Search CVE reports


Toggle filters

1 – 10 of 42245 results

Status is adjusted based on your filters.


CVE-2025-53864

Medium priority
Needs evaluation

Connect2id Nimbus JOSE + JWT before 10.0.2 allows a remote attacker to cause a denial of service via a deeply nested JSON object supplied in a JWT claim set, because of uncontrolled recursion. NOTE: this is independent of the Gson...

1 affected package

libgoogle-gson-java

Package 16.04 LTS
libgoogle-gson-java Needs evaluation
Show less packages

CVE-2025-53020

Medium priority
Needs evaluation

Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue.

1 affected package

apache2

Package 16.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2025-52434

Medium priority
Needs evaluation

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Tomcat when using the APR/Native connector. This was particularly noticeable with client initiated closes...

2 affected packages

apr, tomcat9

Package 16.04 LTS
apr Needs evaluation
tomcat9
Show less packages

CVE-2025-49812

Medium priority
Needs evaluation

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using...

1 affected package

apache2

Package 16.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2025-49630

Medium priority
Needs evaluation

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a...

1 affected package

apache2

Package 16.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2025-23048

Medium priority
Needs evaluation

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for...

1 affected package

apache2

Package 16.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2024-47252

Medium priority
Needs evaluation

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where...

1 affected package

apache2

Package 16.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2024-43394

Medium priority
Needs evaluation

Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache...

1 affected package

apache2

Package 16.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2024-43204

Medium priority
Needs evaluation

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify...

1 affected package

apache2

Package 16.04 LTS
apache2 Needs evaluation
Show less packages

CVE-2024-42516

Medium priority
Needs evaluation

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was...

1 affected package

apache2

Package 16.04 LTS
apache2 Needs evaluation
Show less packages