Search CVE reports
21 – 30 of 47057 results
A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating...
1 affected package
moodle
| Package | 16.04 LTS |
|---|---|
| moodle | Needs evaluation |
A flaw was found in Moodle. An open redirect vulnerability in the OAuth login flow allows a remote attacker to redirect users to attacker-controlled pages after they have successfully authenticated. This occurs due to insufficient...
1 affected package
moodle
| Package | 16.04 LTS |
|---|---|
| moodle | Needs evaluation |
A flaw was found in moodle. This formula injection vulnerability occurs when data fields are exported without proper escaping. A remote attacker could exploit this by providing malicious data that, when exported and opened in a...
1 affected package
moodle
| Package | 16.04 LTS |
|---|---|
| moodle | Needs evaluation |
A flaw was found in moodle. This vulnerability, known as Cross-Site Scripting (XSS), occurs due to insufficient checks on user-provided data in the formula editor's arithmetic expression fields. A remote attacker could inject...
1 affected package
moodle
| Package | 16.04 LTS |
|---|---|
| moodle | Needs evaluation |
A flaw was found in Moodle. This cross-site scripting (XSS) vulnerability, caused by improper sanitization of AI prompt responses, allows attackers to inject malicious HTML or script into web pages. When other users view...
1 affected package
moodle
| Package | 16.04 LTS |
|---|---|
| moodle | Needs evaluation |
A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing...
1 affected package
moodle
| Package | 16.04 LTS |
|---|---|
| moodle | Needs evaluation |
: Out-of-bounds Write vulnerability in Xquic Project Xquic Server xquic on Linux (QUIC protocol implementation, packet processing module modules) allows : Buffer Manipulation.This issue affects Xquic Server: through 1.8.3.
149 affected packages
linux, linux-hwe, linux-hwe-5.4, linux-hwe-5.8, linux-hwe-5.11...
| Package | 16.04 LTS |
|---|---|
| linux | Needs evaluation |
| linux-hwe | Needs evaluation |
| linux-hwe-5.4 | — |
| linux-hwe-5.8 | — |
| linux-hwe-5.11 | — |
| linux-hwe-5.13 | — |
| linux-hwe-5.15 | — |
| linux-hwe-5.19 | — |
| linux-hwe-6.2 | — |
| linux-hwe-6.5 | — |
| linux-hwe-6.8 | — |
| linux-hwe-6.11 | — |
| linux-hwe-6.14 | — |
| linux-hwe-edge | Ignored |
| linux-lts-xenial | — |
| linux-kvm | Needs evaluation |
| linux-allwinner-5.19 | — |
| linux-aws | Needs evaluation |
| linux-aws-5.0 | — |
| linux-aws-5.3 | — |
| linux-aws-5.4 | — |
| linux-aws-5.8 | — |
| linux-aws-5.11 | — |
| linux-aws-5.13 | — |
| linux-aws-5.15 | — |
| linux-aws-5.19 | — |
| linux-aws-6.2 | — |
| linux-aws-6.5 | — |
| linux-aws-6.8 | — |
| linux-aws-6.14 | — |
| linux-aws-hwe | Needs evaluation |
| linux-azure | Needs evaluation |
| linux-azure-4.15 | — |
| linux-azure-5.3 | — |
| linux-azure-5.4 | — |
| linux-azure-5.8 | — |
| linux-azure-5.11 | — |
| linux-azure-5.13 | — |
| linux-azure-5.15 | — |
| linux-azure-5.19 | — |
| linux-azure-6.2 | — |
| linux-azure-6.5 | — |
| linux-azure-6.8 | — |
| linux-azure-6.11 | — |
| linux-azure-6.14 | — |
| linux-azure-fde | — |
| linux-azure-fde-5.15 | — |
| linux-azure-fde-5.19 | — |
| linux-azure-fde-6.2 | — |
| linux-azure-fde-6.8 | — |
| linux-azure-fde-6.14 | — |
| linux-azure-nvidia | — |
| linux-azure-nvidia-6.14 | — |
| linux-bluefield | — |
| linux-azure-edge | — |
| linux-fips | Needs evaluation |
| linux-aws-fips | — |
| linux-azure-fips | — |
| linux-gcp-fips | — |
| linux-gcp | Needs evaluation |
| linux-gcp-4.15 | — |
| linux-gcp-5.3 | — |
| linux-gcp-5.4 | — |
| linux-gcp-5.8 | — |
| linux-gcp-5.11 | — |
| linux-gcp-5.13 | — |
| linux-gcp-5.15 | — |
| linux-gcp-5.19 | — |
| linux-gcp-6.2 | — |
| linux-gcp-6.5 | — |
| linux-gcp-6.8 | — |
| linux-gcp-6.11 | — |
| linux-gcp-6.14 | — |
| linux-gke | — |
| linux-gke-4.15 | — |
| linux-gke-5.4 | — |
| linux-gke-5.15 | — |
| linux-gkeop | — |
| linux-gkeop-5.4 | — |
| linux-gkeop-5.15 | — |
| linux-ibm | — |
| linux-ibm-5.4 | — |
| linux-ibm-5.15 | — |
| linux-ibm-6.8 | — |
| linux-intel-5.13 | — |
| linux-intel-iotg | — |
| linux-intel-iotg-5.15 | — |
| linux-iot | — |
| linux-intel-iot-realtime | — |
| linux-lowlatency | — |
| linux-lowlatency-hwe-5.15 | — |
| linux-lowlatency-hwe-5.19 | — |
| linux-lowlatency-hwe-6.2 | — |
| linux-lowlatency-hwe-6.5 | — |
| linux-lowlatency-hwe-6.8 | — |
| linux-lowlatency-hwe-6.11 | — |
| linux-nvidia | — |
| linux-nvidia-6.2 | — |
| linux-nvidia-6.5 | — |
| linux-nvidia-6.8 | — |
| linux-nvidia-6.11 | — |
| linux-nvidia-lowlatency | — |
| linux-nvidia-tegra | — |
| linux-nvidia-tegra-5.15 | — |
| linux-nvidia-tegra-igx | — |
| linux-oracle | Needs evaluation |
| linux-oracle-5.0 | — |
| linux-oracle-5.3 | — |
| linux-oracle-5.4 | — |
| linux-oracle-5.8 | — |
| linux-oracle-5.11 | — |
| linux-oracle-5.13 | — |
| linux-oracle-5.15 | — |
| linux-oracle-6.5 | — |
| linux-oracle-6.8 | — |
| linux-oracle-6.14 | — |
| linux-oem | — |
| linux-oem-5.6 | — |
| linux-oem-5.10 | — |
| linux-oem-5.13 | — |
| linux-oem-5.14 | — |
| linux-oem-5.17 | — |
| linux-oem-6.0 | — |
| linux-oem-6.1 | — |
| linux-oem-6.5 | — |
| linux-oem-6.8 | — |
| linux-oem-6.11 | — |
| linux-oem-6.14 | — |
| linux-oem-6.17 | — |
| linux-raspi | — |
| linux-raspi2 | — |
| linux-raspi-5.4 | — |
| linux-raspi-realtime | — |
| linux-realtime | — |
| linux-realtime-6.8 | — |
| linux-realtime-6.14 | — |
| linux-riscv | — |
| linux-riscv-5.8 | — |
| linux-riscv-5.11 | — |
| linux-riscv-5.15 | — |
| linux-riscv-5.19 | — |
| linux-riscv-6.5 | — |
| linux-riscv-6.8 | — |
| linux-riscv-6.14 | — |
| linux-starfive-5.19 | — |
| linux-starfive-6.2 | — |
| linux-starfive-6.5 | — |
| linux-xilinx | — |
| linux-xilinx-zynqmp | — |
When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to...
1 affected package
python-pip
| Package | 16.04 LTS |
|---|---|
| python-pip | Needs evaluation |
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially...
2 affected packages
libsoup2.4, libsoup3
| Package | 16.04 LTS |
|---|---|
| libsoup2.4 | Needs evaluation |
| libsoup3 | — |
A flaw was found in SoupServer. This HTTP request smuggling vulnerability occurs because SoupServer improperly handles requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. A remote, unauthenticated...
2 affected packages
libsoup2.4, libsoup3
| Package | 16.04 LTS |
|---|---|
| libsoup2.4 | Needs evaluation |
| libsoup3 | — |