Published issues
Permalink
CVE-2026-35491
6.1 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): HIGH
-
Availability impact (A): LOW
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
5 packages
- swiftlint
- python312Packages.softlayer
- python313Packages.softlayer
- python314Packages.softlayer
- chickenPackages_5.chickenEggs.ftl
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
Pi-hole FTL: CLI API sessions can import Teleporter archives and modify configuration
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, Pi-hole FTL supports a CLI password feature (webserver.api.cli_pw) that creates “CLI” API sessions intended to be read-only for configuration changes. While /api/config correctly blocks CLI sessions from mutating configuration, /api/teleporter allowed Teleporter imports for CLI sessions, enabling a CLI-scoped session to overwrite configuration via a Teleporter archive (authorization bypass). This vulnerability is fixed in 6.6.
Matching in nixpkgs
-
-
-
nixos-25.11-small
6.2.3
-
nixpkgs-25.11-darwin
6.2.3
Ignored packages (5)
A tool to enforce Swift style and conventions
Python libraries that assist in calling the SoftLayer API
-
-
nixos-25.11-small
6.2.7
-
nixpkgs-25.11-darwin
6.2.7
Python libraries that assist in calling the SoftLayer API
-
-
-
nixos-25.11-small
6.2.7
-
nixpkgs-25.11-darwin
6.2.7
Python libraries that assist in calling the SoftLayer API
Interface based sequence library
-
-
nixpkgs-unstable
0.9
-
nixos-unstable-small
0.9
-
-
nixos-25.11-small
0.9
-
nixpkgs-25.11-darwin
0.9
Permalink
CVE-2026-39361
7.7 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
OpenObserve has a SSRF Protection Bypass via IPv6 Bracket Notation in validate_enrichment_url
OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surrounding brackets (e.g. "[::1]" not "::1"). An authenticated attacker can reach internal services blocked from external access. On cloud deployments this enables retrieval of IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. On self-hosted deployments it allows probing internal network services.
Matching in nixpkgs
Cloud-native observability platform built specifically for logs, metrics, traces, analytics & realtime user-monitoring
Permalink
CVE-2026-35518
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
5 packages
- swiftlint
- python312Packages.softlayer
- python313Packages.softlayer
- python314Packages.softlayer
- chickenPackages_5.chickenEggs.ftl
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
Pi-hole FTL affected by Remote Code Execution (RCE) via dns.cnameRecords Newline Injection
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS CNAME records configuration parameter (dns.cnameRecords). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.
Matching in nixpkgs
-
-
-
nixos-25.11-small
6.2.3
-
nixpkgs-25.11-darwin
6.2.3
Ignored packages (5)
A tool to enforce Swift style and conventions
Python libraries that assist in calling the SoftLayer API
-
-
nixos-25.11-small
6.2.7
-
nixpkgs-25.11-darwin
6.2.7
Python libraries that assist in calling the SoftLayer API
-
-
-
nixos-25.11-small
6.2.7
-
nixpkgs-25.11-darwin
6.2.7
Python libraries that assist in calling the SoftLayer API
Interface based sequence library
-
-
nixpkgs-unstable
0.9
-
nixos-unstable-small
0.9
-
-
nixos-25.11-small
0.9
-
nixpkgs-25.11-darwin
0.9
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
xdg-dbus-proxy has an eavesdrop filter bypass allowing message interception
xdg-dbus-proxy is a filtering proxy for D-Bus connections. Prior to 0.1.7, a policy parser vulnerability allows bypassing eavesdrop restrictions. The proxy checks for eavesdrop=true in policy rules but fails to handle eavesdrop ='true' (with a space before the equals sign) and similar cases. Clients can intercept D-Bus messages they should not have access to. This vulnerability is fixed in 0.1.7.
Matching in nixpkgs
DBus proxy for Flatpak and others
-
-
-
nixos-25.11-small
0.1.6
-
nixpkgs-25.11-darwin
0.1.6
Permalink
CVE-2026-5747
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): HIGH
-
Privileges required (PR): HIGH
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
Out-of-bounds Write in Firecracker virtio-pci Transport
An out-of-bounds write issue in the virtio PCI transport in Amazon Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecracker VMM process or potentially execute arbitrary code on the host via modification of virtio queue configuration registers after device activation. Achieving code execution on the host requires additional preconditions, such as the use of a custom guest kernel or specific snapshot configurations.
To remediate this, users should upgrade to Firecracker 1.14.4 or 1.15.1 and later.
Affected products
Firecracker
-
==1.15.0
-
==1.15.1
-
=<1.14.3
-
==1.14.4
Matching in nixpkgs
Secure, fast, minimal micro-container virtualization
Permalink
CVE-2026-35611
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
Addressable has a Regular Expression Denial of Service in Addressable templates
Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. From 2.3.0 to before 2.9.0, within the URI template implementation in Addressable, two classes of URI template generate regular expressions vulnerable to catastrophic backtracking. Templates using the * (explode) modifier with any expansion operator (e.g., {foo*}, {+var*}, {#var*}, {/var*}, {.var*}, {;var*}, {?var*}, {&var*}) generate patterns with nested unbounded quantifiers that are O(2^n) when matched against a maliciously crafted URI. Templates using multiple variables with the + or # operators (e.g., {+v1,v2,v3}) generate patterns with O(n^k) complexity due to the comma separator being within the matched character class, causing ambiguous backtracking across k variables. When matched against a maliciously crafted URI, this can result in catastrophic backtracking and uncontrolled resource consumption, leading to denial of service. This vulnerability is fixed in 2.9.0.
Matching in nixpkgs
-
-
-
nixos-25.11-small
2.8.7
-
nixpkgs-25.11-darwin
2.8.7
-
-
-
nixos-25.11-small
2.8.7
-
nixpkgs-25.11-darwin
2.8.7
-
-
-
nixos-25.11-small
2.8.7
-
nixpkgs-25.11-darwin
2.8.7
-
-
-
nixos-25.11-small
2.8.7
-
nixpkgs-25.11-darwin
2.8.7
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
7 packages
- vite
- vitess
- vitetris
- python312Packages.django-vite
- python313Packages.django-vite
- python314Packages.django-vite
- vscode-extensions.vitest.explorer
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
Vite has a Path Traversal in Optimized Deps `.map` Handling
Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, the dev server’s handling of .map requests for optimized dependencies resolves file paths and calls readFile without restricting ../ segments in the URL. As a result, it is possible to bypass the server.fs.strict allow list and retrieve .map files located outside the project root, provided they can be parsed as valid source map JSON. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5.
Affected products
vite
-
==>= 6.0.0, < 6.4.2
-
==>= 8.0.0, < 8.0.5
-
==>= 7.0.0, < 7.3.2
vite-plus
Matching in nixpkgs
Frontend tooling for NodeJS
Ignored packages (7)
Visual Trace Explorer (ViTE), a tool to visualize execution traces
-
-
nixpkgs-unstable
1.4
-
nixos-unstable-small
1.4
-
-
nixos-25.11-small
1.4
-
nixpkgs-25.11-darwin
1.4
Database clustering system for horizontal scaling of MySQL
Terminal-based Tetris clone by Victor Nilsson
Integration of ViteJS in a Django project
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
Integration of ViteJS in a Django project
-
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
Integration of ViteJS in a Django project
Vitest extension for Visual Studio Code
Permalink
CVE-2026-35464
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
5 packages
- python312Packages.pyloadapi
- python313Packages.pyloadapi
- python314Packages.pyloadapi
- home-assistant-component-tests.pyload
- tests.home-assistant-component-tests.pyload
3 weeks, 4 days ago
-
@LeSuisse
accepted
3 weeks, 4 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
pyLoad has an incomplete fix for CVE-2026-33509: unprotected storage_folder enables arbitrary file write to Flask session store and code execution
pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set and passes the existing path restriction because the Flask session directory is outside both PKGDIR and userdir. A user with SETTINGS and ADD permissions can redirect downloads to the Flask filesystem session store, plant a malicious pickle payload as a predictable session file, and trigger arbitrary code execution when any HTTP request arrives with the corresponding session cookie. This vulnerability is fixed with commit c4cf995a2803bdbe388addfc2b0f323277efc0e1.
Matching in nixpkgs
Free and open-source download manager with support for 1-click-hosting sites
Ignored packages (5)
Simple wrapper for pyLoad's API
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
-
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
Permalink
CVE-2026-35406
6.2 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 4 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
Aardvark-dns has incorrect error handling for malformed tcp packets
Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1.
Matching in nixpkgs
Authoritative dns server for A/AAAA container records
Permalink
CVE-2026-35517
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
3 weeks, 4 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
5 packages
- swiftlint
- python312Packages.softlayer
- python313Packages.softlayer
- python314Packages.softlayer
- chickenPackages_5.chickenEggs.ftl
3 weeks, 4 days ago
-
@LeSuisse
accepted
3 weeks, 4 days ago
-
@LeSuisse
published on GitHub
3 weeks, 4 days ago
Pi-hole FTL affected by Remote Code Execution (RCE) via dns.upstreams Newline Injection
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the upstream DNS servers configuration parameter (dns.upstreams). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.
Matching in nixpkgs
-
-
-
nixos-25.11-small
6.2.3
-
nixpkgs-25.11-darwin
6.2.3
Ignored packages (5)
A tool to enforce Swift style and conventions
Python libraries that assist in calling the SoftLayer API
-
-
nixos-25.11-small
6.2.7
-
nixpkgs-25.11-darwin
6.2.7
Python libraries that assist in calling the SoftLayer API
-
-
-
nixos-25.11-small
6.2.7
-
nixpkgs-25.11-darwin
6.2.7
Python libraries that assist in calling the SoftLayer API
Interface based sequence library
-
-
nixpkgs-unstable
0.9
-
nixos-unstable-small
0.9
-
-
nixos-25.11-small
0.9
-
nixpkgs-25.11-darwin
0.9