Published issues
Permalink
CVE-2026-41445
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 1 day ago
-
@LeSuisse
ignored
package kissfftFloat
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
KissFFT Integer Overflow Heap Buffer Overflow via kiss_fftndr_alloc()
KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr.c where the allocation size calculation dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) overflows signed 32-bit integer arithmetic before being widened to size_t, causing malloc() to allocate an undersized buffer. Attackers can trigger heap buffer overflow by providing crafted dimensions that cause the multiplication to exceed INT_MAX, allowing writes beyond the allocated buffer region when kiss_fftndr() processes the data.
Affected products
kissfft
-
<8a8e66e33d692bad1376fe7904d87d767730537f
Matching in nixpkgs
Mixed-radix Fast Fourier Transform based up on the KISS principle
Ignored packages (1)
Mixed-radix Fast Fourier Transform based up on the KISS principle
Permalink
CVE-2026-41282
4.0 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 1 day ago
-
@LeSuisse
ignored
2 packages
- nuclei-templates
- nucleiparser
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This …
ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This affects use of -env-vars for multi-step templates against untrusted targets (not the default configuration).
Matching in nixpkgs
Tool for configurable targeted scanning
-
-
-
nixos-25.11-small
3.5.1
-
nixpkgs-25.11-darwin
3.5.1
Ignored packages (2)
Nuclei output parser for CLI
-
-
-
nixos-25.11-small
0.2.1
-
nixpkgs-25.11-darwin
0.2.1
Templates for the nuclei engine to find security vulnerabilities
Permalink
CVE-2026-35588
6.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): HIGH
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): LOW
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 1 day ago
-
@LeSuisse
ignored
5 packages
- python312Packages.glances-api
- python313Packages.glances-api
- python314Packages.glances-api
- home-assistant-component-tests.glances
- tests.home-assistant-components.glances
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
Glances has CQL Injection in its Cassandra Export Module via Unsanitized Config Values
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Cassandra export module (`glances/exports/glances_cassandra/__init__.py`) interpolates `keyspace`, `table`, and `replication_factor` configuration values directly into CQL statements without validation. A user with write access to `glances.conf` can redirect all monitoring data to an attacker-controlled Cassandra keyspace. Version 4.5.4 contains a fix.
Matching in nixpkgs
Cross-platform curses-based monitoring tool
-
-
-
nixos-25.11-small
4.3.3
-
nixpkgs-25.11-darwin
4.3.3
Ignored packages (5)
Python API for interacting with Glances
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Python API for interacting with Glances
-
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Python API for interacting with Glances
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
Permalink
CVE-2026-40606
4.8 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
ignored
13 packages
- mitmproxy2swagger
- python312Packages.mitmproxy
- python313Packages.mitmproxy
- python314Packages.mitmproxy
- python312Packages.mitmproxy-rs
- python313Packages.mitmproxy-rs
- python314Packages.mitmproxy-rs
- python312Packages.mitmproxy-linux
- python312Packages.mitmproxy-macos
- python313Packages.mitmproxy-linux
- python313Packages.mitmproxy-macos
- python314Packages.mitmproxy-linux
- python314Packages.mitmproxy-macos
1 week ago
-
@LeSuisse
ignored
maintainer @SuperSandro2000
1 week ago
maintainer.ignore
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
ProxyAuth Addon LDAP Injection in mitmproxy
mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.
Ignored packages (13)
Tool to automagically reverse-engineer REST APIs
Linux Rust bits in mitmproxy
MacOS Rust bits in mitmproxy
Linux Rust bits in mitmproxy
MacOS Rust bits in mitmproxy
Linux Rust bits in mitmproxy
MacOS Rust bits in mitmproxy
Package maintainers
Ignored maintainers (1)
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Apache Airflow: Users with asset materialization permisssions could trigger Dags they had no access to
UI / API User with asset materialize permission could trigger dags they had no access to.
Users are advised to migrate to Airflow version 3.2.0 that fixes the issue.
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Apache Airflow: 3.x - Nested Variable Secret Values Bypass Redaction via max_depth=1
Secrets in Variables saved as JSON dictionaries were not properly redacted - in case thee variables were retrieved by the user the secrets stored as nested fields were not masked.
If you do not store variables with sensitive values in JSON form, you are not affected. Otherwise please upgrade to Apache Airflow 3.2.0 that has the fix implemented
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Apache Airflow: API extra-links triggers XCom deserialization/class instantiation (Airflow 3.1.5)
Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.
Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Apache Airflow: Bad example of BashOperator shell injection via dag_run.conf
An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3
Permalink
CVE-2026-40491
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): HIGH
-
Availability impact (A): NONE
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 3 days ago
-
@LeSuisse
ignored
6 packages
- hongdown
- lgogdownloader
- lgogdownloader-gui
- python312Packages.gdown
- python313Packages.gdown
- python314Packages.gdown
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall
gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix.
Matching in nixpkgs
CLI tool for downloading large files from Google Drive
-
-
-
nixos-25.11-small
5.2.0
-
nixpkgs-25.11-darwin
5.2.0
Ignored packages (6)
Markdown formatter that enforces Hong Minhee's Markdown style conventions
Unofficial downloader to GOG.com for Linux users. It uses the same API as the official GOGDownloader
-
-
nixpkgs-unstable
3.18
-
nixos-unstable-small
3.18
-
-
nixos-25.11-small
3.18
-
nixpkgs-25.11-darwin
3.18
Unofficial downloader to GOG.com for Linux users. It uses the same API as the official GOGDownloader
-
-
nixpkgs-unstable
3.18
-
nixos-unstable-small
3.18
-
-
nixos-25.11-small
3.18
-
nixpkgs-25.11-darwin
3.18
CLI tool for downloading large files from Google Drive
-
-
nixos-25.11-small
5.2.0
-
nixpkgs-25.11-darwin
5.2.0
CLI tool for downloading large files from Google Drive
-
-
-
nixos-25.11-small
5.2.0
-
nixpkgs-25.11-darwin
5.2.0
CLI tool for downloading large files from Google Drive
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Apache Airflow: Exposing stack trace in case of constraint error
In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3