Nixpkgs Security Tracker

Login with GitHub

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
created 2 months ago
WatchYourLAN Configuration Page Argument Injection Remote Code Execution Vulnerability

WatchYourLAN Configuration Page Argument Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WatchYourLAN. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the arpstrs parameter. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-26708.

References

Affected products

WatchYourLAN
  • ==2.1.2

Matching in nixpkgs

Package maintainers

created 2 months ago
Bokeh server applications have Incomplete Origin Validation in WebSockets

Bokeh is an interactive visualization library written in Python. In versions 3.8.1 and below, if a server is configured with an allowlist (e.g., dashboard.corp), an attacker can register a domain like dashboard.corp.attacker.com (or use a subdomain if applicable) and lure a victim to visit it. The malicious site can then initiate a WebSocket connection to the vulnerable Bokeh server. Since the Origin header (e.g., http://dashboard.corp.attacker.com/) matches the allowlist according to the flawed logic, the connection is accepted. Once connected, the attacker can interact with the Bokeh server on behalf of the victim, potentially accessing sensitive data, or modifying visualizations. This issue is fixed in version 3.8.2.

Affected products

bokeh
  • ==< 3.8.2

Matching in nixpkgs

Package maintainers

created 2 months ago
email BytesGenerator header injection due to unquoted newlines

The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".

References

Affected products

CPython
  • <3.13.12
  • <3.14.3
  • <3.15.0a6
  • <3.15.0

Matching in nixpkgs

Package maintainers

created 2 months ago
GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability

GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28232.

References

Affected products

GIMP
  • ==3.0.6

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-1363
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months ago
JNC|IAQS and I6 - Client-Side Enforcement of Server-Side Security

IAQS and I6 developed by JNC has a Client-Side Enforcement of Server-Side Security vulnerability, allowing unauthenticated remote attackers to gain administrator privileges by manipulating the web front-end.

Affected products

I6
  • ==0
IAQS
  • ==0

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-0710
8.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months ago
Sipp/sipp: sipp: denial of service and potential arbitrary code execution vulnerability

A flaw was found in SIPp. A remote attacker could exploit this by sending specially crafted Session Initiation Protocol (SIP) messages during an active call. This vulnerability, a NULL pointer dereference, can cause the application to crash, leading to a denial of service. Under specific conditions, it may also allow an attacker to execute unauthorized code, compromising the system's integrity and availability.

References

Affected products

sipp
  • ==3.7.3

Matching in nixpkgs

Permalink CVE-2025-31478
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 2 months ago
Zulip Authentication Backend Configuration Bypass

Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed.

Affected products

zulip
  • ==< 10.2

Matching in nixpkgs

Package maintainers

Permalink CVE-2025-11346
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months ago
ILIAS Base64 Decoding unserialize deserialization

A vulnerability has been found in ILIAS up to 8.23/9.13/10.1. This affects the function unserialize of the component Base64 Decoding Handler. Such manipulation of the argument f_settings leads to deserialization. It is possible to launch the attack remotely. Upgrading to version 8.24, 9.14 and 10.2 is able to mitigate this issue. It is advisable to upgrade the affected component.

Affected products

ILIAS
  • ==8.3
  • ==8.9
  • ==8.14
  • ==9.9
  • ==8.11
  • ==9.12
  • ==10.0
  • ==8.1
  • ==9.11
  • ==8.22
  • ==8.24
  • ==8.7
  • ==9.4
  • ==8.8
  • ==8.2
  • ==8.13
  • ==8.15
  • ==8.4
  • ==8.17
  • ==8.5
  • ==9.1
  • ==8.20
  • ==8.10
  • ==9.6
  • ==9.10
  • ==8.21
  • ==8.16
  • ==9.0
  • ==9.3
  • ==9.13
  • ==8.19
  • ==9.7
  • ==9.8
  • ==9.5
  • ==10.2
  • ==8.23
  • ==8.12
  • ==10.1
  • ==8.0
  • ==9.14
  • ==9.2
  • ==8.6
  • ==8.18

Matching in nixpkgs

Package maintainers

Permalink CVE-2025-11344
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months ago
ILIAS Certificate Import Remote Code Execution

A vulnerability was detected in ILIAS up to 8.23/9.13/10.1. Affected by this vulnerability is an unknown functionality of the component Certificate Import Handler. The manipulation results in Remote Code Execution. The attack may be performed from remote. Upgrading to version 8.24, 9.14 and 10.2 addresses this issue. It is recommended to upgrade the affected component.

Affected products

ILIAS
  • ==8.3
  • ==8.9
  • ==8.14
  • ==9.9
  • ==8.11
  • ==9.12
  • ==10.0
  • ==8.1
  • ==9.11
  • ==8.22
  • ==8.24
  • ==8.7
  • ==9.4
  • ==8.8
  • ==8.2
  • ==8.13
  • ==8.15
  • ==8.4
  • ==8.17
  • ==8.5
  • ==9.1
  • ==8.20
  • ==8.10
  • ==9.6
  • ==9.10
  • ==8.21
  • ==8.16
  • ==9.0
  • ==9.3
  • ==9.13
  • ==8.19
  • ==9.7
  • ==9.8
  • ==9.5
  • ==10.2
  • ==8.23
  • ==8.12
  • ==10.1
  • ==8.0
  • ==9.14
  • ==9.2
  • ==8.6
  • ==8.18

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-1364
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months ago
JNC|IAQS and I6 - Missing Authentication

IAQS and I6 developed by JNC has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly operate system administrative functionalities.

Affected products

I6
  • ==0
IAQS
  • ==0

Matching in nixpkgs

Package maintainers