cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-11149,https://securityvulnerability.io/vulnerability/CVE-2024-11149,VMX VMM Limit Restoration Issue,"OpenBSD version 7.4 prior to errata 014 contains a vulnerability in its virtual machine monitor (vmm) that fails to correctly restore General Descriptor Table Register (GDTR) limits on Intel VMX CPUs. This mismanagement can lead to improper memory handling within virtual machines, potentially allowing for unforeseen interactions or security lapses. Users of OpenBSD should apply the pertinent patches to safeguard their systems from this vulnerability.",OpenBSD,OpenBSD,7.9,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-06T01:56:12.697Z,0 CVE-2024-11148,https://securityvulnerability.io/vulnerability/CVE-2024-11148,OpenBSD 7.4 before errata 006 is vulnerable to NULL dereference in httpd,"The httpd(8) component in OpenBSD versions 7.3 and 7.4 is susceptible to a NULL dereference vulnerability. This flaw emerges when the server processes a malformed fastcgi request, leading to potential server disruptions or crashes. Implementing the latest patches provided in the respective errata is crucial for maintaining the integrity and availability of the service.",OpenBSD,OpenBSD,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-05T19:50:19.954Z,0 CVE-2023-38408,https://securityvulnerability.io/vulnerability/CVE-2023-38408,Remote Code Execution Vulnerability in OpenSSH's ssh-agent Feature,"The ssh-agent feature in OpenSSH versions prior to 9.3p2 is susceptible to a vulnerability due to an insufficiently trusted search path. This flaw allows for remote code execution when an ssh-agent is forwarded to an attacker-controlled environment. The vulnerability stems from a legacy issue that was not thoroughly addressed in previous security updates, exposing users to potential exploitation through agent forwarding mechanisms.",OpenBSD,Openssh,9.8,CRITICAL,0.03985999897122383,false,,false,false,true,2024-10-15T23:15:13.000Z,true,false,false,,2023-07-20T03:15:00.000Z,0 CVE-2023-35784,https://securityvulnerability.io/vulnerability/CVE-2023-35784,Double Free Vulnerability in OpenBSD and LibreSSL Products,"A vulnerability has been identified in OpenBSD versions 7.2 prior to errata 026 and 7.3 prior to errata 004, as well as in LibreSSL versions before 3.6.3 and 3.7.x before 3.7.3. The issue arises when SSL_clear is called, potentially leading to a double free or use after free situation. This flaw could be exploited to compromise application integrity and result in unexpected behavior, making it crucial for affected users to apply available patches immediately.",OpenBSD,"OpenBSD,Libressl",9.8,CRITICAL,0.0035800000187009573,false,,false,false,false,,,false,false,,2023-06-16T00:00:00.000Z,0 CVE-2021-46880,https://securityvulnerability.io/vulnerability/CVE-2021-46880,Authentication Bypass in LibreSSL and OpenBSD Products,"An authentication bypass vulnerability exists in LibreSSL and OpenBSD products due to an issue in the x509_verify.c component. This flaw arises because errors related to unverified certificate chains are occasionally ignored, enabling attackers to bypass authentication mechanisms. Users of impacted versions should apply necessary patches to mitigate potential security risks.",OpenBSD,"OpenBSD,Libressl",9.8,CRITICAL,0.0012499999720603228,false,,false,false,false,,,false,false,,2023-04-15T00:15:00.000Z,0 CVE-2023-29323,https://securityvulnerability.io/vulnerability/CVE-2023-29323,Remote Code Execution Vulnerability in OpenSMTPD by OpenBSD,"A flaw in the ascii_load_sockaddr function within smtpd of OpenBSD and OpenSMTPD allows for an abort when processing a connection from a local, scoped IPv6 address, potentially leading to service disruptions. This vulnerability requires immediate attention to ensure service reliability and security integrity.",OpenBSD,"OpenBSD,Opensmtpd",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2023-04-04T23:15:00.000Z,0 CVE-2023-28531,https://securityvulnerability.io/vulnerability/CVE-2023-28531,Smartcard Key Management Vulnerability in OpenSSH by OpenBSD,"A security flaw exists in OpenSSH versions prior to 9.3, where the ssh-add tool inadvertently adds smartcard keys to the ssh-agent without enforcing the necessary per-hop destination constraints. This weakness allows for potential unauthorized access to sensitive resources by failing to properly limit the context in which keys are added. Users operating on affected versions should assess their security stance and consider implementing available mitigations.",OpenBSD,Openssh,9.8,CRITICAL,0.0015300000086426735,false,,false,false,false,,,false,false,,2023-03-17T04:15:00.000Z,0 CVE-2023-27567,https://securityvulnerability.io/vulnerability/CVE-2023-27567,TCP Packet Vulnerability in OpenBSD Affects Kernel Stability,"In OpenBSD 7.2, a vulnerability exists when a TCP packet targeting destination port 0 is processed under a pf divert-to rule, potentially leading to a kernel crash. This situation can be exploited to disrupt the system’s stability, allowing for operational challenges and potential service interruptions. Immediate attention and patching are recommended to safeguard against this issue.",OpenBSD,OpenBSD,7.5,HIGH,0.0011899999808520079,false,,false,false,false,,,false,false,,2023-03-03T00:00:00.000Z,0 CVE-2022-27882,https://securityvulnerability.io/vulnerability/CVE-2022-27882,Heap-Based Buffer Overflow in OpenBSD's SLAACD Component,"The SLAACD component in OpenBSD versions 6.9 and 7.0 is susceptible to a heap-based buffer overflow due to an integer signedness error when processing crafted IPv6 router advertisements. This flaw can be exploited under certain conditions, although implementations of privilege separation and pledge can mitigate the risks of exploitation.",OpenBSD,OpenBSD,7.5,HIGH,0.0026400000788271427,false,,false,false,false,,,false,false,,2022-03-25T17:13:23.000Z,0 CVE-2022-27881,https://securityvulnerability.io/vulnerability/CVE-2022-27881,Buffer Overflow Vulnerability in OpenBSD's SLAACD Component,"The SLAACD component in OpenBSD versions 6.9 and 7.0 prior to February 21, 2022, contains a buffer overflow vulnerability that can be triggered by an IPv6 router advertisement. This occurs if the advertisement contains more than seven nameservers. While the potential for exploitation exists, mitigating factors such as privilege separation and pledge can reduce the risk.",OpenBSD,OpenBSD,7.5,HIGH,0.0020699999295175076,false,,false,false,false,,,false,false,,2022-03-25T17:13:08.000Z,0 CVE-2021-41617,https://securityvulnerability.io/vulnerability/CVE-2021-41617,Privilege Escalation Vulnerability in OpenSSH Affecting Multiple Versions,"The sshd component of OpenSSH versions 6.2 through 8.x, prior to 8.8, contains a significant vulnerability that can lead to privilege escalation. This issue arises when specific non-default configurations are applied, leading to supplemental groups not being initialized properly. If the configuration allows the execution of AuthorizedKeysCommand or AuthorizedPrincipalsCommand as a different user, these commands may inherit group privileges from the sshd process, thereby exposing the system to unauthorized access and control. Users are advised to review their configurations and update to the latest version to mitigate potential risks.",OpenBSD,Openssh,7,HIGH,0.0005000000237487257,false,,false,false,false,,,false,false,,2021-09-26T00:00:00.000Z,0 CVE-2019-25049,https://securityvulnerability.io/vulnerability/CVE-2019-25049,Out-of-Bounds Read Vulnerability in LibreSSL by The OpenBSD Foundation,"An out-of-bounds read vulnerability exists in LibreSSL versions 2.9.1 through 3.2.1, triggered during the asn1_item_print_ctx function call from asn1_template_print_ctx. This flaw could lead to potential leaks of sensitive information and undermine the integrity of cryptographic operations, emphasizing the need for users to ensure their systems are updated to mitigate possible risks.",OpenBSD,Libressl,7.1,HIGH,0.001230000052601099,false,,false,false,false,,,false,false,,2021-07-01T02:53:38.000Z,0 CVE-2019-25048,https://securityvulnerability.io/vulnerability/CVE-2019-25048,Heap-Based Buffer Over-Read in LibreSSL Product from OpenBSD,"OpenBSD's LibreSSL versions ranging from 2.9.1 to 3.2.1 are subject to a heap-based buffer over-read vulnerability stemming from the do_print_ex function. This issue arises during the execution of ASN.1 item printing functions, potentially allowing attackers to read sensitive data from memory. The flawed handling of input can lead to unintended data exposure, raising concerns for applications reliant on these versions of LibreSSL.",OpenBSD,Libressl,7.1,HIGH,0.001230000052601099,false,,false,false,false,,,false,false,,2021-07-01T02:53:25.000Z,0 CVE-2010-4816,https://securityvulnerability.io/vulnerability/CVE-2010-4816,Remote Denial of Service Vulnerability in FreeBSD ftpd Service,"A null pointer dereference vulnerability exists in the ftpd service of FreeBSD and OpenBSD that could allow an attacker to trigger a remote denial of service. This vulnerability affects various versions of FreeBSD including 8.0, 6.3, and 4.9, as well as OpenBSD 4.6. Exploiting this flaw can lead to the unavailability of the ftpd service, compromising the security posture of affected systems.",OpenBSD,FreeBSD And OpenBSD Ftpd Service,7.5,HIGH,0.0036299999337643385,false,,false,false,false,,,false,false,,2021-06-22T13:44:58.000Z,0 CVE-2021-28041,https://securityvulnerability.io/vulnerability/CVE-2021-28041,Double Free Vulnerability in OpenSSH Affects Legacy Systems and Agent Forwarding,"A double free vulnerability exists in the ssh-agent component of OpenSSH versions before 8.5. This flaw can lead to potential exploitation in specific scenarios, such as when there is unconstrained access to the agent socket on outdated operating systems or if an agent is forwarded to a host controlled by an attacker. This presents a risk that could compromise the integrity and confidentiality of user sessions.",OpenBSD,Openssh,7.1,HIGH,0.0027099999133497477,false,,false,false,false,,,false,false,,2021-03-05T19:07:34.000Z,0 CVE-2020-16088,https://securityvulnerability.io/vulnerability/CVE-2020-16088,Authentication Bypass in OpenIKED used by OpenBSD,"The vulnerability in OpenIKED, implemented in OpenBSD up to version 6.7, arises from faulty logic in the ca.c file that incorrectly verifies whether a public key is valid. This flaw may allow unauthorized parties to bypass authentication mechanisms, posing a significant risk to the security posture of affected systems.",OpenBSD,OpenBSD,9.8,CRITICAL,0.006209999788552523,false,,false,false,false,,,false,false,,2020-07-28T11:46:41.000Z,0 CVE-2020-15778,https://securityvulnerability.io/vulnerability/CVE-2020-15778,Command Injection Vulnerability in OpenSSH's SCP Function,"A vulnerability in OpenSSH's SCP functionality allows attackers to perform command injection through the handling of destination arguments. Specifically, the issue arises in the scp.c toremote function, where the use of backtick characters in the destination string can lead to arbitrary command execution. The vendor has acknowledged that they intentionally omit validation of 'anomalous argument transfers' to maintain existing workflows, potentially exposing users to unwanted risks. This situation highlights a significant security concern, emphasizing the need for thorough validation in command handling within network services.",OpenBSD,Openssh,7.8,HIGH,0.005869999993592501,false,,false,false,true,2023-09-27T19:58:18.000Z,true,false,false,,2020-07-24T00:00:00.000Z,0 CVE-2020-12062,https://securityvulnerability.io/vulnerability/CVE-2020-12062,File Overwrite Vulnerability in OpenSSH 8.2 Scp Client,"The scp client in OpenSSH 8.2 exhibits a vulnerability that allows a malicious unprivileged user on a remote server to overwrite files in the client's download directory. This occurs due to the improper handling of responses during the utimes system call. If a victim employs the 'scp -rp' command to download a file hierarchy and the hierarchy contains a crafted subdirectory created by the attacker, this can lead to unintended file manipulation. Although the vendor notes that this exploit requires the attacker to have certain permissions under the scp protocol, it still poses a potential risk to users.",OpenBSD,Openssh,7.5,HIGH,0.00139999995008111,false,,false,false,false,,,false,false,,2020-06-01T15:28:36.000Z,0 CVE-2020-7247,https://securityvulnerability.io/vulnerability/CVE-2020-7247,Command Execution Vulnerability in OpenSMTPD by OpenBSD,"The smtp_mailaddr function in smtp_session.c within OpenSMTPD versions 6.6 and OpenBSD 6.6 is vulnerable to command execution. Remote attackers can exploit this vulnerability by sending specially crafted SMTP commands, particularly utilizing shell metacharacters in the MAIL FROM field. This flaw arises from improper handling of return values during input validation, specifically within uncommented default configurations, allowing attackers to potentially execute arbitrary commands with root privileges.",OpenBSD,Opensmtpd,9.8,CRITICAL,0.9739099740982056,true,2022-03-25T00:00:00.000Z,false,false,true,2022-02-07T10:59:36.000Z,true,false,false,,2020-01-29T15:53:18.000Z,0 CVE-2019-19726,https://securityvulnerability.io/vulnerability/CVE-2019-19726,Local privilege escalation in OpenBSD affecting setuid programs,"OpenBSD versions up to 6.6 are susceptible to a local privilege escalation vulnerability due to improper handling of the LD_LIBRARY_PATH environment variable in setuid programs. Attackers can exploit this flaw by setting a minimal RLIMIT_DATA resource limit, which allows them to bypass security checks implemented in the dynamic loader (ld.so). This vulnerability can be exploited during the execution of commands like chpass or passwd, permitting the attacker to run their own code with root privileges.",OpenBSD,OpenBSD,7.8,HIGH,0.0005600000149570405,false,,false,false,false,,,false,false,,2019-12-12T00:00:00.000Z,0 CVE-2019-19521,https://securityvulnerability.io/vulnerability/CVE-2019-19521,Authentication Bypass in OpenBSD 6.6 Affecting Libc,"The vulnerability identified in OpenBSD 6.6 involves an authentication bypass in the libc library, which could allow unauthorized access through the -schallenge username in services like smtpd, ldapd, or radiusd. The issue is largely related to the files gen/auth_subr.c and gen/authenticate.c, as well as components of the login system. This flaw raises significant concerns regarding the integrity of user authentication and highlights the need for immediate remediation to protect against unauthorized system access.",OpenBSD,OpenBSD,9.8,CRITICAL,0.03970000147819519,false,,false,false,false,,,false,false,,2019-12-05T00:15:00.000Z,0 CVE-2019-19520,https://securityvulnerability.io/vulnerability/CVE-2019-19520,Privilege Escalation Vulnerability in OpenBSD xlock Component,"The xlock utility in OpenBSD 6.6 contains a vulnerability that allows local users to escalate their privileges. This flaw arises from improper handling of the LIBGL_DRIVERS_PATH environment variable within the xenocara/lib/mesa/src/loader/loader.c file, specifically during the dynamic loading process using dlopen. By manipulating this environment variable, a local user can gain unauthorized access to functions or permissions restricted to the auth group, posing a significant security risk to affected systems.",OpenBSD,OpenBSD,7.8,HIGH,0.0005799999926239252,false,,false,false,true,2020-11-21T07:30:10.000Z,true,false,false,,2019-12-05T00:15:00.000Z,0 CVE-2019-19522,https://securityvulnerability.io/vulnerability/CVE-2019-19522,Authentication Vulnerability in OpenBSD by OpenBSD Foundation,"In OpenBSD 6.6, a specific configuration that enables S/Key or YubiKey authentication allows local users within the auth group to escalate their privileges to root. This vulnerability arises because the files associated with root, located in /etc/skey or /var/db/yubikey, can be modified by non-root users. This misconfiguration can lead to severe security implications if exploited.",OpenBSD,OpenBSD,7.8,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2019-12-05T00:15:00.000Z,0 CVE-2019-19519,https://securityvulnerability.io/vulnerability/CVE-2019-19519,Local User Privilege Escalation in OpenBSD 6.6 via Logic Error in su Command,"In OpenBSD 6.6, a logic error in the main function of the 'su' command allows local users to leverage the -L option for unauthorized access to any login class, bypassing intended restrictions. This can lead to privilege escalation risks, potentially disrupting system security.",OpenBSD,OpenBSD,7.8,HIGH,0.0005799999926239252,false,,false,false,false,,,false,false,,2019-12-05T00:15:00.000Z,0 CVE-2019-16905,https://securityvulnerability.io/vulnerability/CVE-2019-16905,Integer Overflow Vulnerability in OpenSSH Affects Key Parsing,"OpenSSH versions 7.7 through 7.9 and 8.x prior to version 8.1 may be prone to an integer overflow vulnerability when compiled with an experimental XMSS key type. This issue occurs during the pre-authentication phase and arises from an error in the XMSS key parsing algorithm, potentially leading to memory corruption and enabling local code execution. The XMSS implementation remains experimental across all released OpenSSH versions, and there is no officially supported method to activate it in portable builds.",OpenBSD,Openssh,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2019-10-09T00:00:00.000Z,0