Search CVE reports


Toggle filters

71 – 80 of 42933 results

Status is adjusted based on your filters.


CVE-2026-5477

Medium priority
Needs evaluation

An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used theĀ guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5466

Medium priority
Needs evaluation

wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5460

Medium priority
Needs evaluation

A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5448

Medium priority
Needs evaluation

X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5447

Medium priority
Needs evaluation

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5446

Medium priority
Needs evaluation

In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonce for every application-data record. Because wc_AriaEncrypt is stateless and passes the caller-supplied IV verbatim to the...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5445

Medium priority
Needs evaluation

An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup...

1 affected package

orthanc

Package 18.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5444

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists in the PAM image parsing logic. When Orthanc processes a crafted PAM image embedded in a DICOM file, image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen...

1 affected package

orthanc

Package 18.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5443

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLOR` DICOM images. Pixel length validation uses 32-bit multiplication for width and height calculations. If these values overflow, the validation check...

1 affected package

orthanc

Package 18.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5442

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large...

1 affected package

orthanc

Package 18.04 LTS
orthanc Needs evaluation
Show less packages