⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2023-25041
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 7 months, 2 weeks ago
WordPress Monolit Theme <= 2.0.6 is vulnerable to Cross Site Scripting (XSS)

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Cththemes Monolit theme <= 2.0.6 versions.

monolit
=<2.0.6

pkgs.monolith

Bundle any web page into a single HTML file
Package maintainers: 1
CVE-2022-47613
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 7 months, 2 weeks ago
WordPress AI ChatBot Plugin <= 4.3.0 is vulnerable to Cross Site Scripting (XSS)

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in QuantumCloud AI ChatBot plugin <= 4.3.0 versions.

chatbot
=<4.3.0
CVE-2023-5156
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 7 months, 2 weeks ago
Glibc: dos due to memory leak in getaddrinfo.c

A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

glibc
compat-glibc

pkgs.glibc

GNU C Library

pkgs.mtrace

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

pkgs.glibcLocales

Locale information for the GNU C Library

pkgs.glibcLocalesUtf8

Locale information for the GNU C Library

pkgs.locale.x86_64-linux

pkgs.locale.aarch64-linux

pkgs.libiconv.x86_64-linux

pkgs.libiconv.aarch64-linux

Package maintainers: 2
CVE-2023-1907
8.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 7 months, 2 weeks ago
Pgadmin: users authenticated simultaneously via ldap may be attached to the wrong session

A vulnerability was found in pgadmin. Users logging into pgAdmin running in server mode using LDAP authentication may be attached to another user's session if multiple connection attempts occur simultaneously.

pgadmin
<7.0

pkgs.pgadmin4

Administration and development platform for PostgreSQL

pkgs.pgadmin4-desktopmode

Administration and development platform for PostgreSQL. Desktop Mode

pkgs.pgadmin4.x86_64-linux

Administration and development platform for PostgreSQL

pkgs.pgadmin4.aarch64-linux

Administration and development platform for PostgreSQL

pkgs.pgadmin4.x86_64-darwin

Administration and development platform for PostgreSQL

pkgs.pgadmin4.aarch64-darwin

Administration and development platform for PostgreSQL

pkgs.pgadmin4-desktopmode.x86_64-linux

Administration and development platform for PostgreSQL. Desktop Mode

pkgs.pgadmin4-desktopmode.aarch64-linux

Administration and development platform for PostgreSQL. Desktop Mode

pkgs.pgadmin4-desktopmode.x86_64-darwin

Administration and development platform for PostgreSQL. Desktop Mode

pkgs.pgadmin4-desktopmode.aarch64-darwin

Administration and development platform for PostgreSQL. Desktop Mode
Package maintainers: 1
CVE-2024-56826
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 7 months, 2 weeks ago
Openjpeg: heap buffer overflow in bin/common/color.c

A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior.

openjpeg
*
openjpeg2
*
gimp:flatpak/openjpeg2

pkgs.openjpeg

Open-source JPEG 2000 codec written in C language

pkgs.python311Packages.pylibjpeg-openjpeg

A J2K and JP2 plugin for pylibjpeg

pkgs.python312Packages.pylibjpeg-openjpeg

A J2K and JP2 plugin for pylibjpeg

pkgs.python312Packages.pylibjpeg-openjpeg.x86_64-linux

A J2K and JP2 plugin for pylibjpeg
Package maintainers: 2
CVE-2022-47183
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 7 months, 2 weeks ago
WordPress Extra Block Design, Style, CSS for ANY Gutenberg Blocks Plugin <= 0.2.6 is vulnerable to Cross Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF) vulnerability in StylistWP Extra Block Design, Style, CSS for ANY Gutenberg Blocks plugin <= 0.2.6 versions.

stylist
=<0.2.6

pkgs.haskellPackages.stylist-traits

Traits, datatypes, & parsers for Haskell Stylist
CVE-2023-23668
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 7 months, 2 weeks ago
WordPress GiveWP Plugin <= 2.25.1 is vulnerable to Cross Site Scripting (XSS)

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in GiveWP plugin <= 2.25.1 versions.

give
=<2.25.1
CVE-2024-56827
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 7 months, 2 weeks ago
Openjpeg: heap buffer overflow in lib/openjp2/j2k.c

A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior.

openjpeg
*
openjpeg2
*
gimp:flatpak/openjpeg2

pkgs.openjpeg

Open-source JPEG 2000 codec written in C language

pkgs.python311Packages.pylibjpeg-openjpeg

A J2K and JP2 plugin for pylibjpeg

pkgs.python312Packages.pylibjpeg-openjpeg

A J2K and JP2 plugin for pylibjpeg

pkgs.python312Packages.pylibjpeg-openjpeg.x86_64-linux

A J2K and JP2 plugin for pylibjpeg
Package maintainers: 2
CVE-2024-7006
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 7 months, 2 weeks ago
Libtiff: null pointer dereference in tif_dirinfo.c

A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.

libtiff
*
==4.0.9
==4.4.0

pkgs.libtiff

Library and utilities for working with the TIFF image file format

pkgs.libtiff.x86_64-linux

Library and utilities for working with the TIFF image file format

pkgs.libtiff.aarch64-linux

Library and utilities for working with the TIFF image file format

pkgs.libtiff.x86_64-darwin

Library and utilities for working with the TIFF image file format

pkgs.libtiff.aarch64-darwin

Library and utilities for working with the TIFF image file format
Package maintainers: 7
CVE-2022-47161
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 7 months, 3 weeks ago
WordPress Health Check & Troubleshooting Plugin <= 1.5.1 is vulnerable to Cross Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF) vulnerability in The WordPress.Org community Health Check & Troubleshooting plugin <= 1.5.1 versions.

health-check
=<1.5.1

pkgs.grpc-health-check

Minimal, high performance, memory-friendly, safe implementation of the gRPC health checking protocol

pkgs.python311Packages.django-health-check

Pluggable app that runs a full check on the deployment

pkgs.python312Packages.django-health-check

Pluggable app that runs a full check on the deployment

pkgs.rubyPackages.github-pages-health-check

pkgs.python311Packages.grpcio-health-checking

Standard Health Checking Service for gRPC

pkgs.python312Packages.grpcio-health-checking

Standard Health Checking Service for gRPC

pkgs.rubyPackages_3_1.github-pages-health-check

pkgs.rubyPackages_3_2.github-pages-health-check

pkgs.rubyPackages_3_3.github-pages-health-check

pkgs.rubyPackages_3_4.github-pages-health-check

pkgs.python312Packages.grpcio-health-checking.x86_64-linux

Standard Health Checking Service for gRPC

pkgs.python312Packages.grpcio-health-checking.aarch64-linux

Standard Health Checking Service for gRPC

pkgs.python312Packages.grpcio-health-checking.x86_64-darwin

Standard Health Checking Service for gRPC

pkgs.python312Packages.grpcio-health-checking.aarch64-darwin

Standard Health Checking Service for gRPC

pkgs.rubyPackages_3_1.github-pages-health-check.x86_64-linux

pkgs.rubyPackages_3_2.github-pages-health-check.x86_64-linux

pkgs.rubyPackages_3_3.github-pages-health-check.x86_64-linux

pkgs.rubyPackages_3_4.github-pages-health-check.x86_64-linux

pkgs.rubyPackages_3_1.github-pages-health-check.aarch64-linux

pkgs.rubyPackages_3_1.github-pages-health-check.x86_64-darwin

pkgs.rubyPackages_3_2.github-pages-health-check.aarch64-linux

pkgs.rubyPackages_3_2.github-pages-health-check.x86_64-darwin

pkgs.rubyPackages_3_3.github-pages-health-check.aarch64-linux

pkgs.rubyPackages_3_3.github-pages-health-check.x86_64-darwin

pkgs.rubyPackages_3_4.github-pages-health-check.aarch64-linux

pkgs.rubyPackages_3_4.github-pages-health-check.x86_64-darwin

pkgs.rubyPackages_3_1.github-pages-health-check.aarch64-darwin

pkgs.rubyPackages_3_2.github-pages-health-check.aarch64-darwin

pkgs.rubyPackages_3_3.github-pages-health-check.aarch64-darwin

pkgs.rubyPackages_3_4.github-pages-health-check.aarch64-darwin

Package maintainers: 4