⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2025-5054
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 weeks, 1 day ago
Race Condition in Canonical Apport

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).

apport
<2.20.11-0ubuntu27.28
=<2.32.0
<2.20.9-0ubuntu7.29+esm1
<2.32.0-0ubuntu6
<2.33.0-0ubuntu1
<2.20.1-0ubuntu2.30+esm5
<2.30.0-0ubuntu4.3
<2.20.11-0ubuntu82.7
<2.32.0-0ubuntu5.1
<2.28.1-0ubuntu3.6

pkgs.haskellPackages.apportionment

Round a set of numbers while maintaining its sum
Package maintainers: 1
CVE-2024-8372
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 4 weeks, 1 day ago
AngularJS improper sanitization in 'srcset' attribute

Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

angular
==>=1.3.0-rc.4

pkgs.angular-language-server

LSP for angular completions, AOT diagnostic, quick info and go to definitions

pkgs.nodePackages.@angular/cli

CLI tool for Angular

pkgs.nodePackages_latest.@angular/cli

CLI tool for Angular

pkgs.vimPlugins.nvim-treesitter-parsers.angular

  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 1
CVE-2025-1461
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 4 weeks, 1 day ago
Vuetify XSS through 'eventMoreText' prop of VCalendar

Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .

vuetify
==>=2.0.0 <3.0.0

pkgs.python312Packages.ipyvuetify

Jupyter widgets based on Vuetify UI Components

pkgs.python313Packages.ipyvuetify

Jupyter widgets based on Vuetify UI Components
Package maintainers: 1
CVE-2024-8373
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 4 weeks, 1 day ago
AngularJS improper sanitization in '<source>' element

Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

angular
==>=0.0.0

pkgs.angular-language-server

LSP for angular completions, AOT diagnostic, quick info and go to definitions

pkgs.nodePackages.@angular/cli

CLI tool for Angular

pkgs.nodePackages_latest.@angular/cli

CLI tool for Angular

pkgs.vimPlugins.nvim-treesitter-parsers.angular

  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 1
CVE-2025-0716
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 4 weeks, 1 day ago
AngularJS improper sanitization in SVG '<image>' element

Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

angular
==>=0.0.0

pkgs.angular-language-server

LSP for angular completions, AOT diagnostic, quick info and go to definitions

pkgs.nodePackages.@angular/cli

CLI tool for Angular

pkgs.nodePackages_latest.@angular/cli

CLI tool for Angular

pkgs.vimPlugins.nvim-treesitter-parsers.angular

  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 1
CVE-2025-5278
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 weeks, 1 day ago
Coreutils: heap buffer under-read in gnu coreutils sort via key specification

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

rhcos
coreutils

pkgs.coreutils

GNU Core Utilities

pkgs.coreutils-full

GNU Core Utilities

pkgs.policycoreutils

SELinux policy core utilities

pkgs.uutils-coreutils

Cross-platform Rust rewrite of the GNU coreutils

pkgs.coreutils-prefixed

GNU Core Utilities

pkgs.uutils-coreutils-noprefix

Cross-platform Rust rewrite of the GNU coreutils
Package maintainers: 5
CVE-2025-48796
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Gimp: stack-based buffer overflows in file-ico

A flaw was found in GIMP. The GIMP ani_load_image() function is vulnerable to a stack-based overflow. If a user opens.ANI files, GIMP may be used to store more information than the capacity allows. This flaw allows a malicious ANI file to trigger arbitrary code execution.

gimp
<2.99.16
gimp:2.8/gimp

pkgs.zigimports

Automatically remove unused imports and globals from Zig files

pkgs.gimpPlugins.bimp

Batch Image Manipulation Plugin for GIMP

pkgs.gimpPlugins.gimp

GNU Image Manipulation Program

pkgs.gimpPlugins.gmic

GIMP plugin for the G'MIC image processing framework

pkgs.gimp-with-plugins

GNU Image Manipulation Program

pkgs.gimp3Plugins.gimp

GNU Image Manipulation Program

pkgs.gimp3Plugins.gmic

GIMP plugin for the G'MIC image processing framework

pkgs.gimp3-with-plugins

GNU Image Manipulation Program

pkgs.gimpPlugins.fourier

GIMP plug-in to do the fourier transform

pkgs.gimpPlugins.farbfeld

Gimp plug-in for the farbfeld image format

pkgs.gimpPlugins.lightning

  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.gimpPlugins.lqrPlugin

pkgs.gimp3Plugins.lightning

  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.gimpPlugins.gimplensfun

GIMP plugin to correct lens distortion using the lensfun library and database

pkgs.gimpPlugins.resynthesizer

pkgs.gimpPlugins.waveletSharpen

Package maintainers: 3
CVE-2025-48797
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Gimp: multiple heap buffer overflows in tga parser

A flaw was found in GIMP when processing certain TGA image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing a heap buffer overflow.

gimp
<3.0.0
*
gimp:2.8
*
gimp:2.8/gimp

pkgs.zigimports

Automatically remove unused imports and globals from Zig files

pkgs.gimpPlugins.bimp

Batch Image Manipulation Plugin for GIMP

pkgs.gimpPlugins.gimp

GNU Image Manipulation Program

pkgs.gimpPlugins.gmic

GIMP plugin for the G'MIC image processing framework

pkgs.gimp-with-plugins

GNU Image Manipulation Program

pkgs.gimp3Plugins.gimp

GNU Image Manipulation Program

pkgs.gimp3Plugins.gmic

GIMP plugin for the G'MIC image processing framework

pkgs.gimp3-with-plugins

GNU Image Manipulation Program

pkgs.gimpPlugins.fourier

GIMP plug-in to do the fourier transform

pkgs.gimpPlugins.farbfeld

Gimp plug-in for the farbfeld image format

pkgs.gimpPlugins.lightning

  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.gimpPlugins.lqrPlugin

pkgs.gimp3Plugins.lightning

  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.gimpPlugins.gimplensfun

GIMP plugin to correct lens distortion using the lensfun library and database

pkgs.gimpPlugins.resynthesizer

pkgs.gimpPlugins.waveletSharpen

Package maintainers: 3
CVE-2025-48798
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Gimp: multiple use after free in xcf parser

A flaw was found in GIMP when processing XCF image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing use-after-free issues.

gimp
<3.0.0
*
gimp:2.8
*
gimp:2.8/gimp

pkgs.zigimports

Automatically remove unused imports and globals from Zig files

pkgs.gimpPlugins.bimp

Batch Image Manipulation Plugin for GIMP

pkgs.gimpPlugins.gimp

GNU Image Manipulation Program

pkgs.gimpPlugins.gmic

GIMP plugin for the G'MIC image processing framework

pkgs.gimp-with-plugins

GNU Image Manipulation Program

pkgs.gimp3Plugins.gimp

GNU Image Manipulation Program

pkgs.gimp3Plugins.gmic

GIMP plugin for the G'MIC image processing framework

pkgs.gimp3-with-plugins

GNU Image Manipulation Program

pkgs.gimpPlugins.fourier

GIMP plug-in to do the fourier transform

pkgs.gimpPlugins.farbfeld

Gimp plug-in for the farbfeld image format

pkgs.gimpPlugins.lightning

  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.gimpPlugins.lqrPlugin

pkgs.gimp3Plugins.lightning

  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.gimpPlugins.gimplensfun

GIMP plugin to correct lens distortion using the lensfun library and database

pkgs.gimpPlugins.resynthesizer

pkgs.gimpPlugins.waveletSharpen

Package maintainers: 3
CVE-2025-5222
7.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Icu: stack buffer overflow in the srbroot::addtag function

A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.

icu
*
<78.1
rhcos
mingw-icu

pkgs.icu60

Unicode and globalization support library

pkgs.icu63

Unicode and globalization support library

pkgs.icu64

Unicode and globalization support library

pkgs.icu66

Unicode and globalization support library

pkgs.icu67

Unicode and globalization support library

pkgs.icu69

Unicode and globalization support library

pkgs.icu70

Unicode and globalization support library

pkgs.icu71

Unicode and globalization support library

pkgs.icu72

Unicode and globalization support library

pkgs.icu73

Unicode and globalization support library

pkgs.icu74

Unicode and globalization support library

pkgs.icu75

Unicode and globalization support library

pkgs.icu76

Unicode and globalization support library

pkgs.icu77

Unicode and globalization support library

pkgs.cunicu

Zeroconf peer-to-peer mesh VPN using Wireguard® and Interactive Connectivity Establishment (ICE)

pkgs.musicus

Classical music player and organizer

pkgs.ploticus

Non-interactive software package for producing plots and charts

pkgs.moolticute

GUI app and daemon to work with Mooltipass device via USB

pkgs.wikicurses

Simple curses interface for MediaWiki sites such as Wikipedia

pkgs.harfbuzzFull

OpenType text shaping engine

pkgs.python312Packages.pyicu

Python extension wrapping the ICU C++ API

pkgs.python313Packages.pyicu

Python extension wrapping the ICU C++ API

pkgs.haskellPackages.text-icu

Bindings to the ICU library

pkgs.python312Packages.unicurses

Unified Curses Wrapper for Python

pkgs.python313Packages.unicurses

Unified Curses Wrapper for Python

pkgs.typstPackages.icu-datetime_0_1_0

Date and time formatting using ICU4X via WASM

pkgs.typstPackages.icu-datetime_0_1_1

Date and time formatting using ICU4X via WASM

pkgs.typstPackages.icu-datetime_0_1_2

Date and time formatting using ICU4X via WASM

pkgs.chickenPackages_5.chickenEggs.icu

Chicken bindings to the ICU unicode library

pkgs.elasticsearchPlugins.analysis-icu

ICU Analysis plugin integrates the Lucene ICU module into elasticsearch

pkgs.haskellPackages.music-articulation

Abstract representation of musical articulation

pkgs.typstPackages.curriculo-acad_0_1_0

Creating a CV from your LATTES entries

pkgs.python312Packages.pyicumessageformat

Unopinionated Python3 parser for ICU MessageFormat

pkgs.python313Packages.pyicumessageformat

Unopinionated Python3 parser for ICU MessageFormat

pkgs.rubyPackages.cocoapods-expert-difficulty

pkgs.rubyPackages_3_1.cocoapods-expert-difficulty

pkgs.rubyPackages_3_2.cocoapods-expert-difficulty

pkgs.rubyPackages_3_3.cocoapods-expert-difficulty

pkgs.rubyPackages_3_4.cocoapods-expert-difficulty

pkgs.tests.pkg-config.defaultPkgConfigPackages.icu-io

Test whether icu4c-76.1 exposes pkg-config modules icu-io

pkgs.tests.pkg-config.defaultPkgConfigPackages.icu-uc

Test whether icu4c-76.1 exposes pkg-config modules icu-uc

pkgs.tests.pkg-config.defaultPkgConfigPackages.icu-i18n

Test whether icu4c-76.1 exposes pkg-config modules icu-i18n
Package maintainers: 10