Search CVE reports


Toggle filters

281 – 290 of 48446 results

Status is adjusted based on your filters.


CVE-2026-3308

Medium priority
Needs evaluation

An integer overflow vulnerability in 'pdf-image.c' in Artifex's MuPDF version 1.27.0 allows an attacker to maliciously craft a PDF that can trigger an integer overflow within the 'pdf_load_image_imp' function. This allows a heap...

1 affected package

mupdf

Package 16.04 LTS
mupdf Needs evaluation
Show less packages

CVE-2026-27854

Medium priority
Needs evaluation

An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of...

1 affected package

dnsdist

Package 16.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-27853

Medium priority
Needs evaluation

An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet...

1 affected package

dnsdist

Package 16.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-24030

Medium priority
Needs evaluation

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available...

1 affected package

dnsdist

Package 16.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-24029

Medium priority
Needs evaluation

When the early_acl_drop (earlyACLDrop in Lua) option is disabled (default is enabled) on a DNS over HTTPs frontend using the nghttp2 provider, the ACL check is skipped, allowing all clients to send DoH queries regardless of the...

1 affected package

dnsdist

Package 16.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-24028

Medium priority
Needs evaluation

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a...

1 affected package

dnsdist

Package 16.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-0397

Medium priority
Needs evaluation

When the internal webserver is enabled (default is disabled), an attacker might be able to trick an administrator logged to the dashboard into visiting a malicious website and extract information about the running configuration...

1 affected package

dnsdist

Package 16.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-0396

Medium priority
Needs evaluation

An attacker might be able to inject HTML content into the internal web dashboard by sending crafted DNS queries to a DNSdist instance where domain-based dynamic rules have been enabled via...

1 affected package

dnsdist

Package 16.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2024-14031

Medium priority
Needs evaluation

Sereal::Encoder versions from 4.000 through 4.009_002 for Perl embeds a vulnerable version of the Zstandard library. Sereal::Encoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a...

1 affected package

libsereal-encoder-perl

Package 16.04 LTS
libsereal-encoder-perl Needs evaluation
Show less packages

CVE-2024-14030

Medium priority
Needs evaluation

Sereal::Decoder versions from 4.000 through 4.009_002 for Perl embeds a vulnerable version of the Zstandard library. Sereal::Decoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a...

1 affected package

libsereal-encoder-perl

Package 16.04 LTS
libsereal-encoder-perl Needs evaluation
Show less packages