Search CVE reports
11 – 20 of 48143 results
(OpenSC is an open source smart card tools and middleware. Prior to ver ...)
1 affected package
opensc
| Package | 16.04 LTS |
|---|---|
| opensc | Needs evaluation |
(OpenSC is an open source smart card tools and middleware. Prior to ver ...)
1 affected package
opensc
| Package | 16.04 LTS |
|---|---|
| opensc | Needs evaluation |
(OpenSC is an open source smart card tools and middleware. Prior to ver ...)
1 affected package
opensc
| Package | 16.04 LTS |
|---|---|
| opensc | Needs evaluation |
(OpenSC is an open source smart card tools and middleware. Prior to ver ...)
1 affected package
opensc
| Package | 16.04 LTS |
|---|---|
| opensc | Needs evaluation |
A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer...
1 affected package
mxml
| Package | 16.04 LTS |
|---|---|
| mxml | Needs evaluation |
A local file disclosure vulnerability in the XInclude processing component of Inkscape 1.1 before 1.3 allows a remote attacker to read local files via a crafted SVG file containing malicious xi:include tags.
1 affected package
inkscape
| Package | 16.04 LTS |
|---|---|
| inkscape | Needs evaluation |
A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to...
1 affected package
firewalld
| Package | 16.04 LTS |
|---|---|
| firewalld | Needs evaluation |
Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial...
1 affected package
node-path-to-regexp
| Package | 16.04 LTS |
|---|---|
| node-path-to-regexp | Needs evaluation |
Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other...
1 affected package
node-path-to-regexp
| Package | 16.04 LTS |
|---|---|
| node-path-to-regexp | Needs evaluation |
A flaw was found in polkit. A local user can exploit this by providing a specially crafted, excessively long input to the `polkit-agent-helper-1` setuid binary via standard input (stdin). This unbounded input can lead to an...
1 affected package
policykit-1
| Package | 16.04 LTS |
|---|---|
| policykit-1 | Needs evaluation |