Search CVE reports


Toggle filters

71 – 80 of 38418 results

Status is adjusted based on your filters.


CVE-2026-5479

Medium priority
Needs evaluation

In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EVP_CipherFinal (and related EVP cipher finalization functions) fails to verify the authentication tag before returning plaintext to the caller. When an...

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5477

Medium priority
Needs evaluation

An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used theĀ guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where...

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5466

Medium priority
Needs evaluation

wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against...

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5460

Medium priority
Needs evaluation

A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5448

Medium priority
Needs evaluation

X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when...

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5447

Medium priority
Needs evaluation

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5446

Medium priority
Needs evaluation

In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonce for every application-data record. Because wc_AriaEncrypt is stateless and passes the caller-supplied IV verbatim to the...

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5445

Medium priority
Needs evaluation

An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup...

1 affected package

orthanc

Package 20.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5444

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists in the PAM image parsing logic. When Orthanc processes a crafted PAM image embedded in a DICOM file, image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen...

1 affected package

orthanc

Package 20.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5443

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLOR` DICOM images. Pixel length validation uses 32-bit multiplication for width and height calculations. If these values overflow, the validation check...

1 affected package

orthanc

Package 20.04 LTS
orthanc Needs evaluation
Show less packages