Search CVE reports


Toggle filters

281 – 290 of 42392 results

Status is adjusted based on your filters.


CVE-2026-30924

Medium priority
Needs evaluation

qui is a web interface for managing qBittorrent instances. Versions 1.14.1 and below use a permissive CORS policy that reflects arbitrary origins while also returning Access-Control-Allow-Credentials: true, effectively allowing...

1 affected package

qbittorrent

Package 18.04 LTS
qbittorrent Needs evaluation
Show less packages

CVE-2026-3580

Medium priority
Needs evaluation

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-3579

Medium priority
Needs evaluation

wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operand values. This...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-3503

Medium priority
Needs evaluation

Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-3548

Medium priority
Needs evaluation

Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-2645

Medium priority
Needs evaluation

In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-1005

Medium priority
Needs evaluation

Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected...

1 affected package

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-4426

Medium priority
Needs evaluation

A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can...

1 affected package

libarchive

Package 18.04 LTS
libarchive Needs evaluation
Show less packages

CVE-2026-4424

Medium priority
Needs evaluation

A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A...

1 affected package

libarchive

Package 18.04 LTS
libarchive Needs evaluation
Show less packages

CVE-2026-2369

Medium priority
Needs evaluation

A flaw was found in libsoup. An integer underflow vulnerability occurs when processing content with a zero-length resource, leading to a buffer overread. This can allow an attacker to potentially access sensitive information or...

2 affected packages

libsoup2.4, libsoup3

Package 18.04 LTS
libsoup2.4 Needs evaluation
libsoup3
Show less packages