Search CVE reports


Toggle filters

1541 – 1550 of 39983 results

Status is adjusted based on your filters.


CVE-2026-34001

Medium priority
Needs evaluation

A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit...

7 affected packages

xorg, xorg-server, xwayland, xorg-server-hwe-16.04, xorg-server-hwe-18.04...

Package 20.04 LTS
xorg Not affected
xorg-server Needs evaluation
xwayland
xorg-server-hwe-16.04
xorg-server-hwe-18.04
xorg-hwe-16.04
xorg-hwe-18.04
Show all 7 packages Show less packages

CVE-2026-34000

Medium priority
Needs evaluation

A flaw was found in the X.Org X server. This out-of-bounds read vulnerability in the XKB geometry processing, specifically within the `CheckSetGeom()` and `XkbAddGeomKeyAlias` functions, allows an attacker to read uninitialized or...

7 affected packages

xorg, xorg-server, xwayland, xorg-server-hwe-16.04, xorg-server-hwe-18.04...

Package 20.04 LTS
xorg Not affected
xorg-server Needs evaluation
xwayland
xorg-server-hwe-16.04
xorg-server-hwe-18.04
xorg-hwe-16.04
xorg-hwe-18.04
Show all 7 packages Show less packages

CVE-2026-33999

Medium priority
Needs evaluation

A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can...

7 affected packages

xorg, xorg-server, xwayland, xorg-server-hwe-16.04, xorg-server-hwe-18.04...

Package 20.04 LTS
xorg Not affected
xorg-server Needs evaluation
xwayland
xorg-server-hwe-16.04
xorg-server-hwe-18.04
xorg-hwe-16.04
xorg-hwe-18.04
Show all 7 packages Show less packages

CVE-2026-33116

Medium priority

Not in release

Loop with unreachable exit condition ('infinite loop') in .NET, .NET Framework, Visual Studio allows an unauthorized attacker to deny service over a network.

5 affected packages

dotnet6, dotnet7, dotnet8, dotnet9, dotnet10

Package 20.04 LTS
dotnet6 Not in release
dotnet7 Not in release
dotnet8 Not in release
dotnet9 Not in release
dotnet10 Not in release
Show less packages

CVE-2026-32203

Medium priority

Not in release

Stack-based buffer overflow in .NET and Visual Studio allows an unauthorized attacker to deny service over a network.

5 affected packages

dotnet6, dotnet7, dotnet8, dotnet9, dotnet10

Package 20.04 LTS
dotnet6 Not in release
dotnet7 Not in release
dotnet8 Not in release
dotnet9 Not in release
dotnet10 Not in release
Show less packages

CVE-2026-32178

Medium priority

Not in release

Improper neutralization of special elements in .NET allows an unauthorized attacker to perform spoofing over a network.

5 affected packages

dotnet6, dotnet7, dotnet8, dotnet9, dotnet10

Package 20.04 LTS
dotnet6 Not in release
dotnet7 Not in release
dotnet8 Not in release
dotnet9 Not in release
dotnet10 Not in release
Show less packages

CVE-2026-26171

Medium priority

Not in release

Uncontrolled resource consumption in .NET allows an unauthorized attacker to deny service over a network.

5 affected packages

dotnet6, dotnet7, dotnet8, dotnet9, dotnet10

Package 20.04 LTS
dotnet6 Not in release
dotnet7 Not in release
dotnet8 Not in release
dotnet9 Not in release
dotnet10 Not in release
Show less packages

CVE-2026-39979

Medium priority
Fixed

jq is a command-line JSON processor. In commits before 2f09060afab23fe9390cce7cb860b10416e1bf5f, the jv_parse_sized() API in libjq accepts a counted buffer with an explicit length parameter, but its error-handling path formats the...

1 affected package

jq

Package 20.04 LTS
jq Fixed
Show less packages

CVE-2026-39956

Medium priority
Fixed

jq is a command-line JSON processor. In commits after 69785bf77f86e2ea1b4a20ca86775916889e91c9, the _strindices builtin in jq's src/builtin.c passes its arguments directly to jv_string_indexes() without verifying they are strings,...

1 affected package

jq

Package 20.04 LTS
jq Fixed
Show less packages

CVE-2026-4786

Medium priority
Needs evaluation

Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell....

14 affected packages

jython, pypy3, python2.7, python3.4, python3.5...

Package 20.04 LTS
jython Needs evaluation
pypy3 Needs evaluation
python2.7 Needs evaluation
python3.4
python3.5
python3.6
python3.7
python3.8 Needs evaluation
python3.9 Needs evaluation
python3.10
python3.11
python3.12
python3.13
python3.14
Show all 14 packages Show less packages