Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2025-55249
3.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
HCL AION is affected by a Missing Security Response Headers vulnerability.

HCL AION is affected by a Missing Security Response Headers vulnerability. The absence of standard security headers may weaken the application’s overall security posture and increase its susceptibility to common web-based attacks.

Affected products

AION
  • ==2

Matching in nixpkgs

Package maintainers

not packaged
Permalink CVE-2025-52659
2.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
HCL AION is affected by a Cacheable HTTP Response vulnerability

HCL AION version 2 is affected by a Cacheable HTTP Response vulnerability. This may lead to unintended storage of sensitive or dynamic content, potentially resulting in unauthorized access or information disclosure.

Affected products

AION
  • ==2

Matching in nixpkgs

Package maintainers

not packaged
Permalink CVE-2025-52661
2.4 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
HCL AION version 2 is affected by a JWT Token …

HCL AION version 2 is affected by a JWT Token Expiry Too Long vulnerability. This may increase the risk of token misuse, potentially resulting in unauthorized access if the token is compromised.

Affected products

AION
  • ==2

Matching in nixpkgs

Package maintainers

not packaged
Permalink CVE-2025-52660
2.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
HCL AION is affected by an Host Header Injection vulnerability

HCL AION is affected by an Unrestricted File Upload vulnerability. This can allow malicious file uploads, potentially resulting in unauthorized code execution or system compromise.

Affected products

AION
  • ==2

Matching in nixpkgs

Package maintainers

Not packaged
Permalink CVE-2025-55252
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    10 packages
    • python312Packages.aionut
    • python313Packages.aionut
    • python312Packages.aiontfy
    • python313Packages.aiontfy
    • python312Packages.aionotion
    • python313Packages.aionotion
    • python312Packages.aionanoleaf
    • python313Packages.aionanoleaf
    • python313Packages.electrum-aionostr
    • python312Packages.electrum-aionostr
  • @mweinelt dismissed
HCL AION is affected by a Weak Password Policy vulnerability

HCL AION  version 2 is affected by a Weak Password Policy vulnerability. This can  allow the use of easily guessable passwords, potentially resulting in unauthorized access

Affected products

AION
  • ==2
Not packaged
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package arcanechat-tui
  • @LeSuisse dismissed
Arcane allows unauthenticated proxy access to remote environments

Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to version 1.13.2, unauthenticated requests could be proxied to remote environment agents, allowing access to remote environment resources without authentication. The environment proxy middleware handled `/api/environments/{id}/...` requests for remote environments before authentication was enforced. When the environment ID was not local, the middleware proxied the request and attached the manager-held agent token, even if the caller was unauthenticated. This enabled unauthenticated access to remote environment operations (e.g., listing containers, streaming logs, or other agent endpoints). An unauthenticated attacker could access and manipulate remote environment resources via the proxy, potentially leading to data exposure, unauthorized changes, or service disruption. Version 1.13.2 patches the vulnerability.

Affected products

arcane
  • ==< 1.13.2
Impacted software not present in nixpkgs
Permalink CVE-2025-15535
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • haskellPackages.clay
    • haskellPackages.doclayout
    • haskellPackages.hslua-module-doclayout
    • typstPackages.paris-saclay-thesis-flat_1_0_2
  • @LeSuisse dismissed
nicbarker clay clay.h Clay__MeasureTextCached null pointer dereference

A security flaw has been discovered in nicbarker clay up to 0.14. This affects the function Clay__MeasureTextCached in the library clay.h. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

clay
  • ==0.2
  • ==0.13
  • ==0.1
  • ==0.9
  • ==0.12
  • ==0.11
  • ==0.10
  • ==0.8
  • ==0.5
  • ==0.7
  • ==0.6
  • ==0.3
  • ==0.4
  • ==0.14
Impacted software not present in nixpkgs
Permalink CVE-2026-1169
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    45 packages
    • mprime
    • primecount
    • primesieve
    • prime-server
    • courier-prime
    • CuboCore.libcprime
    • quartus-prime-lite
    • rubyPackages.prime
    • dolphin-emu-primehack
    • haskellPackages.primes
    • rubyPackages_3_1.prime
    • rubyPackages_3_2.prime
    • rubyPackages_3_3.prime
    • rubyPackages_3_4.prime
    • rubyPackages_3_5.prime
    • haskellPackages.nth-prime
    • python312Packages.msprime
    • python312Packages.primepy
    • python312Packages.primer3
    • python313Packages.msprime
    • python313Packages.primepy
    • python313Packages.primer3
    • haskellPackages.antiprimes
    • haskellPackages.primecount
    • haskellPackages.primesieve
    • perlPackages.MathPrimeUtil
    • akkuPackages.chibi-math-prime
    • haskellPackages.prelude-prime
    • perl538Packages.MathPrimeUtil
    • perl540Packages.MathPrimeUtil
    • perlPackages.MathPrimeUtilGMP
    • perlPackages.MathProvablePrime
    • python312Packages.primecountpy
    • python313Packages.primecountpy
    • haskellPackages.opentheory-prime
    • perl538Packages.MathPrimeUtilGMP
    • perl540Packages.MathPrimeUtilGMP
    • rubyPackages.jekyll-theme-primer
    • perl538Packages.MathProvablePrime
    • perl540Packages.MathProvablePrime
    • rubyPackages_3_1.jekyll-theme-primer
    • rubyPackages_3_2.jekyll-theme-primer
    • rubyPackages_3_3.jekyll-theme-primer
    • rubyPackages_3_4.jekyll-theme-primer
    • rubyPackages_3_5.jekyll-theme-primer
  • @LeSuisse dismissed
birkir prime cross-site request forgery

A security vulnerability has been detected in birkir prime up to 0.4.0.beta.0. This vulnerability affects unknown code. Such manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

prime
  • ==0.4.0.beta
Impacted software not present in nixpkgs.
Permalink CVE-2026-1174
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    45 packages
    • mprime
    • primecount
    • primesieve
    • prime-server
    • courier-prime
    • CuboCore.libcprime
    • quartus-prime-lite
    • rubyPackages.prime
    • dolphin-emu-primehack
    • haskellPackages.primes
    • rubyPackages_3_1.prime
    • rubyPackages_3_2.prime
    • rubyPackages_3_3.prime
    • rubyPackages_3_4.prime
    • rubyPackages_3_5.prime
    • haskellPackages.nth-prime
    • python312Packages.msprime
    • python312Packages.primepy
    • python312Packages.primer3
    • python313Packages.msprime
    • python313Packages.primepy
    • python313Packages.primer3
    • haskellPackages.antiprimes
    • haskellPackages.primecount
    • haskellPackages.primesieve
    • perlPackages.MathPrimeUtil
    • akkuPackages.chibi-math-prime
    • haskellPackages.prelude-prime
    • perl538Packages.MathPrimeUtil
    • perl540Packages.MathPrimeUtil
    • perlPackages.MathPrimeUtilGMP
    • perlPackages.MathProvablePrime
    • python312Packages.primecountpy
    • python313Packages.primecountpy
    • haskellPackages.opentheory-prime
    • perl538Packages.MathPrimeUtilGMP
    • perl540Packages.MathPrimeUtilGMP
    • rubyPackages.jekyll-theme-primer
    • perl538Packages.MathProvablePrime
    • perl540Packages.MathProvablePrime
    • rubyPackages_3_1.jekyll-theme-primer
    • rubyPackages_3_2.jekyll-theme-primer
    • rubyPackages_3_3.jekyll-theme-primer
    • rubyPackages_3_4.jekyll-theme-primer
    • rubyPackages_3_5.jekyll-theme-primer
  • @LeSuisse dismissed
birkir prime GraphQL Alias graphql resource consumption

A vulnerability was determined in birkir prime up to 0.4.0.beta.0. This affects an unknown function of the file /graphql of the component GraphQL Alias Handler. This manipulation causes resource consumption. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

prime
  • ==0.4.0.beta
Impacted software not present in nixpkgs
Permalink CVE-2026-1171
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    45 packages
    • mprime
    • primecount
    • primesieve
    • prime-server
    • courier-prime
    • CuboCore.libcprime
    • quartus-prime-lite
    • rubyPackages.prime
    • dolphin-emu-primehack
    • haskellPackages.primes
    • rubyPackages_3_1.prime
    • rubyPackages_3_2.prime
    • rubyPackages_3_3.prime
    • rubyPackages_3_4.prime
    • rubyPackages_3_5.prime
    • haskellPackages.nth-prime
    • python312Packages.msprime
    • python312Packages.primepy
    • python312Packages.primer3
    • python313Packages.msprime
    • python313Packages.primepy
    • python313Packages.primer3
    • haskellPackages.antiprimes
    • haskellPackages.primecount
    • haskellPackages.primesieve
    • perlPackages.MathPrimeUtil
    • akkuPackages.chibi-math-prime
    • haskellPackages.prelude-prime
    • perl538Packages.MathPrimeUtil
    • perl540Packages.MathPrimeUtil
    • perlPackages.MathProvablePrime
    • perlPackages.MathPrimeUtilGMP
    • python312Packages.primecountpy
    • python313Packages.primecountpy
    • haskellPackages.opentheory-prime
    • perl538Packages.MathPrimeUtilGMP
    • perl540Packages.MathPrimeUtilGMP
    • rubyPackages.jekyll-theme-primer
    • perl538Packages.MathProvablePrime
    • perl540Packages.MathProvablePrime
    • rubyPackages_3_1.jekyll-theme-primer
    • rubyPackages_3_2.jekyll-theme-primer
    • rubyPackages_3_3.jekyll-theme-primer
    • rubyPackages_3_4.jekyll-theme-primer
    • rubyPackages_3_5.jekyll-theme-primer
  • @LeSuisse dismissed
birkir prime GraphQL Field graphql denial of service

A flaw has been found in birkir prime up to 0.4.0.beta.0. Impacted is an unknown function of the file /graphql of the component GraphQL Field Handler. Executing a manipulation can lead to denial of service. The attack may be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

prime
  • ==0.4.0.beta
Impacted software not present in nixpkgs.