Search CVE reports


Toggle filters

11 – 20 of 47886 results

Status is adjusted based on your filters.


CVE-2026-33174

Medium priority
Needs evaluation

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when serving files through Active Storage's proxy delivery mode, the proxy controller loads the...

1 affected package

rails

Package 16.04 LTS
rails Needs evaluation
Show less packages

CVE-2026-33173

Medium priority
Needs evaluation

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `DirectUploadsController` accepts arbitrary metadata from the client and persists it on the blob....

1 affected package

rails

Package 16.04 LTS
rails Needs evaluation
Show less packages

CVE-2026-33170

Medium priority
Needs evaluation

Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `SafeBuffer#%` does not propagate the `@html_unsafe` flag to the newly...

1 affected package

rails

Package 16.04 LTS
rails Needs evaluation
Show less packages

CVE-2026-33169

Medium priority
Needs evaluation

Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. `NumberToDelimitedConverter` uses a lookahead-based regular expression with `gsub!` to insert thousands delimiters....

1 affected package

rails

Package 16.04 LTS
rails Needs evaluation
Show less packages

CVE-2026-33168

Medium priority
Needs evaluation

Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when a blank string is used as an HTML attribute name in Action View tag helpers, the...

1 affected package

rails

Package 16.04 LTS
rails Needs evaluation
Show less packages

CVE-2026-1940

Medium priority
Needs evaluation

An incomplete fix for CVE-2024-47778 allows an out-of-bounds read in gst_wavparse_adtl_chunk() function. The patch added a size validation check lsize + 8 > size, but it does not account for the GST_ROUND_UP_2(lsize) used in the...

1 affected package

gst-plugins-bad1.0

Package 16.04 LTS
gst-plugins-bad1.0 Needs evaluation
Show less packages

CVE-2026-29111

Medium priority
Not affected

systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting,...

1 affected package

systemd

Package 16.04 LTS
systemd Not affected
Show less packages

CVE-2026-4647

Medium priority
Needs evaluation

A flaw was found in the GNU Binutils BFD library, a widely used component for handling binary files such as object files and executables. The issue occurs when processing specially crafted XCOFF object files, where a relocation...

1 affected package

binutils

Package 16.04 LTS
binutils Needs evaluation
Show less packages

CVE-2026-25075

Medium priority
Needs evaluation

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid...

1 affected package

strongswan

Package 16.04 LTS
strongswan Needs evaluation
Show less packages

CVE-2026-23555

Medium priority
Needs evaluation

Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced...

1 affected package

xen

Package 16.04 LTS
xen Needs evaluation
Show less packages