CVE-2025-4412
- EPSS 0.03%
- Veröffentlicht 27.05.2025 10:15:19
- Zuletzt bearbeitet 28.05.2025 15:01:30
On macOS systems, by utilizing a Launch Agent and loading the viscosity_openvpn process from the application bundle, it is possible to load a dynamic library with Viscosity's TCC (Transparency, Consent, and Control) identity. The acquired resource ac...
CVE-2017-20123
- EPSS 0.61%
- Veröffentlicht 30.06.2022 05:15:07
- Zuletzt bearbeitet 21.11.2024 03:22:41
A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This affects an unknown part of the component DLL Handler. The manipulation leads to untrusted search path. It is possible to initiate the attack remotely. The exploit ...
CVE-2020-5180
- EPSS 0.07%
- Veröffentlicht 14.01.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:33:38
Viscosity 1.8.2 on Windows and macOS allows an unprivileged user to set a subset of OpenVPN parameters, which can be used to load a malicious library into the memory of the OpenVPN process, leading to limited local privilege escalation. (When a VPN c...
- EPSS 49.44%
- Veröffentlicht 10.01.2020 20:15:14
- Zuletzt bearbeitet 21.11.2024 01:42:37
A Privilege Escalation vulnerability exists in Viscosity 1.4.1 on Mac OS X due to a path name validation issue in the setuid-set ViscosityHelper binary, which could let a remote malicious user execute arbitrary code