CVE-2026-23730 updated 4 days, 12 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 3 packages perl540Packages.SnowballNorwegian perl538Packages.SnowballNorwegian perlPackages.SnowballNorwegian 4 days, 12 hours ago @LeSuisse dismissed 4 days, 12 hours ago WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=ProdutoControle) WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=ProdutoControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2. Affected products WeGIA ==< 3.6.2 Matching in nixpkgs
CVE-2026-23731 updated 4 days, 12 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 3 packages perl540Packages.SnowballNorwegian perl538Packages.SnowballNorwegian perlPackages.SnowballNorwegian 4 days, 12 hours ago @LeSuisse dismissed 4 days, 12 hours ago WeGIA Clickjacking Vulnerability WeGIA is a web manager for charitable institutions. Prior to 3.6.2, The web application is vulnerable to clickjacking attacks. The WeGIA application does not send any defensive HTTP headers related to framing protection. In particular, X-Frame-Options is missing andContent-Security-Policy with frame-ancestors directive is not configured. Because of this, an attacker can load any WeGIA page inside a malicious HTML document, overlay deceptive elements, hide real buttons, or force accidental interaction with sensitive workflows. This vulnerability is fixed in 3.6.2. Affected products WeGIA ==< 3.6.2 Matching in nixpkgs
CVE-2026-23722 updated 4 days, 12 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 3 packages perlPackages.SnowballNorwegian perl538Packages.SnowballNorwegian perl540Packages.SnowballNorwegian 4 days, 12 hours ago @LeSuisse dismissed 4 days, 12 hours ago WeGIA has a Reflected Cross-Site Scripting (XSS) vulnerability allowing arbitrary code execution and UI redressing. WeGIA is a Web Manager for Charitable Institutions. Prior to 3.6.2, a Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the WeGIA system, specifically within the html/memorando/insere_despacho.php file. The application fails to properly sanitize or encode user-supplied input via the id_memorando GET parameter before reflecting it into the HTML source (likely inside a <script> block or an attribute). This allows unauthenticated attackers to inject arbitrary JavaScript or HTML into the context of the user's browser session. This vulnerability is fixed in 3.6.2. Affected products WeGIA ==< 3.6.2 Matching in nixpkgs
CVE-2026-23729 updated 4 days, 16 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 3 packages perlPackages.SnowballNorwegian perl538Packages.SnowballNorwegian perl540Packages.SnowballNorwegian 4 days, 16 hours ago @LeSuisse dismissed 4 days, 16 hours ago WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarDescricao, nomeClasse=ProdutoControle) WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarDescricao and nomeClasse=ProdutoControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2. Affected products WeGIA ==< 3.6.2 Matching in nixpkgs
CVE-2026-23723 updated 4 days, 16 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 3 packages perlPackages.SnowballNorwegian perl538Packages.SnowballNorwegian perl540Packages.SnowballNorwegian 4 days, 16 hours ago @LeSuisse dismissed 4 days, 16 hours ago WeGIA has a Critical SQL Injection in Atendido_ocorrenciaControle via id_memorando parameter WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an authenticated SQL Injection vulnerability was identified in the Atendido_ocorrenciaControle endpoint via the id_memorando parameter. This flaw allows for full database exfiltration, exposure of sensitive PII, and potential arbitrary file reads in misconfigured environments. This vulnerability is fixed in 3.6.2. Affected products WeGIA ==< 3.6.2 Matching in nixpkgs
CVE-2021-47844 updated 4 days, 16 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 24 packages libmaxminddb phpExtensions.maxminddb python312Packages.xmind python313Packages.xmind dotnetPackages.MaxMindDb php81Extensions.maxminddb php82Extensions.maxminddb php83Extensions.maxminddb php84Extensions.maxminddb python312Packages.maxminddb python313Packages.maxminddb dotnetPackages.MaxMindGeoIP2 perlPackages.MaxMindDBCommon perl540Packages.MaxMindDBReaderXS perl538Packages.MaxMindDBReaderXS perl540Packages.MaxMindDBWriter perl540Packages.MaxMindDBReader perl540Packages.MaxMindDBCommon perl538Packages.MaxMindDBWriter perl538Packages.MaxMindDBReader perl538Packages.MaxMindDBCommon perlPackages.MaxMindDBWriter perlPackages.MaxMindDBReader perlPackages.MaxMindDBReaderXS 4 days, 16 hours ago @LeSuisse dismissed 4 days, 16 hours ago Xmind 2020 - Persistent Cross-Site Scripting Xmind 2020 contains a cross-site scripting vulnerability that allows attackers to inject malicious payloads into mind mapping files or custom headers. Attackers can craft malicious files with embedded JavaScript that execute system commands when opened, enabling remote code execution through mouse interactions or file opening. Affected products Xmind ==2020 Matching in nixpkgs pkgs.xmind All-in-one thinking tool featuring mind mapping, AI generation, and real-time collaboration nixos-unstable 25.07.03033-202507241842 nixpkgs-unstable 25.07.03033-202507241842 nixos-unstable-small 25.07.03033-202507241842 nixos-25.05 25.01.01061-202501070800 nixos-25.05-small 25.01.01061-202501070800 nixpkgs-25.05-darwin 25.01.01061-202501070800 Package maintainers: 9 @Conni2461 Simon Hauser <simon-hauser@outlook.com> @dasJ Janne Heß <janne@hess.ooo> @helsinki-Jo Joachim Ernst <joachim.ernst@helsinki-systems.de> @aanderse Aaron Andersen <aaron@fosslib.net> @piotrkwiecinski Piotr Kwiecinski <piokwiecinski+nixpkgs@gmail.com> @talyz Kim Lindberger <kim.lindberger@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me> @fabaff Fabian Affolter <mail@fabian-affolter.ch> @michalrus Michal Rus <m@michalrus.com>
pkgs.xmind All-in-one thinking tool featuring mind mapping, AI generation, and real-time collaboration nixos-unstable 25.07.03033-202507241842 nixpkgs-unstable 25.07.03033-202507241842 nixos-unstable-small 25.07.03033-202507241842 nixos-25.05 25.01.01061-202501070800 nixos-25.05-small 25.01.01061-202501070800 nixpkgs-25.05-darwin 25.01.01061-202501070800
CVE-2026-22864 updated 4 days, 16 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 12 packages speech-denoiser openimagedenoise terraform-providers.deno python312Packages.denonavr python313Packages.denonavr haskellPackages.pandoc-sidenote terraform-providers.denoland_deno gnomeExtensions.denon-avr-controler python312Packages.bnunicodenormalizer python313Packages.bnunicodenormalizer vscode-extensions.denoland.vscode-deno home-assistant-component-tests.denonavr 4 days, 16 hours ago @LeSuisse dismissed 4 days, 16 hours ago Deno has an incomplete fix for command-injection prevention on Windows — case-insensitive extension bypass Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive comparison against lowercase literals and therefore can be bypassed when the extension uses alternate casing (for example .BAT, .Bat, etc.). This vulnerability is fixed in 2.5.6. Affected products deno ==< 2.5.6 Matching in nixpkgs pkgs.deno Secure runtime for JavaScript and TypeScript nixos-unstable 2.5.6 nixpkgs-unstable 2.5.6 nixos-unstable-small 2.5.6 nixos-25.05 2.2.12 nixos-25.05-small 2.2.12 nixpkgs-25.05-darwin 2.2.12 Package maintainers: 10 @06kellyjac Jack <hello+nixpkgs@j-k.io> @ofalvai Olivér Falvai <ofalvai@gmail.com> @honnip Jung seungwoo <me@honnip.page> @dotlambda Robert Schütz <rschuetz17@gmail.com> @fabaff Fabian Affolter <mail@fabian-affolter.ch> @mweinelt Martin Weinelt <hexa@darmstadt.ccc.de> @LeshaInc Alexey Nikashkin <leshainc@fomalhaut.me> @Mic92 Jörg Thalheim <joerg@thalheim.io> @magnetophon Bart Brouns <bart@magnetophon.nl> @ratsclub Victor Freire <victor@freire.dev.br>
pkgs.deno Secure runtime for JavaScript and TypeScript nixos-unstable 2.5.6 nixpkgs-unstable 2.5.6 nixos-unstable-small 2.5.6 nixos-25.05 2.2.12 nixos-25.05-small 2.2.12 nixpkgs-25.05-darwin 2.2.12
CVE-2026-23727 updated 4 days, 16 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 3 packages perl540Packages.SnowballNorwegian perl538Packages.SnowballNorwegian perlPackages.SnowballNorwegian 4 days, 16 hours ago @LeSuisse dismissed 4 days, 16 hours ago WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=TipoSaidaControle) WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=TipoSaidaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2. Affected products WeGIA ==< 3.6.2 Matching in nixpkgs
CVE-2026-23728 updated 4 days, 16 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 3 packages perlPackages.SnowballNorwegian perl538Packages.SnowballNorwegian perl540Packages.SnowballNorwegian 4 days, 16 hours ago @LeSuisse dismissed 4 days, 16 hours ago WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=DestinoControle) WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=DestinoControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2. Affected products WeGIA ==< 3.6.2 Matching in nixpkgs
CVE-2025-24022 updated 4 days, 16 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 1 hour ago @LeSuisse removed 11 packages nvitop psitop gitopper weave-gitops luaPackages.luabitop lua51Packages.luabitop lua52Packages.luabitop luajitPackages.luabitop tailscale-gitops-pusher python312Packages.anitopy python313Packages.anitopy 4 days, 16 hours ago @LeSuisse dismissed 4 days, 16 hours ago iTop server vulnerable to portal code injection iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, server code execution is possible through the frontend of iTop's portal. This is fixed in versions 2.7.12, 3.1.3 and 3.2.1. Affected products iTop ==>= 3.0.0, < 3.1.3 ==< 2.7.12 ==>= 3.2.0, < 3.2.1 Matching in nixpkgs Package maintainers: 7 @luftmensch-luftmensch Valentino Bocchetti <valentinobocchetti59@gmail.com> @GaetanLepage Gaetan Lepage <gaetan@glepage.com> @figsoda figsoda <figsoda@pm.me> @PassiveLemon PassiveLemon <jeremyseber@gmail.com> @snue Stefan Nuernberger <kabelfrickler@gmail.com> @blitz Julian Stecklina <js@alien8.de> @xanderio Alexander Sieg <alex@xanderio.de>