Published issues
Permalink
CVE-2026-27890
8.2 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package firebird-emu
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Firebird has Pre-Auth DOS when Processing Out of Order CNCT_specific_data Segments
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If segments arrive out of order, the Array class's grow() method computes a negative size value, causing a SIGSEGV crash. An unauthenticated attacker who knows only the server's IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Affected products
firebird
-
==>= 4.0.0, < 4.0.7
-
==>= 3.0.0, < 3.0.14
-
==>= 5.0.0, < 5.0.4
Matching in nixpkgs
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
SQL relational database management system
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
Ignored packages (1)
Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators
-
-
nixpkgs-unstable
1.6
-
nixos-unstable-small
1.6
-
-
nixos-25.11-small
1.6
-
nixpkgs-25.11-darwin
1.6
Permalink
CVE-2026-40479
5.4 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): REQUIRED
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Kimai: Stored XSS via Incomplete HTML Attribute Escaping in Team Member Widget
Kimai is an open-source time tracking application. In versions 1.16.3 through 2.52.0, the escapeForHtml() function in KimaiEscape.js does not escape double quote or single quote characters. When a user's profile alias is inserted into an HTML attribute context via the team member form prototype and rendered through innerHTML, this incomplete escaping allows HTML attribute injection. An authenticated user with ROLE_USER privileges can store a malicious alias that executes JavaScript in the browser of any administrator viewing the team form, resulting in stored XSS with privilege escalation. This issue has been fixed in version 2.53.0.
Matching in nixpkgs
Web-based multi-user time-tracking application
Permalink
CVE-2026-33145
6.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): LOW
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package pulseaudio-module-xrdp
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
xrdp: Authenticated RCE via unsanitized AlternateShell execution in xrdp-sesman
xrdp is an open source RDP server. Versions through 0.10.5 allow an authenticated remote user to execute arbitrary commands on the server due to unsafe handling of the AlternateShell parameter in xrdp-sesman. When the AllowAlternateShell setting is enabled (which is the default when not explicitly configured), xrdp accepts a client-supplied AlternateShell value and executes it via /bin/sh -c during session initialization. This results in shell-interpreted execution of unsanitized, user-controlled input. This behavior effectively provides a scriptable remote command execution primitive over RDP within the security context of the authenticated user, occurring prior to normal window manager startup. This can bypass expected session initialization flows and operational assumptions that restrict execution to interactive desktop environments. This issue has been fixed in version 0.10.6.
Ignored packages (1)
xrdp sink/source pulseaudio modules
-
-
nixpkgs-unstable
0.8
-
nixos-unstable-small
0.8
-
-
nixos-25.11-small
0.8
-
nixpkgs-25.11-darwin
0.8
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Dolibarr: OS Command Injection (RCE) via MAIN_ODT_AS_PDF configuration
Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions prior to 23.0.0 , the ODT to PDF conversion process in odf.php concatenates the MAIN_ODT_AS_PDF configuration constant directly into a shell command passed to exec() without sanitization. An authenticated administrator can inject arbitrary OS commands via this constant using command separators, achieving remote code execution as the web server user when any ODT template is generated. This issue has been fixed in version 23.0.0.
Matching in nixpkgs
Enterprise resource planning (ERP) and customer relationship manager (CRM) server
Permalink
CVE-2026-40303
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
maintainer @bennyandresen
1 week, 3 days ago
maintainer.ignore
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
zrok allows unauthenticated DoS via unbounded memory allocation in striped session cookie parsing
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, endpoints.GetSessionCookie parses an attacker-supplied cookie chunk count and calls make([]string, count) with no upper bound before any token validation occurs. The function is reached on every request to an OAuth-protected proxy share, allowing an unauthenticated remote attacker to trigger gigabyte-scale heap allocations per request, leading to process-level OOM termination or repeated goroutine panics. Both publicProxy and dynamicProxy are affected. Version 2.0.1 patches the issue.
Matching in nixpkgs
Geo-scale, next-generation sharing platform built on top of OpenZiti
-
-
-
nixos-25.11-small
1.0.4
-
nixpkgs-25.11-darwin
1.0.4
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-40302
6.1 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
maintainer @bennyandresen
1 week, 3 days ago
maintainer.ignore
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
zrok has reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, the proxyUi template engine uses Go's text/template (which performs no HTML escaping) instead of html/template. The GitHub OAuth callback handlers in both publicProxy and dynamicProxy embed the attacker-controlled refreshInterval query parameter verbatim into an error message when time.ParseDuration fails, and render that error unescaped into HTML. An attacker can deliver a crafted login URL to a victim; after the victim completes the GitHub OAuth flow, the callback page executes arbitrary JavaScript in the OAuth server's origin. Version 2.0.1 patches the issue.
Matching in nixpkgs
Geo-scale, next-generation sharing platform built on top of OpenZiti
-
-
-
nixos-25.11-small
1.0.4
-
nixpkgs-25.11-darwin
1.0.4
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-40196
8.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): NONE
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
2 maintainers
1 week, 3 days ago
maintainer.ignore
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
HomeBox has Unauthorized API Access via Retained defaultGroup ID After Group Access Revocation
HomeBox is a home inventory and organization system. Versions prior to 0.25.0 contain a vulnerability where the defaultGroup ID remained permanently assigned to a user after being invited to a group, even after their access to that group was revoked. While the web interface correctly enforced the access revocation and prevented the user from viewing or modifying the group's contents, the API did not. Because the original group ID persisted as the user's defaultGroup, and this value was not properly validated when the X-Tenant header was omitted, the user could still perform full CRUD operations on the group's collections through the API, bypassing the intended access controls. This issue has been fixed in version 0.25.0.
Matching in nixpkgs
Inventory and organization system built for the Home User
Package maintainers
Ignored maintainers (2)
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 3 days ago
-
@LeSuisse
ignored
maintainer @dochang
1 week, 3 days ago
maintainer.ignore
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
editorconfig-core-c has incomplete fix for CVE-2023-0341
editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted directory structure and .editorconfig file. This is an incomplete fix for CVE-2023-0341. The pcre_str buffer was protected in 0.12.6 but the adjacent l_pattern[8194] stack buffer received no equivalent protection. On Ubuntu 24.04, FORTIFY_SOURCE converts the overflow to SIGABRT (DoS). Version 0.12.11 contains an updated fix.
Matching in nixpkgs
EditorConfig core library written in C
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-41082
7.3 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): HIGH
-
Availability impact (A): LOW
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
ignored
23 packages
- dopamine
- opam2json
- opam-publish
- opam-installer
- ocamlPackages.opam-core
- ocamlPackages.opam-state
- ocamlPackages.opam-client
- ocamlPackages.opam-format
- ocamlPackages.opam-solver
- ocamlPackages.opam-repository
- ocamlPackages.opam-file-format
- ocamlPackages_latest.opam-core
- ocamlPackages_latest.opam-state
- ocamlPackages.opam-0install-cudf
- ocamlPackages_latest.opam-client
- ocamlPackages_latest.opam-format
- ocamlPackages_latest.opam-solver
- ocamlPackages_latest.opam-repository
- ocamlPackages_latest.opam-file-format
- tree-sitter-grammars.tree-sitter-opam
- ocamlPackages_latest.opam-0install-cudf
- python313Packages.tree-sitter-grammars.tree-sitter-opam
- python314Packages.tree-sitter-grammars.tree-sitter-opam
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
In OCaml opam before 2.5.1, a .install field containing a …
In OCaml opam before 2.5.1, a .install field containing a destination filepath can use ../ to reach a parent directory.
Matching in nixpkgs
Package manager for OCaml
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
Ignored packages (23)
Audio player that keeps it simple
-
-
-
nixos-25.11-small
3.0.0
-
nixpkgs-25.11-darwin
3.0.0
Convert opam file syntax to JSON
-
-
nixpkgs-unstable
0.4
-
nixos-unstable-small
0.4
-
-
nixos-25.11-small
0.4
-
nixpkgs-25.11-darwin
0.4
Tool to ease contributions to opam repositories
-
-
-
nixos-25.11-small
2.7.0
-
nixpkgs-25.11-darwin
2.7.0
Handle (un)installation from opam install files
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
Small standard library extensions, and generic system interaction modules used by opam
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
OPAM development library handling the ~/.opam hierarchy, repository and switch states
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
Actions on the opam root, switches, installations, and front-end
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
This library is based on the Cudf and Dose libraries, and handles calls to the external solver from opam
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
OPAM repository and remote sources handling, including curl/wget, rsync, git, mercurial, darcs backends
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
Small standard library extensions, and generic system interaction modules used by opam
OPAM development library handling the ~/.opam hierarchy, repository and switch states
Opam solver using 0install backend using the CUDF interface
Actions on the opam root, switches, installations, and front-end
This library is based on the Cudf and Dose libraries, and handles calls to the external solver from opam
OPAM repository and remote sources handling, including curl/wget, rsync, git, mercurial, darcs backends
Tree-sitter grammar for opam
Opam solver using 0install backend using the CUDF interface
Python bindings for tree-sitter-opam
Python bindings for tree-sitter-opam
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
ignored
10 packages
- capypdf
- python312Packages.pypdf2
- python312Packages.pypdf3
- python313Packages.pypdf2
- python313Packages.pypdf3
- python314Packages.pypdf2
- python314Packages.pypdf3
- python312Packages.pypdfium2
- python313Packages.pypdfium2
- python314Packages.pypdfium2
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
pypdf: Manipulated XMP metadata entity declarations can exhaust RAM
pypdf is a free and open-source pure-python PDF library. In versions prior to 6.10.0, manipulated XMP metadata entity declarations can exhaust RAM. An attacker who exploits this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the XMP metadata. This issue has been fixed in version 6.10.0.
Matching in nixpkgs
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
-
-
nixos-25.11-small
6.9.2
-
nixpkgs-25.11-darwin
6.9.2
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
-
-
-
nixos-25.11-small
6.9.2
-
nixpkgs-25.11-darwin
6.9.2
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
Ignored packages (10)
Fully color managed PDF generation library
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Python bindings to PDFium
Python bindings to PDFium
Python bindings to PDFium