Search CVE reports
331 – 340 of 41967 results
zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
4 affected packages
zlib, rsync, klibc, zsync
| Package | 18.04 LTS |
|---|---|
| zlib | Needs evaluation |
| rsync | Vulnerable |
| klibc | Needs evaluation |
| zsync | Needs evaluation |
insecure local cache file removal
1 affected package
evolution-data-server
| Package | 18.04 LTS |
|---|---|
| evolution-data-server | Vulnerable |
OOB Read in OpenSSL backend
1 affected package
glib-networking
| Package | 18.04 LTS |
|---|---|
| glib-networking | Not affected |
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the...
5 affected packages
tomcat6, tomcat7, tomcat8, tomcat9, tomcat10
| Package | 18.04 LTS |
|---|---|
| tomcat6 | — |
| tomcat7 | Needs evaluation |
| tomcat8 | Needs evaluation |
| tomcat9 | Needs evaluation |
| tomcat10 | — |
Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests, the user could...
5 affected packages
tomcat6, tomcat7, tomcat8, tomcat9, tomcat10
| Package | 18.04 LTS |
|---|---|
| tomcat6 | — |
| tomcat7 | Needs evaluation |
| tomcat8 | Needs evaluation |
| tomcat9 | Needs evaluation |
| tomcat10 | — |
Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time the CVE was...
5 affected packages
tomcat6, tomcat7, tomcat8, tomcat9, tomcat10
| Package | 18.04 LTS |
|---|---|
| tomcat6 | — |
| tomcat7 | Needs evaluation |
| tomcat8 | Needs evaluation |
| tomcat9 | Needs evaluation |
| tomcat10 | — |
An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image...
1 affected package
nova
| Package | 18.04 LTS |
|---|---|
| nova | Needs evaluation |
[ZDI-CAN-28266: New Vulnerability Report at rgbe.c]
1 affected package
gegl
| Package | 18.04 LTS |
|---|---|
| gegl | Needs evaluation |
[ZDI-CAN-28618: New Vulnerability Report at rgbe.c]
1 affected package
gegl
| Package | 18.04 LTS |
|---|---|
| gegl | Needs evaluation |
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom(). The function does not validate that the length parameter is non-negative. If a negative...
1 affected package
libcrypt-urandom-perl
| Package | 18.04 LTS |
|---|---|
| libcrypt-urandom-perl | Needs evaluation |