Search CVE reports
61 – 70 of 35504 results
Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`,...
1 affected package
apport
Package | 18.04 LTS |
---|---|
apport | Fixed |
Best Practical RT (Request Tracker) 4.4 through 4.4.7 and 5.0 through 5.0.7 allows XSS via injection of crafted parameters in a search URL.
2 affected packages
request-tracker4, request-tracker5
Package | 18.04 LTS |
---|---|
request-tracker4 | Needs evaluation |
request-tracker5 | — |
Improper Access Control vulnerability in Apache Commons. A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to...
1 affected package
commons-beanutils
Package | 18.04 LTS |
---|---|
commons-beanutils | Needs evaluation |
libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the...
1 affected package
curl
Package | 18.04 LTS |
---|---|
curl | Not affected |
libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
1 affected package
curl
Package | 18.04 LTS |
---|---|
curl | Not affected |
In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
1 affected package
isc-kea
Package | 18.04 LTS |
---|---|
isc-kea | Needs evaluation |
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the...
1 affected package
isc-kea
Package | 18.04 LTS |
---|---|
isc-kea | Needs evaluation |
Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in...
1 affected package
isc-kea
Package | 18.04 LTS |
---|---|
isc-kea | Needs evaluation |
A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional...
1 affected package
coreutils
Package | 18.04 LTS |
---|---|
coreutils | Needs evaluation |
Icinga 2 is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. Prior to versions 2.12.12, 2.13.12, and 2.14.6, the VerifyCertificate()...
1 affected package
icinga2
Package | 18.04 LTS |
---|---|
icinga2 | Needs evaluation |