Search CVE reports


Toggle filters

671 – 680 of 49182 results

Status is adjusted based on your filters.


CVE-2026-33551

Medium priority
Needs evaluation

An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2...

1 affected package

keystone

Package 16.04
keystone Needs evaluation
Show less packages

CVE-2026-6042

Medium priority
Needs evaluation

A security flaw has been discovered in musl libc up to 1.2.6. Affected is the function iconv of the file src/locale/iconv.c of the component GB18030 4-byte Decoder. Performing a manipulation results in inefficient algorithmic...

1 affected package

musl

Package 16.04
musl Needs evaluation
Show less packages

CVE-2026-5501

Medium priority
Needs evaluation

wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is...

1 affected package

wolfssl

Package 16.04
wolfssl Needs evaluation
Show less packages

CVE-2026-5500

Medium priority
Needs evaluation

wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to...

1 affected package

wolfssl

Package 16.04
wolfssl Needs evaluation
Show less packages

CVE-2026-5479

Medium priority
Needs evaluation

In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EVP_CipherFinal (and related EVP cipher finalization functions) fails to verify the authentication tag before returning plaintext to the caller. When an...

1 affected package

wolfssl

Package 16.04
wolfssl Needs evaluation
Show less packages

CVE-2026-5477

Medium priority
Needs evaluation

An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used theĀ guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where...

1 affected package

wolfssl

Package 16.04
wolfssl Needs evaluation
Show less packages

CVE-2026-5466

Medium priority
Needs evaluation

wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against...

1 affected package

wolfssl

Package 16.04
wolfssl Needs evaluation
Show less packages

CVE-2026-5460

Medium priority
Needs evaluation

A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...

1 affected package

wolfssl

Package 16.04
wolfssl Needs evaluation
Show less packages

CVE-2026-5448

Medium priority
Needs evaluation

X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when...

1 affected package

wolfssl

Package 16.04
wolfssl Needs evaluation
Show less packages

CVE-2026-5393

Medium priority
Needs evaluation

Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algorithm CertificateVerify message, an out-of-bounds read can occur on crafted input. This can only occur when --enable-experimental...

1 affected package

wolfssl

Package 16.04
wolfssl Needs evaluation
Show less packages