Published issues
updated
11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
reference https://g…
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
11 hours ago
GitPython: Path traversal in GitPython reference APIs allows arbitrary file write and delete outside the repository
GitPython is a python library used to interact with Git repositories. Prior to version 3.1.48, a vulnerability in GitPython allows attackers who can supply a crafted reference path to an application using GitPython to write, overwrite, move, or delete files outside the repository’s .git directory via insufficient validation of reference paths in reference creation, rename, and delete operations. This issue has been patched in version 3.1.48.
updated
11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
11 hours ago
BentoPDF: Stored XSS via Markdown Editor Leading to Persistent File Exfiltration
BentoPDF is a client-side PDF toolkit that is self hostable. Prior to version 2.8.3, a cross-site scripting vulnerability was identified in BentoPD. An attacker may be able to execute arbitrary JavaScript in certain circumstances in Markdown to PDF Tool. This issue has been patched in version 2.8.3.
Matching in nixpkgs
Privacy-first PDF toolkit
updated
11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
3 packages
- openexr_2
- openexrid-unstable
- haskellPackages.openexr-write
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
11 hours ago
OpenEXR: Shift exponent overflow in `readVariableLengthInteger()` (`ImfIDManifest.cpp`)
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From versions 3.0.0 to before 3.2.9, 3.3.0 to before 3.3.11, and 3.4.0 to before 3.4.11, readVariableLengthInteger() decodes a variable-length integer from untrusted EXR input without bounding the shift count. After enough continuation bytes, the code executes a left shift by 70 on a 64-bit value, which is undefined behavior. This issue has been patched in versions 3.2.9, 3.3.11, and 3.4.11.
Affected products
openexr
-
==>= 3.0.0, < 3.2.9
-
==>= 3.4.0, < 3.4.11
-
==>= 3.3.0, < 3.3.11
Matching in nixpkgs
High dynamic-range (HDR) image file format
-
-
-
nixos-25.11-small
3.3.8
-
nixpkgs-25.11-darwin
3.3.8
Ignored packages (3)
High dynamic-range (HDR) image file format
OpenEXR files able to isolate any object of a CG image with a perfect antialiazing
Library for writing images in OpenEXR HDR file format
updated
11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
3 packages
- openexr_2
- openexrid-unstable
- haskellPackages.openexr-write
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
11 hours ago
OpenEXR: Out-of-bounds read in `IDManifest::init()` during prefix expansion
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From versions 3.0.0 to before 3.2.9, 3.3.0 to before 3.3.11, and 3.4.0 to before 3.4.11, IDManifest::init() reconstructs strings from a prefix-compressed representation. If the previous string is longer than 255 bytes, the next string is expected to begin with a 2-byte prefix length. The code reads stringList[i][0] and stringList[i][1] without checking that the current string has at least two bytes. This issue has been patched in versions 3.2.9, 3.3.11, and 3.4.11.
Affected products
openexr
-
==>= 3.0.0, < 3.2.9
-
==>= 3.4.0, < 3.4.11
-
==>= 3.3.0, < 3.3.11
Matching in nixpkgs
High dynamic-range (HDR) image file format
-
-
-
nixos-25.11-small
3.3.8
-
nixpkgs-25.11-darwin
3.3.8
Ignored packages (3)
High dynamic-range (HDR) image file format
OpenEXR files able to isolate any object of a CG image with a perfect antialiazing
Library for writing images in OpenEXR HDR file format
updated
11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
reference https://g…
1 day, 11 hours ago
-
@LeSuisse
ignored
8 packages
- python313Packages.weblate-fonts
- python314Packages.weblate-fonts
- python312Packages.weblate-schemas
- python313Packages.weblate-schemas
- python314Packages.weblate-schemas
- python312Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-language-data
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
11 hours ago
Weblate is Vulnerable to Authenticated SSRF via Project Backup Import bypassing validate_repo_url
Weblate is a web based localization tool. Prior to version 5.17.1, an authenticated user with project.add permission (default on hosted Weblate SaaS and for any user holding an active billing/trial plan) can import a crafted project backup ZIP whose components/<name>.json contains an attacker-chosen repo URL pointing at a private address (e.g. http://127.0.0.1:9999/) or using a non-allow-listed scheme (e.g. file://, git://). Weblate persists the component via Component.objects.bulk_create([component])[0], which bypasses Django's full_clean() and therefore never runs the validate_repo_url validator. The URL is subsequently written verbatim into .git/config by configure_repo(pull=False). This issue has been patched in version 5.17.1.
Matching in nixpkgs
Web based translation tool with tight version control integration
-
-
nixpkgs-unstable
5.17
-
nixos-unstable-small
5.17
-
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
updated
11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
3 packages
- incus-ui-canonical
- terraform-providers.incus
- terraform-providers.lxc_incus
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
11 hours ago
Incus: Unbounded YAML Metadata Decode via Parsing
Incus is a system container and virtual machine manager. Prior to version 7.0.0, user provided image and backup tarballs would be unpacked and YAML files parsed without any size restrictions. This was making it easy for an authenticated user to provide a crafted image or backup tarball that when parsed by Incus would lead to a very large YAML document being loaded into memory, potentially causing the entire server to run out of memory. This issue has been patched in version 7.0.0.
Matching in nixpkgs
Powerful system container and virtual machine manager
Powerful system container and virtual machine manager
Ignored packages (3)
Web user interface for Incus
Permalink
CVE-2026-41413
5.0 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Scope (S): Changed (C)
-
Confidentiality (C): Low (L)
-
Integrity (I): None (N)
-
Availability (A): None (N)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): Low (L)
-
Modified Scope (MS): Changed (C)
-
Modified Integrity (MI): None (N)
-
Modified Availability (MA): None (N)
updated
1 day, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
reference https://g…
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
1 day, 11 hours ago
Istio Vulnerable to SSRF via RequestAuthentication jwksUri
Istio is an open platform to connect, manage, and secure microservices. Prior to versions 1.28.6 and 1.29.2, when a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS configuration. This issue has been patched in versions 1.28.6 and 1.29.2.
Affected products
istio
-
==< 1.28.6
-
==>= 1.29.0-alpha.0, < 1.29.2
Matching in nixpkgs
Istio configuration command line utility for service operators to debug and diagnose their Istio mesh
Permalink
CVE-2026-42215
8.8 HIGH
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): High (H)
-
Integrity (I): High (H)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): High (H)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): High (H)
-
Modified Availability (MA): High (H)
updated
1 day, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
reference https://g…
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
1 day, 11 hours ago
GitPython: Command injection via Git options bypass
GitPython is a python library used to interact with Git repositories. From version 3.1.30 to before version 3.1.47, GitPython blocks dangerous Git options such as --upload-pack and --receive-pack by default, but the equivalent Python kwargs upload_pack and receive_pack bypass that check. If an application passes attacker-controlled kwargs into Repo.clone_from(), Remote.fetch(), Remote.pull(), or Remote.push(), this leads to arbitrary command execution even when allow_unsafe_options is left at its default value of False. This issue has been patched in version 3.1.47.
Permalink
CVE-2026-42284
8.1 HIGH
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): High (H)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): High (H)
-
Integrity (I): High (H)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): High (H)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): High (H)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): High (H)
-
Modified Availability (MA): High (H)
updated
1 day, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
reference https://g…
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
1 day, 11 hours ago
GitPython: Unsafe option check validates multi_options before shlex.split transforms it
GitPython is a python library used to interact with Git repositories. Prior to version 3.1.47, _clone() validates multi_options as the original list, then executes shlex.split(" ".join(multi_options)). A string like "--branch main --config core.hooksPath=/x" passes validation (starts with --branch), but after split becomes ["--branch", "main", "--config", "core.hooksPath=/x"]. Git applies the config and executes attacker hooks during clone. This issue has been patched in version 3.1.47.
Permalink
CVE-2026-44264
4.3 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): None (N)
-
Integrity (I): Low (L)
-
Availability (A): None (N)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): None (N)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): Low (L)
-
Modified Availability (MA): None (N)
updated
1 day, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
1 day, 19 hours ago
-
@LeSuisse
ignored
package python313Packages.weblate-fonts
1 day, 11 hours ago
-
@LeSuisse
ignored
reference https://g…
1 day, 11 hours ago
-
@LeSuisse
ignored
7 packages
- python314Packages.weblate-fonts
- python312Packages.weblate-schemas
- python313Packages.weblate-schemas
- python314Packages.weblate-schemas
- python312Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-language-data
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
1 day, 11 hours ago
Weblate is vulnerable to XSS via crafted Markdown
Weblate is a web based localization tool. Prior to version 5.17.1, the Markdown renderer used in user comments and other user-provided content didn't properly sanitize some attributes. This issue has been patched in version 5.17.1.
Matching in nixpkgs
Web based translation tool with tight version control integration
-
-
nixpkgs-unstable
5.17
-
nixos-unstable-small
5.17
-
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate