Search CVE reports


Toggle filters

2311 – 2320 of 45001 results

Status is adjusted based on your filters.


CVE-2025-53644

Medium priority
Not affected

OpenCV is an Open Source Computer Vision Library. Versions 4.10.0 and 4.11.0 have an uninitialized pointer variable on stack that may lead to arbitrary heap buffer write when reading crafted JPEG images. Version 4.12.0 fixes the...

1 affected package

opencv

Package 16.04 LTS
opencv Not affected
Show less packages

CVE-2025-7339

Medium priority
Needs evaluation

on-headers is a node.js middleware for listening to when a response writes headers. A bug in on-headers versions `<1.1.0` may result in response headers being inadvertently modified when an array is passed...

1 affected package

node-on-headers

Package 16.04 LTS
node-on-headers Needs evaluation
Show less packages

CVE-2025-1713

Medium priority
Needs evaluation

When setting up interrupt remapping for legacy PCI(-X) devices, including PCI(-X) bridges, a lookup of the upstream bridge is required. This lookup, itself involving acquiring of a lock, is done in a context where acquiring that...

1 affected package

xen

Package 16.04 LTS
xen Needs evaluation
Show less packages

CVE-2025-3415

Medium priority
Needs evaluation

Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. Fixed in versions 10.4.19+security-01,...

1 affected package

grafana

Package 16.04 LTS
grafana Needs evaluation
Show less packages

CVE-2025-5994

Medium priority
Needs evaluation

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support,...

1 affected package

unbound

Package 16.04 LTS
unbound Needs evaluation
Show less packages

CVE-2025-40924

Medium priority
Needs evaluation

Catalyst::Plugin::Session before version 0.44 for Perl generates session ids insecurely. The session id is generated from a (usually SHA-1) hash of a simple counter, the epoch time, the built-in rand function, the PID and...

1 affected package

libcatalyst-plugin-session-perl

Package 16.04 LTS
libcatalyst-plugin-session-perl Needs evaluation
Show less packages

CVE-2025-40918

Low priority
Needs evaluation

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will...

1 affected package

libauthen-sasl-perl

Package 16.04 LTS
libauthen-sasl-perl Needs evaluation
Show less packages

CVE-2025-40776

Medium priority
Not affected

A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) options may be vulnerable to a cache-poisoning attack. This issue affects BIND 9 versions 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.37-S1,...

3 affected packages

bind9, isc-dhcp, bind9-libs

Package 16.04 LTS
bind9 Not affected
isc-dhcp Not affected
bind9-libs
Show less packages

CVE-2025-40923

Medium priority
Needs evaluation

Plack-Middleware-Session before version 0.35 for Perl generates session ids insecurely. The default session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come...

1 affected package

libplack-middleware-session-perl

Package 16.04 LTS
libplack-middleware-session-perl Needs evaluation
Show less packages

CVE-2025-27465

Medium priority
Needs evaluation

Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled...

1 affected package

xen

Package 16.04 LTS
xen Needs evaluation
Show less packages