Search CVE reports
51 – 60 of 25323 results
CVE-2025-3757
Medium priorityNot in release
Versions of OpenPubkey library prior to 0.10.0 contained a vulnerability that would allow a specially crafted JWS to bypass signature verification.
1 affected package
golang-github-openpubkey-openpubkey
Package | 24.04 LTS |
---|---|
golang-github-openpubkey-openpubkey | Not in release |
CVE-2025-47278
Medium priorityIn Flask 3.1.0, the way fallback key configuration was handled resulted in the last fallback key being used for signing, rather than the current signing key. Signing is provided by the `itsdangerous` library. A list of keys can be...
1 affected package
flask
Package | 24.04 LTS |
---|---|
flask | Not affected |
CVE-2025-32917
Medium priorityNot in release
Privilege escalation in jar_signature agent plugin in Checkmk versions <2.4.0b7 (beta), <2.3.0p32, <2.2.0p42, and 2.1.0p49 (EOL) allow user with write access to JAVA_HOME/bin directory to escalate privileges.
1 affected package
check-mk
Package | 24.04 LTS |
---|---|
check-mk | Not in release |
CVE-2025-47712
Medium priority[Unknown description]
1 affected package
nbdkit
Package | 24.04 LTS |
---|---|
nbdkit | Needs evaluation |
CVE-2025-47711
Medium priority[Unknown description]
1 affected package
nbdkit
Package | 24.04 LTS |
---|---|
nbdkit | Needs evaluation |
CVE-2025-26646
Medium priorityExternal control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
4 affected packages
dotnet6, dotnet7, dotnet8, dotnet9
Package | 24.04 LTS |
---|---|
dotnet6 | Not in release |
dotnet7 | Not in release |
dotnet8 | Vulnerable |
dotnet9 | Not in release |
CVE-2025-24495
Medium priorityIncorrect initialization of resource in the branch prediction unit for some Intel(R) Core™ Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.
1 affected package
intel-microcode
Package | 24.04 LTS |
---|---|
intel-microcode | Needs evaluation |
CVE-2025-20012
Medium priorityIncorrect behavior order for some Intel(R) Core™ Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access.
1 affected package
intel-microcode
Package | 24.04 LTS |
---|---|
intel-microcode | Needs evaluation |
CVE-2024-28956
Medium priorityExposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
133 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 24.04 LTS |
---|---|
linux | Needs evaluation |
linux-allwinner-5.19 | Not in release |
linux-aws | Needs evaluation |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-6.8 | Not in release |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Needs evaluation |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.11 | Needs evaluation |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-6.8 | Not in release |
linux-azure-edge | Not in release |
linux-azure-fde | Not in release |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-fips | Not in release |
linux-azure-nvidia | Needs evaluation |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Needs evaluation |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.11 | Needs evaluation |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-6.8 | Not in release |
linux-gcp-fips | Not in release |
linux-gke | Needs evaluation |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Needs evaluation |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.11 | Needs evaluation |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-edge | Not in release |
linux-ibm | Needs evaluation |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Needs evaluation |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Not in release |
linux-lowlatency | Needs evaluation |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.11 | Needs evaluation |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lts-xenial | Not in release |
linux-nvidia | Needs evaluation |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-lowlatency | Needs evaluation |
linux-nvidia-tegra | Needs evaluation |
linux-nvidia-tegra-igx | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Not in release |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.11 | Needs evaluation |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Needs evaluation |
linux-oracle | Needs evaluation |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Not in release |
linux-oracle-6.8 | Not in release |
linux-raspi | Needs evaluation |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Needs evaluation |
linux-raspi2 | Not in release |
linux-realtime | Needs evaluation |
linux-riscv | Needs evaluation |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Not in release |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Not in release |
CVE-2024-4982
Medium priorityA directory traversal vulnerability was discovered in Pagure server. If a malicious user submits a specially cratfted git repository they could discover secrets on the server.
1 affected package
pagure
Package | 24.04 LTS |
---|---|
pagure | Needs evaluation |