Search CVE reports


Toggle filters

51 – 60 of 38012 results

Status is adjusted based on your filters.


CVE-2025-59490

Medium priority
Needs evaluation

[Unknown description]

2 affected packages

znuny, otrs2

Package 20.04 LTS
znuny
otrs2 Needs evaluation
Show less packages

CVE-2026-4176

Medium priority
Needs evaluation

Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life...

1 affected package

perl

Package 20.04 LTS
perl Needs evaluation
Show less packages

CVE-2026-23400

Medium priority
Needs evaluation

In the Linux kernel, the following vulnerability has been resolved: rust_binder: call set_notification_done() without proc lock Consider the following sequence of events on a death listener: 1. The remote process dies and sends a...

157 affected packages

linux, linux-hwe, linux-hwe-5.4, linux-hwe-5.8, linux-hwe-5.11...

Package 20.04 LTS
linux Needs evaluation
linux-hwe
linux-hwe-5.4
linux-hwe-5.8 Ignored
linux-hwe-5.11 Ignored
linux-hwe-5.13 Ignored
linux-hwe-5.15 Needs evaluation
linux-hwe-5.19
linux-hwe-6.2
linux-hwe-6.5
linux-hwe-6.8
linux-hwe-6.11
linux-hwe-6.14
linux-hwe-6.17
linux-hwe-edge
linux-lts-xenial
linux-kvm Needs evaluation
linux-allwinner-5.19
linux-aws Needs evaluation
linux-aws-5.0
linux-aws-5.3
linux-aws-5.4
linux-aws-5.8 Ignored
linux-aws-5.11 Ignored
linux-aws-5.13 Ignored
linux-aws-5.15 Needs evaluation
linux-aws-5.19
linux-aws-6.2
linux-aws-6.5
linux-aws-6.8
linux-aws-6.14
linux-aws-6.17
linux-aws-hwe
linux-azure Needs evaluation
linux-azure-4.15
linux-azure-5.3
linux-azure-5.4
linux-azure-5.8 Ignored
linux-azure-5.11 Ignored
linux-azure-5.13 Ignored
linux-azure-5.15 Needs evaluation
linux-azure-5.19
linux-azure-6.2
linux-azure-6.5
linux-azure-6.8
linux-azure-6.11
linux-azure-6.14
linux-azure-6.17
linux-azure-fde Ignored
linux-azure-fde-5.15 Needs evaluation
linux-azure-fde-5.19
linux-azure-fde-6.2
linux-azure-fde-6.8
linux-azure-fde-6.14
linux-azure-fde-6.17
linux-azure-nvidia
linux-azure-nvidia-6.14
linux-bluefield Needs evaluation
linux-azure-edge
linux-fips Needs evaluation
linux-aws-fips Needs evaluation
linux-azure-fips Needs evaluation
linux-gcp-fips Needs evaluation
linux-gcp Needs evaluation
linux-gcp-4.15
linux-gcp-5.3
linux-gcp-5.4
linux-gcp-5.8 Ignored
linux-gcp-5.11 Ignored
linux-gcp-5.13 Ignored
linux-gcp-5.15 Needs evaluation
linux-gcp-5.19
linux-gcp-6.2
linux-gcp-6.5
linux-gcp-6.8
linux-gcp-6.11
linux-gcp-6.14
linux-gcp-6.17
linux-gke Ignored
linux-gke-4.15
linux-gke-5.4
linux-gke-5.15 Ignored
linux-gkeop Ignored
linux-gkeop-5.4
linux-gkeop-5.15 Ignored
linux-ibm Needs evaluation
linux-ibm-5.4
linux-ibm-5.15 Needs evaluation
linux-ibm-6.8
linux-intel-5.13 Ignored
linux-intel-iotg
linux-intel-iotg-5.15 Needs evaluation
linux-iot Needs evaluation
linux-intel-iot-realtime
linux-lowlatency
linux-lowlatency-hwe-5.15 Needs evaluation
linux-lowlatency-hwe-5.19
linux-lowlatency-hwe-6.2
linux-lowlatency-hwe-6.5
linux-lowlatency-hwe-6.8
linux-lowlatency-hwe-6.11
linux-nvidia
linux-nvidia-6.2
linux-nvidia-6.5
linux-nvidia-6.8
linux-nvidia-6.11
linux-nvidia-lowlatency
linux-nvidia-tegra
linux-nvidia-tegra-5.15 Needs evaluation
linux-nvidia-tegra-igx
linux-oracle Needs evaluation
linux-oracle-5.0
linux-oracle-5.3
linux-oracle-5.4
linux-oracle-5.8 Ignored
linux-oracle-5.11 Ignored
linux-oracle-5.13 Ignored
linux-oracle-5.15 Needs evaluation
linux-oracle-6.5
linux-oracle-6.8
linux-oracle-6.14
linux-oracle-6.17
linux-oem
linux-oem-5.6 Ignored
linux-oem-5.10 Ignored
linux-oem-5.13 Ignored
linux-oem-5.14 Ignored
linux-oem-5.17
linux-oem-6.0
linux-oem-6.1
linux-oem-6.5
linux-oem-6.8
linux-oem-6.11
linux-oem-6.14
linux-oem-6.17
linux-raspi Needs evaluation
linux-raspi2 Ignored
linux-raspi-5.4
linux-raspi-realtime
linux-realtime
linux-realtime-6.8
linux-realtime-6.14
linux-riscv Ignored
linux-riscv-5.8 Ignored
linux-riscv-5.11 Ignored
linux-riscv-5.15 Needs evaluation
linux-riscv-5.19
linux-riscv-6.5
linux-riscv-6.8
linux-riscv-6.14
linux-riscv-6.17
linux-starfive-5.19
linux-starfive-6.2
linux-starfive-6.5
linux-xilinx
linux-xilinx-zynqmp Needs evaluation
linux-realtime-6.17
Show all 157 packages Show less packages

CVE-2026-5037

Medium priority
Needs evaluation

A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer...

1 affected package

mxml

Package 20.04 LTS
mxml Needs evaluation
Show less packages

CVE-2018-25224

Medium priority
Needs evaluation

PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files...

1 affected package

pms

Package 20.04 LTS
pms Needs evaluation
Show less packages

CVE-2018-25223

High priority
Needs evaluation

Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code...

1 affected package

crashmail

Package 20.04 LTS
crashmail Needs evaluation
Show less packages

CVE-2018-25222

Medium priority
Needs evaluation

SC v7.16 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying oversized input that exceeds buffer boundaries. Attackers can craft malicious input strings exceeding...

1 affected package

sc

Package 20.04 LTS
sc Needs evaluation
Show less packages

CVE-2018-25220

Medium priority
Needs evaluation

Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of...

1 affected package

bochs

Package 20.04 LTS
bochs Needs evaluation
Show less packages

CVE-2017-20229

Medium priority
Needs evaluation

MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can craft malicious input that...

1 affected package

mawk

Package 20.04 LTS
mawk Needs evaluation
Show less packages

CVE-2017-20225

Medium priority
Needs evaluation

TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can trigger the overflow through...

1 affected package

tiemu

Package 20.04 LTS
tiemu Needs evaluation
Show less packages