⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2022-3328
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Race condition in snap-confine's must_mkdir_and_open_with_perms()

Race condition in snap-confine's must_mkdir_and_open_with_perms()

snapd
<2.61.1

pkgs.snapdragon-profiler.x86_64-linux

An profiler for Android devices running Snapdragon chips
CVE-2024-0567
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Gnutls: rejects certificate chain with distributed trust

A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.

gnutls
*
<3.8.3
cockpit
odf4/cephcsi-rhel9
*
odf4/odf-cli-rhel9
*
odf4/mcg-core-rhel9
*
odf4/odf-console-rhel9
*
odf4/mcg-rhel9-operator
*
odf4/ocs-rhel9-operator
*
odf4/odf-rhel9-operator
*
odf4/odr-rhel9-operator
*
odf4/mcg-operator-bundle
*
odf4/ocs-operator-bundle
*
odf4/odf-operator-bundle
*
odf4/odf-must-gather-rhel9
*
odf4/odf-cosi-sidecar-rhel9
*
odf4/odr-hub-operator-bundle
*
odf4/ocs-client-console-rhel9
*
odf4/rook-ceph-rhel9-operator
*
odf4/ocs-client-rhel9-operator
*
openshift-logging/vector-rhel9
*
odf4/ocs-client-operator-bundle
*
odf4/ocs-metrics-exporter-rhel9
*
openshift-logging/fluentd-rhel9
*
odf4/odr-cluster-operator-bundle
*
odf4/odf-csi-addons-sidecar-rhel9
*
odf4/odf-csi-addons-rhel9-operator
*
odf4/odf-csi-addons-operator-bundle
*
odf4/odf-multicluster-console-rhel9
*
openshift-logging/eventrouter-rhel9
*
odf4/odf-multicluster-rhel9-operator
*
openshift-logging/logging-loki-rhel9
*
odf4/odf-multicluster-operator-bundle
*
openshift-logging/loki-rhel9-operator
*
openshift-logging/opa-openshift-rhel9
*
openshift-logging/elasticsearch6-rhel9
*
openshift-logging/loki-operator-bundle
*
openshift-logging/logging-curator5-rhel9
*
openshift-logging/lokistack-gateway-rhel9
*
openshift-logging/elasticsearch-proxy-rhel9
*
openshift-logging/logging-view-plugin-rhel9
*
openshift-logging/elasticsearch-rhel9-operator
*
openshift-logging/elasticsearch-operator-bundle
*
openshift-logging/cluster-logging-rhel9-operator
*
openshift-logging/log-file-metric-exporter-rhel9
*
openshift-logging/cluster-logging-operator-bundle
*

pkgs.cockpit

Web-based graphical interface for servers

pkgs.python312Packages.python3-gnutls.x86_64-linux

Python wrapper for the GnuTLS library

pkgs.python312Packages.python3-gnutls.aarch64-linux

Python wrapper for the GnuTLS library

pkgs.python312Packages.python3-gnutls.x86_64-darwin

Python wrapper for the GnuTLS library

pkgs.python312Packages.python3-gnutls.aarch64-darwin

Python wrapper for the GnuTLS library
Package maintainers: 4
CVE-2025-40908
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 2 months, 4 weeks ago
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified

YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified

YAML-LibYAML
<0.903.0

pkgs.perl538Packages.YAMLLibYAML

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML.x86_64-linux

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML.aarch64-linux

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML.x86_64-darwin

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML.aarch64-darwin

Perl YAML Serialization using XS and libyaml
CVE-2025-5054
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 4 weeks ago
Race Condition in Canonical Apport

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).

apport
<2.20.1-0ubuntu2.30+esm5
<2.33.0-0ubuntu1
<2.20.9-0ubuntu7.29+esm1
<2.32.0-0ubuntu6
<2.30.0-0ubuntu4.3
=<2.32.0
<2.28.1-0ubuntu3.6
<2.32.0-0ubuntu5.1
<2.20.11-0ubuntu27.28
<2.20.11-0ubuntu82.7
Package maintainers: 1
CVE-2024-12224 created 2 months, 4 weeks ago
idna accepts Punycode labels that do not produce any non-ASCII when decoded

Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

idna
<1.0.0

pkgs.python311Packages.idna

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna

Internationalized Domain Names in Applications (IDNA)

pkgs.python313Packages.idna

Internationalized Domain Names in Applications (IDNA)

pkgs.python311Packages.idna-ssl

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna-ssl

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python313Packages.idna-ssl

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna.x86_64-linux

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna.aarch64-linux

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna.x86_64-darwin

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna.aarch64-darwin

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna-ssl.x86_64-linux

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna-ssl.aarch64-linux

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna-ssl.x86_64-darwin

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna-ssl.aarch64-darwin

Patch ssl.match_hostname for Unicode(idna) domains support
Package maintainers: 17
CVE-2023-40550
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 3 months ago
Shim: out-of-bound read in verify_buffer_sbat()

An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.

shim
*
shim-signed
*
shim-unsigned-x64
*
shim-unsigned-aarch64
*

pkgs.libudev0-shim

Shim to preserve libudev.so.0 compatibility
  • nixos-25.05 1
    • nixpkgs-25.05-darwin 1
    • nixos-25.05-small 1
  • nixos-unstable 1
    • nixos-unstable-small 1
    • nixpkgs-unstable 1

pkgs.jellyfin-mpv-shim

Allows casting of videos to MPV via the jellyfin mobile and web app

pkgs.mpv-shim-default-shaders

Preconfigured set of MPV shaders and configurations for MPV Shim media clients

pkgs.python311Packages.shimmy

API conversion tool for popular external reinforcement learning environments

pkgs.python312Packages.shimmy

API conversion tool for popular external reinforcement learning environments

pkgs.libudev0-shim.x86_64-linux

Shim to preserve libudev.so.0 compatibility
  • nixos-unstable ???
    • nixos-unstable-small 1

pkgs.shim-unsigned.x86_64-linux

UEFI shim loader

pkgs.libudev0-shim.aarch64-linux

Shim to preserve libudev.so.0 compatibility
  • nixos-unstable ???
    • nixos-unstable-small 1

pkgs.shim-unsigned.aarch64-linux

UEFI shim loader

pkgs.rshim-user-space.x86_64-linux

user-space rshim driver for the BlueField SoC

pkgs.pantheon.elementary-print-shim

Simple shim for printing support via Contractor

pkgs.rshim-user-space.aarch64-linux

user-space rshim driver for the BlueField SoC

pkgs.python311Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python313Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.x86_64-linux

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.aarch64-linux

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.x86_64-darwin

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.aarch64-darwin

Switch frontends to Jupyter Server

pkgs.python312Packages.pytz-deprecation-shim.x86_64-linux

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.aarch64-linux

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.x86_64-darwin

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.aarch64-darwin

Shims to make deprecation of pytz easier
Package maintainers: 13
CVE-2023-40548
7.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 3 months ago
Shim: interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

shim
*
shim-signed
*
shim-unsigned-x64
*
shim-unsigned-aarch64
*

pkgs.libudev0-shim

Shim to preserve libudev.so.0 compatibility
  • nixos-25.05 1
    • nixpkgs-25.05-darwin 1
    • nixos-25.05-small 1
  • nixos-unstable 1
    • nixos-unstable-small 1
    • nixpkgs-unstable 1

pkgs.jellyfin-mpv-shim

Allows casting of videos to MPV via the jellyfin mobile and web app

pkgs.mpv-shim-default-shaders

Preconfigured set of MPV shaders and configurations for MPV Shim media clients

pkgs.python311Packages.shimmy

API conversion tool for popular external reinforcement learning environments

pkgs.python312Packages.shimmy

API conversion tool for popular external reinforcement learning environments

pkgs.libudev0-shim.x86_64-linux

Shim to preserve libudev.so.0 compatibility
  • nixos-unstable ???
    • nixos-unstable-small 1

pkgs.shim-unsigned.x86_64-linux

UEFI shim loader

pkgs.libudev0-shim.aarch64-linux

Shim to preserve libudev.so.0 compatibility
  • nixos-unstable ???
    • nixos-unstable-small 1

pkgs.shim-unsigned.aarch64-linux

UEFI shim loader

pkgs.rshim-user-space.x86_64-linux

user-space rshim driver for the BlueField SoC

pkgs.pantheon.elementary-print-shim

Simple shim for printing support via Contractor

pkgs.rshim-user-space.aarch64-linux

user-space rshim driver for the BlueField SoC

pkgs.python311Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python313Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.x86_64-linux

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.aarch64-linux

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.x86_64-darwin

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.aarch64-darwin

Switch frontends to Jupyter Server

pkgs.python312Packages.pytz-deprecation-shim.x86_64-linux

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.aarch64-linux

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.x86_64-darwin

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.aarch64-darwin

Shims to make deprecation of pytz easier
Package maintainers: 13
CVE-2025-1461
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 3 months ago
Vuetify XSS through 'eventMoreText' prop of VCalendar

Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .

vuetify
==>=2.0.0 <3.0.0

pkgs.python311Packages.ipyvuetify

Jupyter widgets based on Vuetify UI Components

pkgs.python313Packages.ipyvuetify

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.x86_64-linux

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.aarch64-linux

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.x86_64-darwin

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.aarch64-darwin

Jupyter widgets based on Vuetify UI Components
Package maintainers: 1
CVE-2025-0716
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 3 months ago
AngularJS improper sanitization in SVG '<image>' element

Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

angular
==>=0.0.0

pkgs.angular-language-server

LSP for angular completions, AOT diagnostic, quick info and go to definitions

pkgs.vimPlugins.nvim-treesitter-parsers.angular

  • nixos-25.05 ???
    • nixpkgs-25.05-darwin
    • nixos-25.05-small
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable
Package maintainers: 1
CVE-2024-8372
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 3 months ago
AngularJS improper sanitization in 'srcset' attribute

Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

angular
==>=1.3.0-rc.4

pkgs.angular-language-server

LSP for angular completions, AOT diagnostic, quick info and go to definitions

pkgs.vimPlugins.nvim-treesitter-parsers.angular

  • nixos-25.05 ???
    • nixpkgs-25.05-darwin
    • nixos-25.05-small
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable
Package maintainers: 1