Search CVE reports


Toggle filters

191 – 200 of 37431 results

Status is adjusted based on your filters.


CVE-2026-33894

Medium priority
Needs evaluation

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, RSASSA PKCS#1 v1.5 signature verification accepts forged signatures for low public exponent keys (e=3)....

1 affected package

node-node-forge

Package 22.04 LTS
node-node-forge Needs evaluation
Show less packages

CVE-2026-33891

Medium priority
Needs evaluation

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, a Denial of Service (DoS) vulnerability exists in the node-forge library due to an infinite loop in the...

1 affected package

node-node-forge

Package 22.04 LTS
node-node-forge Needs evaluation
Show less packages

CVE-2026-34475

Medium priority
Needs evaluation

Varnish Cache before 8.0.1 and Varnish Enterprise before 6.0.16r12, in certain unchecked req.url scenarios, mishandle URLs with a path of / for HTTP/1.1, potentially leading to cache poisoning or authentication bypass.

1 affected package

varnish

Package 22.04 LTS
varnish Needs evaluation
Show less packages

CVE-2026-33871

Medium priority
Needs evaluation

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of...

1 affected package

netty

Package 22.04 LTS
netty Needs evaluation
Show less packages

CVE-2026-33870

Medium priority
Needs evaluation

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling...

1 affected package

netty

Package 22.04 LTS
netty Needs evaluation
Show less packages

CVE-2026-28369

Medium priority
Needs evaluation

A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spaces, it incorrectly processes the request by stripping these leading spaces. This behavior, which violates...

1 affected package

undertow

Package 22.04 LTS
undertow Needs evaluation
Show less packages

CVE-2026-28368

Medium priority
Needs evaluation

A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header...

1 affected package

undertow

Package 22.04 LTS
undertow Needs evaluation
Show less packages

CVE-2026-28367

Medium priority
Needs evaluation

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache...

1 affected package

undertow

Package 22.04 LTS
undertow Needs evaluation
Show less packages

CVE-2026-4980

Medium priority
Needs evaluation

A local file disclosure vulnerability in the XInclude processing component of Inkscape 1.1 before 1.3 allows a remote attacker to read local files via a crafted SVG file containing malicious xi:include tags.

1 affected package

inkscape

Package 22.04 LTS
inkscape Needs evaluation
Show less packages

CVE-2026-33750

Medium priority
Needs evaluation

The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence...

1 affected package

node-brace-expansion

Package 22.04 LTS
node-brace-expansion Needs evaluation
Show less packages