Search CVE reports
111 – 120 of 43011 results
phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1.0.28, phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC against the locally computed HMAC. != on...
3 affected packages
php-phpseclib, php-phpseclib3, phpseclib
| Package | 18.04 LTS |
|---|---|
| php-phpseclib | Needs evaluation |
| php-phpseclib3 | — |
| phpseclib | Needs evaluation |
When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted...
13 affected packages
pypy3, python2.7, python3.4, python3.5, python3.6...
| Package | 18.04 LTS |
|---|---|
| pypy3 | — |
| python2.7 | Needs evaluation |
| python3.4 | — |
| python3.5 | — |
| python3.6 | Needs evaluation |
| python3.7 | Needs evaluation |
| python3.8 | Needs evaluation |
| python3.9 | — |
| python3.10 | — |
| python3.11 | — |
| python3.12 | — |
| python3.13 | — |
| python3.14 | — |
CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.
14 affected packages
jython, pypy3, python2.7, python3.4, python3.5...
| Package | 18.04 LTS |
|---|---|
| jython | Needs evaluation |
| pypy3 | — |
| python2.7 | Needs evaluation |
| python3.4 | — |
| python3.5 | — |
| python3.6 | Needs evaluation |
| python3.7 | Needs evaluation |
| python3.8 | Needs evaluation |
| python3.9 | — |
| python3.10 | — |
| python3.11 | — |
| python3.12 | — |
| python3.13 | — |
| python3.14 | — |
An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about...
1 affected package
musl
| Package | 18.04 LTS |
|---|---|
| musl | Needs evaluation |
In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a "logger -p emerg" command is executed, if ForwardToWall=yes is set.
1 affected package
systemd
| Package | 18.04 LTS |
|---|---|
| systemd | Needs evaluation |
In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.
1 affected package
systemd
| Package | 18.04 LTS |
|---|---|
| systemd | Needs evaluation |
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.
1 affected package
systemd
| Package | 18.04 LTS |
|---|---|
| systemd | Needs evaluation |
In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.
1 affected package
systemd
| Package | 18.04 LTS |
|---|---|
| systemd | Needs evaluation |
In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.
1 affected package
systemd
| Package | 18.04 LTS |
|---|---|
| systemd | Needs evaluation |
In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=<unset> unit exists and is running.
1 affected package
systemd
| Package | 18.04 LTS |
|---|---|
| systemd | Needs evaluation |