Search CVE reports


Toggle filters

121 – 130 of 48612 results

Status is adjusted based on your filters.


CVE-2026-5295

Medium priority
Needs evaluation

A stack buffer overflow exists in wolfSSL's PKCS7 implementation in the wc_PKCS7_DecryptOri() function in wolfcrypt/src/pkcs7.c. When processing a CMS EnvelopedData message containing an OtherRecipientInfo (ORI) recipient, the...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5778

Medium priority
Needs evaluation

Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5772

Medium priority
Needs evaluation

A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * exhausts the entire hostname...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5264

Medium priority
Needs evaluation

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5263

Medium priority
Needs evaluation

URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5447

Medium priority
Needs evaluation

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5446

Medium priority
Needs evaluation

In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonce for every application-data record. Because wc_AriaEncrypt is stateless and passes the caller-supplied IV verbatim to the...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5194

Medium priority
Needs evaluation

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5187

Medium priority
Needs evaluation

Two potential heap out-of-bounds write locations existed in DecodeObjectId() in wolfcrypt/src/asn.c. First, a bounds check only validates one available slot before writing two OID arc values (out[0] and out[1]), enabling a 2-byte...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-34734

Medium priority
Needs evaluation

HDF5 is software for managing data. In 1.14.1-2 and earlier, a heap-use-after-free was found in the h5dump helper utility. An attacker who can supply a malicious h5 file can trigger a heap use-after-free. The freed object is...

1 affected package

hdf5

Package 16.04 LTS
hdf5 Needs evaluation
Show less packages