Search CVE reports


Toggle filters

61 – 70 of 35504 results

Status is adjusted based on your filters.


CVE-2025-5054

Medium priority
Fixed

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`,...

1 affected package

apport

Package 18.04 LTS
apport Fixed
Show less packages

CVE-2025-30087

Medium priority
Needs evaluation

Best Practical RT (Request Tracker) 4.4 through 4.4.7 and 5.0 through 5.0.7 allows XSS via injection of crafted parameters in a search URL.

2 affected packages

request-tracker4, request-tracker5

Package 18.04 LTS
request-tracker4 Needs evaluation
request-tracker5
Show less packages

CVE-2025-48734

Medium priority
Needs evaluation

Improper Access Control vulnerability in Apache Commons. A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to...

1 affected package

commons-beanutils

Package 18.04 LTS
commons-beanutils Needs evaluation
Show less packages

CVE-2025-5025

Medium priority
Not affected

libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the...

1 affected package

curl

Package 18.04 LTS
curl Not affected
Show less packages

CVE-2025-4947

Medium priority
Not affected

libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.

1 affected package

curl

Package 18.04 LTS
curl Not affected
Show less packages

CVE-2025-32803

Medium priority
Needs evaluation

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

1 affected package

isc-kea

Package 18.04 LTS
isc-kea Needs evaluation
Show less packages

CVE-2025-32802

Medium priority
Needs evaluation

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the...

1 affected package

isc-kea

Package 18.04 LTS
isc-kea Needs evaluation
Show less packages

CVE-2025-32801

Medium priority
Needs evaluation

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in...

1 affected package

isc-kea

Package 18.04 LTS
isc-kea Needs evaluation
Show less packages

CVE-2025-5278

Low priority
Needs evaluation

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional...

1 affected package

coreutils

Package 18.04 LTS
coreutils Needs evaluation
Show less packages

CVE-2025-48057

Medium priority
Needs evaluation

Icinga 2 is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. Prior to versions 2.12.12, 2.13.12, and 2.14.6, the VerifyCertificate()...

1 affected package

icinga2

Package 18.04 LTS
icinga2 Needs evaluation
Show less packages