Search CVE reports


Toggle filters

81 – 90 of 25599 results

Status is adjusted based on your filters.


CVE-2025-32803

Medium priority
Needs evaluation

In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

1 affected package

isc-kea

Package 24.04 LTS
isc-kea Needs evaluation
Show less packages

CVE-2025-32802

Medium priority
Needs evaluation

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the...

1 affected package

isc-kea

Package 24.04 LTS
isc-kea Needs evaluation
Show less packages

CVE-2025-32801

Medium priority
Needs evaluation

Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in...

1 affected package

isc-kea

Package 24.04 LTS
isc-kea Needs evaluation
Show less packages

CVE-2025-40911

Medium priority
Needs evaluation

Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses. Leading zeros are...

1 affected package

libnet-cidr-set-perl

Package 24.04 LTS
libnet-cidr-set-perl Needs evaluation
Show less packages

CVE-2025-5281

Medium priority
Not affected

Inappropriate implementation in BFCache in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially obtain user information via a crafted HTML page. (Chromium security severity: Medium)

1 affected package

chromium-browser

Package 24.04 LTS
chromium-browser Not affected
Show less packages

CVE-2025-5280

Medium priority
Not affected

Out of bounds write in V8 in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

1 affected package

chromium-browser

Package 24.04 LTS
chromium-browser Not affected
Show less packages

CVE-2025-5278

Low priority
Needs evaluation

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional...

1 affected package

coreutils

Package 24.04 LTS
coreutils Needs evaluation
Show less packages

CVE-2025-5067

Medium priority
Not affected

Inappropriate implementation in Tab Strip in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)

1 affected package

chromium-browser

Package 24.04 LTS
chromium-browser Not affected
Show less packages

CVE-2025-5066

Medium priority
Not affected

Inappropriate implementation in Messages in Google Chrome on Android prior to 137.0.7151.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium...

1 affected package

chromium-browser

Package 24.04 LTS
chromium-browser Not affected
Show less packages

CVE-2025-5065

Medium priority
Not affected

Inappropriate implementation in FileSystemAccess API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)

1 affected package

chromium-browser

Package 24.04 LTS
chromium-browser Not affected
Show less packages