Search CVE reports


Toggle filters

111 – 120 of 366 results


CVE-2020-13934

Medium priority

Some fixes available 1 of 4

An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an...

4 affected packages

tomcat8, tomcat9, tomcat6, tomcat7

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tomcat8 Not in release Not in release Not in release Vulnerable
tomcat9 Not affected Not affected Fixed Vulnerable
tomcat6 Not in release Not in release Not in release Not in release
tomcat7 Not in release Not in release Not in release Not affected
Show less packages

CVE-2020-15503

Low priority

Some fixes available 2 of 66

LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs...

8 affected packages

kodi, libraw, rawtherapee, dcraw, exactimage...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
kodi Needs evaluation Needs evaluation Ignored Ignored
libraw Not affected Not affected Fixed Fixed
rawtherapee Needs evaluation Needs evaluation Ignored Ignored
dcraw Needs evaluation Needs evaluation Ignored Ignored
exactimage Needs evaluation Needs evaluation Ignored Ignored
ufraw Not in release Not in release Not in release Ignored
xbmc Not in release Not in release Not in release Not in release
darktable Needs evaluation Needs evaluation Ignored Ignored
Show all 8 packages Show less packages

CVE-2020-15365

Medium priority
Needs evaluation

LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.

8 affected packages

xbmc, kodi, darktable, libraw, ufraw...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
xbmc Not in release Not in release Not in release Not in release
kodi Needs evaluation Needs evaluation Ignored Ignored
darktable Needs evaluation Needs evaluation Ignored Ignored
libraw Not affected Not affected Not affected Not affected
ufraw Not in release Not in release Not in release Ignored
dcraw Needs evaluation Needs evaluation Ignored Ignored
exactimage Needs evaluation Needs evaluation Ignored Ignored
rawtherapee Needs evaluation Needs evaluation Ignored Ignored
Show all 8 packages Show less packages

CVE-2020-11996

Medium priority

Some fixes available 1 of 4

A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were...

2 affected packages

tomcat9, tomcat8

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tomcat9 Not affected Not affected Fixed Vulnerable
tomcat8 Not in release Not in release Not in release Vulnerable
Show less packages

CVE-2020-9484

Low priority

Some fixes available 7 of 8

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured...

3 affected packages

tomcat7, tomcat8, tomcat9

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tomcat7 Not in release Not in release Not in release Fixed
tomcat8 Not in release Not in release Not in release Fixed
tomcat9 Not affected Not affected Fixed Fixed
Show less packages

CVE-2020-10931

Medium priority
Not affected

Memcached 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted binary protocol header to try_read_command_binary in memcached.c.

1 affected package

memcached

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
memcached Not affected
Show less packages

CVE-2020-1938

Low priority
Ignored

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such...

3 affected packages

tomcat7, tomcat8, tomcat9

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tomcat7 Not in release Not in release Not in release Ignored
tomcat8 Not in release Not in release Not in release Ignored
tomcat9 Not affected Not affected Not affected Ignored
Show less packages

CVE-2020-1935

Low priority

Some fixes available 1 of 7

In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility...

3 affected packages

tomcat9, tomcat7, tomcat8

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tomcat9 Not affected Not affected Not affected Vulnerable
tomcat7 Not in release Not in release Not in release Vulnerable
tomcat8 Not in release Not in release Not in release Vulnerable
Show less packages

CVE-2019-17569

Low priority
Not affected

The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading...

3 affected packages

tomcat7, tomcat8, tomcat9

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tomcat7 Not affected
tomcat8 Not affected
tomcat9 Not affected
Show less packages

CVE-2016-9928

Medium priority

Some fixes available 1 of 5

MCabber before 1.0.4 is vulnerable to roster push attacks, which allows remote attackers to intercept communications, or add themselves as an entity on a 3rd party's roster as another user, which will also garner associated...

1 affected package

mcabber

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
mcabber Not affected Not affected
Show less packages