Search CVE reports


Toggle filters

71 – 80 of 33763 results

Status is adjusted based on your filters.


CVE-2026-5772

Medium priority
Needs evaluation

A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * exhausts the entire hostname...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5507

Medium priority
Needs evaluation

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5504

Medium priority
Needs evaluation

A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover plaintext through repeated decryption queries with modified ciphertext. In previous versions of wolfSSL the interior padding bytes...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5503

Medium priority
Needs evaluation

In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally even when TLSX_Find returned NULL. This caused TLSX_UseSNI to attach the attacker-controlled publicName to the shared WOLFSSL_CTX when no inner SNI...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5501

Medium priority
Needs evaluation

wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5500

Medium priority
Needs evaluation

wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5479

Medium priority
Needs evaluation

In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EVP_CipherFinal (and related EVP cipher finalization functions) fails to verify the authentication tag before returning plaintext to the caller. When an...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5477

Medium priority
Needs evaluation

An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used theĀ guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5466

Medium priority
Needs evaluation

wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5460

Medium priority
Needs evaluation

A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages