cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-35784,https://securityvulnerability.io/vulnerability/CVE-2023-35784,Double Free Vulnerability in OpenBSD and LibreSSL Products,"A vulnerability has been identified in OpenBSD versions 7.2 prior to errata 026 and 7.3 prior to errata 004, as well as in LibreSSL versions before 3.6.3 and 3.7.x before 3.7.3. The issue arises when SSL_clear is called, potentially leading to a double free or use after free situation. This flaw could be exploited to compromise application integrity and result in unexpected behavior, making it crucial for affected users to apply available patches immediately.",OpenBSD,"OpenBSD,Libressl",9.8,CRITICAL,0.0035800000187009573,false,,false,false,false,,,false,false,,2023-06-16T00:00:00.000Z,0 CVE-2021-46880,https://securityvulnerability.io/vulnerability/CVE-2021-46880,Authentication Bypass in LibreSSL and OpenBSD Products,"An authentication bypass vulnerability exists in LibreSSL and OpenBSD products due to an issue in the x509_verify.c component. This flaw arises because errors related to unverified certificate chains are occasionally ignored, enabling attackers to bypass authentication mechanisms. Users of impacted versions should apply necessary patches to mitigate potential security risks.",OpenBSD,"OpenBSD,Libressl",9.8,CRITICAL,0.0012499999720603228,false,,false,false,false,,,false,false,,2023-04-15T00:15:00.000Z,0 CVE-2022-48437,https://securityvulnerability.io/vulnerability/CVE-2022-48437,Leaf Certificate Verification Flaw in LibreSSL and OpenBSD,"A flaw exists in the leaf certificate verification process within LibreSSL and OpenBSD, specifically related to x509/x509_verify.c. When the function x509_verify_ctx_add_chain encounters an error during verification, it fails to properly log the error, resulting in inappropriate error messages being returned. This issue is exacerbated when a verification callback is in place, which instructs the verifier to continue processing upon facing an invalid certificate, potentially compromising certificate trust and validation processes.",OpenBSD,"OpenBSD,Libressl",5.3,MEDIUM,0.0006900000153109431,false,,false,false,false,,,false,false,,2023-04-12T00:00:00.000Z,0 CVE-2021-41581,https://securityvulnerability.io/vulnerability/CVE-2021-41581,Stack-based Buffer Over-read Vulnerability in LibreSSL Library,"A stack-based buffer over-read vulnerability exists in the x509_constraints_parse_mailbox function of the LibreSSL library. This issue arises when input data exceeds the DOMAIN_PART_MAX_LEN, resulting in a lack of proper string termination ('\0'). Such a vulnerability can lead to unauthorized access or unpredictable behavior, as it may allow malicious actors to manipulate or read sensitive data from the memory stack.",OpenBSD,Libressl,5.5,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2021-09-24T02:12:33.000Z,0 CVE-2019-25049,https://securityvulnerability.io/vulnerability/CVE-2019-25049,Out-of-Bounds Read Vulnerability in LibreSSL by The OpenBSD Foundation,"An out-of-bounds read vulnerability exists in LibreSSL versions 2.9.1 through 3.2.1, triggered during the asn1_item_print_ctx function call from asn1_template_print_ctx. This flaw could lead to potential leaks of sensitive information and undermine the integrity of cryptographic operations, emphasizing the need for users to ensure their systems are updated to mitigate possible risks.",OpenBSD,Libressl,7.1,HIGH,0.001230000052601099,false,,false,false,false,,,false,false,,2021-07-01T02:53:38.000Z,0 CVE-2019-25048,https://securityvulnerability.io/vulnerability/CVE-2019-25048,Heap-Based Buffer Over-Read in LibreSSL Product from OpenBSD,"OpenBSD's LibreSSL versions ranging from 2.9.1 to 3.2.1 are subject to a heap-based buffer over-read vulnerability stemming from the do_print_ex function. This issue arises during the execution of ASN.1 item printing functions, potentially allowing attackers to read sensitive data from memory. The flawed handling of input can lead to unintended data exposure, raising concerns for applications reliant on these versions of LibreSSL.",OpenBSD,Libressl,7.1,HIGH,0.001230000052601099,false,,false,false,false,,,false,false,,2021-07-01T02:53:25.000Z,0 CVE-2018-12434,https://securityvulnerability.io/vulnerability/CVE-2018-12434,,"LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",OpenBSD,Libressl,4.7,MEDIUM,0.0005099999834783375,false,,false,false,false,,,false,false,,2018-06-15T02:29:00.000Z,0 CVE-2018-8970,https://securityvulnerability.io/vulnerability/CVE-2018-8970,,"The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.",OpenBSD,Libressl,7.4,HIGH,0.0007699999841861427,false,,false,false,true,2018-03-25T11:22:47.000Z,true,false,false,,2018-03-24T21:00:00.000Z,0 CVE-2017-8301,https://securityvulnerability.io/vulnerability/CVE-2017-8301,,"LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_verify_result is relied upon for a later check of a verification result, in a use case where a user-provided verification callback returns 1, as demonstrated by acceptance of invalid certificates by nginx.",OpenBSD,Libressl,5.3,MEDIUM,0.0023799999617040157,false,,false,false,false,,,false,false,,2017-04-27T17:00:00.000Z,0 CVE-2014-9424,https://securityvulnerability.io/vulnerability/CVE-2014-9424,,Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake.,OpenBSD,Libressl,,,0.00571999978274107,false,,false,false,false,,,false,false,,2014-12-29T00:59:00.000Z,0