Search CVE reports


Toggle filters

341 – 350 of 42523 results

Status is adjusted based on your filters.


CVE-2026-33168

Medium priority
Needs evaluation

Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when a blank string is used as an HTML attribute name in Action View tag helpers, the...

1 affected package

rails

Package 18.04 LTS
rails Needs evaluation
Show less packages

CVE-2026-33167

Medium priority
Needs evaluation

Action Pack is a Rubygem for building web applications on the Rails framework. In versions on the 8.1 branch prior to 8.1.2.1, the debug exceptions page does not properly escape exception messages. A carefully crafted exception...

1 affected package

rails

Package 18.04 LTS
rails Needs evaluation
Show less packages

CVE-2026-1940

Medium priority
Needs evaluation

An incomplete fix for CVE-2024-47778 allows an out-of-bounds read in gst_wavparse_adtl_chunk() function. The patch added a size validation check lsize + 8 > size, but it does not account for the GST_ROUND_UP_2(lsize) used in the...

1 affected package

gst-plugins-bad1.0

Package 18.04 LTS
gst-plugins-bad1.0 Needs evaluation
Show less packages

CVE-2026-29111

Medium priority
Not affected

systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting,...

1 affected package

systemd

Package 18.04 LTS
systemd Not affected
Show less packages

CVE-2026-4647

Medium priority
Needs evaluation

A flaw was found in the GNU Binutils BFD library, a widely used component for handling binary files such as object files and executables. The issue occurs when processing specially crafted XCOFF object files, where a relocation...

1 affected package

binutils

Package 18.04 LTS
binutils Needs evaluation
Show less packages

CVE-2026-25075

Medium priority
Needs evaluation

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid...

1 affected package

strongswan

Package 18.04 LTS
strongswan Needs evaluation
Show less packages

CVE-2026-23555

Medium priority
Needs evaluation

Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced...

1 affected package

xen

Package 18.04 LTS
xen Needs evaluation
Show less packages

CVE-2026-23554

Medium priority
Needs evaluation

The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush. Freeing of paging...

1 affected package

xen

Package 18.04 LTS
xen Needs evaluation
Show less packages

CVE-2019-25591

Medium priority
Needs evaluation

DNSS Domain Name Search Software 2.1.8 contains a buffer overflow vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can...

1 affected package

dnss

Package 18.04 LTS
dnss Needs evaluation
Show less packages

CVE-2026-4115

Medium priority
Needs evaluation

A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verify of the file crypto/ecc-ssh.c of the component Ed25519 Signature Handler. The manipulation results in improper verification of cryptographic...

1 affected package

putty

Package 18.04 LTS
putty Needs evaluation
Show less packages