Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2025-55018
5.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • terraform-providers.fortios
    • python312Packages.fortiosapi
    • python313Packages.fortiosapi
    • python314Packages.fortiosapi
  • @LeSuisse dismissed
An inconsistent interpretation of http requests ('http request smuggling') vulnerability …

An inconsistent interpretation of http requests ('http request smuggling') vulnerability in Fortinet FortiOS 7.6.0, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4.3 through 6.4.16 may allow an unauthenticated attacker to smuggle an unlogged http request through the firewall policies via a specially crafted header

Affected products

FortiOS
  • =<7.0.19
  • =<7.4.9
  • ==7.6.0
  • =<7.2.13
  • =<6.4.16
Not present in nixpkgs
Permalink CVE-2025-62439
3.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • terraform-providers.fortios
    • python312Packages.fortiosapi
    • python313Packages.fortiosapi
    • python314Packages.fortiosapi
  • @LeSuisse dismissed
An Improper Verification of Source of a Communication Channel vulnerability …

An Improper Verification of Source of a Communication Channel vulnerability [CWE-940] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions may allow an authenticated user with knowledge of FSSO policy configurations to gain unauthorized access to protected network resources via crafted requests.

Affected products

FortiOS
  • =<7.6.4
  • =<7.0.19
  • =<7.2.13
  • =<7.4.9
Not present in nixpkgs
Permalink CVE-2025-27572
4.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • jtdx
    • libkrun-tdx
  • @LeSuisse dismissed
Exposure of sensitive information during transient execution for some TDX …

Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Affected products

TDX
  • ==See references
Not present in nixpkgs
Permalink CVE-2026-22153
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • terraform-providers.fortios
    • python312Packages.fortiosapi
    • python313Packages.fortiosapi
    • python314Packages.fortiosapi
  • @LeSuisse dismissed
An Authentication Bypass by Primary Weakness vulnerability [CWE-305] vulnerability in …

An Authentication Bypass by Primary Weakness vulnerability [CWE-305] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4 may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, when the remote LDAP server is configured in a specific way.

Affected products

FortiOS
  • =<7.6.4
Not present in nixpkgs
Permalink CVE-2025-24477
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • terraform-providers.fortios
    • python312Packages.fortiosapi
    • python313Packages.fortiosapi
    • python314Packages.fortiosapi
  • @LeSuisse dismissed
A heap-based buffer overflow in Fortinet FortiOS versions 7.6.0 through …

A heap-based buffer overflow in Fortinet FortiOS versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2.4 through 7.2.11 allows an attacker to escalate its privileges via a specially crafted CLI command

Affected products

FortiOS
  • =<7.4.7
  • =<7.2.11
  • =<7.6.2
  • =<7.2.12
Not present in nixpkgs
Permalink CVE-2025-62631
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • terraform-providers.fortios
    • python312Packages.fortiosapi
    • python313Packages.fortiosapi
    • python314Packages.fortiosapi
  • @LeSuisse dismissed
An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, …

An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control

Affected products

FortiOS
  • =<7.0.19
  • ==7.4.0
  • =<7.2.11
  • =<7.0.18
  • =<6.4.16
Not present in nixpkgs
Permalink CVE-2025-30033
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package psitransfer
  • @LeSuisse dismissed
The affected setup component is vulnerable to DLL hijacking. This …

The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component.

Affected products

SITRANS
  • *
SINEC NMS
  • <V4.0
CEMAT V10.0
  • *
OpenPCS 7 V9.1
  • *
SIMATIC S7-PCT
  • *
  • <V3.5 SP4 Update 1
SIMATIC Target
  • *
OpenPCS 7 V10.0
  • *
SIMATIC D7-SYS
  • *
SIMATIC PDM V9.2
  • *
SIMATIC PDM V9.3
  • *
  • <V9.3 SP1 Upd2
SIMATIC ODK 1500S
  • *
TIA Administrator
  • <V3.0.6
SIMATIC BATCH V9.1
  • *
SIMATIC Logon V1.6
  • *
SIMATIC Logon V2.0
  • *
  • <V2.0 Upd3
SIMATIC PCS 7 V9.1
  • *
  • <V9.1 SP1 UC08
SIMATIC WinCC V7.5
  • *
SIMATIC WinCC V8.0
  • *
SIMATIC WinCC V8.1
  • <V8.1 Update 3
SIMIT Rapid Tester
  • *
TIA Project-Server
  • *
  • <V2.2
SIMATIC BATCH V10.0
  • *
SIMATIC PCS 7 V10.0
  • *
  • <V10.0 SP1 UC01
SIMATIC ProSave V17
  • *
  • <V17 Update 9
SIMATIC ProSave V18
  • *
SIMATIC ProSave V19
  • <V19 Update 4
SIMATIC ProSave V20
  • *
SIMATIC STEP 7 V5.7
  • *
SIMATIC PCS neo V5.0
  • *
SIMATIC PCS neo V6.0
  • <V6.0 SP1
Create MyConfig (CMC)
  • *
  • <V6.9
Modular PID CTRL Tool
  • *
SIMATIC S7-PLCSIM V17
  • *
SIMATIC S7-PLCSIM V18
  • *
SIMATIC S7-PLCSIM V19
  • *
SIMATIC S7-PLCSIM V20
  • <V20 Update 1
SIMATIC Safety Matrix
  • *
SIMATIC STEP 7 CFC V19
  • *
SIMATIC STEP 7 CFC V20
  • *
Standard PID CTRL Tool
  • *
TIA Project-Server V17
  • *
SIMATIC Automation Tool
  • *
SINAMICS Startdrive V17
  • *
SINAMICS Startdrive V18
  • *
SINAMICS Startdrive V19
  • *
SINAMICS Startdrive V20
  • *
WinCC Panel Image Setup
  • *
  • <V17 Update 9
FM Configuration Package
  • *
SIMATIC Energy Suite V17
  • *
SIMATIC Energy Suite V18
  • *
SIMATIC Energy Suite V19
  • *
  • <V19 Update 4
SIMATIC MTP CREATOR V3.x
  • *
SIMATIC MTP CREATOR V4.x
  • *
  • <V4.1.0.1
SIMATIC Management Agent
  • *
  • <V9.1 SP1 Upd8
SIMATIC MTP CREATOR V2.x
  • *
  • <V2.1
SIMATIC MTP CREATOR V5.x
  • *
  • <V5.0.0.1
SIMATIC PCS 7 TeleControl
  • *
SIMATIC S7 F Systems V6.3
  • *
SIMATIC S7 F Systems V6.4
  • *
SIMATIC WinCC TeleControl
  • *
SIMATIC WinCC flexible ES
  • *
SIMIT Simulation Platform
  • *
TIA Portal Test Suite V17
  • *
TIA Portal Test Suite V18
  • *
TIA Portal Test Suite V19
  • *
  • <V19 Update 4
TIA Portal Test Suite V20
  • *
  • <V20 Update 3
SIMATIC Management Console
  • *
  • <V9.1 SP1 Upd8
SIMATIC PCS 7 PowerControl
  • *
SIMATIC PCS 7/OPEN OS V9.1
  • *
SIMATIC Route Control V9.1
  • *
SIMATIC S7-PLCSIM Advanced
  • <V7.0 Update 1
SIMATIC eaSie Core Package
  • *
TIA Portal Cloud Connector
  • *
  • <V2.3
SIMATIC MTP Integrator V1.x
  • *
SIMATIC MTP Integrator V2.x
  • *
SIMATIC NET PC Software V16
  • *
SIMATIC NET PC Software V17
  • *
SIMATIC NET PC Software V18
  • *
SIMATIC NET PC Software V19
  • *
SIMATIC NET PC Software V20
  • <V20.0 Update 1
SIMATIC Route Control V10.0
  • *
SINEMA Remote Connect Client
  • *
Energy Support Library (EnSL)
  • *
SIMATIC eaSie Document Skills
  • *
SIMATIC eaSie Workflow Skills
  • *
TeleControl Server Basic V3.1
  • <V3.1.2.2
SIMATIC PCS 7 MPC Configurator
  • *
SIMATIC Process Historian 2020
  • *
SIMATIC Process Historian 2022
  • *
SIMATIC Process Historian 2024
  • *
  • <V2024 SP1 Upd2
SIMATIC WinCC Runtime Advanced
  • *
  • <V17 Update 9
SIMATIC WinCC Unified Sequence
  • *
  • <V20
Automation License Manager V6.0
  • *
Automation License Manager V6.2
  • <V6.2 Upd3
SIMATIC PCS 7 Logic Matrix V9.1
  • *
  • <V9.1 Upd8
SIMATIC PCS 7 Basis Library V9.1
  • *
  • <V9.1 SP2 Upd8
SIMATIC PCS 7 Logic Matrix V10.0
  • *
SIMATIC PCS 7 Basis Library V10.0
  • *
  • <V10.0 SP1 Upd2
SIMATIC eaSie PCS 7 Skill Package
  • *
CP PtP Param configuring interface
  • *
SIMATIC WinCC Runtime Professional
  • *
  • <V21
SIMATIC Automation Tool SDK Windows
  • *
SIMATIC PCS 7 Basis Faceplates V9.1
  • *
  • <V9.1 SP2 Upd2
SIMATIC PCS 7 Industry Library V9.0
  • *
SIMATIC PCS 7 Industry Library V9.1
  • *
Siemens Network Planner (SINETPLAN)
  • *
SIMATIC PCS 7 Industry Library V10.0
  • *
SIMATIC PDM Maintenance Station V5.0
  • *
SIMATIC WinCC Unified PC Runtime V18
  • *
SIMATIC WinCC Unified PC Runtime V19
  • *
SIMATIC WinCC Unified PC Runtime V20
  • *
SIMATIC S7-1500 Software Controller V2
  • *
SIMATIC S7-1500 Software Controller V3
  • *
  • <V31.1.5
SIMATIC WinCC Runtime Professional V20
  • *
SIMATIC WinCC Unified Line Coordination
  • *
  • <V20
MultiFieldbus Configuration Tool (MFCT)
  • *
  • <V1.5.5.0
SIMATIC Control Function Library (CFL) V1.x
  • *
SIMATIC Control Function Library (CFL) V2.0
  • *
SIMATIC Control Function Library (CFL) V2.x
  • *
SIMATIC Control Function Library (CFL) V3.0
  • *
SIMATIC Control Function Library (CFL) V3.x
  • <V3.1.0.2
SIMATIC Control Function Library (CFL) V4.0
  • *
SIMATIC Control Function Library (CFL) V4.x
  • *
  • <V4.1
SIMATIC PCS 7 Advanced Process Library V9.1
  • *
  • <V9.1 SP2 Upd6
SIMATIC Process Function Library (PFL) V4.0
  • *
SIMATIC PCS 7 Advanced Process Graphics V9.1
  • *
SIMATIC PCS 7 Standard Chemical Library V9.1
  • *
SIMATIC Control Function Library (CFL) V1.0.0
  • *
SIMATIC PCS 7 Advanced Process Functions V2.1
  • *
SIMATIC PCS 7 Advanced Process Functions V2.2
  • *
SIMATIC PCS 7 Advanced Process Graphics V10.0
  • *
SIMATIC PCS 7 Standard Chemical Library V10.0
  • *
SIMATIC PCS 7 Advanced Process Faceplates V9.1
  • *
  • <V9.1 SP2 Upd4
SIMATIC S7-Fail-safe Configuration Tool (S7-FCT)
  • <V4.0.1
SIMATIC WinCC Visualization Architect (SiVArc) V17
  • *
  • <V17 Update 9
SIMATIC WinCC Visualization Architect (SiVArc) V18
  • *
SIMATIC WinCC Visualization Architect (SiVArc) V19
  • *
  • <V19 Update 4
SIMATIC WinCC Visualization Architect (SiVArc) V20
  • *
  • <V20 Update 3
Totally Integrated Automation Portal (TIA Portal) V17
  • <V17 Update 9
Totally Integrated Automation Portal (TIA Portal) V18
  • *
Totally Integrated Automation Portal (TIA Portal) V19
  • <V19 Update 4
Totally Integrated Automation Portal (TIA Portal) V20
  • <V20 Update 4
SIMATIC PCS 7 Advanced Process Library incl. Faceplates V10.0
  • *
Not present in nixpkgs
Permalink CVE-2024-47569
4.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • terraform-providers.fortios
    • python312Packages.fortiosapi
    • python313Packages.fortiosapi
    • python314Packages.fortiosapi
  • @LeSuisse dismissed
A insertion of sensitive information into sent data in Fortinet …

A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.

Affected products

FortiOS
  • =<7.0.15
  • =<7.4.4
  • =<7.2.8
  • ==7.6.0
  • =<6.4.15
FortiNDR
  • =<7.0.7
  • =<7.1.1
  • =<7.4.8
  • =<7.6.1
  • =<1.5.3
  • =<7.2.5
FortiPAM
  • =<1.1.2
  • ==1.2.0
  • =<1.0.3
  • =<1.3.1
FortiWeb
  • =<7.2.11
  • =<7.0.11
  • =<6.4.3
  • =<7.4.4
  • =<7.0.12
  • ==7.6.0
  • =<7.2.12
FortiMail
  • =<7.0.9
  • =<7.2.6
  • =<7.4.2
FortiProxy
  • =<7.0.23
  • =<7.4.4
  • =<7.2.10
  • =<7.0.22
  • =<7.0.21
FortiVoice
  • =<6.4.9
  • =<6.0.12
  • =<7.0.4
FortiTester
  • =<7.3.2
  • =<7.1.1
  • =<7.2.3
  • =<4.2.1
  • ==7.0.0
  • =<7.4.2
FortiManager
  • =<7.4.3
FortiRecorder
  • =<7.0.4
  • =<7.2.1
FortiManager Cloud
  • =<7.4.3
Not present in nixpkgs.
Permalink CVE-2025-32007
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • jtdx
    • libkrun-tdx
  • @LeSuisse dismissed
Out-of-bounds read for some TDX before version tdx module 1.5.24 …

Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a low complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Affected products

TDX
  • ==before version tdx module 1.5.24
Not for nixpkgs
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • guile-fibers
    • ocamlPackages.fiber
    • ocamlPackages_latest.fiber
  • @LeSuisse dismissed
Fiber insecurely fallsback in utils.UUIDv4() / utils.UUID() — predictable / zero‑UUID on crypto/rand failure

Fiber is an Express inspired web framework written in Go. Before 2.52.11, on Go versions prior to 1.24, the underlying crypto/rand implementation can return an error if secure randomness cannot be obtained. Because no error is returned by the Fiber v2 UUID functions, application code may unknowingly rely on predictable, repeated, or low-entropy identifiers in security-critical pathways. This is especially impactful because many Fiber v2 middleware components (session middleware, CSRF, rate limiting, request-ID generation, etc.) default to using utils.UUIDv4(). This vulnerability is fixed in 2.52.11.

Affected products

fiber
  • ==< 2.52.11
Not directly present in nixpkgs.