Patching for Windows Mac Linux
CVE Vulnerabilities for ExpressVPN
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2024‑25728 | 2024‑02‑11 22:15:08 | HIGH (8) | ExpressVPN before 12.73.0 on Windows, when split tunneling is used, sends DNS requests according to the Windows configuration (e.g., sends them to DNS servers operated by the user's ISP instead of to the ExpressVPN DNS servers), which may allow remote attackers to obtain sensitive information about websites visited by VPN users. | 4 | 4 | NETWORK |
CVE‑2020‑29238 | 2021‑03‑10 03:15:12 | HIGH (8) | An integer buffer overflow in the Nginx webserver of ExpressVPN Router version 1 allows remote attackers to obtain sensitive information when the server running as reverse proxy via specially crafted request. | 4 | 4 | NETWORK |
CVE‑2018‑15490 | 2019‑01‑02 18:29:01 | MEDIUM (7) | An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP is used for communication. The JSON-RPC XVPN.GetPreference and XVPN.SetPreference methods are vulnerable to path traversal, and allow reading and writing files on the file system on behalf of the service. | 0 | 0 | LOCAL |
Deep Windows, Mac, and Linux OS patching
Stay out of the "Negligent MSP" label because Lavawall® covers:- 30-312 times as many applications as popular RMMs.
- "optional" Windows patches, including firmware and drivers
- Mac OS and application patches
- Linux Kernel, OS, and package patches for more distribution types than we want to admit exist
Windows Mac Linux
What applications does Lavawall® monitor?
Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.