Search CVE reports


Toggle filters

211 – 220 of 37553 results

Status is adjusted based on your filters.


CVE-2026-28370

Medium priority
Needs evaluation

In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This...

1 affected package

vitrage

Package 20.04 LTS
vitrage Needs evaluation
Show less packages

CVE-2026-28364

Medium priority
Needs evaluation

In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation...

1 affected package

ocaml

Package 20.04 LTS
ocaml Needs evaluation
Show less packages

CVE-2025-40932

Medium priority
Needs evaluation

Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the...

1 affected package

libapache-sessionx-perl

Package 20.04 LTS
libapache-sessionx-perl Needs evaluation
Show less packages

CVE-2021-4456

Medium priority
Vulnerable

Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may have unspecified impact. The functions `addr2cidr` and `cidrlookup` may return leading zeros in a CIDR string, which may in turn be...

1 affected package

libnet-cidr-perl

Package 20.04 LTS
libnet-cidr-perl Vulnerable
Show less packages

CVE-2026-22206

Medium priority
Needs evaluation

SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL...

1 affected package

spip

Package 20.04 LTS
spip Needs evaluation
Show less packages

CVE-2026-22205

Medium priority
Needs evaluation

SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in...

1 affected package

spip

Package 20.04 LTS
spip Needs evaluation
Show less packages

CVE-2026-27141

Medium priority
Needs evaluation

Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic

7 affected packages

golang-golang-x-net, google-guest-agent, containerd, golang-golang-x-net-dev, adsys...

Package 20.04 LTS
golang-golang-x-net
google-guest-agent Needs evaluation
containerd Needs evaluation
golang-golang-x-net-dev Needs evaluation
adsys Needs evaluation
juju-core
lxd Needs evaluation
Show all 7 packages Show less packages

CVE-2026-28296

Medium priority
Needs evaluation

A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized...

1 affected package

gvfs

Package 20.04 LTS
gvfs Needs evaluation
Show less packages

CVE-2026-28295

Medium priority
Needs evaluation

A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information...

1 affected package

gvfs

Package 20.04 LTS
gvfs Needs evaluation
Show less packages

CVE-2026-27970

Medium priority
Needs evaluation

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Versions prior to 21.2.0, 21.1.16, 20.3.17, and 19.2.19 have a cross-Site scripting vulnerability...

1 affected package

angular.js

Package 20.04 LTS
angular.js Needs evaluation
Show less packages