Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Openvpn
(Openvpn)Repositories | https://github.com/OpenVPN/openvpn |
#Vulnerabilities | 37 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-11-11 | CVE-2023-46849 | Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service. | Debian_linux, Fedora, Openvpn, Openvpn_access_server | 7.5 | ||
2024-07-08 | CVE-2024-28882 | OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session | Openvpn | N/A | ||
2025-01-06 | CVE-2024-5594 | OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs. | Openvpn | N/A | ||
2025-04-02 | CVE-2025-2704 | OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase | Openvpn | N/A |