Search CVE reports
2731 – 2740 of 49955 results
A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular...
1 affected package
libssh
| Package | 16.04 LTS |
|---|---|
| libssh | Fixed |
A flaw was found in libssh. The API function `ssh_get_hexa()` is vulnerable to a denial of service when processing zero-length input. This can be exploited remotely by an attacker during GSSAPI (Generic Security...
1 affected package
libssh
| Package | 16.04 LTS |
|---|---|
| libssh | Fixed |
A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This...
1 affected package
libssh
| Package | 16.04 LTS |
|---|---|
| libssh | Fixed |
A malicious SCP server can send unexpected paths that could make the client application override local files outside of working directory. This could be misused to create malicious executable or configuration files and make the...
1 affected package
libssh
| Package | 16.04 LTS |
|---|---|
| libssh | Fixed |
ClamAV versions prior to 0.103.0-rc contain a vulnerability in function name processing through the ClamBC bytecode interpreter that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input...
1 affected package
clamav
| Package | 16.04 LTS |
|---|---|
| clamav | Fixed |
DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functionality that allows attackers to identify valid user accounts. Attackers can submit different usernames to the password reset endpoint...
1 affected package
dokuwiki
| Package | 16.04 LTS |
|---|---|
| dokuwiki | Needs evaluation |
A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote client as root, only switching to the logged-in user upon spawning...
1 affected package
dropbear
| Package | 16.04 LTS |
|---|---|
| dropbear | Needs evaluation |
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php NOTE: this is disputed by a third party who indicates that exploitation can...
1 affected package
dolibarr
| Package | 16.04 LTS |
|---|---|
| dolibarr | Not affected |
Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the...
8 affected packages
postgresql-18, postgresql-17, postgresql-16, postgresql-14, postgresql-12...
| Package | 16.04 LTS |
|---|---|
| postgresql-18 | — |
| postgresql-17 | — |
| postgresql-16 | — |
| postgresql-14 | — |
| postgresql-12 | — |
| postgresql-10 | — |
| postgresql-9.5 | Not affected |
| postgresql-9.3 | — |
Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user...
8 affected packages
postgresql-18, postgresql-17, postgresql-16, postgresql-14, postgresql-12...
| Package | 16.04 LTS |
|---|---|
| postgresql-18 | — |
| postgresql-17 | — |
| postgresql-16 | — |
| postgresql-14 | — |
| postgresql-12 | — |
| postgresql-10 | — |
| postgresql-9.5 | Needs evaluation |
| postgresql-9.3 | — |