A vulnerability identified as problematic has been detected in wolfSSL up to 5.9.0. Affected by this issue is some unknown functionality of the component PKCS7 CBC Decryption. The manipulation leads to improper validation of integrity check value.
This vulnerability is uniquely identified as CVE-2026-5504. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in wolfSSL up to 5.9.0. Affected by this vulnerability is the function wolfSSL_EVP_CipherFinal of the component EVP API. This manipulation causes improper validation of integrity check value.
The identification of this vulnerability is CVE-2026-5479. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in wolfSSL up to 5.9.0. The impacted element is the function wolfSSL_X509_notAfter/wolfSSL_X509_notBefore of the component Compatibility Layer API. The manipulation of the argument Date leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2026-5448. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic has been found in Apache Tomcat up to 9.0.116/10.1.53/11.0.20. This affects an unknown part of the component Bearer Token Handler. This manipulation causes sensitive information in log files.
This vulnerability is tracked as CVE-2026-34487. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in wolfSSL up to 5.9.0. This impacts an unknown function of the file src/internal.c. This manipulation causes buffer over-read.
This vulnerability is handled as CVE-2026-5772. The attack can be initiated remotely. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability described as problematic has been identified in wolfSSL up to 5.9.0. Affected by this vulnerability is the function PKCS7_VerifySignedData of the component PKCS7 Parser. Such manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2026-5392. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Apache Tomcat up to 7.0.109/8.5.100/9.0.115/10.1.52/11.0.18. Affected is an unknown function of the component EncryptInterceptor. The manipulation results in reliance on obfuscation or encryption of security-relevant inputs without integrity checking.
This vulnerability is reported as CVE-2026-29146. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability described as critical has been identified in wolfSSL up to 5.9.0. The impacted element is an unknown function of the component Hash/Digest. Executing a manipulation can lead to improper certificate validation.
The identification of this vulnerability is CVE-2026-5194. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in wolfSSL up to 5.9.0. It has been declared as critical. Affected by this vulnerability is the function wc_CmacUpdate of the component Message Handler. The manipulation results in integer overflow.
This vulnerability is identified as CVE-2026-5477. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in wolfSSL up to 5.9.0. It has been classified as critical. The affected element is the function wc_PKCS7_DecryptOri of the file wolfcrypt/src/pkcs7.c. This manipulation causes stack-based buffer overflow.
This vulnerability is registered as CVE-2026-5295. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in wolfSSL up to 5.9.0. This vulnerability affects the function wolfSSL_X509_verify_cert of the component OpenSSL Compatibility API. This manipulation causes improper certificate validation.
The identification of this vulnerability is CVE-2026-5501. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as problematic has been discovered in Apache Tomcat up to 7.0.108/8.5.100/9.0.115/10.1.52/11.0.18. Impacted is an unknown function. The manipulation results in open redirect.
This vulnerability was named CVE-2026-25854. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.