Search CVE reports
131 – 140 of 41994 results
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client...
1 affected package
inetutils
| Package | 18.04 LTS |
|---|---|
| inetutils | Vulnerable |
In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation...
1 affected package
ocaml
| Package | 18.04 LTS |
|---|---|
| ocaml | Needs evaluation |
Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the...
1 affected package
libapache-sessionx-perl
| Package | 18.04 LTS |
|---|---|
| libapache-sessionx-perl | Needs evaluation |
Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may have unspecified impact. The functions `addr2cidr` and `cidrlookup` may return leading zeros in a CIDR string, which may in turn be...
1 affected package
libnet-cidr-perl
| Package | 18.04 LTS |
|---|---|
| libnet-cidr-perl | Needs evaluation |
SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL...
1 affected package
spip
| Package | 18.04 LTS |
|---|---|
| spip | Needs evaluation |
SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in...
1 affected package
spip
| Package | 18.04 LTS |
|---|---|
| spip | Needs evaluation |
Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic
7 affected packages
golang-golang-x-net, google-guest-agent, containerd, golang-golang-x-net-dev, adsys...
| Package | 18.04 LTS |
|---|---|
| golang-golang-x-net | — |
| google-guest-agent | Needs evaluation |
| containerd | Needs evaluation |
| golang-golang-x-net-dev | Needs evaluation |
| adsys | — |
| juju-core | — |
| lxd | Needs evaluation |
A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized...
1 affected package
gvfs
| Package | 18.04 LTS |
|---|---|
| gvfs | Needs evaluation |
A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information...
1 affected package
gvfs
| Package | 18.04 LTS |
|---|---|
| gvfs | Needs evaluation |
Improper neutralization of input in Checkmk versions 2.4.0 before 2.4.0p22, and 2.3.0 before 2.3.0p43 allows an attacker that can manipulate a host's check output to inject malicious JavaScript into the Synthetic Monitoring HTML...
1 affected package
check-mk
| Package | 18.04 LTS |
|---|---|
| check-mk | Needs evaluation |