Search CVE reports
1 – 10 of 135 results
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when grep() encounters a crafted file name
1 affected package
libfile-find-rule-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libfile-find-rule-perl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
libsndfile through 1.2.2 has a reachable assertion, that may lead to application exit, in mpeg_l3_encode.c mpeg_l3_encoder_close.
1 affected package
libsndfile
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libsndfile | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds read.
1 affected package
libsndfile
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libsndfile | Fixed | Fixed | Fixed | Fixed |
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where...
2 affected packages
filezilla, putty
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
filezilla | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
putty | Not affected | Needs evaluation | Needs evaluation | Needs evaluation |
Some fixes available 38 of 85
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation...
13 affected packages
dropbear, filezilla, golang-go.crypto, libssh, libssh2...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
dropbear | Needs evaluation | Fixed | Fixed | Fixed |
filezilla | Fixed | Fixed | Fixed | Not affected |
golang-go.crypto | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
libssh | Not affected | Fixed | Fixed | Not affected |
libssh2 | Not affected | Not affected | Not affected | Not affected |
lxd | Not in release | Not in release | Not affected | Fixed |
openssh | Fixed | Fixed | Fixed | Fixed |
openssh-ssh1 | Ignored | Ignored | Ignored | Ignored |
paramiko | Fixed | Fixed | Fixed | Needs evaluation |
proftpd-dfsg | Not affected | Not affected | Fixed | Needs evaluation |
putty | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
python-asyncssh | Fixed | Fixed | Fixed | Ignored |
snapd | Not affected | Not affected | Not affected | Not affected |
File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
1 affected package
file
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
file | — | Fixed | Not affected | Not affected |
Heap buffer overflow vulnerability in FilePOSIX::read in File.cpp in audiofile 0.3.6 may cause denial-of-service via a crafted wav file, this bug can be triggered by the executable sfconvert.
1 affected package
audiofile
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
audiofile | — | Not affected | Not affected | Not affected |
Some fixes available 7 of 8
Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts.
1 affected package
libsndfile
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libsndfile | — | Fixed | Fixed | Fixed |
An off-by-one error in function wav_read_header in src/wav.c in Libsndfile 1.1.0, results in a write out of bound, which allows an attacker to execute arbitrary code, Denial of Service or other unspecified impacts.
1 affected package
libsndfile
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libsndfile | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the...
1 affected package
libcommons-fileupload-java
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libcommons-fileupload-java | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |