Oisf Oisf

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Oisf product.

RSS Feeds for Oisf security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Oisf products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Oisf Sorted by Most Security Vulnerabilities since 2018

Oisf Suricata58 vulnerabilities

Oisf Libhtp6 vulnerabilities

Oisf Suricata Update1 vulnerability

By the Year

In 2026 there have been 7 vulnerabilities in Oisf with an average score of 6.4 out of ten. Last year, in 2025 Oisf had 22 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Oisf in 2026 could surpass last years number. Last year, the average CVE base score was greater by 0.56




Year Vulnerabilities Average Score
2026 7 6.40
2025 22 6.96
2024 20 7.06
2023 3 8.27
2022 0 0.00
2021 3 8.27
2020 1 0.00
2019 7 7.50
2018 1 7.80

It may take a day or so for new Oisf vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Oisf Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-22264 Jan 27, 2026
Suricata 8.0.2 / 7.0.13: Unsigned Int Overflow Heap UAF in Alert Gen Suricata is a network IDS, IPS and NSM engine. Prior to version 8.0.3 and 7.0.14, an unsigned integer overflow can lead to a heap use-after-free condition when generating excessive amounts of alerts for a single packet. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not run untrusted rulesets or run with less than 65536 signatures that can match on the same packet.
Suricata
CVE-2026-22263 Jan 27, 2026
Suricata 8.0.x HTTP1 Header Parsing Slowdown (DOS) Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, inefficiency in http1 headers parsing can lead to slowdown over multiple packets. Version 8.0.3 patches the issue. No known workarounds are available.
Suricata
CVE-2026-22262 Jan 27, 2026
Suricata stack buffer overflow on dataset save (8.0.3,7.0.14) Suricata is a network IDS, IPS and NSM engine. While saving a dataset a stack buffer is used to prepare the data. Prior to versions 8.0.3 and 7.0.14, if the data in the dataset is too large, this can result in a stack overflow. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not use rules with datasets `save` nor `state` options.
Suricata
CVE-2026-22261 Jan 27, 2026
Suricata XFF Slowdown (before 8.0.3/7.0.14) Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, various inefficiencies in xff handling, especially for alerts not triggered in a tx, can lead to severe slowdowns. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, disable XFF support in the eve configuration. The setting is disabled by default.
Suricata
CVE-2026-22260 Jan 27, 2026
Suricata 8.0.0-8.0.2 Stack Overflow Crash via req/resp body limits Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `response-body-limit`.
Suricata
CVE-2026-22259 Jan 27, 2026
Suricata <7.0.14/8.0.3 DNP3 Parsing Memory Exhaustion (CVE-2026-22259) Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).
Suricata
CVE-2026-22258 Jan 27, 2026
Suricata <8.0.3: DCERPC Buffer Expansion Memory Exhaustion (CVE-2026-22258) Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over UDP, it is believed that DCERPC over TCP and SMB are also vulnerable. DCERPC/TCP in the default configuration should not be vulnerable as the default stream depth is limited to 1MiB. Versions 8.0.3 and 7.0.14 contain a patch. Some workarounds are available. For DCERPC/UDP, disable the parser. For DCERPC/TCP, the `stream.reassembly.depth` setting will limit the amount of data that can be buffered. For DCERPC/SMB, the `stream.reassembly.depth` can be used as well, but is set to unlimited by default. Imposing a limit here may lead to loss of visibility in SMB.
Suricata
CVE-2025-64344 Nov 26, 2025
Suricata Stack Overflow via Lua Buffers (vulnerable <7.0.13/8.0.2) Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata
CVE-2025-64330 Nov 26, 2025
Suricata < 7.0.13 / 8.0.2 Heap Overflow in eve.alert Logging Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a single byte read heap overflow when logging the verdict in eve.alert and eve.drop records can lead to crashes. This requires the per packet alert queue to be filled with alerts and then followed by a pass rule. This issue has been patched in versions 7.0.13 and 8.0.2. To reduce the likelihood of this issue occurring, the alert queue size a should be increased (packet-alert-max in suricata.yaml) if verdict is enabled.
Suricata
CVE-2025-64331 Nov 26, 2025
Suricata HTTP Body Overflow (7.0.12, 8.0.1) Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a stack overflow can occur on large HTTP file transfers if the user has increased the HTTP response body limit and enabled the logging of printable http bodies. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves using default HTTP response body limits and/or disabling http-body-printable logging; body logging is disabled by default.
Suricata
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.