Search CVE reports


Toggle filters

2041 – 2050 of 34627 results

Status is adjusted based on your filters.


CVE-2026-23943

Medium priority
Needs evaluation

Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion. The SSH transport layer advertises legacy zlib compression by...

1 affected package

erlang

Package 24.04 LTS
erlang Needs evaluation
Show less packages

CVE-2026-23942

Medium priority
Needs evaluation

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and...

1 affected package

erlang

Package 24.04 LTS
erlang Needs evaluation
Show less packages

CVE-2026-23941

Medium priority
Needs evaluation

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling. This vulnerability is associated with program...

1 affected package

erlang

Package 24.04 LTS
erlang Needs evaluation
Show less packages

CVE-2026-32597

Medium priority
Fixed

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT...

1 affected package

pyjwt

Package 24.04 LTS
pyjwt Fixed
Show less packages

CVE-2026-2581

Medium priority
Needs evaluation

This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS). In vulnerable Undici versions, when interceptors.deduplicate() is enabled, response data for deduplicated requests...

1 affected package

node-undici

Package 24.04 LTS
node-undici Needs evaluation
Show less packages

CVE-2026-2229

Medium priority
Needs evaluation

ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it...

1 affected package

node-undici

Package 24.04 LTS
node-undici Needs evaluation
Show less packages

CVE-2026-1528

Medium priority
Needs evaluation

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the...

1 affected package

node-undici

Package 24.04 LTS
node-undici Needs evaluation
Show less packages

CVE-2026-1527

Medium priority
Needs evaluation

ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to: * Inject arbitrary HTTP headers * Terminate the HTTP request prematurely and...

1 affected package

node-undici

Package 24.04 LTS
node-undici Needs evaluation
Show less packages

CVE-2026-1526

Medium priority
Needs evaluation

The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client...

1 affected package

node-undici

Package 24.04 LTS
node-undici Needs evaluation
Show less packages

CVE-2026-32274

Medium priority
Needs evaluation

Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes a cache file, the name of which is computed from various formatting options. The value of the --python-cell-magics option was placed in the filename...

1 affected package

black

Package 24.04 LTS
black Needs evaluation
Show less packages