Search CVE reports


Toggle filters

151 – 160 of 32108 results

Status is adjusted based on your filters.


CVE-2026-0966

Low priority
Needs evaluation

[Buffer underflow in ssh_get_hexa() on invalid input]

1 affected package

libssh

Package 24.04 LTS
libssh Needs evaluation
Show less packages

CVE-2026-0965

Low priority
Needs evaluation

[Denial of Service via improper configuration file handling]

1 affected package

libssh

Package 24.04 LTS
libssh Needs evaluation
Show less packages

CVE-2026-0964

Medium priority
Needs evaluation

[Improper sanitation of paths received from SCP servers]

1 affected package

libssh

Package 24.04 LTS
libssh Needs evaluation
Show less packages

CVE-2025-69873

Medium priority
Needs evaluation

ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data...

1 affected package

node-ajv

Package 24.04 LTS
node-ajv Needs evaluation
Show less packages

CVE-2025-69634

High priority

Not in release

Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php

1 affected package

dolibarr

Package 24.04 LTS
dolibarr Not in release
Show less packages

CVE-2025-41117

Medium priority

Not in release

Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources...

1 affected package

grafana

Package 24.04 LTS
grafana Not in release
Show less packages

CVE-2025-40905

Medium priority
Needs evaluation

WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.

1 affected package

libwww-oauth-perl

Package 24.04 LTS
libwww-oauth-perl Needs evaluation
Show less packages

CVE-2025-14821

Medium priority
Not affected

[Insecure default configuration leads to local man-in-the-middle attacks on Windows]

1 affected package

libssh

Package 24.04 LTS
libssh Not affected
Show less packages

CVE-2020-37182

High priority
Needs evaluation

Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length...

1 affected package

redir

Package 24.04 LTS
redir Needs evaluation
Show less packages

CVE-2020-37167

Medium priority
Vulnerable

ClamAV ClamBC bytecode interpreter contains a vulnerability in function name processing that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to...

2 affected packages

clamav, libclamunrar

Package 24.04 LTS
clamav Vulnerable
libclamunrar Vulnerable
Show less packages