Published issues
Permalink
CVE-2026-44245
6.1 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): Required (R)
-
Scope (S): Changed (C)
-
Confidentiality (C): Low (L)
-
Integrity (I): Low (L)
-
Availability (A): None (N)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): Required (R)
-
Modified Confidentiality (MC): Low (L)
-
Modified Scope (MS): Changed (C)
-
Modified Integrity (MI): Low (L)
-
Modified Availability (MA): None (N)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
ignored
package kyverno-chainsaw
8 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
Kyverno: [policy-reporter-ui] XSS via Stored Property Values in PropertyCard Component
Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to 2.5.2, Vue 3's v-html directive is the framework-documented mechanism for injecting raw HTML, and it intentionally disables the auto-escaping that {{ }} interpolation provides. The PropertyCard.vue component uses v-html for the else branch of the URL check, meaning any non-URL string value flows directly into the DOM as HTML. The isURL() guard only filters values that parse as http: or https: URLs, so any HTML payload not starting with those schemes bypasses it entirely. The data originates from Kubernetes PolicyReport .results[].properties fields, which are arbitrary string maps populated by policy engines and potentially by any principal with write access to PolicyReport objects in the cluster. This vulnerability is fixed in 2.5.2.
Matching in nixpkgs
Kubernetes Native Policy Management
Ignored packages (1)
Declarative approach to test Kubernetes operators and controllers
Permalink
CVE-2026-44222
6.5 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): None (N)
-
Integrity (I): None (N)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): None (N)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): None (N)
-
Modified Availability (MA): High (H)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
vLLM: Remote DoS via Special-Token Placeholders
vLLM is an inference and serving engine for large language models (LLMs). From 0.6.1 to before 0.20.0, there is a a Token Injection vulnerability in vLLM’s multimodal processing. Unauthenticated, text-only prompts that spell special tokens are interpreted as control. Image and video placeholder sequences supplied without matching data cause vLLM to index into empty grids during input-position computation, raising an unhandled IndexError and terminating the worker or degrading availability. Multimodal paths that rely on image_grid_thw/video_grid_thw are affected. This vulnerability is fixed in 0.20.0.
Matching in nixpkgs
High-throughput and memory-efficient inference and serving engine for LLMs
High-throughput and memory-efficient inference and serving engine for LLMs
High-throughput and memory-efficient inference and serving engine for LLMs
High-throughput and memory-efficient inference and serving engine for LLMs
High-throughput and memory-efficient inference and serving engine for LLMs
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
YAML::Syck versions before 1.38 for Perl has an out-of-bounds read
YAML::Syck versions before 1.38 for Perl has an out-of-bounds read.
The base60 (sexagesimal) parsing code in perl_syck.h has a buffer underflow bug in both int#base60 and float#base60 handlers. When processing the leftmost segment of a colon-separated value (e.g., the 1 in 1:30:45), the inner while loop can decrement a pointer past the start of the string buffer:
while ( colon >= ptr && *colon != ':' )
{
colon--;
}
if ( *colon == ':' ) *colon = '\0'; // colon may be ptr-1 here
When no colon is found (final/leftmost segment), colon becomes ptr-1, and the subsequent *colon dereference reads one byte before the allocated buffer.
Matching in nixpkgs
Fast, lightweight YAML loader and dumper
-
-
nixpkgs-unstable
1.36
-
nixos-unstable-small
1.36
-
-
nixos-25.11-small
1.36
-
nixpkgs-25.11-darwin
1.36
Fast, lightweight YAML loader and dumper
-
-
nixpkgs-unstable
1.36
-
nixos-unstable-small
1.36
Fast, lightweight YAML loader and dumper
-
-
nixos-25.11-small
1.36
-
nixpkgs-25.11-darwin
1.36
Fast, lightweight YAML loader and dumper
-
-
nixos-25.11-small
1.36
-
nixpkgs-25.11-darwin
1.36
Permalink
CVE-2026-44166
6.1 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): Present (P)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): Passive (P)
-
Vulnerable System Impact Confidentiality (VC): Low (L)
-
Vulnerable System Impact Integrity (VI): High (H)
-
Vulnerable System Impact Availability (VA): Low (L)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): Present (P)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): Passive (P)
-
Modified Vulnerable System Impact Confidentiality (MVC): Low (L)
-
Modified Vulnerable System Impact Integrity (MVI): High (H)
-
Modified Vulnerable System Impact Availability (MVA): Low (L)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Provider Urgency (U): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
Pocketbase: Account pre-hijacking via OAuth2 unverfied->verified autolinking upgrade
Pocketbase is an open source web backend written in go. Prior to 0.22.42 and 0.37.4, in some situations, if an attacker knows the email address of the victim they can create and link an unverified PocketBase user in advance by authenticating with one of the OAuth2 app providers, e.g. "A". When the victim gets invited or decides to sign up to your app on their own with provider "B" (PocketBase OAuth2 auth requires to be with a different provider because we don't allow multiple OAuth2 accounts from the same provider to be associated to a single PocketBase user), the user created previously by the attacker will be autolinked, upgraded to "verified" and its old password reset. This vulnerability is fixed in 0.22.42 and 0.37.4.
Affected products
pocketbase
-
==>= 0.30.0, < 0.37.4
-
==< 0.22.42
Matching in nixpkgs
Open Source realtime backend in 1 file
Permalink
CVE-2026-42544
7.5 HIGH
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): None (N)
-
Integrity (I): None (N)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): None (N)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): None (N)
-
Modified Availability (MA): High (H)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
Granian: Unauthenticated DoS via WebSocket subprotocol header panic
Granian is a Rust HTTP server for Python applications. From 1.2.0 to 2.7.4, Granian aborts a worker process when an unauthenticated client sends a WebSocket upgrade request whose Sec-WebSocket-Protocol header contains non-ASCII bytes. The crash happens in Granian's WebSocket scope construction path, before the ASGI application is invoked. This vulnerability is fixed in 2.7.4.
Matching in nixpkgs
Rust HTTP server for Python ASGI/WSGI/RSGI applications
-
-
-
nixos-25.11-small
2.5.6
-
nixpkgs-25.11-darwin
2.5.6
Rust HTTP server for Python ASGI/WSGI/RSGI applications
-
-
nixos-25.11-small
2.5.6
-
nixpkgs-25.11-darwin
2.5.6
Rust HTTP server for Python ASGI/WSGI/RSGI applications
-
-
-
nixos-25.11-small
2.5.6
-
nixpkgs-25.11-darwin
2.5.6
Rust HTTP server for Python ASGI/WSGI/RSGI applications
Permalink
CVE-2026-42268
8.2 HIGH
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): Present (P)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): High (H)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): Present (P)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): High (H)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Provider Urgency (U): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
ignored
2 packages
- modsecurity-crs
- modsecurity_standalone
8 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
ModSecurity: Unsigned integer underflow in @verifySSN / @verifyCPF / @verifySVNR operators
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. From 3.0.0 to before 3.0.15, there is an unhandled exception (std::out_of_range) caused by unsigned integer underflow in libmodsecurity3 if the user (administrator) uses a rule any of @verifySSN, @verifyCPF, or @verifySVNR. This vulnerability is fixed in 3.0.15.
Matching in nixpkgs
ModSecurity v3 library component.
Ignored packages (2)
The OWASP ModSecurity Core Rule Set is a set of generic attack detection
rules for use with ModSecurity or compatible web application firewalls.
-
-
-
nixos-25.11-small
3.3.4
-
nixpkgs-25.11-darwin
3.3.4
Open source, cross-platform web application firewall (WAF)
Permalink
CVE-2026-7474
8.8 HIGH
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): High (H)
-
Integrity (I): High (H)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): High (H)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): High (H)
-
Modified Availability (MA): High (H)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
ignored
13 packages
- git-nomad
- nomad-pack
- nomad-autoscaler
- nomad-driver-podman
- nomad-driver-containerd
- terraform-providers.nomad
- python312Packages.nomadnet
- python313Packages.nomadnet
- python314Packages.nomadnet
- python312Packages.python-nomad
- python313Packages.python-nomad
- python314Packages.python-nomad
- terraform-providers.hashicorp_nomad
8 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
Nomad vulnerable to path traversal in dynamic host volume which may lead to code execution
HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to code execution on the client host through a path traversal attack. This vulnerability (CVE-2026-7474) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.
Matching in nixpkgs
Distributed, Highly Available, Datacenter-Aware Scheduler
Distributed, Highly Available, Datacenter-Aware Scheduler
-
-
-
nixos-25.11-small
1.9.7
-
nixpkgs-25.11-darwin
1.9.7
Distributed, Highly Available, Datacenter-Aware Scheduler
Distributed, Highly Available, Datacenter-Aware Scheduler
Ignored packages (13)
Synchronize work-in-progress git branches in a light weight fashion
-
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Nomad Pack is a templating and packaging tool used with HashiCorp Nomad
-
-
-
nixos-25.11-small
0.4.0
-
nixpkgs-25.11-darwin
0.4.0
Autoscaling daemon for Nomad
-
-
-
nixos-25.11-small
0.3.6
-
nixpkgs-25.11-darwin
0.3.6
Podman task driver for Nomad
-
-
-
nixos-25.11-small
0.6.3
-
nixpkgs-25.11-darwin
0.6.3
Containerd task driver for Nomad
-
-
-
nixos-25.11-small
0.9.4
-
nixpkgs-25.11-darwin
0.9.4
Off-grid, resilient mesh communication
-
-
nixos-25.11-small
0.9.1
-
nixpkgs-25.11-darwin
0.9.1
Off-grid, resilient mesh communication
-
-
-
nixos-25.11-small
0.9.1
-
nixpkgs-25.11-darwin
0.9.1
Off-grid, resilient mesh communication
Python client library for Hashicorp Nomad
-
-
nixos-25.11-small
2.1.0
-
nixpkgs-25.11-darwin
2.1.0
Python client library for Hashicorp Nomad
-
-
-
nixos-25.11-small
2.1.0
-
nixpkgs-25.11-darwin
2.1.0
Python client library for Hashicorp Nomad
Permalink
CVE-2026-6959
6.0 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Local (L)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): High (H)
-
User Interaction (UI): None (N)
-
Scope (S): Changed (C)
-
Confidentiality (C): None (N)
-
Integrity (I): High (H)
-
Availability (A): None (N)
-
Modified Attack Vector (MAV): Local (L)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): High (H)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): None (N)
-
Modified Scope (MS): Changed (C)
-
Modified Integrity (MI): High (H)
-
Modified Availability (MA): None (N)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
ignored
12 packages
- git-nomad
- nomad-autoscaler
- nomad-driver-podman
- nomad-driver-containerd
- terraform-providers.nomad
- python312Packages.nomadnet
- python313Packages.nomadnet
- python314Packages.nomadnet
- python312Packages.python-nomad
- python313Packages.python-nomad
- python314Packages.python-nomad
- terraform-providers.hashicorp_nomad
8 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
Nomad vulnerable to arbitrary file read/write on client host through symlink attack
HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-6959) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.
Matching in nixpkgs
Distributed, Highly Available, Datacenter-Aware Scheduler
Distributed, Highly Available, Datacenter-Aware Scheduler
-
-
-
nixos-25.11-small
1.9.7
-
nixpkgs-25.11-darwin
1.9.7
Nomad Pack is a templating and packaging tool used with HashiCorp Nomad
-
-
-
nixos-25.11-small
0.4.0
-
nixpkgs-25.11-darwin
0.4.0
Distributed, Highly Available, Datacenter-Aware Scheduler
Distributed, Highly Available, Datacenter-Aware Scheduler
Ignored packages (12)
Synchronize work-in-progress git branches in a light weight fashion
-
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Autoscaling daemon for Nomad
-
-
-
nixos-25.11-small
0.3.6
-
nixpkgs-25.11-darwin
0.3.6
Podman task driver for Nomad
-
-
-
nixos-25.11-small
0.6.3
-
nixpkgs-25.11-darwin
0.6.3
Containerd task driver for Nomad
-
-
-
nixos-25.11-small
0.9.4
-
nixpkgs-25.11-darwin
0.9.4
Off-grid, resilient mesh communication
-
-
nixos-25.11-small
0.9.1
-
nixpkgs-25.11-darwin
0.9.1
Off-grid, resilient mesh communication
-
-
-
nixos-25.11-small
0.9.1
-
nixpkgs-25.11-darwin
0.9.1
Off-grid, resilient mesh communication
Python client library for Hashicorp Nomad
-
-
nixos-25.11-small
2.1.0
-
nixpkgs-25.11-darwin
2.1.0
Python client library for Hashicorp Nomad
-
-
-
nixos-25.11-small
2.1.0
-
nixpkgs-25.11-darwin
2.1.0
Python client library for Hashicorp Nomad
Permalink
CVE-2026-44223
6.5 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): None (N)
-
Integrity (I): None (N)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): None (N)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): None (N)
-
Modified Availability (MA): High (H)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
vLLM: extract_hidden_states speculative decoding crashes server on any request with penalty parameters
vLLM is an inference and serving engine for large language models (LLMs). From to before 0.20.0, the extract_hidden_states speculative decoding proposer in vLLM returns a tensor with an incorrect shape after the first decode step, causing a RuntimeError that crashes the EngineCore process. The crash is triggered when any request in the batch uses sampling penalty parameters (repetition_penalty, frequency_penalty, or presence_penalty). A single request with a penalty parameter (e.g., "repetition_penalty": 1.1) is sufficient to crash the server. This vulnerability is fixed in 0.20.0.
Matching in nixpkgs
High-throughput and memory-efficient inference and serving engine for LLMs
High-throughput and memory-efficient inference and serving engine for LLMs
High-throughput and memory-efficient inference and serving engine for LLMs
High-throughput and memory-efficient inference and serving engine for LLMs
High-throughput and memory-efficient inference and serving engine for LLMs
Permalink
CVE-2026-44347
5.8 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): High (H)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): Required (R)
-
Scope (S): Changed (C)
-
Confidentiality (C): None (N)
-
Integrity (I): High (H)
-
Availability (A): None (N)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): High (H)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): Required (R)
-
Modified Confidentiality (MC): None (N)
-
Modified Scope (MS): Changed (C)
-
Modified Integrity (MI): High (H)
-
Modified Availability (MA): None (N)
updated
8 hours ago
by @LeSuisse
Activity log
-
Created suggestion
13 hours ago
-
@LeSuisse
accepted
8 hours ago
-
@LeSuisse
published on GitHub
8 hours ago
Warpgate: SSO CSRF -- State Token Not Validated on Return
Warpgate is an open source SSH, HTTPS and MySQL bastion host for Linux. Prior to 0.23.3, the SSO flow does not validate the state parameter, which makes it possible for an attacker to trick a user into logging into the attacker's account, possibly convincing them to perform sensitive actions on the attacker's account (such as writing sensitive data to the attacker's SSH target, or logging into an HTTP target that the attacker set up). This vulnerability is fixed in 0.23.3.
Matching in nixpkgs
Smart SSH, HTTPS, MySQL and Postgres bastion that requires no additional client-side software