CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “openbsd”

68 vulnerabilities found for “openbsd”

Page 1 of 4

CVE-2023-52556
MEDIUM6.2

In OpenBSD 7.4 before errata 009, a race condition between pf(4)'s processing of packets and expiration of packet states may cause a kernel panic.

openbsd / openbsd+9
Local
Published Mar 1, 2024
Page 1 of 4
CVE-2023-52557
HIGH7.5

In OpenBSD 7.3 before errata 016, npppd(8) could crash by a l2tp message which has an AVP (Attribute-Value Pair) with wrong length.

openbsd / openbsd+16
Network
Published Mar 1, 2024
CVE-2023-40216
MEDIUM5.5

OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences.

openbsd / openbsd+13
Local
Published Aug 10, 2023
CVE-2023-35784
CRITICAL9.8

A double free or use after free could occur after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3. NOTE: OpenSSL is not affected.

openbsd / libressl+3
Network
Published Jun 16, 2023
CVE-2021-46880
CRITICAL9.8

x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded.

openbsd / libressl+1
Network
Published Apr 15, 2023
CVE-2022-48437
MEDIUM5.3

An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate.

openbsd / libressl+1
Network
Published Apr 12, 2023
CVE-2023-29323
HIGH7.8

ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.

opensmtpd / opensmtpd+2
Local
Published Apr 4, 2023
CVE-2023-27567
HIGH7.5

In OpenBSD 7.2, a TCP packet with destination port 0 that matches a pf divert-to rule can crash the kernel.

openbsd / openbsd
Network
Published Mar 3, 2023
CVE-2022-27881
HIGH7.5

engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.

openbsd / openbsd+1
Network
Published Mar 25, 2022
CVE-2022-27882
HIGH7.5

slaacd in OpenBSD 6.9 and 7.0 before 2022-03-22 has an integer signedness error and resultant heap-based buffer overflow triggerable by a crafted IPv6 router advertisement. NOTE: privilege separation and pledge can prevent exploitation.

openbsd / openbsd+1
Network
Published Mar 25, 2022
CVE-2021-41581
MEDIUM5.5

x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.

openbsd / libressl
Local
Published Sep 24, 2021
CVE-2019-25048
HIGH7.1

LibreSSL 2.9.1 through 3.2.1 has a heap-based buffer over-read in do_print_ex (called from asn1_item_print_ctx and ASN1_item_print).

openbsd / libressl
Local
Published Jul 1, 2021
CVE-2019-25049
HIGH7.1

LibreSSL 2.9.1 through 3.2.1 has an out-of-bounds read in asn1_item_print_ctx (called from asn1_template_print_ctx).

openbsd / libressl
Local
Published Jul 1, 2021
CVE-2010-4816
HIGH7.5

It was found in FreeBSD 8.0, 6.3 and 4.9, and OpenBSD 4.6 that a null pointer dereference in ftpd/popen.c may lead to remote denial of service of the ftpd service.

openbsd / openbsd+3
Network
Published Jun 22, 2021
CVE-2020-26142
MEDIUM5.3

An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

openbsd / openbsd
Network
Published May 11, 2021
CVE-2020-16088
CRITICAL9.8

iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.

openbsd / openbsd
Network
Published Jul 28, 2020
CVE-2015-5334
CRITICAL9.8

Off-by-one error in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (program crash) or possible execute arbitrary code via a crafted X.509 certificate, which triggers a stack-based buffer overflow. Note: this vulnerability exists because of an incorrect fix for CVE-2014-3508.

openbsd / libressl+1
Network
Published Jan 23, 2020
CVE-2015-5333
HIGH7.5

Memory leak in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (memory consumption) via a large number of ASN.1 object identifiers in X.509 certificates.

openbsd / libressl+1
Network
Published Jan 23, 2020
CVE-2018-12434
MEDIUM4.7

LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

openbsd / libressl+4
Local
Published Jun 15, 2018
CVE-2018-8970
HIGH7.4

The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.

openbsd / libressl
Network
Published Mar 24, 2018