Search CVE reports


Toggle filters

811 – 820 of 26567 results

Status is adjusted based on your filters.


CVE-2026-39402

Medium priority
Needs evaluation

lxc is a Linux container runtime. In the setuid helper lxc-user-nic, the delete path contains a logic flaw in the find_line() function that allows an unprivileged user to delete OVS-attached network interfaces belonging to other...

1 affected package

lxc

Package 26.04 LTS
lxc Needs evaluation
Show less packages

CVE-2026-35527

Medium priority
Needs evaluation

Incus is an open source container and virtual machine manager. In versions prior to 7.0.0, the image import flow issues an outbound HEAD request to a user-supplied URL before validating the request against project restrictions...

1 affected package

incus

Package 26.04 LTS
incus Needs evaluation
Show less packages

CVE-2026-34059

Low priority
Fixed

Buffer Over-read vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 26.04 LTS
apache2 Fixed
Show less packages

CVE-2026-34032

Low priority
Fixed

Improper Null Termination, Out-of-bounds Read vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 26.04 LTS
apache2 Fixed
Show less packages

CVE-2026-33857

Low priority
Fixed

Out-of-bounds Read vulnerability in mod_proxy_ajp of Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

1 affected package

apache2

Package 26.04 LTS
apache2 Fixed
Show less packages

CVE-2026-33523

Low priority
Fixed

HTTP response splitting vulnerability in multiple Apache HTTP Server modules with untrusted or compromised backend servers. This issue affects Apache HTTP Server: from through 2.4.66. Users are recommended to upgrade to version...

1 affected package

apache2

Package 26.04 LTS
apache2 Fixed
Show less packages

CVE-2026-33007

Low priority
Fixed

A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration. Users are recommended to upgrade...

1 affected package

apache2

Package 26.04 LTS
apache2 Fixed
Show less packages

CVE-2026-33006

Low priority
Fixed

A timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker. Users are recommended to upgrade to version 2.4.67, which fixes this issue.

1 affected package

apache2

Package 26.04 LTS
apache2 Fixed
Show less packages

CVE-2026-29169

Low priority
Fixed

A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs. The only known...

1 affected package

apache2

Package 26.04 LTS
apache2 Fixed
Show less packages

CVE-2026-29168

Low priority
Fixed

Allocation of Resources Without Limits or Throttling vulnerability in Apache HTTP Server's  mod_md via OCSP response data. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.66. Users are recommended to upgrade to...

1 affected package

apache2

Package 26.04 LTS
apache2 Fixed
Show less packages