Search CVE reports
111 – 120 of 31758 results
M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and...
1 affected package
monit
| Package | 24.04 LTS |
|---|---|
| monit | Needs evaluation |
node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows...
1 affected package
node-tar
| Package | 24.04 LTS |
|---|---|
| node-tar | Needs evaluation |
[x86: incomplete IBPB for vCPU isolation]
1 affected package
xen
| Package | 24.04 LTS |
|---|---|
| xen | Needs evaluation |
[x86: buffer overrun with shadow paging + tracing]
1 affected package
xen
| Package | 24.04 LTS |
|---|---|
| xen | Needs evaluation |
PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution....
1 affected package
phpunit
| Package | 24.04 LTS |
|---|---|
| phpunit | Needs evaluation |
Not in release
PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with...
1 affected package
pytorch
| Package | 24.04 LTS |
|---|---|
| pytorch | Not in release |
pypdf is a free and open-source pure-python PDF library. An attacker who uses an infinite loop vulnerability that is present in versions prior to 6.6.2 can craft a PDF which leads to an infinite loop. This requires accessing the...
2 affected packages
pypdf, pypdf2
| Package | 24.04 LTS |
|---|---|
| pypdf | Needs evaluation |
| pypdf2 | Needs evaluation |
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
1 affected package
gnupg2
| Package | 24.04 LTS |
|---|---|
| gnupg2 | Not affected |
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
1 affected package
gnupg2
| Package | 24.04 LTS |
|---|---|
| gnupg2 | Vulnerable |
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged...
1 affected package
gnupg2
| Package | 24.04 LTS |
|---|---|
| gnupg2 | Not affected |