Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-53785
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 1 month, 2 weeks ago
WordPress Chatter plugin <= 1.0.1 - Broken Access Control vulnerability

Missing Authorization vulnerability in Alexander Volkov Chatter.This issue affects Chatter: from n/a through 1.0.1.

chatter
=<1.0.1

pkgs.chatterino2

Chat client for Twitch chat

pkgs.chatterino7

Chat client for Twitch chat

pkgs.haskellPackages.chatter

A library of simple NLP algorithms

pkgs.typstPackages.chatter_0_1_0

Write dialog between any number of characters quickly and cleanly. Great for translations or short assignments
Package maintainers: 4
CVE-2024-10270
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month, 2 weeks ago
Org.keycloak:keycloak-services: keycloak denial of service

A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.

keycloak
<26.0.6
<24.0.9
rhbk/keycloak-rhel9
*
rhbk/keycloak-rhel9-operator
*
rhbk/keycloak-operator-bundle
*
org.keycloak/keycloak-services

pkgs.keycloak

Identity and access management for modern applications and services

pkgs.terraform-providers.keycloak

pkgs.python312Packages.python-keycloak

Provides access to the Keycloak API

pkgs.python313Packages.python-keycloak

Provides access to the Keycloak API
Package maintainers: 4
CVE-2023-4727
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 2 weeks ago
Dogtag ca: token authentication bypass vulnerability

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

keycloak
<11.5.1
pki-core
*
pki-core:10.6
*
redhat-pki:10
*
pki-core:10.6/pki-core
redhat-pki:10/pki-core

pkgs.keycloak

Identity and access management for modern applications and services

pkgs.terraform-providers.keycloak

pkgs.python312Packages.python-keycloak

Provides access to the Keycloak API

pkgs.python313Packages.python-keycloak

Provides access to the Keycloak API
Package maintainers: 4
CVE-2024-11738
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 month, 2 weeks ago
Rustls: rustls network-reachable panic in `acceptor::accept`

A flaw was found in Rustls 0.23.13 and related APIs. This vulnerability allows denial of service (panic) via a fragmented TLS ClientHello message.

rustls
<0.23.18
rhtas/tuffer-rhel9
rhtas/tuftool-rhel9

pkgs.rustls-ffi

C-to-rustls bindings

pkgs.rustls-libssl

Partial reimplementation of the OpenSSL 3 libssl ABI using rustls
Package maintainers: 3
CVE-2024-10492 created 1 month, 2 weeks ago
Keycloak-quarkus-server: keycloak path trasversal

A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.

keycloak
<26.0.6
rhbk/keycloak-rhel9
*
rhbk/keycloak-rhel9-operator
*
rhbk/keycloak-operator-bundle
*
org.keycloak/keycloak-quarkus-server

pkgs.keycloak

Identity and access management for modern applications and services

pkgs.terraform-providers.keycloak

pkgs.python312Packages.python-keycloak

Provides access to the Keycloak API

pkgs.python313Packages.python-keycloak

Provides access to the Keycloak API
Package maintainers: 4
CVE-2024-6156
3.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 month, 2 weeks ago
Mark Laing discovered that LXD's PKI mode, until version 5.21.2, …

Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.

lxd
<4.0.10
<5.0.4
<6.1
<5.21.2

pkgs.lxd-image-server

Creates and manages a simplestreams lxd image server on top of nginx

pkgs.python312Packages.pylxd

Library for interacting with the LXD REST API

pkgs.python313Packages.pylxd

Library for interacting with the LXD REST API

pkgs.terraform-providers.lxd

Package maintainers: 1
CVE-2024-6219
3.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 month, 2 weeks ago
Mark Laing discovered in LXD's PKI mode, until version 5.21.1, …

Mark Laing discovered in LXD's PKI mode, until version 5.21.1, that a restricted certificate could be added to the trust store with its restrictions not honoured.

lxd
<5.21.1

pkgs.lxd-image-server

Creates and manages a simplestreams lxd image server on top of nginx

pkgs.python312Packages.pylxd

Library for interacting with the LXD REST API

pkgs.python313Packages.pylxd

Library for interacting with the LXD REST API

pkgs.terraform-providers.lxd

Package maintainers: 1
CVE-2024-3656
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 month, 2 weeks ago
Keycloak: unguarded admin rest api endpoints allows low privilege users to use administrative functionalities

A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.

keycloak
<24.0.5
org.keycloak-keycloak-parent

pkgs.keycloak

Identity and access management for modern applications and services

pkgs.terraform-providers.keycloak

pkgs.python312Packages.python-keycloak

Provides access to the Keycloak API

pkgs.python313Packages.python-keycloak

Provides access to the Keycloak API
Package maintainers: 4
CVE-2024-52482
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 1 month, 2 weeks ago
WordPress Ortto plugin <= 1.0.19 - Reflected Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ortto Ortto allows Reflected XSS.This issue affects Ortto: from n/a through 1.0.19.

autopilot
=<1.0.19

pkgs.argocd-autopilot

ArgoCD Autopilot
Package maintainers: 2
CVE-2024-52338
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 2 weeks ago
Apache Arrow R package: Arbitrary code execution when loading a malicious data file

Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example, user-supplied input files). This vulnerability only affects the arrow R package, not other Apache Arrow implementations or bindings unless those bindings are specifically used via the R package (for example, an R application that embeds a Python interpreter and uses PyArrow to read files from untrusted sources is still vulnerable if the arrow R package is an affected version). It is recommended that users of the arrow R package upgrade to 17.0.0 or later. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to arrow 17.0.0 or later. If using an affected version of the package, untrusted data can read into a Table and its internal to_data_frame() method can be used as a workaround (e.g., read_parquet(..., as_data_frame = FALSE)$to_data_frame()). This issue affects the Apache Arrow R package: from 4.0.0 through 16.1.0. Users are recommended to upgrade to version 17.0.0, which fixes the issue.

arrow
=<16.1.0

pkgs.arrow

Game Narrative Design Tool

pkgs.sparrow

Modern desktop Bitcoin wallet application supporting most hardware wallets and built on common standards such as PSBT, with an emphasis on transparency and usability

pkgs.arrow-cpp

Cross-language development platform for in-memory data

pkgs.sparrow3d

Software renderer for different open handhelds like the gp2x, wiz, caanoo and pandora

pkgs.arrow-glib

GLib bindings for Apache Arrow

pkgs.narrowlink

Self-hosted solution to enable secure connectivity between devices across restricted networks like NAT or firewalls

pkgs.kodiPackages.arrow

Better dates & times for Python

pkgs.haskellPackages.arrows

Arrow classes and transformers

pkgs.liberation-sans-narrow

Liberation Sans Narrow Font Family is a replacement for Arial Narrow

pkgs.python312Packages.arrow

Python library for date manipulation

pkgs.python313Packages.arrow

Python library for date manipulation

pkgs.python312Packages.pyarrow

Cross-language development platform for in-memory data

pkgs.python313Packages.pyarrow

Cross-language development platform for in-memory data

pkgs.typstPackages.xarrow_0_1_0

Variable-length arrows in Typst

pkgs.typstPackages.xarrow_0_1_1

Variable-length arrows in Typst

pkgs.typstPackages.xarrow_0_2_0

Variable-length arrows in Typst

pkgs.typstPackages.xarrow_0_3_0

Variable-length arrows in Typst

pkgs.typstPackages.xarrow_0_3_1

Variable-length arrows in Typst

pkgs.haskellPackages.arrow-utils

functions for working with arrows

pkgs.haskellPackages.arrow-extras

Extra functions for Control.Arrow

pkgs.python312Packages.geoarrow-c

Experimental C and C++ implementation of the GeoArrow specification

pkgs.python313Packages.geoarrow-c

Experimental C and C++ implementation of the GeoArrow specification

pkgs.haskellPackages.pattern-arrows

Arrows for Pretty Printing

pkgs.python312Packages.geoarrow-types

PyArrow types for geoarrow

pkgs.python312Packages.pyarrow-hotfix

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.python313Packages.geoarrow-types

PyArrow types for geoarrow

pkgs.python313Packages.pyarrow-hotfix

Hotfix for the PyArrow security vulnerability CVE-2023-47248

pkgs.haskellPackages.profunctor-arrows

Profunctor arrows

pkgs.python312Packages.geoarrow-pandas

Python implementation of the GeoArrow specification

pkgs.python313Packages.geoarrow-pandas

Python implementation of the GeoArrow specification

pkgs.python312Packages.geoarrow-pyarrow

PyArrow implementation of geospatial data types

pkgs.python313Packages.geoarrow-pyarrow

PyArrow implementation of geospatial data types
Package maintainers: 35