7.2

CVSS4.0

CVE-2026-3548 - Buffer overflow in CRL number parsing in wolfSSL

Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, ei…

📅 Published: March 19, 2026, 5:45 p.m. 🔄 Last Modified: March 19, 2026, 6 p.m.

5

CVSS4.0

CVE-2026-2646 - Heap buffer overflow in session parsing with wolfSSL_d2i_SSL_SESSION() function

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers…

📅 Published: March 19, 2026, 5:25 p.m. 🔄 Last Modified: March 19, 2026, 6:16 p.m.

6.5

CVSS3.1

CVE-2026-26940 - Improper Validation of Specified Quantity in Input in Kibana Leading to Denial of Service

Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal serie…

📅 Published: March 19, 2026, 5:14 p.m. 🔄 Last Modified: March 19, 2026, 6:16 p.m.

6.5

CVSS3.1

CVE-2026-26939 - Missing Authorization in Kibana Leading to Unauthorized Endpoint Response Action Configuration

Missing Authorization (CWE-862) in Kibana’s server-side Detection Rule Management can lead to Unauthorized Endpoint Response Action Configuration (host isolation, process termination, and process suspension) via CAPEC-1 (Accessing Functionality Not Properly Constrained by ACLs). This requires an au…

📅 Published: March 19, 2026, 5:11 p.m. 🔄 Last Modified: March 19, 2026, 6:16 p.m.

5.5

CVSS4.0

CVE-2026-2645 - Acceptance of CertificateVerify Message before ClientKeyExchange in TLS 1.2

In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This issue affects wolfSSL before 5.8.4 (wolfSSL 5.8.2 and earlier is vuln…

📅 Published: March 19, 2026, 5:10 p.m. 🔄 Last Modified: March 19, 2026, 6:16 p.m.
Load More Vulnerability
avatar

Mehmet Ince

@mdisec

CVE stats coming here

avatar

Nuri Çilengir

@ncilengir

CVE stats coming here

avatar

@aydinnyunus

CVE stats coming here

avatar

Onurcan Genç

@onurcangnc

CVE stats coming here

avatar

Seyit Sigirci

@h3xecute

CVE stats coming here

avatar

Ali İltizar

@iltosec

CVE stats coming here

avatar

@b3rsec

CVE stats coming here

avatar

@furkank

CVE stats coming here

avatar

kutaysec

@kutaysec

CVE stats coming here