Search CVE reports


Toggle filters

91 – 100 of 33799 results

Status is adjusted based on your filters.


CVE-2026-29043

Medium priority
Needs evaluation

HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can control an h5 file parsed by HDF5 can trigger a write-based heap buffer overflow condition in the H5T__ref_mem_setnull method. This can lead to a...

1 affected package

hdf5

Package 24.04 LTS
hdf5 Needs evaluation
Show less packages

CVE-2026-6069

Medium priority
Needs evaluation

NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output, allowing an attacker triggered out-of-bounds write when `slen` exceeds the buffer capacity.

1 affected package

nasm

Package 24.04 LTS
nasm Needs evaluation
Show less packages

CVE-2026-6067

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm...

1 affected package

nasm

Package 24.04 LTS
nasm Needs evaluation
Show less packages

CVE-2026-5774

Medium priority

Not in release

Improper synchronization of the userTokens map in the API server in Canonical Juju 4.0.5, 3.6.20, and 2.9.56 may allow an authenticated user to possibly cause a denial of service on the server or possibly reuse a single-use...

1 affected package

juju

Package 24.04 LTS
juju Not in release
Show less packages

CVE-2026-5412

Medium priority

Not in release

In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This...

1 affected package

juju

Package 24.04 LTS
juju Not in release
Show less packages

CVE-2026-33551

Medium priority
Needs evaluation

An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2...

1 affected package

keystone

Package 24.04 LTS
keystone Needs evaluation
Show less packages

CVE-2026-6042

Medium priority
Needs evaluation

A security flaw has been discovered in musl libc up to 1.2.6. Affected is the function iconv of the file src/locale/iconv.c of the component GB18030 4-byte Decoder. Performing a manipulation results in inefficient algorithmic...

1 affected package

musl

Package 24.04 LTS
musl Needs evaluation
Show less packages

CVE-2026-5507

Medium priority
Needs evaluation

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5503

Medium priority
Needs evaluation

In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally even when TLSX_Find returned NULL. This caused TLSX_UseSNI to attach the attacker-controlled publicName to the shared WOLFSSL_CTX when no inner SNI...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5501

Medium priority
Needs evaluation

wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is...

1 affected package

wolfssl

Package 24.04 LTS
wolfssl Needs evaluation
Show less packages