cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-35784,https://securityvulnerability.io/vulnerability/CVE-2023-35784,Double Free Vulnerability in OpenBSD and LibreSSL Products,"A vulnerability has been identified in OpenBSD versions 7.2 prior to errata 026 and 7.3 prior to errata 004, as well as in LibreSSL versions before 3.6.3 and 3.7.x before 3.7.3. The issue arises when SSL_clear is called, potentially leading to a double free or use after free situation. This flaw could be exploited to compromise application integrity and result in unexpected behavior, making it crucial for affected users to apply available patches immediately.",OpenBSD,"OpenBSD,Libressl",9.8,CRITICAL,0.003389999968931079,false,false,false,false,,false,false,2023-06-16T00:00:00.000Z,0 CVE-2021-46880,https://securityvulnerability.io/vulnerability/CVE-2021-46880,Authentication Bypass in LibreSSL and OpenBSD Products,"An authentication bypass vulnerability exists in LibreSSL and OpenBSD products due to an issue in the x509_verify.c component. This flaw arises because errors related to unverified certificate chains are occasionally ignored, enabling attackers to bypass authentication mechanisms. Users of impacted versions should apply necessary patches to mitigate potential security risks.",OpenBSD,"OpenBSD,Libressl",9.8,CRITICAL,0.0012499999720603228,false,false,false,false,,false,false,2023-04-15T00:15:00.000Z,0 CVE-2022-48437,https://securityvulnerability.io/vulnerability/CVE-2022-48437,,"An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate.",OpenBSD,"OpenBSD,Libressl",5.3,MEDIUM,0.0006900000153109431,false,false,false,false,,false,false,2023-04-12T00:00:00.000Z,0 CVE-2021-41581,https://securityvulnerability.io/vulnerability/CVE-2021-41581,,"x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.",OpenBSD,Libressl,5.5,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2021-09-24T02:12:33.000Z,0 CVE-2019-25049,https://securityvulnerability.io/vulnerability/CVE-2019-25049,,LibreSSL 2.9.1 through 3.2.1 has an out-of-bounds read in asn1_item_print_ctx (called from asn1_template_print_ctx).,OpenBSD,Libressl,7.1,HIGH,0.001230000052601099,false,false,false,false,,false,false,2021-07-01T02:53:38.000Z,0 CVE-2019-25048,https://securityvulnerability.io/vulnerability/CVE-2019-25048,,LibreSSL 2.9.1 through 3.2.1 has a heap-based buffer over-read in do_print_ex (called from asn1_item_print_ctx and ASN1_item_print).,OpenBSD,Libressl,7.1,HIGH,0.001230000052601099,false,false,false,false,,false,false,2021-07-01T02:53:25.000Z,0 CVE-2018-12434,https://securityvulnerability.io/vulnerability/CVE-2018-12434,,"LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",OpenBSD,Libressl,4.7,MEDIUM,0.0005099999834783375,false,false,false,false,,false,false,2018-06-15T02:29:00.000Z,0 CVE-2018-8970,https://securityvulnerability.io/vulnerability/CVE-2018-8970,,"The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.",OpenBSD,Libressl,7.4,HIGH,0.0007699999841861427,false,false,false,true,true,false,false,2018-03-24T21:00:00.000Z,0 CVE-2017-8301,https://securityvulnerability.io/vulnerability/CVE-2017-8301,,"LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_verify_result is relied upon for a later check of a verification result, in a use case where a user-provided verification callback returns 1, as demonstrated by acceptance of invalid certificates by nginx.",OpenBSD,Libressl,5.3,MEDIUM,0.0023799999617040157,false,false,false,false,,false,false,2017-04-27T17:00:00.000Z,0 CVE-2014-9424,https://securityvulnerability.io/vulnerability/CVE-2014-9424,,Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake.,OpenBSD,Libressl,,,0.00571999978274107,false,false,false,false,,false,false,2014-12-29T00:59:00.000Z,0