Published issues
Permalink
CVE-2026-6525
5.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
4 hours ago
by @LeSuisse
Activity log
-
Created suggestion
11 hours ago
-
@LeSuisse
ignored
2 maintainers
4 hours ago
maintainer.ignore
-
@LeSuisse
accepted
4 hours ago
-
@LeSuisse
published on GitHub
4 hours ago
NULL Pointer Dereference in Wireshark
IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.4
Matching in nixpkgs
Powerful network protocol analyzer
-
-
-
nixos-25.11-small
4.6.4
-
nixpkgs-25.11-darwin
4.6.4
Powerful network protocol analyzer
-
-
-
nixos-25.11-small
4.6.4
-
nixpkgs-25.11-darwin
4.6.4
Powerful network protocol analyzer
-
-
-
nixos-25.11-small
4.6.4
-
nixpkgs-25.11-darwin
4.6.4
Powerful network protocol analyzer
-
-
-
nixos-25.11-small
4.6.4
-
nixpkgs-25.11-darwin
4.6.4
Package maintainers
Ignored maintainers (2)
Permalink
CVE-2026-7536
5.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV):
-
Attack complexity (AC):
-
Privileges required (PR):
-
User interaction (UI):
-
Scope (S):
-
Confidentiality impact (C):
-
Integrity impact (I):
-
Availability impact (A):
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
package open5gs-webui
1 day, 3 hours ago
-
@LeSuisse
ignored
4 references
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
Open5GS BSF pcfBindings bsf_sess_add_by_ip_address denial of service
A vulnerability was determined in Open5GS up to 2.7.7. This vulnerability affects the function bsf_sess_add_by_ip_address of the file /nbsf-management/v1/pcfBindings of the component BSF. Executing a manipulation of the argument ipv4Addr can lead to denial of service. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Affected products
Open5GS
-
==2.7.4
-
==2.7.0
-
==2.7.2
-
==2.7.5
-
==2.7.1
-
==2.7.3
-
==2.7.6
-
==2.7.7
Matching in nixpkgs
4G/5G core network components
-
-
-
nixos-25.11-small
2.7.7
-
nixpkgs-25.11-darwin
2.7.7
Ignored packages (1)
4G/5G core network components
-
-
-
nixos-25.11-small
2.7.7
-
nixpkgs-25.11-darwin
2.7.7
Permalink
CVE-2026-7598
7.3 HIGH
-
CVSS version: 3.1
-
Attack vector (AV):
-
Attack complexity (AC):
-
Privileges required (PR):
-
User interaction (UI):
-
Scope (S):
-
Confidentiality impact (C):
-
Integrity impact (I):
-
Availability impact (A):
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
3 packages
- haskellPackages.libssh2
- haskellPackages.libssh2-conduit
- tests.pkg-config.defaultPkgConfigPackages.libssh2
1 day, 3 hours ago
-
@LeSuisse
ignored
4 references
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
libssh2 userauth.c userauth_password integer overflow
A security vulnerability has been detected in libssh2 up to 1.11.1. The impacted element is the function userauth_password of the file src/userauth.c. Such manipulation of the argument username_len/password_len leads to integer overflow. The attack may be launched remotely. The name of the patch is 256d04b60d80bf1190e96b0ad1e91b2174d744b1. A patch should be applied to remediate this issue.
Matching in nixpkgs
Client-side C library implementing the SSH2 protocol
Ignored packages (3)
FFI bindings to libssh2 SSH2 client library (http://libssh2.org/)
Conduit wrappers for libssh2 FFI bindings (see libssh2 package)
-
-
-
nixos-25.11-small
0.2.1
-
nixpkgs-25.11-darwin
0.2.1
Test whether libssh2-1.11.1 exposes pkg-config modules libssh2
Permalink
CVE-2026-7587
4.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV):
-
Attack complexity (AC):
-
Privileges required (PR):
-
User interaction (UI):
-
Scope (S):
-
Confidentiality impact (C):
-
Integrity impact (I):
-
Availability impact (A):
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
package open5gs-webui
1 day, 3 hours ago
-
@LeSuisse
ignored
4 references
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
Open5GS AMF nsmf-handler.c amf_nsmf_pdusession_handle_update_sm_context denial of service
A vulnerability has been found in Open5GS up to 2.7.7. This vulnerability affects the function amf_nsmf_pdusession_handle_update_sm_context of the file /src/amf/nsmf-handler.c of the component AMF. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Affected products
Open5GS
-
==2.7.4
-
==2.7.0
-
==2.7.2
-
==2.7.5
-
==2.7.1
-
==2.7.3
-
==2.7.6
-
==2.7.7
Matching in nixpkgs
4G/5G core network components
-
-
-
nixos-25.11-small
2.7.7
-
nixpkgs-25.11-darwin
2.7.7
Ignored packages (1)
4G/5G core network components
-
-
-
nixos-25.11-small
2.7.7
-
nixpkgs-25.11-darwin
2.7.7
Permalink
CVE-2026-7585
4.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV):
-
Attack complexity (AC):
-
Privileges required (PR):
-
User interaction (UI):
-
Scope (S):
-
Confidentiality impact (C):
-
Integrity impact (I):
-
Availability impact (A):
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
6 references
1 day, 3 hours ago
-
@LeSuisse
ignored
package open5gs-webui
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
Open5GS AMF nudm-handler.c amf_nudm_sdm_handle_provisioned denial of service
A vulnerability was determined in Open5GS up to 2.7.7. The impacted element is the function amf_nudm_sdm_handle_provisioned of the file /src/amf/nudm-handler.c of the component AMF. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Affected products
Open5GS
-
==2.7.4
-
==2.7.0
-
==2.7.2
-
==2.7.5
-
==2.7.1
-
==2.7.3
-
==2.7.6
-
==2.7.7
Matching in nixpkgs
4G/5G core network components
-
-
-
nixos-25.11-small
2.7.7
-
nixpkgs-25.11-darwin
2.7.7
Ignored packages (1)
4G/5G core network components
-
-
-
nixos-25.11-small
2.7.7
-
nixpkgs-25.11-darwin
2.7.7
Permalink
CVE-2026-7580
5.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV):
-
Attack complexity (AC):
-
Privileges required (PR):
-
User interaction (UI):
-
Scope (S):
-
Confidentiality impact (C):
-
Integrity impact (I):
-
Availability impact (A):
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
3 references
1 day, 3 hours ago
-
@LeSuisse
ignored
7 packages
- perlPackages.ImageExifTool
- perl5Packages.ImageExifTool
- python312Packages.pyexiftool
- python313Packages.pyexiftool
- python314Packages.pyexiftool
- perl538Packages.ImageExifTool
- perl540Packages.ImageExifTool
1 day, 3 hours ago
-
@LeSuisse
ignored
reference Submit #8…
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
Exiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injection
A vulnerability was detected in Exiftool up to 13.53. Impacted is the function Process_mrld of the file lib/Image/ExifTool/GM.pm of the component JPEG/QuickTime/MOV/MP4. The manipulation of the argument -ee results in code injection. Attacking locally is a requirement. Upgrading to version 13.54 is recommended to address this issue. The patch is identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. It is suggested to upgrade the affected component. The fix in the source code mentions: "[J]ust to be safe, probably never happen".
Affected products
Exiftool
-
==13.52
-
==13.36
-
==13.35
-
==13.34
-
==13.48
-
==13.42
-
==13.33
-
==13.19
-
==13.38
-
==13.45
-
==13.39
-
==13.46
-
==13.30
-
==13.0
-
==13.37
-
==13.14
-
==13.43
-
==13.51
-
==13.29
-
==13.25
-
==13.54
-
==13.18
-
==13.16
-
==13.3
-
==13.21
-
==13.12
-
==13.13
-
==13.11
-
==13.9
-
==13.24
-
==13.28
-
==13.6
-
==13.26
-
==13.32
-
==13.4
-
==13.15
-
==13.17
-
==13.50
-
==13.31
-
==13.44
-
==13.49
-
==13.23
-
==13.7
-
==13.40
-
==13.20
-
==13.2
-
==13.22
-
==13.10
-
==13.8
-
==13.5
-
==13.53
-
==13.27
-
==13.41
-
==13.47
-
==13.1
Permalink
CVE-2026-43506
5.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
2 packages
- prosody-filer
- jitsi-meet-prosody
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
An issue was discovered in Prosody before 0.12.6 and 1.0.0 …
An issue was discovered in Prosody before 0.12.6 and 1.0.0 through 13.0.0 before 13.0.5. A Denial of Service can occur via memory exhaustion caused by memory leaks from unauthenticated connections.
Matching in nixpkgs
Open-source XMPP application server written in Lua
Ignored packages (2)
Simple file server for handling XMPP http_upload requests
Prosody configuration for Jitsi Meet
Permalink
CVE-2026-7518
4.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV):
-
Attack complexity (AC):
-
Privileges required (PR):
-
User interaction (UI):
-
Scope (S):
-
Confidentiality impact (C):
-
Integrity impact (I):
-
Availability impact (A):
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
3 references
1 day, 3 hours ago
-
@LeSuisse
ignored
package open5gs-webui
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
Open5GS AMF SBI Endpoint sdmsubscription-notify amf_namf_callback_handle_sdm_data_change_notify denial of service
A flaw has been found in Open5GS up to 2.7.7. This issue affects the function amf_namf_callback_handle_sdm_data_change_notify of the file /namf-callback/v1/{id}/sdmsubscription-notify of the component AMF SBI Endpoint. This manipulation of the argument changeItem.newValue causes denial of service. The attack can be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Affected products
Open5GS
-
==2.7.4
-
==2.7.0
-
==2.7.2
-
==2.7.5
-
==2.7.1
-
==2.7.3
-
==2.7.6
-
==2.7.7
Matching in nixpkgs
4G/5G core network components
-
-
-
nixos-25.11-small
2.7.7
-
nixpkgs-25.11-darwin
2.7.7
Ignored packages (1)
4G/5G core network components
-
-
-
nixos-25.11-small
2.7.7
-
nixpkgs-25.11-darwin
2.7.7
Permalink
CVE-2026-43504
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): LOW
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
2 packages
- prosody-filer
- jitsi-meet-prosody
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
An issue was discovered in Prosody before 0.12.6 and 1.0.0 …
An issue was discovered in Prosody before 0.12.6 and 1.0.0 through 13.0.0 before 13.0.5, when mod_proxy65 is enabled. Because mod_proxy65 mishandles access control in a paused scenario, relaying of unauthenticated traffic can occur.
Matching in nixpkgs
Open-source XMPP application server written in Lua
Ignored packages (2)
Simple file server for handling XMPP http_upload requests
Prosody configuration for Jitsi Meet
Permalink
CVE-2026-43507
5.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
1 day, 3 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 11 hours ago
-
@LeSuisse
ignored
reference https://b…
1 day, 3 hours ago
-
@LeSuisse
ignored
2 packages
- prosody-filer
- jitsi-meet-prosody
1 day, 3 hours ago
-
@LeSuisse
accepted
1 day, 3 hours ago
-
@LeSuisse
published on GitHub
1 day, 3 hours ago
An issue was discovered in Prosody before 0.12.6 and 1.0.0 …
An issue was discovered in Prosody before 0.12.6 and 1.0.0 through 13.0.0 before 13.0.5. A Denial of Service can occur via memory exhaustion caused by XML parsing resource amplification from unauthenticated connections.
Matching in nixpkgs
Open-source XMPP application server written in Lua
Ignored packages (2)
Simple file server for handling XMPP http_upload requests
Prosody configuration for Jitsi Meet