Search CVE reports
271 – 280 of 38290 results
Impact: The fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into...
1 affected package
node-lodash
| Package | 20.04 LTS |
|---|---|
| node-lodash | Needs evaluation |
Impact: Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only...
1 affected package
node-lodash
| Package | 20.04 LTS |
|---|---|
| node-lodash | Needs evaluation |
RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only...
1 affected package
rauc
| Package | 20.04 LTS |
|---|---|
| rauc | Needs evaluation |
An integer overflow vulnerability in 'pdf-image.c' in Artifex's MuPDF version 1.27.0 allows an attacker to maliciously craft a PDF that can trigger an integer overflow within the 'pdf_load_image_imp' function. This allows a heap...
1 affected package
mupdf
| Package | 20.04 LTS |
|---|---|
| mupdf | Needs evaluation |
An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of...
1 affected package
dnsdist
| Package | 20.04 LTS |
|---|---|
| dnsdist | Needs evaluation |
An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet...
1 affected package
dnsdist
| Package | 20.04 LTS |
|---|---|
| dnsdist | Needs evaluation |
An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available...
1 affected package
dnsdist
| Package | 20.04 LTS |
|---|---|
| dnsdist | Needs evaluation |
When the early_acl_drop (earlyACLDrop in Lua) option is disabled (default is enabled) on a DNS over HTTPs frontend using the nghttp2 provider, the ACL check is skipped, allowing all clients to send DoH queries regardless of the...
1 affected package
dnsdist
| Package | 20.04 LTS |
|---|---|
| dnsdist | Needs evaluation |
An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a...
1 affected package
dnsdist
| Package | 20.04 LTS |
|---|---|
| dnsdist | Needs evaluation |
When the internal webserver is enabled (default is disabled), an attacker might be able to trick an administrator logged to the dashboard into visiting a malicious website and extract information about the running configuration...
1 affected package
dnsdist
| Package | 20.04 LTS |
|---|---|
| dnsdist | Needs evaluation |