Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2019-25371
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    6 packages
    • prometheus-opnsense-exporter
    • python312Packages.pyopnsense
    • python313Packages.pyopnsense
    • python314Packages.pyopnsense
    • home-assistant-component-tests.opnsense
    • tests.home-assistant-component-tests.opnsense
  • @jopejoe1 dismissed
OPNsense 19.1 Reflected XSS via diag_ping.php

OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by exploiting insufficient input validation in the host parameter. Attackers can submit crafted POST requests to the diag_ping.php endpoint with script payloads in the host parameter to execute arbitrary JavaScript in users' browsers.

Affected products

OPNsense
  • ==19.1
Not present in nixpkgs
Permalink CVE-2019-25370
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    6 packages
    • prometheus-opnsense-exporter
    • python312Packages.pyopnsense
    • python313Packages.pyopnsense
    • python314Packages.pyopnsense
    • home-assistant-component-tests.opnsense
    • tests.home-assistant-component-tests.opnsense
  • @jopejoe1 dismissed
OPNsense 19.1 Reflected XSS via interfaces_vlan_edit.php

OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by submitting crafted input through multiple parameters. Attackers can send POST requests to interfaces_vlan_edit.php with script payloads in the tag, descr, or vlanif parameters to execute arbitrary JavaScript in users' browsers.

Affected products

OPNsense
  • ==19.1
Not present in nixpkgs
Permalink CVE-2019-25376
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    6 packages
    • prometheus-opnsense-exporter
    • python312Packages.pyopnsense
    • python313Packages.pyopnsense
    • python314Packages.pyopnsense
    • home-assistant-component-tests.opnsense
    • tests.home-assistant-component-tests.opnsense
  • @jopejoe1 dismissed
OPNsense 19.1 Reflected XSS via proxy endpoint

OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by submitting crafted payloads through the ignoreLogACL parameter. Attackers can send POST requests to the proxy endpoint with JavaScript code in the ignoreLogACL parameter to execute arbitrary scripts in users' browsers.

Affected products

OPNsense
  • ==19.1
Not present in nixpkgs
Permalink CVE-2019-25369
6.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    6 packages
    • prometheus-opnsense-exporter
    • python312Packages.pyopnsense
    • python313Packages.pyopnsense
    • python314Packages.pyopnsense
    • home-assistant-component-tests.opnsense
    • tests.home-assistant-component-tests.opnsense
  • @jopejoe1 dismissed
OPNsense 19.1 Stored XSS via system_advanced_sysctl.php

OPNsense 19.1 contains a stored cross-site scripting vulnerability in the system_advanced_sysctl.php endpoint that allows attackers to inject persistent malicious scripts via the tunable parameter. Attackers can submit POST requests with script payloads that are stored and executed in the context of authenticated user sessions when the page is viewed.

Affected products

OPNsense
  • ==19.1
Not present in nixpkgs
Permalink CVE-2019-25374
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    6 packages
    • prometheus-opnsense-exporter
    • python312Packages.pyopnsense
    • python314Packages.pyopnsense
    • home-assistant-component-tests.opnsense
    • python313Packages.pyopnsense
    • tests.home-assistant-component-tests.opnsense
  • @jopejoe1 dismissed
OPNsense 19.1 Reflected XSS via vpn_ipsec_settings.php

OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by exploiting the passthrough_networks parameter in vpn_ipsec_settings.php. Attackers can craft POST requests with JavaScript payloads in the passthrough_networks parameter to execute arbitrary code in users' browsers.

Affected products

OPNsense
  • ==19.1
Not present in nixpkgs
Permalink CVE-2023-52356
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
Libtiff: segment fault in libtiff in tiffreadrgbatileext() leading to denial of service

A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.

References

Affected products

iv
tkimg
libtiff
  • *
  • <4.6.0
mingw-libtiff
compat-libtiff3
rhaiis/vllm-cuda-rhel9
  • *
rhaiis/vllm-rocm-rhel9
  • *
rhaiis/model-opt-cuda-rhel9
  • *
discovery/discovery-ui-rhel9
  • *

Matching in nixpkgs

Package maintainers

Never impacted stable branch: https://github.com/NixOS/nixpkgs/commit/7df6d10570c4c8c6c4b93640d928c099833389bf
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.pan-os-python
    • python313Packages.pan-os-python
    • python314Packages.pan-os-python
  • @LeSuisse dismissed
PAN-OS: Improper Validation of Terminal Server Agent Certificate

An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server Agents on Windows to PAN-OS using expired certificates even if the PAN-OS configuration would not normally permit them to do so.

Affected products

PAN-OS
  • <11.1.11
  • <11.2.8
  • <10.2.17
  • <11.2.8
Cloud NGFW
  • ==All
Prisma Access
  • <10.2.10-h28
Not present in nixpkgs
Permalink CVE-2025-48503
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    16 packages
    • jsonplaceholder
    • haskellPackages.placeholder
    • haskellPackages.placeholders
    • nodePackages.jsonplaceholder
    • haskellPackages.lambda-placeholders
    • nodePackages_latest.jsonplaceholder
    • perlPackages.LocaleUtilsPlaceholderNamed
    • perl538Packages.LocaleUtilsPlaceholderNamed
    • perl540Packages.LocaleUtilsPlaceholderNamed
    • perlPackages.LocaleUtilsPlaceholderMaketext
    • perlPackages.LocaleUtilsPlaceholderBabelFish
    • perl538Packages.LocaleUtilsPlaceholderMaketext
    • perl540Packages.LocaleUtilsPlaceholderMaketext
    • perl538Packages.LocaleUtilsPlaceholderBabelFish
    • perl540Packages.LocaleUtilsPlaceholderBabelFish
    • haskellPackages.postgresql-placeholder-converter
  • @LeSuisse dismissed
A DLL hijacking vulnerability in the AMD Software Installer could …

A DLL hijacking vulnerability in the AMD Software Installer could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

Affected products

Placeholder
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Radeon™ RX 5000 Series Graphics Products
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Radeon™ RX 6000 Series Graphics Products
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Radeon™ RX 7000 Series Graphics Products
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Radeon™ RX 9000 Series Graphics Products
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Radeon™ PRO W5000 Series Graphics Products
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Radeon™ PRO W6000 Series Graphics Products
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Radeon™ PRO W7000 Series Graphics Products
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ AI 300 Series Processors (formerly codenamed "Strix Point")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 4000 Series Desktop Processors (formerly codenamed "Renoir")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 8000 Series Desktop Processors (formerly codenamed "Phoenix")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 9000 Series Desktop Processors (formerly codenamed "Granite Ridge")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"/"Raphael X3D")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"/"Raphael-X3D")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics (formerly codenamed "Mendocino")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dali")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics (formerly codenamed "Rembrandt R")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dali")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Renoir")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Barcelo")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Cezanne")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Phoenix")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Picasso")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics (formerly codenamed "Cezanne")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Lucienne")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Barcelo R")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Hawk Point")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dragon Range")
  • ==amd-software-adrenalin-edition-25.5.1-minimalsetup-250513_web.exe
Not present in nixpkgs / Windows only
Permalink CVE-2026-26014
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    9 packages
    • mbedtls
    • mbedtls_2
    • linphonePackages.bc-mbedtls
    • python312Packages.dtlssocket
    • python313Packages.dtlssocket
    • python314Packages.dtlssocket
    • python312Packages.python-mbedtls
    • python313Packages.python-mbedtls
    • python314Packages.python-mbedtls
  • @LeSuisse dismissed
Pion DTLS uses random nonce generation with AES GCM ciphers risks leaking the authentication key

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack". Upgrade to v3.1.0 or later.

Affected products

dtls
  • ==< 3.1.0
  • === 3.1.0
  • ==< 3.0.11
Not present in nixpkgs
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • perlPackages.SetIntSpan
    • perlPackages.SetInfinite
    • perl538Packages.SetIntSpan
    • perl540Packages.SetIntSpan
    • perl538Packages.SetInfinite
    • perl540Packages.SetInfinite
  • @LeSuisse dismissed
Prototype pollution in set-in

set-in provides the set value of nested associative structure given array of keys. A prototype pollution vulnerability exists in the the npm package set-in (>=2.0.1, < 2.0.5). Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. This has been fixed in version 2.0.5.

Affected products

set-in
  • ==>= 2.0.1, < 2.0.5
Not present in nixpkgs.