Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-34975
8.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 1 week, 4 days ago
Plunk has a CRLF Email Header Injection in raw MIME message construction allows authenticated API user to inject arbitrary email headers

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment filenames were interpolated directly into raw MIME messages without sanitization. An authenticated API user could inject arbitrary email headers (e.g. Bcc, Reply-To) by embedding carriage return/line feed characters in these fields, enabling silent email forwarding, reply redirection, or sender spoofing. The fix adds input validation at the schema level to reject any of these fields containing \r or \n characters, consistent with the existing validation already applied to the contentId field. This vulnerability is fixed in 0.8.0.

Affected products

plunk
  • ==< 0.8.0

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-21367
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Buffer Over-read in WLAN Firmware

Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans.

Affected products

Snapdragon
  • ==QCA6777AQ
  • ==WSA8840
  • ==SM8635P
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==IPQ5028
  • ==QCA9889
  • ==WSA8845H
  • ==WSA8830
  • ==Snapdragon 7 Gen 1 Mobile Platform
  • ==AR8035
  • ==QCN9024
  • ==WCD9370
  • ==WCN7880
  • ==QFW7114
  • ==X2000077
  • ==QCC2073
  • ==FastConnect 6900
  • ==Networking Pro 400 Platform
  • ==QCN6224
  • ==WCD9380
  • ==X2000090
  • ==QPA1086BD
  • ==IPQ8076
  • ==WCD9390
  • ==QCN5154
  • ==QCN6132
  • ==Networking Pro 800 Platform
  • ==QCN9000
  • ==QCN9274
  • ==Immersive Home 214 Platform
  • ==Snapdragon 6 Gen 3 Mobile Platform
  • ==FastConnect 7800
  • ==XG101032
  • ==FastConnect 6200
  • ==Cologne
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==IPQ6000
  • ==QCN5122
  • ==FastConnect 6700
  • ==QLN1083BD
  • ==Networking Pro 1210 Platform
  • ==QCN9070
  • ==WSA8835
  • ==XRV9209
  • ==IPQ6018
  • ==QLN1086BD
  • ==QCA8082
  • ==Snapdragon 8 Elite Gen 5
  • ==SM8635
  • ==SM8750P
  • ==WCD9378
  • ==SC8380XP
  • ==WCN7860
  • ==QCA8085
  • ==QCA8075
  • ==WCN3950
  • ==WCD9378C
  • ==QCA9888
  • ==G2 Gen 1
  • ==Immersive Home 316 Platform
  • ==QCA4024
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==Networking Pro 810 Platform
  • ==SD 8 Gen1 5G
  • ==IPQ9574
  • ==QCA8081
  • ==XG101039
  • ==QPA1083BD
  • ==QXM1096
  • ==SM6650P
  • ==QCA6787AQ
  • ==Networking Pro 610 Platform
  • ==QCA6797AQ
  • ==QCM4490
  • ==CSR8811
  • ==Snapdragon X72 5G Modem-RF System
  • ==Milos
  • ==QCN9100
  • ==QCN6122
  • ==QCS8550
  • ==X2000086
  • ==QCA6698AU
  • ==QCC2076
  • ==WSA8815
  • ==Netrani
  • ==QCN6024
  • ==QCN6023
  • ==QCN5152
  • ==SM8475P
  • ==QXM1095
  • ==Orne
  • ==Immersive Home 318 Platform
  • ==X2000092
  • ==WCN6650
  • ==XRV7209
  • ==QFW7124
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==Immersive Home 216 Platform
  • ==WCD9385
  • ==SM7675P
  • ==QMP1000
  • ==WCD9375
  • ==FWA Gen 3 Ultra Platform
  • ==Snapdragon 7+ Gen 2 Mobile Platform
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==WCN7861
  • ==QCA8084
  • ==IPQ5010
  • ==QCN5024
  • ==QCN9012
  • ==WCN7881
  • ==QXM1093
  • ==Snapdragon 8 Elite
  • ==QCN5052
  • ==SM7435
  • ==QCN5164
  • ==QCN5124
  • ==WSA8810
  • ==SM7675
  • ==SM7635P
  • ==QCN6274
  • ==WCN3988
  • ==Palawan25
  • ==WSA8845
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCN9022
  • ==IPQ6010
  • ==QCC710
  • ==QCN9011
  • ==SM8650Q
  • ==QCN5022
  • ==WCD9395
  • ==SAR2130P
  • ==IPQ8078
  • ==XG101002
  • ==QCA8337
  • ==Networking Pro 600 Platform
  • ==Snapdragon X75 5G Modem-RF System
  • ==Networking Pro 1200 Platform
  • ==Networking Pro 1610 Platform
  • ==Pandeiro
  • ==WCN6755
  • ==QCA6391
  • ==WSA8832
  • ==QCS4490
  • ==X2000094
  • ==QXM1094
  • ==WCD9340
  • ==QCA8386
  • ==WCN6450

Matching in nixpkgs

created 1 week, 4 days ago
WeGIA - Open Redirect - OrigemControle - listarTodos() & listarId_Nome() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos & listarId_Nome and nomeClasse=OrigemControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.

Affected products

WeGIA
  • ==< 3.6.9

Matching in nixpkgs

created 1 week, 4 days ago
OpenEXR has a signed 32-bit Overflow in PIZ Decoder Leads to OOB Read/Write

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.1.0 to before 3.2.7, 3.3.9, and 3.4.9, internal_exr_undo_piz() advances the working wavelet pointer with signed 32-bit arithmetic. Because nx, ny, and wcount are int, a crafted EXR file can make this product overflow and wrap. The next channel then decodes from an incorrect address. The wavelet decode path operates in place, so this yields both out-of-bounds reads and out-of-bounds writes. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9.

Affected products

openexr
  • ==>= 3.2.0, < 3.2.7
  • ==>= 3.4.0, < 3.4.9
  • ==>= 3.1.0, <= 3.1.13
  • ==>= 3.3.0, < 3.3.9

Matching in nixpkgs

pkgs.openexr

High dynamic-range (HDR) image file format

Package maintainers

Permalink CVE-2025-47400
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 week, 4 days ago
Buffer Over-read in Computer Vision

Cryptographic issue while copying data to a destination buffer without validating its size.

Affected products

Snapdragon
  • ==WCD9395
  • ==WSA8840
  • ==WSA8845H
  • ==SW6100P
  • ==Themisto
  • ==Snapdragon 8 Elite Gen 5
  • ==WCN7860
  • ==WCN7861
  • ==WSA8845
  • ==Pandeiro
  • ==SW6100

Matching in nixpkgs

Permalink CVE-2026-21374
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Buffer Over-read in Camera

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

Affected products

Snapdragon
  • ==Snapdragon 460 Mobile Platform
  • ==WSA8840
  • ==FastConnect 7800
  • ==QCM6490
  • ==FastConnect 6200
  • ==Cologne
  • ==XG101032
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==WSA8810
  • ==QCA6420
  • ==FastConnect 6700
  • ==WSA8845H
  • ==Snapdragon 8cx Gen 2 5G Compute Platform
  • ==WSA8830
  • ==WSA8835
  • ==X2000086
  • ==WCN3988
  • ==WSA8815
  • ==WSA8845
  • ==SM6250
  • ==WCD9370
  • ==Snapdragon 8cx Compute Platform
  • ==WCD9341
  • ==X2000077
  • ==Snapdragon 7c Compute Platform
  • ==SC8380XP
  • ==FastConnect 6900
  • ==Snapdragon 8c Compute Platform "Poipu Lite"
  • ==Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
  • ==Snapdragon 8cx Compute Platform "Poipu Pro"
  • ==X2000092
  • ==XG101002
  • ==Snapdragon 8cx Gen 3 Compute Platform
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCD9378C
  • ==WCN3950
  • ==QCA6391
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==WCD9385
  • ==WCD9375
  • ==WCD9380
  • ==Snapdragon 662 Mobile Platform
  • ==AQT1000
  • ==WSA8832
  • ==X2000090
  • ==X2000094
  • ==Snapdragon 8cx Gen 2 5G Compute Platform "Poipu Pro"
  • ==Snapdragon 7c Gen 2 Compute Platform "Rennell Pro"
  • ==WCD9340
  • ==QCA0000
  • ==XG101039
  • ==QCA6430
  • ==FastConnect 6800
  • ==QCM5430

Matching in nixpkgs

Permalink CVE-2026-34841
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Axios npm Supply Chain Incident Impacting @usebruno/cli

Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT). Users of @usebruno/cli who ran npm install between 00:21 UTC and ~03:30 UTC on March 31, 2026 may have been impacted. Upgrade to 3.2.1

Affected products

bruno
  • ==< 3.2.1

Matching in nixpkgs

pkgs.bruno

Open-source IDE For exploring and testing APIs

pkgs.bruno-cli

CLI of the open-source IDE For exploring and testing APIs

Package maintainers

Permalink CVE-2026-34755
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 week, 4 days ago
vLLM Affected by Denial of Service via Unbounded Frame Count in video/jpeg Base64 Processing

vLLM is an inference and serving engine for large language models (LLMs). From 0.7.0 to before 0.19.0, the VideoMediaIO.load_base64() method at vllm/multimodal/media/video.py splits video/jpeg data URLs by comma to extract individual JPEG frames, but does not enforce a frame count limit. The num_frames parameter (default: 32), which is enforced by the load_bytes() code path, is completely bypassed in the video/jpeg base64 path. An attacker can send a single API request containing thousands of comma-separated base64-encoded JPEG frames, causing the server to decode all frames into memory and crash with OOM. This vulnerability is fixed in 0.19.0.

Affected products

vllm
  • ==>= 0.7.0, < 0.19.0

Matching in nixpkgs

pkgs.vllm

High-throughput and memory-efficient inference and serving engine for LLMs

Package maintainers

created 1 week, 4 days ago
Nhost Leaks the Refresh Token via URL Query Parameter in OAuth Provider Callback

Nhost is an open source Firebase alternative with GraphQL. Prior to 0.48.0, the auth service's OAuth provider callback flow places the refresh token directly into the redirect URL as a query parameter. Refresh tokens in URLs are logged in browser history, server access logs, HTTP Referer headers, and proxy/CDN logs. Note that the refresh token is one-time use and all of these leak vectors are on owned infrastructure or services integrated by the application developer. This vulnerability is fixed in 0.48.0.

Affected products

nhost
  • ==< 0.48.0

Matching in nixpkgs

Package maintainers

created 1 week, 4 days ago
pyLoad has SSRF fix bypass via HTTP redirect

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, pyLoad has a server-side request forgery (SSRF) vulnerability. The fix for CVE-2026-33992 added IP validation to BaseDownloader.download() that checks the hostname of the initial download URL. However, pycurl is configured with FOLLOWLOCATION=1 and MAXREDIRS=10, causing it to automatically follow HTTP redirects. Redirect targets are never validated against the SSRF filter. An authenticated user with ADD permission can bypass the SSRF fix by submitting a URL that redirects to an internal address.

Affected products

pyload
  • ==<= 0.5.0b3.dev96

Matching in nixpkgs

Package maintainers