Search CVE reports
111 – 120 of 33983 results
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
1 affected package
zabbix
| Package | 22.04 LTS |
|---|---|
| zabbix | Needs evaluation |
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
1 affected package
zabbix
| Package | 22.04 LTS |
|---|---|
| zabbix | Needs evaluation |
Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
1 affected package
openvpn
| Package | 22.04 LTS |
|---|---|
| openvpn | Not affected |
[Unknown description]
2 affected packages
gnome-shell-extension-gsconnect, kdeconnect
| Package | 22.04 LTS |
|---|---|
| gnome-shell-extension-gsconnect | Needs evaluation |
| kdeconnect | Needs evaluation |
Not in release
[Unknown description]
1 affected package
mariadb
| Package | 22.04 LTS |
|---|---|
| mariadb | Not in release |
Tryton trytond 6.0 before 7.6.11 does not enforce access rights for data export. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.
1 affected package
tryton-server
| Package | 22.04 LTS |
|---|---|
| tryton-server | Needs evaluation |
Tryton trytond 6.0 before 7.6.11 does not enforce access rights for the route of the HTML editor. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.
1 affected package
tryton-server
| Package | 22.04 LTS |
|---|---|
| tryton-server | Needs evaluation |
Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.
1 affected package
tryton-server
| Package | 22.04 LTS |
|---|---|
| tryton-server | Needs evaluation |
Not in release
Tryton sao (aka tryton-sao) before 7.6.11 allows XSS because it does not escape completion values. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.69.
1 affected package
tryton-sao
| Package | 22.04 LTS |
|---|---|
| tryton-sao | Not in release |
Not in release
Tryton sao (aka tryton-sao) before 7.6.9 allows XSS via an HTML attachment. This is fixed in 7.6.9, 7.4.19, 7.0.38, and 6.0.67.
1 affected package
tryton-sao
| Package | 22.04 LTS |
|---|---|
| tryton-sao | Not in release |