Search CVE reports
2541 – 2550 of 49652 results
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed....
16 affected packages
golang, golang-1.6, golang-1.8, golang-1.9, golang-1.10...
| Package | 16.04 LTS |
|---|---|
| golang | — |
| golang-1.6 | Not affected |
| golang-1.8 | — |
| golang-1.9 | — |
| golang-1.10 | Not affected |
| golang-1.13 | Not affected |
| golang-1.14 | — |
| golang-1.16 | — |
| golang-1.17 | — |
| golang-1.18 | Vulnerable |
| golang-1.20 | — |
| golang-1.21 | — |
| golang-1.22 | — |
| golang-1.23 | — |
| golang-1.24 | — |
| golang-1.25 | — |
The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
7 affected packages
golang-golang-x-net, google-guest-agent, containerd, golang-golang-x-net-dev, adsys...
| Package | 16.04 LTS |
|---|---|
| golang-golang-x-net | — |
| google-guest-agent | Not affected |
| containerd | Not affected |
| golang-golang-x-net-dev | Fixed |
| adsys | — |
| juju-core | Fixed |
| lxd | Fixed |
The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
7 affected packages
golang-golang-x-net, google-guest-agent, containerd, golang-golang-x-net-dev, adsys...
| Package | 16.04 LTS |
|---|---|
| golang-golang-x-net | — |
| google-guest-agent | Not affected |
| containerd | Not affected |
| golang-golang-x-net-dev | Fixed |
| adsys | — |
| juju-core | Fixed |
| lxd | Fixed |
Dnsmasq-utils 2.79-1 contains a buffer overflow vulnerability in the dhcp_release utility that allows attackers to cause a denial of service by supplying excessive input. Attackers can trigger a core dump and terminate the...
1 affected package
dnsmasq
| Package | 16.04 LTS |
|---|---|
| dnsmasq | Needs evaluation |
CODE::BLOCKS 16.01 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler with crafted Unicode characters. Attackers can create a malicious M3U playlist...
1 affected package
codeblocks
| Package | 16.04 LTS |
|---|---|
| codeblocks | Needs evaluation |
web2py versions 2.27.1-stable+timestamp.2023.11.16.08.03.57 and prior contain an open redirect vulnerability. If this vulnerability is exploited, the user may be redirected to an arbitrary website when accessing a specially...
1 affected package
web2py
| Package | 16.04 LTS |
|---|---|
| web2py | Needs evaluation |
[Unknown description]
1 affected package
grafana
| Package | 16.04 LTS |
|---|---|
| grafana | Needs evaluation |
GLPI is a free asset and IT management software package. In versions starting from 0.71 to before 10.0.23 and before 11.0.5, when remote authentication is used, based on SSO variables, a user can steal a GLPI session previously...
1 affected package
glpi
| Package | 16.04 LTS |
|---|---|
| glpi | Needs evaluation |
GLPI is a free asset and IT management software package. From version 11.0.0 to before 11.0.5, a GLPI administrator can perform SSRF request through the Webhook feature. This issue has been patched in version 11.0.5.
1 affected package
glpi
| Package | 16.04 LTS |
|---|---|
| glpi | Needs evaluation |
GLPI is a free asset and IT management software package. From version 0.85 to before 10.0.23, an authenticated user can perform a SQL injection. This issue has been patched in version 10.0.23.
1 affected package
glpi
| Package | 16.04 LTS |
|---|---|
| glpi | Needs evaluation |