Search CVE reports
61 – 70 of 38418 results
(A security vulnerability has been detected in DCMTK up to 3.6.5. The a ...)
1 affected package
dcmtk
| Package | 20.04 LTS |
|---|---|
| dcmtk | Needs evaluation |
R 3.4.4 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by injecting malicious input into the GUI Preferences language field. Attackers can craft a payload with a 292-byte offset and...
1 affected package
r-base
| Package | 20.04 LTS |
|---|---|
| r-base | Needs evaluation |
A security flaw has been discovered in musl libc up to 1.2.6. Affected is the function iconv of the file src/locale/iconv.c of the component GB18030 4-byte Decoder. Performing a manipulation results in inefficient algorithmic...
1 affected package
musl
| Package | 20.04 LTS |
|---|---|
| musl | Needs evaluation |
Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * exhausts the entire hostname...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover plaintext through repeated decryption queries with modified ciphertext. In previous versions of wolfSSL the interior padding bytes...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally even when TLSX_Find returned NULL. This caused TLSX_UseSNI to attach the attacker-controlled publicName to the shared WOLFSSL_CTX when no inner SNI...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |