Search CVE reports
821 – 830 of 32432 results
Not in release
Unauthorized disclosure of sensitive data: Any user with `GET` or `LIST` permissions on `BundleDeployment` resources could retrieve Helm values containing credentials or other secrets.
1 affected package
fleet
Package | 22.04 LTS |
---|---|
fleet | Not in release |
Out-of-bounds write in cdfs_open_cue_track in libretro libretro-common latest on all platforms allows remote attackers to execute arbitrary code via a crafted .cue file with a file path exceeding PATH_MAX_LENGTH that is copied...
1 affected package
retroarch
Package | 22.04 LTS |
---|---|
retroarch | Needs evaluation |
XML Injection vulnerability in xmltodict allows Input Data Manipulation. This issue affects xmltodict: from 0.14.2 before 0.15.1.
1 affected package
python-xmltodict
Package | 22.04 LTS |
---|---|
python-xmltodict | Fixed |
[Unknown description]
1 affected package
ruby-foreman
Package | 22.04 LTS |
---|---|
ruby-foreman | Needs evaluation |
A vulnerability was identified in DCMTK up to 3.6.9. This affects an unknown function in the library dcmimage/include/dcmtk/dcmimage/diybrpxt.h of the component dcm2img. Such manipulation leads to memory corruption. Local access...
1 affected package
dcmtk
Package | 22.04 LTS |
---|---|
dcmtk | Needs evaluation |
Cacti versions prior to 0.8.6-d contain a remote command execution vulnerability in the graph_view.php script. An authenticated user can inject arbitrary shell commands via the graph_start GET parameter, which is improperly...
1 affected package
cacti
Package | 22.04 LTS |
---|---|
cacti | Not affected |
A security vulnerability has been detected in Mupen64Plus up to 2.6.0. The affected element is the function write_is_viewer of the file src/device/cart/is_viewer.c. The manipulation leads to integer overflow. It is possible to...
1 affected package
mupen64plus-core
Package | 22.04 LTS |
---|---|
mupen64plus-core | Needs evaluation |
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid out-of-boundary access in dnode page As Jiaming Zhang reported: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x1c1/0x2a0...
144 affected packages
linux-hwe, linux-hwe-5.4, linux-hwe-5.8, linux, linux-hwe-5.11...
Package | 22.04 LTS |
---|---|
linux-hwe | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux | Vulnerable |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-6.11 | Not in release |
linux-hwe-6.14 | Not in release |
linux-hwe-edge | Not in release |
linux-lts-xenial | Not in release |
linux-kvm | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws-5.0 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-6.14 | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-6.11 | Not in release |
linux-azure-fde | Vulnerable |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-nvidia | Not in release |
linux-bluefield | Not in release |
linux-azure-edge | Not in release |
linux-fips | Vulnerable |
linux-aws-fips | Vulnerable |
linux-azure-fips | Vulnerable |
linux-gcp-fips | Vulnerable |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-6.11 | Not in release |
linux-gcp-6.14 | Not in release |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gke-5.15 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.4 | Not in release |
linux-gkeop-5.15 | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.4 | Not in release |
linux-ibm-5.15 | Not in release |
linux-ibm-6.8 | Vulnerable |
linux-intel-5.13 | Not in release |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-intel-iot-realtime | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lowlatency-hwe-6.11 | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-6.11 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-nvidia-tegra | Vulnerable |
linux-nvidia-tegra-5.15 | Not in release |
linux-nvidia-tegra-igx | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-oracle-6.14 | Not in release |
linux-oem | Not in release |
linux-oem-5.6 | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oem-6.11 | Not in release |
linux-oem-6.14 | Not in release |
linux-raspi2 | Not in release |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-realtime-6.8 | Vulnerable |
linux-realtime-6.14 | Not in release |
linux-riscv | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-riscv-6.14 | Not in release |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
linux-aws | Vulnerable |
linux-oracle | Vulnerable |
linux-raspi | Vulnerable |
linux-realtime | Vulnerable |
linux-intel | Not in release |
Not in release
tracing is a framework for instrumenting Rust programs to collect structured, event-based diagnostic information. Prior to version 0.3.20, tracing-subscriber was vulnerable to ANSI escape sequence injection attacks. Untrusted user...
1 affected package
rust-tracing-subscriber
Package | 22.04 LTS |
---|---|
rust-tracing-subscriber | Not in release |
Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable...
1 affected package
python-eventlet
Package | 22.04 LTS |
---|---|
python-eventlet | Needs evaluation |