Search CVE reports


Toggle filters

351 – 360 of 48251 results

Status is adjusted based on your filters.


CVE-2026-3591

Medium priority
Not affected

A use-after-return vulnerability exists in the `named` server when handling DNS queries signed with SIG(0). Using a specially-crafted DNS request, an attacker may be able to cause an ACL to improperly (mis)match an IP address. In...

3 affected packages

bind9, isc-dhcp, bind9-libs

Package 16.04 LTS
bind9 Not affected
isc-dhcp Not affected
bind9-libs
Show less packages

CVE-2026-3119

Medium priority
Not affected

Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record. The affected code can only be reached if an incoming request has a valid transaction signature (TSIG) from a key...

3 affected packages

bind9, isc-dhcp, bind9-libs

Package 16.04 LTS
bind9 Not affected
isc-dhcp Not affected
bind9-libs
Show less packages

CVE-2026-3104

Medium priority
Not affected

A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through...

3 affected packages

bind9, isc-dhcp, bind9-libs

Package 16.04 LTS
bind9 Not affected
isc-dhcp Not affected
bind9-libs
Show less packages

CVE-2026-1519

Medium priority
Needs evaluation

If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where...

3 affected packages

bind9, isc-dhcp, bind9-libs

Package 16.04 LTS
bind9 Needs evaluation
isc-dhcp Not affected
bind9-libs
Show less packages

CVE-2026-33412

Medium priority
Needs evaluation

Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n) in a pattern passed to...

1 affected package

vim

Package 16.04 LTS
vim Needs evaluation
Show less packages

CVE-2026-32854

Medium priority
Needs evaluation

LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of...

6 affected packages

libvncserver, vino, x11vnc, veyon, italc, tightvnc

Package 16.04 LTS
libvncserver Needs evaluation
vino Needs evaluation
x11vnc Needs evaluation
veyon
italc Needs evaluation
tightvnc Needs evaluation
Show less packages

CVE-2026-32853

Medium priority
Needs evaluation

LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application...

6 affected packages

veyon, libvncserver, vino, x11vnc, italc, tightvnc

Package 16.04 LTS
veyon
libvncserver Needs evaluation
vino Needs evaluation
x11vnc Needs evaluation
italc Needs evaluation
tightvnc Needs evaluation
Show less packages

CVE-2026-4775

Medium priority
Needs evaluation

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an...

5 affected packages

tiff, qtwebengine-opensource-src, texmaker, gdal, neuron

Package 16.04 LTS
tiff Needs evaluation
qtwebengine-opensource-src
texmaker Not affected
gdal Needs evaluation
neuron
Show less packages

CVE-2026-33554

Low priority
Needs evaluation

ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented...

1 affected package

freeipmi

Package 16.04 LTS
freeipmi Needs evaluation
Show less packages

CVE-2025-64998

Medium priority
Needs evaluation

Exposure of session signing secret in Checkmk <2.4.0p23, <2.3.0p45 and 2.2.0 allows an administrator of a remote site with config sync enabled to hijack sessions on the central site by forging session cookies.

1 affected package

check-mk

Package 16.04 LTS
check-mk Needs evaluation
Show less packages