On 13/11/2024 14:59, נתי שטרן wrote:

---------- Forwarded message ---------
מאת: *נתי שטרן* <nsh...@gmail.com <mailto:nsh...@gmail.com>>
‪Date: יום ד׳, 13 בנוב׳ 2024, 15:52‬
Subject: Re: [Openvpn-devel] Inquiry About Potential Vulnerabilities in OpenVPN for Remote Code Execution (RCE)
To: Gert Doering <g...@greenie.muc.de <mailto:g...@greenie.muc.de>>
Cc: Arne Schwabe <a...@rfc2549.org <mailto:a...@rfc2549.org>>


I want to find zerodays but I glad to any help on this ( tools,methodology etc.)

Thanks
Netanel

That's great! The core components of all OpenVPN products are open source, so you should find everything you need online. For OpenVPN Access Server and OpenVPN Connect, there is no source code available for the proprietary bits. But you are free to try to find security issues in any of our products.

If you find anything, please have a look at the "Report a security vulnerability" section here: https://openvpn.net/contact/

If you find critical issue, we kindly ask you to PGP encrypt the report you send to secur...@openvpn.net.


--
kind regards,

David Sommerseth
OpenVPN Inc




_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to