⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2025-53331
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 days, 21 hours ago
WordPress RSS Digest plugin <= 1.5 - Cross Site Request Forgery (CSRF) Vulnerability

Cross-Site Request Forgery (CSRF) vulnerability in samcharrington RSS Digest allows Stored XSS. This issue affects RSS Digest: from n/a through 1.5.

rss-digest
=<1.5

pkgs.matcha-rss-digest.x86_64-linux

Daily digest generator from a list of RSS feeds

pkgs.matcha-rss-digest.aarch64-linux

Daily digest generator from a list of RSS feeds

pkgs.matcha-rss-digest.x86_64-darwin

Daily digest generator from a list of RSS feeds

pkgs.matcha-rss-digest.aarch64-darwin

Daily digest generator from a list of RSS feeds
Notify package maintainers: 1
CVE-2025-53200
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 2 days, 21 hours ago
WordPress ChatBot plugin <= 6.7.3 - Broken Access Control Vulnerability

Missing Authorization vulnerability in QuantumCloud ChatBot allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ChatBot: from n/a through 6.7.3.

chatbot
=<6.7.3

pkgs.gnomeExtensions.penguin-ai-chatbot

A GNOME Shell extension that provides a chatbot interface using various LLM providers, including Anthropic, OpenAI, Gemini, and OpenRouter. Features include multiple provider support, customizable models, chat history, customizable appearance, a keyboard shortcut, and copy-to-clipboard functionality.
  • nixos-24.11 15
    • nixpkgs-24.11-darwin 15
    • nixos-24.11-small 15
  • nixos-unstable 22
    • nixos-unstable-small 22
    • nixpkgs-unstable 22

pkgs.gnomeExtensions.penguin-ai-chatbot.x86_64-linux

A GNOME Shell extension that uses openrouter.ai services - a platform/marketplace that offers APIs to talk to LLMs. Some of these APIs are free to use, including the one used by default in the extension: Llama 3.1 8B.

pkgs.gnomeExtensions.penguin-ai-chatbot.aarch64-linux

A GNOME Shell extension that uses openrouter.ai services - a platform/marketplace that offers APIs to talk to LLMs. Some of these APIs are free to use, including the one used by default in the extension: Llama 3.1 8B.
Notify package maintainers: 1
CVE-2025-52826
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 days, 21 hours ago
WordPress Sala theme <= 1.1.3 - PHP Object Injection Vulnerability

Deserialization of Untrusted Data vulnerability in uxper Sala allows Object Injection. This issue affects Sala: from n/a through 1.1.3.

sala
=<1.1.3

pkgs.python311Packages.datasalad

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python312Packages.datasalad

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python313Packages.datasalad

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python311Packages.datasalad.x86_64-linux

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python312Packages.datasalad.x86_64-linux

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python311Packages.datasalad.aarch64-linux

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python311Packages.datasalad.x86_64-darwin

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python312Packages.datasalad.aarch64-linux

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python312Packages.datasalad.x86_64-darwin

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python311Packages.datasalad.aarch64-darwin

Pure-Python library with a collection of utilities for working with Git and git-annex

pkgs.python312Packages.datasalad.aarch64-darwin

Pure-Python library with a collection of utilities for working with Git and git-annex
Notify package maintainers: 2
CVE-2024-6174
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 days, 13 hours ago by @Erethon Activity log
  • Created automatic suggestion
  • @Erethon removed
    136 packages
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.1
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
    • pkgs.cloud-init 24.2
When a non-x86 platform is detected, cloud-init grants root access …

When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.

cloud-init
<25.1.3

pkgs.cloud-init.x86_64-linux

Provides configuration and customization of cloud instance

pkgs.cloud-init.aarch64-linux

Provides configuration and customization of cloud instance
Notify package maintainers: 2
CVE-2024-11584
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 3 days, 21 hours ago
cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with …

cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could trigger hotplug-hook commands.

cloud-init
<25.1.3

pkgs.cloud-init

Provides configuration and customization of cloud instance

pkgs.cloud-init.x86_64-linux

Provides configuration and customization of cloud instance

pkgs.cloud-init.aarch64-linux

Provides configuration and customization of cloud instance
Notify package maintainers: 2
CVE-2024-6126
3.2 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 3 days, 21 hours ago
Cockpit: authenticated user can kill any process when enabling pam_env's user_readenv option

A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.

cockpit
*

pkgs.cockpit

Web-based graphical interface for servers

pkgs.cockpit.x86_64-linux

Web-based graphical interface for servers

pkgs.cockpit.aarch64-linux

Web-based graphical interface for servers

pkgs.texlivePackages.tlcockpit

A GUI frontend to TeX Live Manager (tlmgr)

pkgs.texlivePackages.tlcockpit.x86_64-linux

A GUI frontend to TeX Live Manager (tlmgr)
Notify package maintainers: 1
CVE-2025-5416
2.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 week ago
Keycloak-core: keycloak environment information

A vulnerability has been identified in Keycloak that could lead to unauthorized information disclosure. While it requires an already authenticated user, the /admin/serverinfo endpoint can inadvertently provide sensitive environment information.

keycloak

pkgs.keycloak.x86_64-linux

Identity and access management for modern applications and services

pkgs.keycloak.aarch64-linux

Identity and access management for modern applications and services

pkgs.python313Packages.python-keycloak

Provides access to the Keycloak API

pkgs.python311Packages.python-keycloak.x86_64-linux

Provides access to the Keycloak API

pkgs.python312Packages.python-keycloak.x86_64-linux

Provides access to the Keycloak API

pkgs.python311Packages.python-keycloak.aarch64-linux

Provides access to the Keycloak API

pkgs.python311Packages.python-keycloak.x86_64-darwin

Provides access to the Keycloak API

pkgs.python312Packages.python-keycloak.aarch64-linux

Provides access to the Keycloak API

pkgs.python312Packages.python-keycloak.x86_64-darwin

Provides access to the Keycloak API

pkgs.python311Packages.python-keycloak.aarch64-darwin

Provides access to the Keycloak API

pkgs.python312Packages.python-keycloak.aarch64-darwin

Provides access to the Keycloak API
Notify package maintainers: 3
CVE-2025-6019
7.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 3 days ago
Libblockdev: lpe from allow_active to root in libblockdev via udisks

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

libblockdev

pkgs.libblockdev.x86_64-linux

Library for manipulating block devices

pkgs.libblockdev.aarch64-linux

Library for manipulating block devices
Notify package maintainers: 1
CVE-2025-49178
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 week, 5 days ago
Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: unprocessed client request due to bytes to ignore

A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service.

tigervnc
xorg-x11-server
xorg-x11-server-Xwayland
Notify package maintainers: 1
CVE-2023-6258
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 5 days ago
Pkcs11-provider: side-channel proofing pkcs#1 1.5 paths

A security vulnerability has been identified in the pkcs11-provider, which is associated with Public-Key Cryptography Standards (PKCS#11). If exploited successfully, this vulnerability could result in a Bleichenbacher-like security flaw, potentially enabling a side-channel attack on PKCS#1 1.5 decryption.

pkcs11-provider

pkgs.pkcs11-provider

OpenSSL 3.x provider to access hardware or software tokens using the PKCS#11 Cryptographic Token Interface

pkgs.pkcs11-provider.x86_64-linux

OpenSSL 3.x provider to access hardware or software tokens using the PKCS#11 Cryptographic Token Interface

pkgs.pkcs11-provider.aarch64-linux

An OpenSSL 3.x provider to access hardware or software tokens using the PKCS#11 Cryptographic Token Interface

pkgs.pkcs11-provider.x86_64-darwin

An OpenSSL 3.x provider to access hardware or software tokens using the PKCS#11 Cryptographic Token Interface

pkgs.pkcs11-provider.aarch64-darwin

An OpenSSL 3.x provider to access hardware or software tokens using the PKCS#11 Cryptographic Token Interface
Notify package maintainers: 1