Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openvpn openvpn 2.0.4 vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2006-1629
OpenVPN 2.0 up to and including 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
Openvpn Openvpn 2.0
Openvpn Openvpn 2.0.4
Openvpn Openvpn Access Server 2.0.1
Openvpn Openvpn Access Server 2.0.2
Openvpn Openvpn Access Server 2.0.3
Openvpn Openvpn Access Server 2.0.5
445
VMScore
CVE-2005-3409
OpenVPN 2.x prior to 2.0.4, when running in TCP mode, allows remote malicious users to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
Openvpn Openvpn 2.0 Beta13
Openvpn Openvpn 2.0 Rc9
Openvpn Openvpn 2.0 Test19
Openvpn Openvpn 2.0
Openvpn Openvpn 2.0 Test17
Openvpn Openvpn 2.0 Test10
Openvpn Openvpn 2.0 Test23
Openvpn Openvpn 2.0 Beta20
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0 Beta19
Openvpn Openvpn 2.0 Rc19
Openvpn Openvpn 2.0 Beta1
Openvpn Openvpn 2.0 Rc21
Openvpn Openvpn 2.0 Beta9
Openvpn Openvpn 2.0.1 Rc4
Openvpn Openvpn 2.0.1 Rc2
Openvpn Openvpn 2.0 Test26
Openvpn Openvpn 2.0 Rc2
Openvpn Openvpn 2.0 Test1
Openvpn Openvpn 2.0 Beta16
Openvpn Openvpn 2.0 Beta10
Openvpn Openvpn 2.0 Rc20
356
VMScore
CVE-2006-2229
OpenVPN 2.0.7 and previous versions, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote malicious users to view sensitive information or cause a denial o...
Openvpn Openvpn 2.0 Beta13
Openvpn Openvpn 2.0 Rc9
Openvpn Openvpn 2.0 Test19
Openvpn Openvpn 2.0
Openvpn Openvpn 2.0 Test17
Openvpn Openvpn 2.0 Test10
Openvpn Openvpn 2.0 Test23
Openvpn Openvpn 2.0 Beta20
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0 Beta19
Openvpn Openvpn 2.0 Rc19
Openvpn Openvpn 2.0 Beta1
Openvpn Openvpn 2.0.4
Openvpn Openvpn 2.0 Rc21
Openvpn Openvpn 2.0 Beta9
Openvpn Openvpn 2.0.1 Rc4
Openvpn Openvpn 2.0.1 Rc2
Openvpn Openvpn 2.0 Test26
Openvpn Openvpn 2.0 Rc2
Openvpn Openvpn 2.0 Test1
Openvpn Openvpn 2.0 Beta16
Openvpn Openvpn 2.0 Beta10
605
VMScore
CVE-2014-8104
OpenVPN 2.x prior to 2.0.11, 2.1.x, 2.2.x prior to 2.2.3, and 2.3.x prior to 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
Mageia Mageia 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Openvpn Openvpn 2.0 Rc9
Openvpn Openvpn 2.1
Openvpn Openvpn 2.0 Test19
Openvpn Openvpn 2.0 Test17
Openvpn Openvpn 2.0 Test28
Openvpn Openvpn 2.0 Test10
Openvpn Openvpn 2.2
Openvpn Openvpn 2.0 Test23
Openvpn Openvpn 2.2.2
Openvpn Openvpn 2.3
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0 Rc19
Openvpn Openvpn 2.2.1
Openvpn Openvpn 2.0.4
Openvpn Openvpn 2.0 Rc21
Openvpn Openvpn 2.3.4
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started