⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2025-53512
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 9 hours ago
Sensitive log retrieval in Juju

The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.

juju
<2.9.52
<3.6.8

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

pkgs.juju.x86_64-linux

Open source modelling tool for operating software in the cloud

pkgs.juju.aarch64-linux

Open source modelling tool for operating software in the cloud

pkgs.juju.x86_64-darwin

Open source modelling tool for operating software in the cloud

pkgs.juju.aarch64-darwin

Open source modelling tool for operating software in the cloud

pkgs.jujutsu.x86_64-linux

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.aarch64-linux

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.x86_64-darwin

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.aarch64-darwin

Git-compatible DVCS that is both simple and powerful

pkgs.jujuutils.x86_64-linux

Utilities around FireWire devices connected to a Linux computer

pkgs.jujuutils.aarch64-linux

Utilities around FireWire devices connected to a Linux computer
Package maintainers: 5
CVE-2025-0928
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 9 hours ago
Arbitrary executable upload via authenticated endpoint

In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.

juju
<2.9.52
<3.6.8

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

pkgs.juju.x86_64-linux

Open source modelling tool for operating software in the cloud

pkgs.juju.aarch64-linux

Open source modelling tool for operating software in the cloud

pkgs.juju.x86_64-darwin

Open source modelling tool for operating software in the cloud

pkgs.juju.aarch64-darwin

Open source modelling tool for operating software in the cloud

pkgs.jujutsu.x86_64-linux

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.aarch64-linux

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.x86_64-darwin

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.aarch64-darwin

Git-compatible DVCS that is both simple and powerful

pkgs.jujuutils.x86_64-linux

Utilities around FireWire devices connected to a Linux computer

pkgs.jujuutils.aarch64-linux

Utilities around FireWire devices connected to a Linux computer
Package maintainers: 5
CVE-2025-53513
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 9 hours ago
Zip slip vulnerability in Juju

The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.

juju
<2.9.52
<3.6.8

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

pkgs.juju.x86_64-linux

Open source modelling tool for operating software in the cloud

pkgs.juju.aarch64-linux

Open source modelling tool for operating software in the cloud

pkgs.juju.x86_64-darwin

Open source modelling tool for operating software in the cloud

pkgs.juju.aarch64-darwin

Open source modelling tool for operating software in the cloud

pkgs.jujutsu.x86_64-linux

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.aarch64-linux

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.x86_64-darwin

Git-compatible DVCS that is both simple and powerful

pkgs.jujutsu.aarch64-darwin

Git-compatible DVCS that is both simple and powerful

pkgs.jujuutils.x86_64-linux

Utilities around FireWire devices connected to a Linux computer

pkgs.jujuutils.aarch64-linux

Utilities around FireWire devices connected to a Linux computer
Package maintainers: 5
CVE-2024-5148
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 3 days, 9 hours ago
Gnome-remote-desktop: inadequate validation of session agents using d-bus methods may expose rdp tls certificate

A flaw was found in the gnome-remote-desktop package. The gnome-remote-desktop system daemon performs inadequate validation of session agents using D-Bus methods related to transitioning a client connection from the login screen to the user session. As a result, the system RDP TLS certificate and key can be exposed to unauthorized users. This flaw allows a malicious user on the system to take control of the RDP client connection during the login screen-to-user session transition.

gnome-remote-desktop
<46.2

pkgs.gnome-remote-desktop

GNOME Remote Desktop server

pkgs.gnome.gnome-remote-desktop

GNOME Remote Desktop server

pkgs.gnome-remote-desktop.x86_64-linux

GNOME Remote Desktop server

pkgs.gnome-remote-desktop.aarch64-linux

GNOME Remote Desktop server

pkgs.gnome.gnome-remote-desktop.x86_64-linux

GNOME Remote Desktop server

pkgs.gnome.gnome-remote-desktop.aarch64-linux

GNOME Remote Desktop server
Package maintainers: 4
CVE-2024-31080
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 3 days, 9 hours ago
Xorg-x11-server: heap buffer overread/data leakage in procxigetselectedevents

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

tigervnc
*
xorg-server
*
xorg-x11-server
*
xorg-x11-server-Xwayland
*
Package maintainers: 1
CVE-2024-31083
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 3 days, 9 hours ago
Xorg-x11-server: use-after-free in procrenderaddglyphs

A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.

tigervnc
*
xorg-x11-server
*
==21.1.12
xorg-x11-server-Xwayland
*
Package maintainers: 1
CVE-2024-31081
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 3 days, 9 hours ago
Xorg-x11-server: heap buffer overread/data leakage in procxipassivegrabdevice

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

tigervnc
*
xorg-server
==1.7.0
xorg-x11-server
*
xorg-x11-server-Xwayland
*
Package maintainers: 1
CVE-2020-25720
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 3 days, 9 hours ago
Samba: check attribute access rights for ldap adds of computers

A vulnerability was found in Samba where a delegated administrator with permission to create objects in Active Directory can write to all attributes of the newly created object, including security-sensitive attributes, even after the object's creation. This issue occurs because the administrator owns the object due to the lack of an Access Control List (ACL) at the time of creation and later being recognized as the 'creator owner.' The retained significant rights of the delegated administrator may not be well understood, potentially leading to unintended privilege escalation or security risks.

rhcos
samba
<4.17.8
samba4

pkgs.samba

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-linux

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-linux

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-darwin

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-darwin

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-linux

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-linux

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-darwin

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-linux

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.x86_64-darwin

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-darwin

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-darwin

The standard Windows interoperability suite of programs for Linux and Unix
Package maintainers: 2
CVE-2024-31082
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 3 days, 9 hours ago
Xorg-x11-server: heap buffer overread/data leakage in procappledricreatepixmap

A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

tigervnc
xorg-server
<21.1.12
xorg-x11-server
xorg-x11-server-Xwayland
Package maintainers: 1
CVE-2024-6237
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 3 days, 9 hours ago
389-ds-base: unauthenticated user can trigger a dos by sending a specific extended search request

A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.

389-ds-base
*
<2.4.5
redhat-ds:12
*
389-ds:1.4/389-ds-base
redhat-ds:11/389-ds-base
redhat-ds:12/389-ds-base

pkgs._389-ds-base.x86_64-linux

Enterprise-class Open Source LDAP server for Linux

pkgs._389-ds-base.aarch64-linux

Enterprise-class Open Source LDAP server for Linux
Package maintainers: 1