Search CVE reports


Toggle filters

21 – 30 of 48501 results

Status is adjusted based on your filters.


CVE-2026-5440

Medium priority
Needs evaluation

A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5439

Medium priority
Needs evaluation

A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5438

Medium priority
Needs evaluation

A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5437

Medium priority
Needs evaluation

An out-of-bounds read vulnerability exists in `DicomStreamReader` during DICOM meta-header parsing. When processing malformed metadata structures, the parser may read beyond the bounds of the allocated metadata buffer. Although...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5393

Medium priority
Needs evaluation

Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algorithm CertificateVerify message, an out-of-bounds read can occur on crafted input. This can only occur when --enable-experimental...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5392

Medium priority
Needs evaluation

Heap out-of-bounds read in PKCS7 parsing. A crafted PKCS7 message can trigger an OOB read on the heap. The missing bounds check is in the indefinite-length end-of-content verification loop in PKCS7_VerifySignedData().

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5295

Medium priority
Needs evaluation

A stack buffer overflow exists in wolfSSL's PKCS7 implementation in the wc_PKCS7_DecryptOri() function in wolfcrypt/src/pkcs7.c. When processing a CMS EnvelopedData message containing an OtherRecipientInfo (ORI) recipient, the...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5264

Medium priority
Needs evaluation

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5263

Medium priority
Needs evaluation

URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5194

Medium priority
Needs evaluation

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages