Search CVE reports
1 – 10 of 26471 results
CVE-2024-48241
Medium priorityAn issue in radare2 v5.8.0 through v5.9.4 allows a local attacker to cause a denial of service via the __bf_div function.
1 affected packages
radare2
Package | 20.04 LTS |
---|---|
radare2 | Needs evaluation |
CVE-2024-3935
Medium priorityIn Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping,...
1 affected packages
mosquitto
Package | 20.04 LTS |
---|---|
mosquitto | Needs evaluation |
CVE-2024-10525
Medium priorityIn Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe...
1 affected packages
mosquitto
Package | 20.04 LTS |
---|---|
mosquitto | Needs evaluation |
CVE-2024-46956
Medium priority[PostScript interpreter - fix buffer length check]
1 affected packages
ghostscript
Package | 20.04 LTS |
---|---|
ghostscript | Needs evaluation |
CVE-2024-46955
Medium priority[PS interpreter - check Indexed colour space index]
1 affected packages
ghostscript
Package | 20.04 LTS |
---|---|
ghostscript | Needs evaluation |
CVE-2024-46954
Medium priority[Fix decode_utf8 to forbid overlong encodings]
1 affected packages
ghostscript
Package | 20.04 LTS |
---|---|
ghostscript | Needs evaluation |
CVE-2024-46953
Medium priority[Check for overflow validating format string]
1 affected packages
ghostscript
Package | 20.04 LTS |
---|---|
ghostscript | Needs evaluation |
CVE-2024-46952
Medium priority[PDF interpreter - sanitise W array values in Xref streams]
1 affected packages
ghostscript
Package | 20.04 LTS |
---|---|
ghostscript | Needs evaluation |
CVE-2024-46951
Medium priority[PS interpreter - check the type of the Pattern Implementation]
1 affected packages
ghostscript
Package | 20.04 LTS |
---|---|
ghostscript | Needs evaluation |
CVE-2024-48138
Medium priorityA remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template.
1 affected packages
pluxml
Package | 20.04 LTS |
---|---|
pluxml | Needs evaluation |