Search CVE reports


Toggle filters

31 – 40 of 37376 results

Status is adjusted based on your filters.


CVE-2026-3281

Medium priority
Needs evaluation

A vulnerability was detected in libvips 8.19.0. This affects the function vips_bandrank_build of the file libvips/conversion/bandrank.c. Performing a manipulation of the argument index results in heap-based buffer overflow. The...

1 affected package

vips

Package 20.04 LTS
vips Needs evaluation
Show less packages

CVE-2026-28372

Medium priority
Needs evaluation

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client...

1 affected package

inetutils

Package 20.04 LTS
inetutils Needs evaluation
Show less packages

CVE-2026-28370

Medium priority
Needs evaluation

In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This...

1 affected package

vitrage

Package 20.04 LTS
vitrage Needs evaluation
Show less packages

CVE-2026-28364

Medium priority
Needs evaluation

In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation...

1 affected package

ocaml

Package 20.04 LTS
ocaml Needs evaluation
Show less packages

CVE-2026-28296

Medium priority
Needs evaluation

A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized...

1 affected package

gvfs

Package 20.04 LTS
gvfs Needs evaluation
Show less packages

CVE-2026-28295

Medium priority
Needs evaluation

A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information...

1 affected package

gvfs

Package 20.04 LTS
gvfs Needs evaluation
Show less packages

CVE-2026-27141

Medium priority
Needs evaluation

Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic

7 affected packages

golang-golang-x-net, google-guest-agent, containerd, golang-golang-x-net-dev, adsys...

Package 20.04 LTS
golang-golang-x-net
google-guest-agent Needs evaluation
containerd Needs evaluation
golang-golang-x-net-dev Needs evaluation
adsys Needs evaluation
juju-core
lxd Needs evaluation
Show all 7 packages Show less packages

CVE-2026-22206

Medium priority
Needs evaluation

SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL...

1 affected package

spip

Package 20.04 LTS
spip Needs evaluation
Show less packages

CVE-2026-22205

Medium priority
Needs evaluation

SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in...

1 affected package

spip

Package 20.04 LTS
spip Needs evaluation
Show less packages

CVE-2025-40932

Medium priority
Needs evaluation

Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the...

1 affected package

libapache-sessionx-perl

Package 20.04 LTS
libapache-sessionx-perl Needs evaluation
Show less packages