Published issues
Permalink
CVE-2026-39863
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 20 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 hours ago
-
@LeSuisse
accepted
53 minutes ago
-
@LeSuisse
published on GitHub
20 minutes ago
Kamailio Core: TCP Data Processing Vulnerability
Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted data packet sent over TCP. The issue impacts Kamailio instances having TCP or TLS listeners. This vulnerability is fixed in 5.1.1, 6.0.6, and 5.8.8.
Affected products
kamailio
-
==>= 6.0.0, < 6.0.6
-
==>= 6.1.0, < 6.1.1
-
==< 5.8.8
Matching in nixpkgs
Fast and flexible SIP server, proxy, SBC, and load balancer
-
-
-
nixos-25.11-small
6.0.3
-
nixpkgs-25.11-darwin
6.0.3
Permalink
CVE-2026-39864
4.4 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): HIGH
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 20 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 hours ago
-
@LeSuisse
accepted
44 minutes ago
-
@LeSuisse
published on GitHub
20 minutes ago
Kamailio Auth: Processing Vulnerability For Additional Authenticated User Identity Checks
Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.0.5 and 5.8.7, an out-of-bounds read in the auth module of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted SIP packet if a successful user authentication without a database backend is followed by additional user identity checks. This vulnerability is fixed in 6.0.5 and 5.8.7.
Affected products
kamailio
-
==>= 6.0.0, < 6.0.5
-
==< 5.8.7
Matching in nixpkgs
Fast and flexible SIP server, proxy, SBC, and load balancer
-
-
-
nixos-25.11-small
6.0.3
-
nixpkgs-25.11-darwin
6.0.3
updated 20 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 hours ago
-
@LeSuisse
removed
package python312Packages.zammad-py
41 minutes ago
-
@LeSuisse
removed
package python313Packages.zammad-py
41 minutes ago
-
@LeSuisse
removed
package python314Packages.zammad-py
41 minutes ago
-
@LeSuisse
accepted
41 minutes ago
-
@LeSuisse
published on GitHub
20 minutes ago
Zammad has incorrect access control in getting_started_controller
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, unauthenticated remote attackers were able to access the getting started endpoint to get access to sensitive internal entity data, even after the system setup was completed. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==< 6.5.4
-
==>= 7.0.0-alpha, < 7.0.1
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated 20 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 hours ago
-
@LeSuisse
removed
package python312Packages.zammad-py
41 minutes ago
-
@LeSuisse
removed
package python313Packages.zammad-py
41 minutes ago
-
@LeSuisse
removed
package python314Packages.zammad-py
41 minutes ago
-
@LeSuisse
accepted
40 minutes ago
-
@LeSuisse
published on GitHub
20 minutes ago
Zammad has an information disclosure in ticket detail view of customers in shared organizations
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, customers in shared organizations (means they can see each other's tickets) could see fields which are not intended for customers - including fields not intended for them at all (e.g. priority, custom ticket attributes for internal purposes). This was the case when a customer opened a ticket from another user of the same shared organization. They are not able to modify these field. This vulnerability is fixed in 7.0.1.
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated 20 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
5 hours ago
-
@LeSuisse
removed
package python312Packages.zammad-py
39 minutes ago
-
@LeSuisse
removed
package python313Packages.zammad-py
39 minutes ago
-
@LeSuisse
removed
package python314Packages.zammad-py
39 minutes ago
-
@LeSuisse
accepted
38 minutes ago
-
@LeSuisse
published on GitHub
20 minutes ago
Zammad is missing authorization in ticket create endpoint
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the used endpoint for ticket creation was missing authorization if the related parameter for adding links is used. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==< 6.5.4
-
==>= 7.0.0-alpha, < 7.0.1
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated 20 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
5 hours ago
-
@LeSuisse
removed
package python312Packages.zammad-py
38 minutes ago
-
@LeSuisse
removed
package python313Packages.zammad-py
38 minutes ago
-
@LeSuisse
removed
package python314Packages.zammad-py
38 minutes ago
-
@LeSuisse
accepted
38 minutes ago
-
@LeSuisse
published on GitHub
20 minutes ago
Zammad has a server-side template injection leading to RCE via AI Agent
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, a server-side template injection vulnerability which leads to RCE via AI Agent exists. Impact is limited to environments where an attacker can control or influence type_enrichment_data (typically high-privilege administrative configuration). This vulnerability is fixed in 7.0.1.
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated 20 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
5 hours ago
-
@LeSuisse
removed
package python312Packages.zammad-py
38 minutes ago
-
@LeSuisse
removed
package python313Packages.zammad-py
38 minutes ago
-
@LeSuisse
removed
package python314Packages.zammad-py
38 minutes ago
-
@LeSuisse
accepted
38 minutes ago
-
@LeSuisse
published on GitHub
20 minutes ago
Zammad has Cross-site request forgery (CSRF) in OAuth callback endpoints
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the OAuth callback endpoints for Microsoft, Google, and Facebook external credentials do not validate a CSRF state parameter. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==< 6.5.4
-
==>= 7.0.0-alpha, < 7.0.1
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
Permalink
CVE-2026-40026
4.4 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated 21 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
5 hours ago
-
@LeSuisse
ignored
2 references
38 minutes ago
-
@LeSuisse
accepted
38 minutes ago
-
@LeSuisse
published on GitHub
21 minutes ago
Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read
The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the ISO9660 filesystem parser where the parse_susp() function trusts len_id, len_des, and len_src fields from the disk image to memcpy data into a stack buffer without verifying that the source data falls within the parsed SUSP block. An attacker can craft a malicious ISO image that causes reads past the end of the SUSP data buffer, and a zero-length SUSP entry can trigger an infinite parsing loop.
Affected products
sleuthkit
-
==a95b0ac21733b059a517aaefa667a17e1bcbdee1
-
=<4.14.0
Matching in nixpkgs
Forensic/data recovery tool
Permalink
CVE-2026-39844
5.9 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): HIGH
-
Availability impact (A): NONE
updated 21 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
5 hours ago
-
@LeSuisse
accepted
37 minutes ago
-
@LeSuisse
published on GitHub
21 minutes ago
-
@LeSuisse
removed
package python312Packages.nicegui-highcharts
21 minutes ago
-
@LeSuisse
removed
package python313Packages.nicegui-highcharts
21 minutes ago
-
@LeSuisse
removed
package python314Packages.nicegui-highcharts
21 minutes ago
NiceGUI has a Path Traversal in NiceGUI Upload Filename on Windows via Backslash Bypass of PurePosixPath Sanitization
NiceGUI is a Python-based UI framework. Prior to 3.10.0, Since PurePosixPath only recognizes forward slashes (/) as path separators, an attacker can bypass this sanitization on Windows by using backslashes (\) in the upload filename. Applications that construct file paths using file.name (a pattern demonstrated in NiceGUI's bundled examples) are vulnerable to arbitrary file write on Windows. This vulnerability is fixed in 3.10.0.
Matching in nixpkgs
Module to create web-based user interfaces
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
Module to create web-based user interfaces
-
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
Module to create web-based user interfaces
Ignored packages (3)
NiceGUI with support for Highcharts
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
NiceGUI with support for Highcharts
-
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
NiceGUI with support for Highcharts
updated 21 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
5 hours ago
-
@LeSuisse
removed
package python312Packages.zammad-py
32 minutes ago
-
@LeSuisse
removed
package python313Packages.zammad-py
32 minutes ago
-
@LeSuisse
removed
package python314Packages.zammad-py
32 minutes ago
-
@LeSuisse
accepted
32 minutes ago
-
@LeSuisse
published on GitHub
21 minutes ago
Zammad is miissing authorization in AI assistance controller for context data used in text tools
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, he REST endpoint POST /api/v1/ai_assistance/text_tools/:id contains an authorization failure. Context data (e.g., a group or organization) supplied to be used in the AI prompt were not checked if they are accessible for the current user. This leads to having data present in the AI prompt that were not authorized before being used. A user needs to have ticket.agent permission to be able to use the provided context data. This vulnerability is fixed in 7.0.1.
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API