Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/wolfssl/wolfssh/pull/846 |
|
Fri, 24 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssh
Wolfssh wolfssh |
|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:wolfssh:wolfssh:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wolfssh
Wolfssh wolfssh |
|
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssh |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfssh |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Potential read out of bounds case with wolfSSHd on Windows while handling a terminal resize request. An authenticated user could trigger the out of bounds read after establishing a connection which would leak the adjacent stack memory to the pseudo-console output. | |
| Title | Potential wolfSSHd Buffer out-of-bounds Read on Windows Handling Terminal Resize | |
| Weaknesses | CWE-126 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-04-21T13:37:15.647Z
Reserved: 2026-01-13T23:45:50.452Z
Link: CVE-2026-0930
Updated: 2026-04-21T13:37:11.443Z
Status : Analyzed
Published: 2026-04-20T22:16:23.210
Modified: 2026-04-24T19:15:35.897
Link: CVE-2026-0930
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:45:27Z