Published issues
Permalink
CVE-2026-40884
9.8 CRITICAL
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
goshs: Empty-username SFTP password authentication bypass in goshs
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated network attacker can connect to the SFTP service and access files without a password. This vulnerability is fixed in 2.0.0-beta.6.
Matching in nixpkgs
Simple, yet feature-rich web server written in Go
Permalink
CVE-2026-39377
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): HIGH
-
Availability impact (A): NONE
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
nbconvert has an Arbitrary File Write via Path Traversal in Cell Attachment Filenames
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions 6.5 through 7.17.0 allow arbitrary file writes to locations outside the intended output directory when processing notebooks containing crafted cell attachment filenames. The `ExtractAttachmentsPreprocessor` passes attachment filenames directly to the filesystem without sanitization, enabling path traversal attacks. This vulnerability provides complete control over both the destination path and file extension. Version 7.17.1 contains a patch.
Matching in nixpkgs
Converting Jupyter Notebooks
Converting Jupyter Notebooks
Converting Jupyter Notebooks
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
ignored
3 packages
- openexrid-unstable
- haskellPackages.openexr-write
- openexr_2
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
OpenEXR has integer overflow in DWA decoder outBufferEnd pointer arithmetic (missed variant of CVE-2026-34589)
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.4.0 through 3.4.9, 3.3.0 through 3.3.9, and 3.2.0 through 3.2.7, `internal_dwa_compressor.h:1040` performs `chan->width * chan->bytes_per_element` in `int32` arithmetic without a `(size_t)` cast. This is the same overflow pattern fixed in other decoders by CVE-2026-34589/34588/34544, but this line was missed. Versions 3.4.10, 3.3.10, and 3.2.8 contain a fix that addresses `internal_dwa_compressor.h:1040`.
Affected products
openexr
-
==>= 3.3.0, < 3.3.10
-
==>= 3.2.0, < 3.2.8
-
==>= 3.4.0, < 3.4.10
Matching in nixpkgs
High dynamic-range (HDR) image file format
-
-
-
nixos-25.11-small
3.3.8
-
nixpkgs-25.11-darwin
3.3.8
Ignored packages (3)
High dynamic-range (HDR) image file format
OpenEXR files able to isolate any object of a CG image with a perfect antialiazing
Library for writing images in OpenEXR HDR file format
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
ignored
3 packages
- openexrid-unstable
- haskellPackages.openexr-write
- openexr_2
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
OpenEXR has integer overflow in DWA setupChannelData planarUncRle pointer arithmetic (missed variant of CVE-2026-34589)
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.4.0 through 3.4.9, 3.3.0 through 3.3.9, and 3.2.0 through 3.2.7, `internal_dwa_compressor.h:1722` performs `curc->width * curc->height` in `int32` arithmetic without a `(size_t)` cast. This is the same overflow pattern fixed in other locations by the recent CVE-2026-34589 batch, but this line was missed. Versions 3.4.10, 3.3.10, and 3.2.8 contain a fix that addresses `internal_dwa_compressor.h:1722`.
Affected products
openexr
-
==>= 3.3.0, < 3.3.10
-
==>= 3.2.0, < 3.2.8
-
==>= 3.4.0, < 3.4.10
Matching in nixpkgs
High dynamic-range (HDR) image file format
-
-
-
nixos-25.11-small
3.3.8
-
nixpkgs-25.11-darwin
3.3.8
Ignored packages (3)
High dynamic-range (HDR) image file format
OpenEXR files able to isolate any object of a CG image with a perfect antialiazing
Library for writing images in OpenEXR HDR file format
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
SFTP root escape via prefix-based path validation in goshs
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP root escape caused by prefix-based path validation. An authenticated SFTP user can read from and write to filesystem paths outside the configured SFTP root, which breaks the intended jail boundary and can expose or modify unrelated server files. The SFTP subsystem routes requests through sftpserver/sftpserver.go into DefaultHandler.GetHandler() in sftpserver/handler.go, which forwards file operations into readFile, writeFile, listFile, and cmdFile. All of those sinks rely on sanitizePath() in sftpserver/helper.go. helper.go uses a raw string-prefix comparison, not a directory-boundary check. Because of that, if the configured root is /tmp/goshsroot, then a sibling path such as /tmp/goshsroot_evil/secret.txt incorrectly passes validation since it starts with the same byte prefix. This vulnerability is fixed in 2.0.0-beta.6.
Matching in nixpkgs
Simple, yet feature-rich web server written in Go
Permalink
CVE-2026-40594
4.8 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
ignored
5 packages
- python312Packages.pyloadapi
- python313Packages.pyloadapi
- python314Packages.pyloadapi
- home-assistant-component-tests.pyload
- tests.home-assistant-components.pyload
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
pyLoad: Session Cookie Security Downgrade via Untrusted X-Forwarded-Proto Header Spoofing (Global State Race Condition)
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev98, the set_session_cookie_secure before_request handler in src/pyload/webui/app/__init__.py reads the X-Forwarded-Proto header from any HTTP request without validating that the request originates from a trusted proxy, then mutates the global Flask configuration SESSION_COOKIE_SECURE on every request. Because pyLoad uses the multi-threaded Cheroot WSGI server (request_queue_size=512), this creates a race condition where an attacker's request can influence the Secure flag on other users' session cookies — either downgrading cookie security behind a TLS proxy or causing a session denial-of-service on plain HTTP deployments. This vulnerability is fixed in 0.5.0b3.dev98.
Matching in nixpkgs
Free and open-source download manager with support for 1-click-hosting sites
Ignored packages (5)
Simple wrapper for pyLoad's API
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
-
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
Permalink
CVE-2026-39378
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
nbconvert has an Arbitrary File Read via Path Traversal in HTMLExporter Image Embedding
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. In versions 6.5 through 7.17.0, when `HTMLExporter.embed_images=True`, nbconvert's markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML. nbconvert 7.17.1 contains a fix. As a workaround, do not enable `HTMLExporter.embed_images`; it is not enabled by default.
Matching in nixpkgs
Converting Jupyter Notebooks
Converting Jupyter Notebooks
Converting Jupyter Notebooks
Permalink
CVE-2026-41133
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
ignored
5 packages
- python312Packages.pyloadapi
- python313Packages.pyloadapi
- python314Packages.pyloadapi
- home-assistant-component-tests.pyload
- tests.home-assistant-components.pyload
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
pyLoad has Stale Session Privilege After Role/Permission Change (Privilege Revocation Bypass)
pyLoad is a free and open-source download manager written in Python. Versions up to and including 0.5.0b3.dev97 cache `role` and `permission` in the session at login and continues to authorize requests using these cached values, even after an admin changes the user's role/permissions in the database. As a result, an already logged-in user can keep old (revoked) privileges until logout/session expiry, enabling continued privileged actions. This is a core authorization/session-consistency issue and is not resolved by toggling an optional security feature. Commit e95804fb0d06cbb07d2ba380fc494d9ff89b68c1 contains a fix for the issue.
Matching in nixpkgs
Free and open-source download manager with support for 1-click-hosting sites
Ignored packages (5)
Simple wrapper for pyLoad's API
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
-
-
-
nixos-25.11-small
1.4.2
-
nixpkgs-25.11-darwin
1.4.2
Simple wrapper for pyLoad's API
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
Search path without quotes in CivetWeb
Vulnerability related to an unquoted search path in CivetWeb v1.16. This vulnerability allows a local attacker to execute arbitrary code with elevated privileges by placing a malicious executable in a directory that is scanned before the intended application path (C:\Program Files\CivetWeb\CivetWeb.exe --), due to the absence of quotes in the service configuration.
Matching in nixpkgs
Embedded C/C++ web server
-
-
nixpkgs-unstable
1.16
-
nixos-unstable-small
1.16
-
-
nixos-25.11-small
1.16
-
nixpkgs-25.11-darwin
1.16
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
OpenBao's Certificate Authentication Allows Token Renewal With Different Certificate
OpenBao is an open source identity-based secrets management system. Prior to version 2.5.3, OpenBao's Certificate authentication method, when a token renewal is requested and `disable_binding=true` is set, attempts to verify the current request's presented mTLS certificate matches the original. Token renewals for other authentication methods do not require any supplied login information. Due to incorrect matching, the certificate authentication method would allow renewal of tokens for which the attacker had a sibling certificate+key signed by the same CA, but which did not necessarily match the original role or the originally supplied certificate. This implies an attacker could still authenticate to OpenBao in a similar scope, however, token renewal implies that an attacker may be able to extend the lifetime of dynamic leases held by the original token. This attack requires knowledge of either the original token or its accessor. This vulnerability is original from HashiCorp Vault. This is addressed in v2.5.3. As a workaround, ensure privileged roles are tightly scoped to single certificates.
Matching in nixpkgs
Open source, community-driven fork of Vault managed by the Linux Foundation
-
-
-
nixos-25.11-small
2.5.2
-
nixpkgs-25.11-darwin
2.5.2