⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-27318
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Versions of the package onnx before and including 1.15.0 are …

Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.

onnx
=<1.15.0

pkgs.python311Packages.tf2onnx

Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX

pkgs.python311Packages.onnxruntime

Cross-platform, high performance scoring engine for ML models

pkgs.python311Packages.onnxruntime-tools

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.rapidocr-onnxruntime

Cross platform OCR Library based on OnnxRuntime

pkgs.python311Packages.tf2onnx.x86_64-linux

Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX

pkgs.python311Packages.tf2onnx.aarch64-linux

Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX

pkgs.python312Packages.onnxruntime.x86_64-linux

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxruntime.aarch64-linux

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxruntime.x86_64-darwin

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxruntime.aarch64-darwin

Cross-platform, high performance scoring engine for ML models

pkgs.python311Packages.onnxruntime-tools.x86_64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.x86_64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.onnxruntime-tools.aarch64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.onnxruntime-tools.x86_64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.aarch64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.x86_64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.onnxruntime-tools.aarch64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.aarch64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python311Packages.rapidocr-onnxruntime.x86_64-linux

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.rapidocr-onnxruntime.x86_64-linux

Cross platform OCR Library based on OnnxRuntime

pkgs.python311Packages.rapidocr-onnxruntime.x86_64-darwin

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.rapidocr-onnxruntime.x86_64-darwin

Cross platform OCR Library based on OnnxRuntime

pkgs.python311Packages.rapidocr-onnxruntime.aarch64-darwin

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.rapidocr-onnxruntime.aarch64-darwin

Cross platform OCR Library based on OnnxRuntime
Notify package maintainers: 6
CVE-2023-42792 created 4 months, 2 weeks ago
Apache Airflow: Improper access control to DAG resources

Apache Airflow, in versions prior to 2.7.2, contains a security vulnerability that allows an authenticated user with limited access to some DAGs, to craft a request that could give the user write access to various DAG resources for DAGs that the user had no access to, thus, enabling the user to clear DAGs they shouldn't. Users of Apache Airflow are strongly advised to upgrade to version 2.7.2 or newer to mitigate the risk associated with this vulnerability.

apache-airflow
<2.7.2

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2023-38253
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
W3m: out of bounds read in growbuf_to_str() at w3m/indep.c

An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.

w3m
Notify package maintainers: 1
CVE-2023-32629
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip …

Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels

Linux
<6.0.0-1020.20
<5.4.0-155.172
<6.2.0-26.26

pkgs.vibrantlinux

Tool to automate managing your screen's saturation depending on what programs are running

pkgs.perl536Packages.LinuxFD

Linux specific special filehandles

pkgs.perl540Packages.LinuxFD

Linux specific special filehandles

pkgs.perl536Packages.LinuxACL

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.perl538Packages.LinuxACL

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.perl540Packages.LinuxACL

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.vibrantlinux.x86_64-linux

A tool to automate managing your screen's saturation depending on what programs are running

pkgs.vibrantlinux.aarch64-linux

A tool to automate managing your screen's saturation depending on what programs are running

pkgs.perl536Packages.Linuxusermod

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl538Packages.Linuxusermod

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl540Packages.Linuxusermod

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl536Packages.LinuxDesktopFiles

Fast parsing of the Linux desktop files

pkgs.perl536Packages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perl538Packages.LinuxDesktopFiles

Fast parsing of the Linux desktop files

pkgs.perl538Packages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perl540Packages.LinuxDesktopFiles

Fast parsing of the Linux desktop files

pkgs.perl540Packages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perl536Packages.LinuxFD.x86_64-linux

Linux specific special filehandles

pkgs.perl540Packages.LinuxFD.x86_64-linux

Linux specific special filehandles

pkgs.samsung-unified-linux-driver_4_01_17

Samsung's Linux printing drivers; includes binaries without source code

pkgs.perl536Packages.LinuxACL.x86_64-linux

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.perl536Packages.LinuxFD.aarch64-linux

Linux specific special filehandles

pkgs.perl538Packages.LinuxACL.x86_64-linux

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.perl540Packages.LinuxACL.x86_64-linux

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.perl540Packages.LinuxFD.aarch64-linux

Linux specific special filehandles

pkgs.perl536Packages.LinuxACL.aarch64-linux

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.perl538Packages.LinuxACL.aarch64-linux

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.perl540Packages.LinuxACL.aarch64-linux

Perl extension for reading and setting Access Control Lists for files by libacl linux library

pkgs.perl536Packages.Linuxusermod.x86_64-linux

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl538Packages.Linuxusermod.x86_64-linux

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl540Packages.Linuxusermod.x86_64-linux

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl536Packages.LinuxInotify2.x86_64-linux

Scalable directory/file change notification for Perl on Linux

pkgs.perl536Packages.Linuxusermod.aarch64-linux

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl538Packages.Linuxusermod.aarch64-linux

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl540Packages.Linuxusermod.aarch64-linux

This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax

pkgs.perl536Packages.LinuxInotify2.aarch64-linux

Scalable directory/file change notification for Perl on Linux

pkgs.perl536Packages.LinuxDesktopFiles.x86_64-linux

Fast parsing of the Linux desktop files

pkgs.perl536Packages.LinuxDistribution.x86_64-linux

Perl extension to detect on which Linux distribution we are running

pkgs.perl538Packages.LinuxDesktopFiles.x86_64-linux

Fast parsing of the Linux desktop files

pkgs.perl538Packages.LinuxDistribution.x86_64-linux

Perl extension to detect on which Linux distribution we are running

pkgs.perl540Packages.LinuxDesktopFiles.x86_64-linux

Fast parsing of the Linux desktop files

pkgs.perl540Packages.LinuxDistribution.x86_64-linux

Perl extension to detect on which Linux distribution we are running

pkgs.perl536Packages.LinuxDesktopFiles.aarch64-linux

Fast parsing of the Linux desktop files

pkgs.perl536Packages.LinuxDesktopFiles.x86_64-darwin

Fast parsing of the Linux desktop files

pkgs.perl536Packages.LinuxDistribution.aarch64-linux

Perl extension to detect on which Linux distribution we are running

pkgs.perl538Packages.LinuxDesktopFiles.aarch64-linux

Fast parsing of the Linux desktop files

pkgs.perl538Packages.LinuxDesktopFiles.x86_64-darwin

Fast parsing of the Linux desktop files

pkgs.perl538Packages.LinuxDistribution.aarch64-linux

Perl extension to detect on which Linux distribution we are running

pkgs.perl540Packages.LinuxDesktopFiles.aarch64-linux

Fast parsing of the Linux desktop files

pkgs.perl540Packages.LinuxDesktopFiles.x86_64-darwin

Fast parsing of the Linux desktop files

pkgs.perl540Packages.LinuxDistribution.aarch64-linux

Perl extension to detect on which Linux distribution we are running

pkgs.perl536Packages.LinuxDesktopFiles.aarch64-darwin

Fast parsing of the Linux desktop files

pkgs.perl538Packages.LinuxDesktopFiles.aarch64-darwin

Fast parsing of the Linux desktop files

pkgs.perl540Packages.LinuxDesktopFiles.aarch64-darwin

Fast parsing of the Linux desktop files

pkgs.samsung-unified-linux-driver_4_01_17.x86_64-linux

Samsung's Linux printing drivers; includes binaries without source code

pkgs.samsung-unified-linux-driver_4_01_17.aarch64-linux

Samsung's Linux printing drivers; includes binaries without source code
Notify package maintainers: 6
CVE-2023-7207
4.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Debian's cpio contains a path traversal vulnerability. This issue was …

Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.

cpio
<2.14+dfsg-1

pkgs.cpio.x86_64-linux

A program to create or extract from cpio archives

pkgs.cpio.aarch64-linux

A program to create or extract from cpio archives

pkgs.cpio.x86_64-darwin

A program to create or extract from cpio archives

pkgs.cpio.aarch64-darwin

A program to create or extract from cpio archives

pkgs.mkinitcpio-nfs-utils

ipconfig and nfsmount tools for root on NFS, ported from klibc

pkgs.mkinitcpio-nfs-utils.x86_64-linux

ipconfig and nfsmount tools for root on NFS, ported from klibc

pkgs.mkinitcpio-nfs-utils.aarch64-linux

ipconfig and nfsmount tools for root on NFS, ported from klibc
Notify package maintainers: 1
CVE-2024-31869
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Apache Airflow: Sensitive configuration for providers displayed when "non-sensitive-only" config used

Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.

apache-airflow
=<2.8.4

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2023-46215
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Apache Airflow Celery provider, Apache Airflow: Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend

Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow. Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend Note: the vulnerability is about the information exposed in the logs not about accessing the logs. This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3. Users are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue.

apache-airflow
<2.7.0
apache-airflow-providers-celery
=<3.4.0

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2024-32077
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Apache Airflow: XSS vulnerability in Task Instance Log/Log Details

Apache Airflow version 2.9.0 has a vulnerability that allows an authenticated attacker to inject malicious data into the task instance logs.  Users are recommended to upgrade to version 2.9.1, which fixes this issue.

apache-airflow
<2.9.1

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2023-3966
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Openvswsitch: ovs-vswitch fails to recover after malformed geneve metadata packet

A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.

openvswitch
openvswitch3.0
openvswitch3.1
openvswitch3.2
openvswitch2.10
openvswitch2.11
openvswitch2.12
openvswitch2.13
openvswitch2.15
openvswitch2.16
openvswitch2.17
rdo-openvswitch
openvswitch-ovn-kubernetes

pkgs.openvswitch-lts

A multilayer virtual switch

pkgs.openvswitch-lts.x86_64-linux

A multilayer virtual switch

pkgs.openvswitch-dpdk.x86_64-linux

Multilayer virtual switch

pkgs.openvswitch-lts.aarch64-linux

A multilayer virtual switch

pkgs.openvswitch-dpdk.aarch64-linux

Multilayer virtual switch
Notify package maintainers: 4
CVE-2024-26280
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 4 months, 2 weeks ago
Apache Airflow: Overly broad default permissions for Viewer/Ops (audit logs)

Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops and Viewers users to view all information on audit logs, including dag names and usernames they were not permitted to view. With 2.8.2 and newer, Ops and Viewer users do not have audit log permission by default, they need to be explicitly granted permissions to see the logs. Only admin users have audit log permission by default. Users of Apache Airflow are recommended to upgrade to version 2.8.2 or newer to mitigate the risk associated with this vulnerability

apache-airflow
<2.8.2

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3