Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-5263 | URI nameConstraints not enforced in ConfirmNameConstraints() | |
| CVE-2026-5187 | Heap Out-of-Bounds Write in DecodeObjectId() in wolfSSL | |
| CVE-2026-5264 | DTLS 1.3 ACK heap buffer overflow | |
| CVE-2026-5295 | Stack Buffer Overflow in wolfSSL PKCS7 wc_PKCS7_DecryptOri() via Oversized OID | |
| CVE-2026-5393 | OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS | |
| CVE-2026-5446 | wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse | |
| CVE-2026-5504 | PKCS7 CBC Padding Oracle — Plaintext Recovery | |
| CVE-2026-5447 | Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier | |
| CVE-2026-5778 | Integer underflow leads to out-of-bounds access in sniffer ChaCha decrypt path. | |
| CVE-2026-5772 | MatchDomainName 1-Byte Stack Buffer Over-Read in Hostname Validation | |
| CVE-2026-5507 | Session Cache Restore — Arbitrary Free via Deserialized Pointer | |
| CVE-2026-5194 | wolfSSL ECDSA Certificate Verification | |
| CVE-2026-5460 | Heap Use-After-Free in PQC Hybrid KeyShare Error Cleanup in wolfSSL TLS 1.3 | |
| CVE-2026-5503 | out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName | |
| CVE-2026-5448 | 1-2 Byte Buffer Overflow in wolfSSL_X509_notAfter/notBefore |
No comments yet