Search CVE reports


Toggle filters

51 – 60 of 36758 results

Status is adjusted based on your filters.


CVE-2025-69418

Low priority

Some fixes available 1 of 2

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 20.04 LTS
openssl Fixed
openssl1.0
nodejs Not affected
edk2 Needs evaluation
Show less packages

CVE-2025-68160

Low priority

Some fixes available 1 of 2

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 20.04 LTS
openssl Fixed
openssl1.0
nodejs Not affected
edk2 Needs evaluation
Show less packages

CVE-2025-66199

Low priority
Not affected

Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 20.04 LTS
openssl Not affected
openssl1.0
nodejs Not affected
edk2 Not affected
Show less packages

CVE-2025-15469

Low priority
Not affected

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 20.04 LTS
openssl Not affected
openssl1.0
nodejs Not affected
edk2 Not affected
Show less packages

CVE-2025-15468

Low priority
Not affected

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 20.04 LTS
openssl Not affected
openssl1.0
nodejs Not affected
edk2 Not affected
Show less packages

CVE-2025-15467

Medium priority
Not affected

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 20.04 LTS
openssl Not affected
openssl1.0
nodejs Not affected
edk2 Not affected
Show less packages

CVE-2025-11187

Medium priority
Not affected

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 20.04 LTS
openssl Not affected
openssl1.0
nodejs Not affected
edk2 Not affected
Show less packages

CVE-2026-24400

Medium priority
Needs evaluation

AssertJ provides Fluent testing assertions for Java and the Java Virtual Machine (JVM). Starting in version 1.4.0 and prior to version 3.27.7, an XML External Entity (XXE) vulnerability exists...

1 affected package

assertj-core

Package 20.04 LTS
assertj-core Needs evaluation
Show less packages

CVE-2025-9820

Low priority
Needs evaluation

A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a...

1 affected package

gnutls28

Package 20.04 LTS
gnutls28 Needs evaluation
Show less packages

CVE-2025-9615

Medium priority
Vulnerable

A flaw was found in NetworkManager. The NetworkManager package allows access to files that may belong to other users. NetworkManager allows non-root users to configure the system's network. The daemon runs with root privileges and...

1 affected package

network-manager

Package 20.04 LTS
network-manager Vulnerable
Show less packages