⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2023-52204
8.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 2 months, 1 week ago
WordPress Randomize Plugin <= 1.4.3 is vulnerable to SQL Injection

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Javik Randomize.This issue affects Randomize: from n/a through 1.4.3.

randomize
=<1.4.3
CVE-2025-49179
6.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 2 months, 1 week ago
Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in x record extension

A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks.

tigervnc
*
xorg-x11-server
*
xorg-x11-server-Xwayland
*
CVE-2023-43788
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 1 week ago
Libxpm: out of bounds read in xpmcreatexpmimagefrombuffer()

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.

motif
*
libXpm
*
<3.5.17

pkgs.motif.x86_64-linux

Unix standard widget-toolkit and window-manager

pkgs.motif.aarch64-linux

Unix standard widget-toolkit and window-manager

pkgs.motif.x86_64-darwin

Unix standard widget-toolkit and window-manager

pkgs.motif.aarch64-darwin

Unix standard widget-toolkit and window-manager

pkgs.tests.pkg-config.defaultPkgConfigPackages.xpm

Test whether libXpm-3.5.17 exposes pkg-config modules xpm
  • nixos-25.05 ???
    • nixpkgs-25.05-darwin
    • nixos-25.05-small
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable
Package maintainers: 1
CVE-2024-22050
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 1 week ago
Iodine Static File Server Path Traversal Vulnerability

Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.

iodine
<0.7.33

pkgs.iodine.x86_64-linux

Tool to tunnel IPv4 data through a DNS server
Package maintainers: 3
CVE-2025-49794
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 1 week ago
Libxml: heap use after free (uaf) leads to denial of service (dos)

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

libxml2
*
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
*

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.13.8 exposes pkg-config modules libxml-2.0
Package maintainers: 6
CVE-2025-49796
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 1 week ago
Libxml: type confusion leads to denial of service (dos)

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

libxml2
*
registry.redhat.io/discovery/discovery-server-rhel9
*
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
*

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.13.8 exposes pkg-config modules libxml-2.0
Package maintainers: 6
CVE-2025-6170
2.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 2 months, 1 week ago
Libxml2: stack buffer overflow in xmllint interactive shell command handling

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

rhcos
libxml2

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.13.8 exposes pkg-config modules libxml-2.0
Package maintainers: 6
CVE-2025-49795
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 1 week ago
Libxml: null pointer dereference leads to denial of service (dos)

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

libxml2
*

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.13.8 exposes pkg-config modules libxml-2.0
Package maintainers: 6
CVE-2025-6052
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 2 months, 2 weeks ago
Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring

A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.

bootc
glib2
loupe
librsvg2
rpm-ostree
mingw-glib2
glycin-loaders

pkgs.loupe

Simple image viewer application written with GTK4 and Rust

pkgs.rpm-ostree

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.systemd-bootchart

Boot performance graphing tool from systemd

pkgs.loupe.x86_64-linux

Simple image viewer application written with GTK4 and Rust

pkgs.loupe.aarch64-linux

Simple image viewer application written with GTK4 and Rust

pkgs.rpm-ostree.x86_64-linux

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.rpm-ostree.aarch64-linux

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.rubyPackages_3_1.glib2.x86_64-linux

pkgs.rubyPackages_3_2.glib2.x86_64-linux

pkgs.rubyPackages_3_3.glib2.x86_64-linux

pkgs.rubyPackages_3_4.glib2.x86_64-linux

pkgs.rubyPackages_3_1.glib2.aarch64-linux

pkgs.rubyPackages_3_1.glib2.x86_64-darwin

pkgs.rubyPackages_3_2.glib2.aarch64-linux

pkgs.rubyPackages_3_2.glib2.x86_64-darwin

pkgs.rubyPackages_3_3.glib2.aarch64-linux

pkgs.rubyPackages_3_3.glib2.x86_64-darwin

pkgs.rubyPackages_3_4.glib2.aarch64-linux

pkgs.rubyPackages_3_4.glib2.x86_64-darwin

pkgs.rubyPackages_3_1.glib2.aarch64-darwin

pkgs.rubyPackages_3_2.glib2.aarch64-darwin

pkgs.rubyPackages_3_3.glib2.aarch64-darwin

pkgs.rubyPackages_3_4.glib2.aarch64-darwin

Package maintainers: 10
CVE-2025-6021
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 2 weeks ago
Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

rhcos
*
libxml2
*
registry.redhat.io/discovery/discovery-server-rhel9
*
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
*

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C
Package maintainers: 1