⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2025-49241
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
WordPress oik <= 4.15.1 - Broken Access Control Vulnerability

Missing Authorization vulnerability in bobbingwide oik allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects oik: from n/a through 4.15.1.

oik
=<4.15.1

pkgs.libvoikko.x86_64-linux

Finnish language processing library

pkgs.libvoikko.aarch64-linux

Finnish language processing library

pkgs.libvoikko.x86_64-darwin

Finnish language processing library

pkgs.libvoikko.aarch64-darwin

Finnish language processing library
Package maintainers: 1
CVE-2011-10007
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted file name

File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \     -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)

File-Find-Rule
=<0.34

pkgs.perl538Packages.FileFindRule

File::Find::Rule is a friendlier interface to File::Find

pkgs.perl540Packages.FileFindRule

File::Find::Rule is a friendlier interface to File::Find

pkgs.perl538Packages.FileFindRulePerl

Common rules for searching for Perl things

pkgs.perl540Packages.FileFindRulePerl

Common rules for searching for Perl things
CVE-2023-45050
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 4 months, 2 weeks ago
WordPress Jetpack Plugin <= 12.8-a.1 is vulnerable to Cross Site Scripting (XSS)

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic Jetpack – WP Security, Backup, Speed, & Growth allows Stored XSS.This issue affects Jetpack – WP Security, Backup, Speed, & Growth: from n/a through 12.8-a.1.

jetpack
=<12.8-a.1
CVE-2022-3328
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Race condition in snap-confine's must_mkdir_and_open_with_perms()

Race condition in snap-confine's must_mkdir_and_open_with_perms()

snapd
<2.61.1

pkgs.snapdragon-profiler.x86_64-linux

An profiler for Android devices running Snapdragon chips
CVE-2024-0567
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Gnutls: rejects certificate chain with distributed trust

A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.

gnutls
<3.8.3
*
cockpit
odf4/cephcsi-rhel9
*
odf4/odf-cli-rhel9
*
odf4/mcg-core-rhel9
*
odf4/odf-console-rhel9
*
odf4/mcg-rhel9-operator
*
odf4/ocs-rhel9-operator
*
odf4/odf-rhel9-operator
*
odf4/odr-rhel9-operator
*
odf4/mcg-operator-bundle
*
odf4/ocs-operator-bundle
*
odf4/odf-operator-bundle
*
odf4/odf-must-gather-rhel9
*
odf4/odf-cosi-sidecar-rhel9
*
odf4/odr-hub-operator-bundle
*
odf4/ocs-client-console-rhel9
*
odf4/rook-ceph-rhel9-operator
*
odf4/ocs-client-rhel9-operator
*
openshift-logging/vector-rhel9
*
odf4/ocs-client-operator-bundle
*
odf4/ocs-metrics-exporter-rhel9
*
openshift-logging/fluentd-rhel9
*
odf4/odr-cluster-operator-bundle
*
odf4/odf-csi-addons-sidecar-rhel9
*
odf4/odf-csi-addons-rhel9-operator
*
odf4/odf-csi-addons-operator-bundle
*
odf4/odf-multicluster-console-rhel9
*
openshift-logging/eventrouter-rhel9
*
odf4/odf-multicluster-rhel9-operator
*
openshift-logging/logging-loki-rhel9
*
odf4/odf-multicluster-operator-bundle
*
openshift-logging/loki-rhel9-operator
*
openshift-logging/opa-openshift-rhel9
*
openshift-logging/elasticsearch6-rhel9
*
openshift-logging/loki-operator-bundle
*
openshift-logging/logging-curator5-rhel9
*
openshift-logging/lokistack-gateway-rhel9
*
openshift-logging/elasticsearch-proxy-rhel9
*
openshift-logging/logging-view-plugin-rhel9
*
openshift-logging/elasticsearch-rhel9-operator
*
openshift-logging/elasticsearch-operator-bundle
*
openshift-logging/cluster-logging-rhel9-operator
*
openshift-logging/log-file-metric-exporter-rhel9
*
openshift-logging/cluster-logging-operator-bundle
*

pkgs.cockpit

Web-based graphical interface for servers

pkgs.python312Packages.python3-gnutls.x86_64-linux

Python wrapper for the GnuTLS library

pkgs.python312Packages.python3-gnutls.aarch64-linux

Python wrapper for the GnuTLS library

pkgs.python312Packages.python3-gnutls.x86_64-darwin

Python wrapper for the GnuTLS library

pkgs.python312Packages.python3-gnutls.aarch64-darwin

Python wrapper for the GnuTLS library
Package maintainers: 4
CVE-2025-40908
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 4 months, 3 weeks ago
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified

YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified

YAML-LibYAML
<0.903.0

pkgs.perl538Packages.YAMLLibYAML

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML.x86_64-linux

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML.aarch64-linux

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML.x86_64-darwin

Perl YAML Serialization using XS and libyaml

pkgs.perl540Packages.YAMLLibYAML.aarch64-darwin

Perl YAML Serialization using XS and libyaml
CVE-2025-5054
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 3 weeks ago
Race Condition in Canonical Apport

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).

apport
=<2.32.0
<2.20.9-0ubuntu7.29+esm1
<2.33.0-0ubuntu1
<2.20.11-0ubuntu27.28
<2.32.0-0ubuntu6
<2.30.0-0ubuntu4.3
<2.20.11-0ubuntu82.7
<2.32.0-0ubuntu5.1
<2.28.1-0ubuntu3.6
<2.20.1-0ubuntu2.30+esm5
Package maintainers: 1
CVE-2024-12224 created 4 months, 3 weeks ago
idna accepts Punycode labels that do not produce any non-ASCII when decoded

Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

idna
<1.0.0

pkgs.python311Packages.idna

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna

Internationalized Domain Names in Applications (IDNA)

pkgs.python313Packages.idna

Internationalized Domain Names in Applications (IDNA)

pkgs.python311Packages.idna-ssl

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna-ssl

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python313Packages.idna-ssl

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna.x86_64-linux

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna.aarch64-linux

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna.x86_64-darwin

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna.aarch64-darwin

Internationalized Domain Names in Applications (IDNA)

pkgs.python312Packages.idna-ssl.x86_64-linux

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna-ssl.aarch64-linux

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna-ssl.x86_64-darwin

Patch ssl.match_hostname for Unicode(idna) domains support

pkgs.python312Packages.idna-ssl.aarch64-darwin

Patch ssl.match_hostname for Unicode(idna) domains support
Package maintainers: 17
CVE-2023-40550
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 3 weeks ago
Shim: out-of-bound read in verify_buffer_sbat()

An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.

shim
*
shim-signed
*
shim-unsigned-x64
*
shim-unsigned-aarch64
*

pkgs.libudev0-shim

Shim to preserve libudev.so.0 compatibility
  • nixos-25.05 1
    • nixpkgs-25.05-darwin 1
    • nixos-25.05-small 1
  • nixos-unstable 1
    • nixos-unstable-small 1
    • nixpkgs-unstable 1

pkgs.jellyfin-mpv-shim

Allows casting of videos to MPV via the jellyfin mobile and web app

pkgs.mpv-shim-default-shaders

Preconfigured set of MPV shaders and configurations for MPV Shim media clients

pkgs.python311Packages.shimmy

API conversion tool for popular external reinforcement learning environments

pkgs.python312Packages.shimmy

API conversion tool for popular external reinforcement learning environments

pkgs.libudev0-shim.x86_64-linux

Shim to preserve libudev.so.0 compatibility
  • nixos-unstable ???
    • nixos-unstable-small 1

pkgs.shim-unsigned.x86_64-linux

UEFI shim loader

pkgs.libudev0-shim.aarch64-linux

Shim to preserve libudev.so.0 compatibility
  • nixos-unstable ???
    • nixos-unstable-small 1

pkgs.shim-unsigned.aarch64-linux

UEFI shim loader

pkgs.rshim-user-space.x86_64-linux

user-space rshim driver for the BlueField SoC

pkgs.pantheon.elementary-print-shim

Simple shim for printing support via Contractor

pkgs.rshim-user-space.aarch64-linux

user-space rshim driver for the BlueField SoC

pkgs.python311Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python313Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.x86_64-linux

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.aarch64-linux

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.x86_64-darwin

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.aarch64-darwin

Switch frontends to Jupyter Server

pkgs.python312Packages.pytz-deprecation-shim.x86_64-linux

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.aarch64-linux

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.x86_64-darwin

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.aarch64-darwin

Shims to make deprecation of pytz easier
Package maintainers: 13
CVE-2023-40548
7.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Shim: interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

shim
*
shim-signed
*
shim-unsigned-x64
*
shim-unsigned-aarch64
*

pkgs.libudev0-shim

Shim to preserve libudev.so.0 compatibility
  • nixos-25.05 1
    • nixpkgs-25.05-darwin 1
    • nixos-25.05-small 1
  • nixos-unstable 1
    • nixos-unstable-small 1
    • nixpkgs-unstable 1

pkgs.jellyfin-mpv-shim

Allows casting of videos to MPV via the jellyfin mobile and web app

pkgs.mpv-shim-default-shaders

Preconfigured set of MPV shaders and configurations for MPV Shim media clients

pkgs.python311Packages.shimmy

API conversion tool for popular external reinforcement learning environments

pkgs.python312Packages.shimmy

API conversion tool for popular external reinforcement learning environments

pkgs.libudev0-shim.x86_64-linux

Shim to preserve libudev.so.0 compatibility
  • nixos-unstable ???
    • nixos-unstable-small 1

pkgs.shim-unsigned.x86_64-linux

UEFI shim loader

pkgs.libudev0-shim.aarch64-linux

Shim to preserve libudev.so.0 compatibility
  • nixos-unstable ???
    • nixos-unstable-small 1

pkgs.shim-unsigned.aarch64-linux

UEFI shim loader

pkgs.rshim-user-space.x86_64-linux

user-space rshim driver for the BlueField SoC

pkgs.pantheon.elementary-print-shim

Simple shim for printing support via Contractor

pkgs.rshim-user-space.aarch64-linux

user-space rshim driver for the BlueField SoC

pkgs.python311Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python313Packages.notebook-shim

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.x86_64-linux

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.aarch64-linux

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.x86_64-darwin

Switch frontends to Jupyter Server

pkgs.python312Packages.notebook-shim.aarch64-darwin

Switch frontends to Jupyter Server

pkgs.python312Packages.pytz-deprecation-shim.x86_64-linux

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.aarch64-linux

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.x86_64-darwin

Shims to make deprecation of pytz easier

pkgs.python312Packages.pytz-deprecation-shim.aarch64-darwin

Shims to make deprecation of pytz easier
Package maintainers: 13