⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-5953
5.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 1 week ago
389-ds-base: malformed userpassword hash may cause denial of service

A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.

389-ds:1.4
*
389-ds-base
*
redhat-ds:11
*
redhat-ds:12
*
389-ds:1.4/389-ds-base
redhat-ds:11/389-ds-base
redhat-ds:12/389-ds-base

pkgs._389-ds-base.x86_64-linux

Enterprise-class Open Source LDAP server for Linux

pkgs._389-ds-base.aarch64-linux

Enterprise-class Open Source LDAP server for Linux
Notify package maintainers: 1
CVE-2025-26778
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 4 months, 1 week ago
WordPress Gallery Custom Links Plugin <= 2.2.1 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1.

gallery
=<2.2.1

pkgs.fgallery.x86_64-linux

Static photo gallery generator

pkgs.fgallery.aarch64-linux

Static photo gallery generator

pkgs.gallery-dl.x86_64-linux

Command-line program to download image-galleries and -collections from several image hosting sites

pkgs.gallery-dl.aarch64-linux

Command-line program to download image-galleries and -collections from several image hosting sites

pkgs.gallery-dl.x86_64-darwin

Command-line program to download image-galleries and -collections from several image hosting sites

pkgs.gallery-dl.aarch64-darwin

Command-line program to download image-galleries and -collections from several image hosting sites

pkgs.texlivePackages.dtxgallery

A small collection of minimal DTX examples
  • nixos-24.05 1
    • nixpkgs-24.05-darwin 1

pkgs.texlivePackages.image-gallery

Create an overview of pictures from a digital camera or from other sources

pkgs.plasma5Packages.kirigami-gallery

View examples of Kirigami components

pkgs.lomiri.lomiri-gallery-app.x86_64-linux

Photo gallery application for Ubuntu Touch devices

pkgs.lomiri.lomiri-gallery-app.aarch64-linux

Photo gallery application for Ubuntu Touch devices

pkgs.texlivePackages.dtxgallery.x86_64-linux

A small collection of minimal DTX examples
  • nixos-24.05 1
    • nixos-24.05-small 1

pkgs.kdePackages.kirigami-gallery.x86_64-linux

Kirigami component gallery application

pkgs.kdePackages.kirigami-gallery.aarch64-linux

Kirigami component gallery application

pkgs.texlivePackages.image-gallery.x86_64-linux

Create an overview of pictures from a digital camera or from other sources

pkgs.azure-cli-extensions.gallery-service-artifact

Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension

pkgs.azure-cli-extensions.image-gallery.x86_64-linux

Support for Azure Image Gallery

pkgs.azure-cli-extensions.image-gallery.aarch64-linux

Support for Azure Image Gallery

pkgs.azure-cli-extensions.image-gallery.x86_64-darwin

Support for Azure Image Gallery

pkgs.azure-cli-extensions.image-gallery.aarch64-darwin

Support for Azure Image Gallery

pkgs.azure-cli-extensions.gallery-service-artifact.x86_64-linux

Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension

pkgs.azure-cli-extensions.gallery-service-artifact.aarch64-linux

Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension

pkgs.azure-cli-extensions.gallery-service-artifact.x86_64-darwin

Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension

pkgs.azure-cli-extensions.gallery-service-artifact.aarch64-darwin

Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension
Notify package maintainers: 13
CVE-2023-6918
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 months, 2 weeks ago
Libssh: missing checks for return values for digests

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

libssh
*
libssh2
mingw-libssh2

pkgs.libssh2.x86_64-linux

A client-side C library implementing the SSH2 protocol

pkgs.libssh2.aarch64-linux

A client-side C library implementing the SSH2 protocol

pkgs.libssh2.x86_64-darwin

A client-side C library implementing the SSH2 protocol

pkgs.libssh2.aarch64-darwin

A client-side C library implementing the SSH2 protocol

pkgs.haskellPackages.libssh2-conduit

Conduit wrappers for libssh2 FFI bindings (see libssh2 package)

pkgs.python311Packages.ansible-pylibssh

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python312Packages.ansible-pylibssh

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.haskellPackages.libssh.x86_64-linux

libssh bindings

pkgs.haskellPackages.libssh.aarch64-linux

libssh bindings

pkgs.haskellPackages.libssh.x86_64-darwin

libssh bindings

pkgs.haskellPackages.libssh2.x86_64-linux

FFI bindings to libssh2 SSH2 client library (http://libssh2.org/)

pkgs.haskellPackages.libssh.aarch64-darwin

libssh bindings

pkgs.haskellPackages.libssh2.aarch64-linux

FFI bindings to libssh2 SSH2 client library (http://libssh2.org/)

pkgs.haskellPackages.libssh2.x86_64-darwin

FFI bindings to libssh2 SSH2 client library (http://libssh2.org/)

pkgs.haskellPackages.libssh2.aarch64-darwin

FFI bindings to libssh2 SSH2 client library (http://libssh2.org/)

pkgs.haskellPackages.libssh2-conduit.x86_64-linux

Conduit wrappers for libssh2 FFI bindings (see libssh2 package)

pkgs.haskellPackages.libssh2-conduit.aarch64-linux

Conduit wrappers for libssh2 FFI bindings (see libssh2 package)

pkgs.haskellPackages.libssh2-conduit.x86_64-darwin

Conduit wrappers for libssh2 FFI bindings (see libssh2 package)

pkgs.haskellPackages.libssh2-conduit.aarch64-darwin

Conduit wrappers for libssh2 FFI bindings (see libssh2 package)

pkgs.python311Packages.ansible-pylibssh.x86_64-linux

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python312Packages.ansible-pylibssh.x86_64-linux

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python311Packages.ansible-pylibssh.aarch64-linux

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python311Packages.ansible-pylibssh.x86_64-darwin

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python312Packages.ansible-pylibssh.aarch64-linux

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python312Packages.ansible-pylibssh.x86_64-darwin

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python311Packages.ansible-pylibssh.aarch64-darwin

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python312Packages.ansible-pylibssh.aarch64-darwin

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2.x86_64-linux

Test whether libssh2-1.11.1 exposes pkg-config modules libssh2

pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2.aarch64-linux

Test whether libssh2-1.11.1 exposes pkg-config modules libssh2

pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2.x86_64-darwin

Test whether libssh2-1.11.1 exposes pkg-config modules libssh2

pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2.aarch64-darwin

Test whether libssh2-1.11.1 exposes pkg-config modules libssh2
Notify package maintainers: 3
CVE-2023-49920 created 4 months, 2 weeks ago
Apache Airflow: Missing CSRF protection on DAG/trigger

Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent. Users are advised to upgrade to version 2.8.0 or later which is not affected

apache-airflow
<2.8.0

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2023-4256
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Tcpreplay: tcprewrite: double free in tcpedit_dlt_cleanup() in plugins/dlt_plugins.c

Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the tcpedit_dlt_cleanup() function within plugins/dlt_plugins.c. This vulnerability can be exploited by supplying a specifically crafted file to the tcprewrite binary. This flaw enables a local attacker to initiate a Denial of Service (DoS) attack.

tcpreplay

pkgs.tcpreplay

Suite of utilities for editing and replaying network traffic

pkgs.tcpreplay.x86_64-linux

Suite of utilities for editing and replaying network traffic

pkgs.tcpreplay.aarch64-linux

Suite of utilities for editing and replaying network traffic

pkgs.tcpreplay.x86_64-darwin

Suite of utilities for editing and replaying network traffic

pkgs.tcpreplay.aarch64-darwin

Suite of utilities for editing and replaying network traffic
Notify package maintainers: 1
CVE-2024-29735
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Apache Airflow: Potentially harmful permission changing by log task handler

Improper Preservation of Permissions vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.8.2 through 2.8.3. Airflow's local file task handler in Airflow incorrectly set permissions for all parent folders of log folder, in default configuration adding write access to Unix group of the folders. In the case Airflow is run with the root user (not recommended) it added group write permission to all folders up to the root of the filesystem. If your log files are stored in the home directory, these permission changes might impact your ability to run SSH operations after your home directory becomes group-writeable. This issue does not affect users who use or extend Airflow using Official Airflow Docker reference images ( https://hub.docker.com/r/apache/airflow/ ) - those images require to have group write permission set anyway. You are affected only if you install Airflow using local installation / virtualenv or other Docker images, but the issue has no impact if docker containers are used as intended, i.e. where Airflow components do not share containers with other applications and users. Also you should not be affected if your umask is 002 (group write enabled) - this is the default on many linux systems. Recommendation for users using Airflow outside of the containers: * if you are using root to run Airflow, change your Airflow user to use non-root * upgrade Apache Airflow to 2.8.4 or above * If you prefer not to upgrade, you can change the https://airflow.apache.org/docs/apache-airflow/stable/configurations-ref.html#file-task-handler-new-folder-permissions  to 0o755 (original value 0o775). * if you already ran Airflow tasks before and your default umask is 022 (group write disabled) you should stop Airflow components, check permissions of AIRFLOW_HOME/logs in all your components and all parent directories of this directory and remove group write access for all the parent directories

apache-airflow
=<2.8.3

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2023-47265 created 4 months, 2 weeks ago
Apache Airflow: DAG Params alllow to embed unchecked Javascript

Apache Airflow, versions 2.6.0 through 2.7.3 has a stored XSS vulnerability that allows a DAG author to add an unbounded and not-sanitized javascript in the parameter description field of the DAG. This Javascript can be executed on the client side of any of the user who looks at the tasks in the browser sandbox. While this issue does not allow to exit the browser sandbox or manipulation of the server-side data - more than the DAG author already has, it allows to modify what the user looking at the DAG details sees in the browser - which opens up all kinds of possibilities of misleading other users. Users of Apache Airflow are recommended to upgrade to version 2.8.0 or newer to mitigate the risk associated with this vulnerability

apache-airflow
<2.8.0

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2023-3354
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Improper i/o watch removal in tls handshake can lead to remote unauthenticated denial of service

A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.

qemu
qemu-kvm
qemu-kvm-ma
qemu-kvm-rhev
virt:av/qemu-kvm
virt:rhel/qemu-kvm

pkgs.qemu_xen

Generic and open source machine emulator and virtualizer

pkgs.qemu-user

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu-utils

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15

A generic and open source machine emulator and virtualizer

pkgs.qemu.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15-light

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu-user.x86_64-linux

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu_full.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu-user.aarch64-linux

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu-utils.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15-light.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.armTrustedFirmwareQemu.aarch64-linux

A reference implementation of secure world software for ARMv8-A
Notify package maintainers: 12
CVE-2023-47248 created 4 months, 2 weeks ago
PyArrow, PyArrow: Arbitrary code execution when loading a malicious data file

Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings. It is recommended that users of PyArrow upgrade to 14.0.1. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to PyArrow 14.0.1 or later. PyPI packages are already available, and we hope that conda-forge packages will be available soon. If it is not possible to upgrade, we provide a separate package `pyarrow-hotfix` that disables the vulnerability on older PyArrow versions. See https://pypi.org/project/pyarrow-hotfix/ for instructions.

pyarrow
=<14.0.0

pkgs.python311Packages.pyarrow-hotfix

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python312Packages.pyarrow-hotfix

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python311Packages.geoarrow-pyarrow

PyArrow implementation of geospatial data types

pkgs.python312Packages.geoarrow-pyarrow

PyArrow implementation of geospatial data types

pkgs.python311Packages.pyarrow.aarch64-linux

A cross-language development platform for in-memory data

pkgs.python311Packages.pyarrow.x86_64-darwin

A cross-language development platform for in-memory data

pkgs.python311Packages.pyarrow.aarch64-darwin

A cross-language development platform for in-memory data

pkgs.python311Packages.pyarrow-hotfix.x86_64-linux

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python312Packages.pyarrow-hotfix.x86_64-linux

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python311Packages.pyarrow-hotfix.aarch64-linux

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python311Packages.pyarrow-hotfix.x86_64-darwin

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python312Packages.pyarrow-hotfix.aarch64-linux

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python312Packages.pyarrow-hotfix.x86_64-darwin

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python311Packages.geoarrow-pyarrow.x86_64-linux

PyArrow implementation of geospatial data types

pkgs.python311Packages.pyarrow-hotfix.aarch64-darwin

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python312Packages.geoarrow-pyarrow.x86_64-linux

PyArrow implementation of geospatial data types

pkgs.python312Packages.pyarrow-hotfix.aarch64-darwin

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python311Packages.geoarrow-pyarrow.aarch64-linux

PyArrow implementation of geospatial data types

pkgs.python311Packages.geoarrow-pyarrow.x86_64-darwin

PyArrow implementation of geospatial data types

pkgs.python312Packages.geoarrow-pyarrow.aarch64-linux

PyArrow implementation of geospatial data types

pkgs.python312Packages.geoarrow-pyarrow.x86_64-darwin

PyArrow implementation of geospatial data types

pkgs.python311Packages.geoarrow-pyarrow.aarch64-darwin

PyArrow implementation of geospatial data types

pkgs.python312Packages.geoarrow-pyarrow.aarch64-darwin

PyArrow implementation of geospatial data types
Notify package maintainers: 3
CVE-2024-28746
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Apache Airflow: Ignored Airflow Permissions

Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access resources such as variables, connections, etc from the UI which they do not have permission to access.  Users of Apache Airflow are recommended to upgrade to version 2.8.3 or newer to mitigate the risk associated with this vulnerability

apache-airflow
<2.8.3

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3