Search CVE reports


Toggle filters

211 – 220 of 37641 results

Status is adjusted based on your filters.


CVE-2026-34601

Medium priority
Needs evaluation

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom...

1 affected package

node-xmldom

Package 22.04 LTS
node-xmldom Needs evaluation
Show less packages

CVE-2026-34591

Medium priority
Needs evaluation

Poetry is a dependency manager for Python. From version 1.4.0 to before version 2.3.3, a crafted wheel can contain ../ paths that Poetry writes to disk without containment checks, allowing arbitrary file write with the privileges...

1 affected package

poetry

Package 22.04 LTS
poetry Needs evaluation
Show less packages

CVE-2026-32762

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21 and 3.2.0 to before 3.2.6, Rack::Utils.forwarded_values parses the RFC 7239 Forwarded header by splitting on semicolons before handling...

1 affected package

ruby-rack

Package 22.04 LTS
ruby-rack Needs evaluation
Show less packages

CVE-2026-26962

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack...

1 affected package

ruby-rack

Package 22.04 LTS
ruby-rack Needs evaluation
Show less packages

CVE-2026-35388

Medium priority
Needs evaluation

OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.

2 affected packages

openssh, openssh-ssh1

Package 22.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35387

Medium priority
Needs evaluation

OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.

2 affected packages

openssh, openssh-ssh1

Package 22.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35386

Medium priority
Needs evaluation

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default...

2 affected packages

openssh, openssh-ssh1

Package 22.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35385

Medium priority
Needs evaluation

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

2 affected packages

openssh, openssh-ssh1

Package 22.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-34877

Medium priority
Needs evaluation

An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce...

1 affected package

mbedtls

Package 22.04 LTS
mbedtls Needs evaluation
Show less packages

CVE-2026-34831

Medium priority
Needs evaluation

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains...

1 affected package

ruby-rack

Package 22.04 LTS
ruby-rack Needs evaluation
Show less packages