Search CVE reports
21 – 30 of 47232 results
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php
1 affected package
dolibarr
| Package | 16.04 LTS |
|---|---|
| dolibarr | Needs evaluation |
Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources...
1 affected package
grafana
| Package | 16.04 LTS |
|---|---|
| grafana | Needs evaluation |
[Insecure default configuration leads to local man-in-the-middle attacks on Windows]
1 affected package
libssh
| Package | 16.04 LTS |
|---|---|
| libssh | Not affected |
Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length...
1 affected package
redir
| Package | 16.04 LTS |
|---|---|
| redir | Needs evaluation |
ClamAV ClamBC bytecode interpreter contains a vulnerability in function name processing that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to...
2 affected packages
clamav, libclamunrar
| Package | 16.04 LTS |
|---|---|
| clamav | Vulnerable |
| libclamunrar | Vulnerable |
DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functionality that allows attackers to identify valid user accounts. Attackers can submit different usernames to the password reset endpoint...
1 affected package
dokuwiki
| Package | 16.04 LTS |
|---|---|
| dokuwiki | Needs evaluation |
crash via INITIAL packet for the NEW_TOKEN format
1 affected package
haproxy
| Package | 16.04 LTS |
|---|---|
| haproxy | Not affected |
crash in parsing frame type
1 affected package
haproxy
| Package | 16.04 LTS |
|---|---|
| haproxy | Not affected |
Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable...
1 affected package
intel-microcode
| Package | 16.04 LTS |
|---|---|
| intel-microcode | Vulnerable |
Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading Style Sheets (CSS) injection, e.g., because comments are mishandled.
1 affected package
roundcube
| Package | 16.04 LTS |
|---|---|
| roundcube | Needs evaluation |