Search CVE reports


Toggle filters

651 – 660 of 39983 results

Status is adjusted based on your filters.


CVE-2026-43964

Medium priority
Needs evaluation

Postfix before 3.8.16, 3.9 before 3.9.10, and 3.10 before 3.10.9 sometimes allows a buffer over-read and process crash via an enhanced status code that lacks text after the third number.

1 affected package

postfix

Package 20.04 LTS
postfix Needs evaluation
Show less packages

CVE-2026-42798

Medium priority
Not affected

Little CMS (lcms2) 2.16 through 2.18 before 2.19 has an integer overflow in ParseCube in cmscgats.c.

1 affected package

lcms2

Package 20.04 LTS
lcms2 Not affected
Show less packages

CVE-2026-39402

Medium priority
Needs evaluation

lxc is a Linux container runtime. In the setuid helper lxc-user-nic, the delete path contains a logic flaw in the find_line() function that allows an unprivileged user to delete OVS-attached network interfaces belonging to other...

1 affected package

lxc

Package 20.04 LTS
lxc Needs evaluation
Show less packages

CVE-2026-34059

Low priority
Needs evaluation

Buffer Over-read vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 20.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2026-34032

Low priority
Needs evaluation

Improper Null Termination, Out-of-bounds Read vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 20.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2026-33857

Low priority
Needs evaluation

Out-of-bounds Read vulnerability in mod_proxy_ajp of Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 20.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2026-33523

Low priority
Needs evaluation

HTTP response splitting vulnerability in multiple Apache HTTP Server modules with untrusted or compromised backend servers. This issue affects Apache HTTP Server: from through 2.4.66. Users are recommended to upgrade to version...

1 affected package

apache2

Package 20.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2026-33007

Low priority
Needs evaluation

A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration. Users are recommended to upgrade...

1 affected package

apache2

Package 20.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2026-33006

Low priority
Needs evaluation

A timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker. Users are recommended to upgrade to version 2.4.67, which fixes this issue.

1 affected package

apache2

Package 20.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2026-29169

Low priority
Needs evaluation

A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs. The only known...

1 affected package

apache2

Package 20.04 LTS
apache2 Needs evaluation
Show less packages