Vulnerabilities (CVE)

Filtered by vendor Tinc-vpn Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-16758 2 Debian, Tinc-vpn 2 Debian Linux, Tinc 2019-10-03 4.3 MEDIUM 5.9 MEDIUM
Missing message authentication in the meta-protocol in Tinc VPN version 1.0.34 and earlier allows a man-in-the-middle attack to disable the encryption of VPN packets.
CVE-2018-16737 1 Tinc-vpn 1 Tinc 2019-01-03 5.0 MEDIUM 5.3 MEDIUM
tinc before 1.0.30 has a broken authentication protocol, without even a partial mitigation.
CVE-2018-16738 2 Debian, Tinc-vpn 2 Debian Linux, Tinc 2019-01-03 4.3 MEDIUM 3.7 LOW
tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
CVE-2013-1428 1 Tinc-vpn 1 Tinc 2013-12-01 6.5 MEDIUM N/A
Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.