Search CVE reports
281 – 290 of 36372 results
[Unknown description]
2 affected packages
libsoup2.4, libsoup3
| Package | 22.04 LTS |
|---|---|
| libsoup2.4 | Needs evaluation |
| libsoup3 | Needs evaluation |
[ICO import integer overflow bypass leads to heap buffer overflow]
1 affected package
gimp
| Package | 22.04 LTS |
|---|---|
| gimp | Needs evaluation |
[GIMP PSP File Parsing Integer Overflow Leading to Heap Corruption]
1 affected package
gimp
| Package | 22.04 LTS |
|---|---|
| gimp | Needs evaluation |
[Denial of Service due to malformed SFTP message]
1 affected package
libssh
| Package | 22.04 LTS |
|---|---|
| libssh | Fixed |
[Denial of Service via inefficient regular expression processing]
1 affected package
libssh
| Package | 22.04 LTS |
|---|---|
| libssh | Fixed |
[Buffer underflow in ssh_get_hexa() on invalid input]
1 affected package
libssh
| Package | 22.04 LTS |
|---|---|
| libssh | Fixed |
[Denial of Service via improper configuration file handling]
1 affected package
libssh
| Package | 22.04 LTS |
|---|---|
| libssh | Fixed |
[Improper sanitation of paths received from SCP servers]
1 affected package
libssh
| Package | 22.04 LTS |
|---|---|
| libssh | Fixed |
WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
1 affected package
libwww-oauth-perl
| Package | 22.04 LTS |
|---|---|
| libwww-oauth-perl | Needs evaluation |
[Insecure default configuration leads to local man-in-the-middle attacks on Windows]
1 affected package
libssh
| Package | 22.04 LTS |
|---|---|
| libssh | Not affected |