Search CVE reports
331 – 340 of 48501 results
Impact: The fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into...
1 affected package
node-lodash
| Package | 16.04 LTS |
|---|---|
| node-lodash | Needs evaluation |
Impact: Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only...
1 affected package
node-lodash
| Package | 16.04 LTS |
|---|---|
| node-lodash | Needs evaluation |
PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, a heap out-of-bounds read vulnerability exists in PJSIP's VP9 RTP unpacketizer that occurs when parsing crafted VP9 Scalability...
1 affected package
pjproject
| Package | 16.04 LTS |
|---|---|
| pjproject | Needs evaluation |
Stored cross-site scripting (XSS) in Checkmk 2.5.0 (beta) before 2.5.0b2 allows authenticated users with permission to create hosts or services to execute arbitrary JavaScript in the browsers of other users performing searches in...
1 affected package
check-mk
| Package | 16.04 LTS |
|---|---|
| check-mk | Needs evaluation |
Stored cross-site scripting (XSS) in Checkmk version 2.5.0 (beta) before 2.5.0b2 allows authenticated users with permission to create pending changes to inject malicious JavaScript into the Pending Changes sidebar, which will...
1 affected package
check-mk
| Package | 16.04 LTS |
|---|---|
| check-mk | Needs evaluation |
An integer overflow vulnerability in 'pdf-image.c' in Artifex's MuPDF version 1.27.0 allows an attacker to maliciously craft a PDF that can trigger an integer overflow within the 'pdf_load_image_imp' function. This allows a heap...
1 affected package
mupdf
| Package | 16.04 LTS |
|---|---|
| mupdf | Needs evaluation |
An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of...
1 affected package
dnsdist
| Package | 16.04 LTS |
|---|---|
| dnsdist | Needs evaluation |
An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet...
1 affected package
dnsdist
| Package | 16.04 LTS |
|---|---|
| dnsdist | Needs evaluation |
An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available...
1 affected package
dnsdist
| Package | 16.04 LTS |
|---|---|
| dnsdist | Needs evaluation |
When the early_acl_drop (earlyACLDrop in Lua) option is disabled (default is enabled) on a DNS over HTTPs frontend using the nghttp2 provider, the ACL check is skipped, allowing all clients to send DoH queries regardless of the...
1 affected package
dnsdist
| Package | 16.04 LTS |
|---|---|
| dnsdist | Needs evaluation |