Published issues
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
1 day, 21 hours ago
-
@LeSuisse
ignored
5 packages
- python312Packages.glances-api
- python313Packages.glances-api
- python314Packages.glances-api
- home-assistant-component-tests.glances
- tests.home-assistant-components.glances
1 day, 11 hours ago
-
@LeSuisse
accepted
1 day, 11 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
Glances Vulnerable to Cross-Origin Information Disclosure via Unauthenticated REST API (/api/4) due to Permissive CORS
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Glances web server exposes a REST API (`/api/4/*`) that is accessible without authentication and allows cross-origin requests from any origin due to a permissive CORS policy (`Access-Control-Allow-Origin: *`). This allows a malicious website to read sensitive system information from a running Glances instance in the victim’s browser, leading to cross-origin data exfiltration. While a previous advisory exists for XML-RPC CORS issues, this report demonstrates that the REST API (`/api/4/*`) is also affected and exposes significantly more sensitive data. Version 4.5.4 patches the issue.
Matching in nixpkgs
Cross-platform curses-based monitoring tool
-
-
-
nixos-25.11-small
4.3.3
-
nixpkgs-25.11-darwin
4.3.3
Ignored packages (5)
Python API for interacting with Glances
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Python API for interacting with Glances
-
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Python API for interacting with Glances
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
accepted
10 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
OpenBao allows SQL Injection in PostgreSQL database secrets engine
OpenBao is an open source identity-based secrets management system. Prior to version 2.5.3, when OpenBao revoked privileges on a role in the PostgreSQL database secrets engine, OpenBao failed to use proper database quoting on schema names provided by PostgreSQL. This could lead to role revocation failures, or more rarely, SQL injection as the management user. This vulnerability was original from HashiCorp Vault. The vulnerability is addressed in v2.5.3. As a workaround, audit table schemas and ensure database users cannot create new schemas and grant privileges on them.
Matching in nixpkgs
Open source, community-driven fork of Vault managed by the Linux Foundation
-
-
-
nixos-25.11-small
2.5.2
-
nixpkgs-25.11-darwin
2.5.2
Permalink
CVE-2026-39396
3.1 LOW
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
ignored
reference https://g…
10 hours ago
-
@LeSuisse
accepted
10 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
OpenBao has Decompression Bomb via Unbounded Copy in OCI Plugin Extraction (DoS)
OpenBao is an open source identity-based secrets management system. Prior to version 2.5.3, `ExtractPluginFromImage()` in OpenBao's OCI plugin downloader extracts a plugin binary from a container image by streaming decompressed tar data via `io.Copy` with no upper bound on the number of bytes written. An attacker who controls or compromises the OCI registry referenced in the victim's configuration can serve a crafted image containing a decompression bomb that decompresses to an arbitrarily large file. The SHA256 integrity check occurs after the full file is written to disk, meaning the hash mismatch is detected only after the damage (disk exhaustion) has already occurred. This allow the attacker to replace **legit plugin image** with no need to change its signature. Version 2.5.3 contains a patch.
Matching in nixpkgs
Open source, community-driven fork of Vault managed by the Linux Foundation
-
-
-
nixos-25.11-small
2.5.2
-
nixpkgs-25.11-darwin
2.5.2
Permalink
CVE-2026-40884
9.8 CRITICAL
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
accepted
10 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
goshs: Empty-username SFTP password authentication bypass in goshs
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated network attacker can connect to the SFTP service and access files without a password. This vulnerability is fixed in 2.0.0-beta.6.
Matching in nixpkgs
Simple, yet feature-rich web server written in Go
Permalink
CVE-2026-39377
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): HIGH
-
Availability impact (A): NONE
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
ignored
reference https://g…
10 hours ago
-
@LeSuisse
accepted
10 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
nbconvert has an Arbitrary File Write via Path Traversal in Cell Attachment Filenames
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions 6.5 through 7.17.0 allow arbitrary file writes to locations outside the intended output directory when processing notebooks containing crafted cell attachment filenames. The `ExtractAttachmentsPreprocessor` passes attachment filenames directly to the filesystem without sanitization, enabling path traversal attacks. This vulnerability provides complete control over both the destination path and file extension. Version 7.17.1 contains a patch.
Matching in nixpkgs
Converting Jupyter Notebooks
Converting Jupyter Notebooks
Converting Jupyter Notebooks
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
ignored
3 packages
- openexrid-unstable
- haskellPackages.openexr-write
- openexr_2
10 hours ago
-
@LeSuisse
accepted
10 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
OpenEXR has integer overflow in DWA decoder outBufferEnd pointer arithmetic (missed variant of CVE-2026-34589)
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.4.0 through 3.4.9, 3.3.0 through 3.3.9, and 3.2.0 through 3.2.7, `internal_dwa_compressor.h:1040` performs `chan->width * chan->bytes_per_element` in `int32` arithmetic without a `(size_t)` cast. This is the same overflow pattern fixed in other decoders by CVE-2026-34589/34588/34544, but this line was missed. Versions 3.4.10, 3.3.10, and 3.2.8 contain a fix that addresses `internal_dwa_compressor.h:1040`.
Affected products
openexr
-
==>= 3.4.0, < 3.4.10
-
==>= 3.3.0, < 3.3.10
-
==>= 3.2.0, < 3.2.8
Matching in nixpkgs
High dynamic-range (HDR) image file format
-
-
-
nixos-25.11-small
3.3.8
-
nixpkgs-25.11-darwin
3.3.8
Ignored packages (3)
High dynamic-range (HDR) image file format
OpenEXR files able to isolate any object of a CG image with a perfect antialiazing
Library for writing images in OpenEXR HDR file format
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
ignored
3 packages
- openexrid-unstable
- haskellPackages.openexr-write
- openexr_2
10 hours ago
-
@LeSuisse
accepted
10 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
OpenEXR has integer overflow in DWA setupChannelData planarUncRle pointer arithmetic (missed variant of CVE-2026-34589)
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.4.0 through 3.4.9, 3.3.0 through 3.3.9, and 3.2.0 through 3.2.7, `internal_dwa_compressor.h:1722` performs `curc->width * curc->height` in `int32` arithmetic without a `(size_t)` cast. This is the same overflow pattern fixed in other locations by the recent CVE-2026-34589 batch, but this line was missed. Versions 3.4.10, 3.3.10, and 3.2.8 contain a fix that addresses `internal_dwa_compressor.h:1722`.
Affected products
openexr
-
==>= 3.4.0, < 3.4.10
-
==>= 3.3.0, < 3.3.10
-
==>= 3.2.0, < 3.2.8
Matching in nixpkgs
High dynamic-range (HDR) image file format
-
-
-
nixos-25.11-small
3.3.8
-
nixpkgs-25.11-darwin
3.3.8
Ignored packages (3)
High dynamic-range (HDR) image file format
OpenEXR files able to isolate any object of a CG image with a perfect antialiazing
Library for writing images in OpenEXR HDR file format
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
accepted
10 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
SFTP root escape via prefix-based path validation in goshs
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP root escape caused by prefix-based path validation. An authenticated SFTP user can read from and write to filesystem paths outside the configured SFTP root, which breaks the intended jail boundary and can expose or modify unrelated server files. The SFTP subsystem routes requests through sftpserver/sftpserver.go into DefaultHandler.GetHandler() in sftpserver/handler.go, which forwards file operations into readFile, writeFile, listFile, and cmdFile. All of those sinks rely on sanitizePath() in sftpserver/helper.go. helper.go uses a raw string-prefix comparison, not a directory-boundary check. Because of that, if the configured root is /tmp/goshsroot, then a sibling path such as /tmp/goshsroot_evil/secret.txt incorrectly passes validation since it starts with the same byte prefix. This vulnerability is fixed in 2.0.0-beta.6.
Matching in nixpkgs
Simple, yet feature-rich web server written in Go
Permalink
CVE-2026-40594
4.8 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
ignored
5 packages
- python312Packages.pyloadapi
- python313Packages.pyloadapi
- python314Packages.pyloadapi
- home-assistant-component-tests.pyload
- tests.home-assistant-components.pyload
9 hours ago
-
@LeSuisse
accepted
9 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
pyLoad: Session Cookie Security Downgrade via Untrusted X-Forwarded-Proto Header Spoofing (Global State Race Condition)
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev98, the set_session_cookie_secure before_request handler in src/pyload/webui/app/__init__.py reads the X-Forwarded-Proto header from any HTTP request without validating that the request originates from a trusted proxy, then mutates the global Flask configuration SESSION_COOKIE_SECURE on every request. Because pyLoad uses the multi-threaded Cheroot WSGI server (request_queue_size=512), this creates a race condition where an attacker's request can influence the Secure flag on other users' session cookies — either downgrading cookie security behind a TLS proxy or causing a session denial-of-service on plain HTTP deployments. This vulnerability is fixed in 0.5.0b3.dev98.
Matching in nixpkgs
Free and open-source download manager with support for 1-click-hosting sites
Ignored packages (5)
Simple wrapper for pyLoad's API
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
-
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
Permalink
CVE-2026-39378
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated 9 hours ago
by @LeSuisse
Activity log
-
Created automatic suggestion
21 hours ago
-
@LeSuisse
ignored
reference https://g…
9 hours ago
-
@LeSuisse
accepted
9 hours ago
-
@LeSuisse
published on GitHub
9 hours ago
nbconvert has an Arbitrary File Read via Path Traversal in HTMLExporter Image Embedding
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. In versions 6.5 through 7.17.0, when `HTMLExporter.embed_images=True`, nbconvert's markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML. nbconvert 7.17.1 contains a fix. As a workaround, do not enable `HTMLExporter.embed_images`; it is not enabled by default.
Matching in nixpkgs
Converting Jupyter Notebooks
Converting Jupyter Notebooks
Converting Jupyter Notebooks