📦 Strongswan
by Strongswan
🔍 What is Strongswan?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in strongSwan allows unauthenticated remote attackers to execute arbitrary code via a buffer overflow in the charon-tkm DH proxy. Attackers can trigger this by sending a crafted IKE...
This vulnerability in strongSwan allows a malicious VPN responder to bypass authentication by sending an EAP-Success message prematurely. Attackers can establish unauthorized VPN connections without p...
CVE-2022-4967 is an authorization bypass vulnerability in strongSwan VPN software where clients can authenticate with trusted certificates but claim arbitrary identities, bypassing identity-based acce...
CVE-2021-41990 is an integer overflow vulnerability in the gmp plugin of strongSwan VPN software. Attackers can trigger this by sending a specially crafted certificate with an RSASSA-PSS signature, po...