Search CVE reports


Toggle filters

161 – 170 of 37963 results

Status is adjusted based on your filters.


CVE-2026-5479

Medium priority
Needs evaluation

In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EVP_CipherFinal (and related EVP cipher finalization functions) fails to verify the authentication tag before returning plaintext to the caller. When an...

1 affected package

wolfssl

Package 22.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5477

Medium priority
Needs evaluation

An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used theĀ guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where...

1 affected package

wolfssl

Package 22.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5466

Medium priority
Needs evaluation

wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against...

1 affected package

wolfssl

Package 22.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5460

Medium priority
Needs evaluation

A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...

1 affected package

wolfssl

Package 22.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5448

Medium priority
Needs evaluation

X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when...

1 affected package

wolfssl

Package 22.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5393

Medium priority
Needs evaluation

Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algorithm CertificateVerify message, an out-of-bounds read can occur on crafted input. This can only occur when --enable-experimental...

1 affected package

wolfssl

Package 22.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5392

Medium priority
Needs evaluation

Heap out-of-bounds read in PKCS7 parsing. A crafted PKCS7 message can trigger an OOB read on the heap. The missing bounds check is in the indefinite-length end-of-content verification loop in PKCS7_VerifySignedData().

1 affected package

wolfssl

Package 22.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5188

Medium priority
Needs evaluation

An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the...

1 affected package

wolfssl

Package 22.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-39304

Medium priority
Needs evaluation

Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ. ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This...

1 affected package

activemq

Package 22.04 LTS
activemq Needs evaluation
Show less packages

CVE-2026-33457

Medium priority

Not in release

Livestatus injection in the prediction graph page in Checkmk <2.5.0b4, <2.4.0p26, and <2.3.0p47 allows an authenticated user to inject arbitrary Livestatus commands via a crafted service name parameter due to insufficient...

1 affected package

check-mk

Package 22.04 LTS
check-mk Not in release
Show less packages