openvpn-monitor@1.1.2 vulnerabilities
A simple web based openvpn monitor
-
latest version
1.1.3
-
first published
6 years ago
-
latest version published
4 years ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the openvpn-monitor package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
openvpn-monitor is a web based OpenVPN monitor, that shows current connection information, such as users, location and data transferred. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). The client disconnect feature does not require a CSRF token. An attacker can create an CSRF attack page; when a victim with access to the How to fix Cross-site Request Forgery (CSRF)? A fix was pushed into the |
[0,)
|
openvpn-monitor is a web based OpenVPN monitor, that shows current connection information, such as users, location and data transferred. Affected versions of this package are vulnerable to Command Injection via the OpenVPN management interface socket. An attacker can use a newline character ( How to fix Command Injection? A fix was pushed into the |
[0,)
|
openvpn-monitor is a web based OpenVPN monitor, that shows current connection information, such as users, location and data transferred. Affected versions of this package are vulnerable to Access Restriction Bypass. When the How to fix Access Restriction Bypass? A fix was pushed into the |
[0,)
|