OpenVPN.openvpn is vulnerable to Improper Validation of Specified Type of Input
24
Low Risk
Affected versions of OpenVPN prior to 2.6.11 do not properly sanitize PUSH_REPLY messages, allowing a malicious server to inject unexpected and arbitrary data that may be written to client logs.
You are affected if you are using a version that falls within the vulnerable range.
OpenVPN.openvpn is vulnerable to Improper Validation of Specified Type of Input in versions 2.5.0 - 2.5.10 and 2.6.0 - 2.6.11.
Upgrade the OpenVPN.openvpn library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant