Search CVE reports
31 – 40 of 37376 results
A vulnerability was detected in libvips 8.19.0. This affects the function vips_bandrank_build of the file libvips/conversion/bandrank.c. Performing a manipulation of the argument index results in heap-based buffer overflow. The...
1 affected package
vips
| Package | 20.04 LTS |
|---|---|
| vips | Needs evaluation |
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client...
1 affected package
inetutils
| Package | 20.04 LTS |
|---|---|
| inetutils | Needs evaluation |
In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This...
1 affected package
vitrage
| Package | 20.04 LTS |
|---|---|
| vitrage | Needs evaluation |
In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation...
1 affected package
ocaml
| Package | 20.04 LTS |
|---|---|
| ocaml | Needs evaluation |
A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized...
1 affected package
gvfs
| Package | 20.04 LTS |
|---|---|
| gvfs | Needs evaluation |
A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information...
1 affected package
gvfs
| Package | 20.04 LTS |
|---|---|
| gvfs | Needs evaluation |
Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic
7 affected packages
golang-golang-x-net, google-guest-agent, containerd, golang-golang-x-net-dev, adsys...
| Package | 20.04 LTS |
|---|---|
| golang-golang-x-net | — |
| google-guest-agent | Needs evaluation |
| containerd | Needs evaluation |
| golang-golang-x-net-dev | Needs evaluation |
| adsys | Needs evaluation |
| juju-core | — |
| lxd | Needs evaluation |
SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the...
1 affected package
libapache-sessionx-perl
| Package | 20.04 LTS |
|---|---|
| libapache-sessionx-perl | Needs evaluation |