Untriaged
Permalink
CVE-2025-52643
4.7 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): HIGH
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
HCL AION is affected by a vulnerability where untrusted file parsing operations are not executed within a properly isolated sandbox environment
HCL AION is affected by a vulnerability where untrusted file parsing operations are not executed within a properly isolated sandbox environment. This may expose the application to potential security risks, including unintended behaviour or integrity impact when processing specially crafted files.
Affected products
AION
- ==2.0
Matching in nixpkgs
pkgs.python312Packages.aionut
Asyncio Network UPS Tools
pkgs.python313Packages.aionut
Asyncio Network UPS Tools
pkgs.python314Packages.aionut
Asyncio Network UPS Tools
pkgs.python312Packages.aiontfy
Async ntfy client library
pkgs.python313Packages.aiontfy
Async ntfy client library
pkgs.python314Packages.aiontfy
Async ntfy client library
pkgs.python312Packages.aionotion
Python library for Notion Home Monitoring
pkgs.python313Packages.aionotion
Python library for Notion Home Monitoring
pkgs.python314Packages.aionotion
Python library for Notion Home Monitoring
pkgs.python312Packages.aionanoleaf
Python wrapper for the Nanoleaf API
pkgs.python313Packages.aionanoleaf
Python wrapper for the Nanoleaf API
pkgs.python314Packages.aionanoleaf
Python wrapper for the Nanoleaf API
pkgs.python312Packages.electrum-aionostr
Asyncio nostr client
pkgs.python313Packages.electrum-aionostr
Asyncio nostr client
pkgs.python314Packages.electrum-aionostr
Asyncio nostr client
Package maintainers
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>
-
@dotlambda ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 <nix@dotlambda.de>