Search CVE reports
21 – 30 of 36990 results
ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data...
1 affected package
node-ajv
| Package | 20.04 LTS |
|---|---|
| node-ajv | Needs evaluation |
WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
1 affected package
libwww-oauth-perl
| Package | 20.04 LTS |
|---|---|
| libwww-oauth-perl | Needs evaluation |
[Insecure default configuration leads to local man-in-the-middle attacks on Windows]
1 affected package
libssh
| Package | 20.04 LTS |
|---|---|
| libssh | Not affected |
Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length...
1 affected package
redir
| Package | 20.04 LTS |
|---|---|
| redir | Needs evaluation |
ClamAV ClamBC bytecode interpreter contains a vulnerability in function name processing that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to...
2 affected packages
clamav, libclamunrar
| Package | 20.04 LTS |
|---|---|
| clamav | Vulnerable |
| libclamunrar | Vulnerable |
DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functionality that allows attackers to identify valid user accounts. Attackers can submit different usernames to the password reset endpoint...
1 affected package
dokuwiki
| Package | 20.04 LTS |
|---|---|
| dokuwiki | Needs evaluation |
crash via INITIAL packet for the NEW_TOKEN format
1 affected package
haproxy
| Package | 20.04 LTS |
|---|---|
| haproxy | Not affected |
crash in parsing frame type
1 affected package
haproxy
| Package | 20.04 LTS |
|---|---|
| haproxy | Not affected |
Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable...
1 affected package
intel-microcode
| Package | 20.04 LTS |
|---|---|
| intel-microcode | Vulnerable |
Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading Style Sheets (CSS) injection, e.g., because comments are mishandled.
1 affected package
roundcube
| Package | 20.04 LTS |
|---|---|
| roundcube | Needs evaluation |