Search CVE reports
201 – 210 of 36284 results
WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
1 affected package
libwww-oauth-perl
| Package | 22.04 LTS |
|---|---|
| libwww-oauth-perl | Needs evaluation |
[Insecure default configuration leads to local man-in-the-middle attacks on Windows]
1 affected package
libssh
| Package | 22.04 LTS |
|---|---|
| libssh | Not affected |
ClamAV ClamBC bytecode interpreter contains a vulnerability in function name processing that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to...
2 affected packages
clamav, libclamunrar
| Package | 22.04 LTS |
|---|---|
| clamav | Vulnerable |
| libclamunrar | Vulnerable |
DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functionality that allows attackers to identify valid user accounts. Attackers can submit different usernames to the password reset endpoint...
1 affected package
dokuwiki
| Package | 22.04 LTS |
|---|---|
| dokuwiki | Needs evaluation |
Not in release
ntpd-rs is a full-featured implementation of the Network Time Protocol. Prior to 1.7.1, an attacker can remotely induce moderate increases (2-4 times above normal) in cpu usage. When having NTS enabled on an ntpd-rs server, an...
1 affected package
rust-ntpd
| Package | 22.04 LTS |
|---|---|
| rust-ntpd | Not in release |
A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote client as root, only switching to the logged-in user upon spawning...
1 affected package
dropbear
| Package | 22.04 LTS |
|---|---|
| dropbear | Needs evaluation |
Not in release
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php NOTE: this is disputed by a third party who indicates that exploitation can...
1 affected package
dolibarr
| Package | 22.04 LTS |
|---|---|
| dolibarr | Not in release |
Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the...
8 affected packages
postgresql-18, postgresql-17, postgresql-16, postgresql-14, postgresql-12...
| Package | 22.04 LTS |
|---|---|
| postgresql-18 | Not in release |
| postgresql-17 | Not in release |
| postgresql-16 | Not in release |
| postgresql-14 | Not affected |
| postgresql-12 | Not in release |
| postgresql-10 | Not in release |
| postgresql-9.5 | Not in release |
| postgresql-9.3 | Not in release |
Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user...
8 affected packages
postgresql-18, postgresql-17, postgresql-16, postgresql-14, postgresql-12...
| Package | 22.04 LTS |
|---|---|
| postgresql-18 | Not in release |
| postgresql-17 | Not in release |
| postgresql-16 | Not in release |
| postgresql-14 | Needs evaluation |
| postgresql-12 | Not in release |
| postgresql-10 | Not in release |
| postgresql-9.5 | Not in release |
| postgresql-9.3 | Not in release |
Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
8 affected packages
postgresql-18, postgresql-17, postgresql-16, postgresql-14, postgresql-12...
| Package | 22.04 LTS |
|---|---|
| postgresql-18 | Not in release |
| postgresql-17 | Not in release |
| postgresql-16 | Not in release |
| postgresql-14 | Needs evaluation |
| postgresql-12 | Not in release |
| postgresql-10 | Not in release |
| postgresql-9.5 | Not in release |
| postgresql-9.3 | Not in release |