6 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors. La vulnerabilidad de copia de búfer sin comprobar el tamaño de la entrada ('Desbordamiento de búfer clásico') en el componente cgi en Synology SSL VPN Client anterior a 1.4.7-0687 permite a los usuarios locales realizar ataques de denegación de servicio a través de vectores no especificados. • https://www.synology.com/en-global/security/advisory/Synology_SA_23_12 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Stormshield SSL VPN Client before 3.2.0. If multiple address books are used, an attacker may be able to access the other encrypted address book. • https://advisories.stormshield.eu https://advisories.stormshield.eu/2022-029 • CWE-326: Inadequate Encryption Strength •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Stormshield Network Security (SNS) VPN SSL Client 2.1.0 through 2.8.0 has Insecure Permissions. • https://advisories.stormshield.eu https://advisories.stormshield.eu/2021-004 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Stormshield SSL VPN Client before 3.2.0. A logged-in user, able to only launch the VPNSSL Client, can use the OpenVPN instance to execute malicious code as administrator on the local machine. • https://advisories.stormshield.eu/2022-028 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Lack of administrator control over security vulnerability in client.cgi in Synology SSL VPN Client before 1.2.5-0226 allows remote attackers to conduct man-in-the-middle attacks via the (1) command, (2) hostname, or (3) port parameter. Una falta de control de administrador sobre una vulnerabilidad de seguridad en client.cgi en Synology SSL VPN Client, en versiones anteriores a la 1.2.5-0226, permite a los atacantes remotos realizar ataques de Man-in-the-Middle (MitM) mediante los parámetros (1) command, (2) hostname o (3) port. • https://www.synology.com/security/advisory/Synology_SA_18_30 • CWE-671: Lack of Administrator Control over Security •