Search CVE reports


Toggle filters

21 – 30 of 47570 results

Status is adjusted based on your filters.


CVE-2026-24352

Medium priority
Needs evaluation

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack...

1 affected package

pluxml

Package 16.04 LTS
pluxml Needs evaluation
Show less packages

CVE-2026-24351

Medium priority
Needs evaluation

PluXml CMS is vulnerable to Stored XSS in Static Pages editing functionality. Attacker with editing privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. The vendor...

1 affected package

pluxml

Package 16.04 LTS
pluxml Needs evaluation
Show less packages

CVE-2026-24350

Medium priority
Needs evaluation

PluXml CMS is vulnerable to Stored XSS in file uploading functionality. An authenticated attacker can upload an SVG file containing a malicious payload, which will be executed when a victim clicks the link associated with the...

1 affected package

pluxml

Package 16.04 LTS
pluxml Needs evaluation
Show less packages

CVE-2026-23865

Medium priority
Needs evaluation

An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable...

1 affected package

freetype

Package 16.04 LTS
freetype Needs evaluation
Show less packages

CVE-2025-10990

Medium priority
Vulnerable

A flaw was found in REXML. A remote attacker could exploit inefficient regular expression (regex) parsing when processing hex numeric character references (&#x...;) in XML documents. This could lead to a Regular Expression Denial...

7 affected packages

ruby2.3, ruby2.5, ruby2.7, ruby3.0, ruby3.2...

Package 16.04 LTS
ruby2.3 Vulnerable
ruby2.5
ruby2.7
ruby3.0
ruby3.2
ruby3.3
jruby Vulnerable
Show all 7 packages Show less packages

CVE-2026-3284

Medium priority
Needs evaluation

A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires...

1 affected package

vips

Package 16.04 LTS
vips Needs evaluation
Show less packages

CVE-2026-3283

Medium priority
Needs evaluation

A vulnerability has been found in libvips 8.19.0. This issue affects the function vips_extract_band_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_band leads to out-of-bounds read. The...

1 affected package

vips

Package 16.04 LTS
vips Needs evaluation
Show less packages

CVE-2026-3282

Medium priority
Needs evaluation

A flaw has been found in libvips 8.19.0. This vulnerability affects the function vips_unpremultiply_build of the file libvips/conversion/unpremultiply.c. Executing a manipulation of the argument alpha_band can lead to...

1 affected package

vips

Package 16.04 LTS
vips Needs evaluation
Show less packages

CVE-2026-3281

Medium priority
Needs evaluation

A vulnerability was detected in libvips 8.19.0. This affects the function vips_bandrank_build of the file libvips/conversion/bandrank.c. Performing a manipulation of the argument index results in heap-based buffer overflow. The...

1 affected package

vips

Package 16.04 LTS
vips Needs evaluation
Show less packages

CVE-2026-28372

Medium priority
Needs evaluation

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client...

1 affected package

inetutils

Package 16.04 LTS
inetutils Needs evaluation
Show less packages