Search CVE reports


Toggle filters

811 – 820 of 39749 results

Status is adjusted based on your filters.


CVE-2026-39402

Medium priority
Needs evaluation

lxc is a Linux container runtime. In the setuid helper lxc-user-nic, the delete path contains a logic flaw in the find_line() function that allows an unprivileged user to delete OVS-attached network interfaces belonging to other...

1 affected package

lxc

Package 22.04 LTS
lxc Needs evaluation
Show less packages

CVE-2026-35527

Medium priority

Not in release

Incus is an open source container and virtual machine manager. In versions prior to 7.0.0, the image import flow issues an outbound HEAD request to a user-supplied URL before validating the request against project restrictions...

1 affected package

incus

Package 22.04 LTS
incus Not in release
Show less packages

CVE-2026-34059

Low priority
Fixed

Buffer Over-read vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 22.04 LTS
apache2 Fixed
Show less packages

CVE-2026-34032

Low priority
Fixed

Improper Null Termination, Out-of-bounds Read vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 22.04 LTS
apache2 Fixed
Show less packages

CVE-2026-33857

Low priority
Fixed

Out-of-bounds Read vulnerability in mod_proxy_ajp of Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 22.04 LTS
apache2 Fixed
Show less packages

CVE-2026-33523

Low priority
Fixed

HTTP response splitting vulnerability in multiple Apache HTTP Server modules with untrusted or compromised backend servers. This issue affects Apache HTTP Server: from through 2.4.66. Users are recommended to upgrade to version...

1 affected package

apache2

Package 22.04 LTS
apache2 Fixed
Show less packages

CVE-2026-33007

Low priority
Fixed

A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration. Users are recommended to upgrade...

1 affected package

apache2

Package 22.04 LTS
apache2 Fixed
Show less packages

CVE-2026-33006

Low priority
Fixed

A timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker. Users are recommended to upgrade to version 2.4.67, which fixes this issue.

1 affected package

apache2

Package 22.04 LTS
apache2 Fixed
Show less packages

CVE-2026-29169

Low priority
Fixed

A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs. The only known...

1 affected package

apache2

Package 22.04 LTS
apache2 Fixed
Show less packages

CVE-2026-29168

Low priority
Fixed

Allocation of Resources Without Limits or Throttling vulnerability in Apache HTTP Server's  mod_md via OCSP response data. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.66. Users are recommended to upgrade to...

1 affected package

apache2

Package 22.04 LTS
apache2 Fixed
Show less packages