Search CVE reports


Toggle filters

191 – 200 of 42804 results

Status is adjusted based on your filters.


CVE-2026-34835

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Request parses the Host header using an AUTHORITY regular expression that accepts characters not permitted...

1 affected package

ruby-rack

Package 18.04 LTS
ruby-rack Needs evaluation
Show less packages

CVE-2026-34827

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition:...

1 affected package

ruby-rack

Package 18.04 LTS
ruby-rack Needs evaluation
Show less packages

CVE-2026-32762

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21 and 3.2.0 to before 3.2.6, Rack::Utils.forwarded_values parses the RFC 7239 Forwarded header by splitting on semicolons before handling...

1 affected package

ruby-rack

Package 18.04 LTS
ruby-rack Needs evaluation
Show less packages

CVE-2026-26962

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack...

1 affected package

ruby-rack

Package 18.04 LTS
ruby-rack Needs evaluation
Show less packages

CVE-2026-35388

Medium priority
Needs evaluation

OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.

2 affected packages

openssh, openssh-ssh1

Package 18.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35387

Medium priority
Needs evaluation

OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.

2 affected packages

openssh, openssh-ssh1

Package 18.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35386

Medium priority
Needs evaluation

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default...

2 affected packages

openssh, openssh-ssh1

Package 18.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35385

Medium priority
Needs evaluation

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

2 affected packages

openssh, openssh-ssh1

Package 18.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-34877

Medium priority
Needs evaluation

An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce...

1 affected package

mbedtls

Package 18.04 LTS
mbedtls Needs evaluation
Show less packages

CVE-2026-34831

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains...

1 affected package

ruby-rack

Package 18.04 LTS
ruby-rack Needs evaluation
Show less packages