Search CVE reports
251 – 260 of 42812 results
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, on Windows the static resource handler may expose information about a NTLMv2 remote path. This issue has been patched in...
1 affected package
python-aiohttp
| Package | 18.04 LTS |
|---|---|
| python-aiohttp | Needs evaluation |
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, an attacker who controls the content_type parameter in aiohttp could use this to inject extra headers or similar exploits....
1 affected package
python-aiohttp
| Package | 18.04 LTS |
|---|---|
| python-aiohttp | Needs evaluation |
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, an unbounded DNS cache could result in excessive memory usage possibly resulting in a DoS situation. This issue has been...
1 affected package
python-aiohttp
| Package | 18.04 LTS |
|---|---|
| python-aiohttp | Needs evaluation |
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, insufficient restrictions in header/trailer handling could cause uncapped memory usage. This issue has been patched in version 3.13.4.
1 affected package
python-aiohttp
| Package | 18.04 LTS |
|---|---|
| python-aiohttp | Needs evaluation |
An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Crypto 1.0. There is a lack of contributory behavior in FFDH due to improper input validation. Using finite-field Diffie-Hellman, the other party can...
1 affected package
mbedtls
| Package | 18.04 LTS |
|---|---|
| mbedtls | Needs evaluation |
In Mbed TLS through 4.0.0, there is a compiler-induced timing side channel (in RSA and CBC/ECB decryption) that only occurs with LLVM's select-optimize feature. TF-PSA-Crypto through 1.0.0 is also affected.
1 affected package
mbedtls
| Package | 18.04 LTS |
|---|---|
| mbedtls | Needs evaluation |
An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There is a NULL pointer dereference in distinguished name parsing that allows an attacker to write to address 0.
1 affected package
mbedtls
| Package | 18.04 LTS |
|---|---|
| mbedtls | Needs evaluation |
An issue was discovered in Mbed TLS before 3.6.6 and 4.x before 4.1.0 and TF-PSA-Crypto before 1.1.0. There is a Predictable Seed in a Pseudo-Random Number Generator (PRNG).
1 affected package
mbedtls
| Package | 18.04 LTS |
|---|---|
| mbedtls | Needs evaluation |
Mbed TLS before 3.6.6 and TF-PSA-Crypto before 1.1.0 misuse seeds in a Pseudo-Random Number Generator (PRNG).
1 affected package
mbedtls
| Package | 18.04 LTS |
|---|---|
| mbedtls | Needs evaluation |
Mbed TLS 3.5.0 to 3.6.5 fixed in 3.6.6 and 4.1.0 has a buffer overflow in the x509_inet_pton_ipv6() function
1 affected package
mbedtls
| Package | 18.04 LTS |
|---|---|
| mbedtls | Needs evaluation |