Search CVE reports


Toggle filters

941 – 950 of 34287 results

Status is adjusted based on your filters.


CVE-2026-34827

Medium priority
Ignored

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition:...

1 affected package

ruby-rack

Package 24.04 LTS
ruby-rack Ignored
Show less packages

CVE-2026-34601

Medium priority
Needs evaluation

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom...

1 affected package

node-xmldom

Package 24.04 LTS
node-xmldom Needs evaluation
Show less packages

CVE-2026-34591

Medium priority
Needs evaluation

Poetry is a dependency manager for Python. From version 1.4.0 to before version 2.3.3, a crafted wheel can contain ../ paths that Poetry writes to disk without containment checks, allowing arbitrary file write with the privileges...

1 affected package

poetry

Package 24.04 LTS
poetry Needs evaluation
Show less packages

CVE-2026-32762

Medium priority
Not affected

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21 and 3.2.0 to before 3.2.6, Rack::Utils.forwarded_values parses the RFC 7239 Forwarded header by splitting on semicolons before handling...

1 affected package

ruby-rack

Package 24.04 LTS
ruby-rack Not affected
Show less packages

CVE-2026-26962

Medium priority
Fixed

Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack...

1 affected package

ruby-rack

Package 24.04 LTS
ruby-rack Fixed
Show less packages

CVE-2026-35388

Medium priority
Needs evaluation

OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35387

Medium priority
Needs evaluation

OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35386

Medium priority
Needs evaluation

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default...

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-35385

Medium priority
Needs evaluation

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS
openssh Needs evaluation
openssh-ssh1 Ignored
Show less packages

CVE-2026-34877

Medium priority
Needs evaluation

An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce...

1 affected package

mbedtls

Package 24.04 LTS
mbedtls Needs evaluation
Show less packages