Search CVE reports


Toggle filters

281 – 290 of 42812 results

Status is adjusted based on your filters.


CVE-2026-2950

Medium priority
Needs evaluation

Impact: Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only...

1 affected package

node-lodash

Package 18.04 LTS
node-lodash Needs evaluation
Show less packages

CVE-2026-34235

Medium priority
Needs evaluation

PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, a heap out-of-bounds read vulnerability exists in PJSIP's VP9 RTP unpacketizer that occurs when parsing crafted VP9 Scalability...

1 affected package

pjproject

Package 18.04 LTS
pjproject Needs evaluation
Show less packages

CVE-2026-33276

Medium priority
Needs evaluation

Stored cross-site scripting (XSS) in Checkmk 2.5.0 (beta) before 2.5.0b2 allows authenticated users with permission to create hosts or services to execute arbitrary JavaScript in the browsers of other users performing searches in...

1 affected package

check-mk

Package 18.04 LTS
check-mk Needs evaluation
Show less packages

CVE-2026-20915

Medium priority
Needs evaluation

Stored cross-site scripting (XSS) in Checkmk version 2.5.0 (beta) before 2.5.0b2 allows authenticated users with permission to create pending changes to inject malicious JavaScript into the Pending Changes sidebar, which will...

1 affected package

check-mk

Package 18.04 LTS
check-mk Needs evaluation
Show less packages

CVE-2026-3308

Medium priority
Needs evaluation

An integer overflow vulnerability in 'pdf-image.c' in Artifex's MuPDF version 1.27.0 allows an attacker to maliciously craft a PDF that can trigger an integer overflow within the 'pdf_load_image_imp' function. This allows a heap...

1 affected package

mupdf

Package 18.04 LTS
mupdf Needs evaluation
Show less packages

CVE-2026-27854

Medium priority
Needs evaluation

An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of...

1 affected package

dnsdist

Package 18.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-27853

Medium priority
Needs evaluation

An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet...

1 affected package

dnsdist

Package 18.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-24030

Medium priority
Needs evaluation

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available...

1 affected package

dnsdist

Package 18.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-24029

Medium priority
Needs evaluation

When the early_acl_drop (earlyACLDrop in Lua) option is disabled (default is enabled) on a DNS over HTTPs frontend using the nghttp2 provider, the ACL check is skipped, allowing all clients to send DoH queries regardless of the...

1 affected package

dnsdist

Package 18.04 LTS
dnsdist Needs evaluation
Show less packages

CVE-2026-24028

Medium priority
Needs evaluation

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a...

1 affected package

dnsdist

Package 18.04 LTS
dnsdist Needs evaluation
Show less packages