Search CVE reports


Toggle filters

11 – 20 of 48492 results

Status is adjusted based on your filters.


CVE-2026-5460

Medium priority
Needs evaluation

A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5448

Medium priority
Needs evaluation

X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when...

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5447

Medium priority
Needs evaluation

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

1 affected package

wolfssl

Package 16.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5445

Medium priority
Needs evaluation

An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5444

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists in the PAM image parsing logic. When Orthanc processes a crafted PAM image embedded in a DICOM file, image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5443

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLOR` DICOM images. Pixel length validation uses 32-bit multiplication for width and height calculations. If these values overflow, the validation check...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5442

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5441

Medium priority
Needs evaluation

An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of `DicomImageDecoder.cpp`. The `PMSCT_RLE1` decompression routine, which decodes the proprietary Philips Compression format, does not properly validate...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5440

Medium priority
Needs evaluation

A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages

CVE-2026-5439

Medium priority
Needs evaluation

A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An...

1 affected package

orthanc

Package 16.04 LTS
orthanc Needs evaluation
Show less packages