Search CVE reports
31 – 40 of 31992 results
Not in release
Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted...
1 affected package
keras
| Package | 24.04 LTS |
|---|---|
| keras | Not in release |
[Denial of Service due to malformed SFTP message]
1 affected package
libssh
| Package | 24.04 LTS |
|---|---|
| libssh | Needs evaluation |
[Denial of Service via inefficient regular expression processing]
1 affected package
libssh
| Package | 24.04 LTS |
|---|---|
| libssh | Needs evaluation |
[Buffer underflow in ssh_get_hexa() on invalid input]
1 affected package
libssh
| Package | 24.04 LTS |
|---|---|
| libssh | Needs evaluation |
[Denial of Service via improper configuration file handling]
1 affected package
libssh
| Package | 24.04 LTS |
|---|---|
| libssh | Needs evaluation |
[Improper sanitation of paths received from SCP servers]
1 affected package
libssh
| Package | 24.04 LTS |
|---|---|
| libssh | Needs evaluation |
ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data...
1 affected package
node-ajv
| Package | 24.04 LTS |
|---|---|
| node-ajv | Needs evaluation |
Not in release
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php
1 affected package
dolibarr
| Package | 24.04 LTS |
|---|---|
| dolibarr | Not in release |
Not in release
Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources...
1 affected package
grafana
| Package | 24.04 LTS |
|---|---|
| grafana | Not in release |
WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
1 affected package
libwww-oauth-perl
| Package | 24.04 LTS |
|---|---|
| libwww-oauth-perl | Needs evaluation |