Search CVE reports


Toggle filters

201 – 210 of 38100 results

Status is adjusted based on your filters.


CVE-2026-33658

Medium priority
Needs evaluation

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 Active Storage's proxy controller does not limit the number of byte ranges in an HTTP Range header....

1 affected package

rails

Package 20.04 LTS
rails Needs evaluation
Show less packages

CVE-2026-33635

Medium priority
Needs evaluation

iCalendar is a Ruby library for dealing with iCalendar files in the iCalendar format defined by RFC-5545. Starting in version 2.0.0 and prior to version 2.12.2, .ics serialization does not properly sanitize URI property values,...

1 affected package

ruby-icalendar

Package 20.04 LTS
ruby-icalendar Needs evaluation
Show less packages

CVE-2026-2272

Medium priority
Needs evaluation

A flaw was found in GIMP. An integer overflow vulnerability exists when processing ICO image files, specifically in the `ico_read_info` and `ico_read_icon` functions. This issue arises because a size calculation for image buffers...

1 affected package

gimp

Package 20.04 LTS
gimp Needs evaluation
Show less packages

CVE-2026-2271

Medium priority
Needs evaluation

A flaw was found in GIMP's PSP (Paint Shop Pro) file parser. A remote attacker could exploit an integer overflow vulnerability in the read_creator_block() function by providing a specially crafted PSP image file. This...

1 affected package

gimp

Package 20.04 LTS
gimp Needs evaluation
Show less packages

CVE-2026-2239

Medium priority
Needs evaluation

A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal...

1 affected package

gimp

Package 20.04 LTS
gimp Needs evaluation
Show less packages

CVE-2026-2100

Medium priority
Not affected

A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to...

1 affected package

p11-kit

Package 20.04 LTS
p11-kit Not affected
Show less packages

CVE-2026-33536

Medium priority
Needs evaluation

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, due to an incorrect return value on certain platforms a pointer is incremented past the end of a...

1 affected package

imagemagick

Package 20.04 LTS
imagemagick Needs evaluation
Show less packages

CVE-2026-33535

Medium priority
Needs evaluation

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, an out-of-bounds write of a zero byte exists in the X11 `display` interaction path that could lead to...

1 affected package

imagemagick

Package 20.04 LTS
imagemagick Needs evaluation
Show less packages

CVE-2026-32287

Medium priority
Needs evaluation

Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".

1 affected package

golang-github-antchfx-xpath

Package 20.04 LTS
golang-github-antchfx-xpath Needs evaluation
Show less packages

CVE-2026-32285

Medium priority
Needs evaluation

The Delete function fails to properly validate offsets when processing malformed JSON input. This can lead to a negative slice index and a runtime panic, allowing a denial of service attack.

1 affected package

golang-github-buger-jsonparser

Package 20.04 LTS
golang-github-buger-jsonparser Needs evaluation
Show less packages