Search CVE reports


Toggle filters

191 – 200 of 48426 results

Status is adjusted based on your filters.


CVE-2026-34230

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*)...

1 affected package

ruby-rack

Package 16.04 LTS
ruby-rack Needs evaluation
Show less packages

CVE-2026-26961

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type...

1 affected package

ruby-rack

Package 16.04 LTS
ruby-rack Needs evaluation
Show less packages

CVE-2025-65114

Medium priority
Needs evaluation

Apache Traffic Server allows request smuggling if chunked messages are malformed. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1. Users are recommended to upgrade to version 9.2.13...

1 affected package

trafficserver

Package 16.04 LTS
trafficserver Needs evaluation
Show less packages

CVE-2025-58136

Medium priority
Needs evaluation

A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or...

1 affected package

trafficserver

Package 16.04 LTS
trafficserver Needs evaluation
Show less packages

CVE-2026-34876

Medium priority
Needs evaluation

An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with...

1 affected package

mbedtls

Package 16.04 LTS
mbedtls Needs evaluation
Show less packages

CVE-2026-33691

Medium priority
Needs evaluation

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 3.3.9 and 4.25.0, a bypass was identified in OWASP CRS that allows uploading files with...

1 affected package

modsecurity-crs

Package 16.04 LTS
modsecurity-crs Needs evaluation
Show less packages

CVE-2026-5342

Medium priority
Needs evaluation

A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument...

8 affected packages

libraw, ufraw, darktable, exactimage, dcraw...

Package 16.04 LTS
libraw Needs evaluation
ufraw Needs evaluation
darktable Needs evaluation
exactimage Needs evaluation
dcraw Needs evaluation
rawtherapee Needs evaluation
kodi Needs evaluation
digikam Needs evaluation
Show all 8 packages Show less packages

CVE-2026-33641

Medium priority
Needs evaluation

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, Glances supports dynamic configuration values in which substrings enclosed in backticks are executed as system commands during configuration...

1 affected package

glances

Package 16.04 LTS
glances Needs evaluation
Show less packages

CVE-2026-33533

Medium priority
Needs evaluation

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, the Glances XML-RPC server (activated with glances -s or glances --server) sends Access-Control-Allow-Origin: * on every HTTP response....

1 affected package

glances

Package 16.04 LTS
glances Needs evaluation
Show less packages

CVE-2026-31937

Medium priority
Needs evaluation

Suricata is a network IDS, IPS and NSM engine. Prior to version 7.0.15, inefficiency in DCERPC buffering can lead to a performance degradation. This issue has been patched in version 7.0.15.

1 affected package

suricata

Package 16.04 LTS
suricata Needs evaluation
Show less packages