user to run arbitrary code with elevated privileges. The PIA client is vulnerable to a DLL injection vulnerability during the software...
Londontrustmedia Private Internet Access Vpn Client 1.0
7.8
CVSSv3
CVE-2019-12575
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux could allow an authenticated, local malicious user to run arbitrary code with elevated privileges. The root_runner.64 binary is setuid root. This binary executes /opt/pia/ruby/64/ruby...
Londontrustmedia Private Internet Access Vpn Client 82
7.8
CVSSv3
CVE-2019-12576
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for macOS could allow an authenticated, local malicious user to run arbitrary code with elevated privileges. The openvpn_launcher binary is setuid root. This program is called during the connec...
Londontrustmedia Private Internet Access Vpn Client 82
7.8
CVSSv3
CVE-2019-12577
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for macOS could allow an authenticated, local malicious user to run arbitrary code with elevated privileges. The macOS binary openvpn_launcher.64 is setuid root. This binary creates /tmp/pia_up...
Londontrustmedia Private Internet Access Vpn Client 82
7.8
CVSSv3
CVE-2019-12578
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux could allow an authenticated, local malicious user to run arbitrary code with elevated privileges. The openvpn_launcher.64 binary is setuid root. This binary executes /opt/pia/openvpn...
Londontrustmedia Private Internet Access Vpn Client 82
7.8
CVSSv3
CVE-2019-12579
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux and macOS could allow an authenticated, local malicious user to run arbitrary code with elevated privileges. The PIA Linux/macOS binary openvpn_launcher.64 binary is setuid root. This...
Londontrustmedia Private Internet Access Vpn Client 82
7.8
CVSSv3
CVE-2019-12572
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client 1.0.2 (build 02363) for Windows could allow an authenticated, local malicious user to run arbitrary code with elevated privileges. On startup, the PIA Windows service (pia-service.exe) loads the Op...
Londontrustmedia Private Internet Access 1.0.2
1 Github repository
7.8
CVSSv3
CVE-2018-10190
A vulnerability in London Trust Media Private Internet Access (PIA) VPN Client v77 for Windows could allow an unauthenticated, local malicious user to run executable files with elevated privileges. The vulnerability is due to insufficient implementation of access controls. The &q...
Londontrustmedia Private Internet Access 77
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »