2.1

CVSS4.0

CVE-2026-3580 - Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover se…

πŸ“… Published: March 19, 2026, 7:46 p.m. πŸ”„ Last Modified: March 20, 2026, 8:56 a.m.

4.4

CVSS3.1

CVE-2026-32119 - OpenEMR has Stored DOM XSS via SearchHighlight text-node reconstruction on Custom Report page

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, DOM-based stored XSS in the jQuery SearchHighlight plugin (`library/js/SearchHighlight.js`) allows an authenticated user with encounter form write access to inject arbitrary Ja…

πŸ“… Published: March 19, 2026, 7:41 p.m. πŸ”„ Last Modified: March 20, 2026, 4:20 p.m.

2.1

CVSS4.0

CVE-2026-3579 - Non-constant time multiplication subroutine __muldi3 on RISC-V RV32I

wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operand values. This affects multiple SP math functions (sp_256_mul_9, sp_256_sqr_9, etc.), leading to a …

πŸ“… Published: March 19, 2026, 7:37 p.m. πŸ”„ Last Modified: March 20, 2026, 8:56 a.m.

9.1

CVSS3.1

CVE-2026-32238 - OpenEMR has Remote Code Execution in backup functionality

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 contain a Command injection vulnerability in the backup functionality that can be exploited by authenticated attackers. The vulnerability exists due to insufficient inp…

πŸ“… Published: March 19, 2026, 7:30 p.m. πŸ”„ Last Modified: March 20, 2026, 6:11 p.m.

6.5

CVSS3.1

CVE-2026-25928 - OpenEMR Vulnerable to Path Traversal When Zipping DICOM Folders

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the DICOM zip/export feature uses a user-supplied destination or path component when creating the zip file, without sanitizing path traversal sequences (e.g. `../`). An attacke…

πŸ“… Published: March 19, 2026, 7:27 p.m. πŸ”„ Last Modified: March 20, 2026, 5:18 p.m.

6.5

CVSS3.1

CVE-2026-25744 - OpenEMR: POST /api/.../vital Accepts Attacker-Supplied id and Overwrites Arbitrary Vitals

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the encounter vitals API accepts an `id` in the request body and treats it as an UPDATE. There is no verification that the vital belongs to the current patient or encounter. An…

πŸ“… Published: March 19, 2026, 7:25 p.m. πŸ”„ Last Modified: March 20, 2026, 5:19 p.m.

4.3

CVSS4.0

CVE-2026-3503 - Fault injection attack with ML-DSA and ML-KEM on ARM

Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during…

πŸ“… Published: March 19, 2026, 6:12 p.m. πŸ”„ Last Modified: March 20, 2026, 8:56 a.m.

7.2

CVSS4.0

CVE-2026-3548 - Buffer overflow in CRL number parsing in wolfSSL

Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, ei…

πŸ“… Published: March 19, 2026, 5:45 p.m. πŸ”„ Last Modified: March 20, 2026, 8:56 a.m.

5

CVSS4.0

CVE-2026-2646 - Heap buffer overflow in session parsing with wolfSSL_d2i_SSL_SESSION() function

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers…

πŸ“… Published: March 19, 2026, 5:25 p.m. πŸ”„ Last Modified: March 20, 2026, 8:56 a.m.

6.5

CVSS3.1

CVE-2026-26940 - Improper Validation of Specified Quantity in Input in Kibana Leading to Denial of Service

Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal serie…

πŸ“… Published: March 19, 2026, 5:14 p.m. πŸ”„ Last Modified: March 20, 2026, 8:56 a.m.
Total resulsts: 339042
Page 36 of 33,905
Β« previous page Β» next page
Filters