Search CVE reports
211 – 220 of 32182 results
Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL...
8 affected packages
postgresql-18, postgresql-17, postgresql-16, postgresql-14, postgresql-12...
| Package | 24.04 LTS |
|---|---|
| postgresql-18 | Not in release |
| postgresql-17 | Not in release |
| postgresql-16 | Needs evaluation |
| postgresql-14 | Not in release |
| postgresql-12 | Not in release |
| postgresql-10 | Not in release |
| postgresql-9.5 | Not in release |
| postgresql-9.3 | Not in release |
Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed...
8 affected packages
postgresql-18, postgresql-17, postgresql-16, postgresql-14, postgresql-12...
| Package | 24.04 LTS |
|---|---|
| postgresql-18 | Not in release |
| postgresql-17 | Not in release |
| postgresql-16 | Needs evaluation |
| postgresql-14 | Not in release |
| postgresql-12 | Not in release |
| postgresql-10 | Not in release |
| postgresql-9.5 | Not in release |
| postgresql-9.3 | Not in release |
Not in release
Public dashboards with annotations enabled did not limit their annotation timerange to the locked timerange of the public dashboard. This means one could read the entire history of annotations visible on the specific dashboard,...
1 affected package
grafana
| Package | 24.04 LTS |
|---|---|
| grafana | Not in release |
Not in release
Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources...
1 affected package
grafana
| Package | 24.04 LTS |
|---|---|
| grafana | Not in release |
Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of...
1 affected package
node-markdown-it
| Package | 24.04 LTS |
|---|---|
| node-markdown-it | Needs evaluation |
### Summary The `arrayLimit` option in qs does not enforce limits for comma-separated values when `comma: true` is enabled, allowing attackers to cause denial-of-service via memory exhaustion. This is a bypass of the array limit...
1 affected package
node-qs
| Package | 24.04 LTS |
|---|---|
| node-qs | Needs evaluation |
crash via INITIAL packet for the NEW_TOKEN format
1 affected package
haproxy
| Package | 24.04 LTS |
|---|---|
| haproxy | Not affected |
crash in parsing frame type
1 affected package
haproxy
| Package | 24.04 LTS |
|---|---|
| haproxy | Not affected |
Not in release
Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted...
1 affected package
keras
| Package | 24.04 LTS |
|---|---|
| keras | Not in release |
A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar...
1 affected package
busybox
| Package | 24.04 LTS |
|---|---|
| busybox | Needs evaluation |