Search CVE reports


Toggle filters

791 – 800 of 38616 results

Status is adjusted based on your filters.


CVE-2026-34480

Medium priority
Needs evaluation

Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification...

2 affected packages

apache-log4j1.2, apache-log4j2

Package 22.04 LTS
apache-log4j1.2 Needs evaluation
apache-log4j2 Needs evaluation
Show less packages

CVE-2026-34479

Medium priority
Needs evaluation

The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such...

2 affected packages

apache-log4j1.2, apache-log4j2

Package 22.04 LTS
apache-log4j1.2 Needs evaluation
apache-log4j2 Needs evaluation
Show less packages

CVE-2026-34478

Medium priority
Needs evaluation

Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout , in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of...

2 affected packages

apache-log4j1.2, apache-log4j2

Package 22.04 LTS
apache-log4j1.2 Needs evaluation
apache-log4j2 Needs evaluation
Show less packages

CVE-2026-34477

Medium priority
Needs evaluation

The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via...

1 affected package

apache-log4j2

Package 22.04 LTS
apache-log4j2 Needs evaluation
Show less packages

CVE-2026-29043

Medium priority
Needs evaluation

HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can control an h5 file parsed by HDF5 can trigger a write-based heap buffer overflow condition in the H5T__ref_mem_setnull method. This can lead to a...

1 affected package

hdf5

Package 22.04 LTS
hdf5 Needs evaluation
Show less packages

CVE-2026-6069

Medium priority
Needs evaluation

NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output, allowing an attacker triggered out-of-bounds write when `slen` exceeds the buffer capacity.

1 affected package

nasm

Package 22.04 LTS
nasm Needs evaluation
Show less packages

CVE-2026-6068

Medium priority
Needs evaluation

NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling pointer to freed memory is stored in the global depend_file and later dereferenced, as the response-file buffer is freed before...

1 affected package

nasm

Package 22.04 LTS
nasm Needs evaluation
Show less packages

CVE-2026-6067

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm...

1 affected package

nasm

Package 22.04 LTS
nasm Needs evaluation
Show less packages

CVE-2026-5774

Medium priority

Not in release

Improper synchronization of the userTokens map in the API server in Canonical Juju 4.0.5, 3.6.20, and 2.9.56 may allow an authenticated user to possibly cause a denial of service on the server or possibly reuse a single-use...

1 affected package

juju

Package 22.04 LTS
juju Not in release
Show less packages

CVE-2026-5412

Medium priority

Not in release

In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This...

1 affected package

juju

Package 22.04 LTS
juju Not in release
Show less packages