Published issues
Permalink
CVE-2026-40486
4.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Kimai's User Preferences API allows standard users to modify restricted attributes: hourly_rate, internal_rate
Kimai is an open-source time tracking application. In versions 2.52.0 and below, the User Preferences API endpoint (PATCH /api/users/{id}/preferences) applies submitted preference values without checking the isEnabled() flag on preference objects. Although the hourly_rate and internal_rate fields are correctly marked as disabled for users lacking the hourly-rate role permission, the API ignores this restriction and saves the values directly. Any authenticated user can modify their own billing rates through this endpoint, resulting in unauthorized financial tampering affecting invoices and timesheet calculations. This issue has been fixed in version 2.53.0.
Matching in nixpkgs
Web-based multi-user time-tracking application
Permalink
CVE-2026-40340
6.1 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): PHYSICAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack.c via malicious PTP ObjectInfo response
libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 have an out-of-bounds read vulnerability in `ptp_unpack_OI()` in `camlibs/ptp2/ptp-pack.c` (lines 530–563). The function validates `len < PTP_oi_SequenceNumber` (i.e., len < 48) but subsequently accesses offsets 48–56, up to 9 bytes beyond the validated boundary, via the Samsung Galaxy 64-bit objectsize detection heuristic. Commit 7c7f515bc88c3d0c4098ac965d313518e0ccbe33 fixes the issue.
Matching in nixpkgs
Library for accessing digital cameras
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package pulseaudio-module-xrdp
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
xrdp: Pre-authentication out-of-bounds reads in RDP capability and channel parsers
xrdp is an open source RDP server. Versions through 0.10.5 contain an out-of-bounds read vulnerability during the RDP capability exchange phase. The issue occurs when memory is accessed before validating the remaining buffer length. A remote, unauthenticated attacker can trigger this vulnerability by sending a specially crafted Confirm Active PDU. Successful exploitation could lead to a denial of service (process crash) or potential disclosure of sensitive information from the process memory. This issue has been fixed in version 0.10.6.
Ignored packages (1)
xrdp sink/source pulseaudio modules
-
-
nixpkgs-unstable
0.8
-
nixos-unstable-small
0.8
-
-
nixos-25.11-small
0.8
-
nixpkgs-25.11-darwin
0.8
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package pulseaudio-module-xrdp
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
xrdp: Heap buffer overflow in xrdp_sec_process_logon_info() via incorrect g_strncat length calculation
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.
Ignored packages (1)
xrdp sink/source pulseaudio modules
-
-
nixpkgs-unstable
0.8
-
nixos-unstable-small
0.8
-
-
nixos-25.11-small
0.8
-
nixpkgs-25.11-darwin
0.8
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package pulseaudio-module-xrdp
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
xrdp: Pre-authentication out-of-bounds reads in channel parsers
xrdp is an open source RDP server. Versions through 0.10.5 have an out-of-bounds read vulnerability in the pre-authentication RDP message parsing logic. A remote, unauthenticated attacker can trigger this flaw by sending a specially crafted sequence of packets during the initial connection phase. This vulnerability results from insufficient validation of input buffer lengths before processing dynamic channel communication. Successful exploitation can lead to a denial-of-service (DoS) condition via a process crash or potential disclosure of sensitive information from the service's memory space. This issue has been fixed in version 0.10.6.
Ignored packages (1)
xrdp sink/source pulseaudio modules
-
-
nixpkgs-unstable
0.8
-
nixos-unstable-small
0.8
-
-
nixos-25.11-small
0.8
-
nixpkgs-25.11-darwin
0.8
Permalink
CVE-2026-40333
6.1 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): PHYSICAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat() and ptp_unpack_EOS_CustomFuncEx() due to missing length parameter in ptp-pack.c
libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, two functions in camlibs/ptp2/ptp-pack.c accept a data pointer but no length parameter, performing unbounded reads. Their callers in ptp_unpack_EOS_events() have xsize available but never pass it, leaving both functions unable to validate reads against the actual buffer boundary. Commit 1817ecead20c2aafa7549dac9619fe38f47b2f53 patches the issue.
Matching in nixpkgs
Library for accessing digital cameras
Permalink
CVE-2026-28212
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package firebird-emu
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Firebird has potential server crash via null pointer dereference when processing op_slice packet
Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the server port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and 3.0.14.
Affected products
firebird
-
==>= 4.0.0, < 4.0.7
-
==>= 5.0.0, < 5.0.4
-
==< 3.0.14
Matching in nixpkgs
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
SQL relational database management system
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
Ignored packages (1)
Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators
-
-
nixpkgs-unstable
1.6
-
nixos-unstable-small
1.6
-
-
nixos-25.11-small
1.6
-
nixpkgs-25.11-darwin
1.6
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package miniupnpd-nftables
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
miniupnpd Integer Underflow SOAPAction Header Parsing
miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or information disclosure by sending a malformed SOAPAction header with a single quote. Attackers can trigger an out-of-bounds memory read by exploiting improper length validation in ParseHttpHeaders(), where the parsed length underflows to a large unsigned value when passed to memchr(), causing the process to scan memory far beyond the allocated HTTP request buffer.
Matching in nixpkgs
Daemon that implements the UPnP Internet Gateway Device (IGD) specification
-
-
-
nixos-25.11-small
2.3.9
-
nixpkgs-25.11-darwin
2.3.9
Ignored packages (1)
Daemon that implements the UPnP Internet Gateway Device (IGD) specification
-
-
-
nixos-25.11-small
2.3.9
-
nixpkgs-25.11-darwin
2.3.9
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package pulseaudio-module-xrdp
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
xrdp: Heap buffer overflow in NeutrinoRDP channel reassembly
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in the NeutrinoRDP module. When proxying RDP sessions from xrdp to another server, the module fails to properly validate the size of reassembled fragmented virtual channel data against its allocated memory buffer. A malicious downstream RDP server (or an attacker capable of performing a Man-in-the-Middle attack) could exploit this flaw to cause memory corruption, potentially leading to a Denial of Service (DoS) or Remote Code Execution (RCE). The NeutrinoRDP module is not built by default. This vulnerability only affects environments where the module has been explicitly compiled and enabled. Users can verify if the module is built by checking for --enable-neutrinordp in the output of the xrdp -v command. This issue has been fixed in version 0.10.6.
Ignored packages (1)
xrdp sink/source pulseaudio modules
-
-
nixpkgs-unstable
0.8
-
nixos-unstable-small
0.8
-
-
nixos-25.11-small
0.8
-
nixpkgs-25.11-darwin
0.8
Permalink
CVE-2026-6507
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package prometheus-dnsmasq-exporter
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Dnsmasq: dnsmasq: denial of service due to out-of-bounds write in dhcp bootreply processing
A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability by sending a specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet to a dnsmasq server configured with the `--dhcp-split-relay` option. This can lead to memory corruption, causing the dnsmasq daemon to crash and resulting in a denial of service (DoS).
Matching in nixpkgs
Integrated DNS, DHCP and TFTP server for small networks
-
-
nixpkgs-unstable
2.92
-
nixos-unstable-small
2.92
-
-
nixos-25.11-small
2.91
-
nixpkgs-25.11-darwin
2.91
Ignored packages (1)
Dnsmasq exporter for Prometheus
-
-
-
nixos-25.11-small
0.3.0
-
nixpkgs-25.11-darwin
0.3.0