Published issues
updated 15 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
3 weeks, 2 days ago
-
@LeSuisse
removed
5 packages
- python312Packages.glances-api
- python313Packages.glances-api
- python314Packages.glances-api
- home-assistant-component-tests.glances
- tests.home-assistant-component-tests.glances
15 hours ago
-
@LeSuisse
accepted
15 hours ago
-
@LeSuisse
ignored
reference https://g…
15 hours ago
-
@LeSuisse
added
maintainer @MiniHarinn
15 hours ago
-
@LeSuisse
published on GitHub
15 hours ago
Glances exposes the REST API without authentication
Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue.
Matching in nixpkgs
Cross-platform curses-based monitoring tool
-
-
-
nixos-25.11-small
4.3.3
-
nixpkgs-25.11-darwin
4.3.3
Ignored packages (5)
Python API for interacting with Glances
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Python API for interacting with Glances
-
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Python API for interacting with Glances
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
Permalink
CVE-2026-28500
8.6 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated 15 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
3 weeks, 2 days ago
-
@LeSuisse
ignored
2 references
15 hours ago
-
@LeSuisse
removed
47 packages
- onnxruntime
- sherpa-onnx
- pkgsRocm.onnxruntime
- pkgsRocm.sherpa-onnx
- python312Packages.onnx
- python312Packages.tf2onnx
- python313Packages.onnx-ir
- python313Packages.tf2onnx
- python314Packages.onnx-ir
- python312Packages.onnxslim
- python312Packages.skl2onnx
- python313Packages.onnx-asr
- python313Packages.onnxslim
- python313Packages.skl2onnx
- python314Packages.onnx-asr
- python314Packages.onnxslim
- python314Packages.skl2onnx
- python313Packages.onnxscript
- python314Packages.onnxscript
- python312Packages.onnxmltools
- python312Packages.onnxruntime
- python312Packages.paddle2onnx
- python313Packages.onnxmltools
- python313Packages.onnxruntime
- python313Packages.sherpa-onnx
- python314Packages.onnxmltools
- python314Packages.onnxruntime
- python314Packages.sherpa-onnx
- python313Packages.optimum-onnx
- python314Packages.optimum-onnx
- pkgsRocm.python3Packages.onnx-ir
- pkgsRocm.python3Packages.tf2onnx
- pkgsRocm.python3Packages.onnx-asr
- pkgsRocm.python3Packages.onnxscript
- python312Packages.onnxruntime-tools
- python313Packages.onnxruntime-tools
- python314Packages.onnxruntime-tools
- pkgsRocm.python3Packages.onnxruntime
- pkgsRocm.python3Packages.sherpa-onnx
- pkgsRocm.python3Packages.optimum-onnx
- python312Packages.onnxconverter-common
- python312Packages.rapidocr-onnxruntime
- python313Packages.onnxconverter-common
- python313Packages.rapidocr-onnxruntime
- python314Packages.onnxconverter-common
- python314Packages.rapidocr-onnxruntime
- pkgsRocm.python3Packages.rapidocr-onnxruntime
15 hours ago
-
@LeSuisse
added
package python312Packages.onnx
15 hours ago
-
@LeSuisse
accepted
15 hours ago
-
@LeSuisse
published on GitHub
15 hours ago
ONNX Untrusted Model Repository Warnings Suppressed by silent=True in onnx.hub.load() — Silent Supply-Chain Attack
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks. When chained with file-system vulnerabilities, an attacker can silently exfiltrate sensitive files (SSH keys, cloud credentials) from the victim's machine the moment the model is loaded. As of time of publication, no known patched versions are available.
Matching in nixpkgs
Open Neural Network Exchange
Open Neural Network Exchange
Open Neural Network Exchange
Open Neural Network Exchange
Ignored packages (46)
Cross-platform, high performance scoring engine for ML models
Speech-to-text, text-to-speech, and speaker recognition using next-gen Kaldi with onnxruntime
Cross-platform, high performance scoring engine for ML models
Speech-to-text, text-to-speech, and speaker recognition using next-gen Kaldi with onnxruntime
Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX
Efficient in-memory representation for ONNX, in Python
Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX
Efficient in-memory representation for ONNX, in Python
Toolkit to Help Optimize Onnx Model
Convert scikit-learn models to ONNX
Lightweight Automatic Speech Recognition using ONNX models
Toolkit to Help Optimize Onnx Model
Convert scikit-learn models to ONNX
Lightweight Automatic Speech Recognition using ONNX models
Toolkit to Help Optimize Onnx Model
Convert scikit-learn models to ONNX
Naturally author ONNX functions and models using a subset of Python
Naturally author ONNX functions and models using a subset of Python
Cross-platform, high performance scoring engine for ML models
ONNX Model Exporter for PaddlePaddle
Cross-platform, high performance scoring engine for ML models
Python bindings for sherpa-onnx speech recognition
Cross-platform, high performance scoring engine for ML models
Python bindings for sherpa-onnx speech recognition
Export your model to ONNX and run inference with ONNX Runtime
Export your model to ONNX and run inference with ONNX Runtime
Efficient in-memory representation for ONNX, in Python
Convert TensorFlow, Keras, Tensorflow.js and Tflite models to ONNX
Lightweight Automatic Speech Recognition using ONNX models
Naturally author ONNX functions and models using a subset of Python
Cross-platform, high performance scoring engine for ML models
Python bindings for sherpa-onnx speech recognition
Export your model to ONNX and run inference with ONNX Runtime
ONNX Converter and Optimization Tools
Cross platform OCR Library based on OnnxRuntime
-
-
nixos-25.11-small
1.4.4
-
nixpkgs-25.11-darwin
1.4.4
ONNX Converter and Optimization Tools
Cross platform OCR Library based on OnnxRuntime
-
-
-
nixos-25.11-small
1.4.4
-
nixpkgs-25.11-darwin
1.4.4
ONNX Converter and Optimization Tools
Cross platform OCR Library based on OnnxRuntime
Cross platform OCR Library based on OnnxRuntime
-
-
-
nixos-25.11-small
1.4.4
-
nixpkgs-25.11-darwin
1.4.4
Permalink
CVE-2026-35043
7.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated 15 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 days, 4 hours ago
-
@LeSuisse
accepted
15 hours ago
-
@LeSuisse
published on GitHub
15 hours ago
BentoML: command injection in cloud deployment setup script (deployment.py)
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into a shell command using an f-string without any quoting. The generated script is uploaded to BentoCloud as setup.sh and executed on the cloud build infrastructure during deployment, making this a remote code execution on the CI/CD tier. This vulnerability is fixed in 1.4.38.
Matching in nixpkgs
Build Production-Grade AI Applications
Build Production-Grade AI Applications
Permalink
CVE-2026-34612
10.0 CRITICAL
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated 15 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
1 week ago
-
@LeSuisse
accepted
15 hours ago
-
@LeSuisse
published on GitHub
15 hours ago
Kestra: Remote Code Execution via SQL Injection
Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/v1/main/flows/search". Once a user is authenticated, simply visiting a crafted link is enough to trigger the vulnerability. The injected payload is executed by PostgreSQL using COPY ... TO PROGRAM ..., which in turn runs arbitrary OS commands on the host. This issue has been patched in version 1.3.7.
Matching in nixpkgs
Infinitely scalable orchestration and scheduling platform, creating, running, scheduling, and monitoring millions of complex pipelines
-
-
nixos-25.11-small
1.1.0
-
nixpkgs-25.11-darwin
1.1.0
Infinitely scalable orchestration and scheduling platform, creating, running, scheduling, and monitoring millions of complex pipelines
-
-
-
nixos-25.11-small
1.1.0
-
nixpkgs-25.11-darwin
1.1.0
Infinitely scalable orchestration and scheduling platform, creating, running, scheduling, and monitoring millions of complex pipelines
updated 15 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
3 weeks, 1 day ago
-
@LeSuisse
removed
6 packages
- python312Packages.pymupdf4llm
- python313Packages.pymupdf4llm
- python314Packages.pymupdf4llm
- python312Packages.pymupdf-fonts
- python313Packages.pymupdf-fonts
- python314Packages.pymupdf-fonts
15 hours ago
-
@LeSuisse
accepted
15 hours ago
-
@LeSuisse
published on GitHub
15 hours ago
CVE-2026-3029
A path traversal and arbitrary file write vulnerability exist in the embedded get function in '_main_.py' in PyMuPDF version, 1.26.5.
Matching in nixpkgs
Python bindings for MuPDF's rendering library
Python bindings for MuPDF's rendering library
Python bindings for MuPDF's rendering library
Ignored packages (6)
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
Collection of optional fonts for PyMuPDF
-
-
nixos-25.11-small
1.0.5
-
nixpkgs-25.11-darwin
1.0.5
Collection of optional fonts for PyMuPDF
-
-
-
nixos-25.11-small
1.0.5
-
nixpkgs-25.11-darwin
1.0.5
Collection of optional fonts for PyMuPDF
Permalink
CVE-2026-39863
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 1 day, 23 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
2 days, 4 hours ago
-
@LeSuisse
accepted
2 days ago
-
@LeSuisse
published on GitHub
1 day, 23 hours ago
Kamailio Core: TCP Data Processing Vulnerability
Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted data packet sent over TCP. The issue impacts Kamailio instances having TCP or TLS listeners. This vulnerability is fixed in 5.1.1, 6.0.6, and 5.8.8.
Affected products
kamailio
-
==>= 6.1.0, < 6.1.1
-
==>= 6.0.0, < 6.0.6
-
==< 5.8.8
Matching in nixpkgs
Fast and flexible SIP server, proxy, SBC, and load balancer
-
-
-
nixos-25.11-small
6.0.3
-
nixpkgs-25.11-darwin
6.0.3
Permalink
CVE-2026-39864
4.4 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): HIGH
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 1 day, 23 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
2 days, 4 hours ago
-
@LeSuisse
accepted
2 days ago
-
@LeSuisse
published on GitHub
1 day, 23 hours ago
Kamailio Auth: Processing Vulnerability For Additional Authenticated User Identity Checks
Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.0.5 and 5.8.7, an out-of-bounds read in the auth module of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted SIP packet if a successful user authentication without a database backend is followed by additional user identity checks. This vulnerability is fixed in 6.0.5 and 5.8.7.
Affected products
kamailio
-
==< 5.8.7
-
==>= 6.0.0, < 6.0.5
Matching in nixpkgs
Fast and flexible SIP server, proxy, SBC, and load balancer
-
-
-
nixos-25.11-small
6.0.3
-
nixpkgs-25.11-darwin
6.0.3
updated 1 day, 23 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
2 days, 4 hours ago
-
@LeSuisse
removed
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
2 days ago
-
@LeSuisse
accepted
2 days ago
-
@LeSuisse
published on GitHub
1 day, 23 hours ago
Zammad has incorrect access control in getting_started_controller
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, unauthenticated remote attackers were able to access the getting started endpoint to get access to sensitive internal entity data, even after the system setup was completed. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==>= 7.0.0-alpha, < 7.0.1
-
==< 6.5.4
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated 1 day, 23 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
2 days, 4 hours ago
-
@LeSuisse
removed
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
1 day, 23 hours ago
-
@LeSuisse
accepted
1 day, 23 hours ago
-
@LeSuisse
published on GitHub
1 day, 23 hours ago
Zammad has an information disclosure in ticket detail view of customers in shared organizations
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, customers in shared organizations (means they can see each other's tickets) could see fields which are not intended for customers - including fields not intended for them at all (e.g. priority, custom ticket attributes for internal purposes). This was the case when a customer opened a ticket from another user of the same shared organization. They are not able to modify these field. This vulnerability is fixed in 7.0.1.
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated 1 day, 23 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
2 days, 4 hours ago
-
@LeSuisse
removed
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
1 day, 23 hours ago
-
@LeSuisse
accepted
1 day, 23 hours ago
-
@LeSuisse
published on GitHub
1 day, 23 hours ago
Zammad is missing authorization in ticket create endpoint
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the used endpoint for ticket creation was missing authorization if the related parameter for adding links is used. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==>= 7.0.0-alpha, < 7.0.1
-
==< 6.5.4
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API