Published issues
Permalink
CVE-2026-35176
7.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 6 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
openFPGALoader has a heap buffer overflow in POFParser::parseSection() via crafted .pof file
openFPGALoader is a utility for programming FPGAs. In 1.1.1 and earlier, a heap-buffer-overflow read vulnerability exists in POFParser::parseSection() that allows out-of-bounds heap memory access when parsing a crafted .pof file. No FPGA hardware is required to trigger this vulnerability.
Matching in nixpkgs
Universal utility for programming FPGAs
-
-
-
nixos-25.11-small
1.0.0
-
nixpkgs-25.11-darwin
1.0.0
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 6 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
Lupa has a Sandbox escape and RCE due to incomplete attribute_filter enforcement in getattr / setattr
Lupa integrates the runtimes of Lua or LuaJIT2 into CPython. In 2.6 and earlier, attribute_filter is not consistently applied when attributes are accessed through built-in functions like getattr and setattr. This allows an attacker to bypass the intended restrictions and eventually achieve arbitrary code execution.
Matching in nixpkgs
-
-
nixos-25.11-small
2.5
-
nixpkgs-25.11-darwin
2.5
-
-
nixpkgs-unstable
2.6
-
nixos-unstable-small
2.6
-
-
nixos-25.11-small
2.5
-
nixpkgs-25.11-darwin
2.5
-
-
nixpkgs-unstable
2.6
-
nixos-unstable-small
2.6
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 6 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.
Matching in nixpkgs
Simple, yet feature-rich web server written in Go
-
-
-
nixos-25.11-small
1.1.2
-
nixpkgs-25.11-darwin
1.1.2
Permalink
CVE-2026-35044
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 6 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
BentoML has a Server-Side Template Injection via unsandboxed Jinja2 Environment in Dockerfile generation
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extension to render user-provided dockerfile_template files. When a victim imports a malicious bento archive and runs bentoml containerize, attacker-controlled Jinja2 template code executes arbitrary Python directly on the host machine, bypassing all container isolation. This vulnerability is fixed in 1.4.38.
Matching in nixpkgs
Build Production-Grade AI Applications
Build Production-Grade AI Applications
Permalink
CVE-2026-35170
7.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 6 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
openFPGALoader has a heap buffer overflow in BitParser::parseHeader() via crafted .bit file
openFPGALoader is a utility for programming FPGAs. In 1.1.1 and earlier, a heap-buffer-overflow read vulnerability exists in BitParser::parseHeader() that allows out-of-bounds heap memory access when parsing a crafted .bit file. No FPGA hardware is required to trigger this vulnerability.
Matching in nixpkgs
Universal utility for programming FPGAs
-
-
-
nixos-25.11-small
1.0.0
-
nixpkgs-25.11-darwin
1.0.0
Permalink
CVE-2026-34380
5.9 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): HIGH
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 6 days ago
-
@LeSuisse
ignored
3 packages
- openexrid-unstable
- haskellPackages.openexr-write
- openexr_2
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
OpenEXR has a signed integer overflow (undefined behavior) in undo_pxr24_impl may allow bounds-check bypass in PXR24 decompression
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, a signed integer overflow exists in undo_pxr24_impl() in src/lib/OpenEXRCore/internal_pxr24.c at line 377. The expression (uint64_t)(w * 3) computes w * 3 as a signed 32-bit integer before casting to uint64_t. When w is large, this multiplication constitutes undefined behavior under the C standard. On tested builds (clang/gcc without sanitizers), two's-complement wraparound commonly occurs, and for specific values of w the wrapped result is a small positive integer, which may allow the subsequent bounds check to pass incorrectly. If the check is bypassed, the decoding loop proceeds to write pixel data through dout, potentially extending far beyond the allocated output buffer. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9.
Affected products
openexr
-
==>= 3.4.0, < 3.4.9
-
==>= 3.2.0, < 3.2.7
-
==>= 3.3.0, < 3.3.9
Matching in nixpkgs
High dynamic-range (HDR) image file format
-
-
-
nixos-25.11-small
3.3.8
-
nixpkgs-25.11-darwin
3.3.5
Ignored packages (3)
High dynamic-range (HDR) image file format
OpenEXR files able to isolate any object of a CG image with a perfect antialiazing
Library for writing images in OpenEXR HDR file format
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
4 packages
- python312Packages.sagemaker-mlflow
- python313Packages.sagemaker-mlflow
- python314Packages.sagemaker-mlflow
- pkgsRocm.python3Packages.sagemaker-mlflow
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
Authorization Bypass in MLflow AJAX Endpoint
MLflow is vulnerable to an authorization bypass affecting the AJAX endpoint used to download saved model artifacts. Due to missing access‑control validation, a user without permissions to a given experiment can directly query this endpoint and retrieve model artifacts they are not authorized to access.
This issue affects MLflow version through 3.10.1
Matching in nixpkgs
Open source platform for the machine learning lifecycle
-
-
-
nixos-25.11-small
3.3.1
-
nixpkgs-25.11-darwin
3.3.1
Open source platform for the machine learning lifecycle
-
-
-
nixos-25.11-small
3.3.1
-
nixpkgs-25.11-darwin
3.3.1
Open source platform for the machine learning lifecycle
-
-
nixos-25.11-small
3.3.1
-
nixpkgs-25.11-darwin
3.3.1
Open source platform for the machine learning lifecycle
-
-
-
nixos-25.11-small
3.3.1
-
nixpkgs-25.11-darwin
3.3.1
Open source platform for the machine learning lifecycle
Open source platform for the machine learning lifecycle
-
-
-
nixos-25.11-small
3.3.1
-
nixpkgs-25.11-darwin
3.3.1
Ignored packages (4)
MLFlow plugin for SageMaker
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
MLFlow plugin for SageMaker
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
MLFlow plugin for SageMaker
MLFlow plugin for SageMaker
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Permalink
CVE-2026-35586
6.8 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): NONE
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
5 packages
- python312Packages.pyloadapi
- python313Packages.pyloadapi
- python314Packages.pyloadapi
- home-assistant-component-tests.pyload
- tests.home-assistant-component-tests.pyload
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
Authorization Bypass for SSL Certificate/Key Configuration Due to Option Name Mismatch in pyload-ng
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the ADMIN_ONLY_CORE_OPTIONS authorization set in set_config_value() uses incorrect option names ssl_cert and ssl_key, while the actual configuration option names are ssl_certfile and ssl_keyfile. This name mismatch causes the admin-only check to always evaluate to False, allowing any user with SETTINGS permission to overwrite the SSL certificate and key file paths. Additionally, the ssl_certchain option was never added to the admin-only set at all. This vulnerability is fixed in 0.5.0b3.dev97.
Matching in nixpkgs
Free and open-source download manager with support for 1-click-hosting sites
Ignored packages (5)
Simple wrapper for pyLoad's API
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
-
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
Permalink
CVE-2026-35523
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
5 packages
- strawberry
- strawberry-qt6
- python312Packages.strawberry-django
- python313Packages.strawberry-django
- pkgsRocm.python3Packages.strawberry-django
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
Authentication bypass in strawberry-graphql via legacy graphql-ws WebSocket subprotocol
Strawberry GraphQL is a library for creating GraphQL APIs. Strawberry up until version 0.312.3 is vulnerable to an authentication bypass on WebSocket subscription endpoints. The legacy graphql-ws subprotocol handler does not verify that a connection_init handshake has been completed before processing start (subscription) messages. This allows a remote attacker to skip the on_ws_connect authentication hook entirely by connecting with the graphql-ws subprotocol and sending a start message directly, without ever sending connection_init. This vulnerability is fixed in 0.312.3.
Matching in nixpkgs
GraphQL library for Python that leverages type annotations
GraphQL library for Python that leverages type annotations
GraphQL library for Python that leverages type annotations
Ignored packages (5)
Music player and music collection organizer
Music player and music collection organizer
Strawberry GraphQL Django extension
Strawberry GraphQL Django extension
Strawberry GraphQL Django extension
updated
3 weeks, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
3 weeks, 5 days ago
-
@LeSuisse
ignored
4 packages
- filebrowser-quantum
- python312Packages.filebrowser-safe
- python313Packages.filebrowser-safe
- python314Packages.filebrowser-safe
3 weeks, 5 days ago
-
@LeSuisse
accepted
3 weeks, 5 days ago
-
@LeSuisse
published on GitHub
3 weeks, 5 days ago
File Browser has an access rule bypass via HasPrefix without trailing separator in path matching
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the Matches() function in rules/rules.go uses strings.HasPrefix() without a trailing directory separator when matching paths against access rules. A rule for /uploads also matches /uploads_backup/, granting or denying access to unintended directories. This vulnerability is fixed in 2.63.1.
Matching in nixpkgs
Filebrowser is a web application for managing files and directories
Ignored packages (4)
Access and manage your files from the web
Snapshot of django-filebrowser for the Mezzanine CMS
-
-
nixos-25.11-small
1.1.1
-
nixpkgs-25.11-darwin
1.1.1
Snapshot of django-filebrowser for the Mezzanine CMS
-
-
-
nixos-25.11-small
1.1.1
-
nixpkgs-25.11-darwin
1.1.1
Snapshot of django-filebrowser for the Mezzanine CMS