Search CVE reports


Toggle filters

191 – 200 of 35883 results

Status is adjusted based on your filters.


CVE-2026-23553

Medium priority
Needs evaluation

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly...

1 affected package

xen

Package 22.04 LTS
xen Needs evaluation
Show less packages

CVE-2025-58150

Medium priority
Needs evaluation

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the...

1 affected package

xen

Package 22.04 LTS
xen Needs evaluation
Show less packages

CVE-2026-24765

Medium priority
Needs evaluation

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution....

1 affected package

phpunit

Package 22.04 LTS
phpunit Needs evaluation
Show less packages

CVE-2026-24747

Medium priority
Needs evaluation

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with...

1 affected package

pytorch

Package 22.04 LTS
pytorch Needs evaluation
Show less packages

CVE-2026-24688

Medium priority
Needs evaluation

pypdf is a free and open-source pure-python PDF library. An attacker who uses an infinite loop vulnerability that is present in versions prior to 6.6.2 can craft a PDF which leads to an infinite loop. This requires accessing the...

2 affected packages

pypdf, pypdf2

Package 22.04 LTS
pypdf Not in release
pypdf2 Needs evaluation
Show less packages

CVE-2026-24883

Medium priority
Not affected

In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).

1 affected package

gnupg2

Package 22.04 LTS
gnupg2 Not affected
Show less packages

CVE-2026-24882

Medium priority
Not affected

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

1 affected package

gnupg2

Package 22.04 LTS
gnupg2 Not affected
Show less packages

CVE-2026-24881

Medium priority
Not affected

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged...

1 affected package

gnupg2

Package 22.04 LTS
gnupg2 Not affected
Show less packages

CVE-2026-24116

Medium priority

Not in release

Wasmtime is a runtime for WebAssembly. Starting in version 29.0.0 and prior to version 36.0.5, 40.0.3, and 41.0.1, on x86-64 platforms with AVX, Wasmtime's compilation of the `f64.copysign` WebAssembly instruction with Cranelift...

1 affected package

rust-wasmtime

Package 22.04 LTS
rust-wasmtime Not in release
Show less packages

CVE-2026-22264

Medium priority
Needs evaluation

Suricata is a network IDS, IPS and NSM engine. Prior to version 8.0.3 and 7.0.14, an unsigned integer overflow can lead to a heap use-after-free condition when generating excessive amounts of alerts for a single packet. Versions...

1 affected package

suricata

Package 22.04 LTS
suricata Needs evaluation
Show less packages