Search CVE reports
61 – 70 of 48160 results
NRSS RSS Reader 0.3.9-1 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the -F parameter. Attackers can craft a malicious input with 256...
1 affected package
nrss
| Package | 16.04 LTS |
|---|---|
| nrss | Needs evaluation |
TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the application. Attackers can craft a malicious command-line argument with 156...
1 affected package
trn
| Package | 16.04 LTS |
|---|---|
| trn | Needs evaluation |
Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized argument to the -p parameter. Attackers can invoke yasr with a crafted...
1 affected package
yasr
| Package | 16.04 LTS |
|---|---|
| yasr | Needs evaluation |
TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized ROM parameter to the...
1 affected package
tiemu
| Package | 16.04 LTS |
|---|---|
| tiemu | Needs evaluation |
yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an excessively long argument to the application. Attackers can craft a malicious command-line...
1 affected package
ytree
| Package | 16.04 LTS |
|---|---|
| ytree | Needs evaluation |
xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying overly long input strings that exceed buffer boundaries. Attackers can craft...
1 affected package
xwpe
| Package | 16.04 LTS |
|---|---|
| xwpe | Needs evaluation |
In the Linux kernel, the following vulnerability has been resolved: nf_tables: nft_dynset: fix possible stateful expression memleak in error path If cloning the second stateful expression in the element via GFP_ATOMIC fails, then...
157 affected packages
linux, linux-hwe, linux-hwe-5.4, linux-hwe-5.8, linux-hwe-5.11...
| Package | 16.04 LTS |
|---|---|
| linux | Needs evaluation |
| linux-hwe | Needs evaluation |
| linux-hwe-5.4 | — |
| linux-hwe-5.8 | — |
| linux-hwe-5.11 | — |
| linux-hwe-5.13 | — |
| linux-hwe-5.15 | — |
| linux-hwe-5.19 | — |
| linux-hwe-6.2 | — |
| linux-hwe-6.5 | — |
| linux-hwe-6.8 | — |
| linux-hwe-6.11 | — |
| linux-hwe-6.14 | — |
| linux-hwe-6.17 | — |
| linux-hwe-edge | Ignored |
| linux-lts-xenial | — |
| linux-kvm | Needs evaluation |
| linux-allwinner-5.19 | — |
| linux-aws | Needs evaluation |
| linux-aws-5.0 | — |
| linux-aws-5.3 | — |
| linux-aws-5.4 | — |
| linux-aws-5.8 | — |
| linux-aws-5.11 | — |
| linux-aws-5.13 | — |
| linux-aws-5.15 | — |
| linux-aws-5.19 | — |
| linux-aws-6.2 | — |
| linux-aws-6.5 | — |
| linux-aws-6.8 | — |
| linux-aws-6.14 | — |
| linux-aws-6.17 | — |
| linux-aws-hwe | Needs evaluation |
| linux-azure | Needs evaluation |
| linux-azure-4.15 | — |
| linux-azure-5.3 | — |
| linux-azure-5.4 | — |
| linux-azure-5.8 | — |
| linux-azure-5.11 | — |
| linux-azure-5.13 | — |
| linux-azure-5.15 | — |
| linux-azure-5.19 | — |
| linux-azure-6.2 | — |
| linux-azure-6.5 | — |
| linux-azure-6.8 | — |
| linux-azure-6.11 | — |
| linux-azure-6.14 | — |
| linux-azure-6.17 | — |
| linux-azure-fde | — |
| linux-azure-fde-5.15 | — |
| linux-azure-fde-5.19 | — |
| linux-azure-fde-6.2 | — |
| linux-azure-fde-6.8 | — |
| linux-azure-fde-6.14 | — |
| linux-azure-fde-6.17 | — |
| linux-azure-nvidia | — |
| linux-azure-nvidia-6.14 | — |
| linux-bluefield | — |
| linux-azure-edge | — |
| linux-fips | Needs evaluation |
| linux-aws-fips | — |
| linux-azure-fips | — |
| linux-gcp-fips | — |
| linux-gcp | Needs evaluation |
| linux-gcp-4.15 | — |
| linux-gcp-5.3 | — |
| linux-gcp-5.4 | — |
| linux-gcp-5.8 | — |
| linux-gcp-5.11 | — |
| linux-gcp-5.13 | — |
| linux-gcp-5.15 | — |
| linux-gcp-5.19 | — |
| linux-gcp-6.2 | — |
| linux-gcp-6.5 | — |
| linux-gcp-6.8 | — |
| linux-gcp-6.11 | — |
| linux-gcp-6.14 | — |
| linux-gcp-6.17 | — |
| linux-gke | — |
| linux-gke-4.15 | — |
| linux-gke-5.4 | — |
| linux-gke-5.15 | — |
| linux-gkeop | — |
| linux-gkeop-5.4 | — |
| linux-gkeop-5.15 | — |
| linux-ibm | — |
| linux-ibm-5.4 | — |
| linux-ibm-5.15 | — |
| linux-ibm-6.8 | — |
| linux-intel-5.13 | — |
| linux-intel-iotg | — |
| linux-intel-iotg-5.15 | — |
| linux-iot | — |
| linux-intel-iot-realtime | — |
| linux-lowlatency | — |
| linux-lowlatency-hwe-5.15 | — |
| linux-lowlatency-hwe-5.19 | — |
| linux-lowlatency-hwe-6.2 | — |
| linux-lowlatency-hwe-6.5 | — |
| linux-lowlatency-hwe-6.8 | — |
| linux-lowlatency-hwe-6.11 | — |
| linux-nvidia | — |
| linux-nvidia-6.2 | — |
| linux-nvidia-6.5 | — |
| linux-nvidia-6.8 | — |
| linux-nvidia-6.11 | — |
| linux-nvidia-lowlatency | — |
| linux-nvidia-tegra | — |
| linux-nvidia-tegra-5.15 | — |
| linux-nvidia-tegra-igx | — |
| linux-oracle | Needs evaluation |
| linux-oracle-5.0 | — |
| linux-oracle-5.3 | — |
| linux-oracle-5.4 | — |
| linux-oracle-5.8 | — |
| linux-oracle-5.11 | — |
| linux-oracle-5.13 | — |
| linux-oracle-5.15 | — |
| linux-oracle-6.5 | — |
| linux-oracle-6.8 | — |
| linux-oracle-6.14 | — |
| linux-oracle-6.17 | — |
| linux-oem | — |
| linux-oem-5.6 | — |
| linux-oem-5.10 | — |
| linux-oem-5.13 | — |
| linux-oem-5.14 | — |
| linux-oem-5.17 | — |
| linux-oem-6.0 | — |
| linux-oem-6.1 | — |
| linux-oem-6.5 | — |
| linux-oem-6.8 | — |
| linux-oem-6.11 | — |
| linux-oem-6.14 | — |
| linux-oem-6.17 | — |
| linux-raspi | — |
| linux-raspi2 | — |
| linux-raspi-5.4 | — |
| linux-raspi-realtime | — |
| linux-realtime | — |
| linux-realtime-6.8 | — |
| linux-realtime-6.14 | — |
| linux-riscv | — |
| linux-riscv-5.8 | — |
| linux-riscv-5.11 | — |
| linux-riscv-5.15 | — |
| linux-riscv-5.19 | — |
| linux-riscv-6.5 | — |
| linux-riscv-6.8 | — |
| linux-riscv-6.14 | — |
| linux-riscv-6.17 | — |
| linux-starfive-5.19 | — |
| linux-starfive-6.2 | — |
| linux-starfive-6.5 | — |
| linux-xilinx | — |
| linux-xilinx-zynqmp | — |
| linux-realtime-6.17 | — |
The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA (Elliptic Curve Digital Signature Algorithm), EdDSA (Edwards-curve Digital Signature Algorithm) and ECDH...
1 affected package
python-ecdsa
| Package | 16.04 LTS |
|---|---|
| python-ecdsa | Needs evaluation |
Varnish Cache before 8.0.1 and Varnish Enterprise before 6.0.16r12, in certain unchecked req.url scenarios, mishandle URLs with a path of / for HTTP/1.1, potentially leading to cache poisoning or authentication bypass.
1 affected package
varnish
| Package | 16.04 LTS |
|---|---|
| varnish | Needs evaluation |
Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of...
1 affected package
netty
| Package | 16.04 LTS |
|---|---|
| netty | Needs evaluation |