⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2025-32908
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Libsoup: denial of service on libsoup through http/2 server

A flaw was found in libsoup. The HTTP/2 server in libsoup may not fully validate the values of pseudo-headers :scheme, :authority, and :path, which may allow a user to cause a denial of service (DoS).

libsoup
<3.6.5
libsoup3
*

pkgs.libsoup_2_4

HTTP client/server library for GNOME

pkgs.gnome.libsoup

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4
Package maintainers: 6
CVE-2025-32907
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Libsoup: denial of service in server when client requests a large amount of overlapping ranges with range header

A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory.

libsoup
*
<3.6.5
libsoup3
*
mingw-freetype
*
spice-client-win
*

pkgs.libsoup_2_4

HTTP client/server library for GNOME

pkgs.gnome.libsoup

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4
Package maintainers: 6
CVE-2025-32912
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Libsoup: null pointer dereference in client when server omits the "nonce" parameter in an unauthorized response with digest authentication

A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash.

libsoup
<3.6.5
libsoup3
*

pkgs.libsoup_2_4

HTTP client/server library for GNOME

pkgs.gnome.libsoup

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4
Package maintainers: 6
CVE-2025-32910
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Libsoup: null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an unauthorized response with digest authentication

A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash.

libsoup
<3.6.3
libsoup3
mingw-freetype
*
spice-client-win
*

pkgs.libsoup_2_4

HTTP client/server library for GNOME

pkgs.gnome.libsoup

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4
Package maintainers: 6
CVE-2025-32913
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Libsoup: null pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in content-disposition header

A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.

libsoup
*
<3.6.2
libsoup3
mingw-freetype
*
spice-client-win
*

pkgs.libsoup_2_4

HTTP client/server library for GNOME

pkgs.gnome.libsoup

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-linux

HTTP client/server library for GNOME

pkgs.libsoup_3.aarch64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-linux

HTTP client/server library for GNOME

pkgs.libsoup_2_4.x86_64-darwin

HTTP client/server library for GNOME

pkgs.libsoup_2_4.aarch64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-linux

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.x86_64-darwin

HTTP client/server library for GNOME

pkgs.gnome2.libsoup.aarch64-darwin

HTTP client/server library for GNOME

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-linux

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".x86_64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4".aarch64-darwin

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4
Package maintainers: 6
CVE-2025-2814
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 2 months, 3 weeks ago
Crypt::CBC versions between 1.21 and 3.04 for Perl may use insecure rand() function for cryptographic functions

Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable.  In that case, Crypt::CBC will fallback to use the insecure rand() function.

Crypt-CBC
=<3.04
=<3.05

pkgs.perl536Packages.CryptCBC

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl538Packages.CryptCBC

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl540Packages.CryptCBC

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl536Packages.CryptCBC.x86_64-linux

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl538Packages.CryptCBC.x86_64-linux

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl540Packages.CryptCBC.x86_64-linux

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl536Packages.CryptCBC.aarch64-linux

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl536Packages.CryptCBC.x86_64-darwin

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl538Packages.CryptCBC.aarch64-linux

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl538Packages.CryptCBC.x86_64-darwin

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl540Packages.CryptCBC.aarch64-linux

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl540Packages.CryptCBC.x86_64-darwin

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl536Packages.CryptCBC.aarch64-darwin

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl538Packages.CryptCBC.aarch64-darwin

Encrypt Data with Cipher Block Chaining Mode

pkgs.perl540Packages.CryptCBC.aarch64-darwin

Encrypt Data with Cipher Block Chaining Mode
CVE-2025-32618
8.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 2 months, 3 weeks ago
WordPress Wishlist plugin <= 1.0.43 - SQL Injection vulnerability

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PickPlugins Wishlist allows SQL Injection. This issue affects Wishlist: from n/a through 1.0.43.

wishlist
=<1.0.43

pkgs.wishlist.x86_64-linux

Single entrypoint for multiple SSH endpoints

pkgs.wishlist.aarch64-linux

Single entrypoint for multiple SSH endpoints

pkgs.wishlist.x86_64-darwin

Single entrypoint for multiple SSH endpoints

pkgs.wishlist.aarch64-darwin

Single entrypoint for multiple SSH endpoints
Package maintainers: 2
CVE-2025-32589
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
WordPress Flexi – Guest Submit Plugin <= 4.28 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in odude Flexi – Guest Submit allows PHP Local File Inclusion. This issue affects Flexi – Guest Submit: from n/a through 4.28.

flexi
=<4.28

pkgs.texlivePackages.flexipage

Flexible page geometry with marginalia

pkgs.python311Packages.pyflexit

Python library for Flexit A/C units

pkgs.python312Packages.pyflexit

Python library for Flexit A/C units

pkgs.python311Packages.flexit-bacnet

Client BACnet library for Flexit Nordic series of air handling units

pkgs.python312Packages.flexit-bacnet

Client BACnet library for Flexit Nordic series of air handling units

pkgs.haskellPackages.flexible-defaults

Generate default function implementations for complex type classes

pkgs.texlivePackages.latino-sine-flexione

LaTeX support for documents written in Peano's Interlingua

pkgs.texlivePackages.flexipage.x86_64-linux

Flexible page geometry with marginalia

pkgs.python311Packages.pyflexit.x86_64-linux

Python library for Flexit A/C units

pkgs.python312Packages.pyflexit.x86_64-linux

Python library for Flexit A/C units

pkgs.python311Packages.pyflexit.aarch64-linux

Python library for Flexit A/C units

pkgs.python311Packages.pyflexit.x86_64-darwin

Python library for Flexit A/C units

pkgs.python312Packages.pyflexit.aarch64-linux

Python library for Flexit A/C units

pkgs.python312Packages.pyflexit.x86_64-darwin

Python library for Flexit A/C units

pkgs.python311Packages.pyflexit.aarch64-darwin

Python library for Flexit A/C units

pkgs.python312Packages.pyflexit.aarch64-darwin

Python library for Flexit A/C units

pkgs.python311Packages.flexit-bacnet.x86_64-linux

Client BACnet library for Flexit Nordic series of air handling units

pkgs.python312Packages.flexit-bacnet.x86_64-linux

Client BACnet library for Flexit Nordic series of air handling units

pkgs.python311Packages.flexit-bacnet.aarch64-linux

Client BACnet library for Flexit Nordic series of air handling units

pkgs.python311Packages.flexit-bacnet.x86_64-darwin

Client BACnet library for Flexit Nordic series of air handling units

pkgs.python312Packages.flexit-bacnet.aarch64-linux

Client BACnet library for Flexit Nordic series of air handling units

pkgs.python312Packages.flexit-bacnet.x86_64-darwin

Client BACnet library for Flexit Nordic series of air handling units

pkgs.haskellPackages.flexible-defaults.x86_64-linux

Generate default function implementations for complex type classes

pkgs.python311Packages.flexit-bacnet.aarch64-darwin

Client BACnet library for Flexit Nordic series of air handling units

pkgs.python312Packages.flexit-bacnet.aarch64-darwin

Client BACnet library for Flexit Nordic series of air handling units

pkgs.haskellPackages.flexible-defaults.aarch64-linux

Generate default function implementations for complex type classes

pkgs.haskellPackages.flexible-defaults.x86_64-darwin

Generate default function implementations for complex type classes

pkgs.haskellPackages.flexible-defaults.aarch64-darwin

Generate default function implementations for complex type classes

pkgs.python311Packages.azure-mgmt-mysqlflexibleservers

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-mysqlflexibleservers

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.texlivePackages.latino-sine-flexione.x86_64-linux

LaTeX support for documents written in Peano's Interlingua

pkgs.haskellPackages.flexible-numeric-parsers.x86_64-linux

Flexible numeric parsers for real-world programming languages

pkgs.haskellPackages.flexible-numeric-parsers.aarch64-linux

Flexible numeric parsers for real-world programming languages

pkgs.haskellPackages.flexible-numeric-parsers.x86_64-darwin

Flexible numeric parsers for real-world programming languages

pkgs.python311Packages.azure-mgmt-postgresqlflexibleservers

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-postgresqlflexibleservers

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.haskellPackages.flexible-numeric-parsers.aarch64-darwin

Flexible numeric parsers for real-world programming languages

pkgs.home-assistant-component-tests.flexit_bacnet.x86_64-linux

Open source home automation that puts local control and privacy first

pkgs.home-assistant-component-tests.flexit_bacnet.aarch64-linux

Open source home automation that puts local control and privacy first

pkgs.python311Packages.azure-mgmt-mysqlflexibleservers.x86_64-linux

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-mysqlflexibleservers.x86_64-linux

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python311Packages.azure-mgmt-mysqlflexibleservers.aarch64-linux

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python311Packages.azure-mgmt-mysqlflexibleservers.x86_64-darwin

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-mysqlflexibleservers.aarch64-linux

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-mysqlflexibleservers.x86_64-darwin

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python311Packages.azure-mgmt-mysqlflexibleservers.aarch64-darwin

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-mysqlflexibleservers.aarch64-darwin

Microsoft Azure Mysqlflexibleservers Management Client Library for Python

pkgs.python311Packages.azure-mgmt-postgresqlflexibleservers.x86_64-linux

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-postgresqlflexibleservers.x86_64-linux

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.python311Packages.azure-mgmt-postgresqlflexibleservers.aarch64-linux

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.python311Packages.azure-mgmt-postgresqlflexibleservers.x86_64-darwin

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-postgresqlflexibleservers.aarch64-linux

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-postgresqlflexibleservers.x86_64-darwin

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.python311Packages.azure-mgmt-postgresqlflexibleservers.aarch64-darwin

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python

pkgs.python312Packages.azure-mgmt-postgresqlflexibleservers.aarch64-darwin

Microsoft Azure Postgresqlflexibleservers Management Client Library for Python
Package maintainers: 10
CVE-2024-1441
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Libvirt: off-by-one error in udevlistinterfacesbystatus()

An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.

libvirt
==9.7.0
*
virt:av/libvirt
virt:rhel/libvirt

pkgs.libvirt.x86_64-linux

A toolkit to interact with the virtualization capabilities of recent versions of Linux and other OSes

pkgs.libvirt.aarch64-linux

A toolkit to interact with the virtualization capabilities of recent versions of Linux and other OSes

pkgs.libvirt.x86_64-darwin

A toolkit to interact with the virtualization capabilities of recent versions of Linux and other OSes

pkgs.libvirt.aarch64-darwin

A toolkit to interact with the virtualization capabilities of recent versions of Linux and other OSes

pkgs.libvirt-glib.x86_64-linux

Library for working with virtual machines

pkgs.rubyPackages.ruby-libvirt

pkgs.libvirt-glib.aarch64-linux

Library for working with virtual machines

pkgs.libvirt-glib.x86_64-darwin

Library for working with virtual machines

pkgs.libvirt-glib.aarch64-darwin

Library for working with virtual machines

pkgs.prometheus-libvirt-exporter

Prometheus metrics exporter for libvirt

pkgs.prometheus-libvirt-exporter.x86_64-linux

Prometheus metrics exporter for libvirt

pkgs.prometheus-libvirt-exporter.aarch64-linux

Prometheus metrics exporter for libvirt

pkgs.prometheus-libvirt-exporter.x86_64-darwin

Prometheus metrics exporter for libvirt

pkgs.prometheus-libvirt-exporter.aarch64-darwin

Prometheus metrics exporter for libvirt

pkgs.rubyPackages_3_4.ruby-libvirt.x86_64-linux

pkgs.rubyPackages_3_4.ruby-libvirt.aarch64-linux

pkgs.rubyPackages_3_4.ruby-libvirt.x86_64-darwin

pkgs.rubyPackages_3_4.ruby-libvirt.aarch64-darwin

Package maintainers: 4
CVE-2025-1386 created 2 months, 3 weeks ago
Query smuggling in ch-go library

When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream.

ch-go
<0.65.0

pkgs.immich-go.x86_64-linux

Immich client tool for bulk-uploads

pkgs.immich-go.aarch64-linux

Immich client tool for bulk-uploads

pkgs.immich-go.x86_64-darwin

Immich client tool for bulk-uploads

pkgs.immich-go.aarch64-darwin

Immich client tool for bulk-uploads
Package maintainers: 1