Search CVE reports


Toggle filters

91 – 100 of 39594 results

Status is adjusted based on your filters.


CVE-2025-49643

Medium priority
Needs evaluation

An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.

1 affected package

zabbix

Package 18.04 LTS
zabbix Needs evaluation
Show less packages

CVE-2025-27232

Medium priority
Needs evaluation

An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.

1 affected package

zabbix

Package 18.04 LTS
zabbix Needs evaluation
Show less packages

CVE-2025-12106

Medium priority
Not affected

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses

1 affected package

openvpn

Package 18.04 LTS
openvpn Not affected
Show less packages

CVE-2025-32898

Medium priority
Needs evaluation

[Unknown description]

2 affected packages

gnome-shell-extension-gsconnect, kdeconnect

Package 18.04 LTS
gnome-shell-extension-gsconnect
kdeconnect Needs evaluation
Show less packages

CVE-2025-66424

Medium priority
Needs evaluation

Tryton trytond 6.0 before 7.6.11 does not enforce access rights for data export. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.

1 affected package

tryton-server

Package 18.04 LTS
tryton-server Needs evaluation
Show less packages

CVE-2025-66423

Medium priority
Needs evaluation

Tryton trytond 6.0 before 7.6.11 does not enforce access rights for the route of the HTML editor. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.

1 affected package

tryton-server

Package 18.04 LTS
tryton-server Needs evaluation
Show less packages

CVE-2025-66422

Medium priority
Needs evaluation

Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.

1 affected package

tryton-server

Package 18.04 LTS
tryton-server Needs evaluation
Show less packages

CVE-2025-66221

Medium priority
Needs evaluation

Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.4, Werkzeug's safe_join function allows path segments with Windows device names. On Windows, there are special device names such as CON, AUX, etc that...

1 affected package

python-werkzeug

Package 18.04 LTS
python-werkzeug Needs evaluation
Show less packages

CVE-2025-66034

Medium priority
Needs evaluation

fontTools is a library for manipulating fonts, written in Python. In versions from 4.33.0 to before 4.60.2, the fonttools varLib (or python3 -m fontTools.varLib) script has an arbitrary file write vulnerability that leads to...

1 affected package

fonttools

Package 18.04 LTS
fonttools Needs evaluation
Show less packages

CVE-2025-12638

Medium priority
Needs evaluation

Keras version 3.11.3 is affected by a path traversal vulnerability in the keras.utils.get_file() function when extracting tar archives. The vulnerability arises because the function uses Python's tarfile.extractall() method...

1 affected package

keras

Package 18.04 LTS
keras Needs evaluation
Show less packages