Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

11 – 20 of 37733 results

Status is adjusted based on your filters.


CVE-2024-11668

Medium priority
Ignored

An issue has been discovered in GitLab CE/EE affecting all versions from 16.11 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. Long-lived connections could potentially bypass authentication controls,...

1 affected packages

gitlab

Package 16.04 LTS
gitlab Ignored
Show less packages

CVE-2024-10240

Medium priority
Ignored

An issue has been discovered in GitLab EE affecting all versions starting from 17.3 before 17.3.7, all versions starting from 17.4 before 17.4.4, all versions starting from 17.5 before 17.5.2 in which an unauthenticated user may...

1 affected packages

gitlab

Package 16.04 LTS
gitlab Ignored
Show less packages

CVE-2024-53008

Medium priority
Needs evaluation

Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited, a remote attacker may access a path that is restricted by ACL (Access Control List) set...

1 affected packages

haproxy

Package 16.04 LTS
haproxy Needs evaluation
Show less packages

CVE-2024-36466

Medium priority
Needs evaluation

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

1 affected packages

zabbix

Package 16.04 LTS
zabbix Needs evaluation
Show less packages

CVE-2023-52922

Medium priority
Ignored

In the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862 CPU: 1...

126 affected packages

linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...

Package 16.04 LTS
linux Ignored
linux-allwinner-5.19 Not in release
linux-aws Ignored
linux-aws-5.0 Not in release
linux-aws-5.11 Not in release
linux-aws-5.13 Not in release
linux-aws-5.15 Not in release
linux-aws-5.19 Not in release
linux-aws-5.3 Not in release
linux-aws-5.4 Not in release
linux-aws-5.8 Not in release
linux-aws-6.2 Not in release
linux-aws-6.5 Not in release
linux-aws-6.8 Not in release
linux-aws-fips Ignored
linux-aws-hwe Ignored
linux-azure Ignored
linux-azure-4.15 Not in release
linux-azure-5.11 Not in release
linux-azure-5.13 Not in release
linux-azure-5.15 Not in release
linux-azure-5.19 Not in release
linux-azure-5.3 Not in release
linux-azure-5.4 Not in release
linux-azure-5.8 Not in release
linux-azure-6.2 Not in release
linux-azure-6.5 Not in release
linux-azure-6.8 Not in release
linux-azure-edge Not in release
linux-azure-fde Not in release
linux-azure-fde-5.15 Not in release
linux-azure-fde-5.19 Not in release
linux-azure-fde-6.2 Not in release
linux-azure-fips Ignored
linux-bluefield Not in release
linux-fips Not in release
linux-gcp Ignored
linux-gcp-4.15 Not in release
linux-gcp-5.11 Not in release
linux-gcp-5.13 Not in release
linux-gcp-5.15 Not in release
linux-gcp-5.19 Not in release
linux-gcp-5.3 Not in release
linux-gcp-5.4 Not in release
linux-gcp-5.8 Not in release
linux-gcp-6.2 Not in release
linux-gcp-6.5 Not in release
linux-gcp-6.8 Not in release
linux-gcp-fips Ignored
linux-gke Ignored
linux-gke-4.15 Not in release
linux-gke-5.15 Not in release
linux-gke-5.4 Not in release
linux-gkeop Not in release
linux-gkeop-5.15 Not in release
linux-gkeop-5.4 Not in release
linux-hwe Ignored
linux-hwe-5.11 Not in release
linux-hwe-5.13 Not in release
linux-hwe-5.15 Not in release
linux-hwe-5.19 Not in release
linux-hwe-5.4 Not in release
linux-hwe-5.8 Not in release
linux-hwe-6.2 Not in release
linux-hwe-6.5 Not in release
linux-hwe-6.8 Not in release
linux-hwe-edge Ignored
linux-ibm Not in release
linux-ibm-5.15 Not in release
linux-ibm-5.4 Not in release
linux-intel Not in release
linux-intel-5.13 Not in release
linux-intel-iot-realtime Not in release
linux-intel-iotg Not in release
linux-intel-iotg-5.15 Not in release
linux-iot Not in release
linux-kvm Ignored
linux-lowlatency Not in release
linux-lowlatency-hwe-5.15 Not in release
linux-lowlatency-hwe-5.19 Not in release
linux-lowlatency-hwe-6.2 Not in release
linux-lowlatency-hwe-6.5 Not in release
linux-lowlatency-hwe-6.8 Not in release
linux-lts-xenial Not in release
linux-nvidia Not in release
linux-nvidia-6.2 Not in release
linux-nvidia-6.5 Not in release
linux-nvidia-6.8 Not in release
linux-nvidia-lowlatency Not in release
linux-oem Ignored
linux-oem-5.10 Not in release
linux-oem-5.13 Not in release
linux-oem-5.14 Not in release
linux-oem-5.17 Not in release
linux-oem-5.6 Not in release
linux-oem-6.0 Not in release
linux-oem-6.1 Not in release
linux-oem-6.11 Not in release
linux-oem-6.5 Not in release
linux-oem-6.8 Not in release
linux-oracle Ignored
linux-oracle-5.0 Not in release
linux-oracle-5.11 Not in release
linux-oracle-5.13 Not in release
linux-oracle-5.15 Not in release
linux-oracle-5.3 Not in release
linux-oracle-5.4 Not in release
linux-oracle-5.8 Not in release
linux-oracle-6.5 Not in release
linux-oracle-6.8 Not in release
linux-raspi Not in release
linux-raspi-5.4 Not in release
linux-raspi-realtime Not in release
linux-raspi2 Ignored
linux-realtime Not in release
linux-riscv Not in release
linux-riscv-5.11 Not in release
linux-riscv-5.15 Not in release
linux-riscv-5.19 Not in release
linux-riscv-5.8 Not in release
linux-riscv-6.5 Not in release
linux-riscv-6.8 Not in release
linux-starfive-5.19 Not in release
linux-starfive-6.2 Not in release
linux-starfive-6.5 Not in release
linux-xilinx-zynqmp Not in release
Show all 126 packages Show less packages

CVE-2024-53920

Medium priority
Needs evaluation

In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to...

5 affected packages

emacs, emacs24, emacs25, xemacs21, xemacs21-packages

Package 16.04 LTS
emacs
emacs24 Needs evaluation
emacs25
xemacs21 Needs evaluation
xemacs21-packages Needs evaluation
Show less packages

CVE-2024-53849

Medium priority
Needs evaluation

editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains...

1 affected packages

editorconfig-core

Package 16.04 LTS
editorconfig-core Needs evaluation
Show less packages

CVE-2024-53620

Medium priority
Needs evaluation

A cross-site scripting (XSS) vulnerability in the Article module of SPIP v4.3.3 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Title parameter.

1 affected packages

spip

Package 16.04 LTS
spip Needs evaluation
Show less packages

CVE-2024-53619

Medium priority
Needs evaluation

An authenticated arbitrary file upload vulnerability in the Documents module of SPIP v4.3.3 allows attackers to execute arbitrary code via uploading a crafted PDF file.

1 affected packages

spip

Package 16.04 LTS
spip Needs evaluation
Show less packages

CVE-2024-38819

Medium priority
Needs evaluation

A flaw was found in the Spring Framework. Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. This flaw allows an attacker to craft...

1 affected packages

libspring-java

Package 16.04 LTS
libspring-java Needs evaluation
Show less packages