Количество 186
Количество 186
CVE-2016-6329
OpenVPN, when using a 64-bit block cipher, makes it easier for remote ...

CVE-2008-3459
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.

CVE-2008-3459
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.
CVE-2008-3459
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when ...

CVE-2005-2534
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.

CVE-2005-2534
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.
CVE-2005-2534
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not ena ...

CVE-2005-2533
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.

CVE-2005-2533
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.
CVE-2005-2533
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode ...

CVE-2005-2532
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.

CVE-2005-2532
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
CVE-2005-2532
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue w ...

CVE-2005-2531
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.

CVE-2005-2531
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.
CVE-2005-2531
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authe ...

BDU:2025-03850
Уязвимость службы Interactive Service (iservice) клиента OpenVPN GUI программного обеспечения OpenVPN, позволяющая нарушителю получить несанкционированный доступ к учетной записи пользователя

BDU:2021-03572
Уязвимость библиотеки OpenSSL программного обеспечения OpenVPN, позволяющая нарушителю выполнить произвольный код
GHSA-q6wh-cc86-fx6h
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.
GHSA-p99v-qjfm-8vvq
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
CVE-2016-6329 OpenVPN, when using a 64-bit block cipher, makes it easier for remote ... | CVSS3: 5.9 | 9% Низкий | больше 8 лет назад | |
![]() | CVE-2008-3459 Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters. | CVSS2: 7.6 | 1% Низкий | почти 17 лет назад |
![]() | CVE-2008-3459 Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters. | CVSS2: 7.6 | 1% Низкий | почти 17 лет назад |
CVE-2008-3459 Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when ... | CVSS2: 7.6 | 1% Низкий | почти 17 лет назад | |
![]() | CVE-2005-2534 Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate. | CVSS2: 2.6 | 1% Низкий | почти 20 лет назад |
![]() | CVE-2005-2534 Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate. | CVSS2: 2.6 | 1% Низкий | почти 20 лет назад |
CVE-2005-2534 Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not ena ... | CVSS2: 2.6 | 1% Низкий | почти 20 лет назад | |
![]() | CVE-2005-2533 OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses. | CVSS2: 2.1 | 0% Низкий | почти 20 лет назад |
![]() | CVE-2005-2533 OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses. | CVSS2: 2.1 | 0% Низкий | почти 20 лет назад |
CVE-2005-2533 OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode ... | CVSS2: 2.1 | 0% Низкий | почти 20 лет назад | |
![]() | CVE-2005-2532 OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted. | CVSS2: 5 | 1% Низкий | почти 20 лет назад |
![]() | CVE-2005-2532 OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted. | CVSS2: 5 | 1% Низкий | почти 20 лет назад |
CVE-2005-2532 OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue w ... | CVSS2: 5 | 1% Низкий | почти 20 лет назад | |
![]() | CVE-2005-2531 OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts. | CVSS2: 5 | 1% Низкий | почти 20 лет назад |
![]() | CVE-2005-2531 OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts. | CVSS2: 5 | 1% Низкий | почти 20 лет назад |
CVE-2005-2531 OpenVPN before 2.0.1, when running with "verb 0" and without TLS authe ... | CVSS2: 5 | 1% Низкий | почти 20 лет назад | |
![]() | BDU:2025-03850 Уязвимость службы Interactive Service (iservice) клиента OpenVPN GUI программного обеспечения OpenVPN, позволяющая нарушителю получить несанкционированный доступ к учетной записи пользователя | CVSS3: 5.7 | 0% Низкий | около 1 года назад |
![]() | BDU:2021-03572 Уязвимость библиотеки OpenSSL программного обеспечения OpenVPN, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | почти 4 года назад |
GHSA-q6wh-cc86-fx6h OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service. | 1% Низкий | около 3 лет назад | ||
GHSA-p99v-qjfm-8vvq Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу