Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2025-49241
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 2 weeks ago
WordPress oik <= 4.15.1 - Broken Access Control Vulnerability

Missing Authorization vulnerability in bobbingwide oik allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects oik: from n/a through 4.15.1.

oik
=<4.15.1

pkgs.libvoikko

Finnish language processing library
Package maintainers: 1
CVE-2025-49075
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 months, 2 weeks ago
WordPress Wishlist plugin <= 1.0.43 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PickPlugins Wishlist allows Stored XSS.This issue affects Wishlist: from n/a through 1.0.43.

wishlist
=<1.0.43

pkgs.wishlist

Single entrypoint for multiple SSH endpoints
Package maintainers: 2
CVE-2011-10007
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 2 weeks ago
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted file name

File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \     -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)

File-Find-Rule
=<0.34

pkgs.perlPackages.FileFindRule

File::Find::Rule is a friendlier interface to File::Find

pkgs.perl538Packages.FileFindRule

File::Find::Rule is a friendlier interface to File::Find

pkgs.perl540Packages.FileFindRule

File::Find::Rule is a friendlier interface to File::Find

pkgs.perlPackages.FileFindRulePerl

Common rules for searching for Perl things

pkgs.perl538Packages.FileFindRulePerl

Common rules for searching for Perl things

pkgs.perl540Packages.FileFindRulePerl

Common rules for searching for Perl things
CVE-2025-40908
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 2 months, 2 weeks ago
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified

YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified

YAML-LibYAML
<0.903.0

pkgs.perlPackages.YAMLLibYAML

Perl YAML Serialization using XS and libyaml

pkgs.perl538Packages.YAMLLibYAML

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML

Perl YAML Serialization using XS and libyaml
CVE-2024-12224 created 2 months, 2 weeks ago
idna accepts Punycode labels that do not produce any non-ASCII when decoded

Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

idna
<1.0.0

pkgs.echidna

Ethereum smart contract fuzzer

pkgs.unicode-idna

Unicode IDNA compatible processing data

pkgs.kodiPackages.idna

Internationalized Domain Names for Python

pkgs.python312Packages.idna

Internationalized Domain Names in Applications (IDNA)

pkgs.python313Packages.idna

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna-ssl

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python313Packages.idna-ssl

Patch ssl.match_hostname for Unicode(idna) domains support
Package maintainers: 16
CVE-2025-4598
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 2 weeks ago
Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.

rhcos
systemd
rpm-ostree
NetworkManager
systemd-coredump
<255.19
<253.32
<256.14
<252.37
<257.6
<254.25

pkgs.udev

System and service manager for Linux

pkgs.systemd

System and service manager for Linux

pkgs.rpm-ostree

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.systemd-lsp

Language server implementation for systemd unit files made in Rust

pkgs.systemdLibs

System and service manager for Linux

pkgs.rofi-systemd

Control your systemd units using rofi

pkgs.systemd-wait

Wait for a systemd unit to enter a specific state

pkgs.systemdUkify

System and service manager for Linux

pkgs.systemdgenie

Systemd management utility

pkgs.check_systemd

Nagios / Icinga monitoring plugin to check systemd for failed units

pkgs.systemdMinimal

System and service manager for Linux

pkgs.systemd-netlogd

Forwards messages from the journal to other hosts over the network

pkgs.systemd-bootchart

Boot performance graphing tool from systemd

pkgs.networkmanager-sstp

NetworkManager's sstp plugin

pkgs.networkmanager-vpnc

NetworkManager's VPNC plugin

pkgs.systemd-manager-tui

Program for managing systemd services through a TUI

pkgs.systemd-lock-handler

Translates systemd-system lock/sleep signals into systemd-user target activations

pkgs.networkmanager-openvpn

NetworkManager's OpenVPN plugin

pkgs.haskellPackages.systemd

Systemd facilities (Socket activation, Notify)

pkgs.php81Extensions.systemd

PHP extension allowing native interaction with systemd and its journal

pkgs.php82Extensions.systemd

PHP extension allowing native interaction with systemd and its journal

pkgs.php83Extensions.systemd

PHP extension allowing native interaction with systemd and its journal

pkgs.php84Extensions.systemd

PHP extension allowing native interaction with systemd and its journal

pkgs.systemd-language-server

Language Server for Systemd unit files

pkgs.update-systemd-resolved

Helper script for OpenVPN to directly update the DNS settings of a link through systemd-resolved via DBus

pkgs.networkmanager_strongswan

NetworkManager's strongswan plugin

pkgs.python312Packages.systemd

Python module for native access to the systemd facilities

pkgs.python313Packages.systemd

Python module for native access to the systemd facilities

pkgs.networkmanager-fortisslvpn

NetworkManager’s FortiSSL plugin

pkgs.networkmanager-openconnect

NetworkManager’s OpenConnect plugin

pkgs.haskellPackages.systemd-api

systemd bindings

pkgs.nagiosPlugins.check_systemd

Nagios / Icinga monitoring plugin to check systemd for failed units

pkgs.prometheus-systemd-exporter

Exporter for systemd unit metrics

pkgs.haskellPackages.warp-systemd

Socket activation and other systemd integration for the Warp web server (WAI)

pkgs.gnomeExtensions.systemd-status

Show systemd system state

pkgs.gnomeExtensions.systemd-manager

GNOME Shell extension to manage systemd services

pkgs.haskellPackages.libsystemd-journal

Haskell bindings to libsystemd-journal

pkgs.python312Packages.systemdunitparser

SystemdUnitParser is an extension to Python's configparser.RawConfigParser to properly parse systemd unit files

pkgs.python313Packages.systemdunitparser

SystemdUnitParser is an extension to Python's configparser.RawConfigParser to properly parse systemd unit files

pkgs.python312Packages.jupyterhub-systemdspawner

JupyterHub Spawner using systemd for resource isolation

pkgs.python313Packages.jupyterhub-systemdspawner

JupyterHub Spawner using systemd for resource isolation

pkgs.vscode-extensions.coolbear.systemd-unit-file

pkgs.gnomeExtensions.systemd-offline-update-indicator

Show an indicator for pending systemd offline updates.

pkgs.tests.pkg-config.defaultPkgConfigPackages.libudev

Test whether systemd-257.8 exposes pkg-config modules libudev
  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.tests.pkg-config.defaultPkgConfigPackages.libsystemd

Test whether systemd-257.8 exposes pkg-config modules libsystemd
  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 30
CVE-2025-5054
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 2 weeks ago
Race Condition in Canonical Apport

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).

apport
<2.33.0-0ubuntu1
<2.20.11-0ubuntu27.28
<2.30.0-0ubuntu4.3
=<2.32.0
<2.32.0-0ubuntu6
<2.32.0-0ubuntu5.1
<2.20.1-0ubuntu2.30+esm5
<2.20.11-0ubuntu82.7
<2.28.1-0ubuntu3.6
<2.20.9-0ubuntu7.29+esm1

pkgs.haskellPackages.apportionment

Round a set of numbers while maintaining its sum
Package maintainers: 1
CVE-2024-8372
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 months, 2 weeks ago
AngularJS improper sanitization in 'srcset' attribute

Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

angular
==>=1.3.0-rc.4

pkgs.angular-language-server

LSP for angular completions, AOT diagnostic, quick info and go to definitions

pkgs.nodePackages.@angular/cli

CLI tool for Angular

pkgs.nodePackages_latest.@angular/cli

CLI tool for Angular

pkgs.vimPlugins.nvim-treesitter-parsers.angular

  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 1
CVE-2025-1461
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 months, 2 weeks ago
Vuetify XSS through 'eventMoreText' prop of VCalendar

Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .

vuetify
==>=2.0.0 <3.0.0

pkgs.python312Packages.ipyvuetify

Jupyter widgets based on Vuetify UI Components

pkgs.python313Packages.ipyvuetify

Jupyter widgets based on Vuetify UI Components
Package maintainers: 1
CVE-2024-8373
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 months, 2 weeks ago
AngularJS improper sanitization in '<source>' element

Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

angular
==>=0.0.0

pkgs.angular-language-server

LSP for angular completions, AOT diagnostic, quick info and go to definitions

pkgs.nodePackages.@angular/cli

CLI tool for Angular

pkgs.nodePackages_latest.@angular/cli

CLI tool for Angular

pkgs.vimPlugins.nvim-treesitter-parsers.angular

  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 1