⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-27319
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 months, 2 weeks ago
Versions of the package onnx before and including 1.15.0 are …

Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy.

onnx
=<1.15.0

pkgs.python311Packages.tf2onnx

Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX

pkgs.python311Packages.onnxruntime

Cross-platform, high performance scoring engine for ML models

pkgs.python311Packages.onnxruntime-tools

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.rapidocr-onnxruntime

Cross platform OCR Library based on OnnxRuntime

pkgs.python311Packages.tf2onnx.x86_64-linux

Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX

pkgs.python311Packages.tf2onnx.aarch64-linux

Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX

pkgs.python312Packages.onnxruntime.x86_64-linux

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxruntime.aarch64-linux

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxruntime.x86_64-darwin

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxruntime.aarch64-darwin

Cross-platform, high performance scoring engine for ML models

pkgs.python311Packages.onnxruntime-tools.x86_64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.x86_64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.onnxruntime-tools.aarch64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.onnxruntime-tools.x86_64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.aarch64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.x86_64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.onnxruntime-tools.aarch64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.aarch64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.rapidocr-onnxruntime.x86_64-linux

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.rapidocr-onnxruntime.x86_64-linux

Cross platform OCR Library based on OnnxRuntime

pkgs.python311Packages.rapidocr-onnxruntime.x86_64-darwin

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.rapidocr-onnxruntime.x86_64-darwin

Cross platform OCR Library based on OnnxRuntime

pkgs.python311Packages.rapidocr-onnxruntime.aarch64-darwin

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.rapidocr-onnxruntime.aarch64-darwin

Cross platform OCR Library based on OnnxRuntime
Notify package maintainers: 6
CVE-2024-25581
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Transfer requests received over DoH can lead to a denial of service in DNSdist

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

dnsdist
==1.9.2
==1.9.3
==1.9.1
==1.9.0
Notify package maintainers: 1
CVE-2023-50943
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Apache Airflow: Potential pickle deserialization vulnerability in XComs

Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.

apache-airflow
<2.8.1

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2022-4967
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass …

strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity supplied by a client is not enforced to be contained in the client's certificate. So clients can authenticate with any trusted certificate and claim an arbitrary IKE/EAP identity as their own. This is problematic if the identity is used to make policy decisions. A fix was released in strongSwan version 5.9.6 in August 2022 (e4b4aabc4996fc61c37deab7858d07bc4d220136).

strongswan
<5.9.6

pkgs.networkmanager_strongswan.x86_64-linux

NetworkManager's strongswan plugin

pkgs.networkmanager_strongswan.aarch64-linux

NetworkManager's strongswan plugin
CVE-2024-25583
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Crafted responses can lead to a denial of service in Recursor if recursive forwarding is configured

A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.

pdns-recursor
==4.9.4
==5.0.3
==4.8.7
Notify package maintainers: 1
CVE-2022-4510
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Path Traversal in binwalk

A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through 2.3.3 included.

binwalk
=<2.3.3

pkgs.binwalk.x86_64-linux

Tool for searching a given binary image for embedded files

pkgs.binwalk.aarch64-linux

Tool for searching a given binary image for embedded files

pkgs.binwalk.x86_64-darwin

Tool for searching a given binary image for embedded files

pkgs.binwalk.aarch64-darwin

Tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk

A tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk

Tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk-full

Tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk-full

Tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk.x86_64-linux

A tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk.x86_64-linux

Tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk.aarch64-linux

A tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk.x86_64-darwin

A tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk.aarch64-linux

Tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk.x86_64-darwin

Tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk.aarch64-darwin

A tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk.aarch64-darwin

Tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk-full.x86_64-linux

A tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk-full.x86_64-linux

Tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk-full.aarch64-linux

A tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk-full.x86_64-darwin

A tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk-full.aarch64-linux

Tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk-full.x86_64-darwin

Tool for searching a given binary image for embedded files

pkgs.python311Packages.binwalk-full.aarch64-darwin

A tool for searching a given binary image for embedded files

pkgs.python312Packages.binwalk-full.aarch64-darwin

Tool for searching a given binary image for embedded files
Notify package maintainers: 1
CVE-2023-47037 created 4 months, 2 weeks ago
Apache Airflow missing fix for CVE-2023-40611 in 2.7.1 (DAG run broken access)

We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then.  Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.  Users should upgrade to version 2.7.3 or later which has removed the vulnerability.

apache-airflow
<2.7.3

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2023-2680
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Dma reentrancy issue (incomplete fix for cve-2021-3750)

This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750.

qemu
qemu-kvm
qemu-kvm-ma
qemu-kvm-rhev
virt:av/qemu-kvm
virt:rhel/qemu-kvm

pkgs.qemu_xen

Generic and open source machine emulator and virtualizer

pkgs.qemu-user

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu-utils

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15

A generic and open source machine emulator and virtualizer

pkgs.qemu.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15-light

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu-user.x86_64-linux

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu_full.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu-user.aarch64-linux

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu-utils.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15-light.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.armTrustedFirmwareQemu.aarch64-linux

A reference implementation of secure world software for ARMv8-A
Notify package maintainers: 12
CVE-2023-32627
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Floating point exception in src/voc.c

A floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service.

sox

pkgs.haskellPackages.sox.x86_64-linux

Play, write, read, convert audio signals using Sox

pkgs.haskellPackages.sox.aarch64-linux

Play, write, read, convert audio signals using Sox

pkgs.haskellPackages.sox.x86_64-darwin

Play, write, read, convert audio signals using Sox

pkgs.haskellPackages.sox.aarch64-darwin

Play, write, read, convert audio signals using Sox

pkgs.haskellPackages.soxlib.x86_64-linux

Write, read, convert audio signals using libsox

pkgs.haskellPackages.soxlib.aarch64-linux

Write, read, convert audio signals using libsox

pkgs.haskellPackages.soxlib.x86_64-darwin

Write, read, convert audio signals using libsox

pkgs.haskellPackages.soxlib.aarch64-darwin

Write, read, convert audio signals using libsox

pkgs.haskellPackages.word-note-sox.x86_64-linux

SoX for algorithmic composition with groups of notes liken to words

pkgs.haskellPackages.word-note-sox.aarch64-linux

SoX for algorithmic composition with groups of notes liken to words

pkgs.haskellPackages.word-note-sox.x86_64-darwin

SoX for algorithmic composition with groups of notes liken to words

pkgs.haskellPackages.word-note-sox.aarch64-darwin

SoX for algorithmic composition with groups of notes liken to words
Notify package maintainers: 4
CVE-2023-3301
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Triggerable assertion due to race condition in hot-unplug

A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.

qemu
qemu-kvm
qemu-kvm-ma
qemu-kvm-rhev
virt:av/qemu-kvm
virt:rhel/qemu-kvm

pkgs.qemu_xen

Generic and open source machine emulator and virtualizer

pkgs.qemu-user

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu-utils

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15

A generic and open source machine emulator and virtualizer

pkgs.qemu.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15-light

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu-user.x86_64-linux

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu_full.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu-user.aarch64-linux

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu-utils.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.aarch64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.x86_64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_full.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_test.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu-utils.aarch64-darwin

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.qemu_xen_4_15-light.x86_64-linux

A generic and open source machine emulator and virtualizer

pkgs.armTrustedFirmwareQemu.aarch64-linux

A reference implementation of secure world software for ARMv8-A
Notify package maintainers: 12