Search CVE reports
11 – 20 of 37733 results
CVE-2024-11668
Medium priorityAn issue has been discovered in GitLab CE/EE affecting all versions from 16.11 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. Long-lived connections could potentially bypass authentication controls,...
1 affected packages
gitlab
Package | 16.04 LTS |
---|---|
gitlab | Ignored |
CVE-2024-10240
Medium priorityAn issue has been discovered in GitLab EE affecting all versions starting from 17.3 before 17.3.7, all versions starting from 17.4 before 17.4.4, all versions starting from 17.5 before 17.5.2 in which an unauthenticated user may...
1 affected packages
gitlab
Package | 16.04 LTS |
---|---|
gitlab | Ignored |
CVE-2024-53008
Medium priorityInconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited, a remote attacker may access a path that is restricted by ACL (Access Control List) set...
1 affected packages
haproxy
Package | 16.04 LTS |
---|---|
haproxy | Needs evaluation |
CVE-2024-36466
Medium priorityA bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
1 affected packages
zabbix
Package | 16.04 LTS |
---|---|
zabbix | Needs evaluation |
CVE-2023-52922
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862 CPU: 1...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 16.04 LTS |
---|---|
linux | Ignored |
linux-allwinner-5.19 | Not in release |
linux-aws | Ignored |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-6.8 | Not in release |
linux-aws-fips | Ignored |
linux-aws-hwe | Ignored |
linux-azure | Ignored |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-6.8 | Not in release |
linux-azure-edge | Not in release |
linux-azure-fde | Not in release |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-fips | Ignored |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Ignored |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-6.8 | Not in release |
linux-gcp-fips | Ignored |
linux-gke | Ignored |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Not in release |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Ignored |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-edge | Ignored |
linux-ibm | Not in release |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Ignored |
linux-lowlatency | Not in release |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lts-xenial | Not in release |
linux-nvidia | Not in release |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-oem | Ignored |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Not in release |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Not in release |
linux-oracle | Ignored |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Not in release |
linux-oracle-6.8 | Not in release |
linux-raspi | Not in release |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Ignored |
linux-realtime | Not in release |
linux-riscv | Not in release |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Not in release |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Not in release |
CVE-2024-53920
Medium priorityIn elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to...
5 affected packages
emacs, emacs24, emacs25, xemacs21, xemacs21-packages
Package | 16.04 LTS |
---|---|
emacs | — |
emacs24 | Needs evaluation |
emacs25 | — |
xemacs21 | Needs evaluation |
xemacs21-packages | Needs evaluation |
CVE-2024-53849
Medium priorityeditorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains...
1 affected packages
editorconfig-core
Package | 16.04 LTS |
---|---|
editorconfig-core | Needs evaluation |
CVE-2024-53620
Medium priorityA cross-site scripting (XSS) vulnerability in the Article module of SPIP v4.3.3 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Title parameter.
1 affected packages
spip
Package | 16.04 LTS |
---|---|
spip | Needs evaluation |
CVE-2024-53619
Medium priorityAn authenticated arbitrary file upload vulnerability in the Documents module of SPIP v4.3.3 allows attackers to execute arbitrary code via uploading a crafted PDF file.
1 affected packages
spip
Package | 16.04 LTS |
---|---|
spip | Needs evaluation |
CVE-2024-38819
Medium priorityA flaw was found in the Spring Framework. Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. This flaw allows an attacker to craft...
1 affected packages
libspring-java
Package | 16.04 LTS |
---|---|
libspring-java | Needs evaluation |