Search CVE reports
121 – 130 of 42993 results
wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algorithm CertificateVerify message, an out-of-bounds read can occur on crafted input. This can only occur when --enable-experimental...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Heap out-of-bounds read in PKCS7 parsing. A crafted PKCS7 message can trigger an OOB read on the heap. The missing bounds check is in the indefinite-length end-of-content verification loop in PKCS7_VerifySignedData().
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ. ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This...
1 affected package
activemq
| Package | 18.04 LTS |
|---|---|
| activemq | Needs evaluation |
Livestatus injection in the prediction graph page in Checkmk <2.5.0b4, <2.4.0p26, and <2.3.0p47 allows an authenticated user to inject arbitrary Livestatus commands via a crafted service name parameter due to insufficient...
1 affected package
check-mk
| Package | 18.04 LTS |
|---|---|
| check-mk | Needs evaluation |
Livestatus injection in the notification test mode in Checkmk <2.5.0b4 and <2.4.0p26 allows an authenticated user with access to the notification test page to inject arbitrary Livestatus commands via a crafted service description.
1 affected package
check-mk
| Package | 18.04 LTS |
|---|---|
| check-mk | Needs evaluation |
Livestatus injection in the monitoring quicksearch in Checkmk <2.5.0b4 allows an authenticated attacker to inject livestatus commands via the search query due to insufficient input sanitization in search filter plugins.
1 affected package
check-mk
| Package | 18.04 LTS |
|---|---|
| check-mk | Needs evaluation |