{"bomFormat":"CycloneDX","specVersion":"1.6","serialNumber":"urn:uuid:9de136dd-8777-472e-973a-444033354d20","version":3,"metadata":{"timestamp":"2025-09-02T20:54:23Z","tools":{"components":[{"group":"@cyclonedx","name":"cdxgen","version":"11.7.0","purl":"pkg:npm/%40cyclonedx/cdxgen@11.7.0","type":"application","bom-ref":"pkg:npm/@cyclonedx/cdxgen@11.7.0","publisher":"OWASP Foundation","authors":[{"name":"OWASP Foundation"}]},{"type":"application","name":"owasp-depscan","version":"6.0.0b3","purl":"pkg:pypi/owasp-depscan@6.0.0b3","bom-ref":"pkg:pypi/owasp-depscan@6.0.0b3"}]},"authors":[{"name":"OWASP Foundation"}],"lifecycles":[{"phase":"build"}],"component":{"name":"mlflow","version":"3.3.3.dev0","description":"MLflow is an open source platform for the complete machine learning lifecycle","tags":["ai","databricks","mlflow"],"properties":[{"name":"cdx:pypi:requiresPython","value":">=3.10"}],"type":"application","bom-ref":"pkg:pypi/mlflow@3.3.3.dev0","purl":"pkg:pypi/mlflow@3.3.3.dev0"}},"components":[{"group":"","name":"pytest","version":"","scope":"optional","purl":"pkg:pypi/pytest","type":"library","bom-ref":"pkg:pypi/pytest","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/skinny-test-requirements.txt"}],"concludedValue":"requirements/skinny-test-requirements.txt"}]}},{"group":"","name":"pytest-asyncio","version":"","scope":"optional","purl":"pkg:pypi/pytest-asyncio","type":"library","bom-ref":"pkg:pypi/pytest-asyncio","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"pytest-repeat","version":"","scope":"optional","purl":"pkg:pypi/pytest-repeat","type":"library","bom-ref":"pkg:pypi/pytest-repeat","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"pytest-cov","version":"","scope":"optional","purl":"pkg:pypi/pytest-cov","type":"library","bom-ref":"pkg:pypi/pytest-cov","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/skinny-test-requirements.txt"}],"concludedValue":"requirements/skinny-test-requirements.txt"}]}},{"group":"","name":"pytest-timeout","version":"","scope":"optional","purl":"pkg:pypi/pytest-timeout","type":"library","bom-ref":"pkg:pypi/pytest-timeout","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"pytest-localserver","version":"0.5.0","scope":"optional","purl":"pkg:pypi/pytest-localserver@0.5.0","type":"library","bom-ref":"pkg:pypi/pytest-localserver@0.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"moto","version":"4.2.0","scope":"optional","purl":"pkg:pypi/moto@4.2.0","type":"library","bom-ref":"pkg:pypi/moto@4.2.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"azure-storage-blob","version":"12.0.0","scope":"optional","purl":"pkg:pypi/azure-storage-blob@12.0.0","type":"library","bom-ref":"pkg:pypi/azure-storage-blob@12.0.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"azure-storage-file-datalake","version":"12.9.1","scope":"optional","purl":"pkg:pypi/azure-storage-file-datalake@12.9.1","type":"library","bom-ref":"pkg:pypi/azure-storage-file-datalake@12.9.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"azure-identity","version":"1.6.1","scope":"optional","purl":"pkg:pypi/azure-identity@1.6.1","type":"library","bom-ref":"pkg:pypi/azure-identity@1.6.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"pillow","version":"","scope":"optional","purl":"pkg:pypi/pillow","type":"library","bom-ref":"pkg:pypi/pillow","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"plotly","version":"","scope":"optional","purl":"pkg:pypi/plotly","type":"library","bom-ref":"pkg:pypi/plotly","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"kaleido","version":"","scope":"optional","purl":"pkg:pypi/kaleido","type":"library","bom-ref":"pkg:pypi/kaleido","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"hyperopt","version":"","scope":"optional","purl":"pkg:pypi/hyperopt","type":"library","bom-ref":"pkg:pypi/hyperopt","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"shap","version":"","scope":"optional","purl":"pkg:pypi/shap","type":"library","bom-ref":"pkg:pypi/shap","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"evaluate","version":"","scope":"optional","purl":"pkg:pypi/evaluate","type":"library","bom-ref":"pkg:pypi/evaluate","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"nltk","version":"","scope":"optional","purl":"pkg:pypi/nltk","type":"library","bom-ref":"pkg:pypi/nltk","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"rouge_score","version":"","scope":"optional","purl":"pkg:pypi/rouge-score","type":"library","bom-ref":"pkg:pypi/rouge-score","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"textstat","version":"","scope":"optional","purl":"pkg:pypi/textstat","type":"library","bom-ref":"pkg:pypi/textstat","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"tiktoken","version":"","scope":"optional","purl":"pkg:pypi/tiktoken","type":"library","bom-ref":"pkg:pypi/tiktoken","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"ipywidgets","version":"","scope":"optional","purl":"pkg:pypi/ipywidgets","type":"library","bom-ref":"pkg:pypi/ipywidgets","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"tqdm","version":"","scope":"optional","purl":"pkg:pypi/tqdm","type":"library","bom-ref":"pkg:pypi/tqdm","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"openai","version":"","scope":"optional","purl":"pkg:pypi/openai","type":"library","bom-ref":"pkg:pypi/openai","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]},"tags":["ml"]},{"group":"","name":"psutil","version":"","scope":"optional","purl":"pkg:pypi/psutil","type":"library","bom-ref":"pkg:pypi/psutil","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"typing_extensions","version":"4.6.0","scope":"optional","purl":"pkg:pypi/typing-extensions@4.6.0","type":"library","bom-ref":"pkg:pypi/typing-extensions@4.6.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"botocore","version":"1.34","scope":"optional","purl":"pkg:pypi/botocore@1.34","type":"library","bom-ref":"pkg:pypi/botocore@1.34","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"pyspark","version":"","scope":"optional","purl":"pkg:pypi/pyspark","type":"library","bom-ref":"pkg:pypi/pyspark","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"opentelemetry-exporter-otlp-proto-grpc","version":"","scope":"optional","purl":"pkg:pypi/opentelemetry-exporter-otlp-proto-grpc","type":"library","bom-ref":"pkg:pypi/opentelemetry-exporter-otlp-proto-grpc","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]},"tags":["telemetry"]},{"group":"","name":"opentelemetry-exporter-otlp-proto-http","version":"","scope":"optional","purl":"pkg:pypi/opentelemetry-exporter-otlp-proto-http","type":"library","bom-ref":"pkg:pypi/opentelemetry-exporter-otlp-proto-http","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]},"tags":["telemetry"]},{"group":"","name":"Flask-WTF","version":"2","scope":"required","purl":"pkg:pypi/flask-wtf@2","type":"library","bom-ref":"pkg:pypi/flask-wtf@2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"polars","version":"1","scope":"optional","purl":"pkg:pypi/polars@1","type":"library","bom-ref":"pkg:pypi/polars@1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"dspy","version":"","scope":"optional","purl":"pkg:pypi/dspy","type":"library","bom-ref":"pkg:pypi/dspy","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/test-requirements.txt"}],"concludedValue":"requirements/test-requirements.txt"}]}},{"group":"","name":"ruff","version":"0.12.10","scope":"optional","purl":"pkg:pypi/ruff@0.12.10","type":"library","bom-ref":"pkg:pypi/ruff@0.12.10","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/lint-requirements.txt"}],"concludedValue":"requirements/lint-requirements.txt"}]},"tags":["devel"]},{"group":"","name":"black","version":"23.7.0","scope":"optional","purl":"pkg:pypi/black@23.7.0","type":"library","bom-ref":"pkg:pypi/black@23.7.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/lint-requirements.txt"}],"concludedValue":"requirements/lint-requirements.txt"}]}},{"group":"","name":"blacken-docs","version":"1.18.0","scope":"optional","purl":"pkg:pypi/blacken-docs@1.18.0","type":"library","bom-ref":"pkg:pypi/blacken-docs@1.18.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/lint-requirements.txt"}],"concludedValue":"requirements/lint-requirements.txt"}]}},{"group":"","name":"pre-commit","version":"4.0.1","scope":"optional","purl":"pkg:pypi/pre-commit@4.0.1","type":"library","bom-ref":"pkg:pypi/pre-commit@4.0.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/lint-requirements.txt"}],"concludedValue":"requirements/lint-requirements.txt"}]}},{"group":"","name":"toml","version":"0.10.2","scope":"optional","purl":"pkg:pypi/toml@0.10.2","type":"library","bom-ref":"pkg:pypi/toml@0.10.2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/lint-requirements.txt"}],"concludedValue":"requirements/lint-requirements.txt"}]}},{"group":"","name":"mypy","version":"1.17.1","scope":"optional","purl":"pkg:pypi/mypy@1.17.1","type":"library","bom-ref":"pkg:pypi/mypy@1.17.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/lint-requirements.txt"}],"concludedValue":"requirements/lint-requirements.txt"}]}},{"group":"","name":"pytest","version":"8.4.0","scope":"optional","purl":"pkg:pypi/pytest@8.4.0","type":"library","bom-ref":"pkg:pypi/pytest@8.4.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/constraints.txt"}],"concludedValue":"requirements/constraints.txt"}]}},{"group":"","name":"pydantic","version":"2.11.7","scope":"optional","purl":"pkg:pypi/pydantic@2.11.7","type":"library","bom-ref":"pkg:pypi/pydantic@2.11.7","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"spacy","version":"3.3.0","scope":"optional","purl":"pkg:pypi/spacy@3.3.0","type":"library","bom-ref":"pkg:pypi/spacy@3.3.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"tensorflow","version":"2.10.0","scope":"optional","purl":"pkg:pypi/tensorflow@2.10.0","type":"library","bom-ref":"pkg:pypi/tensorflow@2.10.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"tensorflow-macos","version":"2.10.0","scope":"optional","purl":"pkg:pypi/tensorflow-macos@2.10.0","type":"library","bom-ref":"pkg:pypi/tensorflow-macos@2.10.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"torch","version":"1.11.0","scope":"optional","purl":"pkg:pypi/torch@1.11.0","type":"library","bom-ref":"pkg:pypi/torch@1.11.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"torchvision","version":"0.12.0","scope":"optional","purl":"pkg:pypi/torchvision@0.12.0","type":"library","bom-ref":"pkg:pypi/torchvision@0.12.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"lightning","version":"1.8.1","scope":"optional","purl":"pkg:pypi/lightning@1.8.1","type":"library","bom-ref":"pkg:pypi/lightning@1.8.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"xgboost","version":"0.82","scope":"optional","purl":"pkg:pypi/xgboost@0.82","type":"library","bom-ref":"pkg:pypi/xgboost@0.82","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"lightgbm","version":"","scope":"optional","purl":"pkg:pypi/lightgbm","type":"library","bom-ref":"pkg:pypi/lightgbm","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"catboost","version":"","scope":"optional","purl":"pkg:pypi/catboost","type":"library","bom-ref":"pkg:pypi/catboost","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"statsmodels","version":"","scope":"optional","purl":"pkg:pypi/statsmodels","type":"library","bom-ref":"pkg:pypi/statsmodels","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"h2o","version":"","scope":"optional","purl":"pkg:pypi/h2o","type":"library","bom-ref":"pkg:pypi/h2o","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"onnx","version":"1.11.0","scope":"optional","purl":"pkg:pypi/onnx@1.11.0","type":"library","bom-ref":"pkg:pypi/onnx@1.11.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"onnxruntime","version":"","scope":"optional","purl":"pkg:pypi/onnxruntime","type":"library","bom-ref":"pkg:pypi/onnxruntime","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"tf2onnx","version":"","scope":"optional","purl":"pkg:pypi/tf2onnx","type":"library","bom-ref":"pkg:pypi/tf2onnx","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"paddlepaddle","version":"","scope":"optional","purl":"pkg:pypi/paddlepaddle","type":"library","bom-ref":"pkg:pypi/paddlepaddle","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"holidays","version":"0.25","scope":"optional","purl":"pkg:pypi/holidays@0.25","type":"library","bom-ref":"pkg:pypi/holidays@0.25","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"prophet","version":"","scope":"optional","purl":"pkg:pypi/prophet","type":"library","bom-ref":"pkg:pypi/prophet","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"shap","version":"0.42.1","scope":"optional","purl":"pkg:pypi/shap@0.42.1","type":"library","bom-ref":"pkg:pypi/shap@0.42.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"pmdarima","version":"","scope":"optional","purl":"pkg:pypi/pmdarima","type":"library","bom-ref":"pkg:pypi/pmdarima","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"diviner","version":"","scope":"optional","purl":"pkg:pypi/diviner","type":"library","bom-ref":"pkg:pypi/diviner","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"datasets","version":"2.19.1","scope":"optional","purl":"pkg:pypi/datasets@2.19.1","type":"library","bom-ref":"pkg:pypi/datasets@2.19.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"transformers","version":"","scope":"optional","purl":"pkg:pypi/transformers","type":"library","bom-ref":"pkg:pypi/transformers","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]},"tags":["transform"]},{"group":"","name":"sentencepiece","version":"","scope":"optional","purl":"pkg:pypi/sentencepiece","type":"library","bom-ref":"pkg:pypi/sentencepiece","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"setfit","version":"","scope":"optional","purl":"pkg:pypi/setfit","type":"library","bom-ref":"pkg:pypi/setfit","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"librosa","version":"","scope":"optional","purl":"pkg:pypi/librosa","type":"library","bom-ref":"pkg:pypi/librosa","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"ffmpeg","version":"","scope":"optional","purl":"pkg:pypi/ffmpeg","type":"library","bom-ref":"pkg:pypi/ffmpeg","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"accelerate","version":"","scope":"optional","purl":"pkg:pypi/accelerate","type":"library","bom-ref":"pkg:pypi/accelerate","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"tenacity","version":"","scope":"optional","purl":"pkg:pypi/tenacity","type":"library","bom-ref":"pkg:pypi/tenacity","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"llama_index","version":"","scope":"optional","purl":"pkg:pypi/llama-index","type":"library","bom-ref":"pkg:pypi/llama-index","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]},"tags":["ml"]},{"group":"","name":"llama-index-agent-openai","version":"","scope":"optional","purl":"pkg:pypi/llama-index-agent-openai","type":"library","bom-ref":"pkg:pypi/llama-index-agent-openai","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]},"tags":["ml"]},{"group":"","name":"langchain","version":"","scope":"optional","purl":"pkg:pypi/langchain","type":"library","bom-ref":"pkg:pypi/langchain","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]},"tags":["ml"]},{"group":"","name":"promptflow","version":"","scope":"optional","purl":"pkg:pypi/promptflow","type":"library","bom-ref":"pkg:pypi/promptflow","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"sentence-transformers","version":"","scope":"optional","purl":"pkg:pypi/sentence-transformers","type":"library","bom-ref":"pkg:pypi/sentence-transformers","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]},"tags":["transform"]},{"group":"","name":"anthropic","version":"","scope":"optional","purl":"pkg:pypi/anthropic","type":"library","bom-ref":"pkg:pypi/anthropic","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"ag2","version":"","scope":"optional","purl":"pkg:pypi/ag2","type":"library","bom-ref":"pkg:pypi/ag2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"dspy","version":"2.6.9","scope":"optional","purl":"pkg:pypi/dspy@2.6.9","type":"library","bom-ref":"pkg:pypi/dspy@2.6.9","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"litellm","version":"","scope":"optional","purl":"pkg:pypi/litellm","type":"library","bom-ref":"pkg:pypi/litellm","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"google-genai","version":"","scope":"optional","purl":"pkg:pypi/google-genai","type":"library","bom-ref":"pkg:pypi/google-genai","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"groq","version":"","scope":"optional","purl":"pkg:pypi/groq","type":"library","bom-ref":"pkg:pypi/groq","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"mistralai","version":"","scope":"optional","purl":"pkg:pypi/mistralai","type":"library","bom-ref":"pkg:pypi/mistralai","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"autogen-agentchat","version":"","scope":"optional","purl":"pkg:pypi/autogen-agentchat","type":"library","bom-ref":"pkg:pypi/autogen-agentchat","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"semantic-kernel","version":"","scope":"optional","purl":"pkg:pypi/semantic-kernel","type":"library","bom-ref":"pkg:pypi/semantic-kernel","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"agno","version":"","scope":"optional","purl":"pkg:pypi/agno","type":"library","bom-ref":"pkg:pypi/agno","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"strands-agents","version":"","scope":"optional","purl":"pkg:pypi/strands-agents","type":"library","bom-ref":"pkg:pypi/strands-agents","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/extra-ml-requirements.txt"}],"concludedValue":"requirements/extra-ml-requirements.txt"}]}},{"group":"","name":"tensorflow-cpu","version":"2.12.0","scope":"optional","purl":"pkg:pypi/tensorflow-cpu@2.12.0","type":"library","bom-ref":"pkg:pypi/tensorflow-cpu@2.12.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"tensorflow-macos","version":"2.12.0","scope":"optional","purl":"pkg:pypi/tensorflow-macos@2.12.0","type":"library","bom-ref":"pkg:pypi/tensorflow-macos@2.12.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"datasets","version":"","scope":"optional","purl":"pkg:pypi/datasets","type":"library","bom-ref":"pkg:pypi/datasets","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"nbsphinx","version":"0.8.8","scope":"optional","purl":"pkg:pypi/nbsphinx@0.8.8","type":"library","bom-ref":"pkg:pypi/nbsphinx@0.8.8","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"ipython","version":"8.7.0","scope":"optional","purl":"pkg:pypi/ipython@8.7.0","type":"library","bom-ref":"pkg:pypi/ipython@8.7.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"keras","version":"","scope":"optional","purl":"pkg:pypi/keras","type":"library","bom-ref":"pkg:pypi/keras","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"scrapy","version":"","scope":"optional","purl":"pkg:pypi/scrapy","type":"library","bom-ref":"pkg:pypi/scrapy","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"ipywidgets","version":"8.1.1","scope":"optional","purl":"pkg:pypi/ipywidgets@8.1.1","type":"library","bom-ref":"pkg:pypi/ipywidgets@8.1.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"incremental","version":"24.7.0","scope":"optional","purl":"pkg:pypi/incremental@24.7.0","type":"library","bom-ref":"pkg:pypi/incremental@24.7.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-requirements.txt"}],"concludedValue":"requirements/doc-requirements.txt"}]}},{"group":"","name":"sphinx","version":"4.2.0","scope":"optional","purl":"pkg:pypi/sphinx@4.2.0","type":"library","bom-ref":"pkg:pypi/sphinx@4.2.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"jinja2","version":"3.0.3","scope":"optional","purl":"pkg:pypi/jinja2@3.0.3","type":"library","bom-ref":"pkg:pypi/jinja2@3.0.3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"flask","version":"2.2.5","scope":"optional","purl":"pkg:pypi/flask@2.2.5","type":"library","bom-ref":"pkg:pypi/flask@2.2.5","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinx-autobuild","version":"","scope":"optional","purl":"pkg:pypi/sphinx-autobuild","type":"library","bom-ref":"pkg:pypi/sphinx-autobuild","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinx-click","version":"","scope":"optional","purl":"pkg:pypi/sphinx-click","type":"library","bom-ref":"pkg:pypi/sphinx-click","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinx-tabs","version":"3.2.0","scope":"optional","purl":"pkg:pypi/sphinx-tabs@3.2.0","type":"library","bom-ref":"pkg:pypi/sphinx-tabs@3.2.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinx-reredirects","version":"0.1.3","scope":"optional","purl":"pkg:pypi/sphinx-reredirects@0.1.3","type":"library","bom-ref":"pkg:pypi/sphinx-reredirects@0.1.3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinxcontrib-applehelp","version":"1.0.8","scope":"optional","purl":"pkg:pypi/sphinxcontrib-applehelp@1.0.8","type":"library","bom-ref":"pkg:pypi/sphinxcontrib-applehelp@1.0.8","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinxcontrib-devhelp","version":"1.0.6","scope":"optional","purl":"pkg:pypi/sphinxcontrib-devhelp@1.0.6","type":"library","bom-ref":"pkg:pypi/sphinxcontrib-devhelp@1.0.6","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinxcontrib-htmlhelp","version":"2.0.4","scope":"optional","purl":"pkg:pypi/sphinxcontrib-htmlhelp@2.0.4","type":"library","bom-ref":"pkg:pypi/sphinxcontrib-htmlhelp@2.0.4","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinxcontrib-serializinghtml","version":"1.1.10","scope":"optional","purl":"pkg:pypi/sphinxcontrib-serializinghtml@1.1.10","type":"library","bom-ref":"pkg:pypi/sphinxcontrib-serializinghtml@1.1.10","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"sphinxcontrib-qthelp","version":"1.0.7","scope":"optional","purl":"pkg:pypi/sphinxcontrib-qthelp@1.0.7","type":"library","bom-ref":"pkg:pypi/sphinxcontrib-qthelp@1.0.7","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/doc-min-requirements.txt"}],"concludedValue":"requirements/doc-min-requirements.txt"}]}},{"group":"","name":"transformers","version":"4.51.0","scope":"optional","purl":"pkg:pypi/transformers@4.51.0","type":"library","bom-ref":"pkg:pypi/transformers@4.51.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/constraints.txt"}],"concludedValue":"requirements/constraints.txt"}]},"tags":["transform"]},{"group":"","name":"litellm","version":"1.67.4","scope":"optional","purl":"pkg:pypi/litellm@1.67.4","type":"library","bom-ref":"pkg:pypi/litellm@1.67.4","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/constraints.txt"}],"concludedValue":"requirements/constraints.txt"}]}},{"group":"","name":"llama-index-core","version":"0.12.34","scope":"optional","purl":"pkg:pypi/llama-index-core@0.12.34","type":"library","bom-ref":"pkg:pypi/llama-index-core@0.12.34","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/constraints.txt"}],"concludedValue":"requirements/constraints.txt"}]},"tags":["ml"]},{"group":"","name":"json_repair","version":"0.45.0","scope":"optional","purl":"pkg:pypi/json-repair@0.45.0","type":"library","bom-ref":"pkg:pypi/json-repair@0.45.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/constraints.txt"}],"concludedValue":"requirements/constraints.txt"}]}},{"group":"","name":"transformers","version":"4.52.2","scope":"optional","purl":"pkg:pypi/transformers@4.52.2","type":"library","bom-ref":"pkg:pypi/transformers@4.52.2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/constraints.txt"}],"concludedValue":"requirements/constraints.txt"}]},"tags":["transform"]},{"group":"","name":"transformers","version":"4.52.1","scope":"optional","purl":"pkg:pypi/transformers@4.52.1","type":"library","bom-ref":"pkg:pypi/transformers@4.52.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/constraints.txt"}],"concludedValue":"requirements/constraints.txt"}]},"tags":["transform"]},{"group":"","name":"pyspark","version":"3.5.6","scope":"optional","purl":"pkg:pypi/pyspark@3.5.6","type":"library","bom-ref":"pkg:pypi/pyspark@3.5.6","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"requirements/constraints.txt"}],"concludedValue":"requirements/constraints.txt"}]}},{"group":"","name":"agents","version":"1.4.0","description":"Efficient TensorFlow implementation of reinforcement learning algorithms.","scope":"required","hashes":[{"alg":"SHA-256","content":"22b58de0aee838b19c547436734648c35571dd6d80d560d23c958571ae79c54d"}],"purl":"pkg:pypi/agents@1.4.0","externalReferences":[{"type":"vcs","url":"http://github.com/tensorflow/agents"}],"type":"library","bom-ref":"pkg:pypi/agents@1.4.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: agents"}],"concludedValue":"PyPI package: agents"}]}},{"group":"","name":"aiohttp","version":"3.12.15","description":"Async http client/server framework (asyncio)","scope":"required","hashes":[{"alg":"SHA-256","content":"b6fc902bff74d9b1879ad55f5404153e2b33a82e72a95c89cec5eb6cc9e92fbc"}],"purl":"pkg:pypi/aiohttp@3.12.15","externalReferences":[{"type":"vcs","url":"https://github.com/aio-libs/aiohttp"}],"type":"framework","bom-ref":"pkg:pypi/aiohttp@3.12.15","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"authors":[{"name":"Mike Bayer "}],"group":"","name":"alembic","version":"1.16.5","description":"A database migration tool for SQLAlchemy.","scope":"required","hashes":[{"alg":"SHA-256","content":"e845dfe090c5ffa7b92593ae6687c5cb1a101e91fa53868497dbd79847f9dbe3"}],"purl":"pkg:pypi/alembic@1.16.5","type":"library","bom-ref":"pkg:pypi/alembic@1.16.5","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["database"]},{"group":"","name":"autogen-core","version":"0.7.4","description":"Foundational interfaces and agent runtime implementation for AutoGen","scope":"required","hashes":[{"alg":"SHA-256","content":"b383d3b2dfe9f5d62e0da0057da6de3cb63259233570e4c85153e33703170afa"}],"purl":"pkg:pypi/autogen-core@0.7.4","type":"library","bom-ref":"pkg:pypi/autogen-core@0.7.4","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: autogen-core"}],"concludedValue":"PyPI package: autogen-core"}]}},{"authors":[{"name":"Mikhail Marenov "}],"group":"","name":"ax","version":"0.52.0","description":"Ax - workflow apps builder","scope":"required","hashes":[{"alg":"SHA-256","content":"e15edcc09538cf4328fcb4f89c2632a1dc4ec2376aa82d76c387c7690e26e6e3"}],"purl":"pkg:pypi/ax@0.52.0","externalReferences":[{"type":"vcs","url":"https://github.com/enf644/ax"}],"type":"library","bom-ref":"pkg:pypi/ax@0.52.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: ax"}],"concludedValue":"PyPI package: ax"}]}},{"authors":[{"name":"Amazon Web Services"}],"group":"","name":"boto3","version":"1.40.22","description":"The AWS SDK for Python","scope":"required","hashes":[{"alg":"SHA-256","content":"ecc468266a018f77869fd9cc3564500c3c1b658eb6d8e20351ec88cc06258dbf"}],"purl":"pkg:pypi/boto3@1.40.22","externalReferences":[{"type":"vcs","url":"https://github.com/boto/boto3"}],"type":"framework","bom-ref":"pkg:pypi/boto3@1.40.22","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: boto3"}],"concludedValue":"PyPI package: boto3"}]},"tags":["framework"]},{"authors":[{"name":"Thomas Kemmer "}],"group":"","name":"cachetools","version":"6.2.0","description":"Extensible memoizing collections and decorators","scope":"required","hashes":[{"alg":"SHA-256","content":"1c76a8960c0041fcc21097e357f882197c79da0dbff766e7317890a65d7d8ba6"}],"purl":"pkg:pypi/cachetools@6.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/tkem/cachetools/"}],"type":"library","bom-ref":"pkg:pypi/cachetools@6.2.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: cachetools"}],"concludedValue":"PyPI package: cachetools"}]}},{"authors":[{"name":"PyTorch Team"}],"group":"","name":"captum","version":"0.8.0","description":"Model interpretability for PyTorch","scope":"required","hashes":[{"alg":"SHA-256","content":"b0465431f5cbc666d86c14ee853ee6155e97460369238f85bd10a241b87eea47"}],"purl":"pkg:pypi/captum@0.8.0","externalReferences":[{"type":"website","url":"https://captum.ai"}],"type":"library","bom-ref":"pkg:pypi/captum@0.8.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: captum"}],"concludedValue":"PyPI package: captum"}]}},{"group":"","name":"click","version":"8.2.1","description":"Composable command line interface toolkit","scope":"required","hashes":[{"alg":"SHA-256","content":"61a3265b914e850b85317d0b3109c7f8cd35a670f963866005d6ef1d5175a12b"}],"purl":"pkg:pypi/click@8.2.1","type":"library","bom-ref":"pkg:pypi/click@8.2.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"The cloudpickle developer team "}],"group":"","name":"cloudpickle","version":"3.1.1","description":"Pickler class to extend the standard pickle.Pickler functionality","scope":"required","hashes":[{"alg":"SHA-256","content":"c8c5a44295039331ee9dad40ba100a9c7297b6f988e50e87ccdf3765a668350e"}],"purl":"pkg:pypi/cloudpickle@3.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/cloudpipe/cloudpickle"}],"type":"library","bom-ref":"pkg:pypi/cloudpickle@3.1.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["cloud"]},{"authors":[{"name":"Jo\u00e3o Moura "}],"group":"","name":"crewai-tools","version":"0.65.0","description":"Set of tools for the crewAI framework","scope":"required","hashes":[{"alg":"SHA-256","content":"5ace69a94654fde408a30fc439ca46747efce52ef201f26f1ba44394a3d58ddf"}],"purl":"pkg:pypi/crewai-tools@0.65.0","type":"framework","bom-ref":"pkg:pypi/crewai-tools@0.65.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: crewai-tools"}],"concludedValue":"PyPI package: crewai-tools"}]},"tags":["framework","tools"]},{"authors":[{"name":"The cryptography developers >"}],"group":"","name":"cryptography","version":"45.0.7","description":"cryptography is a package which provides cryptographic recipes and primitives to Python developers.","scope":"required","hashes":[{"alg":"SHA-256","content":"3be4f21c6245930688bd9e162829480de027f8bf962ede33d4f8ba7d67a00cee"}],"purl":"pkg:pypi/cryptography@45.0.7","type":"library","bom-ref":"pkg:pypi/cryptography@45.0.7","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["crypto"]},{"authors":[{"name":"Thomas A Caswell "}],"group":"","name":"cycler","version":"0.12.1","description":"Composable style cycles","scope":"required","hashes":[{"alg":"SHA-256","content":"85cef7cff222d8644161529808465972e51340599459b8ac3ccbac5a854e0d30"}],"purl":"pkg:pypi/cycler@0.12.1","type":"library","bom-ref":"pkg:pypi/cycler@0.12.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"Databricks "}],"group":"","name":"databricks-langchain","version":"0.7.1","description":"Support for Databricks AI support in LangChain","scope":"required","hashes":[{"alg":"SHA-256","content":"7ac27e4653fd83d5b2924a07504619758ac80e5af6cc3b1e1845b53b0d9ebf82"}],"purl":"pkg:pypi/databricks-langchain@0.7.1","type":"library","bom-ref":"pkg:pypi/databricks-langchain@0.7.1","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: databricks-langchain"}],"concludedValue":"PyPI package: databricks-langchain"}]},"tags":["ai"]},{"authors":[{"name":"Gustavo Niemeyer "}],"group":"","name":"python-dateutil","version":"2.9.0.post0","description":"Extensions to the standard Python datetime module","scope":"required","hashes":[{"alg":"SHA-256","content":"a8b2bc7bffae282281c8140a97d3aa9c14da0b136dfe83f850eea9a5f7470427"}],"purl":"pkg:pypi/python-dateutil@2.9.0.post0","externalReferences":[{"type":"vcs","url":"https://github.com/dateutil/dateutil"}],"type":"library","bom-ref":"pkg:pypi/python-dateutil@2.9.0.post0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"databricks-sdk","version":"0.65.0","description":"Databricks SDK for Python (Beta)","scope":"required","hashes":[{"alg":"SHA-256","content":"594e61138071d7ae830412cfd3fbc5bd16aba9b67a423f44f4c13ca70c493a9f"}],"purl":"pkg:pypi/databricks-sdk@0.65.0","type":"library","bom-ref":"pkg:pypi/databricks-sdk@0.65.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"=?utf-8?q?Sebasti=C3=A1n_Ram=C3=ADrez?= "}],"group":"","name":"fastapi","version":"0.116.1","description":"FastAPI framework, high performance, easy to learn, fast to code, ready for production","scope":"required","hashes":[{"alg":"SHA-256","content":"c46ac7c312df840f0c9e220f7964bada936781bc4e2e6eb71f1c4d7553786565"}],"purl":"pkg:pypi/fastapi@0.116.1","type":"framework","bom-ref":"pkg:pypi/fastapi@0.116.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"authors":[{"name":"Jeremiah Lowin"}],"group":"","name":"fastmcp","version":"2.12.0","description":"The fast, Pythonic way to build MCP servers and clients.","scope":"required","hashes":[{"alg":"SHA-256","content":"f57d4a32b7761da3a4842ba8d70cf1b1a6c3791eda27fd3252780ecfa8f87cff"}],"purl":"pkg:pypi/fastmcp@2.12.0","type":"library","bom-ref":"pkg:pypi/fastmcp@2.12.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"Flask-WTF","version":"1.2.2","description":"Form rendering, validation, and CSRF protection for Flask with WTForms.","scope":"required","hashes":[{"alg":"SHA-256","content":"e93160c5c5b6b571cf99300b6e01b72f9a101027cab1579901f8b10c5daf0b70"}],"purl":"pkg:pypi/flask-wtf@1.2.2","type":"framework","bom-ref":"pkg:pypi/flask-wtf@1.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework"]},{"authors":[{"name":"Sebastian Thiel"},{"name":" Michael Trier "}],"group":"","name":"GitPython","version":"3.1.45","description":"GitPython is a Python library used to interact with Git repositories","scope":"required","hashes":[{"alg":"SHA-256","content":"8908cb2e02fb3b93b7eb0f2827125cb699869470432cc885f019b8fd0fccff77"}],"purl":"pkg:pypi/gitpython@3.1.45","externalReferences":[{"type":"vcs","url":"https://github.com/gitpython-developers/GitPython"}],"type":"library","bom-ref":"pkg:pypi/gitpython@3.1.45","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"protobuf@googlegroups.com "}],"group":"","name":"protobuf","version":"6.32.0","scope":"required","hashes":[{"alg":"SHA-256","content":"84f9e3c1ff6fb0308dbacb0950d8aa90694b0d0ee68e75719cb044b7078fe741"}],"purl":"pkg:pypi/protobuf@6.32.0","externalReferences":[{"type":"website","url":"https://developers.google.com/protocol-buffers/"}],"type":"library","bom-ref":"pkg:pypi/protobuf@6.32.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["cloud","xml"]},{"authors":[{"name":"Syrus Akbary "}],"group":"","name":"graphene","version":"3.4.3","description":"GraphQL Framework for Python","scope":"required","hashes":[{"alg":"SHA-256","content":"820db6289754c181007a150db1f7fff544b94142b556d12e3ebc777a7bf36c71"}],"purl":"pkg:pypi/graphene@3.4.3","externalReferences":[{"type":"vcs","url":"https://github.com/graphql-python/graphene"}],"type":"framework","bom-ref":"pkg:pypi/graphene@3.4.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"authors":[{"name":"The gRPC Authors "}],"group":"","name":"grpc","version":"1.0.0","description":"Please install the official package with: pip install grpcio","scope":"required","hashes":[{"alg":"SHA-256","content":"e1aa035512b1cc8d5ce84685f30eae463dad9123d858f5676b1159a2b80eea86"}],"purl":"pkg:pypi/grpc@1.0.0","externalReferences":[{"type":"website","url":"https://grpc.io"}],"type":"library","bom-ref":"pkg:pypi/grpc@1.0.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: grpc"}],"concludedValue":"PyPI package: grpc"}]}},{"authors":[{"name":"Andrew Collette "}],"group":"","name":"h5py","version":"3.14.0","description":"Read and write HDF5 files from Python","scope":"required","hashes":[{"alg":"SHA-256","content":"24df6b2622f426857bda88683b16630014588a0e4155cba44e872eb011c4eaed"}],"purl":"pkg:pypi/h5py@3.14.0","type":"library","bom-ref":"pkg:pypi/h5py@3.14.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"Hugging Face"},{"name":" Inc. "}],"group":"","name":"huggingface-hub","version":"0.34.4","description":"Client library to download and publish models, datasets and other repos on the huggingface.co hub","scope":"required","hashes":[{"alg":"SHA-256","content":"9b365d781739c93ff90c359844221beef048403f1bc1f1c123c191257c3c890a"}],"purl":"pkg:pypi/huggingface-hub@0.34.4","externalReferences":[{"type":"vcs","url":"https://github.com/huggingface/huggingface_hub"}],"type":"framework","bom-ref":"pkg:pypi/huggingface-hub@0.34.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"authors":[{"name":"\"Jason R. Coombs\" "}],"group":"","name":"importlib-metadata","version":"8.7.0","description":"Read metadata from Python packages","scope":"required","hashes":[{"alg":"SHA-256","content":"e5dd1551894c77868a30651cef00984d50e1002d06942a7101d34870c5f02afd"}],"purl":"pkg:pypi/importlib-metadata@8.7.0","type":"library","bom-ref":"pkg:pypi/importlib-metadata@8.7.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: importlib-metadata"}],"concludedValue":"PyPI package: importlib-metadata"}]}},{"authors":[{"name":"Jose Padilla "}],"group":"","name":"PyJWT","version":"2.10.1","description":"JSON Web Token implementation in Python","scope":"required","hashes":[{"alg":"SHA-256","content":"dcdd193e30abefd5debf142f9adfcdd2b58004e644f25406ffaebd50bd98dacb"}],"purl":"pkg:pypi/pyjwt@2.10.1","type":"library","bom-ref":"pkg:pypi/pyjwt@2.10.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["token","web"]},{"group":"","name":"langchain-community","version":"0.3.29","description":"Community contributed LangChain integrations.","scope":"required","hashes":[{"alg":"SHA-256","content":"c876ec7ef40b46353af164197f4e08e157650e8a02c9fb9d49351cdc16c839fe"}],"purl":"pkg:pypi/langchain-community@0.3.29","type":"framework","bom-ref":"pkg:pypi/langchain-community@0.3.29","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: langchain-community"}],"concludedValue":"PyPI package: langchain-community"}]},"tags":["framework","ml"]},{"group":"","name":"langchain-core","version":"0.3.75","description":"Building applications with LLMs through composability","scope":"required","hashes":[{"alg":"SHA-256","content":"03ca1fadf955ee3c7d5806a841f4b3a37b816acea5e61a7e6ba1298c05eea7f5"}],"purl":"pkg:pypi/langchain-core@0.3.75","type":"framework","bom-ref":"pkg:pypi/langchain-core@0.3.75","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"langchain-openai","version":"0.3.32","description":"An integration package connecting OpenAI and LangChain","scope":"required","hashes":[{"alg":"SHA-256","content":"3354f76822f7cc76d8069831fe2a77f9bc7ff3b4f13af788bd94e4c6e853b400"}],"purl":"pkg:pypi/langchain-openai@0.3.32","type":"framework","bom-ref":"pkg:pypi/langchain-openai@0.3.32","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: langchain-openai"}],"concludedValue":"PyPI package: langchain-openai"}]},"tags":["framework","ml"]},{"group":"","name":"langgraph","version":"0.6.6","description":"Building stateful, multi-actor applications with LLMs","scope":"required","hashes":[{"alg":"SHA-256","content":"a2283a5236abba6c8307c1a485c04e8a0f0ffa2be770878782a7bf2deb8d7954"}],"purl":"pkg:pypi/langgraph@0.6.6","type":"library","bom-ref":"pkg:pypi/langgraph@0.6.6","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: langgraph"}],"concludedValue":"PyPI package: langgraph"}]}},{"authors":[{"name":"Ali-Akber Saifee "}],"group":"","name":"limits","version":"5.5.0","description":"Rate limiting utilities","scope":"required","hashes":[{"alg":"SHA-256","content":"57217d01ffa5114f7e233d1f5e5bdc6fe60c9b24ade387bf4d5e83c5cf929bae"}],"purl":"pkg:pypi/limits@5.5.0","externalReferences":[{"type":"website","url":"https://limits.readthedocs.org"}],"type":"library","bom-ref":"pkg:pypi/limits@5.5.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: limits"}],"concludedValue":"PyPI package: limits"}]}},{"authors":[{"name":"John D. Hunter"},{"name":" Michael Droettboom >"}],"group":"","name":"matplotlib","version":"3.10.6","description":"Python plotting package","scope":"required","hashes":[{"alg":"SHA-256","content":"bc7316c306d97463a9866b89d5cc217824e799fa0de346c8f68f4f3d27c8693d"}],"purl":"pkg:pypi/matplotlib@3.10.6","type":"framework","bom-ref":"pkg:pypi/matplotlib@3.10.6","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"authors":[{"name":"Travis E. Oliphant et al."}],"group":"","name":"numpy","version":"2.3.2","description":"Fundamental package for array computing in Python","scope":"required","hashes":[{"alg":"SHA-256","content":"852ae5bed3478b92f093e30f785c98e0cb62fa0a939ed057c31716e18a7a22b9"}],"purl":"pkg:pypi/numpy@2.3.2","type":"framework","bom-ref":"pkg:pypi/numpy@2.3.2","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: numpy"}],"concludedValue":"PyPI package: numpy"}]},"tags":["framework"]},{"authors":[{"name":"OpenTelemetry Authors "}],"group":"","name":"opentelemetry-api","version":"1.36.0","description":"OpenTelemetry Python API","scope":"required","hashes":[{"alg":"SHA-256","content":"02f20bcacf666e1333b6b1f04e647dc1d5111f86b8e510238fcc56d7762cda8c"}],"purl":"pkg:pypi/opentelemetry-api@1.36.0","type":"library","bom-ref":"pkg:pypi/opentelemetry-api@1.36.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["telemetry"]},{"authors":[{"name":"Donald Stufft "}],"group":"","name":"packaging","version":"25.0","description":"Core utilities for Python packages","scope":"required","hashes":[{"alg":"SHA-256","content":"29572ef2b1f17581046b3a2227d5c611fb25ec70ca1ba8554b24b0e69331a484"}],"purl":"pkg:pypi/packaging@25.0","type":"library","bom-ref":"pkg:pypi/packaging@25.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"The Pandas Development Team "}],"group":"","name":"pandas","version":"2.3.2","description":"Powerful data structures for data analysis, time series, and statistics","scope":"required","hashes":[{"alg":"SHA-256","content":"52bc29a946304c360561974c6542d1dd628ddafa69134a7131fdfd6a5d7a1a35"}],"purl":"pkg:pypi/pandas@2.3.2","type":"framework","bom-ref":"pkg:pypi/pandas@2.3.2","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: pandas"}],"concludedValue":"PyPI package: pandas"}]},"tags":["framework"]},{"authors":[{"name":"Jeff Forcier "}],"group":"","name":"paramiko","version":"4.0.0","description":"SSH2 protocol library","scope":"required","hashes":[{"alg":"SHA-256","content":"0e20e00ac666503bf0b4eda3b6d833465a2b7aff2e2b3d79a8bba5ef144ee3b9"}],"purl":"pkg:pypi/paramiko@4.0.0","type":"library","bom-ref":"pkg:pypi/paramiko@4.0.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: paramiko"}],"concludedValue":"PyPI package: paramiko"}]}},{"authors":[{"name":"Luke Maurits "}],"group":"","name":"prettytable","version":"3.16.0","description":"A simple Python library for easily displaying tabular data in a visually appealing ASCII table format","scope":"required","hashes":[{"alg":"SHA-256","content":"b5eccfabb82222f5aa46b798ff02a8452cf530a352c31bddfa29be41242863aa"}],"purl":"pkg:pypi/prettytable@3.16.0","type":"library","bom-ref":"pkg:pypi/prettytable@3.16.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: prettytable"}],"concludedValue":"PyPI package: prettytable"}]}},{"authors":[{"name":"Viktor Adam "}],"group":"","name":"prometheus-flask-exporter","version":"0.23.2","description":"Prometheus metrics exporter for Flask","scope":"required","hashes":[{"alg":"SHA-256","content":"94922a636d4c1d8b68e1ee605c30a23e9bbb0b21756df8222aa919634871784c"}],"purl":"pkg:pypi/prometheus-flask-exporter@0.23.2","externalReferences":[{"type":"vcs","url":"https://github.com/rycus86/prometheus_flask_exporter"}],"type":"library","bom-ref":"pkg:pypi/prometheus-flask-exporter@0.23.2","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: prometheus-flask-exporter"}],"concludedValue":"PyPI package: prometheus-flask-exporter"}]}},{"authors":[{"name":"Barthelemy Dagenais "}],"group":"","name":"py4j","version":"0.10.9.9","description":"Enables Python programs to dynamically access arbitrary Java objects","scope":"required","hashes":[{"alg":"SHA-256","content":"c7c26e4158defb37b0bb124933163641a2ff6e3a3913f7811b0ddbe07ed61533"}],"purl":"pkg:pypi/py4j@0.10.9.9","externalReferences":[{"type":"website","url":"https://www.py4j.org/"}],"type":"library","bom-ref":"pkg:pypi/py4j@0.10.9.9","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pyarrow","version":"21.0.0","description":"Python library for Apache Arrow","scope":"required","hashes":[{"alg":"SHA-256","content":"e563271e2c5ff4d4a4cbeb2c83d5cf0d4938b891518e676025f7268c6fe5fe26"}],"purl":"pkg:pypi/pyarrow@21.0.0","type":"library","bom-ref":"pkg:pypi/pyarrow@21.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"NVIDIA Corporation"}],"group":"","name":"pynvml","version":"12.0.0","description":"Python utilities for the NVIDIA Management Library","scope":"required","hashes":[{"alg":"SHA-256","content":"fdff84b62a27dbe98e08e1a647eb77342bef1aebe0878bcd15e99a83fcbecb9e"}],"purl":"pkg:pypi/pynvml@12.0.0","type":"library","bom-ref":"pkg:pypi/pynvml@12.0.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: pynvml"}],"concludedValue":"PyPI package: pynvml"}]}},{"group":"","name":"pyrsmi","version":"0.2.0","description":"Python System Management Library for AMD GPUs","scope":"required","hashes":[{"alg":"SHA-256","content":"594388e5e0e916555d8b92b8b73e38aa73903a9d03ad89c172fefa187fc3ea41"}],"purl":"pkg:pypi/pyrsmi@0.2.0","type":"library","bom-ref":"pkg:pypi/pyrsmi@0.2.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: pyrsmi"}],"concludedValue":"PyPI package: pyrsmi"}]}},{"authors":[{"name":"Jeff Hinrichs "}],"group":"","name":"pysftp","version":"0.2.9","description":"A friendly face on SFTP","scope":"required","hashes":[{"alg":"SHA-256","content":"fbf55a802e74d663673400acd92d5373c1c7ee94d765b428d9f977567ac4854a"}],"purl":"pkg:pypi/pysftp@0.2.9","externalReferences":[{"type":"website","url":"https://bitbucket.org/dundeemt/pysftp"}],"type":"library","bom-ref":"pkg:pypi/pysftp@0.2.9","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: pysftp"}],"concludedValue":"PyPI package: pysftp"}]}},{"authors":[{"name":"Lightning AI et al. "}],"group":"","name":"pytorch-lightning","version":"2.5.4","description":"PyTorch Lightning is the lightweight PyTorch wrapper for ML researchers. Scale your models. Write less boilerplate.","scope":"required","hashes":[{"alg":"SHA-256","content":"cbdc45c1fbd6dbaf856990c618de994c3bcca7fea599b8471ac9fa59df598b38"}],"purl":"pkg:pypi/pytorch-lightning@2.5.4","externalReferences":[{"type":"vcs","url":"https://github.com/Lightning-AI/lightning"}],"type":"framework","bom-ref":"pkg:pypi/pytorch-lightning@2.5.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"authors":[{"name":"Andrey Vasnetsov "}],"group":"","name":"qdrant-client","version":"1.15.1","description":"Client library for the Qdrant vector search engine","scope":"required","hashes":[{"alg":"SHA-256","content":"2b975099b378382f6ca1cfb43f0d59e541be6e16a5892f282a4b8de7eff5cb63"}],"purl":"pkg:pypi/qdrant-client@1.15.1","type":"library","bom-ref":"pkg:pypi/qdrant-client@1.15.1","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: qdrant-client"}],"concludedValue":"PyPI package: qdrant-client"}]}},{"authors":[{"name":"Kenneth Reitz "}],"group":"","name":"requests","version":"2.32.5","description":"Python HTTP for Humans.","scope":"required","hashes":[{"alg":"SHA-256","content":"2462f94637a34fd532264295e186976db0f5d453d1cdd31473c85a6a161affb6"}],"purl":"pkg:pypi/requests@2.32.5","externalReferences":[{"type":"website","url":"https://requests.readthedocs.io"}],"type":"library","bom-ref":"pkg:pypi/requests@2.32.5","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"Andrew Roth "}],"group":"","name":"requests-auth-aws-sigv4","version":"0.7","description":"AWS SigV4 Authentication with the python requests module","scope":"required","hashes":[{"alg":"SHA-256","content":"1f6c7f63a0696a8f131a2ff21a544380f43c11f54d72600f6f2a1d402bd41d41"}],"purl":"pkg:pypi/requests-auth-aws-sigv4@0.7","externalReferences":[{"type":"vcs","url":"https://github.com/andrewjroth/requests-auth-aws-sigv4"}],"type":"library","bom-ref":"pkg:pypi/requests-auth-aws-sigv4@0.7","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: requests-auth-aws-sigv4"}],"concludedValue":"PyPI package: requests-auth-aws-sigv4"}]}},{"authors":[{"name":"Anthon van der Neut "}],"group":"","name":"ruamel.base","version":"1.0.0","description":"common routines for ruamel packages","scope":"required","hashes":[{"alg":"SHA-256","content":"ff7fe471b3d715fe4f2c4663d9e6d82efbeb3cea8e72accb99fd4fa90df7e5f9"}],"purl":"pkg:pypi/ruamel.base@1.0.0","externalReferences":[{"type":"website","url":"https://bitbucket.org/ruamel/base"}],"type":"library","bom-ref":"pkg:pypi/ruamel.base@1.0.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: ruamel.base"}],"concludedValue":"PyPI package: ruamel.base"}]}},{"group":"","name":"scipy","version":"1.16.1","description":"Fundamental algorithms for scientific computing in Python","scope":"required","hashes":[{"alg":"SHA-256","content":"c033fa32bab91dc98ca59d0cf23bb876454e2bb02cbe592d5023138778f70030"}],"purl":"pkg:pypi/scipy@1.16.1","type":"framework","bom-ref":"pkg:pypi/scipy@1.16.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"authors":[{"name":"sktime developers "}],"group":"","name":"sktime","version":"0.38.5","description":"A unified framework for machine learning with time series","scope":"required","hashes":[{"alg":"SHA-256","content":"5419ce29ae0d20a40124325c30e40d5a339cc1bfba74080912c3cee45aa8e347"}],"purl":"pkg:pypi/sktime@0.38.5","type":"framework","bom-ref":"pkg:pypi/sktime@0.38.5","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: sktime"}],"concludedValue":"PyPI package: sktime"}]},"tags":["framework"]},{"authors":[{"name":"Laurent Savaete "}],"group":"","name":"slowapi","version":"0.1.9","description":"A rate limiting extension for Starlette and Fastapi","scope":"required","hashes":[{"alg":"SHA-256","content":"cfad116cfb84ad9d763ee155c1e5c5cbf00b0d47399a769b227865f5df576e36"}],"purl":"pkg:pypi/slowapi@0.1.9","externalReferences":[{"type":"vcs","url":"https://github.com/laurents/slowapi"}],"type":"library","bom-ref":"pkg:pypi/slowapi@0.1.9","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: slowapi"}],"concludedValue":"PyPI package: slowapi"}]}},{"authors":[{"name":"Mike Bayer "}],"group":"","name":"SQLAlchemy","version":"2.0.43","description":"Database Abstraction Library","scope":"required","hashes":[{"alg":"SHA-256","content":"70322986c0c699dca241418fcf18e637a4369e0ec50540a2b907b184c8bca069"}],"purl":"pkg:pypi/sqlalchemy@2.0.43","externalReferences":[{"type":"website","url":"https://www.sqlalchemy.org"}],"type":"framework","bom-ref":"pkg:pypi/sqlalchemy@2.0.43","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"authors":[{"name":"Andi Albrecht "}],"group":"","name":"sqlparse","version":"0.5.3","description":"A non-validating SQL parser.","scope":"required","hashes":[{"alg":"SHA-256","content":"cf2196ed3418f3ba5de6af7e82c694a9fbdbfecccdfc72e281548517081f16ca"}],"purl":"pkg:pypi/sqlparse@0.5.3","type":"library","bom-ref":"pkg:pypi/sqlparse@0.5.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["sql"]},{"authors":[{"name":"Tom Christie "}],"group":"","name":"starlette","version":"0.47.3","description":"The little ASGI library that shines.","scope":"required","hashes":[{"alg":"SHA-256","content":"89c0778ca62a76b826101e7c709e70680a1699ca7da6b44d38eb0a7e61fe4b51"}],"purl":"pkg:pypi/starlette@0.47.3","type":"library","bom-ref":"pkg:pypi/starlette@0.47.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"authors":[{"name":"AWS "}],"group":"","name":"strands-agents-tools","version":"0.2.6","description":"A collection of specialized tools for Strands Agents","scope":"required","hashes":[{"alg":"SHA-256","content":"0a0519ce5e8d75f111d90be6b06c3cf96ca53c11cb8f73bf7fd4a66b6f4276fc"}],"purl":"pkg:pypi/strands-agents-tools@0.2.6","type":"library","bom-ref":"pkg:pypi/strands-agents-tools@0.2.6","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: strands-agents-tools"}],"concludedValue":"PyPI package: strands-agents-tools"}]},"tags":["tools"]},{"authors":[{"name":"Tzu-Wei Huang "}],"group":"","name":"tensorboardX","version":"2.6.4","description":"TensorBoardX lets you watch Tensors Flow without Tensorflow","scope":"required","hashes":[{"alg":"SHA-256","content":"5970cf3a1f0a6a6e8b180ccf46f3fe832b8a25a70b86e5a237048a7c0beb18e2"}],"purl":"pkg:pypi/tensorboardx@2.6.4","type":"library","bom-ref":"pkg:pypi/tensorboardx@2.6.4","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: tensorboardX"}],"concludedValue":"PyPI package: tensorboardX"}]}},{"authors":[{"name":"Taneli Hukkinen "}],"group":"","name":"tomli","version":"2.2.1","description":"A lil' TOML parser","scope":"required","hashes":[{"alg":"SHA-256","content":"678e4fa69e4575eb77d103de3df8a895e1591b48e740211bd1067378c69e8249"}],"purl":"pkg:pypi/tomli@2.2.1","type":"library","bom-ref":"pkg:pypi/tomli@2.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"authors":[{"name":"PyTorch Team "}],"group":"","name":"torchdata","version":"0.11.0","description":"Composable data loading modules for PyTorch","scope":"required","hashes":[{"alg":"SHA-256","content":"52b940fbbe0e00fb21cabddf528449d1bec5bfb0d0823b7487b15f951658ee33"}],"purl":"pkg:pypi/torchdata@0.11.0","externalReferences":[{"type":"vcs","url":"https://github.com/pytorch/data"}],"type":"library","bom-ref":"pkg:pypi/torchdata@0.11.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: torchdata"}],"concludedValue":"PyPI package: torchdata"}]}},{"authors":[{"name":"Lightning-AI et al. "}],"group":"","name":"torchmetrics","version":"1.8.1","description":"PyTorch native Metrics","scope":"required","hashes":[{"alg":"SHA-256","content":"2437501351e0da3d294c71210ce8139b9c762b5e20604f7a051a725443db8f4b"}],"purl":"pkg:pypi/torchmetrics@1.8.1","externalReferences":[{"type":"vcs","url":"https://github.com/Lightning-AI/torchmetrics"}],"type":"library","bom-ref":"pkg:pypi/torchmetrics@1.8.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"authors":[{"name":"PyTorch Text Team "}],"group":"","name":"torchtext","version":"0.18.0","description":"Text utilities, models, transforms, and datasets for PyTorch.","scope":"required","hashes":[{"alg":"SHA-256","content":"5826d5bbfe84a3c533e7e97659f72dbff73e1614c00c06709607d17c8446e09c"}],"purl":"pkg:pypi/torchtext@0.18.0","externalReferences":[{"type":"vcs","url":"https://github.com/pytorch/text"}],"type":"library","bom-ref":"pkg:pypi/torchtext@0.18.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: torchtext"}],"concludedValue":"PyPI package: torchtext"}]}},{"authors":[{"name":"Unitycatalog "}],"group":"","name":"unitycatalog","version":"0.1.1","description":"The official Python library for the unitycatalog API","scope":"required","hashes":[{"alg":"SHA-256","content":"3e0f340871067beb962aee7db3a1c282d664dfadc69ea906a5ad5b8718335185"}],"purl":"pkg:pypi/unitycatalog@0.1.1","type":"library","bom-ref":"pkg:pypi/unitycatalog@0.1.1","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: unitycatalog"}],"concludedValue":"PyPI package: unitycatalog"}]}},{"authors":[{"name":"Andrey Petrov "}],"group":"","name":"urllib3","version":"2.5.0","description":"HTTP library with thread-safe connection pooling, file post, and more.","scope":"required","hashes":[{"alg":"SHA-256","content":"e6b01673c0fa6a13e374b50871808eb3bf7046c4b125b216f6bf1cc604cff0dc"}],"purl":"pkg:pypi/urllib3@2.5.0","type":"library","bom-ref":"pkg:pypi/urllib3@2.5.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"authors":[{"name":"Samuel Colvin "}],"group":"","name":"watchfiles","version":"1.1.0","description":"Simple, modern and high performance file watching and code reload in python.","scope":"required","hashes":[{"alg":"SHA-256","content":"27f30e14aa1c1e91cb653f03a63445739919aef84c8d2517997a83155e7a2fcc"}],"purl":"pkg:pypi/watchfiles@1.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/samuelcolvin/watchfiles"}],"type":"library","bom-ref":"pkg:pypi/watchfiles@1.1.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: watchfiles"}],"concludedValue":"PyPI package: watchfiles"}]},"tags":["performance"]},{"group":"","name":"Werkzeug","version":"3.1.3","description":"The comprehensive WSGI web application library.","scope":"required","hashes":[{"alg":"SHA-256","content":"54b78bf3716d19a65be4fceccc0d1d7b89e608834989dfae50ea87564639213e"}],"purl":"pkg:pypi/werkzeug@3.1.3","type":"library","bom-ref":"pkg:pypi/werkzeug@3.1.3","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: Werkzeug"}],"concludedValue":"PyPI package: Werkzeug"}]},"tags":["web"]},{"authors":[{"name":"Kirill Simonov "}],"group":"","name":"PyYAML","version":"6.0.2","description":"YAML parser and emitter for Python","scope":"required","hashes":[{"alg":"SHA-256","content":"0a9a2848a5b7feac301353437eb7d5957887edbf81d56e903999a75a3d743086"}],"purl":"pkg:pypi/pyyaml@6.0.2","externalReferences":[{"type":"website","url":"https://pyyaml.org/"}],"type":"library","bom-ref":"pkg:pypi/pyyaml@6.0.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"cleo","version":"2.1.0","scope":"optional","purl":"pkg:pypi/cleo@2.1.0","type":"library","bom-ref":"pkg:pypi/cleo@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"crashtest","version":"0.4.1","scope":"optional","purl":"pkg:pypi/crashtest@0.4.1","type":"library","bom-ref":"pkg:pypi/crashtest@0.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"rapidfuzz","version":"3.13.0","scope":"optional","purl":"pkg:pypi/rapidfuzz@3.13.0","type":"library","bom-ref":"pkg:pypi/rapidfuzz@3.13.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"numpy","version":"1.26.4","scope":"required","purl":"pkg:pypi/numpy@1.26.4","type":"framework","bom-ref":"pkg:pypi/numpy@1.26.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"jmespath","version":"1.0.1","scope":"optional","purl":"pkg:pypi/jmespath@1.0.1","type":"library","bom-ref":"pkg:pypi/jmespath@1.0.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"json-flatten","version":"0.3.1","scope":"optional","purl":"pkg:pypi/json-flatten@0.3.1","type":"library","bom-ref":"pkg:pypi/json-flatten@0.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"thefuzz","version":"0.22.1","scope":"optional","purl":"pkg:pypi/thefuzz@0.22.1","type":"library","bom-ref":"pkg:pypi/thefuzz@0.22.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"deprecated","version":"1.2.18","scope":"optional","purl":"pkg:pypi/deprecated@1.2.18","type":"library","bom-ref":"pkg:pypi/deprecated@1.2.18","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"wrapt","version":"1.17.3","scope":"optional","purl":"pkg:pypi/wrapt@1.17.3","type":"library","bom-ref":"pkg:pypi/wrapt@1.17.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"markupsafe","version":"3.0.2","scope":"optional","purl":"pkg:pypi/markupsafe@3.0.2","type":"library","bom-ref":"pkg:pypi/markupsafe@3.0.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"absl-py","version":"2.3.1","scope":"optional","purl":"pkg:pypi/absl-py@2.3.1","type":"library","bom-ref":"pkg:pypi/absl-py@2.3.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"accelerate","version":"1.10.1","scope":"optional","purl":"pkg:pypi/accelerate@1.10.1","type":"library","bom-ref":"pkg:pypi/accelerate@1.10.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"psutil","version":"7.0.0","scope":"optional","purl":"pkg:pypi/psutil@7.0.0","type":"library","bom-ref":"pkg:pypi/psutil@7.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"torch","version":"2.8.0","scope":"optional","purl":"pkg:pypi/torch@2.8.0","type":"library","bom-ref":"pkg:pypi/torch@2.8.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"filelock","version":"3.19.1","scope":"optional","purl":"pkg:pypi/filelock@3.19.1","type":"library","bom-ref":"pkg:pypi/filelock@3.19.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"typing-extensions","version":"4.15.0","scope":"optional","purl":"pkg:pypi/typing-extensions@4.15.0","type":"library","bom-ref":"pkg:pypi/typing-extensions@4.15.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["devel"]},{"group":"","name":"setuptools","version":"80.9.0","scope":"optional","purl":"pkg:pypi/setuptools@80.9.0","type":"library","bom-ref":"pkg:pypi/setuptools@80.9.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"sympy","version":"1.14.0","scope":"optional","purl":"pkg:pypi/sympy@1.14.0","type":"library","bom-ref":"pkg:pypi/sympy@1.14.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"mpmath","version":"1.3.0","scope":"optional","purl":"pkg:pypi/mpmath@1.3.0","type":"library","bom-ref":"pkg:pypi/mpmath@1.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"networkx","version":"3.5","scope":"optional","purl":"pkg:pypi/networkx@3.5","type":"library","bom-ref":"pkg:pypi/networkx@3.5","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"jinja2","version":"3.1.6","scope":"optional","purl":"pkg:pypi/jinja2@3.1.6","type":"library","bom-ref":"pkg:pypi/jinja2@3.1.6","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"fsspec","version":"2025.3.0","scope":"optional","purl":"pkg:pypi/fsspec@2025.3.0","type":"library","bom-ref":"pkg:pypi/fsspec@2025.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"charset-normalizer","version":"3.4.3","scope":"optional","purl":"pkg:pypi/charset-normalizer@3.4.3","type":"library","bom-ref":"pkg:pypi/charset-normalizer@3.4.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"idna","version":"3.10","scope":"optional","purl":"pkg:pypi/idna@3.10","type":"library","bom-ref":"pkg:pypi/idna@3.10","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pytest","version":"8.4.1","scope":"optional","purl":"pkg:pypi/pytest@8.4.1","type":"library","bom-ref":"pkg:pypi/pytest@8.4.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"certifi","version":"2025.8.3","scope":"optional","purl":"pkg:pypi/certifi@2025.8.3","type":"library","bom-ref":"pkg:pypi/certifi@2025.8.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"tqdm","version":"4.67.1","scope":"optional","purl":"pkg:pypi/tqdm@4.67.1","type":"library","bom-ref":"pkg:pypi/tqdm@4.67.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"hf-xet","version":"1.1.9","scope":"optional","purl":"pkg:pypi/hf-xet@1.1.9","type":"library","bom-ref":"pkg:pypi/hf-xet@1.1.9","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"httpx","version":"0.28.1","scope":"optional","purl":"pkg:pypi/httpx@0.28.1","type":"library","bom-ref":"pkg:pypi/httpx@0.28.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"python-multipart","version":"0.0.20","scope":"optional","purl":"pkg:pypi/python-multipart@0.0.20","type":"library","bom-ref":"pkg:pypi/python-multipart@0.0.20","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"itsdangerous","version":"2.2.0","scope":"optional","purl":"pkg:pypi/itsdangerous@2.2.0","type":"library","bom-ref":"pkg:pypi/itsdangerous@2.2.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"orjson","version":"3.11.3","scope":"optional","purl":"pkg:pypi/orjson@3.11.3","type":"library","bom-ref":"pkg:pypi/orjson@3.11.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"email-validator","version":"2.3.0","scope":"optional","purl":"pkg:pypi/email-validator@2.3.0","type":"library","bom-ref":"pkg:pypi/email-validator@2.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"uvicorn","version":"0.35.0","scope":"optional","purl":"pkg:pypi/uvicorn@0.35.0","type":"library","bom-ref":"pkg:pypi/uvicorn@0.35.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pydantic-settings","version":"2.10.1","scope":"optional","purl":"pkg:pypi/pydantic-settings@2.10.1","type":"library","bom-ref":"pkg:pypi/pydantic-settings@2.10.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"jedi","version":"0.19.2","scope":"optional","purl":"pkg:pypi/jedi@0.19.2","type":"library","bom-ref":"pkg:pypi/jedi@0.19.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pytest-cov","version":"6.2.1","scope":"optional","purl":"pkg:pypi/pytest-cov@6.2.1","type":"library","bom-ref":"pkg:pypi/pytest-cov@6.2.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pytest-asyncio","version":"1.1.0","scope":"optional","purl":"pkg:pypi/pytest-asyncio@1.1.0","type":"library","bom-ref":"pkg:pypi/pytest-asyncio@1.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"soundfile","version":"0.13.1","scope":"optional","purl":"pkg:pypi/soundfile@0.13.1","type":"library","bom-ref":"pkg:pypi/soundfile@0.13.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"safetensors","version":"0.6.2","scope":"optional","purl":"pkg:pypi/safetensors@0.6.2","type":"library","bom-ref":"pkg:pypi/safetensors@0.6.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"ag2","version":"0.9.9","scope":"optional","purl":"pkg:pypi/ag2@0.9.9","type":"library","bom-ref":"pkg:pypi/ag2@0.9.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"anyio","version":"4.10.0","scope":"optional","purl":"pkg:pypi/anyio@4.10.0","type":"library","bom-ref":"pkg:pypi/anyio@4.10.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"sniffio","version":"1.3.1","scope":"optional","purl":"pkg:pypi/sniffio@1.3.1","type":"library","bom-ref":"pkg:pypi/sniffio@1.3.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["native"]},{"group":"","name":"asyncer","version":"0.0.8","scope":"optional","purl":"pkg:pypi/asyncer@0.0.8","type":"library","bom-ref":"pkg:pypi/asyncer@0.0.8","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"diskcache","version":"5.6.3","scope":"optional","purl":"pkg:pypi/diskcache@5.6.3","type":"library","bom-ref":"pkg:pypi/diskcache@5.6.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"docker","version":"7.1.0","scope":"optional","purl":"pkg:pypi/docker@7.1.0","type":"library","bom-ref":"pkg:pypi/docker@7.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"httpcore","version":"1.0.9","scope":"optional","purl":"pkg:pypi/httpcore@1.0.9","type":"library","bom-ref":"pkg:pypi/httpcore@1.0.9","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"h11","version":"0.16.0","scope":"optional","purl":"pkg:pypi/h11@0.16.0","type":"library","bom-ref":"pkg:pypi/h11@0.16.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"annotated-types","version":"0.7.0","scope":"optional","purl":"pkg:pypi/annotated-types@0.7.0","type":"library","bom-ref":"pkg:pypi/annotated-types@0.7.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pydantic-core","version":"2.33.2","scope":"optional","purl":"pkg:pypi/pydantic-core@2.33.2","type":"library","bom-ref":"pkg:pypi/pydantic-core@2.33.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"typing-inspection","version":"0.4.1","scope":"optional","purl":"pkg:pypi/typing-inspection@0.4.1","type":"library","bom-ref":"pkg:pypi/typing-inspection@0.4.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["devel"]},{"group":"","name":"python-dotenv","version":"1.1.1","scope":"optional","purl":"pkg:pypi/python-dotenv@1.1.1","type":"library","bom-ref":"pkg:pypi/python-dotenv@1.1.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"termcolor","version":"3.1.0","scope":"optional","purl":"pkg:pypi/termcolor@3.1.0","type":"library","bom-ref":"pkg:pypi/termcolor@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"tiktoken","version":"0.11.0","scope":"optional","purl":"pkg:pypi/tiktoken@0.11.0","type":"library","bom-ref":"pkg:pypi/tiktoken@0.11.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"regex","version":"2025.9.1","scope":"optional","purl":"pkg:pypi/regex@2025.9.1","type":"library","bom-ref":"pkg:pypi/regex@2025.9.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"agno","version":"1.8.1","scope":"optional","purl":"pkg:pypi/agno@1.8.1","type":"library","bom-ref":"pkg:pypi/agno@1.8.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"docstring-parser","version":"0.17.0","scope":"optional","purl":"pkg:pypi/docstring-parser@0.17.0","type":"library","bom-ref":"pkg:pypi/docstring-parser@0.17.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["parse"]},{"group":"","name":"gitdb","version":"4.0.12","scope":"optional","purl":"pkg:pypi/gitdb@4.0.12","type":"library","bom-ref":"pkg:pypi/gitdb@4.0.12","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"smmap","version":"5.0.2","scope":"optional","purl":"pkg:pypi/smmap@5.0.2","type":"library","bom-ref":"pkg:pypi/smmap@5.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"rich","version":"14.1.0","scope":"optional","purl":"pkg:pypi/rich@14.1.0","type":"library","bom-ref":"pkg:pypi/rich@14.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"markdown-it-py","version":"4.0.0","scope":"optional","purl":"pkg:pypi/markdown-it-py@4.0.0","type":"library","bom-ref":"pkg:pypi/markdown-it-py@4.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"mdurl","version":"0.1.2","scope":"optional","purl":"pkg:pypi/mdurl@0.1.2","type":"library","bom-ref":"pkg:pypi/mdurl@0.1.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pygments","version":"2.19.2","scope":"optional","purl":"pkg:pypi/pygments@2.19.2","type":"library","bom-ref":"pkg:pypi/pygments@2.19.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"typer","version":"0.17.3","scope":"optional","purl":"pkg:pypi/typer@0.17.3","type":"library","bom-ref":"pkg:pypi/typer@0.17.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"shellingham","version":"1.5.4","scope":"optional","purl":"pkg:pypi/shellingham@1.5.4","type":"library","bom-ref":"pkg:pypi/shellingham@1.5.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"aiohappyeyeballs","version":"2.6.1","scope":"optional","purl":"pkg:pypi/aiohappyeyeballs@2.6.1","type":"library","bom-ref":"pkg:pypi/aiohappyeyeballs@2.6.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"aiosignal","version":"1.4.0","scope":"optional","purl":"pkg:pypi/aiosignal@1.4.0","type":"library","bom-ref":"pkg:pypi/aiosignal@1.4.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"frozenlist","version":"1.7.0","scope":"optional","purl":"pkg:pypi/frozenlist@1.7.0","type":"library","bom-ref":"pkg:pypi/frozenlist@1.7.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"attrs","version":"25.3.0","scope":"optional","purl":"pkg:pypi/attrs@25.3.0","type":"library","bom-ref":"pkg:pypi/attrs@25.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"multidict","version":"6.6.4","scope":"optional","purl":"pkg:pypi/multidict@6.6.4","type":"library","bom-ref":"pkg:pypi/multidict@6.6.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"propcache","version":"0.3.2","scope":"optional","purl":"pkg:pypi/propcache@0.3.2","type":"library","bom-ref":"pkg:pypi/propcache@0.3.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"yarl","version":"1.20.1","scope":"optional","purl":"pkg:pypi/yarl@1.20.1","type":"library","bom-ref":"pkg:pypi/yarl@1.20.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"aioice","version":"0.10.1","scope":"optional","purl":"pkg:pypi/aioice@0.10.1","type":"library","bom-ref":"pkg:pypi/aioice@0.10.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"dnspython","version":"2.7.0","scope":"optional","purl":"pkg:pypi/dnspython@2.7.0","type":"library","bom-ref":"pkg:pypi/dnspython@2.7.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"ifaddr","version":"0.2.0","scope":"optional","purl":"pkg:pypi/ifaddr@0.2.0","type":"library","bom-ref":"pkg:pypi/ifaddr@0.2.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"aiortc","version":"1.13.0","scope":"optional","purl":"pkg:pypi/aiortc@1.13.0","type":"library","bom-ref":"pkg:pypi/aiortc@1.13.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"av","version":"14.4.0","scope":"optional","purl":"pkg:pypi/av@14.4.0","type":"library","bom-ref":"pkg:pypi/av@14.4.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"cffi","version":"1.17.1","scope":"optional","purl":"pkg:pypi/cffi@1.17.1","type":"library","bom-ref":"pkg:pypi/cffi@1.17.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["native"]},{"group":"","name":"pycparser","version":"2.22","scope":"optional","purl":"pkg:pypi/pycparser@2.22","type":"library","bom-ref":"pkg:pypi/pycparser@2.22","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["parse"]},{"group":"","name":"google-crc32c","version":"1.7.1","scope":"optional","purl":"pkg:pypi/google-crc32c@1.7.1","type":"library","bom-ref":"pkg:pypi/google-crc32c@1.7.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pyee","version":"13.0.0","scope":"optional","purl":"pkg:pypi/pyee@13.0.0","type":"library","bom-ref":"pkg:pypi/pyee@13.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pylibsrtp","version":"0.12.0","scope":"optional","purl":"pkg:pypi/pylibsrtp@0.12.0","type":"library","bom-ref":"pkg:pypi/pylibsrtp@0.12.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pyopenssl","version":"25.1.0","scope":"optional","purl":"pkg:pypi/pyopenssl@25.1.0","type":"library","bom-ref":"pkg:pypi/pyopenssl@25.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["security"]},{"group":"","name":"aiosqlite","version":"0.21.0","scope":"optional","purl":"pkg:pypi/aiosqlite@0.21.0","type":"library","bom-ref":"pkg:pypi/aiosqlite@0.21.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"mako","version":"1.3.10","scope":"optional","purl":"pkg:pypi/mako@1.3.10","type":"library","bom-ref":"pkg:pypi/mako@1.3.10","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"aniso8601","version":"10.0.1","scope":"optional","purl":"pkg:pypi/aniso8601@10.0.1","type":"library","bom-ref":"pkg:pypi/aniso8601@10.0.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"anthropic","version":"0.64.0","scope":"optional","purl":"pkg:pypi/anthropic@0.64.0","type":"library","bom-ref":"pkg:pypi/anthropic@0.64.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"distro","version":"1.9.0","scope":"optional","purl":"pkg:pypi/distro@1.9.0","type":"library","bom-ref":"pkg:pypi/distro@1.9.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"jiter","version":"0.10.0","scope":"optional","purl":"pkg:pypi/jiter@0.10.0","type":"library","bom-ref":"pkg:pypi/jiter@0.10.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"argcomplete","version":"3.6.2","scope":"optional","purl":"pkg:pypi/argcomplete@3.6.2","type":"library","bom-ref":"pkg:pypi/argcomplete@3.6.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"asttokens","version":"3.0.0","scope":"optional","purl":"pkg:pypi/asttokens@3.0.0","type":"library","bom-ref":"pkg:pypi/asttokens@3.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"astunparse","version":"1.6.3","scope":"optional","purl":"pkg:pypi/astunparse@1.6.3","type":"library","bom-ref":"pkg:pypi/astunparse@1.6.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"wheel","version":"0.45.1","scope":"optional","purl":"pkg:pypi/wheel@0.45.1","type":"library","bom-ref":"pkg:pypi/wheel@0.45.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"six","version":"1.17.0","scope":"optional","purl":"pkg:pypi/six@1.17.0","type":"library","bom-ref":"pkg:pypi/six@1.17.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"audioread","version":"3.0.1","scope":"optional","purl":"pkg:pypi/audioread@3.0.1","type":"library","bom-ref":"pkg:pypi/audioread@3.0.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"authlib","version":"1.6.3","scope":"optional","purl":"pkg:pypi/authlib@1.6.3","type":"library","bom-ref":"pkg:pypi/authlib@1.6.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"autogen-agentchat","version":"0.4.4","scope":"optional","purl":"pkg:pypi/autogen-agentchat@0.4.4","type":"library","bom-ref":"pkg:pypi/autogen-agentchat@0.4.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"autogen-core","version":"0.4.4","scope":"required","purl":"pkg:pypi/autogen-core@0.4.4","type":"library","bom-ref":"pkg:pypi/autogen-core@0.4.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"jsonref","version":"1.1.0","scope":"optional","purl":"pkg:pypi/jsonref@1.1.0","type":"library","bom-ref":"pkg:pypi/jsonref@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"importlib-metadata","version":"8.4.0","scope":"required","purl":"pkg:pypi/importlib-metadata@8.4.0","type":"library","bom-ref":"pkg:pypi/importlib-metadata@8.4.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"zipp","version":"3.23.0","scope":"optional","purl":"pkg:pypi/zipp@3.23.0","type":"library","bom-ref":"pkg:pypi/zipp@3.23.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pillow","version":"11.0.0","scope":"optional","purl":"pkg:pypi/pillow@11.0.0","type":"library","bom-ref":"pkg:pypi/pillow@11.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"azure-ai-agents","version":"1.2.0b3","scope":"optional","purl":"pkg:pypi/azure-ai-agents@1.2.0b3","type":"framework","bom-ref":"pkg:pypi/azure-ai-agents@1.2.0b3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"isodate","version":"0.7.2","scope":"optional","purl":"pkg:pypi/isodate@0.7.2","type":"library","bom-ref":"pkg:pypi/isodate@0.7.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"azure-core","version":"1.35.0","scope":"optional","purl":"pkg:pypi/azure-core@1.35.0","type":"framework","bom-ref":"pkg:pypi/azure-core@1.35.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"azure-ai-projects","version":"1.1.0b3","scope":"optional","purl":"pkg:pypi/azure-ai-projects@1.1.0b3","type":"framework","bom-ref":"pkg:pypi/azure-ai-projects@1.1.0b3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"azure-storage-blob","version":"12.26.0","scope":"optional","purl":"pkg:pypi/azure-storage-blob@12.26.0","type":"framework","bom-ref":"pkg:pypi/azure-storage-blob@12.26.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"azure-identity","version":"1.24.0","scope":"optional","purl":"pkg:pypi/azure-identity@1.24.0","type":"framework","bom-ref":"pkg:pypi/azure-identity@1.24.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"msal","version":"1.33.0","scope":"optional","purl":"pkg:pypi/msal@1.33.0","type":"library","bom-ref":"pkg:pypi/msal@1.33.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"msal-extensions","version":"1.3.1","scope":"optional","purl":"pkg:pypi/msal-extensions@1.3.1","type":"library","bom-ref":"pkg:pypi/msal-extensions@1.3.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"azure-monitor-opentelemetry-exporter","version":"1.0.0b40","scope":"optional","purl":"pkg:pypi/azure-monitor-opentelemetry-exporter@1.0.0b40","type":"framework","bom-ref":"pkg:pypi/azure-monitor-opentelemetry-exporter@1.0.0b40","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","telemetry"]},{"group":"","name":"fixedint","version":"0.1.6","scope":"optional","purl":"pkg:pypi/fixedint@0.1.6","type":"library","bom-ref":"pkg:pypi/fixedint@0.1.6","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"msrest","version":"0.7.1","scope":"optional","purl":"pkg:pypi/msrest@0.7.1","type":"library","bom-ref":"pkg:pypi/msrest@0.7.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"requests-oauthlib","version":"2.0.0","scope":"optional","purl":"pkg:pypi/requests-oauthlib@2.0.0","type":"library","bom-ref":"pkg:pypi/requests-oauthlib@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"oauthlib","version":"3.3.1","scope":"optional","purl":"pkg:pypi/oauthlib@3.3.1","type":"library","bom-ref":"pkg:pypi/oauthlib@3.3.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"opentelemetry-sdk","version":"1.36.0","scope":"optional","purl":"pkg:pypi/opentelemetry-sdk@1.36.0","type":"library","bom-ref":"pkg:pypi/opentelemetry-sdk@1.36.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["telemetry"]},{"group":"","name":"opentelemetry-semantic-conventions","version":"0.57b0","scope":"optional","purl":"pkg:pypi/opentelemetry-semantic-conventions@0.57b0","type":"library","bom-ref":"pkg:pypi/opentelemetry-semantic-conventions@0.57b0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["telemetry"]},{"group":"","name":"azure-storage-file-datalake","version":"12.21.0","scope":"optional","purl":"pkg:pypi/azure-storage-file-datalake@12.21.0","type":"framework","bom-ref":"pkg:pypi/azure-storage-file-datalake@12.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework"]},{"group":"","name":"backoff","version":"2.2.1","scope":"optional","purl":"pkg:pypi/backoff@2.2.1","type":"library","bom-ref":"pkg:pypi/backoff@2.2.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"banks","version":"2.2.0","scope":"optional","purl":"pkg:pypi/banks@2.2.0","type":"library","bom-ref":"pkg:pypi/banks@2.2.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"griffe","version":"1.13.0","scope":"optional","purl":"pkg:pypi/griffe@1.13.0","type":"library","bom-ref":"pkg:pypi/griffe@1.13.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"colorama","version":"0.4.6","scope":"optional","purl":"pkg:pypi/colorama@0.4.6","type":"library","bom-ref":"pkg:pypi/colorama@0.4.6","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"platformdirs","version":"4.4.0","scope":"optional","purl":"pkg:pypi/platformdirs@4.4.0","type":"library","bom-ref":"pkg:pypi/platformdirs@4.4.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"litellm","version":"1.76.1","scope":"optional","purl":"pkg:pypi/litellm@1.76.1","type":"library","bom-ref":"pkg:pypi/litellm@1.76.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"beautifulsoup4","version":"4.13.5","scope":"optional","purl":"pkg:pypi/beautifulsoup4@4.13.5","type":"library","bom-ref":"pkg:pypi/beautifulsoup4@4.13.5","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"soupsieve","version":"2.8","scope":"optional","purl":"pkg:pypi/soupsieve@2.8","type":"library","bom-ref":"pkg:pypi/soupsieve@2.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"blinker","version":"1.9.0","scope":"optional","purl":"pkg:pypi/blinker@1.9.0","type":"library","bom-ref":"pkg:pypi/blinker@1.9.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"blis","version":"0.7.11","scope":"optional","purl":"pkg:pypi/blis@0.7.11","type":"library","bom-ref":"pkg:pypi/blis@0.7.11","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"boto3","version":"1.40.21","scope":"required","purl":"pkg:pypi/boto3@1.40.21","type":"framework","bom-ref":"pkg:pypi/boto3@1.40.21","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"botocore","version":"1.40.21","scope":"optional","purl":"pkg:pypi/botocore@1.40.21","type":"framework","bom-ref":"pkg:pypi/botocore@1.40.21","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"s3transfer","version":"0.13.1","scope":"optional","purl":"pkg:pypi/s3transfer@0.13.1","type":"library","bom-ref":"pkg:pypi/s3transfer@0.13.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"cachetools","version":"5.5.2","scope":"required","purl":"pkg:pypi/cachetools@5.5.2","type":"library","bom-ref":"pkg:pypi/cachetools@5.5.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"catalogue","version":"2.0.10","scope":"optional","purl":"pkg:pypi/catalogue@2.0.10","type":"library","bom-ref":"pkg:pypi/catalogue@2.0.10","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"catboost","version":"1.2.8","scope":"optional","purl":"pkg:pypi/catboost@1.2.8","type":"library","bom-ref":"pkg:pypi/catboost@1.2.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"graphviz","version":"0.21","scope":"optional","purl":"pkg:pypi/graphviz@0.21","type":"library","bom-ref":"pkg:pypi/graphviz@0.21","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"contourpy","version":"1.3.3","scope":"optional","purl":"pkg:pypi/contourpy@1.3.3","type":"library","bom-ref":"pkg:pypi/contourpy@1.3.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"fonttools","version":"4.59.2","scope":"optional","purl":"pkg:pypi/fonttools@4.59.2","type":"library","bom-ref":"pkg:pypi/fonttools@4.59.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"kiwisolver","version":"1.4.9","scope":"optional","purl":"pkg:pypi/kiwisolver@1.4.9","type":"library","bom-ref":"pkg:pypi/kiwisolver@1.4.9","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pyparsing","version":"3.2.3","scope":"optional","purl":"pkg:pypi/pyparsing@3.2.3","type":"library","bom-ref":"pkg:pypi/pyparsing@3.2.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pandas","version":"2.2.3","scope":"required","purl":"pkg:pypi/pandas@2.2.3","type":"framework","bom-ref":"pkg:pypi/pandas@2.2.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"pytz","version":"2025.2","scope":"optional","purl":"pkg:pypi/pytz@2025.2","type":"library","bom-ref":"pkg:pypi/pytz@2025.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"tzdata","version":"2025.2","scope":"optional","purl":"pkg:pypi/tzdata@2025.2","type":"library","bom-ref":"pkg:pypi/tzdata@2025.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"numba","version":"0.61.2","scope":"optional","purl":"pkg:pypi/numba@0.61.2","type":"library","bom-ref":"pkg:pypi/numba@0.61.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"tabulate","version":"0.9.0","scope":"optional","purl":"pkg:pypi/tabulate@0.9.0","type":"library","bom-ref":"pkg:pypi/tabulate@0.9.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"zstandard","version":"0.24.0","scope":"optional","purl":"pkg:pypi/zstandard@0.24.0","type":"library","bom-ref":"pkg:pypi/zstandard@0.24.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"plotly","version":"6.3.0","scope":"optional","purl":"pkg:pypi/plotly@6.3.0","type":"library","bom-ref":"pkg:pypi/plotly@6.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"narwhals","version":"2.3.0","scope":"optional","purl":"pkg:pypi/narwhals@2.3.0","type":"library","bom-ref":"pkg:pypi/narwhals@2.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"chardet","version":"5.2.0","scope":"optional","purl":"pkg:pypi/chardet@5.2.0","type":"library","bom-ref":"pkg:pypi/chardet@5.2.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"choreographer","version":"1.0.10","scope":"optional","purl":"pkg:pypi/choreographer@1.0.10","type":"library","bom-ref":"pkg:pypi/choreographer@1.0.10","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"logistro","version":"1.1.0","scope":"optional","purl":"pkg:pypi/logistro@1.1.0","type":"library","bom-ref":"pkg:pypi/logistro@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"simplejson","version":"3.20.1","scope":"optional","purl":"pkg:pypi/simplejson@3.20.1","type":"library","bom-ref":"pkg:pypi/simplejson@3.20.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"cloudevents","version":"1.12.0","scope":"optional","purl":"pkg:pypi/cloudevents@1.12.0","type":"library","bom-ref":"pkg:pypi/cloudevents@1.12.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"deprecation","version":"2.1.0","scope":"optional","purl":"pkg:pypi/deprecation@2.1.0","type":"library","bom-ref":"pkg:pypi/deprecation@2.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"cloudpathlib","version":"0.22.0","scope":"optional","purl":"pkg:pypi/cloudpathlib@0.22.0","type":"library","bom-ref":"pkg:pypi/cloudpathlib@0.22.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"cmdstanpy","version":"1.2.5","scope":"optional","purl":"pkg:pypi/cmdstanpy@1.2.5","type":"library","bom-ref":"pkg:pypi/cmdstanpy@1.2.5","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"stanio","version":"0.5.1","scope":"optional","purl":"pkg:pypi/stanio@0.5.1","type":"library","bom-ref":"pkg:pypi/stanio@0.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"coloredlogs","version":"15.0.1","scope":"optional","purl":"pkg:pypi/coloredlogs@15.0.1","type":"library","bom-ref":"pkg:pypi/coloredlogs@15.0.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"humanfriendly","version":"10.0","scope":"optional","purl":"pkg:pypi/humanfriendly@10.0","type":"library","bom-ref":"pkg:pypi/humanfriendly@10.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"colorlog","version":"6.9.0","scope":"optional","purl":"pkg:pypi/colorlog@6.9.0","type":"library","bom-ref":"pkg:pypi/colorlog@6.9.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"comm","version":"0.2.3","scope":"optional","purl":"pkg:pypi/comm@0.2.3","type":"library","bom-ref":"pkg:pypi/comm@0.2.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"confection","version":"0.1.5","scope":"optional","purl":"pkg:pypi/confection@0.1.5","type":"library","bom-ref":"pkg:pypi/confection@0.1.5","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"srsly","version":"2.5.1","scope":"optional","purl":"pkg:pypi/srsly@2.5.1","type":"library","bom-ref":"pkg:pypi/srsly@2.5.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"coverage","version":"7.10.6","scope":"optional","purl":"pkg:pypi/coverage@7.10.6","type":"library","bom-ref":"pkg:pypi/coverage@7.10.6","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"cyclopts","version":"3.23.1","scope":"optional","purl":"pkg:pypi/cyclopts@3.23.1","type":"library","bom-ref":"pkg:pypi/cyclopts@3.23.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"rich-rst","version":"1.3.1","scope":"optional","purl":"pkg:pypi/rich-rst@1.3.1","type":"library","bom-ref":"pkg:pypi/rich-rst@1.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"docutils","version":"0.22","scope":"optional","purl":"pkg:pypi/docutils@0.22","type":"library","bom-ref":"pkg:pypi/docutils@0.22","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"cymem","version":"2.0.11","scope":"optional","purl":"pkg:pypi/cymem@2.0.11","type":"library","bom-ref":"pkg:pypi/cymem@2.0.11","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"cython","version":"3.1.3","scope":"optional","purl":"pkg:pypi/cython@3.1.3","type":"library","bom-ref":"pkg:pypi/cython@3.1.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"google-auth","version":"2.40.3","scope":"optional","purl":"pkg:pypi/google-auth@2.40.3","type":"library","bom-ref":"pkg:pypi/google-auth@2.40.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pyasn1-modules","version":"0.4.2","scope":"optional","purl":"pkg:pypi/pyasn1-modules@0.4.2","type":"library","bom-ref":"pkg:pypi/pyasn1-modules@0.4.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pyasn1","version":"0.6.1","scope":"optional","purl":"pkg:pypi/pyasn1@0.6.1","type":"library","bom-ref":"pkg:pypi/pyasn1@0.6.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"rsa","version":"4.9.1","scope":"optional","purl":"pkg:pypi/rsa@4.9.1","type":"library","bom-ref":"pkg:pypi/rsa@4.9.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"dataclasses-json","version":"0.6.7","scope":"optional","purl":"pkg:pypi/dataclasses-json@0.6.7","type":"library","bom-ref":"pkg:pypi/dataclasses-json@0.6.7","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"marshmallow","version":"3.26.1","scope":"optional","purl":"pkg:pypi/marshmallow@3.26.1","type":"library","bom-ref":"pkg:pypi/marshmallow@3.26.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"typing-inspect","version":"0.9.0","scope":"optional","purl":"pkg:pypi/typing-inspect@0.9.0","type":"library","bom-ref":"pkg:pypi/typing-inspect@0.9.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["devel"]},{"group":"","name":"mypy-extensions","version":"1.1.0","scope":"optional","purl":"pkg:pypi/mypy-extensions@1.1.0","type":"library","bom-ref":"pkg:pypi/mypy-extensions@1.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"datasets","version":"4.0.0","scope":"optional","purl":"pkg:pypi/datasets@4.0.0","type":"library","bom-ref":"pkg:pypi/datasets@4.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"dill","version":"0.3.8","scope":"optional","purl":"pkg:pypi/dill@0.3.8","type":"library","bom-ref":"pkg:pypi/dill@0.3.8","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"xxhash","version":"3.5.0","scope":"optional","purl":"pkg:pypi/xxhash@3.5.0","type":"library","bom-ref":"pkg:pypi/xxhash@3.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"multiprocess","version":"0.70.16","scope":"optional","purl":"pkg:pypi/multiprocess@0.70.16","type":"library","bom-ref":"pkg:pypi/multiprocess@0.70.16","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"decorator","version":"5.2.1","scope":"optional","purl":"pkg:pypi/decorator@5.2.1","type":"library","bom-ref":"pkg:pypi/decorator@5.2.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"defusedxml","version":"0.7.1","scope":"optional","purl":"pkg:pypi/defusedxml@0.7.1","type":"library","bom-ref":"pkg:pypi/defusedxml@0.7.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"dirtyjson","version":"1.0.8","scope":"optional","purl":"pkg:pypi/dirtyjson@1.0.8","type":"library","bom-ref":"pkg:pypi/dirtyjson@1.0.8","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"diviner","version":"0.1.1","scope":"optional","purl":"pkg:pypi/diviner@0.1.1","type":"library","bom-ref":"pkg:pypi/diviner@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"prophet","version":"1.1.7","scope":"optional","purl":"pkg:pypi/prophet@1.1.7","type":"library","bom-ref":"pkg:pypi/prophet@1.1.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"holidays","version":"0.80","scope":"optional","purl":"pkg:pypi/holidays@0.80","type":"library","bom-ref":"pkg:pypi/holidays@0.80","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"importlib-resources","version":"6.5.2","scope":"optional","purl":"pkg:pypi/importlib-resources@6.5.2","type":"library","bom-ref":"pkg:pypi/importlib-resources@6.5.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pmdarima","version":"2.0.4","scope":"optional","purl":"pkg:pypi/pmdarima@2.0.4","type":"library","bom-ref":"pkg:pypi/pmdarima@2.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"joblib","version":"1.5.2","scope":"optional","purl":"pkg:pypi/joblib@1.5.2","type":"library","bom-ref":"pkg:pypi/joblib@1.5.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"scikit-learn","version":"1.7.1","scope":"optional","purl":"pkg:pypi/scikit-learn@1.7.1","type":"framework","bom-ref":"pkg:pypi/scikit-learn@1.7.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"threadpoolctl","version":"3.6.0","scope":"optional","purl":"pkg:pypi/threadpoolctl@3.6.0","type":"library","bom-ref":"pkg:pypi/threadpoolctl@3.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"statsmodels","version":"0.14.5","scope":"optional","purl":"pkg:pypi/statsmodels@0.14.5","type":"library","bom-ref":"pkg:pypi/statsmodels@0.14.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"patsy","version":"1.0.1","scope":"optional","purl":"pkg:pypi/patsy@1.0.1","type":"library","bom-ref":"pkg:pypi/patsy@1.0.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"dspy","version":"3.0.3","scope":"optional","purl":"pkg:pypi/dspy@3.0.3","type":"library","bom-ref":"pkg:pypi/dspy@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"openai","version":"1.102.0","scope":"optional","purl":"pkg:pypi/openai@1.102.0","type":"library","bom-ref":"pkg:pypi/openai@1.102.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["ml"]},{"group":"","name":"optuna","version":"4.5.0","scope":"optional","purl":"pkg:pypi/optuna@4.5.0","type":"library","bom-ref":"pkg:pypi/optuna@4.5.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"magicattr","version":"0.1.6","scope":"optional","purl":"pkg:pypi/magicattr@0.1.6","type":"library","bom-ref":"pkg:pypi/magicattr@0.1.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"fastuuid","version":"0.12.0","scope":"optional","purl":"pkg:pypi/fastuuid@0.12.0","type":"library","bom-ref":"pkg:pypi/fastuuid@0.12.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"jsonschema","version":"4.25.1","scope":"optional","purl":"pkg:pypi/jsonschema@4.25.1","type":"library","bom-ref":"pkg:pypi/jsonschema@4.25.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"jsonschema-specifications","version":"2025.4.1","scope":"optional","purl":"pkg:pypi/jsonschema-specifications@2025.4.1","type":"library","bom-ref":"pkg:pypi/jsonschema-specifications@2025.4.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"referencing","version":"0.36.2","scope":"optional","purl":"pkg:pypi/referencing@0.36.2","type":"library","bom-ref":"pkg:pypi/referencing@0.36.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"rpds-py","version":"0.27.1","scope":"optional","purl":"pkg:pypi/rpds-py@0.27.1","type":"library","bom-ref":"pkg:pypi/rpds-py@0.27.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"tokenizers","version":"0.22.0","scope":"optional","purl":"pkg:pypi/tokenizers@0.22.0","type":"library","bom-ref":"pkg:pypi/tokenizers@0.22.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"json-repair","version":"0.50.0","scope":"optional","purl":"pkg:pypi/json-repair@0.50.0","type":"library","bom-ref":"pkg:pypi/json-repair@0.50.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"tenacity","version":"9.1.2","scope":"optional","purl":"pkg:pypi/tenacity@9.1.2","type":"library","bom-ref":"pkg:pypi/tenacity@9.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"gepa","version":"0.0.7","scope":"optional","purl":"pkg:pypi/gepa@0.0.7","type":"library","bom-ref":"pkg:pypi/gepa@0.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"eval-type-backport","version":"0.2.2","scope":"optional","purl":"pkg:pypi/eval-type-backport@0.2.2","type":"library","bom-ref":"pkg:pypi/eval-type-backport@0.2.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"evaluate","version":"0.4.5","scope":"optional","purl":"pkg:pypi/evaluate@0.4.5","type":"library","bom-ref":"pkg:pypi/evaluate@0.4.5","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"exceptiongroup","version":"1.3.0","scope":"optional","purl":"pkg:pypi/exceptiongroup@1.3.0","type":"library","bom-ref":"pkg:pypi/exceptiongroup@1.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"executing","version":"2.2.1","scope":"optional","purl":"pkg:pypi/executing@2.2.1","type":"library","bom-ref":"pkg:pypi/executing@2.2.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"mcp","version":"1.13.1","scope":"optional","purl":"pkg:pypi/mcp@1.13.1","type":"library","bom-ref":"pkg:pypi/mcp@1.13.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"httpx-sse","version":"0.4.1","scope":"optional","purl":"pkg:pypi/httpx-sse@0.4.1","type":"library","bom-ref":"pkg:pypi/httpx-sse@0.4.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"sse-starlette","version":"3.0.2","scope":"optional","purl":"pkg:pypi/sse-starlette@3.0.2","type":"library","bom-ref":"pkg:pypi/sse-starlette@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"openapi-core","version":"0.19.5","scope":"optional","purl":"pkg:pypi/openapi-core@0.19.5","type":"library","bom-ref":"pkg:pypi/openapi-core@0.19.5","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"jsonschema-path","version":"0.3.4","scope":"optional","purl":"pkg:pypi/jsonschema-path@0.3.4","type":"library","bom-ref":"pkg:pypi/jsonschema-path@0.3.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pathable","version":"0.4.4","scope":"optional","purl":"pkg:pypi/pathable@0.4.4","type":"library","bom-ref":"pkg:pypi/pathable@0.4.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"more-itertools","version":"10.7.0","scope":"optional","purl":"pkg:pypi/more-itertools@10.7.0","type":"library","bom-ref":"pkg:pypi/more-itertools@10.7.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"openapi-schema-validator","version":"0.6.3","scope":"optional","purl":"pkg:pypi/openapi-schema-validator@0.6.3","type":"library","bom-ref":"pkg:pypi/openapi-schema-validator@0.6.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"rfc3339-validator","version":"0.1.4","scope":"optional","purl":"pkg:pypi/rfc3339-validator@0.1.4","type":"library","bom-ref":"pkg:pypi/rfc3339-validator@0.1.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"openapi-spec-validator","version":"0.7.2","scope":"optional","purl":"pkg:pypi/openapi-spec-validator@0.7.2","type":"library","bom-ref":"pkg:pypi/openapi-spec-validator@0.7.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"lazy-object-proxy","version":"1.12.0","scope":"optional","purl":"pkg:pypi/lazy-object-proxy@1.12.0","type":"library","bom-ref":"pkg:pypi/lazy-object-proxy@1.12.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"parse","version":"1.20.2","scope":"optional","purl":"pkg:pypi/parse@1.20.2","type":"library","bom-ref":"pkg:pypi/parse@1.20.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"werkzeug","version":"3.1.1","scope":"optional","purl":"pkg:pypi/werkzeug@3.1.1","type":"library","bom-ref":"pkg:pypi/werkzeug@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"openapi-pydantic","version":"0.5.1","scope":"optional","purl":"pkg:pypi/openapi-pydantic@0.5.1","type":"library","bom-ref":"pkg:pypi/openapi-pydantic@0.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pyperclip","version":"1.9.0","scope":"optional","purl":"pkg:pypi/pyperclip@1.9.0","type":"library","bom-ref":"pkg:pypi/pyperclip@1.9.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"ffmpeg","version":"1.4","scope":"optional","purl":"pkg:pypi/ffmpeg@1.4","type":"library","bom-ref":"pkg:pypi/ffmpeg@1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"filetype","version":"1.2.0","scope":"optional","purl":"pkg:pypi/filetype@1.2.0","type":"library","bom-ref":"pkg:pypi/filetype@1.2.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"flask","version":"3.1.2","scope":"optional","purl":"pkg:pypi/flask@3.1.2","type":"framework","bom-ref":"pkg:pypi/flask@3.1.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"flask-cors","version":"6.0.1","scope":"optional","purl":"pkg:pypi/flask-cors@6.0.1","type":"framework","bom-ref":"pkg:pypi/flask-cors@6.0.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"flask-restx","version":"1.3.0","scope":"optional","purl":"pkg:pypi/flask-restx@1.3.0","type":"framework","bom-ref":"pkg:pypi/flask-restx@1.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"wtforms","version":"3.2.1","scope":"optional","purl":"pkg:pypi/wtforms@3.2.1","type":"library","bom-ref":"pkg:pypi/wtforms@3.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"flatbuffers","version":"25.2.10","scope":"optional","purl":"pkg:pypi/flatbuffers@25.2.10","type":"library","bom-ref":"pkg:pypi/flatbuffers@25.2.10","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"future","version":"1.0.0","scope":"optional","purl":"pkg:pypi/future@1.0.0","type":"library","bom-ref":"pkg:pypi/future@1.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"gast","version":"0.6.0","scope":"optional","purl":"pkg:pypi/gast@0.6.0","type":"library","bom-ref":"pkg:pypi/gast@0.6.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"google-genai","version":"1.32.0","scope":"optional","purl":"pkg:pypi/google-genai@1.32.0","type":"library","bom-ref":"pkg:pypi/google-genai@1.32.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"websockets","version":"15.0.1","scope":"optional","purl":"pkg:pypi/websockets@15.0.1","type":"library","bom-ref":"pkg:pypi/websockets@15.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"google-pasta","version":"0.2.0","scope":"optional","purl":"pkg:pypi/google-pasta@0.2.0","type":"library","bom-ref":"pkg:pypi/google-pasta@0.2.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"googleapis-common-protos","version":"1.70.0","scope":"optional","purl":"pkg:pypi/googleapis-common-protos@1.70.0","type":"library","bom-ref":"pkg:pypi/googleapis-common-protos@1.70.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"graphql-core","version":"3.2.6","scope":"optional","purl":"pkg:pypi/graphql-core@3.2.6","type":"library","bom-ref":"pkg:pypi/graphql-core@3.2.6","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"graphql-relay","version":"3.2.0","scope":"optional","purl":"pkg:pypi/graphql-relay@3.2.0","type":"library","bom-ref":"pkg:pypi/graphql-relay@3.2.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"greenlet","version":"3.2.4","scope":"optional","purl":"pkg:pypi/greenlet@3.2.4","type":"library","bom-ref":"pkg:pypi/greenlet@3.2.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"groq","version":"0.31.0","scope":"optional","purl":"pkg:pypi/groq@0.31.0","type":"library","bom-ref":"pkg:pypi/groq@0.31.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"grpcio","version":"1.74.0","scope":"optional","purl":"pkg:pypi/grpcio@1.74.0","type":"library","bom-ref":"pkg:pypi/grpcio@1.74.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"gunicorn","version":"23.0.0","scope":"optional","purl":"pkg:pypi/gunicorn@23.0.0","type":"library","bom-ref":"pkg:pypi/gunicorn@23.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"h2o","version":"3.46.0.7","scope":"optional","purl":"pkg:pypi/h2o@3.46.0.7","type":"library","bom-ref":"pkg:pypi/h2o@3.46.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"hyperopt","version":"0.2.7","scope":"optional","purl":"pkg:pypi/hyperopt@0.2.7","type":"library","bom-ref":"pkg:pypi/hyperopt@0.2.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"iniconfig","version":"2.1.0","scope":"optional","purl":"pkg:pypi/iniconfig@2.1.0","type":"library","bom-ref":"pkg:pypi/iniconfig@2.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"invoke","version":"2.2.0","scope":"optional","purl":"pkg:pypi/invoke@2.2.0","type":"library","bom-ref":"pkg:pypi/invoke@2.2.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"ipython","version":"9.5.0","scope":"optional","purl":"pkg:pypi/ipython@9.5.0","type":"library","bom-ref":"pkg:pypi/ipython@9.5.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"ipython-pygments-lexers","version":"1.1.1","scope":"optional","purl":"pkg:pypi/ipython-pygments-lexers@1.1.1","type":"library","bom-ref":"pkg:pypi/ipython-pygments-lexers@1.1.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"parso","version":"0.8.5","scope":"optional","purl":"pkg:pypi/parso@0.8.5","type":"library","bom-ref":"pkg:pypi/parso@0.8.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"matplotlib-inline","version":"0.1.7","scope":"optional","purl":"pkg:pypi/matplotlib-inline@0.1.7","type":"framework","bom-ref":"pkg:pypi/matplotlib-inline@0.1.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework"]},{"group":"","name":"traitlets","version":"5.14.3","scope":"optional","purl":"pkg:pypi/traitlets@5.14.3","type":"library","bom-ref":"pkg:pypi/traitlets@5.14.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pexpect","version":"4.9.0","scope":"optional","purl":"pkg:pypi/pexpect@4.9.0","type":"library","bom-ref":"pkg:pypi/pexpect@4.9.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["test"]},{"group":"","name":"ptyprocess","version":"0.7.0","scope":"optional","purl":"pkg:pypi/ptyprocess@0.7.0","type":"library","bom-ref":"pkg:pypi/ptyprocess@0.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"prompt-toolkit","version":"3.0.52","scope":"optional","purl":"pkg:pypi/prompt-toolkit@3.0.52","type":"library","bom-ref":"pkg:pypi/prompt-toolkit@3.0.52","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"wcwidth","version":"0.2.13","scope":"optional","purl":"pkg:pypi/wcwidth@0.2.13","type":"library","bom-ref":"pkg:pypi/wcwidth@0.2.13","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"stack-data","version":"0.6.3","scope":"optional","purl":"pkg:pypi/stack-data@0.6.3","type":"library","bom-ref":"pkg:pypi/stack-data@0.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pure-eval","version":"0.2.3","scope":"optional","purl":"pkg:pypi/pure-eval@0.2.3","type":"library","bom-ref":"pkg:pypi/pure-eval@0.2.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"ipywidgets","version":"8.1.7","scope":"optional","purl":"pkg:pypi/ipywidgets@8.1.7","type":"library","bom-ref":"pkg:pypi/ipywidgets@8.1.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"widgetsnbextension","version":"4.0.14","scope":"optional","purl":"pkg:pypi/widgetsnbextension@4.0.14","type":"library","bom-ref":"pkg:pypi/widgetsnbextension@4.0.14","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"jupyterlab-widgets","version":"3.0.15","scope":"optional","purl":"pkg:pypi/jupyterlab-widgets@3.0.15","type":"library","bom-ref":"pkg:pypi/jupyterlab-widgets@3.0.15","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"jaraco.classes","version":"3.4.0","scope":"optional","purl":"pkg:pypi/jaraco.classes@3.4.0","type":"library","bom-ref":"pkg:pypi/jaraco.classes@3.4.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"jsonpatch","version":"1.33","scope":"optional","purl":"pkg:pypi/jsonpatch@1.33","type":"library","bom-ref":"pkg:pypi/jsonpatch@1.33","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"jsonpointer","version":"3.0.0","scope":"optional","purl":"pkg:pypi/jsonpointer@3.0.0","type":"library","bom-ref":"pkg:pypi/jsonpointer@3.0.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"kaleido","version":"1.0.0","scope":"optional","purl":"pkg:pypi/kaleido@1.0.0","type":"library","bom-ref":"pkg:pypi/kaleido@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"keras","version":"3.11.3","scope":"optional","purl":"pkg:pypi/keras@3.11.3","type":"framework","bom-ref":"pkg:pypi/keras@3.11.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"namex","version":"0.1.0","scope":"optional","purl":"pkg:pypi/namex@0.1.0","type":"library","bom-ref":"pkg:pypi/namex@0.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"optree","version":"0.17.0","scope":"optional","purl":"pkg:pypi/optree@0.17.0","type":"library","bom-ref":"pkg:pypi/optree@0.17.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"ml-dtypes","version":"0.3.2","scope":"optional","purl":"pkg:pypi/ml-dtypes@0.3.2","type":"library","bom-ref":"pkg:pypi/ml-dtypes@0.3.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"keyring","version":"24.3.1","scope":"optional","purl":"pkg:pypi/keyring@24.3.1","type":"library","bom-ref":"pkg:pypi/keyring@24.3.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"langchain","version":"0.3.27","scope":"optional","purl":"pkg:pypi/langchain@0.3.27","type":"framework","bom-ref":"pkg:pypi/langchain@0.3.27","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"langsmith","version":"0.4.21","scope":"optional","purl":"pkg:pypi/langsmith@0.4.21","type":"library","bom-ref":"pkg:pypi/langsmith@0.4.21","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"requests-toolbelt","version":"1.0.0","scope":"optional","purl":"pkg:pypi/requests-toolbelt@1.0.0","type":"library","bom-ref":"pkg:pypi/requests-toolbelt@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"langchain-text-splitters","version":"0.3.11","scope":"optional","purl":"pkg:pypi/langchain-text-splitters@0.3.11","type":"framework","bom-ref":"pkg:pypi/langchain-text-splitters@0.3.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"langcodes","version":"3.5.0","scope":"optional","purl":"pkg:pypi/langcodes@3.5.0","type":"library","bom-ref":"pkg:pypi/langcodes@3.5.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"language-data","version":"1.3.0","scope":"optional","purl":"pkg:pypi/language-data@1.3.0","type":"library","bom-ref":"pkg:pypi/language-data@1.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"marisa-trie","version":"1.3.1","scope":"optional","purl":"pkg:pypi/marisa-trie@1.3.1","type":"library","bom-ref":"pkg:pypi/marisa-trie@1.3.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"lazy-loader","version":"0.4","scope":"optional","purl":"pkg:pypi/lazy-loader@0.4","type":"library","bom-ref":"pkg:pypi/lazy-loader@0.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"libclang","version":"18.1.1","scope":"optional","purl":"pkg:pypi/libclang@18.1.1","type":"library","bom-ref":"pkg:pypi/libclang@18.1.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"librosa","version":"0.11.0","scope":"optional","purl":"pkg:pypi/librosa@0.11.0","type":"library","bom-ref":"pkg:pypi/librosa@0.11.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"llvmlite","version":"0.44.0","scope":"optional","purl":"pkg:pypi/llvmlite@0.44.0","type":"library","bom-ref":"pkg:pypi/llvmlite@0.44.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pooch","version":"1.8.2","scope":"optional","purl":"pkg:pypi/pooch@1.8.2","type":"library","bom-ref":"pkg:pypi/pooch@1.8.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"soxr","version":"0.5.0.post1","scope":"optional","purl":"pkg:pypi/soxr@0.5.0.post1","type":"library","bom-ref":"pkg:pypi/soxr@0.5.0.post1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"msgpack","version":"1.1.1","scope":"optional","purl":"pkg:pypi/msgpack@1.1.1","type":"library","bom-ref":"pkg:pypi/msgpack@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"lightgbm","version":"4.6.0","scope":"optional","purl":"pkg:pypi/lightgbm@4.6.0","type":"library","bom-ref":"pkg:pypi/lightgbm@4.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"lightning","version":"2.5.4","scope":"optional","purl":"pkg:pypi/lightning@2.5.4","type":"library","bom-ref":"pkg:pypi/lightning@2.5.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"lightning-utilities","version":"0.15.2","scope":"optional","purl":"pkg:pypi/lightning-utilities@0.15.2","type":"library","bom-ref":"pkg:pypi/lightning-utilities@0.15.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"onnxruntime","version":"1.22.1","scope":"optional","purl":"pkg:pypi/onnxruntime@1.22.1","type":"library","bom-ref":"pkg:pypi/onnxruntime@1.22.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"torchvision","version":"0.23.0","scope":"optional","purl":"pkg:pypi/torchvision@0.23.0","type":"library","bom-ref":"pkg:pypi/torchvision@0.23.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"transformers","version":"4.56.0","scope":"optional","purl":"pkg:pypi/transformers@4.56.0","type":"library","bom-ref":"pkg:pypi/transformers@4.56.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["transform"]},{"group":"","name":"tensorflow","version":"2.16.2","scope":"optional","purl":"pkg:pypi/tensorflow@2.16.2","type":"framework","bom-ref":"pkg:pypi/tensorflow@2.16.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework"]},{"group":"","name":"tf2onnx","version":"1.8.4","scope":"optional","purl":"pkg:pypi/tf2onnx@1.8.4","type":"library","bom-ref":"pkg:pypi/tf2onnx@1.8.4","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"sentencepiece","version":"0.2.1","scope":"optional","purl":"pkg:pypi/sentencepiece@0.2.1","type":"library","bom-ref":"pkg:pypi/sentencepiece@0.2.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"nltk","version":"3.9.1","scope":"optional","purl":"pkg:pypi/nltk@3.9.1","type":"library","bom-ref":"pkg:pypi/nltk@3.9.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"llama-cloud","version":"0.1.35","scope":"optional","purl":"pkg:pypi/llama-cloud@0.1.35","type":"framework","bom-ref":"pkg:pypi/llama-cloud@0.1.35","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"llama-cloud-services","version":"0.6.54","scope":"optional","purl":"pkg:pypi/llama-cloud-services@0.6.54","type":"framework","bom-ref":"pkg:pypi/llama-cloud-services@0.6.54","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-core","version":"0.12.52.post1","scope":"optional","purl":"pkg:pypi/llama-index-core@0.12.52.post1","type":"framework","bom-ref":"pkg:pypi/llama-index-core@0.12.52.post1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-workflows","version":"1.3.0","scope":"optional","purl":"pkg:pypi/llama-index-workflows@1.3.0","type":"framework","bom-ref":"pkg:pypi/llama-index-workflows@1.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-instrumentation","version":"0.4.0","scope":"optional","purl":"pkg:pypi/llama-index-instrumentation@0.4.0","type":"framework","bom-ref":"pkg:pypi/llama-index-instrumentation@0.4.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"nest-asyncio","version":"1.6.0","scope":"optional","purl":"pkg:pypi/nest-asyncio@1.6.0","type":"library","bom-ref":"pkg:pypi/nest-asyncio@1.6.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"llama-index","version":"0.12.52","scope":"optional","purl":"pkg:pypi/llama-index@0.12.52","type":"framework","bom-ref":"pkg:pypi/llama-index@0.12.52","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-agent-openai","version":"0.4.12","scope":"optional","purl":"pkg:pypi/llama-index-agent-openai@0.4.12","type":"framework","bom-ref":"pkg:pypi/llama-index-agent-openai@0.4.12","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-llms-openai","version":"0.4.7","scope":"optional","purl":"pkg:pypi/llama-index-llms-openai@0.4.7","type":"framework","bom-ref":"pkg:pypi/llama-index-llms-openai@0.4.7","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-cli","version":"0.4.4","scope":"optional","purl":"pkg:pypi/llama-index-cli@0.4.4","type":"framework","bom-ref":"pkg:pypi/llama-index-cli@0.4.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-embeddings-openai","version":"0.3.1","scope":"optional","purl":"pkg:pypi/llama-index-embeddings-openai@0.3.1","type":"framework","bom-ref":"pkg:pypi/llama-index-embeddings-openai@0.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-indices-managed-llama-cloud","version":"0.8.0","scope":"optional","purl":"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0","type":"framework","bom-ref":"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-multi-modal-llms-openai","version":"0.5.3","scope":"optional","purl":"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3","type":"framework","bom-ref":"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-program-openai","version":"0.3.2","scope":"optional","purl":"pkg:pypi/llama-index-program-openai@0.3.2","type":"framework","bom-ref":"pkg:pypi/llama-index-program-openai@0.3.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-question-gen-openai","version":"0.3.1","scope":"optional","purl":"pkg:pypi/llama-index-question-gen-openai@0.3.1","type":"framework","bom-ref":"pkg:pypi/llama-index-question-gen-openai@0.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"llama-index-readers-file","version":"0.4.11","scope":"optional","purl":"pkg:pypi/llama-index-readers-file@0.4.11","type":"framework","bom-ref":"pkg:pypi/llama-index-readers-file@0.4.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"pypdf","version":"5.9.0","scope":"optional","purl":"pkg:pypi/pypdf@5.9.0","type":"library","bom-ref":"pkg:pypi/pypdf@5.9.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"striprtf","version":"0.0.26","scope":"optional","purl":"pkg:pypi/striprtf@0.0.26","type":"library","bom-ref":"pkg:pypi/striprtf@0.0.26","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"llama-index-readers-llama-parse","version":"0.4.0","scope":"optional","purl":"pkg:pypi/llama-index-readers-llama-parse@0.4.0","type":"framework","bom-ref":"pkg:pypi/llama-index-readers-llama-parse@0.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"llama-parse","version":"0.6.54","scope":"optional","purl":"pkg:pypi/llama-parse@0.6.54","type":"framework","bom-ref":"pkg:pypi/llama-parse@0.6.54","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework","ml"]},{"group":"","name":"markdown","version":"3.8.2","scope":"optional","purl":"pkg:pypi/markdown@3.8.2","type":"library","bom-ref":"pkg:pypi/markdown@3.8.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"mistralai","version":"1.9.10","scope":"optional","purl":"pkg:pypi/mistralai@1.9.10","type":"library","bom-ref":"pkg:pypi/mistralai@1.9.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"mlflow","version":"3.3.3.dev0","scope":"optional","purl":"pkg:pypi/mlflow@3.3.3.dev0","type":"library","bom-ref":"pkg:pypi/mlflow@3.3.3.dev0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"opentelemetry-proto","version":"1.36.0","scope":"optional","purl":"pkg:pypi/opentelemetry-proto@1.36.0","type":"library","bom-ref":"pkg:pypi/opentelemetry-proto@1.36.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["telemetry"]},{"group":"","name":"moto","version":"4.2.14","scope":"optional","purl":"pkg:pypi/moto@4.2.14","type":"library","bom-ref":"pkg:pypi/moto@4.2.14","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"xmltodict","version":"0.14.2","scope":"optional","purl":"pkg:pypi/xmltodict@0.14.2","type":"library","bom-ref":"pkg:pypi/xmltodict@0.14.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"responses","version":"0.25.8","scope":"optional","purl":"pkg:pypi/responses@0.25.8","type":"library","bom-ref":"pkg:pypi/responses@0.25.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"murmurhash","version":"1.0.13","scope":"optional","purl":"pkg:pypi/murmurhash@1.0.13","type":"library","bom-ref":"pkg:pypi/murmurhash@1.0.13","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"onnx","version":"1.19.0","scope":"optional","purl":"pkg:pypi/onnx@1.19.0","type":"library","bom-ref":"pkg:pypi/onnx@1.19.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"opentelemetry-exporter-otlp-proto-common","version":"1.36.0","scope":"optional","purl":"pkg:pypi/opentelemetry-exporter-otlp-proto-common@1.36.0","type":"library","bom-ref":"pkg:pypi/opentelemetry-exporter-otlp-proto-common@1.36.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["telemetry"]},{"group":"","name":"opentelemetry-exporter-otlp-proto-grpc","version":"1.36.0","scope":"optional","purl":"pkg:pypi/opentelemetry-exporter-otlp-proto-grpc@1.36.0","type":"library","bom-ref":"pkg:pypi/opentelemetry-exporter-otlp-proto-grpc@1.36.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["telemetry"]},{"group":"","name":"opentelemetry-exporter-otlp-proto-http","version":"1.36.0","scope":"optional","purl":"pkg:pypi/opentelemetry-exporter-otlp-proto-http@1.36.0","type":"library","bom-ref":"pkg:pypi/opentelemetry-exporter-otlp-proto-http@1.36.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["telemetry"]},{"group":"","name":"opt-einsum","version":"3.3.0","scope":"optional","purl":"pkg:pypi/opt-einsum@3.3.0","type":"library","bom-ref":"pkg:pypi/opt-einsum@3.3.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"paddlepaddle","version":"3.1.1","scope":"optional","purl":"pkg:pypi/paddlepaddle@3.1.1","type":"library","bom-ref":"pkg:pypi/paddlepaddle@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pluggy","version":"1.6.0","scope":"optional","purl":"pkg:pypi/pluggy@1.6.0","type":"library","bom-ref":"pkg:pypi/pluggy@1.6.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"polars","version":"1.33.0","scope":"optional","purl":"pkg:pypi/polars@1.33.0","type":"library","bom-ref":"pkg:pypi/polars@1.33.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"prance","version":"25.4.8.0","scope":"optional","purl":"pkg:pypi/prance@25.4.8.0","type":"library","bom-ref":"pkg:pypi/prance@25.4.8.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"ruamel.yaml","version":"0.18.15","scope":"optional","purl":"pkg:pypi/ruamel.yaml@0.18.15","type":"library","bom-ref":"pkg:pypi/ruamel.yaml@0.18.15","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"ruamel.yaml.clib","version":"0.2.12","scope":"optional","purl":"pkg:pypi/ruamel.yaml.clib@0.2.12","type":"library","bom-ref":"pkg:pypi/ruamel.yaml.clib@0.2.12","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"preshed","version":"3.0.10","scope":"optional","purl":"pkg:pypi/preshed@3.0.10","type":"library","bom-ref":"pkg:pypi/preshed@3.0.10","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"promptflow","version":"1.18.1","scope":"optional","purl":"pkg:pypi/promptflow@1.18.1","type":"library","bom-ref":"pkg:pypi/promptflow@1.18.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"promptflow-tracing","version":"1.18.1","scope":"optional","purl":"pkg:pypi/promptflow-tracing@1.18.1","type":"library","bom-ref":"pkg:pypi/promptflow-tracing@1.18.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"promptflow-core","version":"1.18.1","scope":"optional","purl":"pkg:pypi/promptflow-core@1.18.1","type":"library","bom-ref":"pkg:pypi/promptflow-core@1.18.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"promptflow-devkit","version":"1.18.1","scope":"optional","purl":"pkg:pypi/promptflow-devkit@1.18.1","type":"library","bom-ref":"pkg:pypi/promptflow-devkit@1.18.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pydash","version":"7.0.7","scope":"optional","purl":"pkg:pypi/pydash@7.0.7","type":"library","bom-ref":"pkg:pypi/pydash@7.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"strictyaml","version":"1.7.3","scope":"optional","purl":"pkg:pypi/strictyaml@1.7.3","type":"library","bom-ref":"pkg:pypi/strictyaml@1.7.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"waitress","version":"3.0.2","scope":"optional","purl":"pkg:pypi/waitress@3.0.2","type":"library","bom-ref":"pkg:pypi/waitress@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pybars4","version":"0.9.13","scope":"optional","purl":"pkg:pypi/pybars4@0.9.13","type":"library","bom-ref":"pkg:pypi/pybars4@0.9.13","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pymeta3","version":"0.5.1","scope":"optional","purl":"pkg:pypi/pymeta3@0.5.1","type":"library","bom-ref":"pkg:pypi/pymeta3@0.5.1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pyphen","version":"0.17.2","scope":"optional","purl":"pkg:pypi/pyphen@0.17.2","type":"library","bom-ref":"pkg:pypi/pyphen@0.17.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"pyspark","version":"4.0.0","scope":"optional","purl":"pkg:pypi/pyspark@4.0.0","type":"library","bom-ref":"pkg:pypi/pyspark@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pytest-repeat","version":"0.9.4","scope":"optional","purl":"pkg:pypi/pytest-repeat@0.9.4","type":"library","bom-ref":"pkg:pypi/pytest-repeat@0.9.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"pytest-timeout","version":"2.4.0","scope":"optional","purl":"pkg:pypi/pytest-timeout@2.4.0","type":"library","bom-ref":"pkg:pypi/pytest-timeout@2.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"rouge-score","version":"0.1.2","scope":"optional","purl":"pkg:pypi/rouge-score@0.1.2","type":"library","bom-ref":"pkg:pypi/rouge-score@0.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"semantic-kernel","version":"1.36.1","scope":"optional","purl":"pkg:pypi/semantic-kernel@1.36.1","type":"library","bom-ref":"pkg:pypi/semantic-kernel@1.36.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"sentence-transformers","version":"5.1.0","scope":"optional","purl":"pkg:pypi/sentence-transformers@5.1.0","type":"library","bom-ref":"pkg:pypi/sentence-transformers@5.1.0","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]},"tags":["transform"]},{"group":"","name":"setfit","version":"1.1.3","scope":"optional","purl":"pkg:pypi/setfit@1.1.3","type":"library","bom-ref":"pkg:pypi/setfit@1.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"shap","version":"0.48.0","scope":"optional","purl":"pkg:pypi/shap@0.48.0","type":"library","bom-ref":"pkg:pypi/shap@0.48.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"slicer","version":"0.0.8","scope":"optional","purl":"pkg:pypi/slicer@0.0.8","type":"library","bom-ref":"pkg:pypi/slicer@0.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"smart-open","version":"7.3.0.post1","scope":"optional","purl":"pkg:pypi/smart-open@7.3.0.post1","type":"library","bom-ref":"pkg:pypi/smart-open@7.3.0.post1","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"spacy","version":"3.7.5","scope":"optional","purl":"pkg:pypi/spacy@3.7.5","type":"library","bom-ref":"pkg:pypi/spacy@3.7.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"spacy-legacy","version":"3.0.12","scope":"optional","purl":"pkg:pypi/spacy-legacy@3.0.12","type":"library","bom-ref":"pkg:pypi/spacy-legacy@3.0.12","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"spacy-loggers","version":"1.0.5","scope":"optional","purl":"pkg:pypi/spacy-loggers@1.0.5","type":"library","bom-ref":"pkg:pypi/spacy-loggers@1.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"thinc","version":"8.2.5","scope":"optional","purl":"pkg:pypi/thinc@8.2.5","type":"library","bom-ref":"pkg:pypi/thinc@8.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"wasabi","version":"1.1.3","scope":"optional","purl":"pkg:pypi/wasabi@1.1.3","type":"library","bom-ref":"pkg:pypi/wasabi@1.1.3","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"weasel","version":"0.4.1","scope":"optional","purl":"pkg:pypi/weasel@0.4.1","type":"library","bom-ref":"pkg:pypi/weasel@0.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"strands-agents","version":"0.0.1","scope":"optional","purl":"pkg:pypi/strands-agents@0.0.1","type":"library","bom-ref":"pkg:pypi/strands-agents@0.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"tensorboard","version":"2.16.2","scope":"optional","purl":"pkg:pypi/tensorboard@2.16.2","type":"library","bom-ref":"pkg:pypi/tensorboard@2.16.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"tensorboard-data-server","version":"0.7.2","scope":"optional","purl":"pkg:pypi/tensorboard-data-server@0.7.2","type":"library","bom-ref":"pkg:pypi/tensorboard-data-server@0.7.2","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"manifest-analysis","confidence":0.8,"value":"pyproject.toml"}],"concludedValue":"pyproject.toml"}]}},{"group":"","name":"tensorflow-macos","version":"2.16.2","scope":"optional","purl":"pkg:pypi/tensorflow-macos@2.16.2","type":"framework","bom-ref":"pkg:pypi/tensorflow-macos@2.16.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]},"tags":["framework"]},{"group":"","name":"textstat","version":"0.7.10","scope":"optional","purl":"pkg:pypi/textstat@0.7.10","type":"library","bom-ref":"pkg:pypi/textstat@0.7.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}},{"group":"","name":"xgboost","version":"3.0.4","scope":"optional","purl":"pkg:pypi/xgboost@3.0.4","type":"library","bom-ref":"pkg:pypi/xgboost@3.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"instrumentation","confidence":1,"value":"/Users/prabhu/miniconda3/envs/mlflow"}],"concludedValue":"/Users/prabhu/miniconda3/envs/mlflow"}]}}],"dependencies":[{"ref":"pkg:pypi/agents@1.4.0","dependsOn":[]},{"ref":"pkg:pypi/aiohttp@3.12.15","dependsOn":["pkg:pypi/aiohappyeyeballs@2.6.1","pkg:pypi/aiosignal@1.4.0","pkg:pypi/attrs@25.3.0","pkg:pypi/frozenlist@1.7.0","pkg:pypi/multidict@6.6.4","pkg:pypi/propcache@0.3.2","pkg:pypi/yarl@1.20.1"]},{"ref":"pkg:pypi/alembic@1.16.5","dependsOn":["pkg:pypi/mako@1.3.10","pkg:pypi/sqlalchemy@2.0.43","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/autogen-core@0.7.4","dependsOn":[]},{"ref":"pkg:pypi/ax@0.52.0","dependsOn":[]},{"ref":"pkg:pypi/boto3@1.40.22","dependsOn":[]},{"ref":"pkg:pypi/cachetools@6.2.0","dependsOn":[]},{"ref":"pkg:pypi/captum@0.8.0","dependsOn":[]},{"ref":"pkg:pypi/click@8.2.1","dependsOn":[]},{"ref":"pkg:pypi/cloudpickle@3.1.1","dependsOn":[]},{"ref":"pkg:pypi/crewai-tools@0.65.0","dependsOn":[]},{"ref":"pkg:pypi/cryptography@45.0.7","dependsOn":["pkg:pypi/cffi@1.17.1"]},{"ref":"pkg:pypi/cycler@0.12.1","dependsOn":[]},{"ref":"pkg:pypi/databricks-langchain@0.7.1","dependsOn":[]},{"ref":"pkg:pypi/python-dateutil@2.9.0.post0","dependsOn":["pkg:pypi/six@1.17.0"]},{"ref":"pkg:pypi/databricks-sdk@0.65.0","dependsOn":["pkg:pypi/google-auth@2.40.3","pkg:pypi/requests@2.32.5"]},{"ref":"pkg:pypi/fastapi@0.116.1","dependsOn":["pkg:pypi/email-validator@2.3.0","pkg:pypi/httpx@0.28.1","pkg:pypi/itsdangerous@2.2.0","pkg:pypi/orjson@3.11.3","pkg:pypi/pydantic-settings@2.10.1","pkg:pypi/pydantic@2.11.7","pkg:pypi/python-multipart@0.0.20","pkg:pypi/starlette@0.47.3","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/uvicorn@0.35.0"]},{"ref":"pkg:pypi/fastmcp@2.12.0","dependsOn":["pkg:pypi/authlib@1.6.3","pkg:pypi/cyclopts@3.23.1","pkg:pypi/exceptiongroup@1.3.0","pkg:pypi/httpx@0.28.1","pkg:pypi/mcp@1.13.1","pkg:pypi/openai@1.102.0","pkg:pypi/openapi-core@0.19.5","pkg:pypi/openapi-pydantic@0.5.1","pkg:pypi/pydantic@2.11.7","pkg:pypi/pyperclip@1.9.0","pkg:pypi/python-dotenv@1.1.1","pkg:pypi/rich@14.1.0"]},{"ref":"pkg:pypi/flask-wtf@1.2.2","dependsOn":["pkg:pypi/flask@3.1.2","pkg:pypi/itsdangerous@2.2.0","pkg:pypi/wtforms@3.2.1"]},{"ref":"pkg:pypi/gitpython@3.1.45","dependsOn":["pkg:pypi/gitdb@4.0.12"]},{"ref":"pkg:pypi/protobuf@6.32.0","dependsOn":[]},{"ref":"pkg:pypi/graphene@3.4.3","dependsOn":["pkg:pypi/graphql-core@3.2.6","pkg:pypi/graphql-relay@3.2.0","pkg:pypi/python-dateutil@2.9.0.post0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/grpc@1.0.0","dependsOn":[]},{"ref":"pkg:pypi/h5py@3.14.0","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/huggingface-hub@0.34.4","dependsOn":["pkg:pypi/aiohttp@3.12.15","pkg:pypi/fastapi@0.116.1","pkg:pypi/filelock@3.19.1","pkg:pypi/fsspec@2025.3.0","pkg:pypi/hf-xet@1.1.9","pkg:pypi/httpx@0.28.1","pkg:pypi/itsdangerous@2.2.0","pkg:pypi/jedi@0.19.2","pkg:pypi/jinja2@3.1.6","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pytest-asyncio@1.1.0","pkg:pypi/pytest-cov@6.2.1","pkg:pypi/pytest@8.4.1","pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/soundfile@0.13.1","pkg:pypi/tqdm@4.67.1","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/urllib3@2.5.0"]},{"ref":"pkg:pypi/importlib-metadata@8.7.0","dependsOn":[]},{"ref":"pkg:pypi/pyjwt@2.10.1","dependsOn":[]},{"ref":"pkg:pypi/langchain-community@0.3.29","dependsOn":[]},{"ref":"pkg:pypi/langchain-core@0.3.75","dependsOn":["pkg:pypi/jsonpatch@1.33","pkg:pypi/langsmith@0.4.21","pkg:pypi/packaging@25.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/pyyaml@6.0.2","pkg:pypi/tenacity@9.1.2","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/langchain-openai@0.3.32","dependsOn":[]},{"ref":"pkg:pypi/langgraph@0.6.6","dependsOn":[]},{"ref":"pkg:pypi/limits@5.5.0","dependsOn":[]},{"ref":"pkg:pypi/matplotlib@3.10.6","dependsOn":["pkg:pypi/contourpy@1.3.3","pkg:pypi/cycler@0.12.1","pkg:pypi/fonttools@4.59.2","pkg:pypi/kiwisolver@1.4.9","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pillow@11.0.0","pkg:pypi/pyparsing@3.2.3","pkg:pypi/python-dateutil@2.9.0.post0"]},{"ref":"pkg:pypi/numpy@2.3.2","dependsOn":[]},{"ref":"pkg:pypi/opentelemetry-api@1.36.0","dependsOn":["pkg:pypi/importlib-metadata@8.4.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/packaging@25.0","dependsOn":[]},{"ref":"pkg:pypi/pandas@2.3.2","dependsOn":[]},{"ref":"pkg:pypi/paramiko@4.0.0","dependsOn":[]},{"ref":"pkg:pypi/prettytable@3.16.0","dependsOn":[]},{"ref":"pkg:pypi/prometheus-flask-exporter@0.23.2","dependsOn":[]},{"ref":"pkg:pypi/py4j@0.10.9.9","dependsOn":[]},{"ref":"pkg:pypi/pyarrow@21.0.0","dependsOn":[]},{"ref":"pkg:pypi/pynvml@12.0.0","dependsOn":[]},{"ref":"pkg:pypi/pyrsmi@0.2.0","dependsOn":[]},{"ref":"pkg:pypi/pysftp@0.2.9","dependsOn":[]},{"ref":"pkg:pypi/pytorch-lightning@2.5.4","dependsOn":["pkg:pypi/fsspec@2025.3.0","pkg:pypi/ipython@9.5.0","pkg:pypi/lightning-utilities@0.15.2","pkg:pypi/matplotlib@3.10.6","pkg:pypi/packaging@25.0","pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/rich@14.1.0","pkg:pypi/torch@2.8.0","pkg:pypi/torchmetrics@1.8.1","pkg:pypi/torchvision@0.23.0","pkg:pypi/tqdm@4.67.1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/qdrant-client@1.15.1","dependsOn":[]},{"ref":"pkg:pypi/requests@2.32.5","dependsOn":["pkg:pypi/certifi@2025.8.3","pkg:pypi/charset-normalizer@3.4.3","pkg:pypi/idna@3.10","pkg:pypi/urllib3@2.5.0"]},{"ref":"pkg:pypi/requests-auth-aws-sigv4@0.7","dependsOn":[]},{"ref":"pkg:pypi/ruamel.base@1.0.0","dependsOn":[]},{"ref":"pkg:pypi/scipy@1.16.1","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/sktime@0.38.5","dependsOn":[]},{"ref":"pkg:pypi/slowapi@0.1.9","dependsOn":[]},{"ref":"pkg:pypi/sqlalchemy@2.0.43","dependsOn":["pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/sqlparse@0.5.3","dependsOn":[]},{"ref":"pkg:pypi/starlette@0.47.3","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/strands-agents-tools@0.2.6","dependsOn":[]},{"ref":"pkg:pypi/tensorboardx@2.6.4","dependsOn":[]},{"ref":"pkg:pypi/tomli@2.2.1","dependsOn":[]},{"ref":"pkg:pypi/torchdata@0.11.0","dependsOn":[]},{"ref":"pkg:pypi/torchmetrics@1.8.1","dependsOn":["pkg:pypi/librosa@0.11.0","pkg:pypi/lightning-utilities@0.15.2","pkg:pypi/matplotlib@3.10.6","pkg:pypi/nltk@3.9.1","pkg:pypi/numpy@1.26.4","pkg:pypi/onnxruntime@1.22.1","pkg:pypi/packaging@25.0","pkg:pypi/regex@2025.9.1","pkg:pypi/requests@2.32.5","pkg:pypi/scipy@1.16.1","pkg:pypi/sentencepiece@0.2.1","pkg:pypi/torch@2.8.0","pkg:pypi/torchvision@0.23.0","pkg:pypi/tqdm@4.67.1","pkg:pypi/transformers@4.56.0"]},{"ref":"pkg:pypi/torchtext@0.18.0","dependsOn":[]},{"ref":"pkg:pypi/unitycatalog@0.1.1","dependsOn":[]},{"ref":"pkg:pypi/urllib3@2.5.0","dependsOn":[]},{"ref":"pkg:pypi/watchfiles@1.1.0","dependsOn":[]},{"ref":"pkg:pypi/werkzeug@3.1.3","dependsOn":[]},{"ref":"pkg:pypi/pyyaml@6.0.2","dependsOn":[]},{"ref":"pkg:pypi/crashtest@0.4.1","dependsOn":[]},{"ref":"pkg:pypi/rapidfuzz@3.13.0","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/numpy@1.26.4","dependsOn":[]},{"ref":"pkg:pypi/cleo@2.1.0","dependsOn":["pkg:pypi/crashtest@0.4.1","pkg:pypi/rapidfuzz@3.13.0"]},{"ref":"pkg:pypi/jmespath@1.0.1","dependsOn":[]},{"ref":"pkg:pypi/json-flatten@0.3.1","dependsOn":[]},{"ref":"pkg:pypi/thefuzz@0.22.1","dependsOn":["pkg:pypi/rapidfuzz@3.13.0"]},{"ref":"pkg:pypi/wrapt@1.17.3","dependsOn":[]},{"ref":"pkg:pypi/deprecated@1.2.18","dependsOn":["pkg:pypi/wrapt@1.17.3"]},{"ref":"pkg:pypi/markupsafe@3.0.2","dependsOn":[]},{"ref":"pkg:pypi/absl-py@2.3.1","dependsOn":[]},{"ref":"pkg:pypi/psutil@7.0.0","dependsOn":[]},{"ref":"pkg:pypi/torch@2.8.0","dependsOn":["pkg:pypi/filelock@3.19.1","pkg:pypi/fsspec@2025.3.0","pkg:pypi/jinja2@3.1.6","pkg:pypi/networkx@3.5","pkg:pypi/setuptools@80.9.0","pkg:pypi/sympy@1.14.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/filelock@3.19.1","dependsOn":[]},{"ref":"pkg:pypi/typing-extensions@4.15.0","dependsOn":[]},{"ref":"pkg:pypi/setuptools@80.9.0","dependsOn":[]},{"ref":"pkg:pypi/sympy@1.14.0","dependsOn":["pkg:pypi/mpmath@1.3.0"]},{"ref":"pkg:pypi/mpmath@1.3.0","dependsOn":[]},{"ref":"pkg:pypi/networkx@3.5","dependsOn":[]},{"ref":"pkg:pypi/jinja2@3.1.6","dependsOn":["pkg:pypi/markupsafe@3.0.2"]},{"ref":"pkg:pypi/fsspec@2025.3.0","dependsOn":[]},{"ref":"pkg:pypi/charset-normalizer@3.4.3","dependsOn":[]},{"ref":"pkg:pypi/idna@3.10","dependsOn":["pkg:pypi/pytest@8.4.1"]},{"ref":"pkg:pypi/pytest@8.4.1","dependsOn":["pkg:pypi/iniconfig@2.1.0","pkg:pypi/packaging@25.0","pkg:pypi/pluggy@1.6.0","pkg:pypi/pygments@2.19.2"]},{"ref":"pkg:pypi/certifi@2025.8.3","dependsOn":[]},{"ref":"pkg:pypi/tqdm@4.67.1","dependsOn":[]},{"ref":"pkg:pypi/hf-xet@1.1.9","dependsOn":[]},{"ref":"pkg:pypi/httpx@0.28.1","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/certifi@2025.8.3","pkg:pypi/httpcore@1.0.9","pkg:pypi/idna@3.10"]},{"ref":"pkg:pypi/python-multipart@0.0.20","dependsOn":[]},{"ref":"pkg:pypi/itsdangerous@2.2.0","dependsOn":[]},{"ref":"pkg:pypi/orjson@3.11.3","dependsOn":[]},{"ref":"pkg:pypi/email-validator@2.3.0","dependsOn":["pkg:pypi/dnspython@2.7.0","pkg:pypi/idna@3.10"]},{"ref":"pkg:pypi/uvicorn@0.35.0","dependsOn":["pkg:pypi/click@8.2.1","pkg:pypi/h11@0.16.0"]},{"ref":"pkg:pypi/pydantic-settings@2.10.1","dependsOn":["pkg:pypi/pydantic@2.11.7","pkg:pypi/python-dotenv@1.1.1","pkg:pypi/typing-inspection@0.4.1"]},{"ref":"pkg:pypi/jedi@0.19.2","dependsOn":["pkg:pypi/parso@0.8.5"]},{"ref":"pkg:pypi/pytest-cov@6.2.1","dependsOn":["pkg:pypi/coverage@7.10.6","pkg:pypi/pluggy@1.6.0","pkg:pypi/pytest@8.4.1"]},{"ref":"pkg:pypi/pytest-asyncio@1.1.0","dependsOn":["pkg:pypi/pytest@8.4.1"]},{"ref":"pkg:pypi/soundfile@0.13.1","dependsOn":["pkg:pypi/cffi@1.17.1","pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/safetensors@0.6.2","dependsOn":["pkg:pypi/safetensors@0.6.2"]},{"ref":"pkg:pypi/accelerate@1.10.1","dependsOn":["pkg:pypi/huggingface-hub@0.34.4","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/psutil@7.0.0","pkg:pypi/pyyaml@6.0.2","pkg:pypi/safetensors@0.6.2","pkg:pypi/torch@2.8.0"]},{"ref":"pkg:pypi/anyio@4.10.0","dependsOn":["pkg:pypi/idna@3.10","pkg:pypi/sniffio@1.3.1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/sniffio@1.3.1","dependsOn":[]},{"ref":"pkg:pypi/asyncer@0.0.8","dependsOn":["pkg:pypi/anyio@4.10.0"]},{"ref":"pkg:pypi/diskcache@5.6.3","dependsOn":[]},{"ref":"pkg:pypi/docker@7.1.0","dependsOn":["pkg:pypi/requests@2.32.5","pkg:pypi/urllib3@2.5.0"]},{"ref":"pkg:pypi/httpcore@1.0.9","dependsOn":["pkg:pypi/certifi@2025.8.3","pkg:pypi/h11@0.16.0"]},{"ref":"pkg:pypi/h11@0.16.0","dependsOn":[]},{"ref":"pkg:pypi/pydantic@2.11.7","dependsOn":["pkg:pypi/annotated-types@0.7.0","pkg:pypi/pydantic-core@2.33.2","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/typing-inspection@0.4.1"]},{"ref":"pkg:pypi/annotated-types@0.7.0","dependsOn":[]},{"ref":"pkg:pypi/pydantic-core@2.33.2","dependsOn":["pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/typing-inspection@0.4.1","dependsOn":["pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/python-dotenv@1.1.1","dependsOn":[]},{"ref":"pkg:pypi/termcolor@3.1.0","dependsOn":[]},{"ref":"pkg:pypi/tiktoken@0.11.0","dependsOn":["pkg:pypi/regex@2025.9.1","pkg:pypi/requests@2.32.5"]},{"ref":"pkg:pypi/regex@2025.9.1","dependsOn":[]},{"ref":"pkg:pypi/ag2@0.9.9","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/asyncer@0.0.8","pkg:pypi/diskcache@5.6.3","pkg:pypi/docker@7.1.0","pkg:pypi/httpx@0.28.1","pkg:pypi/packaging@25.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/python-dotenv@1.1.1","pkg:pypi/termcolor@3.1.0","pkg:pypi/tiktoken@0.11.0"]},{"ref":"pkg:pypi/docstring-parser@0.17.0","dependsOn":[]},{"ref":"pkg:pypi/gitdb@4.0.12","dependsOn":["pkg:pypi/smmap@5.0.2"]},{"ref":"pkg:pypi/smmap@5.0.2","dependsOn":[]},{"ref":"pkg:pypi/rich@14.1.0","dependsOn":["pkg:pypi/markdown-it-py@4.0.0","pkg:pypi/pygments@2.19.2"]},{"ref":"pkg:pypi/markdown-it-py@4.0.0","dependsOn":["pkg:pypi/mdurl@0.1.2"]},{"ref":"pkg:pypi/mdurl@0.1.2","dependsOn":[]},{"ref":"pkg:pypi/pygments@2.19.2","dependsOn":[]},{"ref":"pkg:pypi/typer@0.17.3","dependsOn":["pkg:pypi/click@8.2.1","pkg:pypi/rich@14.1.0","pkg:pypi/shellingham@1.5.4","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/shellingham@1.5.4","dependsOn":[]},{"ref":"pkg:pypi/agno@1.8.1","dependsOn":["pkg:pypi/docstring-parser@0.17.0","pkg:pypi/gitpython@3.1.45","pkg:pypi/httpx@0.28.1","pkg:pypi/packaging@25.0","pkg:pypi/pydantic-settings@2.10.1","pkg:pypi/pydantic@2.11.7","pkg:pypi/python-dotenv@1.1.1","pkg:pypi/python-multipart@0.0.20","pkg:pypi/pyyaml@6.0.2","pkg:pypi/rich@14.1.0","pkg:pypi/tomli@2.2.1","pkg:pypi/typer@0.17.3","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/aiohappyeyeballs@2.6.1","dependsOn":[]},{"ref":"pkg:pypi/aiosignal@1.4.0","dependsOn":["pkg:pypi/frozenlist@1.7.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/frozenlist@1.7.0","dependsOn":[]},{"ref":"pkg:pypi/attrs@25.3.0","dependsOn":[]},{"ref":"pkg:pypi/multidict@6.6.4","dependsOn":[]},{"ref":"pkg:pypi/propcache@0.3.2","dependsOn":[]},{"ref":"pkg:pypi/yarl@1.20.1","dependsOn":["pkg:pypi/idna@3.10","pkg:pypi/multidict@6.6.4","pkg:pypi/propcache@0.3.2"]},{"ref":"pkg:pypi/dnspython@2.7.0","dependsOn":[]},{"ref":"pkg:pypi/ifaddr@0.2.0","dependsOn":[]},{"ref":"pkg:pypi/aioice@0.10.1","dependsOn":["pkg:pypi/dnspython@2.7.0","pkg:pypi/ifaddr@0.2.0"]},{"ref":"pkg:pypi/av@14.4.0","dependsOn":[]},{"ref":"pkg:pypi/cffi@1.17.1","dependsOn":["pkg:pypi/pycparser@2.22"]},{"ref":"pkg:pypi/pycparser@2.22","dependsOn":[]},{"ref":"pkg:pypi/google-crc32c@1.7.1","dependsOn":[]},{"ref":"pkg:pypi/pyee@13.0.0","dependsOn":["pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/pylibsrtp@0.12.0","dependsOn":["pkg:pypi/cffi@1.17.1"]},{"ref":"pkg:pypi/pyopenssl@25.1.0","dependsOn":["pkg:pypi/cryptography@45.0.7","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/aiortc@1.13.0","dependsOn":["pkg:pypi/aioice@0.10.1","pkg:pypi/av@14.4.0","pkg:pypi/cffi@1.17.1","pkg:pypi/cryptography@45.0.7","pkg:pypi/google-crc32c@1.7.1","pkg:pypi/pyee@13.0.0","pkg:pypi/pylibsrtp@0.12.0","pkg:pypi/pyopenssl@25.1.0"]},{"ref":"pkg:pypi/aiosqlite@0.21.0","dependsOn":["pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/mako@1.3.10","dependsOn":["pkg:pypi/markupsafe@3.0.2"]},{"ref":"pkg:pypi/aniso8601@10.0.1","dependsOn":[]},{"ref":"pkg:pypi/distro@1.9.0","dependsOn":[]},{"ref":"pkg:pypi/jiter@0.10.0","dependsOn":[]},{"ref":"pkg:pypi/anthropic@0.64.0","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/distro@1.9.0","pkg:pypi/httpx@0.28.1","pkg:pypi/jiter@0.10.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/sniffio@1.3.1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/argcomplete@3.6.2","dependsOn":[]},{"ref":"pkg:pypi/asttokens@3.0.0","dependsOn":[]},{"ref":"pkg:pypi/wheel@0.45.1","dependsOn":[]},{"ref":"pkg:pypi/six@1.17.0","dependsOn":[]},{"ref":"pkg:pypi/astunparse@1.6.3","dependsOn":["pkg:pypi/six@1.17.0","pkg:pypi/wheel@0.45.1"]},{"ref":"pkg:pypi/audioread@3.0.1","dependsOn":[]},{"ref":"pkg:pypi/authlib@1.6.3","dependsOn":["pkg:pypi/cryptography@45.0.7"]},{"ref":"pkg:pypi/autogen-core@0.4.4","dependsOn":["pkg:pypi/jsonref@1.1.0","pkg:pypi/opentelemetry-api@1.36.0","pkg:pypi/pillow@11.0.0","pkg:pypi/protobuf@6.32.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/jsonref@1.1.0","dependsOn":[]},{"ref":"pkg:pypi/importlib-metadata@8.4.0","dependsOn":["pkg:pypi/zipp@3.23.0"]},{"ref":"pkg:pypi/zipp@3.23.0","dependsOn":[]},{"ref":"pkg:pypi/pillow@11.0.0","dependsOn":[]},{"ref":"pkg:pypi/autogen-agentchat@0.4.4","dependsOn":["pkg:pypi/autogen-core@0.4.4"]},{"ref":"pkg:pypi/isodate@0.7.2","dependsOn":[]},{"ref":"pkg:pypi/azure-core@1.35.0","dependsOn":["pkg:pypi/requests@2.32.5","pkg:pypi/six@1.17.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/azure-ai-agents@1.2.0b3","dependsOn":["pkg:pypi/azure-core@1.35.0","pkg:pypi/isodate@0.7.2","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/azure-storage-blob@12.26.0","dependsOn":["pkg:pypi/azure-core@1.35.0","pkg:pypi/cryptography@45.0.7","pkg:pypi/isodate@0.7.2","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/azure-ai-projects@1.1.0b3","dependsOn":["pkg:pypi/azure-ai-agents@1.2.0b3","pkg:pypi/azure-core@1.35.0","pkg:pypi/azure-storage-blob@12.26.0","pkg:pypi/isodate@0.7.2","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/msal@1.33.0","dependsOn":["pkg:pypi/cryptography@45.0.7","pkg:pypi/pyjwt@2.10.1","pkg:pypi/requests@2.32.5"]},{"ref":"pkg:pypi/msal-extensions@1.3.1","dependsOn":["pkg:pypi/msal@1.33.0"]},{"ref":"pkg:pypi/azure-identity@1.24.0","dependsOn":["pkg:pypi/azure-core@1.35.0","pkg:pypi/cryptography@45.0.7","pkg:pypi/msal-extensions@1.3.1","pkg:pypi/msal@1.33.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/fixedint@0.1.6","dependsOn":[]},{"ref":"pkg:pypi/msrest@0.7.1","dependsOn":["pkg:pypi/azure-core@1.35.0","pkg:pypi/certifi@2025.8.3","pkg:pypi/isodate@0.7.2","pkg:pypi/requests-oauthlib@2.0.0","pkg:pypi/requests@2.32.5"]},{"ref":"pkg:pypi/requests-oauthlib@2.0.0","dependsOn":["pkg:pypi/oauthlib@3.3.1","pkg:pypi/requests@2.32.5"]},{"ref":"pkg:pypi/oauthlib@3.3.1","dependsOn":[]},{"ref":"pkg:pypi/opentelemetry-sdk@1.36.0","dependsOn":["pkg:pypi/opentelemetry-api@1.36.0","pkg:pypi/opentelemetry-semantic-conventions@0.57b0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/opentelemetry-semantic-conventions@0.57b0","dependsOn":["pkg:pypi/opentelemetry-api@1.36.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/azure-monitor-opentelemetry-exporter@1.0.0b40","dependsOn":["pkg:pypi/azure-core@1.35.0","pkg:pypi/azure-identity@1.24.0","pkg:pypi/fixedint@0.1.6","pkg:pypi/msrest@0.7.1","pkg:pypi/opentelemetry-api@1.36.0","pkg:pypi/opentelemetry-sdk@1.36.0","pkg:pypi/psutil@7.0.0"]},{"ref":"pkg:pypi/azure-storage-file-datalake@12.21.0","dependsOn":["pkg:pypi/azure-core@1.35.0","pkg:pypi/azure-storage-blob@12.26.0","pkg:pypi/isodate@0.7.2","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/backoff@2.2.1","dependsOn":[]},{"ref":"pkg:pypi/griffe@1.13.0","dependsOn":["pkg:pypi/colorama@0.4.6"]},{"ref":"pkg:pypi/colorama@0.4.6","dependsOn":[]},{"ref":"pkg:pypi/platformdirs@4.4.0","dependsOn":[]},{"ref":"pkg:pypi/litellm@1.76.1","dependsOn":["pkg:pypi/aiohttp@3.12.15","pkg:pypi/click@8.2.1","pkg:pypi/fastuuid@0.12.0","pkg:pypi/httpx@0.28.1","pkg:pypi/importlib-metadata@8.4.0","pkg:pypi/jinja2@3.1.6","pkg:pypi/jsonschema@4.25.1","pkg:pypi/openai@1.102.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/python-dotenv@1.1.1","pkg:pypi/tiktoken@0.11.0","pkg:pypi/tokenizers@0.22.0"]},{"ref":"pkg:pypi/banks@2.2.0","dependsOn":["pkg:pypi/deprecated@1.2.18","pkg:pypi/griffe@1.13.0","pkg:pypi/jinja2@3.1.6","pkg:pypi/litellm@1.76.1","pkg:pypi/platformdirs@4.4.0","pkg:pypi/pydantic@2.11.7"]},{"ref":"pkg:pypi/soupsieve@2.8","dependsOn":[]},{"ref":"pkg:pypi/beautifulsoup4@4.13.5","dependsOn":["pkg:pypi/soupsieve@2.8","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/blinker@1.9.0","dependsOn":[]},{"ref":"pkg:pypi/blis@0.7.11","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/botocore@1.40.21","dependsOn":["pkg:pypi/jmespath@1.0.1","pkg:pypi/python-dateutil@2.9.0.post0","pkg:pypi/urllib3@2.5.0"]},{"ref":"pkg:pypi/s3transfer@0.13.1","dependsOn":["pkg:pypi/botocore@1.40.21"]},{"ref":"pkg:pypi/boto3@1.40.21","dependsOn":["pkg:pypi/botocore@1.40.21","pkg:pypi/jmespath@1.0.1","pkg:pypi/s3transfer@0.13.1"]},{"ref":"pkg:pypi/cachetools@5.5.2","dependsOn":[]},{"ref":"pkg:pypi/catalogue@2.0.10","dependsOn":[]},{"ref":"pkg:pypi/graphviz@0.21","dependsOn":[]},{"ref":"pkg:pypi/contourpy@1.3.3","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/fonttools@4.59.2","dependsOn":["pkg:pypi/matplotlib@3.10.6","pkg:pypi/scipy@1.16.1","pkg:pypi/sympy@1.14.0"]},{"ref":"pkg:pypi/kiwisolver@1.4.9","dependsOn":[]},{"ref":"pkg:pypi/pyparsing@3.2.3","dependsOn":[]},{"ref":"pkg:pypi/pandas@2.2.3","dependsOn":["pkg:pypi/beautifulsoup4@4.13.5","pkg:pypi/fsspec@2025.3.0","pkg:pypi/matplotlib@3.10.6","pkg:pypi/numba@0.61.2","pkg:pypi/numpy@1.26.4","pkg:pypi/pyarrow@21.0.0","pkg:pypi/pytest@8.4.1","pkg:pypi/python-dateutil@2.9.0.post0","pkg:pypi/pytz@2025.2","pkg:pypi/scipy@1.16.1","pkg:pypi/sqlalchemy@2.0.43","pkg:pypi/tabulate@0.9.0","pkg:pypi/tzdata@2025.2","pkg:pypi/zstandard@0.24.0"]},{"ref":"pkg:pypi/pytz@2025.2","dependsOn":[]},{"ref":"pkg:pypi/tzdata@2025.2","dependsOn":[]},{"ref":"pkg:pypi/numba@0.61.2","dependsOn":["pkg:pypi/llvmlite@0.44.0","pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/tabulate@0.9.0","dependsOn":[]},{"ref":"pkg:pypi/zstandard@0.24.0","dependsOn":[]},{"ref":"pkg:pypi/plotly@6.3.0","dependsOn":["pkg:pypi/narwhals@2.3.0","pkg:pypi/packaging@25.0"]},{"ref":"pkg:pypi/narwhals@2.3.0","dependsOn":[]},{"ref":"pkg:pypi/catboost@1.2.8","dependsOn":["pkg:pypi/graphviz@0.21","pkg:pypi/matplotlib@3.10.6","pkg:pypi/numpy@1.26.4","pkg:pypi/pandas@2.2.3","pkg:pypi/plotly@6.3.0","pkg:pypi/scipy@1.16.1","pkg:pypi/six@1.17.0"]},{"ref":"pkg:pypi/chardet@5.2.0","dependsOn":[]},{"ref":"pkg:pypi/logistro@1.1.0","dependsOn":[]},{"ref":"pkg:pypi/simplejson@3.20.1","dependsOn":[]},{"ref":"pkg:pypi/choreographer@1.0.10","dependsOn":["pkg:pypi/logistro@1.1.0","pkg:pypi/simplejson@3.20.1"]},{"ref":"pkg:pypi/deprecation@2.1.0","dependsOn":["pkg:pypi/packaging@25.0"]},{"ref":"pkg:pypi/cloudevents@1.12.0","dependsOn":["pkg:pypi/deprecation@2.1.0"]},{"ref":"pkg:pypi/cloudpathlib@0.22.0","dependsOn":["pkg:pypi/cloudpathlib@0.22.0"]},{"ref":"pkg:pypi/stanio@0.5.1","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/cmdstanpy@1.2.5","dependsOn":["pkg:pypi/numpy@1.26.4","pkg:pypi/pandas@2.2.3","pkg:pypi/stanio@0.5.1","pkg:pypi/tqdm@4.67.1"]},{"ref":"pkg:pypi/humanfriendly@10.0","dependsOn":[]},{"ref":"pkg:pypi/coloredlogs@15.0.1","dependsOn":["pkg:pypi/humanfriendly@10.0"]},{"ref":"pkg:pypi/colorlog@6.9.0","dependsOn":[]},{"ref":"pkg:pypi/comm@0.2.3","dependsOn":[]},{"ref":"pkg:pypi/srsly@2.5.1","dependsOn":["pkg:pypi/catalogue@2.0.10"]},{"ref":"pkg:pypi/confection@0.1.5","dependsOn":["pkg:pypi/pydantic@2.11.7","pkg:pypi/srsly@2.5.1"]},{"ref":"pkg:pypi/coverage@7.10.6","dependsOn":[]},{"ref":"pkg:pypi/rich-rst@1.3.1","dependsOn":["pkg:pypi/docutils@0.22","pkg:pypi/rich@14.1.0"]},{"ref":"pkg:pypi/docutils@0.22","dependsOn":[]},{"ref":"pkg:pypi/cyclopts@3.23.1","dependsOn":["pkg:pypi/attrs@25.3.0","pkg:pypi/docstring-parser@0.17.0","pkg:pypi/rich-rst@1.3.1","pkg:pypi/rich@14.1.0"]},{"ref":"pkg:pypi/cymem@2.0.11","dependsOn":[]},{"ref":"pkg:pypi/cython@3.1.3","dependsOn":[]},{"ref":"pkg:pypi/google-auth@2.40.3","dependsOn":["pkg:pypi/cachetools@5.5.2","pkg:pypi/pyasn1-modules@0.4.2","pkg:pypi/rsa@4.9.1"]},{"ref":"pkg:pypi/pyasn1-modules@0.4.2","dependsOn":["pkg:pypi/pyasn1@0.6.1"]},{"ref":"pkg:pypi/pyasn1@0.6.1","dependsOn":[]},{"ref":"pkg:pypi/rsa@4.9.1","dependsOn":["pkg:pypi/pyasn1@0.6.1"]},{"ref":"pkg:pypi/marshmallow@3.26.1","dependsOn":["pkg:pypi/packaging@25.0"]},{"ref":"pkg:pypi/typing-inspect@0.9.0","dependsOn":["pkg:pypi/mypy-extensions@1.1.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/mypy-extensions@1.1.0","dependsOn":[]},{"ref":"pkg:pypi/dataclasses-json@0.6.7","dependsOn":["pkg:pypi/marshmallow@3.26.1","pkg:pypi/typing-inspect@0.9.0"]},{"ref":"pkg:pypi/dill@0.3.8","dependsOn":[]},{"ref":"pkg:pypi/xxhash@3.5.0","dependsOn":[]},{"ref":"pkg:pypi/multiprocess@0.70.16","dependsOn":["pkg:pypi/dill@0.3.8"]},{"ref":"pkg:pypi/datasets@4.0.0","dependsOn":["pkg:pypi/dill@0.3.8","pkg:pypi/filelock@3.19.1","pkg:pypi/fsspec@2025.3.0","pkg:pypi/huggingface-hub@0.34.4","pkg:pypi/multiprocess@0.70.16","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pandas@2.2.3","pkg:pypi/pyarrow@21.0.0","pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/tqdm@4.67.1","pkg:pypi/xxhash@3.5.0"]},{"ref":"pkg:pypi/decorator@5.2.1","dependsOn":[]},{"ref":"pkg:pypi/defusedxml@0.7.1","dependsOn":[]},{"ref":"pkg:pypi/dirtyjson@1.0.8","dependsOn":[]},{"ref":"pkg:pypi/prophet@1.1.7","dependsOn":["pkg:pypi/cmdstanpy@1.2.5","pkg:pypi/holidays@0.80","pkg:pypi/importlib-resources@6.5.2","pkg:pypi/matplotlib@3.10.6","pkg:pypi/numpy@1.26.4","pkg:pypi/pandas@2.2.3","pkg:pypi/tqdm@4.67.1"]},{"ref":"pkg:pypi/holidays@0.80","dependsOn":["pkg:pypi/python-dateutil@2.9.0.post0"]},{"ref":"pkg:pypi/importlib-resources@6.5.2","dependsOn":[]},{"ref":"pkg:pypi/pmdarima@2.0.4","dependsOn":["pkg:pypi/cython@3.1.3","pkg:pypi/joblib@1.5.2","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pandas@2.2.3","pkg:pypi/scikit-learn@1.7.1","pkg:pypi/scipy@1.16.1","pkg:pypi/setuptools@80.9.0","pkg:pypi/statsmodels@0.14.5","pkg:pypi/urllib3@2.5.0"]},{"ref":"pkg:pypi/joblib@1.5.2","dependsOn":[]},{"ref":"pkg:pypi/scikit-learn@1.7.1","dependsOn":["pkg:pypi/joblib@1.5.2","pkg:pypi/numpy@1.26.4","pkg:pypi/scipy@1.16.1","pkg:pypi/threadpoolctl@3.6.0"]},{"ref":"pkg:pypi/threadpoolctl@3.6.0","dependsOn":[]},{"ref":"pkg:pypi/statsmodels@0.14.5","dependsOn":["pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pandas@2.2.3","pkg:pypi/patsy@1.0.1","pkg:pypi/scipy@1.16.1"]},{"ref":"pkg:pypi/patsy@1.0.1","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/diviner@0.1.1","dependsOn":["pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pandas@2.2.3","pkg:pypi/pmdarima@2.0.4","pkg:pypi/prophet@1.1.7"]},{"ref":"pkg:pypi/openai@1.102.0","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/distro@1.9.0","pkg:pypi/httpx@0.28.1","pkg:pypi/jiter@0.10.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/sniffio@1.3.1","pkg:pypi/tqdm@4.67.1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/optuna@4.5.0","dependsOn":["pkg:pypi/alembic@1.16.5","pkg:pypi/colorlog@6.9.0","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pyyaml@6.0.2","pkg:pypi/sqlalchemy@2.0.43","pkg:pypi/tqdm@4.67.1"]},{"ref":"pkg:pypi/magicattr@0.1.6","dependsOn":[]},{"ref":"pkg:pypi/fastuuid@0.12.0","dependsOn":[]},{"ref":"pkg:pypi/jsonschema@4.25.1","dependsOn":["pkg:pypi/attrs@25.3.0","pkg:pypi/jsonschema-specifications@2025.4.1","pkg:pypi/referencing@0.36.2","pkg:pypi/rpds-py@0.27.1"]},{"ref":"pkg:pypi/jsonschema-specifications@2025.4.1","dependsOn":["pkg:pypi/referencing@0.36.2"]},{"ref":"pkg:pypi/referencing@0.36.2","dependsOn":["pkg:pypi/attrs@25.3.0","pkg:pypi/rpds-py@0.27.1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/rpds-py@0.27.1","dependsOn":[]},{"ref":"pkg:pypi/tokenizers@0.22.0","dependsOn":["pkg:pypi/huggingface-hub@0.34.4"]},{"ref":"pkg:pypi/json-repair@0.50.0","dependsOn":[]},{"ref":"pkg:pypi/tenacity@9.1.2","dependsOn":[]},{"ref":"pkg:pypi/gepa@0.0.7","dependsOn":[]},{"ref":"pkg:pypi/dspy@3.0.3","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/asyncer@0.0.8","pkg:pypi/backoff@2.2.1","pkg:pypi/cachetools@5.5.2","pkg:pypi/cloudpickle@3.1.1","pkg:pypi/diskcache@5.6.3","pkg:pypi/gepa@0.0.7","pkg:pypi/joblib@1.5.2","pkg:pypi/json-repair@0.50.0","pkg:pypi/litellm@1.76.1","pkg:pypi/magicattr@0.1.6","pkg:pypi/numpy@1.26.4","pkg:pypi/openai@1.102.0","pkg:pypi/optuna@4.5.0","pkg:pypi/orjson@3.11.3","pkg:pypi/pydantic@2.11.7","pkg:pypi/regex@2025.9.1","pkg:pypi/requests@2.32.5","pkg:pypi/rich@14.1.0","pkg:pypi/tenacity@9.1.2","pkg:pypi/tqdm@4.67.1","pkg:pypi/xxhash@3.5.0"]},{"ref":"pkg:pypi/eval-type-backport@0.2.2","dependsOn":[]},{"ref":"pkg:pypi/evaluate@0.4.5","dependsOn":["pkg:pypi/datasets@4.0.0","pkg:pypi/dill@0.3.8","pkg:pypi/fsspec@2025.3.0","pkg:pypi/huggingface-hub@0.34.4","pkg:pypi/multiprocess@0.70.16","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pandas@2.2.3","pkg:pypi/requests@2.32.5","pkg:pypi/tqdm@4.67.1","pkg:pypi/xxhash@3.5.0"]},{"ref":"pkg:pypi/exceptiongroup@1.3.0","dependsOn":["pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/executing@2.2.1","dependsOn":[]},{"ref":"pkg:pypi/mcp@1.13.1","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/httpx-sse@0.4.1","pkg:pypi/httpx@0.28.1","pkg:pypi/jsonschema@4.25.1","pkg:pypi/pydantic-settings@2.10.1","pkg:pypi/pydantic@2.11.7","pkg:pypi/python-multipart@0.0.20","pkg:pypi/sse-starlette@3.0.2","pkg:pypi/starlette@0.47.3","pkg:pypi/uvicorn@0.35.0"]},{"ref":"pkg:pypi/httpx-sse@0.4.1","dependsOn":[]},{"ref":"pkg:pypi/sse-starlette@3.0.2","dependsOn":["pkg:pypi/anyio@4.10.0"]},{"ref":"pkg:pypi/openapi-core@0.19.5","dependsOn":["pkg:pypi/isodate@0.7.2","pkg:pypi/jsonschema-path@0.3.4","pkg:pypi/jsonschema@4.25.1","pkg:pypi/more-itertools@10.7.0","pkg:pypi/openapi-schema-validator@0.6.3","pkg:pypi/openapi-spec-validator@0.7.2","pkg:pypi/parse@1.20.2","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/werkzeug@3.1.1"]},{"ref":"pkg:pypi/jsonschema-path@0.3.4","dependsOn":["pkg:pypi/pathable@0.4.4","pkg:pypi/pyyaml@6.0.2","pkg:pypi/referencing@0.36.2","pkg:pypi/requests@2.32.5"]},{"ref":"pkg:pypi/pathable@0.4.4","dependsOn":[]},{"ref":"pkg:pypi/more-itertools@10.7.0","dependsOn":[]},{"ref":"pkg:pypi/openapi-schema-validator@0.6.3","dependsOn":["pkg:pypi/jsonschema-specifications@2025.4.1","pkg:pypi/jsonschema@4.25.1","pkg:pypi/rfc3339-validator@0.1.4"]},{"ref":"pkg:pypi/rfc3339-validator@0.1.4","dependsOn":["pkg:pypi/six@1.17.0"]},{"ref":"pkg:pypi/openapi-spec-validator@0.7.2","dependsOn":["pkg:pypi/jsonschema-path@0.3.4","pkg:pypi/jsonschema@4.25.1","pkg:pypi/lazy-object-proxy@1.12.0","pkg:pypi/openapi-schema-validator@0.6.3"]},{"ref":"pkg:pypi/lazy-object-proxy@1.12.0","dependsOn":[]},{"ref":"pkg:pypi/parse@1.20.2","dependsOn":[]},{"ref":"pkg:pypi/werkzeug@3.1.1","dependsOn":["pkg:pypi/markupsafe@3.0.2"]},{"ref":"pkg:pypi/openapi-pydantic@0.5.1","dependsOn":["pkg:pypi/pydantic@2.11.7"]},{"ref":"pkg:pypi/pyperclip@1.9.0","dependsOn":[]},{"ref":"pkg:pypi/ffmpeg@1.4","dependsOn":[]},{"ref":"pkg:pypi/filetype@1.2.0","dependsOn":[]},{"ref":"pkg:pypi/flask@3.1.2","dependsOn":["pkg:pypi/blinker@1.9.0","pkg:pypi/click@8.2.1","pkg:pypi/itsdangerous@2.2.0","pkg:pypi/jinja2@3.1.6","pkg:pypi/markupsafe@3.0.2","pkg:pypi/werkzeug@3.1.1"]},{"ref":"pkg:pypi/flask-cors@6.0.1","dependsOn":["pkg:pypi/flask@3.1.2","pkg:pypi/werkzeug@3.1.1"]},{"ref":"pkg:pypi/flask-restx@1.3.0","dependsOn":["pkg:pypi/aniso8601@10.0.1","pkg:pypi/flask@3.1.2","pkg:pypi/importlib-resources@6.5.2","pkg:pypi/jsonschema@4.25.1","pkg:pypi/pytz@2025.2","pkg:pypi/werkzeug@3.1.1"]},{"ref":"pkg:pypi/wtforms@3.2.1","dependsOn":["pkg:pypi/markupsafe@3.0.2"]},{"ref":"pkg:pypi/flatbuffers@25.2.10","dependsOn":[]},{"ref":"pkg:pypi/future@1.0.0","dependsOn":[]},{"ref":"pkg:pypi/gast@0.6.0","dependsOn":[]},{"ref":"pkg:pypi/websockets@15.0.1","dependsOn":[]},{"ref":"pkg:pypi/google-genai@1.32.0","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/google-auth@2.40.3","pkg:pypi/httpx@0.28.1","pkg:pypi/pydantic@2.11.7","pkg:pypi/requests@2.32.5","pkg:pypi/tenacity@9.1.2","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/websockets@15.0.1"]},{"ref":"pkg:pypi/google-pasta@0.2.0","dependsOn":["pkg:pypi/six@1.17.0"]},{"ref":"pkg:pypi/googleapis-common-protos@1.70.0","dependsOn":["pkg:pypi/protobuf@6.32.0"]},{"ref":"pkg:pypi/graphql-core@3.2.6","dependsOn":[]},{"ref":"pkg:pypi/graphql-relay@3.2.0","dependsOn":["pkg:pypi/graphql-core@3.2.6"]},{"ref":"pkg:pypi/greenlet@3.2.4","dependsOn":[]},{"ref":"pkg:pypi/groq@0.31.0","dependsOn":["pkg:pypi/anyio@4.10.0","pkg:pypi/distro@1.9.0","pkg:pypi/httpx@0.28.1","pkg:pypi/pydantic@2.11.7","pkg:pypi/sniffio@1.3.1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/grpcio@1.74.0","dependsOn":[]},{"ref":"pkg:pypi/gunicorn@23.0.0","dependsOn":["pkg:pypi/packaging@25.0"]},{"ref":"pkg:pypi/h2o@3.46.0.7","dependsOn":["pkg:pypi/requests@2.32.5","pkg:pypi/tabulate@0.9.0"]},{"ref":"pkg:pypi/hyperopt@0.2.7","dependsOn":["pkg:pypi/cloudpickle@3.1.1","pkg:pypi/future@1.0.0","pkg:pypi/networkx@3.5","pkg:pypi/numpy@1.26.4","pkg:pypi/py4j@0.10.9.9","pkg:pypi/scipy@1.16.1","pkg:pypi/six@1.17.0","pkg:pypi/tqdm@4.67.1"]},{"ref":"pkg:pypi/iniconfig@2.1.0","dependsOn":[]},{"ref":"pkg:pypi/invoke@2.2.0","dependsOn":[]},{"ref":"pkg:pypi/ipython-pygments-lexers@1.1.1","dependsOn":["pkg:pypi/pygments@2.19.2"]},{"ref":"pkg:pypi/parso@0.8.5","dependsOn":[]},{"ref":"pkg:pypi/matplotlib-inline@0.1.7","dependsOn":["pkg:pypi/traitlets@5.14.3"]},{"ref":"pkg:pypi/traitlets@5.14.3","dependsOn":[]},{"ref":"pkg:pypi/pexpect@4.9.0","dependsOn":["pkg:pypi/ptyprocess@0.7.0"]},{"ref":"pkg:pypi/ptyprocess@0.7.0","dependsOn":[]},{"ref":"pkg:pypi/prompt-toolkit@3.0.52","dependsOn":["pkg:pypi/wcwidth@0.2.13"]},{"ref":"pkg:pypi/wcwidth@0.2.13","dependsOn":[]},{"ref":"pkg:pypi/stack-data@0.6.3","dependsOn":["pkg:pypi/asttokens@3.0.0","pkg:pypi/executing@2.2.1","pkg:pypi/pure-eval@0.2.3"]},{"ref":"pkg:pypi/pure-eval@0.2.3","dependsOn":[]},{"ref":"pkg:pypi/ipython@9.5.0","dependsOn":["pkg:pypi/decorator@5.2.1","pkg:pypi/ipython-pygments-lexers@1.1.1","pkg:pypi/ipython@9.5.0","pkg:pypi/jedi@0.19.2","pkg:pypi/matplotlib-inline@0.1.7","pkg:pypi/pexpect@4.9.0","pkg:pypi/prompt-toolkit@3.0.52","pkg:pypi/pygments@2.19.2","pkg:pypi/stack-data@0.6.3","pkg:pypi/traitlets@5.14.3"]},{"ref":"pkg:pypi/widgetsnbextension@4.0.14","dependsOn":[]},{"ref":"pkg:pypi/jupyterlab-widgets@3.0.15","dependsOn":[]},{"ref":"pkg:pypi/ipywidgets@8.1.7","dependsOn":["pkg:pypi/comm@0.2.3","pkg:pypi/ipython@9.5.0","pkg:pypi/jupyterlab-widgets@3.0.15","pkg:pypi/traitlets@5.14.3","pkg:pypi/widgetsnbextension@4.0.14"]},{"ref":"pkg:pypi/jaraco.classes@3.4.0","dependsOn":["pkg:pypi/more-itertools@10.7.0"]},{"ref":"pkg:pypi/jsonpointer@3.0.0","dependsOn":[]},{"ref":"pkg:pypi/jsonpatch@1.33","dependsOn":["pkg:pypi/jsonpointer@3.0.0"]},{"ref":"pkg:pypi/kaleido@1.0.0","dependsOn":["pkg:pypi/choreographer@1.0.10","pkg:pypi/logistro@1.1.0","pkg:pypi/orjson@3.11.3","pkg:pypi/packaging@25.0"]},{"ref":"pkg:pypi/namex@0.1.0","dependsOn":[]},{"ref":"pkg:pypi/optree@0.17.0","dependsOn":["pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/ml-dtypes@0.3.2","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/keras@3.11.3","dependsOn":["pkg:pypi/absl-py@2.3.1","pkg:pypi/h5py@3.14.0","pkg:pypi/ml-dtypes@0.3.2","pkg:pypi/namex@0.1.0","pkg:pypi/numpy@1.26.4","pkg:pypi/optree@0.17.0","pkg:pypi/packaging@25.0","pkg:pypi/rich@14.1.0"]},{"ref":"pkg:pypi/keyring@24.3.1","dependsOn":["pkg:pypi/jaraco.classes@3.4.0"]},{"ref":"pkg:pypi/langsmith@0.4.21","dependsOn":["pkg:pypi/httpx@0.28.1","pkg:pypi/orjson@3.11.3","pkg:pypi/packaging@25.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/requests-toolbelt@1.0.0","pkg:pypi/requests@2.32.5","pkg:pypi/zstandard@0.24.0"]},{"ref":"pkg:pypi/requests-toolbelt@1.0.0","dependsOn":["pkg:pypi/requests@2.32.5"]},{"ref":"pkg:pypi/langchain-text-splitters@0.3.11","dependsOn":["pkg:pypi/langchain-core@0.3.75"]},{"ref":"pkg:pypi/langchain@0.3.27","dependsOn":["pkg:pypi/langchain-core@0.3.75","pkg:pypi/langchain-text-splitters@0.3.11","pkg:pypi/langsmith@0.4.21","pkg:pypi/pydantic@2.11.7","pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/sqlalchemy@2.0.43"]},{"ref":"pkg:pypi/language-data@1.3.0","dependsOn":["pkg:pypi/marisa-trie@1.3.1"]},{"ref":"pkg:pypi/marisa-trie@1.3.1","dependsOn":[]},{"ref":"pkg:pypi/langcodes@3.5.0","dependsOn":["pkg:pypi/language-data@1.3.0"]},{"ref":"pkg:pypi/lazy-loader@0.4","dependsOn":["pkg:pypi/packaging@25.0"]},{"ref":"pkg:pypi/libclang@18.1.1","dependsOn":[]},{"ref":"pkg:pypi/llvmlite@0.44.0","dependsOn":[]},{"ref":"pkg:pypi/pooch@1.8.2","dependsOn":["pkg:pypi/packaging@25.0","pkg:pypi/platformdirs@4.4.0","pkg:pypi/requests@2.32.5"]},{"ref":"pkg:pypi/soxr@0.5.0.post1","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/msgpack@1.1.1","dependsOn":[]},{"ref":"pkg:pypi/librosa@0.11.0","dependsOn":["pkg:pypi/audioread@3.0.1","pkg:pypi/decorator@5.2.1","pkg:pypi/joblib@1.5.2","pkg:pypi/lazy-loader@0.4","pkg:pypi/msgpack@1.1.1","pkg:pypi/numba@0.61.2","pkg:pypi/numpy@1.26.4","pkg:pypi/pooch@1.8.2","pkg:pypi/scikit-learn@1.7.1","pkg:pypi/scipy@1.16.1","pkg:pypi/soundfile@0.13.1","pkg:pypi/soxr@0.5.0.post1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/lightgbm@4.6.0","dependsOn":["pkg:pypi/numpy@1.26.4","pkg:pypi/scipy@1.16.1"]},{"ref":"pkg:pypi/lightning-utilities@0.15.2","dependsOn":["pkg:pypi/packaging@25.0","pkg:pypi/setuptools@80.9.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/onnxruntime@1.22.1","dependsOn":["pkg:pypi/coloredlogs@15.0.1","pkg:pypi/flatbuffers@25.2.10","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/protobuf@6.32.0","pkg:pypi/sympy@1.14.0"]},{"ref":"pkg:pypi/torchvision@0.23.0","dependsOn":["pkg:pypi/numpy@1.26.4","pkg:pypi/pillow@11.0.0","pkg:pypi/torch@2.8.0"]},{"ref":"pkg:pypi/transformers@4.56.0","dependsOn":["pkg:pypi/accelerate@1.10.1","pkg:pypi/av@14.4.0","pkg:pypi/filelock@3.19.1","pkg:pypi/huggingface-hub@0.34.4","pkg:pypi/librosa@0.11.0","pkg:pypi/numpy@1.26.4","pkg:pypi/optuna@4.5.0","pkg:pypi/packaging@25.0","pkg:pypi/protobuf@6.32.0","pkg:pypi/pyyaml@6.0.2","pkg:pypi/regex@2025.9.1","pkg:pypi/requests@2.32.5","pkg:pypi/safetensors@0.6.2","pkg:pypi/scipy@1.16.1","pkg:pypi/sentencepiece@0.2.1","pkg:pypi/tensorflow@2.16.2","pkg:pypi/tf2onnx@1.8.4","pkg:pypi/tokenizers@0.22.0","pkg:pypi/torch@2.8.0","pkg:pypi/torchvision@0.23.0","pkg:pypi/tqdm@4.67.1"]},{"ref":"pkg:pypi/tensorflow@2.16.2","dependsOn":["pkg:pypi/absl-py@2.3.1","pkg:pypi/astunparse@1.6.3","pkg:pypi/flatbuffers@25.2.10","pkg:pypi/gast@0.6.0","pkg:pypi/google-pasta@0.2.0","pkg:pypi/grpcio@1.74.0","pkg:pypi/h5py@3.14.0","pkg:pypi/keras@3.11.3","pkg:pypi/libclang@18.1.1","pkg:pypi/ml-dtypes@0.3.2","pkg:pypi/numpy@1.26.4","pkg:pypi/opt-einsum@3.3.0","pkg:pypi/packaging@25.0","pkg:pypi/protobuf@6.32.0","pkg:pypi/requests@2.32.5","pkg:pypi/setuptools@80.9.0","pkg:pypi/six@1.17.0","pkg:pypi/tensorboard@2.16.2","pkg:pypi/termcolor@3.1.0","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/wrapt@1.17.3"]},{"ref":"pkg:pypi/tf2onnx@1.8.4","dependsOn":["pkg:pypi/flatbuffers@25.2.10","pkg:pypi/numpy@1.26.4","pkg:pypi/onnx@1.19.0","pkg:pypi/requests@2.32.5","pkg:pypi/six@1.17.0"]},{"ref":"pkg:pypi/sentencepiece@0.2.1","dependsOn":[]},{"ref":"pkg:pypi/nltk@3.9.1","dependsOn":["pkg:pypi/click@8.2.1","pkg:pypi/joblib@1.5.2","pkg:pypi/matplotlib@3.10.6","pkg:pypi/numpy@1.26.4","pkg:pypi/pyparsing@3.2.3","pkg:pypi/regex@2025.9.1","pkg:pypi/requests@2.32.5","pkg:pypi/scikit-learn@1.7.1","pkg:pypi/scipy@1.16.1","pkg:pypi/tqdm@4.67.1"]},{"ref":"pkg:pypi/lightning@2.5.4","dependsOn":["pkg:pypi/fsspec@2025.3.0","pkg:pypi/ipython@9.5.0","pkg:pypi/lightning-utilities@0.15.2","pkg:pypi/matplotlib@3.10.6","pkg:pypi/packaging@25.0","pkg:pypi/pytorch-lightning@2.5.4","pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/rich@14.1.0","pkg:pypi/torch@2.8.0","pkg:pypi/torchmetrics@1.8.1","pkg:pypi/torchvision@0.23.0","pkg:pypi/tqdm@4.67.1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/llama-cloud@0.1.35","dependsOn":["pkg:pypi/certifi@2025.8.3","pkg:pypi/httpx@0.28.1","pkg:pypi/pydantic@2.11.7"]},{"ref":"pkg:pypi/llama-index-core@0.12.52.post1","dependsOn":["pkg:pypi/aiohttp@3.12.15","pkg:pypi/aiosqlite@0.21.0","pkg:pypi/banks@2.2.0","pkg:pypi/dataclasses-json@0.6.7","pkg:pypi/deprecated@1.2.18","pkg:pypi/dirtyjson@1.0.8","pkg:pypi/filetype@1.2.0","pkg:pypi/fsspec@2025.3.0","pkg:pypi/httpx@0.28.1","pkg:pypi/llama-index-workflows@1.3.0","pkg:pypi/nest-asyncio@1.6.0","pkg:pypi/networkx@3.5","pkg:pypi/nltk@3.9.1","pkg:pypi/numpy@1.26.4","pkg:pypi/pillow@11.0.0","pkg:pypi/platformdirs@4.4.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/setuptools@80.9.0","pkg:pypi/sqlalchemy@2.0.43","pkg:pypi/tenacity@9.1.2","pkg:pypi/tiktoken@0.11.0","pkg:pypi/tqdm@4.67.1","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/typing-inspect@0.9.0","pkg:pypi/wrapt@1.17.3"]},{"ref":"pkg:pypi/llama-index-workflows@1.3.0","dependsOn":["pkg:pypi/llama-index-instrumentation@0.4.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/llama-index-instrumentation@0.4.0","dependsOn":["pkg:pypi/deprecated@1.2.18","pkg:pypi/pydantic@2.11.7"]},{"ref":"pkg:pypi/nest-asyncio@1.6.0","dependsOn":[]},{"ref":"pkg:pypi/llama-cloud-services@0.6.54","dependsOn":["pkg:pypi/click@8.2.1","pkg:pypi/llama-cloud@0.1.35","pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/platformdirs@4.4.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/python-dotenv@1.1.1","pkg:pypi/tenacity@9.1.2"]},{"ref":"pkg:pypi/llama-index-agent-openai@0.4.12","dependsOn":["pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/llama-index-llms-openai@0.4.7","pkg:pypi/openai@1.102.0"]},{"ref":"pkg:pypi/llama-index-llms-openai@0.4.7","dependsOn":["pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/openai@1.102.0"]},{"ref":"pkg:pypi/llama-index-cli@0.4.4","dependsOn":["pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/llama-index-embeddings-openai@0.3.1","pkg:pypi/llama-index-llms-openai@0.4.7"]},{"ref":"pkg:pypi/llama-index-embeddings-openai@0.3.1","dependsOn":["pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/openai@1.102.0"]},{"ref":"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0","dependsOn":["pkg:pypi/llama-cloud@0.1.35","pkg:pypi/llama-index-core@0.12.52.post1"]},{"ref":"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3","dependsOn":["pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/llama-index-llms-openai@0.4.7"]},{"ref":"pkg:pypi/llama-index-program-openai@0.3.2","dependsOn":["pkg:pypi/llama-index-agent-openai@0.4.12","pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/llama-index-llms-openai@0.4.7"]},{"ref":"pkg:pypi/llama-index-question-gen-openai@0.3.1","dependsOn":["pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/llama-index-llms-openai@0.4.7","pkg:pypi/llama-index-program-openai@0.3.2"]},{"ref":"pkg:pypi/llama-index-readers-file@0.4.11","dependsOn":["pkg:pypi/beautifulsoup4@4.13.5","pkg:pypi/defusedxml@0.7.1","pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/pandas@2.2.3","pkg:pypi/pypdf@5.9.0","pkg:pypi/striprtf@0.0.26"]},{"ref":"pkg:pypi/pypdf@5.9.0","dependsOn":[]},{"ref":"pkg:pypi/striprtf@0.0.26","dependsOn":[]},{"ref":"pkg:pypi/llama-index-readers-llama-parse@0.4.0","dependsOn":["pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/llama-parse@0.6.54"]},{"ref":"pkg:pypi/llama-parse@0.6.54","dependsOn":["pkg:pypi/llama-cloud-services@0.6.54"]},{"ref":"pkg:pypi/llama-index@0.12.52","dependsOn":["pkg:pypi/llama-index-agent-openai@0.4.12","pkg:pypi/llama-index-cli@0.4.4","pkg:pypi/llama-index-core@0.12.52.post1","pkg:pypi/llama-index-embeddings-openai@0.3.1","pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0","pkg:pypi/llama-index-llms-openai@0.4.7","pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3","pkg:pypi/llama-index-program-openai@0.3.2","pkg:pypi/llama-index-question-gen-openai@0.3.1","pkg:pypi/llama-index-readers-file@0.4.11","pkg:pypi/llama-index-readers-llama-parse@0.4.0","pkg:pypi/nltk@3.9.1"]},{"ref":"pkg:pypi/markdown@3.8.2","dependsOn":[]},{"ref":"pkg:pypi/mistralai@1.9.10","dependsOn":["pkg:pypi/eval-type-backport@0.2.2","pkg:pypi/httpx@0.28.1","pkg:pypi/invoke@2.2.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/python-dateutil@2.9.0.post0","pkg:pypi/pyyaml@6.0.2","pkg:pypi/typing-inspection@0.4.1"]},{"ref":"pkg:pypi/opentelemetry-proto@1.36.0","dependsOn":["pkg:pypi/protobuf@6.32.0"]},{"ref":"pkg:pypi/mlflow@3.3.3.dev0","dependsOn":["pkg:pypi/alembic@1.16.5","pkg:pypi/cachetools@5.5.2","pkg:pypi/click@8.2.1","pkg:pypi/cloudpickle@3.1.1","pkg:pypi/cryptography@45.0.7","pkg:pypi/databricks-sdk@0.65.0","pkg:pypi/docker@7.1.0","pkg:pypi/fastapi@0.116.1","pkg:pypi/fastmcp@2.12.0","pkg:pypi/flask@3.1.2","pkg:pypi/gitpython@3.1.45","pkg:pypi/graphene@3.4.3","pkg:pypi/gunicorn@23.0.0","pkg:pypi/importlib-metadata@8.4.0","pkg:pypi/matplotlib@3.10.6","pkg:pypi/numpy@1.26.4","pkg:pypi/opentelemetry-api@1.36.0","pkg:pypi/opentelemetry-proto@1.36.0","pkg:pypi/opentelemetry-sdk@1.36.0","pkg:pypi/packaging@25.0","pkg:pypi/pandas@2.2.3","pkg:pypi/protobuf@6.32.0","pkg:pypi/pyarrow@21.0.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/scikit-learn@1.7.1","pkg:pypi/scipy@1.16.1","pkg:pypi/sqlalchemy@2.0.43","pkg:pypi/sqlparse@0.5.3","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/uvicorn@0.35.0"]},{"ref":"pkg:pypi/xmltodict@0.14.2","dependsOn":[]},{"ref":"pkg:pypi/responses@0.25.8","dependsOn":["pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/urllib3@2.5.0"]},{"ref":"pkg:pypi/moto@4.2.14","dependsOn":["pkg:pypi/boto3@1.40.21","pkg:pypi/botocore@1.40.21","pkg:pypi/cryptography@45.0.7","pkg:pypi/docker@7.1.0","pkg:pypi/graphql-core@3.2.6","pkg:pypi/jinja2@3.1.6","pkg:pypi/openapi-spec-validator@0.7.2","pkg:pypi/pyparsing@3.2.3","pkg:pypi/python-dateutil@2.9.0.post0","pkg:pypi/pyyaml@6.0.2","pkg:pypi/requests@2.32.5","pkg:pypi/responses@0.25.8","pkg:pypi/setuptools@80.9.0","pkg:pypi/werkzeug@3.1.1","pkg:pypi/xmltodict@0.14.2"]},{"ref":"pkg:pypi/murmurhash@1.0.13","dependsOn":[]},{"ref":"pkg:pypi/onnx@1.19.0","dependsOn":["pkg:pypi/ml-dtypes@0.3.2","pkg:pypi/numpy@1.26.4","pkg:pypi/protobuf@6.32.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/opentelemetry-exporter-otlp-proto-common@1.36.0","dependsOn":["pkg:pypi/opentelemetry-proto@1.36.0"]},{"ref":"pkg:pypi/opentelemetry-exporter-otlp-proto-grpc@1.36.0","dependsOn":["pkg:pypi/googleapis-common-protos@1.70.0","pkg:pypi/grpcio@1.74.0","pkg:pypi/opentelemetry-api@1.36.0","pkg:pypi/opentelemetry-exporter-otlp-proto-common@1.36.0","pkg:pypi/opentelemetry-proto@1.36.0","pkg:pypi/opentelemetry-sdk@1.36.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/opentelemetry-exporter-otlp-proto-http@1.36.0","dependsOn":["pkg:pypi/googleapis-common-protos@1.70.0","pkg:pypi/opentelemetry-api@1.36.0","pkg:pypi/opentelemetry-exporter-otlp-proto-common@1.36.0","pkg:pypi/opentelemetry-proto@1.36.0","pkg:pypi/opentelemetry-sdk@1.36.0","pkg:pypi/requests@2.32.5","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/opt-einsum@3.3.0","dependsOn":["pkg:pypi/numpy@1.26.4"]},{"ref":"pkg:pypi/paddlepaddle@3.1.1","dependsOn":["pkg:pypi/httpx@0.28.1","pkg:pypi/networkx@3.5","pkg:pypi/numpy@1.26.4","pkg:pypi/opt-einsum@3.3.0","pkg:pypi/pillow@11.0.0","pkg:pypi/protobuf@6.32.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/pluggy@1.6.0","dependsOn":[]},{"ref":"pkg:pypi/polars@1.33.0","dependsOn":["pkg:pypi/polars@1.33.0"]},{"ref":"pkg:pypi/ruamel.yaml@0.18.15","dependsOn":["pkg:pypi/ruamel.yaml.clib@0.2.12"]},{"ref":"pkg:pypi/ruamel.yaml.clib@0.2.12","dependsOn":[]},{"ref":"pkg:pypi/prance@25.4.8.0","dependsOn":["pkg:pypi/chardet@5.2.0","pkg:pypi/packaging@25.0","pkg:pypi/requests@2.32.5","pkg:pypi/ruamel.yaml@0.18.15"]},{"ref":"pkg:pypi/preshed@3.0.10","dependsOn":["pkg:pypi/cymem@2.0.11","pkg:pypi/murmurhash@1.0.13"]},{"ref":"pkg:pypi/promptflow-tracing@1.18.1","dependsOn":["pkg:pypi/openai@1.102.0","pkg:pypi/opentelemetry-sdk@1.36.0","pkg:pypi/tiktoken@0.11.0"]},{"ref":"pkg:pypi/promptflow-core@1.18.1","dependsOn":["pkg:pypi/docstring-parser@0.17.0","pkg:pypi/fastapi@0.116.1","pkg:pypi/filetype@1.2.0","pkg:pypi/flask@3.1.2","pkg:pypi/jsonschema@4.25.1","pkg:pypi/promptflow-tracing@1.18.1","pkg:pypi/psutil@7.0.0","pkg:pypi/python-dateutil@2.9.0.post0","pkg:pypi/ruamel.yaml@0.18.15"]},{"ref":"pkg:pypi/promptflow-devkit@1.18.1","dependsOn":["pkg:pypi/argcomplete@3.6.2","pkg:pypi/azure-monitor-opentelemetry-exporter@1.0.0b40","pkg:pypi/colorama@0.4.6","pkg:pypi/cryptography@45.0.7","pkg:pypi/filelock@3.19.1","pkg:pypi/flask-cors@6.0.1","pkg:pypi/flask-restx@1.3.0","pkg:pypi/gitpython@3.1.45","pkg:pypi/httpx@0.28.1","pkg:pypi/keyring@24.3.1","pkg:pypi/marshmallow@3.26.1","pkg:pypi/opentelemetry-exporter-otlp-proto-http@1.36.0","pkg:pypi/pandas@2.2.3","pkg:pypi/pillow@11.0.0","pkg:pypi/promptflow-core@1.18.1","pkg:pypi/pydash@7.0.7","pkg:pypi/python-dotenv@1.1.1","pkg:pypi/sqlalchemy@2.0.43","pkg:pypi/strictyaml@1.7.3","pkg:pypi/tabulate@0.9.0","pkg:pypi/waitress@3.0.2"]},{"ref":"pkg:pypi/pydash@7.0.7","dependsOn":["pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/strictyaml@1.7.3","dependsOn":["pkg:pypi/python-dateutil@2.9.0.post0"]},{"ref":"pkg:pypi/waitress@3.0.2","dependsOn":[]},{"ref":"pkg:pypi/promptflow@1.18.1","dependsOn":["pkg:pypi/promptflow-core@1.18.1","pkg:pypi/promptflow-devkit@1.18.1","pkg:pypi/promptflow-tracing@1.18.1"]},{"ref":"pkg:pypi/pymeta3@0.5.1","dependsOn":[]},{"ref":"pkg:pypi/pybars4@0.9.13","dependsOn":["pkg:pypi/pymeta3@0.5.1"]},{"ref":"pkg:pypi/pyphen@0.17.2","dependsOn":[]},{"ref":"pkg:pypi/pyspark@4.0.0","dependsOn":["pkg:pypi/py4j@0.10.9.9"]},{"ref":"pkg:pypi/pytest-localserver@0.5.0","dependsOn":["pkg:pypi/werkzeug@3.1.1"]},{"ref":"pkg:pypi/pytest-repeat@0.9.4","dependsOn":["pkg:pypi/pytest@8.4.1"]},{"ref":"pkg:pypi/pytest-timeout@2.4.0","dependsOn":["pkg:pypi/pytest@8.4.1"]},{"ref":"pkg:pypi/rouge-score@0.1.2","dependsOn":["pkg:pypi/absl-py@2.3.1","pkg:pypi/nltk@3.9.1","pkg:pypi/numpy@1.26.4","pkg:pypi/six@1.17.0"]},{"ref":"pkg:pypi/semantic-kernel@1.36.1","dependsOn":["pkg:pypi/aiohttp@3.12.15","pkg:pypi/aiortc@1.13.0","pkg:pypi/azure-ai-agents@1.2.0b3","pkg:pypi/azure-ai-projects@1.1.0b3","pkg:pypi/azure-identity@1.24.0","pkg:pypi/cloudevents@1.12.0","pkg:pypi/defusedxml@0.7.1","pkg:pypi/jinja2@3.1.6","pkg:pypi/nest-asyncio@1.6.0","pkg:pypi/numpy@1.26.4","pkg:pypi/openai@1.102.0","pkg:pypi/openapi-core@0.19.5","pkg:pypi/opentelemetry-api@1.36.0","pkg:pypi/opentelemetry-sdk@1.36.0","pkg:pypi/prance@25.4.8.0","pkg:pypi/protobuf@6.32.0","pkg:pypi/pybars4@0.9.13","pkg:pypi/pydantic-settings@2.10.1","pkg:pypi/pydantic@2.11.7","pkg:pypi/scipy@1.16.1","pkg:pypi/typing-extensions@4.15.0","pkg:pypi/websockets@15.0.1"]},{"ref":"pkg:pypi/sentence-transformers@5.1.0","dependsOn":["pkg:pypi/huggingface-hub@0.34.4","pkg:pypi/pillow@11.0.0","pkg:pypi/scikit-learn@1.7.1","pkg:pypi/scipy@1.16.1","pkg:pypi/torch@2.8.0","pkg:pypi/tqdm@4.67.1","pkg:pypi/transformers@4.56.0","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/setfit@1.1.3","dependsOn":["pkg:pypi/datasets@4.0.0","pkg:pypi/evaluate@0.4.5","pkg:pypi/huggingface-hub@0.34.4","pkg:pypi/packaging@25.0","pkg:pypi/scikit-learn@1.7.1","pkg:pypi/sentence-transformers@5.1.0","pkg:pypi/transformers@4.56.0"]},{"ref":"pkg:pypi/slicer@0.0.8","dependsOn":[]},{"ref":"pkg:pypi/shap@0.48.0","dependsOn":["pkg:pypi/cloudpickle@3.1.1","pkg:pypi/numba@0.61.2","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/pandas@2.2.3","pkg:pypi/scikit-learn@1.7.1","pkg:pypi/scipy@1.16.1","pkg:pypi/slicer@0.0.8","pkg:pypi/tqdm@4.67.1","pkg:pypi/typing-extensions@4.15.0"]},{"ref":"pkg:pypi/smart-open@7.3.0.post1","dependsOn":["pkg:pypi/smart-open@7.3.0.post1","pkg:pypi/wrapt@1.17.3"]},{"ref":"pkg:pypi/spacy-legacy@3.0.12","dependsOn":[]},{"ref":"pkg:pypi/spacy-loggers@1.0.5","dependsOn":[]},{"ref":"pkg:pypi/thinc@8.2.5","dependsOn":["pkg:pypi/blis@0.7.11","pkg:pypi/catalogue@2.0.10","pkg:pypi/confection@0.1.5","pkg:pypi/cymem@2.0.11","pkg:pypi/murmurhash@1.0.13","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/preshed@3.0.10","pkg:pypi/pydantic@2.11.7","pkg:pypi/setuptools@80.9.0","pkg:pypi/srsly@2.5.1","pkg:pypi/wasabi@1.1.3"]},{"ref":"pkg:pypi/wasabi@1.1.3","dependsOn":[]},{"ref":"pkg:pypi/weasel@0.4.1","dependsOn":["pkg:pypi/cloudpathlib@0.22.0","pkg:pypi/confection@0.1.5","pkg:pypi/packaging@25.0","pkg:pypi/pydantic@2.11.7","pkg:pypi/requests@2.32.5","pkg:pypi/smart-open@7.3.0.post1","pkg:pypi/srsly@2.5.1","pkg:pypi/typer@0.17.3","pkg:pypi/wasabi@1.1.3"]},{"ref":"pkg:pypi/spacy@3.7.5","dependsOn":["pkg:pypi/catalogue@2.0.10","pkg:pypi/cymem@2.0.11","pkg:pypi/jinja2@3.1.6","pkg:pypi/langcodes@3.5.0","pkg:pypi/murmurhash@1.0.13","pkg:pypi/numpy@1.26.4","pkg:pypi/packaging@25.0","pkg:pypi/preshed@3.0.10","pkg:pypi/pydantic@2.11.7","pkg:pypi/requests@2.32.5","pkg:pypi/setuptools@80.9.0","pkg:pypi/spacy-legacy@3.0.12","pkg:pypi/spacy-loggers@1.0.5","pkg:pypi/srsly@2.5.1","pkg:pypi/thinc@8.2.5","pkg:pypi/tqdm@4.67.1","pkg:pypi/typer@0.17.3","pkg:pypi/wasabi@1.1.3","pkg:pypi/weasel@0.4.1"]},{"ref":"pkg:pypi/strands-agents@0.0.1","dependsOn":[]},{"ref":"pkg:pypi/tensorboard-data-server@0.7.2","dependsOn":[]},{"ref":"pkg:pypi/tensorboard@2.16.2","dependsOn":["pkg:pypi/absl-py@2.3.1","pkg:pypi/grpcio@1.74.0","pkg:pypi/markdown@3.8.2","pkg:pypi/numpy@1.26.4","pkg:pypi/protobuf@6.32.0","pkg:pypi/setuptools@80.9.0","pkg:pypi/six@1.17.0","pkg:pypi/tensorboard-data-server@0.7.2","pkg:pypi/werkzeug@3.1.1"]},{"ref":"pkg:pypi/tensorflow-macos@2.16.2","dependsOn":["pkg:pypi/tensorflow@2.16.2"]},{"ref":"pkg:pypi/textstat@0.7.10","dependsOn":["pkg:pypi/nltk@3.9.1","pkg:pypi/pyphen@0.17.2","pkg:pypi/setuptools@80.9.0"]},{"ref":"pkg:pypi/xgboost@3.0.4","dependsOn":["pkg:pypi/numpy@1.26.4","pkg:pypi/scipy@1.16.1"]}],"services":[{"name":"service-health-get","endpoints":["/health"],"properties":[{"name":"cdx:service:httpMethod","value":"get"}]},{"name":"service-health-head","endpoints":["/health"],"properties":[{"name":"cdx:service:httpMethod","value":"head"}]},{"name":"service-health-options","endpoints":["/health"],"properties":[{"name":"cdx:service:httpMethod","value":"options"}]},{"name":"service-health-x-atom-usages","endpoints":["/health"],"properties":[{"name":"cdx:service:httpMethod","value":"x-atom-usages"}]},{"name":"service-invocations-get","endpoints":["/invocations"],"properties":[{"name":"cdx:service:httpMethod","value":"get"}]},{"name":"service-invocations-head","endpoints":["/invocations"],"properties":[{"name":"cdx:service:httpMethod","value":"head"}]},{"name":"service-invocations-options","endpoints":["/invocations"],"properties":[{"name":"cdx:service:httpMethod","value":"options"}]},{"name":"service-invocations-post","endpoints":["/invocations"],"properties":[{"name":"cdx:service:httpMethod","value":"post"}]},{"name":"service-invocations-x-atom-usages","endpoints":["/invocations"],"properties":[{"name":"cdx:service:httpMethod","value":"x-atom-usages"}]},{"name":"service-ping-get","endpoints":["/ping"],"properties":[{"name":"cdx:service:httpMethod","value":"get"}]},{"name":"service-ping-head","endpoints":["/ping"],"properties":[{"name":"cdx:service:httpMethod","value":"head"}]},{"name":"service-ping-options","endpoints":["/ping"],"properties":[{"name":"cdx:service:httpMethod","value":"options"}]},{"name":"service-ping-x-atom-usages","endpoints":["/ping"],"properties":[{"name":"cdx:service:httpMethod","value":"x-atom-usages"}]},{"name":"service-version-get","endpoints":["/version"],"properties":[{"name":"cdx:service:httpMethod","value":"get"}]},{"name":"service-version-head","endpoints":["/version"],"properties":[{"name":"cdx:service:httpMethod","value":"head"}]},{"name":"service-version-options","endpoints":["/version"],"properties":[{"name":"cdx:service:httpMethod","value":"options"}]},{"name":"service-version-x-atom-usages","endpoints":["/version"],"properties":[{"name":"cdx:service:httpMethod","value":"x-atom-usages"}]}],"vulnerabilities":[{"id":"CVE-2022-30187","bom-ref":"CVE-2022-30187/pkg:pypi/azure-storage-blob@12.0.0","affects":[{"ref":"pkg:pypi/azure-storage-blob@12.0.0","versions":[{"range":"vers:pypi/>=0.37.0|<=2.1.0|<12.13.0|!=12.13.0","status":"affected"},{"version":"12.13.0","status":"unaffected"}]}],"recommendation":"Update to version 12.13.0.","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"},"references":[{"id":"microsoft-msg-CVE-2022-30187","source":{"name":"Microsoft Mailing List","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30187"}},{"id":"CVE-2022-30187","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"}},{"id":"GHSA-6m8q-r22q-vfxh","source":{"name":"GitHub Advisory","url":"https://github.com/google/security-research/security/advisories/GHSA-6m8q-r22q-vfxh"}},{"id":"CVE-2022-30187","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30187","name":"NVD"}}],"advisories":[{"title":"Microsoft Advisory CVE-2022-30187","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"},{"title":"GitHub Advisory GHSA-6m8q-r22q-vfxh","url":"https://github.com/google/security-research/security/advisories/GHSA-6m8q-r22q-vfxh"},{"title":"CVE-2022-30187","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30187"}],"cwes":[668],"description":"Microsoft: CBC Padding Oracle in Azure Blob Storage Encryption Library","detail":"# Microsoft: CBC Padding Oracle in Azure Blob Storage Encryption Library ### Summary The Azure Storage Encryption library in Java and other languages is vulnerable to a CBC Padding Oracle attack, similar to CVE-2020-8911. The library is not vulnerable to the equivalent of CVE-2020-8912, but only because it currently only supports AES-CBC as encryption mode. ### Severity Moderate - The vulnerability poses insider risks/privilege escalation risks, circumventing controls for stored data. ### Further Analysis The Java Azure Blob Storage Encryption SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the container in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when encrypting the CBC option was chosen as content cipher. This advisory describes the plaintext revealing vulnerabilities in the Java Azure Blob Storage Encryption SDK, with a similar issue in the other blob storage SDKs being present as well. In the current version of the Azure Blob Storage crypto SDK, the only algorithm option that allows users to encrypt files is to AES-CBC, without computing a MAC on the data. This exposes a padding oracle vulnerability: If the attacker has write access to the blob container bucket and can observe whether or not an endpoint with access to the key can decrypt a file (without observing the file contents that the endpoint learns in the process), they can reconstruct the plaintext with (on average) 128*length(plaintext) queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors. ### Timeline **Date reported**: March 29 2022 **Date preview**: June 16 2022 **Date GA**: July 11 2022 **Date disclosed**: July 17 2022","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2022-07-13T00:00:39","updated":"2024-05-23T17:16:02","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-35255","bom-ref":"CVE-2024-35255/pkg:pypi/azure-identity@1.6.1","affects":[{"ref":"pkg:pypi/azure-identity@1.6.1","versions":[{"range":"vers:pypi/>=1.0.0|<=1.9.0b1|<1.16.1|!=1.16.1","status":"affected"},{"version":"1.16.1","status":"unaffected"}]}],"recommendation":"Update to version 1.16.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35255","name":"NVD"},"references":[{"id":"CVE-2024-35255","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35255","name":"NVD"}},{"id":"CVE-2024-35255","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35255"}}],"advisories":[{"title":"CVE-2024-35255","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35255"},{"title":"Microsoft Advisory CVE-2024-35255","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35255"}],"cwes":[362],"description":"Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability","detail":"# Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability. ## Related CVE(s) CVE-2024-35255, GO-2024-2918","ratings":[{"method":"CVSSv4","severity":"medium","score":6.8,"vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2024-06-11T18:30:50","updated":"2025-07-22T15:12:31","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-4863","bom-ref":"CVE-2023-4863/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=9.5.0|<10.0.1|!=10.0.1","status":"affected"},{"version":"10.0.1","status":"unaffected"}]}],"recommendation":"Update to version 10.0.1 to resolve CVE-2023-4863 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2023-4863"},"references":[{"id":"dsa-5496","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5496"}},{"id":"openwall-oss-security-msg-2023-09-22-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/22/3"}},{"id":"CVE-2023-4863","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2023-4863"}},{"id":"stable-channel-update-for-desktop_11","source":{"name":"Googleblog Advisory","url":"https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html"}},{"id":"fedoraproject-msg-WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB"}},{"id":"google-fixes-another-chrome-zero-day-bug-exploited-in-attacks","source":{"name":"Bleepingcomputer Advisory","url":"https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks"}},{"id":"fedoraproject-msg-PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX"}},{"id":"CVE-2023-4863","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4863","name":"NVD"}},{"id":"openwall-oss-security-msg-2023-09-28-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/28/1"}},{"id":"glsa-202401-10","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202401-10"}},{"id":"cve-2023-4863","source":{"url":"https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863"}},{"id":"openwall-oss-security-msg-2023-09-22-5","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/22/5"}},{"id":"fedoraproject-msg-OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX"}},{"id":"fedoraproject-msg-FYYKLG6CRGEDTNRBSU26EEWAO6D6U645","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645"}},{"id":"fedoraproject-msg-6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT"}},{"id":"cve-2023-4863","source":{"url":"https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863"}},{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html"}},{"id":"openwall-oss-security-msg-2023-09-28-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/28/2"}},{"id":"openwall-oss-security-msg-2023-09-22-7","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/22/7"}},{"id":"dsa-5497","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5497"}},{"id":"openwall-oss-security-msg-2023-09-22-6","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/22/6"}},{"id":"mfsa2023-40","source":{"name":"Mozilla Advisory","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-40"}},{"id":"openwall-oss-security-msg-2023-09-22-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/22/4"}},{"id":"openwall-oss-security-msg-2023-09-28-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/28/4"}},{"id":"glsa-202309-05","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202309-05"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html"}},{"id":"RUSTSEC-2023-0060","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2023-0060.html"}},{"id":"dsa-5498","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5498"}},{"id":"debian-msg-msg00016","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html"}},{"id":"openwall-oss-security-msg-2023-09-22-8","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/22/8"}},{"id":"be-2023-0001","source":{"name":"Bentley Advisory","url":"https://www.bentley.com/advisories/be-2023-0001"}},{"id":"openwall-oss-security-msg-2023-09-22-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/22/1"}},{"id":"fedoraproject-msg-WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I"}},{"id":"openwall-oss-security-msg-2023-09-21-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/21/4"}},{"id":"openwall-oss-security-msg-2023-09-26-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/26/1"}},{"id":"fedoraproject-msg-KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3"}},{"id":"openwall-oss-security-msg-2023-09-26-7","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/09/26/7"}},{"id":"suse-bugzilla-1215231","source":{"name":"Suse Bugzilla","url":"https://bugzilla.suse.com/show_bug.cgi?id=1215231"}},{"id":"ntap-20230929-0011","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230929-0011"}},{"id":"RUSTSEC-2023-0061","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2023-0061.html"}},{"id":"CVE-2023-4863","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863"}}],"advisories":[{"title":"Debian Advisory dsa-5496","url":"https://www.debian.org/security/2023/dsa-5496"},{"title":"Debian Advisory CVE-2023-4863","url":"https://security-tracker.debian.org/tracker/CVE-2023-4863"},{"title":"Googleblog Advisory stable-channel-update-for-desktop_11","url":"https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html"},{"title":"Bleepingcomputer Advisory google-fixes-another-chrome-zero-day-bug-exploited-in-attacks","url":"https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks"},{"title":"CVE-2023-4863","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4863"},{"title":"Gentoo Advisory glsa-202401-10","url":"https://security.gentoo.org/glsa/202401-10"},{"title":"cve-2023-4863","url":"https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863"},{"title":"cve-2023-4863","url":"https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863"},{"title":"Debian Advisory dsa-5497","url":"https://www.debian.org/security/2023/dsa-5497"},{"title":"Mozilla Advisory mfsa2023-40","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-40"},{"title":"Gentoo Advisory glsa-202309-05","url":"https://security.gentoo.org/glsa/202309-05"},{"title":"Rustsec Advisory RUSTSEC-2023-0060","url":"https://rustsec.org/advisories/RUSTSEC-2023-0060.html"},{"title":"Debian Advisory dsa-5498","url":"https://www.debian.org/security/2023/dsa-5498"},{"title":"Bentley Advisory be-2023-0001","url":"https://www.bentley.com/advisories/be-2023-0001"},{"title":"NetApp Advisory ntap-20230929-0011","url":"https://security.netapp.com/advisory/ntap-20230929-0011"},{"title":"Rustsec Advisory RUSTSEC-2023-0061","url":"https://rustsec.org/advisories/RUSTSEC-2023-0061.html"},{"title":"Microsoft Advisory CVE-2023-4863","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863"}],"cwes":[787],"description":"libwebp: OOB write in BuildHuffmanTable","detail":"# libwebp: OOB write in BuildHuffmanTable Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page. ## Related CVE(s) A-299477569, ASB-A-299477569, CVE-2023-4863, CVE-2023-5129, RUSTSEC-2023-0060, RUSTSEC-2023-0061","ratings":[{"method":"CVSSv31","severity":"high","score":8.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2023-09-12T15:30:20","updated":"2025-07-09T16:28:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-50447","bom-ref":"CVE-2023-50447/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=9.5.0|<10.2.0|!=10.2.0","status":"affected"},{"version":"10.2.0","status":"unaffected"}]}],"recommendation":"Update to version 10.2.0 to resolve CVE-2023-50447 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://duartecsantos.github.io/2024-01-02-CVE-2023-50447"},"references":[{"id":"CVE-2023-50447","source":{"url":"https://duartecsantos.github.io/2024-01-02-CVE-2023-50447"}},{"id":"CVE-2023-50447","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-50447","name":"NVD"}},{"id":"CVE-2023-50447","source":{"url":"https://duartecsantos.github.io/2023-01-02-CVE-2023-50447"}},{"id":"debian-msg-msg00019","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00019.html"}},{"id":"openwall-oss-security-msg-2024-01-20-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/01/20/1"}},{"id":"CVE-2023-50447","source":{"name":"Checkmarx Advisory","url":"https://devhub.checkmarx.com/cve-details/CVE-2023-50447"}}],"advisories":[{"title":"CVE-2023-50447","url":"https://duartecsantos.github.io/2024-01-02-CVE-2023-50447"},{"title":"CVE-2023-50447","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-50447"},{"title":"CVE-2023-50447","url":"https://duartecsantos.github.io/2023-01-02-CVE-2023-50447"},{"title":"Checkmarx Advisory CVE-2023-50447","url":"https://devhub.checkmarx.com/cve-details/CVE-2023-50447"}],"cwes":[94,95],"description":"Arbitrary Code Execution in Pillow","detail":"# Arbitrary Code Execution in Pillow Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter). ## Related CVE(s) BIT-pillow-2023-50447, CVE-2023-50447","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-01-19T21:30:35","updated":"2025-02-13T05:40:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-27922","bom-ref":"CVE-2021-27922/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.1|<8.1.2|!=8.1.2","status":"affected"},{"version":"8.1.2","status":"unaffected"}]}],"recommendation":"Update to version 8.1.2 to resolve CVE-2021-27922 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27922","name":"NVD"},"references":[{"id":"fedoraproject-msg-S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU"}},{"id":"fedoraproject-msg-ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ"}},{"id":"fedoraproject-msg-TQQY6472RX4J2SUJENWDZAWKTJJGP2ML","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML"}},{"id":"CVE-2021-27922","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27922","name":"NVD"}},{"id":"fedoraproject-msg-ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ"}},{"id":"fedoraproject-msg-TQQY6472RX4J2SUJENWDZAWKTJJGP2ML","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"PYSEC-2021-41","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-41.yaml"}},{"id":"fedoraproject-msg-S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU"}}],"advisories":[{"title":"CVE-2021-27922","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27922"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"GitHub Advisory PYSEC-2021-41","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-41.yaml"}],"cwes":[20,400],"description":"Pillow Uncontrolled Resource Consumption","detail":"# Pillow Uncontrolled Resource Consumption Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large. ## Related CVE(s) BIT-pillow-2021-27922, CVE-2021-27922, PYSEC-2021-41","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-18T19:55:21","updated":"2025-08-15T14:25:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-10378","bom-ref":"CVE-2020-10378/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=7.0.0|<7.1.0|!=7.1.0","status":"affected"},{"version":"7.1.0","status":"unaffected"}]}],"recommendation":"Update to version 7.1.0 to resolve CVE-2020-10378 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10378","name":"NVD"},"references":[{"id":"CVE-2020-10378","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10378","name":"NVD"}},{"id":"fedoraproject-msg-BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD"}},{"id":"PYSEC-2020-77","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-77.yaml"}},{"id":"GHSA-3xv8-3j54-hgrp","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-3xv8-3j54-hgrp"}},{"id":"PYSEC-2020-77","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-77.yaml"}},{"id":"fedoraproject-msg-HOKHNWV2VS5GESY7IBD237E7C6T3I427","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427"}}],"advisories":[{"title":"CVE-2020-10378","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10378"},{"title":"GitHub Advisory PYSEC-2020-77","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-77.yaml"},{"title":"GitHub Advisory GHSA-3xv8-3j54-hgrp","url":"https://github.com/advisories/GHSA-3xv8-3j54-hgrp"},{"title":"GitHub Advisory PYSEC-2020-77","url":"https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-77.yaml"}],"cwes":[125],"description":"Out-of-bounds read in Pillow","detail":"# Out-of-bounds read in Pillow In `libImaging/PcxDecode.c` in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where `state->shuffle` is instructed to read beyond `state->buffer`. ## Related CVE(s) BIT-pillow-2020-10378, CVE-2020-10378, PYSEC-2020-77","ratings":[{"method":"CVSSv4","severity":"high","score":8.2,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2021-11-03T18:04:53","updated":"2025-06-06T15:13:14","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-11538","bom-ref":"CVE-2020-11538/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=7.0.0|<7.1.0|!=7.1.0","status":"affected"},{"version":"7.1.0","status":"unaffected"}]}],"recommendation":"Update to version 7.1.0 to resolve CVE-2020-11538 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11538","name":"NVD"},"references":[{"id":"SNYK-PYTHON-PILLOW-574574","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574574"}},{"id":"fedoraproject-msg-BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD"}},{"id":"PYSEC-2020-80","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-80.yaml"}},{"id":"GHSA-43fq-w8qq-v88h","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-43fq-w8qq-v88h"}},{"id":"CVE-2020-11538","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11538","name":"NVD"}},{"id":"fedoraproject-msg-HOKHNWV2VS5GESY7IBD237E7C6T3I427","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427"}}],"advisories":[{"title":"Snyk Advisory SNYK-PYTHON-PILLOW-574574","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574574"},{"title":"GitHub Advisory PYSEC-2020-80","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-80.yaml"},{"title":"GitHub Advisory GHSA-43fq-w8qq-v88h","url":"https://github.com/advisories/GHSA-43fq-w8qq-v88h"},{"title":"CVE-2020-11538","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11538"}],"cwes":[125],"description":"Out-of-bounds read in Pillow","detail":"# Out-of-bounds read in Pillow In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311. ## Related CVE(s) BIT-pillow-2020-11538, CVE-2020-11538, PYSEC-2020-80","ratings":[{"method":"CVSSv4","severity":"critical","score":9.2,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2020-07-27T21:52:36","updated":"2024-10-09T20:02:20","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-28219","bom-ref":"CVE-2024-28219/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=9.5.0|<10.3.0|!=10.3.0","status":"affected"},{"version":"10.3.0","status":"unaffected"}]}],"recommendation":"Update to version 10.3.0 to resolve CVE-2024-28219 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28219","name":"NVD"},"references":[{"id":"CVE-2024-28219","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28219","name":"NVD"}},{"id":"fedoraproject-msg-4XLPUT3VK4GQ6EVY525TT2QNUIXNRU5M","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLPUT3VK4GQ6EVY525TT2QNUIXNRU5M"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00008.html"}}],"advisories":[{"title":"CVE-2024-28219","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28219"}],"cwes":[120,676,680],"description":"Pillow buffer overflow vulnerability","detail":"# Pillow buffer overflow vulnerability In _imagingcms.c in Pillow before 10.3.0, a buffer overflow exists because strcpy is used instead of strncpy. ## Related CVE(s) BIT-pillow-2024-28219, CVE-2024-28219","ratings":[{"method":"CVSSv4","severity":"high","score":7.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-04-03T03:30:30","updated":"2024-11-21T05:23:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-4fx9-vc88-q2xc","bom-ref":"GHSA-4fx9-vc88-q2xc/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.4.0|<9.0.0|!=9.0.0","status":"affected"},{"version":"9.0.0","status":"unaffected"}]}],"recommendation":"Update to version 9.0.0 to resolve GHSA-4fx9-vc88-q2xc or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-4fx9-vc88-q2xc"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-4fx9-vc88-q2xc","url":"https://github.com/advisories/GHSA-4fx9-vc88-q2xc"}],"cwes":[400],"description":"Infinite loop in Pillow","detail":"# Infinite loop in Pillow JpegImagePlugin may append an EOF marker to the end of a truncated file, so that the last segment of the data will still be processed by the decoder. If the EOF marker is not detected as such however, this could lead to an infinite loop where JpegImagePlugin keeps trying to end the file.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2022-03-11T23:39:27","updated":"2024-12-05T05:35:12","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-25289","bom-ref":"CVE-2021-25289/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.0|<8.1.1|!=8.1.1","status":"affected"},{"version":"8.1.1","status":"unaffected"}]}],"recommendation":"Update to version 8.1.1 to resolve CVE-2021-25289 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25289","name":"NVD"},"references":[{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"GHSA-57h3-9rgr-c24m","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-57h3-9rgr-c24m"}},{"id":"CVE-2021-25289","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25289","name":"NVD"}},{"id":"PYSEC-2021-35","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-35.yaml"}}],"advisories":[{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"GitHub Advisory GHSA-57h3-9rgr-c24m","url":"https://github.com/advisories/GHSA-57h3-9rgr-c24m"},{"title":"CVE-2021-25289","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25289"},{"title":"GitHub Advisory PYSEC-2021-35","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-35.yaml"}],"cwes":[787],"description":"Out of bounds write in Pillow","detail":"# Out of bounds write in Pillow An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654. ## Related CVE(s) BIT-pillow-2021-25289, CVE-2021-25289, PYSEC-2021-35","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-29T16:35:16","updated":"2024-10-08T13:22:45","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-19911","bom-ref":"CVE-2019-19911/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=6.2.1|<6.2.2|!=6.2.2","status":"affected"},{"version":"6.2.2","status":"unaffected"}]}],"recommendation":"Update to version 6.2.2 to resolve CVE-2019-19911 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19911","name":"NVD"},"references":[{"id":"CVE-2019-19911","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19911","name":"NVD"}},{"id":"PYSEC-2020-172","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-172.yaml"}},{"id":"fedoraproject-msg-3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P"}},{"id":"dsa-4631","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4631"}},{"id":"GHSA-5gm3-px64-rw72","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-5gm3-px64-rw72"}}],"advisories":[{"title":"CVE-2019-19911","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19911"},{"title":"GitHub Advisory PYSEC-2020-172","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-172.yaml"},{"title":"Debian Advisory dsa-4631","url":"https://www.debian.org/security/2020/dsa-4631"},{"title":"GitHub Advisory GHSA-5gm3-px64-rw72","url":"https://github.com/advisories/GHSA-5gm3-px64-rw72"}],"cwes":[190],"description":"Uncontrolled Resource Consumption in Pillow","detail":"# Uncontrolled Resource Consumption in Pillow There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer. ## Related CVE(s) CVE-2019-19911, PYSEC-2020-172","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2020-04-01T16:36:44","updated":"2024-10-08T13:22:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-34552","bom-ref":"CVE-2021-34552/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.2.0|<8.3.0|!=8.3.0","status":"affected"},{"version":"8.3.0","status":"unaffected"}]}],"recommendation":"Update to version 8.3.0 to resolve CVE-2021-34552 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-34552","name":"NVD"},"references":[{"id":"PYSEC-2021-331","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-331.yaml"}},{"id":"GHSA-7534-mm45-c74v","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-7534-mm45-c74v"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html"}},{"id":"glsa-202211-10","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202211-10"}},{"id":"fedoraproject-msg-7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV"}},{"id":"CVE-2021-34552","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-34552","name":"NVD"}},{"id":"fedoraproject-msg-VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2021-331","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-331.yaml"},{"title":"GitHub Advisory GHSA-7534-mm45-c74v","url":"https://github.com/advisories/GHSA-7534-mm45-c74v"},{"title":"Gentoo Advisory glsa-202211-10","url":"https://security.gentoo.org/glsa/202211-10"},{"title":"CVE-2021-34552","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-34552"}],"cwes":[120],"description":"Buffer Overflow in Pillow","detail":"# Buffer Overflow in Pillow Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. ## Related CVE(s) BIT-pillow-2021-34552, CVE-2021-34552, PYSEC-2021-331","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-10-05T20:24:41","updated":"2024-10-09T21:10:34","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-25287","bom-ref":"CVE-2021-25287/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=2.4.0|<8.2.0|!=8.2.0","status":"affected"},{"version":"8.2.0","status":"unaffected"}]}],"recommendation":"Update to version 8.2.0 to resolve CVE-2021-25287 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25287","name":"NVD"},"references":[{"id":"fedoraproject-msg-MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"CVE-2021-25287","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25287","name":"NVD"}},{"id":"GHSA-77gc-v2xv-rvvh","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-77gc-v2xv-rvvh"}},{"id":"PYSEC-2021-137","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-137.yaml"}}],"advisories":[{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"CVE-2021-25287","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25287"},{"title":"GitHub Advisory GHSA-77gc-v2xv-rvvh","url":"https://github.com/advisories/GHSA-77gc-v2xv-rvvh"},{"title":"GitHub Advisory PYSEC-2021-137","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-137.yaml"}],"cwes":[125],"description":"Out-of-bounds Read in Pillow","detail":"# Out-of-bounds Read in Pillow An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la. ## Related CVE(s) BIT-pillow-2021-25287, CVE-2021-25287, PYSEC-2021-137","ratings":[{"method":"CVSSv4","severity":"high","score":8.8,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-06-08T18:49:02","updated":"2024-10-09T21:25:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-28676","bom-ref":"CVE-2021-28676/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.2|<8.2.0|!=8.2.0","status":"affected"},{"version":"8.2.0","status":"unaffected"}]}],"recommendation":"Update to version 8.2.0 to resolve CVE-2021-28676 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28676","name":"NVD"},"references":[{"id":"PYSEC-2021-92","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-92.yaml"}},{"id":"CVE-2021-28676","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28676","name":"NVD"}},{"id":"fedoraproject-msg-MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL"}},{"id":"fedoraproject-msg-MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"GHSA-7r7m-5h27-29hp","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-7r7m-5h27-29hp"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2021-92","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-92.yaml"},{"title":"CVE-2021-28676","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28676"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"GitHub Advisory GHSA-7r7m-5h27-29hp","url":"https://github.com/advisories/GHSA-7r7m-5h27-29hp"}],"cwes":[835],"description":"Potential infinite loop in Pillow","detail":"# Potential infinite loop in Pillow An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load. ## Related CVE(s) BIT-pillow-2021-28676, CVE-2021-28676, PYSEC-2021-92","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-06-08T18:48:53","updated":"2024-10-14T18:25:51","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-10379","bom-ref":"CVE-2020-10379/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=7.0.0|<7.1.0|!=7.1.0","status":"affected"},{"version":"7.1.0","status":"unaffected"}]}],"recommendation":"Update to version 7.1.0 to resolve CVE-2020-10379 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10379","name":"NVD"},"references":[{"id":"PYSEC-2020-78","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-78.yaml"}},{"id":"fedoraproject-msg-BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD"}},{"id":"SNYK-PYTHON-PILLOW-574577","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574577"}},{"id":"CVE-2020-10379","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10379","name":"NVD"}},{"id":"GHSA-8843-m7mw-mxqm","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-8843-m7mw-mxqm"}},{"id":"fedoraproject-msg-HOKHNWV2VS5GESY7IBD237E7C6T3I427","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2020-78","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-78.yaml"},{"title":"Snyk Advisory SNYK-PYTHON-PILLOW-574577","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574577"},{"title":"CVE-2020-10379","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10379"},{"title":"GitHub Advisory GHSA-8843-m7mw-mxqm","url":"https://github.com/advisories/GHSA-8843-m7mw-mxqm"}],"cwes":[120],"description":"Buffer overflow in Pillow","detail":"# Buffer overflow in Pillow In Pillow before 7.1.0, there are two Buffer Overflows in `libImaging/TiffDecode.c`. ## Related CVE(s) BIT-pillow-2020-10379, CVE-2020-10379, PYSEC-2020-78","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2020-07-27T21:52:41","updated":"2025-06-06T15:13:20","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-44271","bom-ref":"CVE-2023-44271/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=9.5.0|<10.0.0|!=10.0.0","status":"affected"},{"version":"10.0.0","status":"unaffected"}]}],"recommendation":"Update to version 10.0.0 to resolve CVE-2023-44271 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"name":"Checkmarx Advisory","url":"https://devhub.checkmarx.com/cve-details/CVE-2023-44271"},"references":[{"id":"CVE-2023-44271","source":{"name":"Checkmarx Advisory","url":"https://devhub.checkmarx.com/cve-details/CVE-2023-44271"}},{"id":"PYSEC-2023-227","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2023-227.yaml"}},{"id":"fedoraproject-msg-N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4"}},{"id":"debian-msg-msg00021","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html"}},{"id":"CVE-2023-44271","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44271","name":"NVD"}}],"advisories":[{"title":"Checkmarx Advisory CVE-2023-44271","url":"https://devhub.checkmarx.com/cve-details/CVE-2023-44271"},{"title":"GitHub Advisory PYSEC-2023-227","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2023-227.yaml"},{"title":"CVE-2023-44271","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44271"}],"cwes":[400,770],"description":"Pillow Denial of Service vulnerability","detail":"# Pillow Denial of Service vulnerability An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. ## Related CVE(s) BIT-pillow-2023-44271, CVE-2023-44271, PYSEC-2023-227","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-11-03T06:36:30","updated":"2024-10-14T21:23:45","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-22817","bom-ref":"CVE-2022-22817/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=9.0.0|<9.0.1|!=9.0.1","status":"affected"},{"version":"9.0.1","status":"unaffected"}]}],"recommendation":"Update to version 9.0.1 to resolve CVE-2022-22817 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22817","name":"NVD"},"references":[{"id":"dsa-5053","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2022/dsa-5053"}},{"id":"CVE-2022-22817","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22817","name":"NVD"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html"}},{"id":"glsa-202211-10","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202211-10"}},{"id":"GHSA-8vj2-vxx3-667w","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-8vj2-vxx3-667w"}},{"id":"debian-msg-msg00021","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html"}},{"id":"PYSEC-2022-10","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-10.yaml"}}],"advisories":[{"title":"Debian Advisory dsa-5053","url":"https://www.debian.org/security/2022/dsa-5053"},{"title":"CVE-2022-22817","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22817"},{"title":"Gentoo Advisory glsa-202211-10","url":"https://security.gentoo.org/glsa/202211-10"},{"title":"GitHub Advisory GHSA-8vj2-vxx3-667w","url":"https://github.com/advisories/GHSA-8vj2-vxx3-667w"},{"title":"GitHub Advisory PYSEC-2022-10","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-10.yaml"}],"cwes":[74],"description":"Arbitrary expression injection in Pillow","detail":"# Arbitrary expression injection in Pillow `PIL.ImageMath.eval` in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method `ImageMath.eval(\"exec(exit())\")`. While Pillow 9.0.0 restricted top-level builtins available to PIL.ImageMath.eval(), it did not prevent builtins available to lambda expressions. These are now also restricted in 9.0.1. ## Related CVE(s) BIT-pillow-2022-22817, CVE-2022-22817, PYSEC-2022-10","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-01-12T20:07:33","updated":"2024-10-14T18:26:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-25290","bom-ref":"CVE-2021-25290/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.0|<8.1.1|!=8.1.1","status":"affected"},{"version":"8.1.1","status":"unaffected"}]}],"recommendation":"Update to version 8.1.1 to resolve CVE-2021-25290 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25290","name":"NVD"},"references":[{"id":"CVE-2021-25290","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25290","name":"NVD"}},{"id":"GHSA-8xjq-8fcg-g5hw","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-8xjq-8fcg-g5hw"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html"}},{"id":"PYSEC-2021-36","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-36.yaml"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}}],"advisories":[{"title":"CVE-2021-25290","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25290"},{"title":"GitHub Advisory GHSA-8xjq-8fcg-g5hw","url":"https://github.com/advisories/GHSA-8xjq-8fcg-g5hw"},{"title":"GitHub Advisory PYSEC-2021-36","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-36.yaml"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"}],"cwes":[787],"description":"Out-of-bounds Write in Pillow","detail":"# Out-of-bounds Write in Pillow An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size. ## Related CVE(s) BIT-pillow-2021-25290, CVE-2021-25290, PYSEC-2021-36","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-29T16:35:36","updated":"2024-10-08T13:23:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-27923","bom-ref":"CVE-2021-27923/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.1|<8.1.2|!=8.1.2","status":"affected"},{"version":"8.1.2","status":"unaffected"}]}],"recommendation":"Update to version 8.1.2 to resolve CVE-2021-27923 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27923","name":"NVD"},"references":[{"id":"fedoraproject-msg-S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU"}},{"id":"fedoraproject-msg-ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ"}},{"id":"GHSA-95q3-8gr9-gm8w","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-95q3-8gr9-gm8w"}},{"id":"PYSEC-2021-42","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-42.yaml"}},{"id":"fedoraproject-msg-TQQY6472RX4J2SUJENWDZAWKTJJGP2ML","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML"}},{"id":"CVE-2021-27923","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27923","name":"NVD"}},{"id":"fedoraproject-msg-ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ"}},{"id":"fedoraproject-msg-TQQY6472RX4J2SUJENWDZAWKTJJGP2ML","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"fedoraproject-msg-S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU"}}],"advisories":[{"title":"GitHub Advisory GHSA-95q3-8gr9-gm8w","url":"https://github.com/advisories/GHSA-95q3-8gr9-gm8w"},{"title":"GitHub Advisory PYSEC-2021-42","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-42.yaml"},{"title":"CVE-2021-27923","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27923"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"}],"cwes":[20,400],"description":"Pillow Denial of Service by Uncontrolled Resource Consumption","detail":"# Pillow Denial of Service by Uncontrolled Resource Consumption Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large. ## Related CVE(s) BIT-pillow-2021-27923, CVE-2021-27923, PYSEC-2021-42","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-18T19:54:43","updated":"2025-08-15T14:25:58","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-23437","bom-ref":"CVE-2021-23437/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=5.2.0|<8.3.2|!=8.3.2","status":"affected"},{"version":"8.3.2","status":"unaffected"}]}],"recommendation":"Update to version 8.3.2 to resolve CVE-2021-23437 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23437","name":"NVD"},"references":[{"id":"PYSEC-2021-317","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-317.yaml"}},{"id":"CVE-2021-23437","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23437","name":"NVD"}},{"id":"GHSA-98vv-pw6r-q6q4","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-98vv-pw6r-q6q4"}},{"id":"fedoraproject-msg-RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C"}},{"id":"fedoraproject-msg-VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT"}},{"id":"glsa-202211-10","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202211-10"}},{"id":"fedoraproject-msg-RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C"}},{"id":"debian-msg-msg00021","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html"}},{"id":"fedoraproject-msg-VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT"}},{"id":"SNYK-PYTHON-PILLOW-1319443","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2021-317","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-317.yaml"},{"title":"CVE-2021-23437","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23437"},{"title":"GitHub Advisory GHSA-98vv-pw6r-q6q4","url":"https://github.com/advisories/GHSA-98vv-pw6r-q6q4"},{"title":"Gentoo Advisory glsa-202211-10","url":"https://security.gentoo.org/glsa/202211-10"},{"title":"Snyk Advisory SNYK-PYTHON-PILLOW-1319443","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443"}],"cwes":[125,400],"description":"Uncontrolled Resource Consumption in pillow","detail":"# Uncontrolled Resource Consumption in pillow The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function. ## Related CVE(s) BIT-pillow-2021-23437, CVE-2021-23437, PYSEC-2021-317, SNYK-PYTHON-PILLOW-1319443","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-09-07T23:08:10","updated":"2024-10-09T21:08:55","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-25292","bom-ref":"CVE-2021-25292/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=5.1.0|<8.1.1|!=8.1.1","status":"affected"},{"version":"8.1.1","status":"unaffected"}]}],"recommendation":"Update to version 8.1.1 to resolve CVE-2021-25292 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25292","name":"NVD"},"references":[{"id":"CVE-2021-25292","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25292","name":"NVD"}},{"id":"PYSEC-2021-38","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-38.yaml"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"GHSA-9hx2-hgq2-2g4f","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-9hx2-hgq2-2g4f"}}],"advisories":[{"title":"CVE-2021-25292","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25292"},{"title":"GitHub Advisory PYSEC-2021-38","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-38.yaml"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"GitHub Advisory GHSA-9hx2-hgq2-2g4f","url":"https://github.com/advisories/GHSA-9hx2-hgq2-2g4f"}],"cwes":[400],"description":"Regular Expression Denial of Service (ReDoS) in Pillow","detail":"# Regular Expression Denial of Service (ReDoS) in Pillow An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex. ## Related CVE(s) BIT-pillow-2021-25292, CVE-2021-25292, PYSEC-2021-38","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-29T16:35:46","updated":"2024-10-09T21:24:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-24303","bom-ref":"CVE-2022-24303/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=9.0.0|<9.0.1|!=9.0.1","status":"affected"},{"version":"9.0.1","status":"unaffected"}]}],"recommendation":"Update to version 9.0.1 to resolve CVE-2022-24303 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24303","name":"NVD"},"references":[{"id":"GHSA-9j59-75qj-795w","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-9j59-75qj-795w"}},{"id":"fedoraproject-msg-W4ZUXPKEX72O3E5IHBPVY5ZCPMJ4GHHV","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W4ZUXPKEX72O3E5IHBPVY5ZCPMJ4GHHV"}},{"id":"fedoraproject-msg-XR6UP2XONXOVXI4446VY72R63YRO2YTP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XR6UP2XONXOVXI4446VY72R63YRO2YTP"}},{"id":"CVE-2022-24303","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24303","name":"NVD"}},{"id":"glsa-202211-10","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202211-10"}},{"id":"PYSEC-2022-168","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-168.yaml"}}],"advisories":[{"title":"GitHub Advisory GHSA-9j59-75qj-795w","url":"https://github.com/advisories/GHSA-9j59-75qj-795w"},{"title":"CVE-2022-24303","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24303"},{"title":"Gentoo Advisory glsa-202211-10","url":"https://security.gentoo.org/glsa/202211-10"},{"title":"GitHub Advisory PYSEC-2022-168","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-168.yaml"}],"cwes":[22],"description":"Path traversal in Pillow","detail":"# Path traversal in Pillow Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled. ## Related CVE(s) BIT-pillow-2022-24303, CVE-2022-24303, PYSEC-2022-168","ratings":[{"method":"CVSSv4","severity":"high","score":8.8,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-03-11T23:10:32","updated":"2024-10-14T18:43:28","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-10177","bom-ref":"CVE-2020-10177/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=7.0.0|<7.1.0|!=7.1.0","status":"affected"},{"version":"7.1.0","status":"unaffected"}]}],"recommendation":"Update to version 7.1.0 to resolve CVE-2020-10177 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10177","name":"NVD"},"references":[{"id":"SNYK-PYTHON-PILLOW-574573","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574573"}},{"id":"debian-msg-msg00012","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00012.html"}},{"id":"fedoraproject-msg-HOKHNWV2VS5GESY7IBD237E7C6T3I427","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427"}},{"id":"GHSA-cqhg-xjhh-p8hf","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-cqhg-xjhh-p8hf"}},{"id":"CVE-2020-10177","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10177","name":"NVD"}},{"id":"PYSEC-2020-76","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-76.yaml"}},{"id":"fedoraproject-msg-BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD"}}],"advisories":[{"title":"Snyk Advisory SNYK-PYTHON-PILLOW-574573","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574573"},{"title":"GitHub Advisory GHSA-cqhg-xjhh-p8hf","url":"https://github.com/advisories/GHSA-cqhg-xjhh-p8hf"},{"title":"CVE-2020-10177","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10177"},{"title":"GitHub Advisory PYSEC-2020-76","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-76.yaml"}],"cwes":[125],"description":"Out-of-bounds reads in Pillow","detail":"# Out-of-bounds reads in Pillow Pillow before 7.1.0 has multiple out-of-bounds reads in `libImaging/FliDecode.c`. ## Related CVE(s) BIT-pillow-2020-10177, CVE-2020-10177, PYSEC-2020-76","ratings":[{"method":"CVSSv4","severity":"high","score":7.1,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2020-07-27T21:52:43","updated":"2024-10-09T21:26:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-27921","bom-ref":"CVE-2021-27921/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.1|<8.1.2|!=8.1.2","status":"affected"},{"version":"8.1.2","status":"unaffected"}]}],"recommendation":"Update to version 8.1.2 to resolve CVE-2021-27921 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27921","name":"NVD"},"references":[{"id":"fedoraproject-msg-S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU"}},{"id":"fedoraproject-msg-ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ"}},{"id":"fedoraproject-msg-TQQY6472RX4J2SUJENWDZAWKTJJGP2ML","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML"}},{"id":"CVE-2021-27921","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27921","name":"NVD"}},{"id":"fedoraproject-msg-ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ"}},{"id":"fedoraproject-msg-TQQY6472RX4J2SUJENWDZAWKTJJGP2ML","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"PYSEC-2021-40","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-40.yaml"}},{"id":"fedoraproject-msg-S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU"}}],"advisories":[{"title":"CVE-2021-27921","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27921"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"GitHub Advisory PYSEC-2021-40","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-40.yaml"}],"cwes":[20,400],"description":"Pillow Denial of Service by Uncontrolled Resource Consumption","detail":"# Pillow Denial of Service by Uncontrolled Resource Consumption Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large. ## Related CVE(s) BIT-pillow-2021-27921, CVE-2021-27921, PYSEC-2021-40","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-18T19:55:13","updated":"2025-08-15T14:26:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-35653","bom-ref":"CVE-2020-35653/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.0.1|<8.1.0|!=8.1.0","status":"affected"},{"version":"8.1.0","status":"unaffected"}]}],"recommendation":"Update to version 8.1.0 to resolve CVE-2020-35653 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35653","name":"NVD"},"references":[{"id":"CVE-2020-35653","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35653","name":"NVD"}},{"id":"fedoraproject-msg-BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD"}},{"id":"GHSA-f5g8-5qq7-938w","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-f5g8-5qq7-938w"}},{"id":"PYSEC-2021-69","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-69.yaml"}},{"id":"fedoraproject-msg-6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html"}}],"advisories":[{"title":"CVE-2020-35653","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35653"},{"title":"GitHub Advisory GHSA-f5g8-5qq7-938w","url":"https://github.com/advisories/GHSA-f5g8-5qq7-938w"},{"title":"GitHub Advisory PYSEC-2021-69","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-69.yaml"}],"cwes":[125],"description":"Pillow Out-of-bounds Read","detail":"# Pillow Out-of-bounds Read In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations. ## Related CVE(s) BIT-pillow-2020-35653, CVE-2020-35653, PYSEC-2021-69","ratings":[{"method":"CVSSv4","severity":"high","score":8.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-18T19:55:41","updated":"2024-10-08T13:22:43","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-28675","bom-ref":"CVE-2021-28675/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.2|<8.2.0|!=8.2.0","status":"affected"},{"version":"8.2.0","status":"unaffected"}]}],"recommendation":"Update to version 8.2.0 to resolve CVE-2021-28675 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28675","name":"NVD"},"references":[{"id":"PYSEC-2021-139","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-139.yaml"}},{"id":"CVE-2021-28675","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28675","name":"NVD"}},{"id":"fedoraproject-msg-MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"GHSA-g6rj-rv7j-xwp4","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-g6rj-rv7j-xwp4"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2021-139","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-139.yaml"},{"title":"CVE-2021-28675","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28675"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"GitHub Advisory GHSA-g6rj-rv7j-xwp4","url":"https://github.com/advisories/GHSA-g6rj-rv7j-xwp4"}],"cwes":[233,252],"description":"Pillow denial of service","detail":"# Pillow denial of service An issue was discovered in Pillow before 8.2.0. `PSDImagePlugin.PsdImageFile` lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on `Image.open` prior to `Image.load`. ## Related CVE(s) BIT-pillow-2021-28675, CVE-2021-28675, PYSEC-2021-139","ratings":[{"method":"CVSSv4","severity":"high","score":7.1,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-06-08T18:49:11","updated":"2024-10-09T20:23:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-35655","bom-ref":"CVE-2020-35655/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=4.3.0|<8.1.0|!=8.1.0","status":"affected"},{"version":"8.1.0","status":"unaffected"}]}],"recommendation":"Update to version 8.1.0 to resolve CVE-2020-35655 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35655","name":"NVD"},"references":[{"id":"PYSEC-2021-71","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-71.yaml"}},{"id":"GHSA-hf64-x4gq-p99h","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-hf64-x4gq-p99h"}},{"id":"fedoraproject-msg-BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD"}},{"id":"CVE-2020-35655","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35655","name":"NVD"}},{"id":"fedoraproject-msg-6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2021-71","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-71.yaml"},{"title":"GitHub Advisory GHSA-hf64-x4gq-p99h","url":"https://github.com/advisories/GHSA-hf64-x4gq-p99h"},{"title":"CVE-2020-35655","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35655"}],"cwes":[125],"description":"Pillow Out-of-bounds Read","detail":"# Pillow Out-of-bounds Read In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled. ## Related CVE(s) BIT-pillow-2020-35655, CVE-2020-35655, PYSEC-2021-71","ratings":[{"method":"CVSSv4","severity":"medium","score":6.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"}],"published":"2021-03-18T19:55:34","updated":"2024-10-08T13:23:04","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-5313","bom-ref":"CVE-2020-5313/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=6.2.1|<6.2.2|!=6.2.2","status":"affected"},{"version":"6.2.2","status":"unaffected"}]}],"recommendation":"Update to version 6.2.2 to resolve CVE-2020-5313 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5313","name":"NVD"},"references":[{"id":"GHSA-hj69-c76v-86wr","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-hj69-c76v-86wr"}},{"id":"CVE-2020-5313","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5313","name":"NVD"}},{"id":"fedoraproject-msg-2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A"}},{"id":"fedoraproject-msg-3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P"}},{"id":"PYSEC-2020-84","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-84.yaml"}},{"id":"dsa-4631","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4631"}}],"advisories":[{"title":"GitHub Advisory GHSA-hj69-c76v-86wr","url":"https://github.com/advisories/GHSA-hj69-c76v-86wr"},{"title":"CVE-2020-5313","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5313"},{"title":"GitHub Advisory PYSEC-2020-84","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-84.yaml"},{"title":"Debian Advisory dsa-4631","url":"https://www.debian.org/security/2020/dsa-4631"}],"cwes":[125],"description":"Out-of-bounds Read in Pillow","detail":"# Out-of-bounds Read in Pillow `libImaging/FliDecode.c` in Pillow before 6.2.2 has an FLI buffer overflow. ## Related CVE(s) BIT-pillow-2020-5313, CVE-2020-5313, PYSEC-2020-84","ratings":[{"method":"CVSSv4","severity":"high","score":8.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2020-04-01T16:36:00","updated":"2024-10-08T13:02:51","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-28678","bom-ref":"CVE-2021-28678/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=5.1.0|<8.2.0|!=8.2.0","status":"affected"},{"version":"8.2.0","status":"unaffected"}]}],"recommendation":"Update to version 8.2.0 to resolve CVE-2021-28678 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28678","name":"NVD"},"references":[{"id":"GHSA-hjfx-8p6c-g7gx","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-hjfx-8p6c-g7gx"}},{"id":"PYSEC-2021-94","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-94.yaml"}},{"id":"CVE-2021-28678","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28678","name":"NVD"}},{"id":"fedoraproject-msg-MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}}],"advisories":[{"title":"GitHub Advisory GHSA-hjfx-8p6c-g7gx","url":"https://github.com/advisories/GHSA-hjfx-8p6c-g7gx"},{"title":"GitHub Advisory PYSEC-2021-94","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-94.yaml"},{"title":"CVE-2021-28678","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28678"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"}],"cwes":[345],"description":"Insufficient Verification of Data Authenticity in Pillow","detail":"# Insufficient Verification of Data Authenticity in Pillow An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data. ## Related CVE(s) BIT-pillow-2021-28678, CVE-2021-28678, PYSEC-2021-94","ratings":[{"method":"CVSSv4","severity":"medium","score":6.8,"vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-06-08T18:49:20","updated":"2024-10-14T21:48:01","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-30595","bom-ref":"CVE-2022-30595/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=9.1.0|<9.1.1|!=9.1.1","status":"affected"},{"version":"9.1.1","status":"unaffected"}]}],"recommendation":"Update to version 9.1.1 to resolve CVE-2022-30595 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30595","name":"NVD"},"references":[{"id":"CVE-2022-30595","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30595","name":"NVD"}},{"id":"PYSEC-2022-43145","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-43145.yaml"}}],"advisories":[{"title":"CVE-2022-30595","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30595"},{"title":"GitHub Advisory PYSEC-2022-43145","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-43145.yaml"}],"cwes":[120],"description":"Buffer over-flow in Pillow","detail":"# Buffer over-flow in Pillow When reading a TGA file with RLE packets that cross scan lines, Pillow reads the information past the end of the first line without deducting that from the length of the remaining file data. This vulnerability was introduced in Pillow 9.1.0, and can cause a heap buffer overflow. Opening an image with a zero or negative height has been found to bypass a decompression bomb check. This will now raise a SyntaxError instead, in turn raising a PIL.UnidentifiedImageError. ## Related CVE(s) BIT-pillow-2022-30595, CVE-2022-30595, PYSEC-2022-43145","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-05-26T00:01:27","updated":"2024-11-26T18:40:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-16865","bom-ref":"CVE-2019-16865/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=6.1.0|<6.2.0|!=6.2.0","status":"affected"},{"version":"6.2.0","status":"unaffected"}]}],"recommendation":"Update to version 6.2.0 to resolve CVE-2019-16865 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16865","name":"NVD"},"references":[{"id":"CVE-2019-16865","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16865","name":"NVD"}},{"id":"GHSA-j7mj-748x-7p78","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-j7mj-748x-7p78"}},{"id":"RHSA-2020:0694","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0694"}},{"id":"RHSA-2020:0580","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0580"}},{"id":"RHSA-2020:0578","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0578"}},{"id":"RHSA-2020:0683","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0683"}},{"id":"RHSA-2020:0566","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0566"}},{"id":"fedoraproject-msg-LYDXD7EE4YAEVSTNIFZKNVPRVJX5ZOG3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYDXD7EE4YAEVSTNIFZKNVPRVJX5ZOG3"}},{"id":"PYSEC-2019-110","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2019-110.yaml"}},{"id":"dsa-4631","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4631"}},{"id":"RHSA-2020:0681","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0681"}},{"id":"USN-4272-1","source":{"name":"Ubuntu Advisory","url":"https://ubuntu.com/security/notices/USN-4272-1"}},{"id":"fedoraproject-msg-EMJBUZQGQ2Q7HXYCQVRLU7OXNC7CAWWU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EMJBUZQGQ2Q7HXYCQVRLU7OXNC7CAWWU"}}],"advisories":[{"title":"CVE-2019-16865","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16865"},{"title":"GitHub Advisory GHSA-j7mj-748x-7p78","url":"https://github.com/advisories/GHSA-j7mj-748x-7p78"},{"title":"Red Hat Advisory RHSA-2020:0694","url":"https://access.redhat.com/errata/RHSA-2020:0694"},{"title":"Red Hat Advisory RHSA-2020:0580","url":"https://access.redhat.com/errata/RHSA-2020:0580"},{"title":"Red Hat Advisory RHSA-2020:0578","url":"https://access.redhat.com/errata/RHSA-2020:0578"},{"title":"Red Hat Advisory RHSA-2020:0683","url":"https://access.redhat.com/errata/RHSA-2020:0683"},{"title":"Red Hat Advisory RHSA-2020:0566","url":"https://access.redhat.com/errata/RHSA-2020:0566"},{"title":"GitHub Advisory PYSEC-2019-110","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2019-110.yaml"},{"title":"Debian Advisory dsa-4631","url":"https://www.debian.org/security/2020/dsa-4631"},{"title":"Red Hat Advisory RHSA-2020:0681","url":"https://access.redhat.com/errata/RHSA-2020:0681"},{"title":"Ubuntu Advisory USN-4272-1","url":"https://ubuntu.com/security/notices/USN-4272-1"}],"cwes":[770],"description":"DOS attack in Pillow when processing specially crafted image files","detail":"# DOS attack in Pillow when processing specially crafted image files An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image. ## Related CVE(s) CVE-2019-16865, PYSEC-2019-110","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2019-10-22T14:40:42","updated":"2024-10-09T21:24:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-jgpv-4h4c-xhw3","bom-ref":"GHSA-jgpv-4h4c-xhw3/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.1|<8.1.2|!=8.1.2","status":"affected"},{"version":"8.1.2","status":"unaffected"}]}],"recommendation":"Update to version 8.1.2 to resolve GHSA-jgpv-4h4c-xhw3 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3"},"references":[{"id":"GHSA-jgpv-4h4c-xhw3","source":{"name":"GitHub Advisory","url":"https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3"}}],"advisories":[{"title":"GitHub Advisory GHSA-jgpv-4h4c-xhw3","url":"https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3"}],"cwes":[400],"description":"Uncontrolled Resource Consumption in pillow","detail":"# Uncontrolled Resource Consumption in pillow ### Impact _Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large._ ### Patches _An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._ ### Workarounds _An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._ ### References https://nvd.nist.gov/vuln/detail/CVE-2021-27921 ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-04-23T16:54:36","updated":"2024-12-02T05:42:54","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-45198","bom-ref":"CVE-2022-45198/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=9.1.1|<9.2.0|!=9.2.0","status":"affected"},{"version":"9.2.0","status":"unaffected"}]}],"recommendation":"Update to version 9.2.0 to resolve CVE-2022-45198 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45198","name":"NVD"},"references":[{"id":"CVE-2022-45198","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45198","name":"NVD"}},{"id":"PYSEC-2022-42979","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42979.yaml"}},{"id":"glsa-202211-10","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202211-10"}}],"advisories":[{"title":"CVE-2022-45198","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45198"},{"title":"GitHub Advisory PYSEC-2022-42979","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42979.yaml"},{"title":"Gentoo Advisory glsa-202211-10","url":"https://security.gentoo.org/glsa/202211-10"}],"cwes":[409],"description":"Pillow vulnerable to Data Amplification attack.","detail":"# Pillow vulnerable to Data Amplification attack. Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification). ## Related CVE(s) BIT-pillow-2022-45198, CVE-2022-45198, PYSEC-2022-42979","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-11-14T12:00:15","updated":"2024-10-14T18:39:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-25291","bom-ref":"CVE-2021-25291/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.2|<8.2.0|!=8.2.0","status":"affected"},{"version":"8.2.0","status":"unaffected"}]}],"recommendation":"Update to version 8.2.0 to resolve CVE-2021-25291 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25291","name":"NVD"},"references":[{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"CVE-2021-25291","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25291","name":"NVD"}},{"id":"PYSEC-2021-37","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-37.yaml"}},{"id":"GHSA-mvg9-xffr-p774","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-mvg9-xffr-p774"}}],"advisories":[{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"CVE-2021-25291","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25291"},{"title":"GitHub Advisory PYSEC-2021-37","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-37.yaml"},{"title":"GitHub Advisory GHSA-mvg9-xffr-p774","url":"https://github.com/advisories/GHSA-mvg9-xffr-p774"}],"cwes":[125],"description":"Out of bounds read in Pillow","detail":"# Out of bounds read in Pillow An issue was discovered in Pillow before 8.2.0. In `TiffDecode.c`, there is an out-of-bounds read in `TiffreadRGBATile` via invalid tile boundaries. ## Related CVE(s) BIT-pillow-2021-25291, CVE-2021-25291, PYSEC-2021-37","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-29T16:35:57","updated":"2024-10-09T21:25:39","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-25293","bom-ref":"CVE-2021-25293/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=4.3.0|<8.1.1|!=8.1.1","status":"affected"},{"version":"8.1.1","status":"unaffected"}]}],"recommendation":"Update to version 8.1.1 to resolve CVE-2021-25293 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25293","name":"NVD"},"references":[{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"CVE-2021-25293","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25293","name":"NVD"}},{"id":"GHSA-p43w-g3c5-g5mq","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-p43w-g3c5-g5mq"}},{"id":"PYSEC-2021-39","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-39.yaml"}}],"advisories":[{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"CVE-2021-25293","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25293"},{"title":"GitHub Advisory GHSA-p43w-g3c5-g5mq","url":"https://github.com/advisories/GHSA-p43w-g3c5-g5mq"},{"title":"GitHub Advisory PYSEC-2021-39","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-39.yaml"}],"cwes":[125],"description":"Out of bounds read in Pillow","detail":"# Out of bounds read in Pillow An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c. ## Related CVE(s) BIT-pillow-2021-25293, CVE-2021-25293, PYSEC-2021-39","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-29T16:35:27","updated":"2024-10-09T20:24:39","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-5312","bom-ref":"CVE-2020-5312/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=6.2.1|<6.2.2|!=6.2.2","status":"affected"},{"version":"6.2.2","status":"unaffected"}]}],"recommendation":"Update to version 6.2.2 to resolve CVE-2020-5312 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5312","name":"NVD"},"references":[{"id":"GHSA-p49h-hjvm-jg3h","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-p49h-hjvm-jg3h"}},{"id":"fedoraproject-msg-2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A"}},{"id":"PYSEC-2020-83","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-83.yaml"}},{"id":"RHSA-2020:0694","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0694"}},{"id":"RHSA-2020:0580","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0580"}},{"id":"fedoraproject-msg-3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P"}},{"id":"PYSEC-2020-83","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml"}},{"id":"RHSA-2020:0578","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0578"}},{"id":"RHSA-2020:0683","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0683"}},{"id":"RHSA-2020:0566","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0566"}},{"id":"CVE-2020-5312","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5312","name":"NVD"}},{"id":"dsa-4631","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4631"}},{"id":"RHSA-2020:0681","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0681"}}],"advisories":[{"title":"GitHub Advisory GHSA-p49h-hjvm-jg3h","url":"https://github.com/advisories/GHSA-p49h-hjvm-jg3h"},{"title":"GitHub Advisory PYSEC-2020-83","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-83.yaml"},{"title":"Red Hat Advisory RHSA-2020:0694","url":"https://access.redhat.com/errata/RHSA-2020:0694"},{"title":"Red Hat Advisory RHSA-2020:0580","url":"https://access.redhat.com/errata/RHSA-2020:0580"},{"title":"GitHub Advisory PYSEC-2020-83","url":"https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml"},{"title":"Red Hat Advisory RHSA-2020:0578","url":"https://access.redhat.com/errata/RHSA-2020:0578"},{"title":"Red Hat Advisory RHSA-2020:0683","url":"https://access.redhat.com/errata/RHSA-2020:0683"},{"title":"Red Hat Advisory RHSA-2020:0566","url":"https://access.redhat.com/errata/RHSA-2020:0566"},{"title":"CVE-2020-5312","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5312"},{"title":"Debian Advisory dsa-4631","url":"https://www.debian.org/security/2020/dsa-4631"},{"title":"Red Hat Advisory RHSA-2020:0681","url":"https://access.redhat.com/errata/RHSA-2020:0681"}],"cwes":[120],"description":"PCX P mode buffer overflow in Pillow","detail":"# PCX P mode buffer overflow in Pillow libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. ## Related CVE(s) BIT-pillow-2020-5312, CVE-2020-5312, PYSEC-2020-83","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-11-03T18:05:04","updated":"2024-10-08T13:23:23","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-22815","bom-ref":"CVE-2022-22815/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.4.0|<9.0.0|!=9.0.0","status":"affected"},{"version":"9.0.0","status":"unaffected"}]}],"recommendation":"Update to version 9.0.0 to resolve CVE-2022-22815 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22815","name":"NVD"},"references":[{"id":"dsa-5053","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2022/dsa-5053"}},{"id":"PYSEC-2022-8","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-8.yaml"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html"}},{"id":"CVE-2022-22815","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22815","name":"NVD"}},{"id":"GHSA-pw3c-h7wp-cvhx","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-pw3c-h7wp-cvhx"}}],"advisories":[{"title":"Debian Advisory dsa-5053","url":"https://www.debian.org/security/2022/dsa-5053"},{"title":"GitHub Advisory PYSEC-2022-8","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-8.yaml"},{"title":"CVE-2022-22815","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22815"},{"title":"GitHub Advisory GHSA-pw3c-h7wp-cvhx","url":"https://github.com/advisories/GHSA-pw3c-h7wp-cvhx"}],"cwes":[665],"description":"Improper Initialization in Pillow","detail":"# Improper Initialization in Pillow Pillow is the friendly PIL (Python Imaging Library) fork. `path_getbbox` in `path.c` in Pillow before 9.0.0 improperly initializes `ImagePath.Path`. ## Related CVE(s) BIT-pillow-2022-22815, CVE-2022-22815, PYSEC-2022-8","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"}],"published":"2022-01-12T20:07:43","updated":"2024-10-14T18:38:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-45199","bom-ref":"CVE-2022-45199/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=9.2.0|<9.3.0|!=9.3.0","status":"affected"},{"version":"9.3.0","status":"unaffected"}]}],"recommendation":"Update to version 9.3.0 to resolve CVE-2022-45199 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45199","name":"NVD"},"references":[{"id":"PYSEC-2022-42980","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42980.yaml"}},{"id":"glsa-202211-10","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202211-10"}},{"id":"CVE-2022-45199","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45199","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2022-42980","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42980.yaml"},{"title":"Gentoo Advisory glsa-202211-10","url":"https://security.gentoo.org/glsa/202211-10"},{"title":"CVE-2022-45199","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45199"}],"cwes":[400],"description":"Pillow subject to DoS via SAMPLESPERPIXEL tag","detail":"# Pillow subject to DoS via SAMPLESPERPIXEL tag Pillow starting with 9.2.0 and prior to 9.3.0 allows denial of service via SAMPLESPERPIXEL. A large value in the SAMPLESPERPIXEL tag could lead to a memory and runtime DOS in TiffImagePlugin.py when setting up the context for image decoding. This issue has been patched in version 9.3.0. ## Related CVE(s) BIT-pillow-2022-45199, CVE-2022-45199, PYSEC-2022-42980","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-11-14T12:00:15","updated":"2024-10-14T18:44:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-28677","bom-ref":"CVE-2021-28677/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.1.2|<8.2.0|!=8.2.0","status":"affected"},{"version":"8.2.0","status":"unaffected"}]}],"recommendation":"Update to version 8.2.0 to resolve CVE-2021-28677 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28677","name":"NVD"},"references":[{"id":"GHSA-q5hq-fp76-qmrc","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-q5hq-fp76-qmrc"}},{"id":"fedoraproject-msg-MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"PYSEC-2021-93","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-93.yaml"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html"}},{"id":"CVE-2021-28677","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28677","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-q5hq-fp76-qmrc","url":"https://github.com/advisories/GHSA-q5hq-fp76-qmrc"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"GitHub Advisory PYSEC-2021-93","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-93.yaml"},{"title":"CVE-2021-28677","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28677"}],"cwes":[400],"description":"Uncontrolled Resource Consumption in Pillow","detail":"# Uncontrolled Resource Consumption in Pillow An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of and as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening. ## Related CVE(s) BIT-pillow-2021-28677, CVE-2021-28677, PYSEC-2021-93","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-06-08T18:49:36","updated":"2024-10-14T21:48:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-5311","bom-ref":"CVE-2020-5311/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=6.2.1|<6.2.2|!=6.2.2","status":"affected"},{"version":"6.2.2","status":"unaffected"}]}],"recommendation":"Update to version 6.2.2 to resolve CVE-2020-5311 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5311","name":"NVD"},"references":[{"id":"CVE-2020-5311","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5311","name":"NVD"}},{"id":"fedoraproject-msg-2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A"}},{"id":"GHSA-r7rm-8j6h-r933","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-r7rm-8j6h-r933"}},{"id":"RHSA-2020:0580","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0580"}},{"id":"fedoraproject-msg-3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P"}},{"id":"RHSA-2020:0566","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0566"}},{"id":"PYSEC-2020-82","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-82.yaml"}},{"id":"dsa-4631","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4631"}}],"advisories":[{"title":"CVE-2020-5311","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5311"},{"title":"GitHub Advisory GHSA-r7rm-8j6h-r933","url":"https://github.com/advisories/GHSA-r7rm-8j6h-r933"},{"title":"Red Hat Advisory RHSA-2020:0580","url":"https://access.redhat.com/errata/RHSA-2020:0580"},{"title":"Red Hat Advisory RHSA-2020:0566","url":"https://access.redhat.com/errata/RHSA-2020:0566"},{"title":"GitHub Advisory PYSEC-2020-82","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-82.yaml"},{"title":"Debian Advisory dsa-4631","url":"https://www.debian.org/security/2020/dsa-4631"}],"cwes":[120],"description":"Buffer Copy without Checking Size of Input in Pillow","detail":"# Buffer Copy without Checking Size of Input in Pillow `libImaging/SgiRleDecode.c` in Pillow before 6.2.2 has an SGI buffer overflow. ## Related CVE(s) BIT-pillow-2020-5311, CVE-2020-5311, PYSEC-2020-82","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-05-24T17:05:33","updated":"2024-10-08T13:23:04","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-25288","bom-ref":"CVE-2021-25288/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=2.4.0|<8.2.0|!=8.2.0","status":"affected"},{"version":"8.2.0","status":"unaffected"}]}],"recommendation":"Update to version 8.2.0 to resolve CVE-2021-25288 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25288","name":"NVD"},"references":[{"id":"fedoraproject-msg-MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL"}},{"id":"CVE-2021-25288","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25288","name":"NVD"}},{"id":"glsa-202107-33","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-33"}},{"id":"GHSA-rwv7-3v45-hg29","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-rwv7-3v45-hg29"}},{"id":"PYSEC-2021-138","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-138.yaml"}}],"advisories":[{"title":"CVE-2021-25288","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25288"},{"title":"Gentoo Advisory glsa-202107-33","url":"https://security.gentoo.org/glsa/202107-33"},{"title":"GitHub Advisory GHSA-rwv7-3v45-hg29","url":"https://github.com/advisories/GHSA-rwv7-3v45-hg29"},{"title":"GitHub Advisory PYSEC-2021-138","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-138.yaml"}],"cwes":[125],"description":"Pillow Out-of-bounds Read vulnerability","detail":"# Pillow Out-of-bounds Read vulnerability An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i. This dates to Pillow 2.4.0. ## Related CVE(s) BIT-pillow-2021-25288, CVE-2021-25288, PYSEC-2021-138","ratings":[{"method":"CVSSv4","severity":"high","score":8.8,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-06-08T18:49:28","updated":"2024-10-09T21:25:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-5310","bom-ref":"CVE-2020-5310/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=6.2.1|<6.2.2|!=6.2.2","status":"affected"},{"version":"6.2.2","status":"unaffected"}]}],"recommendation":"Update to version 6.2.2 to resolve CVE-2020-5310 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5310","name":"NVD"},"references":[{"id":"fedoraproject-msg-2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A"}},{"id":"PYSEC-2020-81","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml"}},{"id":"GHSA-vcqg-3p29-xw73","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-vcqg-3p29-xw73"}},{"id":"fedoraproject-msg-3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P"}},{"id":"PYSEC-2020-81","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml"}},{"id":"CVE-2020-5310","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5310","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2020-81","url":"https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml"},{"title":"GitHub Advisory GHSA-vcqg-3p29-xw73","url":"https://github.com/advisories/GHSA-vcqg-3p29-xw73"},{"title":"GitHub Advisory PYSEC-2020-81","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml"},{"title":"CVE-2020-5310","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5310"}],"cwes":[190],"description":"Integer overflow in Pillow","detail":"# Integer overflow in Pillow `libImaging/TiffDecode.c` in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. ## Related CVE(s) BIT-pillow-2020-5310, CVE-2020-5310, PYSEC-2020-81","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-11-03T18:04:41","updated":"2024-10-08T13:22:46","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-10994","bom-ref":"CVE-2020-10994/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=7.0.0|<7.1.0|!=7.1.0","status":"affected"},{"version":"7.1.0","status":"unaffected"}]}],"recommendation":"Update to version 7.1.0 to resolve CVE-2020-10994 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10994","name":"NVD"},"references":[{"id":"SNYK-PYTHON-PILLOW-574575","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574575"}},{"id":"CVE-2020-10994","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10994","name":"NVD"}},{"id":"GHSA-vj42-xq3r-hr3r","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-vj42-xq3r-hr3r"}},{"id":"fedoraproject-msg-BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD"}},{"id":"PYSEC-2020-79","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-79.yaml"}},{"id":"fedoraproject-msg-HOKHNWV2VS5GESY7IBD237E7C6T3I427","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427"}}],"advisories":[{"title":"Snyk Advisory SNYK-PYTHON-PILLOW-574575","url":"https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574575"},{"title":"CVE-2020-10994","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10994"},{"title":"GitHub Advisory GHSA-vj42-xq3r-hr3r","url":"https://github.com/advisories/GHSA-vj42-xq3r-hr3r"},{"title":"GitHub Advisory PYSEC-2020-79","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-79.yaml"}],"cwes":[125],"description":"Out-of-bounds reads in Pillow","detail":"# Out-of-bounds reads in Pillow In `libImaging/Jpeg2KDecode.c` in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file. ## Related CVE(s) BIT-pillow-2020-10994, CVE-2020-10994, PYSEC-2020-79","ratings":[{"method":"CVSSv4","severity":"high","score":7.1,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2020-07-27T21:52:39","updated":"2024-10-09T20:01:45","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-35654","bom-ref":"CVE-2020-35654/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.0.1|<8.1.0|!=8.1.0","status":"affected"},{"version":"8.1.0","status":"unaffected"}]}],"recommendation":"Update to version 8.1.0 to resolve CVE-2020-35654 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35654","name":"NVD"},"references":[{"id":"PYSEC-2021-70","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-70.yaml"}},{"id":"GHSA-vqcj-wrf2-7v73","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-vqcj-wrf2-7v73"}},{"id":"fedoraproject-msg-TQQY6472RX4J2SUJENWDZAWKTJJGP2ML","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML"}},{"id":"fedoraproject-msg-BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD"}},{"id":"fedoraproject-msg-ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ"}},{"id":"fedoraproject-msg-6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE"}},{"id":"CVE-2020-35654","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35654","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2021-70","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-70.yaml"},{"title":"GitHub Advisory GHSA-vqcj-wrf2-7v73","url":"https://github.com/advisories/GHSA-vqcj-wrf2-7v73"},{"title":"CVE-2020-35654","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35654"}],"cwes":[787],"description":"Pillow Out-of-bounds Write","detail":"# Pillow Out-of-bounds Write In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. ## Related CVE(s) BIT-pillow-2020-35654, CVE-2020-35654, PYSEC-2021-70","ratings":[{"method":"CVSSv4","severity":"high","score":8.6,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-03-18T19:55:27","updated":"2024-10-14T18:39:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-48379","bom-ref":"CVE-2025-48379/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=11.2.0|<11.3.0|!=11.3.0","status":"affected"},{"version":"11.3.0","status":"unaffected"}]}],"recommendation":"Update to version 11.3.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-48379","name":"NVD"},"references":[{"id":"GHSA-xg8h-j46f-w952","source":{"name":"GitHub Advisory","url":"https://github.com/python-pillow/Pillow/security/advisories/GHSA-xg8h-j46f-w952"}},{"id":"CVE-2025-48379","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-48379","name":"NVD"}},{"id":"PYSEC-2025-61","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2025-61.yaml"}}],"advisories":[{"title":"GitHub Advisory GHSA-xg8h-j46f-w952","url":"https://github.com/python-pillow/Pillow/security/advisories/GHSA-xg8h-j46f-w952"},{"title":"CVE-2025-48379","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-48379"},{"title":"GitHub Advisory PYSEC-2025-61","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2025-61.yaml"}],"cwes":[122],"description":"Pillow vulnerability can cause write buffer overflow on BCn encoding","detail":"# Pillow vulnerability can cause write buffer overflow on BCn encoding There is a heap buffer overflow when writing a sufficiently large (>64k encoded with default settings) image in the DDS format due to writing into a buffer without checking for available space. This only affects users who save untrusted data as a compressed DDS image. * Unclear how large the potential write could be. It is likely limited by process segfault, so it's not necessarily deterministic. It may be practically unbounded. * Unclear if there's a restriction on the bytes that could be emitted. It's likely that the only restriction is that the bytes would be emitted in chunks of 8 or 16. This was introduced in Pillow 11.2.0 when the feature was added. ## Related CVE(s) BIT-pillow-2025-48379, CVE-2025-48379, PYSEC-2025-61","ratings":[{"method":"CVSSv31","severity":"high","score":7.1,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"published":"2025-07-01T17:29:37","updated":"2025-07-03T06:59:13","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-22816","bom-ref":"CVE-2022-22816/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=8.4.0|<9.0.0|!=9.0.0","status":"affected"},{"version":"9.0.0","status":"unaffected"}]}],"recommendation":"Update to version 9.0.0 to resolve CVE-2022-22816 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22816","name":"NVD"},"references":[{"id":"GHSA-xrcv-f9gm-v42c","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-xrcv-f9gm-v42c"}},{"id":"dsa-5053","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2022/dsa-5053"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html"}},{"id":"glsa-202211-10","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202211-10"}},{"id":"PYSEC-2022-9","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-9.yaml"}},{"id":"CVE-2022-22816","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22816","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-xrcv-f9gm-v42c","url":"https://github.com/advisories/GHSA-xrcv-f9gm-v42c"},{"title":"Debian Advisory dsa-5053","url":"https://www.debian.org/security/2022/dsa-5053"},{"title":"Gentoo Advisory glsa-202211-10","url":"https://security.gentoo.org/glsa/202211-10"},{"title":"GitHub Advisory PYSEC-2022-9","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-9.yaml"},{"title":"CVE-2022-22816","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22816"}],"cwes":[125],"description":"Out-of-bounds Read in Pillow","detail":"# Out-of-bounds Read in Pillow path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path. ## Related CVE(s) BIT-pillow-2022-22816, CVE-2022-22816, PYSEC-2022-9","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"}],"published":"2022-01-12T20:07:41","updated":"2024-10-14T18:38:42","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"PYSEC-2023-175","bom-ref":"PYSEC-2023-175/pkg:pypi/pillow","affects":[{"ref":"pkg:pypi/pillow","versions":[{"range":"vers:pypi/>=1.0|<=9.5.0|<10.0.1|!=10.0.1","status":"affected"},{"version":"10.0.1","status":"unaffected"}]}],"recommendation":"Update to version 10.0.1 to resolve PYSEC-2023-175 or update to version 11.3.0 to resolve additional vulnerabilities for this package.","source":{"name":"Google"},"references":[{"id":"CVE-2023-5129","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5129","name":"NVD"}},{"id":"CVE-2023-4863","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4863","name":"NVD"}}],"advisories":[{"title":"CVE-2023-5129","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5129"},{"title":"CVE-2023-4863","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4863"}],"cwes":[],"description":"Summary","detail":"# Summary Pillow versions before v10.0.1 bundled libwebp binaries in wheels that are vulnerable to CVE-2023-5129 (previously CVE-2023-4863). Pillow v10.0.1 upgrades the bundled libwebp binary to v1.3.2.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2023-09-20T05:46:53","updated":"2023-09-25T17:25:13","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/matplotlib@3.10.6\", \"pkg:pypi/pillow@11.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-3828","bom-ref":"CVE-2021-3828/pkg:pypi/nltk","affects":[{"ref":"pkg:pypi/nltk","versions":[{"range":"vers:pypi/>=0.8|<=3.6.3|<3.6.4|!=3.6.4","status":"affected"},{"version":"3.6.4","status":"unaffected"}]}],"recommendation":"Update to version 3.6.4 to resolve CVE-2021-3828 or update to version 3.9 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3828","name":"NVD"},"references":[{"id":"GHSA-2ww3-fxvq-293j","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-2ww3-fxvq-293j"}},{"id":"CVE-2021-3828","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3828","name":"NVD"}},{"id":"PYSEC-2021-356","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2021-356.yaml"}}],"advisories":[{"title":"GitHub Advisory GHSA-2ww3-fxvq-293j","url":"https://github.com/advisories/GHSA-2ww3-fxvq-293j"},{"title":"CVE-2021-3828","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3828"},{"title":"GitHub Advisory PYSEC-2021-356","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2021-356.yaml"}],"cwes":[1333,697],"description":"NLTK Vulnerable to REDoS","detail":"# NLTK Vulnerable to REDoS The nltk package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide as an input to the [`_read_comparison_block()`(https://github.com/nltk/nltk/blob/23f4b1c4b4006b0cb3ec278e801029557cec4e82/nltk/corpus/reader/comparative_sents.py#L259) function in the file `nltk/corpus/reader/comparative_sents.py` may cause an application to consume an excessive amount of CPU. ## Related CVE(s) CVE-2021-3828, PYSEC-2021-356","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2021-09-29T17:14:53","updated":"2024-10-07T15:22:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/nltk@3.9.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2024-39705","bom-ref":"CVE-2024-39705/pkg:pypi/nltk","affects":[{"ref":"pkg:pypi/nltk","versions":[{"range":"vers:pypi/>=0.8|<=3.9b1|<3.9|!=3.9","status":"affected"},{"version":"3.9","status":"unaffected"}]}],"recommendation":"Update to version 3.9.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39705","name":"NVD"},"references":[{"id":"CVE-2024-39705","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39705","name":"NVD"}},{"id":"PYSEC-2024-167","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2024-167.yaml"}}],"advisories":[{"title":"CVE-2024-39705","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39705"},{"title":"GitHub Advisory PYSEC-2024-167","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2024-167.yaml"}],"cwes":[300,502],"description":"ntlk unsafe deserialization vulnerability","detail":"# ntlk unsafe deserialization vulnerability NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python code, and the integrated data package download functionality is used. This affects, for example, averaged_perceptron_tagger and punkt. ## Related CVE(s) CVE-2024-39705, PYSEC-2024-167","ratings":[{"method":"CVSSv4","severity":"high","score":7.5,"vector":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-06-28T00:33:31","updated":"2025-01-21T18:36:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/nltk@3.9.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-43854","bom-ref":"CVE-2021-43854/pkg:pypi/nltk","affects":[{"ref":"pkg:pypi/nltk","versions":[{"range":"vers:pypi/>=0.8|<=3.6.5|<3.6.6|!=3.6.6","status":"affected"},{"version":"3.6.6","status":"unaffected"}]}],"recommendation":"Update to version 3.6.6 to resolve CVE-2021-43854 or update to version 3.9 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43854","name":"NVD"},"references":[{"id":"CVE-2021-43854","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43854","name":"NVD"}},{"id":"GHSA-f8m6-h2c7-8h9x","source":{"name":"GitHub Advisory","url":"https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x"}},{"id":"PYSEC-2021-859","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2021-859.yaml"}}],"advisories":[{"title":"CVE-2021-43854","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43854"},{"title":"GitHub Advisory GHSA-f8m6-h2c7-8h9x","url":"https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x"},{"title":"GitHub Advisory PYSEC-2021-859","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2021-859.yaml"}],"cwes":[400],"description":"Inefficient Regular Expression Complexity in nltk (word_tokenize, sent_tokenize)","detail":"# Inefficient Regular Expression Complexity in nltk (word_tokenize, sent_tokenize) ### Impact The vulnerability is present in [`PunktSentenceTokenizer`](https://www.nltk.org/api/nltk.tokenize.punkt.html#nltk.tokenize.punkt.PunktSentenceTokenizer), [`sent_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.sent_tokenize) and [`word_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.word_tokenize). Any users of this class, or these two functions, are vulnerable to a Regular Expression Denial of Service (ReDoS) attack. In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. The effect of this vulnerability is noticeable with the following example: ```python from nltk.tokenize import word_tokenize n = 8 for length in [10**i for i in range(2, n)]: # Prepare a malicious input text = \"a\" * length start_t = time.time() # Call `word_tokenize` and naively measure the execution time word_tokenize(text) print(f\"A length of {length:<{n}} takes {time.time() - start_t:.4f}s\") ``` Which gave the following output during testing: ```python A length of 100 takes 0.0060s A length of 1000 takes 0.0060s A length of 10000 takes 0.6320s A length of 100000 takes 56.3322s ... ``` I canceled the execution of the program after running it for several hours. If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability, or applying the workaround described below. ### Patches The problem has been patched in NLTK 3.6.6. After the fix, running the above program gives the following result: ```python A length of 100 takes 0.0070s A length of 1000 takes 0.0010s A length of 10000 takes 0.0060s A length of 100000 takes 0.0400s A length of 1000000 takes 0.3520s A length of 10000000 takes 3.4641s ``` This output shows a linear relationship in execution time versus input length, which is desirable for regular expressions. We recommend updating to NLTK 3.6.6+ if possible. ### Workarounds The execution time of the vulnerable functions is exponential to the length of a malicious input. With other words, the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit. ### References * The issue showcasing the vulnerability: https://github.com/nltk/nltk/issues/2866 * The pull request containing considerably more information on the vulnerability, and the fix: https://github.com/nltk/nltk/pull/2869 * The commit containing the fix: 1405aad979c6b8080dbbc8e0858f89b2e3690341 * Information on CWE-1333: Inefficient Regular Expression Complexity: https://cwe.mitre.org/data/definitions/1333.html ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/nltk/nltk](https://github.com/nltk/nltk) * Email us at [nltk.team@gmail.com](mailto:nltk.team@gmail.com) ## Related CVE(s) CVE-2021-43854, PYSEC-2021-859","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-01-06T17:38:45","updated":"2024-09-26T14:44:23","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/nltk@3.9.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-14751","bom-ref":"CVE-2019-14751/pkg:pypi/nltk","affects":[{"ref":"pkg:pypi/nltk","versions":[{"range":"vers:pypi/>=0.8|<=3.4.4|<3.4.5|!=3.4.5","status":"affected"},{"version":"3.4.5","status":"unaffected"}]}],"recommendation":"Update to version 3.4.5 to resolve CVE-2019-14751 or update to version 3.9 to resolve additional vulnerabilities for this package.","source":{"url":"https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751"},"references":[{"id":"GHSA-mr7p-25v2-35wr","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-mr7p-25v2-35wr"}},{"id":"opensuse-msg-msg00001","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html"}},{"id":"cve-2019-14751","source":{"url":"https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751"}},{"id":"CVE-2019-14751","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14751","name":"NVD"}},{"id":"fedoraproject-msg-QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D"}},{"id":"opensuse-msg-msg00054","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00054.html"}},{"id":"PYSEC-2019-106","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2019-106.yaml"}},{"id":"fedoraproject-msg-ZGZSSEJH7RHH3RBUEVWWYT75QU67J7SE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGZSSEJH7RHH3RBUEVWWYT75QU67J7SE"}}],"advisories":[{"title":"GitHub Advisory GHSA-mr7p-25v2-35wr","url":"https://github.com/advisories/GHSA-mr7p-25v2-35wr"},{"title":"cve-2019-14751","url":"https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751"},{"title":"CVE-2019-14751","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14751"},{"title":"GitHub Advisory PYSEC-2019-106","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2019-106.yaml"}],"cwes":[22],"description":"NLTK Vulnerable To Path Traversal","detail":"# NLTK Vulnerable To Path Traversal NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a `../` (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction. ## Related CVE(s) CVE-2019-14751, PYSEC-2019-106","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"}],"published":"2019-08-23T21:53:51","updated":"2024-10-07T15:12:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/nltk@3.9.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-3842","bom-ref":"CVE-2021-3842/pkg:pypi/nltk","affects":[{"ref":"pkg:pypi/nltk","versions":[{"range":"vers:pypi/>=0.8|<=3.6.5|<3.6.6|!=3.6.6","status":"affected"},{"version":"3.6.6","status":"unaffected"}]}],"recommendation":"Update to version 3.6.6 to resolve CVE-2021-3842 or update to version 3.9 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3842","name":"NVD"},"references":[{"id":"CVE-2021-3842","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3842","name":"NVD"}},{"id":"PYSEC-2022-5","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2022-5.yaml"}}],"advisories":[{"title":"CVE-2021-3842","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3842"},{"title":"GitHub Advisory PYSEC-2022-5","url":"https://github.com/pypa/advisory-database/tree/main/vulns/nltk/PYSEC-2022-5.yaml"}],"cwes":[1333],"description":"NLTK Vulnerable to REDoS","detail":"# NLTK Vulnerable to REDoS NLTK is vulnerable to REDoS in some RegexpTaggers used in the functions `get_pos_tagger` and `malt_regex_tagger`. ## Related CVE(s) CVE-2021-3842, PYSEC-2022-5","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-01-06T22:24:14","updated":"2024-09-26T14:44:52","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/nltk@3.9.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2024-34062","bom-ref":"CVE-2024-34062/pkg:pypi/tqdm","affects":[{"ref":"pkg:pypi/tqdm","versions":[{"range":"vers:pypi/>=4.4.0|<4.66.3|!=4.66.3","status":"affected"},{"version":"4.66.3","status":"unaffected"}]}],"recommendation":"Update to version 4.66.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34062","name":"NVD"},"references":[{"id":"CVE-2024-34062","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34062","name":"NVD"}},{"id":"GHSA-g7vv-2v7x-gj9p","source":{"name":"GitHub Advisory","url":"https://github.com/tqdm/tqdm/security/advisories/GHSA-g7vv-2v7x-gj9p"}},{"id":"fedoraproject-msg-VA337CYUS4SLRFV2P6MX6MZ2LKFURKJC","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VA337CYUS4SLRFV2P6MX6MZ2LKFURKJC"}},{"id":"fedoraproject-msg-QRECVQCCESHBS3UJOWNXQUIX725TKNY6","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRECVQCCESHBS3UJOWNXQUIX725TKNY6"}},{"id":"fedoraproject-msg-PA3GIGHPWAHCTT4UF57LTPZGWHAX3GW6","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PA3GIGHPWAHCTT4UF57LTPZGWHAX3GW6"}}],"advisories":[{"title":"CVE-2024-34062","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34062"},{"title":"GitHub Advisory GHSA-g7vv-2v7x-gj9p","url":"https://github.com/tqdm/tqdm/security/advisories/GHSA-g7vv-2v7x-gj9p"}],"cwes":[74],"description":"tqdm CLI arguments injection attack","detail":"# tqdm CLI arguments injection attack ### Impact Any optional non-boolean CLI arguments (e.g. `--delim`, `--buf-size`, `--manpath`) are passed through python's `eval`, allowing arbitrary code execution. Example: ```sh python -m tqdm --manpath=\"\\\" + str(exec(\\\"import os os.system('echo hi && killall python3')\\\")) + \\\"\" ``` ### Patches https://github.com/tqdm/tqdm/commit/4e613f84ed2ae029559f539464df83fa91feb316 released in `tqdm>=4.66.3` ### Workarounds None ### References - https://github.com/tqdm/tqdm/releases/tag/v4.66.3","ratings":[{"method":"CVSSv31","severity":"low","score":3.9,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"published":"2024-05-03T19:33:28","updated":"2024-06-10T19:03:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/huggingface-hub@0.34.4\", \"pkg:pypi/tqdm@4.67.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-18874","bom-ref":"CVE-2019-18874/pkg:pypi/psutil","affects":[{"ref":"pkg:pypi/psutil","versions":[{"range":"vers:pypi/>=0.1.0|<=5.6.5|<5.6.6|!=5.6.6","status":"affected"},{"version":"5.6.6","status":"unaffected"}]}],"recommendation":"Update to version 5.6.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18874","name":"NVD"},"references":[{"id":"fedoraproject-msg-OLETTJYZL2SMBUI4Q2NGBMGPDPP54SRG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLETTJYZL2SMBUI4Q2NGBMGPDPP54SRG"}},{"id":"CVE-2019-18874","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18874","name":"NVD"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00018.html"}},{"id":"fedoraproject-msg-2P7QI7MOTZTFXQYU23CP3RAWXCERMOAS","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P7QI7MOTZTFXQYU23CP3RAWXCERMOAS"}},{"id":"PYSEC-2019-41","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/psutil/PYSEC-2019-41.yaml"}},{"id":"GHSA-qfc5-mcwq-26q8","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-qfc5-mcwq-26q8"}}],"advisories":[{"title":"CVE-2019-18874","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18874"},{"title":"GitHub Advisory PYSEC-2019-41","url":"https://github.com/pypa/advisory-database/tree/main/vulns/psutil/PYSEC-2019-41.yaml"},{"title":"GitHub Advisory GHSA-qfc5-mcwq-26q8","url":"https://github.com/advisories/GHSA-qfc5-mcwq-26q8"}],"cwes":[415],"description":"Double Free in psutil","detail":"# Double Free in psutil psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object. ## Related CVE(s) CVE-2019-18874, PYSEC-2019-41","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2020-03-12T17:02:50","updated":"2024-10-21T21:25:46","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/accelerate@1.10.1\", \"pkg:pypi/psutil@7.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 51 locations"}]},{"id":"CVE-2023-22946","bom-ref":"CVE-2023-22946/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=2.1.1|<=3.3.1|<3.3.2|!=3.3.2","status":"affected"},{"version":"3.3.2","status":"unaffected"}]}],"recommendation":"Update to version 3.3.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22946","name":"NVD"},"references":[{"id":"apache-msg-yllfl25xh5tbotjmg93zrq4bzwhqc0gv","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/yllfl25xh5tbotjmg93zrq4bzwhqc0gv"}},{"id":"SPARK-41958","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/SPARK-41958"}},{"id":"PYSEC-2023-44","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-44.yaml"}},{"id":"CVE-2023-22946","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22946","name":"NVD"}}],"advisories":[{"title":"Apache Advisory SPARK-41958","url":"https://issues.apache.org/jira/browse/SPARK-41958"},{"title":"GitHub Advisory PYSEC-2023-44","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-44.yaml"},{"title":"CVE-2023-22946","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22946"}],"cwes":[269],"description":"Apache Spark vulnerable to Improper Privilege Management","detail":"# Apache Spark vulnerable to Improper Privilege Management In Apache Spark versions prior to versions 3.4.0 and 3.3.3, applications using spark-submit can specify a `proxy-user` to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications. Update to Apache Spark 3.4.0, 3.3.3, or later, and ensure that spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its default of \"false\", and is not overridden by submitted applications. ## Related CVE(s) BIT-spark-2023-22946, CVE-2023-22946, PYSEC-2023-44","ratings":[{"method":"CVSSv31","severity":"critical","score":9.9,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"published":"2023-04-17T09:30:23","updated":"2024-10-15T18:49:31","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable"}]},{"id":"CVE-2022-31777","bom-ref":"CVE-2022-31777/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=2.1.1|<=3.2.1|<3.2.2|!=3.2.2","status":"affected"},{"version":"3.2.2","status":"unaffected"}]}],"recommendation":"Update to version 3.2.2 to resolve CVE-2022-31777 or update to version 3.3.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31777","name":"NVD"},"references":[{"id":"SPARK-39505","source":{"name":"Archive Advisory","url":"https://web.archive.org/web/20220728105026/https://issues.apache.org/jira/browse/SPARK-39505"}},{"id":"CVE-2022-31777","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31777","name":"NVD"}},{"id":"PYSEC-2022-42976","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-42976.yaml"}},{"id":"apache-msg-60mgbswq2lsmrxykfxpqq13ztkm2ht6q","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/60mgbswq2lsmrxykfxpqq13ztkm2ht6q"}},{"id":"openwall-oss-security-msg-2022-11-01-14","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2022/11/01/14"}}],"advisories":[{"title":"Archive Advisory SPARK-39505","url":"https://web.archive.org/web/20220728105026/https://issues.apache.org/jira/browse/SPARK-39505"},{"title":"CVE-2022-31777","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31777"},{"title":"GitHub Advisory PYSEC-2022-42976","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-42976.yaml"}],"cwes":[74],"description":"Apache Spark vulnerable to Log Injection","detail":"# Apache Spark vulnerable to Log Injection A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI. ## Related CVE(s) BIT-spark-2022-31777, CVE-2022-31777, PYSEC-2022-42976","ratings":[{"method":"CVSSv31","severity":"medium","score":5.4,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}],"published":"2022-11-01T19:00:29","updated":"2024-10-25T05:23:27","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable"}]},{"id":"CVE-2022-33891","bom-ref":"CVE-2022-33891/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=2.1.1|<=3.0.3","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2022-33891. Updating to version 3.3.2 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33891","name":"NVD"},"references":[{"id":"apache-msg-p847l3kopoo5bjtmxrcwk21xp6tjxqlc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/p847l3kopoo5bjtmxrcwk21xp6tjxqlc"}},{"id":"PYSEC-2022-236","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-236.yaml"}},{"id":"openwall-oss-security-msg-2023-05-02-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/05/02/1"}},{"id":"packetstormsecurity-exploit-Apache-Spark-Unauthenticated-Command-Injection.html","source":{"name":"Packetstormsecurity Exploit","url":"https://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html"}},{"id":"packetstormsecurity-exploit-Apache-Spark-Unauthenticated-Command-Injection.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html"}},{"id":"CVE-2022-33891","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33891","name":"NVD"}},{"id":"openwall-oss-security-msg-2023-05-02-1","source":{"name":"Openwall Mailing List","url":"https://www.openwall.com/lists/oss-security/2023/05/02/1"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2022-236","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-236.yaml"},{"title":"CVE-2022-33891","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33891"}],"cwes":[78],"description":"Apache Spark UI can allow impersonation if ACLs enabled","detail":"# Apache Spark UI can allow impersonation if ACLs enabled The Apache Spark UI offers the possibility to enable ACLs via the configuration option `spark.acls.enable`. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1. A previous version of this advisory incorrectly stated that version 3.1.3 was not vulnerable. Per [GHSA-59hw-j9g6-mfg3](https://github.com/advisories/GHSA-59hw-j9g6-mfg3), version 3.1.3 is vulnerable and vulnerable version ranges in this advisory have been changed to reflect the correct information. ## Related CVE(s) BIT-spark-2022-33891, CVE-2022-33891, PYSEC-2022-236","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N"}],"published":"2022-07-19T00:00:29","updated":"2025-07-30T12:26:28","analysis":{},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable and Exploitable"}]},{"id":"CVE-2023-32007","bom-ref":"CVE-2023-32007/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=3.1.1|<3.2.2|!=3.2.2","status":"affected"},{"version":"3.2.2","status":"unaffected"}]}],"recommendation":"Update to version 3.2.2 to resolve CVE-2023-32007 or update to version 3.3.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32007","name":"NVD"},"references":[{"id":"CVE-2023-32007","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32007","name":"NVD"}},{"id":"apache-msg-poxgnxhhnzz735kr1wos366l5vdbb0nv","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv"}},{"id":"PYSEC-2023-72","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml"}},{"id":"CVE-2022-33891","source":{"url":"https://www.cve.org/CVERecord?id=CVE-2022-33891"}},{"id":"openwall-oss-security-msg-2023-05-02-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/05/02/1"}},{"id":"openwall-oss-security-msg-2023-05-02-1","source":{"name":"Openwall Mailing List","url":"https://www.openwall.com/lists/oss-security/2023/05/02/1"}}],"advisories":[{"title":"CVE-2023-32007","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32007"},{"title":"GitHub Advisory PYSEC-2023-72","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml"},{"title":"CVE-2022-33891","url":"https://www.cve.org/CVERecord?id=CVE-2022-33891"}],"cwes":[77],"description":"Apache Spark UI vulnerable to Command Injection","detail":"# Apache Spark UI vulnerable to Command Injection The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This issue was disclosed earlier as CVE-2022-33891, but incorrectly claimed version 3.1.3 (which has since gone EOL) would not be affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Users are recommended to upgrade to a supported version of Apache Spark, such as version 3.4.0. ## Related CVE(s) BIT-spark-2023-32007, CVE-2023-32007, PYSEC-2023-72","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N"}],"published":"2023-05-02T09:30:17","updated":"2025-02-13T19:10:44","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable"}]},{"id":"CVE-2018-1334","bom-ref":"CVE-2018-1334/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=2.2.0|<2.2.2|!=2.2.2","status":"affected"},{"version":"2.2.2","status":"unaffected"}]}],"recommendation":"Update to version 2.2.2 to resolve CVE-2018-1334 or update to version 3.3.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1334","name":"NVD"},"references":[{"id":"GHSA-6mqq-8r44-vmjc","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-6mqq-8r44-vmjc"}},{"id":"CVE-2018-1334","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1334","name":"NVD"}},{"id":"apache-msg-4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E"}},{"id":"CVE-2018-1334","source":{"url":"https://spark.apache.org/security.html#CVE-2018-1334"}},{"id":"PYSEC-2018-25","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2018-25.yaml"}}],"advisories":[{"title":"GitHub Advisory GHSA-6mqq-8r44-vmjc","url":"https://github.com/advisories/GHSA-6mqq-8r44-vmjc"},{"title":"CVE-2018-1334","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1334"},{"title":"CVE-2018-1334","url":"https://spark.apache.org/security.html#CVE-2018-1334"},{"title":"GitHub Advisory PYSEC-2018-25","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2018-25.yaml"}],"cwes":[200],"description":"Exposure of Sensitive Information to an Unauthorized Actor in Apache Spark","detail":"# Exposure of Sensitive Information to an Unauthorized Actor in Apache Spark In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. ## Related CVE(s) CVE-2018-1334, PYSEC-2018-25","ratings":[{"method":"CVSSv4","severity":"medium","score":6.0,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"}],"published":"2019-03-14T15:41:04","updated":"2024-10-21T21:27:08","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable"}]},{"id":"CVE-2021-38296","bom-ref":"CVE-2021-38296/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=2.1.1|<=3.1.2|<3.1.3|!=3.1.3","status":"affected"},{"version":"3.1.3","status":"unaffected"}]}],"recommendation":"Update to version 3.1.3 to resolve CVE-2021-38296 or update to version 3.3.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-38296","name":"NVD"},"references":[{"id":"GHSA-9rr6-jpg7-9jg6","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-9rr6-jpg7-9jg6"}},{"id":"CVE-2021-38296","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-38296","name":"NVD"}},{"id":"apache-msg-70x8fw2gx3g9ty7yk0f2f1dlpqml2smd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/70x8fw2gx3g9ty7yk0f2f1dlpqml2smd"}},{"id":"PYSEC-2022-186","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-186.yaml"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"GitHub Advisory GHSA-9rr6-jpg7-9jg6","url":"https://github.com/advisories/GHSA-9rr6-jpg7-9jg6"},{"title":"CVE-2021-38296","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-38296"},{"title":"GitHub Advisory PYSEC-2022-186","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-186.yaml"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[294],"description":"Authentication Bypass by Capture-replay in Apache Spark","detail":"# Authentication Bypass by Capture-replay in Apache Spark Apache Spark supports end-to-end encryption of RPC connections via \"spark.authenticate\" and \"spark.network.crypto.enabled\". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by \"spark.authenticate.enableSaslEncryption\", \"spark.io.encryption.enabled\", \"spark.ssl\", \"spark.ui.strictTransportSecurity\". Update to Apache Spark 3.1.3 or later ## Related CVE(s) BIT-spark-2021-38296, CVE-2021-38296, PYSEC-2022-186","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2022-03-11T00:02:36","updated":"2024-10-25T21:03:01","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable"}]},{"id":"CVE-2019-10099","bom-ref":"CVE-2019-10099/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=2.1.1|<=2.3.2|<2.3.3|!=2.3.3","status":"affected"},{"version":"2.3.3","status":"unaffected"}]}],"recommendation":"Update to version 2.3.3 to resolve CVE-2019-10099 or update to version 3.3.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10099","name":"NVD"},"references":[{"id":"apache-msg-c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E"}},{"id":"PYSEC-2019-114","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-114.yaml"}},{"id":"apache-msg-rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E"}},{"id":"apache-msg-ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E"}},{"id":"CVE-2019-10099","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10099","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2019-114","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-114.yaml"},{"title":"CVE-2019-10099","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10099"}],"cwes":[312],"description":"Sensitive data written to disk unencrypted in Spark","detail":"# Sensitive data written to disk unencrypted in Spark Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs. ## Related CVE(s) CVE-2019-10099, PYSEC-2019-114","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2019-08-08T15:18:22","updated":"2024-10-24T22:35:50","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable"}]},{"id":"CVE-2018-11760","bom-ref":"CVE-2018-11760/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=2.3.0|<2.3.2|!=2.3.2","status":"affected"},{"version":"2.3.2","status":"unaffected"}]}],"recommendation":"Update to version 2.3.2 to resolve CVE-2018-11760 or update to version 3.3.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11760","name":"NVD"},"references":[{"id":"apache-msg-a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b@%3Cuser.spark.apache.org%3E"}},{"id":"PYSEC-2019-169","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-169.yaml"}},{"id":"GHSA-fvxv-9xxr-h7wj","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-fvxv-9xxr-h7wj"}},{"id":"SPARK-26802","source":{"name":"Archive Advisory","url":"https://web.archive.org/web/20200925111106/https://issues.apache.org/jira/browse/SPARK-26802"}},{"id":"archive-msg-106786","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227091119/http://www.securityfocus.com/bid/106786"}},{"id":"CVE-2018-11760","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11760","name":"NVD"}},{"id":"apache-msg-6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e@%3Ccommits.spark.apache.org%3E"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2019-169","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-169.yaml"},{"title":"GitHub Advisory GHSA-fvxv-9xxr-h7wj","url":"https://github.com/advisories/GHSA-fvxv-9xxr-h7wj"},{"title":"Archive Advisory SPARK-26802","url":"https://web.archive.org/web/20200925111106/https://issues.apache.org/jira/browse/SPARK-26802"},{"title":"CVE-2018-11760","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11760"}],"cwes":[],"description":"Pyspark User Impersonation Vulnerability","detail":"# Pyspark User Impersonation Vulnerability When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1. ## Related CVE(s) CVE-2018-11760, PYSEC-2019-169","ratings":[{"method":"CVSSv4","severity":"medium","score":6.8,"vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"}],"published":"2019-02-07T18:02:21","updated":"2024-12-04T05:31:59","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable"}]},{"id":"CVE-2020-9480","bom-ref":"CVE-2020-9480/pkg:pypi/pyspark","affects":[{"ref":"pkg:pypi/pyspark","versions":[{"range":"vers:pypi/>=2.1.1|<=2.4.5|<2.4.6|!=2.4.6","status":"affected"},{"version":"2.4.6","status":"unaffected"}]}],"recommendation":"Update to version 2.4.6 to resolve CVE-2020-9480 or update to version 3.3.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9480","name":"NVD"},"references":[{"id":"apache-msg-rb3956440747e41940d552d377d50b144b60085e7ff727adb0e575d8d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb3956440747e41940d552d377d50b144b60085e7ff727adb0e575d8d@%3Ccommits.submarine.apache.org%3E"}},{"id":"CVE-2020-9480","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9480","name":"NVD"}},{"id":"apache-msg-ree9e87aae81852330290a478692e36ea6db47a52a694545c7d66e3e2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ree9e87aae81852330290a478692e36ea6db47a52a694545c7d66e3e2@%3Cdev.spark.apache.org%3E"}},{"id":"CVE-2020-9480","source":{"url":"https://spark.apache.org/security.html#CVE-2020-9480"}},{"id":"apache-msg-ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E"}},{"id":"PYSEC-2020-95","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2020-95.yaml"}},{"id":"apache-msg-r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b@%3Cuser.spark.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}}],"advisories":[{"title":"CVE-2020-9480","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9480"},{"title":"CVE-2020-9480","url":"https://spark.apache.org/security.html#CVE-2020-9480"},{"title":"GitHub Advisory PYSEC-2020-95","url":"https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2020-95.yaml"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[287,306],"description":"Improper Authentication in Apache Spark","detail":"# Improper Authentication in Apache Spark In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc). ## Related CVE(s) BIT-spark-2020-9480, CVE-2020-9480, PYSEC-2020-95","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-02-10T23:05:20","updated":"2024-10-15T16:40:37","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nReachable"}]},{"id":"CVE-2024-21503","bom-ref":"CVE-2024-21503/pkg:pypi/black@23.7.0","affects":[{"ref":"pkg:pypi/black@23.7.0","versions":[{"range":"vers:pypi/>=18.3a0|<=24.2.0|<24.3.0|!=24.3.0","status":"affected"},{"version":"24.3.0","status":"unaffected"}]}],"recommendation":"Update to version 24.3.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21503","name":"NVD"},"references":[{"id":"PYSEC-2024-48","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/black/PYSEC-2024-48.yaml"}},{"id":"SNYK-PYTHON-BLACK-6256273","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273"}},{"id":"CVE-2024-21503","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21503","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-48","url":"https://github.com/pypa/advisory-database/tree/main/vulns/black/PYSEC-2024-48.yaml"},{"title":"Snyk Advisory SNYK-PYTHON-BLACK-6256273","url":"https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273"},{"title":"CVE-2024-21503","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21503"}],"cwes":[1333,75],"description":"Black vulnerable to Regular Expression Denial of Service (ReDoS)","detail":"# Black vulnerable to Regular Expression Denial of Service (ReDoS) Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings. ## Related CVE(s) CVE-2024-21503, PYSEC-2024-48","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-03-19T06:30:52","updated":"2024-07-03T21:30:43","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41899","bom-ref":"CVE-2022-41899/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41899 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41899","name":"NVD"},"references":[{"id":"CVE-2022-41899","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41899","name":"NVD"}},{"id":"GHSA-27rc-728f-x5w2","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27rc-728f-x5w2"}}],"advisories":[{"title":"CVE-2022-41899","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41899"},{"title":"GitHub Advisory GHSA-27rc-728f-x5w2","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27rc-728f-x5w2"}],"cwes":[20,617],"description":"`CHECK` fail via inputs in `SdcaOptimizer`","detail":"# `CHECK` fail via inputs in `SdcaOptimizer` ### Impact Inputs `dense_features` or `example_state_data` not of rank 2 will trigger a `CHECK` fail in [`SdcaOptimizer`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sdca_internal.cc). ```python import tensorflow as tf tf.raw_ops.SdcaOptimizer( sparse_example_indices=4 * [tf.random.uniform([5,5,5,3], dtype=tf.dtypes.int64, maxval=100)], sparse_feature_indices=4 * [tf.random.uniform([5,5,5,3], dtype=tf.dtypes.int64, maxval=100)], sparse_feature_values=8 * [tf.random.uniform([5,5,5,3], dtype=tf.dtypes.float32, maxval=100)], dense_features=4 * [tf.random.uniform([5,5,5,3], dtype=tf.dtypes.float32, maxval=100)], example_weights=tf.random.uniform([5,5,5,3], dtype=tf.dtypes.float32, maxval=100), example_labels=tf.random.uniform([5,5,5,3], dtype=tf.dtypes.float32, maxval=100), sparse_indices=4 * [tf.random.uniform([5,5,5,3], dtype=tf.dtypes.int64, maxval=100)], sparse_weights=4 * [tf.random.uniform([5,5,5,3], dtype=tf.dtypes.float32, maxval=100)], dense_weights=4 * [tf.random.uniform([5,5,5,3], dtype=tf.dtypes.float32, maxval=100)], example_state_data=tf.random.uniform([5,5,5,3], dtype=tf.dtypes.float32, maxval=100), loss_type=\"squared_loss\", l1=0.0, l2=0.0, num_loss_partitions=1, num_inner_iterations=1, adaptative=False,) ``` ### Patches We have patched the issue in GitHub commit [80ff197d03db2a70c6a111f97dcdacad1b0babfa](https://github.com/tensorflow/tensorflow/commit/80ff197d03db2a70c6a111f97dcdacad1b0babfa). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Zizhuang Deng of IIE, UCAS ## Related CVE(s) BIT-tensorflow-2022-41899, CVE-2022-41899","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T21:54:26","updated":"2024-02-16T08:10:55","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41907","bom-ref":"CVE-2022-41907/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41907 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41907","name":"NVD"},"references":[{"id":"GHSA-368v-7v32-52fx","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-368v-7v32-52fx"}},{"id":"CVE-2022-41907","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41907","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-368v-7v32-52fx","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-368v-7v32-52fx"},{"title":"CVE-2022-41907","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41907"}],"cwes":[131],"description":"Overflow in `ResizeNearestNeighborGrad`","detail":"# Overflow in `ResizeNearestNeighborGrad` ### Impact When [`tf.raw_ops.ResizeNearestNeighborGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/resize_nearest_neighbor_op.cc) is given a large `size` input, it overflows. ``` import tensorflow as tf align_corners = True half_pixel_centers = False grads = tf.constant(1, shape=[1,8,16,3], dtype=tf.float16) size = tf.constant([1879048192,1879048192], shape=[2], dtype=tf.int32) tf.raw_ops.ResizeNearestNeighborGrad(grads=grads, size=size, align_corners=align_corners, half_pixel_centers=half_pixel_centers) ``` ### Patches We have patched the issue in GitHub commit [00c821af032ba9e5f5fa3fe14690c8d28a657624](https://github.com/tensorflow/tensorflow/commit/00c821af032ba9e5f5fa3fe14690c8d28a657624). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Neophytos Christou from the Secure Systems Lab (SSL) at Brown University. ## Related CVE(s) BIT-tensorflow-2022-41907, CVE-2022-41907","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T22:04:27","updated":"2023-12-06T01:02:39","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25670","bom-ref":"CVE-2023-25670/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25670 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25670","name":"NVD"},"references":[{"id":"CVE-2023-25670","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25670","name":"NVD"}},{"id":"GHSA-49rq-hwc3-x77w","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w"}}],"advisories":[{"title":"CVE-2023-25670","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25670"},{"title":"GitHub Advisory GHSA-49rq-hwc3-x77w","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w"}],"cwes":[476],"description":"TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize","detail":"# TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize ### Impact NPE in QuantizedMatMulWithBiasAndDequantize with MKL enable ```python import tensorflow as tf func = tf.raw_ops.QuantizedMatMulWithBiasAndDequantize para={'a': tf.constant(138, dtype=tf.quint8), 'b': tf.constant(4, dtype=tf.qint8), 'bias': [[31.81644630432129, 47.21876525878906], [109.95201110839844, 152.07968139648438]], 'min_a': 141.5337138686371, 'max_a': [73.84139251708984, 173.15280151367188], 'min_b': [], 'max_b': [[16.128345489501953, 193.26820373535156]], 'min_freezed_output': [], 'max_freezed_output': [115.50032806396484, 156.974853515625], 'Toutput': 1.0, 'transpose_a': True, 'transpose_b': False, 'input_quant_mode': 'MIN_FIRST'} func(**para) ``` ### Patches We have patched the issue in GitHub commit [8a47a39d9697969206d23a523c977238717e8727](https://github.com/tensorflow/tensorflow/commit/8a47a39d9697969206d23a523c977238717e8727). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx ## Related CVE(s) BIT-tensorflow-2023-25670, CVE-2023-25670","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:55:32","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41886","bom-ref":"CVE-2022-41886/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41886 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41886","name":"NVD"},"references":[{"id":"GHSA-54pp-c6pp-7fpx","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54pp-c6pp-7fpx"}},{"id":"CVE-2022-41886","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41886","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-54pp-c6pp-7fpx","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54pp-c6pp-7fpx"},{"title":"CVE-2022-41886","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41886"}],"cwes":[131],"description":"Overflow in `ImageProjectiveTransformV2`","detail":"# Overflow in `ImageProjectiveTransformV2` ### Impact When [`tf.raw_ops.ImageProjectiveTransformV2`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/image_ops.cc) is given a large output shape, it overflows. ```python import tensorflow as tf interpolation = \"BILINEAR\" fill_mode = \"REFLECT\" images = tf.constant(0.184634328, shape=[2,5,8,3], dtype=tf.float32) transforms = tf.constant(0.378575385, shape=[2,8], dtype=tf.float32) output_shape = tf.constant([1879048192,1879048192], shape=[2], dtype=tf.int32) tf.raw_ops.ImageProjectiveTransformV2(images=images, transforms=transforms, output_shape=output_shape, interpolation=interpolation, fill_mode=fill_mode) ``` ### Patches We have patched the issue in GitHub commit [8faa6ea692985dbe6ce10e1a3168e0bd60a723ba](https://github.com/tensorflow/tensorflow/commit/8faa6ea692985dbe6ce10e1a3168e0bd60a723ba). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Neophytos Christou from the Secure Systems Lab (SSL) at Brown University. ## Related CVE(s) BIT-tensorflow-2022-41886, CVE-2022-41886","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:40:55","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25665","bom-ref":"CVE-2023-25665/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25665 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25665","name":"NVD"},"references":[{"id":"CVE-2023-25665","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25665","name":"NVD"}},{"id":"GHSA-558h-mq8x-7q9g","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-558h-mq8x-7q9g"}}],"advisories":[{"title":"CVE-2023-25665","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25665"},{"title":"GitHub Advisory GHSA-558h-mq8x-7q9g","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-558h-mq8x-7q9g"}],"cwes":[476],"description":"TensorFlow has Null Pointer Error in SparseSparseMaximum","detail":"# TensorFlow has Null Pointer Error in SparseSparseMaximum ### Impact When `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give an NPE. ```python import tensorflow as tf tf.raw_ops.SparseSparseMaximum( a_indices=[[1]], a_values =[ 0.1 ], a_shape = [2], b_indices=[[]], b_values =[2 ], b_shape = [2], ) ``` ### Patches We have patched the issue in GitHub commit [5e0ecfb42f5f65629fd7a4edd6c4afe7ff0feb04](https://github.com/tensorflow/tensorflow/commit/5e0ecfb42f5f65629fd7a4edd6c4afe7ff0feb04). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team ## Related CVE(s) BIT-tensorflow-2023-25665, CVE-2023-25665","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:57:25","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-27579","bom-ref":"CVE-2023-27579/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-27579 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27579","name":"NVD"},"references":[{"id":"CVE-2023-27579","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27579","name":"NVD"}},{"id":"GHSA-5w96-866f-6rm8","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5w96-866f-6rm8"}}],"advisories":[{"title":"CVE-2023-27579","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27579"},{"title":"GitHub Advisory GHSA-5w96-866f-6rm8","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5w96-866f-6rm8"}],"cwes":[697],"description":"TensorFlow has Floating Point Exception in TFLite in conv kernel","detail":"# TensorFlow has Floating Point Exception in TFLite in conv kernel ### Impact Constructing a tflite model with a paramater `filter_input_channel` of less than 1 gives a FPE. ### Patches We have patched the issue in GitHub commit [34f8368c535253f5c9cb3a303297743b62442aaa](https://github.com/tensorflow/tensorflow/commit/34f8368c535253f5c9cb3a303297743b62442aaa). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability was reported by Wang Xuan of Qihoo 360 AIVul Team. ## Related CVE(s) BIT-tensorflow-2023-27579, CVE-2023-27579","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:53:39","updated":"2023-12-06T01:02:56","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25673","bom-ref":"CVE-2023-25673/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25673 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25673","name":"NVD"},"references":[{"id":"CVE-2023-25673","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25673","name":"NVD"}},{"id":"GHSA-647v-r7qq-24fh","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-647v-r7qq-24fh"}}],"advisories":[{"title":"CVE-2023-25673","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25673"},{"title":"GitHub Advisory GHSA-647v-r7qq-24fh","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-647v-r7qq-24fh"}],"cwes":[697],"description":"TensorFlow has Floating Point Exception in TensorListSplit with XLA ","detail":"# TensorFlow has Floating Point Exception in TensorListSplit with XLA ### Impact FPE in TensorListSplit with XLA ```python import tensorflow as tf func = tf.raw_ops.TensorListSplit para = {'tensor': [1], 'element_shape': -1, 'lengths': [0]} @tf.function(jit_compile=True) def fuzz_jit(): y = func(**para) return y print(fuzz_jit()) ``` ### Patches We have patched the issue in GitHub commit [728113a3be690facad6ce436660a0bc1858017fa](https://github.com/tensorflow/tensorflow/commit/728113a3be690facad6ce436660a0bc1858017fa). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx ## Related CVE(s) BIT-tensorflow-2023-25673, CVE-2023-25673","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:54:42","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25663","bom-ref":"CVE-2023-25663/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25663 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25663","name":"NVD"},"references":[{"id":"CVE-2023-25663","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25663","name":"NVD"}},{"id":"GHSA-64jg-wjww-7c5w","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-64jg-wjww-7c5w"}}],"advisories":[{"title":"CVE-2023-25663","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25663"},{"title":"GitHub Advisory GHSA-64jg-wjww-7c5w","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-64jg-wjww-7c5w"}],"cwes":[476],"description":"TensorFlow has Null Pointer Error in TensorArrayConcatV2","detail":"# TensorFlow has Null Pointer Error in TensorArrayConcatV2 ### Impact When ctx->step_containter() is a null ptr, the Lookup function will be executed with a null pointer. ```python import tensorflow as tf tf.raw_ops.TensorArrayConcatV2(handle=['a', 'b'], flow_in = 0.1, dtype=tf.int32, element_shape_except0=1) ``` ### Patches We have patched the issue in GitHub commit [239139d2ae6a81ae9ba499ad78b56d9b2931538a](https://github.com/tensorflow/tensorflow/commit/239139d2ae6a81ae9ba499ad78b56d9b2931538a). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian ## Related CVE(s) BIT-tensorflow-2023-25663, CVE-2023-25663","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:58:15","updated":"2023-12-06T01:02:53","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41891","bom-ref":"CVE-2022-41891/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41891 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41891","name":"NVD"},"references":[{"id":"GHSA-66vq-54fq-6jvv","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-66vq-54fq-6jvv"}},{"id":"CVE-2022-41891","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41891","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-66vq-54fq-6jvv","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-66vq-54fq-6jvv"},{"title":"CVE-2022-41891","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41891"}],"cwes":[20],"description":"Segfault in `tf.raw_ops.TensorListConcat`","detail":"# Segfault in `tf.raw_ops.TensorListConcat` ### Impact If [`tf.raw_ops.TensorListConcat`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/list_kernels.h) is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. ```python import tensorflow as tf tf.raw_ops.TensorListConcat( input_handle=tf.data.experimental.to_variant(tf.data.Dataset.from_tensor_slices([1, 2, 3])), element_dtype=tf.dtypes.float32, element_shape=[] ) ``` ### Patches We have patched the issue in GitHub commit [fc33f3dc4c14051a83eec6535b608abe1d355fde](https://github.com/tensorflow/tensorflow/commit/fc33f3dc4c14051a83eec6535b608abe1d355fde). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Tong Liu, ShanghaiTech University ## Related CVE(s) BIT-tensorflow-2022-41891, CVE-2022-41891","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:42:18","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41893","bom-ref":"CVE-2022-41893/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41893 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41893","name":"NVD"},"references":[{"id":"CVE-2022-41893","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41893","name":"NVD"}},{"id":"GHSA-67pf-62xr-q35m","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-67pf-62xr-q35m"}}],"advisories":[{"title":"CVE-2022-41893","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41893"},{"title":"GitHub Advisory GHSA-67pf-62xr-q35m","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-67pf-62xr-q35m"}],"cwes":[617],"description":"`CHECK_EQ` fail in `tf.raw_ops.TensorListResize`","detail":"# `CHECK_EQ` fail in `tf.raw_ops.TensorListResize` ### Impact If [`tf.raw_ops.TensorListResize`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/list_kernels.cc) is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. ```python import numpy as np import tensorflow as tf a = data_structures.tf_tensor_list_new(elements = tf.constant(value=[3, 4, 5])) b = np.zeros([0, 2, 3, 3]) tf.raw_ops.TensorListResize(input_handle=a, size=b) ``` ### Patches We have patched the issue in GitHub commit [888e34b49009a4e734c27ab0c43b0b5102682c56](https://github.com/tensorflow/tensorflow/commit/888e34b49009a4e734c27ab0c43b0b5102682c56). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Pattarakrit Rattankul ## Related CVE(s) BIT-tensorflow-2022-41893, CVE-2022-41893","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:42:39","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25658","bom-ref":"CVE-2023-25658/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25658 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25658","name":"NVD"},"references":[{"id":"GHSA-68v3-g9cm-rmm6","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6"}},{"id":"CVE-2023-25658","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25658","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-68v3-g9cm-rmm6","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6"},{"title":"CVE-2023-25658","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25658"}],"cwes":[125],"description":"TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad","detail":"# TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad ### Impact Out of bounds read in GRUBlockCellGrad ```python func = tf.raw_ops.GRUBlockCellGrad para = {'x': [[21.1, 156.2], [83.3, 115.4]], 'h_prev': array([[136.5], [136.6]]), 'w_ru': array([[26.7, 0.8], [47.9, 26.1], [26.2, 26.3]]), 'w_c': array([[ 0.4], [31.5], [ 0.6]]), 'b_ru': array([0.1, 0.2 ], dtype=float32), 'b_c': 0x41414141, 'r': array([[0.3], [0.4]], dtype=float32), 'u': array([[5.7], [5.8]]), 'c': array([[52.9], [53.1]]), 'd_h': array([[172.2], [188.3 ]])} ``` ### Patches We have patched the issue in GitHub commit [ff459137c2716a2a60f7d441b855fcb466d778cb](https://github.com/tensorflow/tensorflow/commit/ff459137c2716a2a60f7d441b855fcb466d778cb). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx. ## Related CVE(s) BIT-tensorflow-2023-25658, CVE-2023-25658","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:53:25","updated":"2023-12-06T01:02:53","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25664","bom-ref":"CVE-2023-25664/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25664 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25664","name":"NVD"},"references":[{"id":"CVE-2023-25664","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25664","name":"NVD"}},{"id":"GHSA-6hg6-5c2q-7rcr","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hg6-5c2q-7rcr"}}],"advisories":[{"title":"CVE-2023-25664","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25664"},{"title":"GitHub Advisory GHSA-6hg6-5c2q-7rcr","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hg6-5c2q-7rcr"}],"cwes":[120,122],"description":"TensorFlow has Heap-buffer-overflow in AvgPoolGrad ","detail":"# TensorFlow has Heap-buffer-overflow in AvgPoolGrad ### Impact ```python import os os.environ['TF_ENABLE_ONEDNN_OPTS'] = '0' import tensorflow as tf print(tf.__version__) with tf.device(\"CPU\"): ksize = [1, 40, 128, 1] strides = [1, 128, 128, 30] padding = \"SAME\" data_format = \"NHWC\" orig_input_shape = [11, 9, 78, 9] grad = tf.saturate_cast(tf.random.uniform([16, 16, 16, 16], minval=-128, maxval=129, dtype=tf.int64), dtype=tf.float32) res = tf.raw_ops.AvgPoolGrad( ksize=ksize, strides=strides, padding=padding, data_format=data_format, orig_input_shape=orig_input_shape, grad=grad, ) ``` ### Patches We have patched the issue in GitHub commit [ddaac2bdd099bec5d7923dea45276a7558217e5b](https://github.com/tensorflow/tensorflow/commit/ddaac2bdd099bec5d7923dea45276a7558217e5b). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by ## Related CVE(s) BIT-tensorflow-2023-25664, CVE-2023-25664","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:58:04","updated":"2023-12-06T01:02:53","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25676","bom-ref":"CVE-2023-25676/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25676 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25676","name":"NVD"},"references":[{"id":"GHSA-6wfh-89q8-44jq","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq"}},{"id":"CVE-2023-25676","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25676","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-6wfh-89q8-44jq","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq"},{"title":"CVE-2023-25676","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25676"}],"cwes":[476],"description":"TensorFlow has null dereference on ParallelConcat with XLA","detail":"# TensorFlow has null dereference on ParallelConcat with XLA ### Impact When running with XLA, `tf.raw_ops.ParallelConcat` segfaults with a nullptr dereference when given a parameter `shape` with rank that is not greater than zero. ```python import tensorflow as tf func = tf.raw_ops.ParallelConcat para = {'shape': 0, 'values': [1]} @tf.function(jit_compile=True) def test(): y = func(**para) return y test() ``` ### Patches We have patched the issue in GitHub commit [da66bc6d5ff466aee084f9e7397980a24890cd15](https://github.com/tensorflow/tensorflow/commit/da66bc6d5ff466aee084f9e7397980a24890cd15). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx of 360 AIVul Team ## Related CVE(s) BIT-tensorflow-2023-25676, CVE-2023-25676","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:54:04","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41888","bom-ref":"CVE-2022-41888/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41888 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41888","name":"NVD"},"references":[{"id":"CVE-2022-41888","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41888","name":"NVD"}},{"id":"GHSA-6x99-gv2v-q76v","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6x99-gv2v-q76v"}}],"advisories":[{"title":"CVE-2022-41888","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41888"},{"title":"GitHub Advisory GHSA-6x99-gv2v-q76v","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6x99-gv2v-q76v"}],"cwes":[20],"description":"FPE in `tf.image.generate_bounding_box_proposals`","detail":"# FPE in `tf.image.generate_bounding_box_proposals` ### Impact When running on GPU, [`tf.image.generate_bounding_box_proposals`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/generate_box_proposals_op.cu.cc) receives a `scores` input that must be of rank 4 but is not checked. ```python import tensorflow as tf a = tf.constant(value=[[1.0, 1.0], [1.0, 1.0], [1.0, 1.0], [1.0, 1.0]]) b = tf.constant(value=[1]) tf.image.generate_bounding_box_proposals(scores=a,bbox_deltas=a,image_info=a,anchors=a,pre_nms_topn=b) ``` ### Patches We have patched the issue in GitHub commit [cf35502463a88ca7185a99daa7031df60b3c1c98](https://github.com/tensorflow/tensorflow/commit/cf35502463a88ca7185a99daa7031df60b3c1c98). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Pattarakrit Rattankul. ## Related CVE(s) BIT-tensorflow-2022-41888, CVE-2022-41888","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:41:45","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25662","bom-ref":"CVE-2023-25662/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25662 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25662","name":"NVD"},"references":[{"id":"CVE-2023-25662","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25662","name":"NVD"}},{"id":"GHSA-7jvm-xxmr-v5cw","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7jvm-xxmr-v5cw"}}],"advisories":[{"title":"CVE-2023-25662","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25662"},{"title":"GitHub Advisory GHSA-7jvm-xxmr-v5cw","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7jvm-xxmr-v5cw"}],"cwes":[190],"description":"TensorFlow vulnerable to integer overflow in EditDistance","detail":"# TensorFlow vulnerable to integer overflow in EditDistance ### Impact TFversion 2.11.0 //tensorflow/core/ops/array_ops.cc:1067 const Tensor* hypothesis_shape_t = c->input_tensor(2); std::vector dims(hypothesis_shape_t->NumElements() - 1); for (int i = 0; i < dims.size(); ++i) { dims[i] = c->MakeDim(std::max(h_values(i), t_values(i))); } if hypothesis_shape_t is empty, hypothesis_shape_t->NumElements() - 1 will be integer overflow, and the it will deadlock ```python import tensorflow as tf para={ 'hypothesis_indices': [[]], 'hypothesis_values': ['tmp/'], 'hypothesis_shape': [], 'truth_indices': [[]], 'truth_values': [''], 'truth_shape': [], 'normalize': False } tf.raw_ops.EditDistance(**para) ``` ### Patches We have patched the issue in GitHub commit [08b8e18643d6dcde00890733b270ff8d9960c56c](https://github.com/tensorflow/tensorflow/commit/08b8e18643d6dcde00890733b270ff8d9960c56c). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx ## Related CVE(s) BIT-tensorflow-2023-25662, CVE-2023-25662","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:58:31","updated":"2023-12-06T01:02:53","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25675","bom-ref":"CVE-2023-25675/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25675 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25675","name":"NVD"},"references":[{"id":"GHSA-7x4v-9gxg-9hwj","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7x4v-9gxg-9hwj"}},{"id":"CVE-2023-25675","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25675","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-7x4v-9gxg-9hwj","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7x4v-9gxg-9hwj"},{"title":"CVE-2023-25675","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25675"}],"cwes":[697],"description":"TensorFlow has Segfault in Bincount with XLA","detail":"# TensorFlow has Segfault in Bincount with XLA ### Impact When running with XLA, `tf.raw_ops.Bincount` segfaults when given a parameter `weights` that is neither the same shape as parameter `arr` nor a length-0 tensor. ```python import tensorflow as tf func = tf.raw_ops.Bincount para={'arr': 6, 'size': 804, 'weights': [52, 351]} @tf.function(jit_compile=True) def fuzz_jit(): y = func(**para) return y print(fuzz_jit()) ``` ### Patches We have patched the issue in GitHub commit [8ae76cf085f4be26295d2ecf2081e759e04b8acf](https://github.com/tensorflow/tensorflow/commit/8ae76cf085f4be26295d2ecf2081e759e04b8acf). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx of 360 AIVul Team ## Related CVE(s) BIT-tensorflow-2023-25675, CVE-2023-25675","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:54:18","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41887","bom-ref":"CVE-2022-41887/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41887 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41887","name":"NVD"},"references":[{"id":"GHSA-8fvv-46hw-vpg3","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fvv-46hw-vpg3"}},{"id":"CVE-2022-41887","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41887","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-8fvv-46hw-vpg3","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fvv-46hw-vpg3"},{"title":"CVE-2022-41887","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41887"}],"cwes":[131],"description":"Overflow in `tf.keras.losses.poisson`","detail":"# Overflow in `tf.keras.losses.poisson` ### Impact [`tf.keras.losses.poisson`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/keras/losses.py) receives a `y_pred` and `y_true` that are passed through `functor::mul` in [`BinaryOp`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/cwise_ops_common.h). If the resulting dimensions overflow an `int32`, TensorFlow will crash due to a size mismatch during broadcast assignment. ```python import numpy as np import tensorflow as tf true_value = tf.reshape(shape=[1, 2500000000], tensor = tf.zeros(dtype=tf.bool, shape=[50000, 50000])) pred_value = np.array([[[-2]], [[8]]], dtype = np.float64) tf.keras.losses.poisson(y_true=true_value,y_pred=pred_value) ``` ### Patches We have patched the issue in GitHub commit [c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c](https://github.com/tensorflow/tensorflow/commit/c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1 and 2.9.3, as these are also affected and still in supported range. However, we will not cherrypick this commit into TensorFlow 2.8.x, as it depends on Eigen behavior that changed between 2.8 and 2.9. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Pattarakrit Rattankul. ## Related CVE(s) BIT-tensorflow-2022-41887, CVE-2022-41887","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:41:35","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41880","bom-ref":"CVE-2022-41880/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41880 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41880","name":"NVD"},"references":[{"id":"CVE-2022-41880","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41880","name":"NVD"}},{"id":"GHSA-8w5g-3wcv-9g2j","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8w5g-3wcv-9g2j"}}],"advisories":[{"title":"CVE-2022-41880","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41880"},{"title":"GitHub Advisory GHSA-8w5g-3wcv-9g2j","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8w5g-3wcv-9g2j"}],"cwes":[125],"description":"Tensorflow vulnerable to Out-of-Bounds Read","detail":"# Tensorflow vulnerable to Out-of-Bounds Read ### Impact When the [`BaseCandidateSamplerOp`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/candidate_sampler_ops.cc) function receives a value in `true_classes` larger than `range_max`, a heap oob vuln occurs. ```python tf.raw_ops.ThreadUnsafeUnigramCandidateSampler( true_classes=[[0x100000,1]], num_true = 2, num_sampled = 2, unique = False, range_max = 2, seed = 2, seed2 = 2) ``` ### Patches We have patched the issue in GitHub commit [b389f5c944cadfdfe599b3f1e4026e036f30d2d4](https://github.com/tensorflow/tensorflow/commit/b389f5c944cadfdfe599b3f1e4026e036f30d2d4). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team. ## Related CVE(s) BIT-tensorflow-2022-41880, CVE-2022-41880","ratings":[{"method":"CVSSv31","severity":"medium","score":6.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H"}],"published":"2022-11-22T00:10:10","updated":"2023-12-06T01:02:37","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25659","bom-ref":"CVE-2023-25659/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25659 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25659","name":"NVD"},"references":[{"id":"CVE-2023-25659","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25659","name":"NVD"}},{"id":"GHSA-93vr-9q9m-pj8p","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-93vr-9q9m-pj8p"}}],"advisories":[{"title":"CVE-2023-25659","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25659"},{"title":"GitHub Advisory GHSA-93vr-9q9m-pj8p","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-93vr-9q9m-pj8p"}],"cwes":[125],"description":"TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch","detail":"# TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch ### Impact If the parameter `indices` for `DynamicStitch` does not match the shape of the parameter `data`, it can trigger an stack OOB read. ```python import tensorflow as tf func = tf.raw_ops.DynamicStitch para={'indices': [[0xdeadbeef], [405], [519], [758], [1015]], 'data': [[110.27793884277344], [120.29475402832031], [157.2418212890625], [157.2626953125], [188.45382690429688]]} y = func(**para) ``` ### Patches We have patched the issue in GitHub commit [ee004b18b976eeb5a758020af8880236cd707d05](https://github.com/tensorflow/tensorflow/commit/ee004b18b976eeb5a758020af8880236cd707d05). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This has been reported via Google OSS VRP. ## Related CVE(s) BIT-tensorflow-2023-25659, CVE-2023-25659","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:58:53","updated":"2023-12-06T01:02:53","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25672","bom-ref":"CVE-2023-25672/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25672 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25672","name":"NVD"},"references":[{"id":"CVE-2023-25672","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25672","name":"NVD"}},{"id":"GHSA-94mm-g2mv-8p7r","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-94mm-g2mv-8p7r"}}],"advisories":[{"title":"CVE-2023-25672","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25672"},{"title":"GitHub Advisory GHSA-94mm-g2mv-8p7r","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-94mm-g2mv-8p7r"}],"cwes":[476],"description":"TensorFlow has Null Pointer Error in LookupTableImportV2","detail":"# TensorFlow has Null Pointer Error in LookupTableImportV2 ### Impact The function `tf.raw_ops.LookupTableImportV2` cannot handle scalars in the `values` parameter and gives an NPE. ```python import tensorflow as tf v = tf.Variable(1) @tf.function(jit_compile=True) def test(): func = tf.raw_ops.LookupTableImportV2 para={'table_handle': v.handle,'keys': [62.98910140991211, 94.36528015136719], 'values': -919} y = func(**para) return y print(test()) ``` ### Patches We have patched the issue in GitHub commit [980b22536abcbbe1b4a5642fc940af33d8c19b69](https://github.com/tensorflow/tensorflow/commit/980b22536abcbbe1b4a5642fc940af33d8c19b69). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx of 360 AIVul Team ## Related CVE(s) BIT-tensorflow-2023-25672, CVE-2023-25672","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:54:55","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41902","bom-ref":"CVE-2022-41902/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41902 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41902","name":"NVD"},"references":[{"id":"GHSA-cg88-rpvp-cjv5","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cg88-rpvp-cjv5"}},{"id":"CVE-2022-41902","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41902","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-cg88-rpvp-cjv5","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cg88-rpvp-cjv5"},{"title":"CVE-2022-41902","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41902"}],"cwes":[125,787],"description":"Out of bounds write in grappler in Tensorflow","detail":"# Out of bounds write in grappler in Tensorflow ### Impact The function [MakeGrapplerFunctionItem](https://https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/grappler/utils/functions.cc#L221) takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. ### Patches We have patched the issue in GitHub commit [a65411a1d69edfb16b25907ffb8f73556ce36bb7](https://github.com/tensorflow/tensorflow/commit/a65411a1d69edfb16b25907ffb8f73556ce36bb7). The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ## Related CVE(s) BIT-tensorflow-2022-41902, CVE-2022-41902","ratings":[{"method":"CVSSv31","severity":"high","score":7.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"published":"2022-11-21T22:04:06","updated":"2024-02-16T08:20:45","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-cqvq-fvhr-v6hc","bom-ref":"GHSA-cqvq-fvhr-v6hc/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve GHSA-cqvq-fvhr-v6hc or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqvq-fvhr-v6hc"},"references":[{"id":"GHSA-cqvq-fvhr-v6hc","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqvq-fvhr-v6hc"}}],"advisories":[{"title":"GitHub Advisory GHSA-cqvq-fvhr-v6hc","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqvq-fvhr-v6hc"}],"cwes":[],"description":"`CHECK` failure in `SobolSample` via missing validation","detail":"# `CHECK` failure in `SobolSample` via missing validation ### Impact Another instance of CVE-2022-35935, where `SobolSample` is vulnerable to a denial of service via assumed scalar inputs, was found and fixed. ```python import tensorflow as tf tf.raw_ops.SobolSample(dim=tf.constant([1,0]), num_results=tf.constant([1]), skip=tf.constant([1])) ``` ### Patches We have patched the issue in GitHub commits [c65c67f88ad770662e8f191269a907bf2b94b1bf](https://github.com/tensorflow/tensorflow/commit/c65c67f88ad770662e8f191269a907bf2b94b1bf) and [02400ea266bd811fc016a848445de1bbff3a23a0](https://github.com/tensorflow/tensorflow/commit/02400ea266bd811fc016a848445de1bbff3a23a0) The fix will be included in TensorFlow 2.11. We will also cherrypick both commits on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. TensorFlow 2.7.4 will have the first commit cherrypicked. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by: - Kang Hong Jin from Singapore Management University - Neophytos Christou, Secure Systems Labs, Brown University - \u5218\u529b\u6e90, Information System & Security and Countermeasures Experiments Center, Beijing Institute of Technology - Pattarakrit Rattankul","ratings":[{"method":"CVSSv31","severity":"low","score":3.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2022-11-21T23:51:53","updated":"2024-12-04T05:42:18","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41897","bom-ref":"CVE-2022-41897/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41897 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41897","name":"NVD"},"references":[{"id":"GHSA-f2w8-jw48-fr7j","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2w8-jw48-fr7j"}},{"id":"CVE-2022-41897","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41897","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-f2w8-jw48-fr7j","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2w8-jw48-fr7j"},{"title":"CVE-2022-41897","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41897"}],"cwes":[125],"description":"`FractionalMaxPoolGrad` Heap out of bounds read","detail":"# `FractionalMaxPoolGrad` Heap out of bounds read ### Impact If [`FractionMaxPoolGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/fractional_max_pool_op.cc) is given outsize inputs `row_pooling_sequence` and `col_pooling_sequence`, TensorFlow will crash. ```python import tensorflow as tf tf.raw_ops.FractionMaxPoolGrad( orig_input = [[[[1, 1, 1, 1, 1]]]], orig_output = [[[[1, 1, 1]]]], out_backprop = [[[[3], [3], [6]]]], row_pooling_sequence = [-0x4000000, 1, 1], col_pooling_sequence = [-0x4000000, 1, 1], overlapping = False ) ``` ### Patches We have patched the issue in GitHub commit [d71090c3e5ca325bdf4b02eb236cfb3ee823e927](https://github.com/tensorflow/tensorflow/commit/d71090c3e5ca325bdf4b02eb236cfb3ee823e927). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Vul AI. ## Related CVE(s) BIT-tensorflow-2022-41897, CVE-2022-41897","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T21:54:04","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25801","bom-ref":"CVE-2023-25801/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25801 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25801","name":"NVD"},"references":[{"id":"CVE-2023-25801","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25801","name":"NVD"}},{"id":"GHSA-f49c-87jh-g47q","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47q"}}],"advisories":[{"title":"CVE-2023-25801","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25801"},{"title":"GitHub Advisory GHSA-f49c-87jh-g47q","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47q"}],"cwes":[415],"description":"TensorFlow has double free in Fractional(Max/Avg)Pool","detail":"# TensorFlow has double free in Fractional(Max/Avg)Pool ### Impact `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. ```python import tensorflow as tf import os import numpy as np from tensorflow.python.ops import nn_ops try: arg_0_tensor = tf.random.uniform([3, 30, 50, 3], dtype=tf.float64) arg_0 = tf.identity(arg_0_tensor) arg_1_0 = 2 arg_1_1 = 3 arg_1_2 = 1 arg_1_3 = 1 arg_1 = [arg_1_0,arg_1_1,arg_1_2,arg_1_3,] arg_2 = True arg_3 = True seed = 341261001 out = nn_ops.fractional_avg_pool_v2(arg_0,arg_1,arg_2,arg_3,seed=seed,) except Exception as e: print(\"Error:\"+str(e)) ``` ### Patches We have patched the issue in GitHub commit [ee50d1e00f81f62a4517453f721c634bbb478307](https://github.com/tensorflow/tensorflow/commit/ee50d1e00f81f62a4517453f721c634bbb478307). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability was reported by [dmc1778](https://github.com/dmc1778), of [nimashiri2012@gmail.com](mailto:nimashiri2012@gmail.com). ## Related CVE(s) BIT-tensorflow-2023-25801, CVE-2023-25801","ratings":[{"method":"CVSSv31","severity":"high","score":8.0,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"}],"published":"2023-03-24T21:53:49","updated":"2023-12-06T01:02:55","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25666","bom-ref":"CVE-2023-25666/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25666 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25666","name":"NVD"},"references":[{"id":"CVE-2023-25666","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25666","name":"NVD"}},{"id":"GHSA-f637-vh3r-vfh2","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2"}}],"advisories":[{"title":"CVE-2023-25666","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25666"},{"title":"GitHub Advisory GHSA-f637-vh3r-vfh2","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2"}],"cwes":[697],"description":"TensorFlow has Floating Point Exception in AudioSpectrogram ","detail":"# TensorFlow has Floating Point Exception in AudioSpectrogram ### Impact version:2.11.0 //core/ops/audio_ops.cc:70 Status SpectrogramShapeFn(InferenceContext* c) { ShapeHandle input; TF_RETURN_IF_ERROR(c->WithRank(c->input(0), 2, &input)); int32_t window_size; TF_RETURN_IF_ERROR(c->GetAttr(\"window_size\", &window_size)); int32_t stride; TF_RETURN_IF_ERROR(c->GetAttr(\"stride\", &stride)); .....[1] DimensionHandle input_length = c->Dim(input, 0); DimensionHandle input_channels = c->Dim(input, 1); DimensionHandle output_length; if (!c->ValueKnown(input_length)) { output_length = c->UnknownDim(); } else { const int64_t input_length_value = c->Value(input_length); const int64_t length_minus_window = (input_length_value - window_size); int64_t output_length_value; if (length_minus_window < 0) { output_length_value = 0; } else { output_length_value = 1 + (length_minus_window / stride); .....[2] } output_length = c->MakeDim(output_length_value); } Get the value of stride at [1], and the used at [2] ```python import tensorflow as tf para = {'input': tf.constant([[14.], [24.]], dtype=tf.float32), 'window_size': 1, 'stride': 0, 'magnitude_squared': False} func = tf.raw_ops.AudioSpectrogram @tf.function(jit_compile=True) def fuzz_jit(): y = func(**para) return y fuzz_jit() ``` ### Patches We have patched the issue in GitHub commit [d0d4e779da0d0f56499c6fa5ba09f0a576cc6b14](https://github.com/tensorflow/tensorflow/commit/d0d4e779da0d0f56499c6fa5ba09f0a576cc6b14). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx ## Related CVE(s) BIT-tensorflow-2023-25666, CVE-2023-25666","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:57:18","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25667","bom-ref":"CVE-2023-25667/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25667 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25667","name":"NVD"},"references":[{"id":"CVE-2023-25667","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25667","name":"NVD"}},{"id":"GHSA-fqm2-gh8w-gr68","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqm2-gh8w-gr68"}}],"advisories":[{"title":"CVE-2023-25667","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25667"},{"title":"GitHub Advisory GHSA-fqm2-gh8w-gr68","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqm2-gh8w-gr68"}],"cwes":[190],"description":"TensorFlow vulnerable to segfault when opening multiframe gif","detail":"# TensorFlow vulnerable to segfault when opening multiframe gif ### Impact Integer overflow occurs when 2^31 <= num_frames * height * width * channels < 2^32, for example Full HD screencast of at least 346 frames. ```python import urllib.request dat = urllib.request.urlopen('https://raw.githubusercontent.com/tensorflow/tensorflow/1c38ad9b78ffe06076745a1ee00cec42f39ff726/tensorflow/core/lib/gif/testdata/3g_multiframe.gif').read() import tensorflow as tf tf.io.decode_gif(dat) ``` ### Patches We have patched the issue in GitHub commit [8dc723fcdd1a6127d6c970bd2ecb18b019a1a58d](https://github.com/tensorflow/tensorflow/commit/8dc723fcdd1a6127d6c970bd2ecb18b019a1a58d). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Andrei ## Related CVE(s) BIT-tensorflow-2023-25667, CVE-2023-25667","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:57:09","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41910","bom-ref":"CVE-2022-41910/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41910 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41910","name":"NVD"},"references":[{"id":"GHSA-frqp-wp83-qggv","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-frqp-wp83-qggv"}},{"id":"CVE-2022-41910","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41910","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-frqp-wp83-qggv","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-frqp-wp83-qggv"},{"title":"CVE-2022-41910","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41910"}],"cwes":[125],"description":"Heap overflow in `QuantizeAndDequantizeV2`","detail":"# Heap overflow in `QuantizeAndDequantizeV2` ### Impact The function [MakeGrapplerFunctionItem](https://https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/grappler/utils/functions.cc#L221) takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. ```python import tensorflow as tf @tf.function def test(): tf.raw_ops.QuantizeAndDequantizeV2(input=[2.5], input_min=[1.0], input_max=[10.0], signed_input=True, num_bits=1, range_given=True, round_mode='HALF_TO_EVEN', narrow_range=True, axis=0x7fffffff) test() ``` ### Patches We have patched the issue in GitHub commit [7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb](https://github.com/tensorflow/tensorflow/commit/7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb). The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ## Related CVE(s) BIT-tensorflow-2022-41910, CVE-2022-41910","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T22:17:52","updated":"2023-12-06T01:02:39","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25661","bom-ref":"CVE-2023-25661/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25661 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25661","name":"NVD"},"references":[{"id":"CVE-2023-25661","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25661","name":"NVD"}},{"id":"GHSA-fxgc-95xx-grvq","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxgc-95xx-grvq"}}],"advisories":[{"title":"CVE-2023-25661","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25661"},{"title":"GitHub Advisory GHSA-fxgc-95xx-grvq","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxgc-95xx-grvq"}],"cwes":[20],"description":"TensorFlow Denial of Service vulnerability","detail":"# TensorFlow Denial of Service vulnerability ### Impact A malicious invalid input crashes a tensorflow model (Check Failed) and can be used to trigger a denial of service attack. To minimize the bug, we built a simple single-layer TensorFlow model containing a Convolution3DTranspose layer, which works well with expected inputs and can be deployed in real-world systems. However, if we call the model with a malicious input which has a zero dimension, it gives Check Failed failure and crashes. ```python import tensorflow as tf class MyModel(tf.keras.Model): def __init__(self): super().__init__() self.conv = tf.keras.layers.Convolution3DTranspose(2, [3,3,3], padding=\"same\") def call(self, input): return self.conv(input) model = MyModel() # Defines a valid model. x = tf.random.uniform([1, 32, 32, 32, 3], minval=0, maxval=0, dtype=tf.float32) # This is a valid input. output = model.predict(x) print(output.shape) # (1, 32, 32, 32, 2) x = tf.random.uniform([1, 32, 32, 0, 3], dtype=tf.float32) # This is an invalid input. output = model(x) # crash ``` This Convolution3DTranspose layer is a very common API in modern neural networks. The ML models containing such vulnerable components could be deployed in ML applications or as cloud services. This failure could be potentially used to trigger a denial of service attack on ML cloud services. ### Patches We have patched the issue in - GitHub commit [948fe6369a5711d4b4568ea9bbf6015c6dfb77e2](https://github.com/tensorflow/tensorflow/commit/948fe6369a5711d4b4568ea9bbf6015c6dfb77e2) - GitHub commit [85db5d07db54b853484bfd358c3894d948c36baf](https://github.com/keras-team/keras/commit/85db5d07db54b853484bfd358c3894d948c36baf). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ## Related CVE(s) BIT-tensorflow-2023-25661, CVE-2023-25661","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-27T21:05:10","updated":"2024-02-16T08:15:44","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41901","bom-ref":"CVE-2022-41901/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41901 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41901","name":"NVD"},"references":[{"id":"GHSA-g9fm-r5mm-rf9f","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g9fm-r5mm-rf9f"}},{"id":"CVE-2022-41901","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41901","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-g9fm-r5mm-rf9f","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g9fm-r5mm-rf9f"},{"title":"CVE-2022-41901","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41901"}],"cwes":[20,617],"description":"`CHECK_EQ` fail via input in `SparseMatrixNNZ`","detail":"# `CHECK_EQ` fail via input in `SparseMatrixNNZ` ### Impact An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in [`tf.raw_ops.SparseMatrixNNZ`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sparse/sparse_matrix.h). ```python import tensorflow as tf tf.raw_ops.SparseMatrixNNZ(sparse_matrix=[]) ``` ### Patches We have patched the issue in GitHub commit [f856d02e5322821aad155dad9b3acab1e9f5d693](https://github.com/tensorflow/tensorflow/commit/f856d02e5322821aad155dad9b3acab1e9f5d693). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Kang Hong Jin ## Related CVE(s) BIT-tensorflow-2022-41901, CVE-2022-41901","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T22:03:54","updated":"2024-02-16T08:17:06","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25674","bom-ref":"CVE-2023-25674/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25674 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25674","name":"NVD"},"references":[{"id":"CVE-2023-25674","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25674","name":"NVD"}},{"id":"GHSA-gf97-q72m-7579","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579"}}],"advisories":[{"title":"CVE-2023-25674","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25674"},{"title":"GitHub Advisory GHSA-gf97-q72m-7579","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579"}],"cwes":[476],"description":"TensorFlow has Null Pointer Error in RandomShuffle with XLA enable ","detail":"# TensorFlow has Null Pointer Error in RandomShuffle with XLA enable ### Impact NPE in RandomShuffle with XLA enable ```python import tensorflow as tf func = tf.raw_ops.RandomShuffle para = {'value': 1e+20, 'seed': -4294967297, 'seed2': -2147483649} @tf.function(jit_compile=True) def test(): y = func(**para) return y test() ``` ### Patches We have patched the issue in GitHub commit [728113a3be690facad6ce436660a0bc1858017fa](https://github.com/tensorflow/tensorflow/commit/728113a3be690facad6ce436660a0bc1858017fa). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx ## Related CVE(s) BIT-tensorflow-2023-25674, CVE-2023-25674","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:54:31","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-33976","bom-ref":"CVE-2023-33976/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.12.1|!=2.12.1","status":"affected"},{"version":"2.12.1","status":"unaffected"}]}],"recommendation":"Update to version 2.12.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33976","name":"NVD"},"references":[{"id":"CVE-2023-33976","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33976","name":"NVD"}},{"id":"GHSA-gjh7-xx4r-x345","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjh7-xx4r-x345"}}],"advisories":[{"title":"CVE-2023-33976","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33976"},{"title":"GitHub Advisory GHSA-gjh7-xx4r-x345","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjh7-xx4r-x345"}],"cwes":[190],"description":"TensorFlow has segfault in array_ops.upper_bound","detail":"# TensorFlow has segfault in array_ops.upper_bound ### Impact `array_ops.upper_bound` causes a segfault when not given a rank 2 tensor. ### Patches We have patched the issue in GitHub commit [915884fdf5df34aaedd00fc6ace33a2cfdefa586](https://github.com/tensorflow/tensorflow/commit/915884fdf5df34aaedd00fc6ace33a2cfdefa586). The fix will be included in TensorFlow 2.13. We will also cherrypick this commit in TensorFlow 2.12.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by dmc1778 ## Related CVE(s) BIT-tensorflow-2023-33976, CVE-2023-33976","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-07-30T20:47:04","updated":"2024-08-01T08:41:49","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41895","bom-ref":"CVE-2022-41895/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41895 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41895","name":"NVD"},"references":[{"id":"GHSA-gq2j-cr96-gvqx","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gq2j-cr96-gvqx"}},{"id":"CVE-2022-41895","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41895","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-gq2j-cr96-gvqx","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gq2j-cr96-gvqx"},{"title":"CVE-2022-41895","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41895"}],"cwes":[125],"description":"`MirrorPadGrad` heap out of bounds read","detail":"# `MirrorPadGrad` heap out of bounds read ### Impact If [`MirrorPadGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/mirror_pad_op.cc) is given outsize input `paddings`, TensorFlow will give a heap OOB error. ```python import tensorflow as tf tf.raw_ops.MirrorPadGrad(input=[1], paddings=[[0x77f00000,0xa000000]], mode = 'REFLECT') ``` ### Patches We have patched the issue in GitHub commit [717ca98d8c3bba348ff62281fdf38dcb5ea1ec92](https://github.com/tensorflow/tensorflow/commit/717ca98d8c3bba348ff62281fdf38dcb5ea1ec92). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Vul AI. ## Related CVE(s) BIT-tensorflow-2022-41895, CVE-2022-41895","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:44:36","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25668","bom-ref":"CVE-2023-25668/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25668 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25668","name":"NVD"},"references":[{"id":"GHSA-gw97-ff7c-9v96","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gw97-ff7c-9v96"}},{"id":"CVE-2023-25668","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25668","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-gw97-ff7c-9v96","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gw97-ff7c-9v96"},{"title":"CVE-2023-25668","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25668"}],"cwes":[122,125],"description":"TensorFlow has a heap out-of-buffer read vulnerability in the QuantizeAndDequantize operation","detail":"# TensorFlow has a heap out-of-buffer read vulnerability in the QuantizeAndDequantize operation ### Impact Attackers using Tensorflow can exploit the vulnerability. They can access heap memory which is not in the control of user, leading to a crash or RCE. When axis is larger than the dim of input, c->Dim(input,axis) goes out of bound. Same problem occurs in the QuantizeAndDequantizeV2/V3/V4/V4Grad operations too. ```python import tensorflow as tf @tf.function def test(): tf.raw_ops.QuantizeAndDequantizeV2(input=[2.5], input_min=[1.0], input_max=[10.0], signed_input=True, num_bits=1, range_given=True, round_mode='HALF_TO_EVEN', narrow_range=True, axis=0x7fffffff) test() ``` ### Patches We have patched the issue in GitHub commit [7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb](https://github.com/tensorflow/tensorflow/commit/7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ## Related CVE(s) BIT-tensorflow-2023-25668, CVE-2023-25668","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2023-03-24T21:57:01","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41890","bom-ref":"CVE-2022-41890/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41890 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41890","name":"NVD"},"references":[{"id":"GHSA-h246-cgh4-7475","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h246-cgh4-7475"}},{"id":"CVE-2022-41890","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41890","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-h246-cgh4-7475","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h246-cgh4-7475"},{"title":"CVE-2022-41890","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41890"}],"cwes":[704],"description":"`CHECK` fail in `BCast` overflow","detail":"# `CHECK` fail in `BCast` overflow ### Impact If [`BCast::ToShape`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/util/bcast.h) is given input larger than an `int32`, it will crash, despite being supposed to handle up to an `int64`. An example can be seen in [`tf.experimental.numpy.outer`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/util/bcast.h) by passing in large input to the input `b`. ```python import tensorflow as tf value = tf.constant(shape=[2, 1024, 1024, 1024], value=False) tf.experimental.numpy.outer(a=6,b=value) ``` ### Patches We have patched the issue in GitHub commit [8310bf8dd188ff780e7fc53245058215a05bdbe5](https://github.com/tensorflow/tensorflow/commit/8310bf8dd188ff780e7fc53245058215a05bdbe5). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Pattarakrit Rattankul. ## Related CVE(s) BIT-tensorflow-2022-41890, CVE-2022-41890","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:42:10","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41894","bom-ref":"CVE-2022-41894/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41894 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41894","name":"NVD"},"references":[{"id":"GHSA-h6q3-vv32-2cq5","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6q3-vv32-2cq5"}},{"id":"CVE-2022-41894","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41894","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-h6q3-vv32-2cq5","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6q3-vv32-2cq5"},{"title":"CVE-2022-41894","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41894"}],"cwes":[120],"description":"Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite","detail":"# Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite ### Impact The reference kernel of the [`CONV_3D_TRANSPOSE`](https://github.com/tensorflow/tensorflow/blob/091e63f0ea33def7ecad661a5ac01dcafbafa90b/tensorflow/lite/kernels/internal/reference/conv3d_transpose.h#L121) TensorFlow Lite operator wrongly increments the data_ptr when adding the bias to the result. Instead of `data_ptr += num_channels;` it should be `data_ptr += output_num_channels;` as if the number of input channels is different than the number of output channels, the wrong result will be returned and a buffer overflow will occur if num_channels > output_num_channels. An attacker can craft a model with a specific number of input channels in a way similar to the attached example script. It is then possible to write specific values through the bias of the layer outside the bounds of the buffer. This attack only works if the reference kernel resolver is used in the interpreter (i.e. `experimental_op_resolver_type=tf.lite.experimental.OpResolverType.BUILTIN_REF` is used). ```python import tensorflow as tf model = tf.keras.Sequential( [ tf.keras.layers.InputLayer(input_shape=(2, 2, 2, 1024), batch_size=1), tf.keras.layers.Conv3DTranspose( filters=8, kernel_size=(2, 2, 2), padding=\"same\", data_format=\"channels_last\", ), ] ) converter = tf.lite.TFLiteConverter.from_keras_model(model) tflite_model = converter.convert() interpreter = tf.lite.Interpreter( model_content=tflite_model, experimental_op_resolver_type=tf.lite.experimental.OpResolverType.BUILTIN_REF, ) interpreter.allocate_tensors() interpreter.set_tensor( interpreter.get_input_details()[0][\"index\"], tf.zeros(shape=[1, 2, 2, 2, 1024]) ) interpreter.invoke() ``` ### Patches We have patched the issue in GitHub commit [72c0bdcb25305b0b36842d746cc61d72658d2941](https://github.com/tensorflow/tensorflow/commit/72c0bdcb25305b0b36842d746cc61d72658d2941). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Thibaut Goetghebuer-Planchon, Arm Ltd. ## Related CVE(s) BIT-tensorflow-2022-41894, CVE-2022-41894","ratings":[{"method":"CVSSv31","severity":"high","score":7.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"published":"2022-11-21T20:44:24","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41898","bom-ref":"CVE-2022-41898/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41898 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41898","name":"NVD"},"references":[{"id":"GHSA-hq7g-wwwp-q46h","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hq7g-wwwp-q46h"}},{"id":"CVE-2022-41898","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41898","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-hq7g-wwwp-q46h","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hq7g-wwwp-q46h"},{"title":"CVE-2022-41898","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41898"}],"cwes":[20],"description":"`CHECK` fail via inputs in `SparseFillEmptyRowsGrad`","detail":"# `CHECK` fail via inputs in `SparseFillEmptyRowsGrad` ### Impact If [`SparseFillEmptyRowsGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sparse_fill_empty_rows_op_gpu.cu.cc) is given empty inputs, TensorFlow will crash. ```python import tensorflow as tf tf.raw_ops.SparseFillEmptyRowsGrad( reverse_index_map=[], grad_values=[], name=None ) ``` ### Patches We have patched the issue in GitHub commit [af4a6a3c8b95022c351edae94560acc61253a1b8](https://github.com/tensorflow/tensorflow/commit/af4a6a3c8b95022c351edae94560acc61253a1b8). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Jiawei Liu, PhD student at University of Illinois, Urbana-Champaign. ## Related CVE(s) BIT-tensorflow-2022-41898, CVE-2022-41898","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T21:54:18","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25671","bom-ref":"CVE-2023-25671/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25671 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25671","name":"NVD"},"references":[{"id":"GHSA-j5w9-hmfh-4cr6","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j5w9-hmfh-4cr6"}},{"id":"CVE-2023-25671","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25671","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-j5w9-hmfh-4cr6","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j5w9-hmfh-4cr6"},{"title":"CVE-2023-25671","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25671"}],"cwes":[787],"description":"TensorFlow has segmentation fault in tfg-translate ","detail":"# TensorFlow has segmentation fault in tfg-translate ### Impact Out-of-bounds access due to mismatched integer type sizes in ValueMap::Manager::GetValueOrCreatePlaceholder. Bug with tfg-translate call to InitMlir. The problem happens with generic functions, as it is already handled for non-generic functions. This is because they, unlike non-generic functions, are using the \"old importer\". A better long-term solution may be to have the \"new importer\" handle generic functions. ### Patches We have patched the issue in GitHub - commit [760322a71ac9033e122ef1f4b1c62813021e5938](https://github.com/tensorflow/tensorflow/commit/760322a71ac9033e122ef1f4b1c62813021e5938). - commit [2eedc8f676d2c3b8be9492e547b2bc814c10b367](https://github.com/tensorflow/tensorflow/commit/2eedc8f676d2c3b8be9492e547b2bc814c10b367) The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx ### Affiliation 360 AIVul ## Related CVE(s) BIT-tensorflow-2023-25671, CVE-2023-25671","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:55:07","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41884","bom-ref":"CVE-2022-41884/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41884 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41884","name":"NVD"},"references":[{"id":"GHSA-jq6x-99hj-q636","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636"}},{"id":"CVE-2022-41884","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41884","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-jq6x-99hj-q636","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636"},{"title":"CVE-2022-41884","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41884"}],"cwes":[670],"description":"Seg fault in `ndarray_tensor_bridge` due to zero and large inputs","detail":"# Seg fault in `ndarray_tensor_bridge` due to zero and large inputs ### Impact If a numpy array is created with a shape such that one element is zero and the others sum to a large number, an error will be raised. E.g. the following raises an error: ```python np.ones((0, 2**31, 2**31)) ``` An example of a proof of concept: ```python import numpy as np import tensorflow as tf input_val = tf.constant([1]) shape_val = np.array([i for i in range(21)]) tf.broadcast_to(input=input_val,shape=shape_val) ``` The return value of `PyArray_SimpleNewFromData`, which returns null on such shapes, is not checked. ### Patches We have patched the issue in GitHub commit [2b56169c16e375c521a3bc8ea658811cc0793784](https://github.com/tensorflow/tensorflow/commit/2b56169c16e375c521a3bc8ea658811cc0793784). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Pattarakrit Rattanukul. ## Related CVE(s) BIT-tensorflow-2022-41884, CVE-2022-41884","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:39:49","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41908","bom-ref":"CVE-2022-41908/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41908 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41908","name":"NVD"},"references":[{"id":"GHSA-mv77-9g28-cwg3","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv77-9g28-cwg3"}},{"id":"CVE-2022-41908","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41908","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-mv77-9g28-cwg3","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv77-9g28-cwg3"},{"title":"CVE-2022-41908","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41908"}],"cwes":[20],"description":"`CHECK` fail via inputs in `PyFunc`","detail":"# `CHECK` fail via inputs in `PyFunc` ### Impact An input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in [`tf.raw_ops.PyFunc`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc). ```python import tensorflow as tf value = tf.constant(value=[1,2]) token = b'\\xb0' dataType = [tf.int32] tf.raw_ops.PyFunc(input=value,token=token,Tout=dataType) ``` ### Patches We have patched the issue in GitHub commit [9f03a9d3bafe902c1e6beb105b2f24172f238645](https://github.com/tensorflow/tensorflow/commit/9f03a9d3bafe902c1e6beb105b2f24172f238645). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by pattarakritr@smu.edu.sg ## Related CVE(s) BIT-tensorflow-2022-41908, CVE-2022-41908","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T22:09:30","updated":"2023-12-06T01:02:39","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41911","bom-ref":"CVE-2022-41911/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41911 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41911","name":"NVD"},"references":[{"id":"CVE-2022-41911","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41911","name":"NVD"}},{"id":"GHSA-pf36-r9c6-h97j","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pf36-r9c6-h97j"}}],"advisories":[{"title":"CVE-2022-41911","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41911"},{"title":"GitHub Advisory GHSA-pf36-r9c6-h97j","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pf36-r9c6-h97j"}],"cwes":[704],"description":"Invalid char to bool conversion when printing a tensor","detail":"# Invalid char to bool conversion when printing a tensor ### Impact When [printing a tensor](https://github.com/tensorflow/tensorflow/blob/807cae8a807960fd7ac2313cde73a11fc15e7942/tensorflow/core/framework/tensor.cc#L1200-L1227), we get it's data as a `const char*` array (since that's the underlying storage) and then we typecast it to the element type. However, conversions from `char` to `bool` are undefined if the `char` is not `0` or `1`, so sanitizers/fuzzers will crash. ### Patches We have patched the issue in GitHub commit [1be743703279782a357adbf9b77dcb994fe8b508](https://github.com/tensorflow/tensorflow/commit/1be743703279782a357adbf9b77dcb994fe8b508). The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1, TensorFlow 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability was discovered via internal fuzzing. ## Related CVE(s) BIT-tensorflow-2022-41911, CVE-2022-41911","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T22:18:11","updated":"2023-12-06T01:02:39","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25660","bom-ref":"CVE-2023-25660/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25660 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25660","name":"NVD"},"references":[{"id":"GHSA-qjqc-vqcf-5qvj","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjqc-vqcf-5qvj"}},{"id":"CVE-2023-25660","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25660","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-qjqc-vqcf-5qvj","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjqc-vqcf-5qvj"},{"title":"CVE-2023-25660","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25660"}],"cwes":[476],"description":"TensorFlow vulnerable to seg fault in `tf.raw_ops.Print`","detail":"# TensorFlow vulnerable to seg fault in `tf.raw_ops.Print` ### Impact When the parameter `summarize` of `tf.raw_ops.Print` is zero, the new method `SummarizeArray` will reference to a nullptr, leading to a seg fault. ```python import tensorflow as tf tf.raw_ops.Print(input = tf.constant([1, 1, 1, 1],dtype=tf.int32), data = [[False, False, False, False], [False], [False, False, False]], message = 'tmp/I', first_n = 100, summarize = 0) ``` ### Patches We have patched the issue in GitHub commit [6d423b8bcc9aa9f5554dc988c1c16d038b508df1](https://github.com/tensorflow/tensorflow/commit/6d423b8bcc9aa9f5554dc988c1c16d038b508df1). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team ## Related CVE(s) BIT-tensorflow-2023-25660, CVE-2023-25660","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:58:44","updated":"2023-12-06T01:02:53","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-25669","bom-ref":"CVE-2023-25669/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=0.12.0|<=2.9.3|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2023-25669 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25669","name":"NVD"},"references":[{"id":"GHSA-rcf8-g8jv-vg6p","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rcf8-g8jv-vg6p"}},{"id":"CVE-2023-25669","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25669","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-rcf8-g8jv-vg6p","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rcf8-g8jv-vg6p"},{"title":"CVE-2023-25669","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25669"}],"cwes":[697],"description":"TensorFlow has Floating Point Exception in AvgPoolGrad with XLA","detail":"# TensorFlow has Floating Point Exception in AvgPoolGrad with XLA ### Impact If the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give an FPE. ```python import tensorflow as tf import numpy as np @tf.function(jit_compile=True) def test(): y = tf.raw_ops.AvgPoolGrad(orig_input_shape=[1,0,0,0], grad=[[[[0.39117979]]]], ksize=[1,0,0,0], strides=[1,0,0,0], padding=\"SAME\", data_format=\"NCHW\") return y print(test()) ``` ### Patches We have patched the issue in GitHub commit [1295ae4dbb52fe06b19733b0257e2340d7b63b8d](https://github.com/tensorflow/tensorflow/commit/1295ae4dbb52fe06b19733b0257e2340d7b63b8d). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx of 360 AIVul Team ## Related CVE(s) BIT-tensorflow-2023-25669, CVE-2023-25669","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-24T21:56:53","updated":"2023-12-06T01:02:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41909","bom-ref":"CVE-2022-41909/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41909 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41909","name":"NVD"},"references":[{"id":"CVE-2022-41909","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41909","name":"NVD"}},{"id":"GHSA-rjx6-v474-2ch9","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjx6-v474-2ch9"}}],"advisories":[{"title":"CVE-2022-41909","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41909"},{"title":"GitHub Advisory GHSA-rjx6-v474-2ch9","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjx6-v474-2ch9"}],"cwes":[20,476],"description":"Segfault in `CompositeTensorVariantToComponents`","detail":"# Segfault in `CompositeTensorVariantToComponents` ### Impact An input `encoded` that is not a valid `CompositeTensorVariant` tensor will trigger a segfault in [`tf.raw_ops.CompositeTensorVariantToComponents`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc). ```python import tensorflow as tf encode = tf.raw_ops.EmptyTensorList(element_dtype=tf.int32, element_shape=[10, 15], max_num_elements=2) meta= \"\" component=[tf.int32] print(tf.raw_ops.CompositeTensorVariantToComponents(encoded=encode,metadata=meta,Tcomponents=component)) ``` ### Patches We have patched the issue in GitHub commits [bf594d08d377dc6a3354d9fdb494b32d45f91971](https://github.com/tensorflow/tensorflow/commit/bf594d08d377dc6a3354d9fdb494b32d45f91971) and [660ce5a89eb6766834bdc303d2ab3902aef99d3d](https://github.com/tensorflow/tensorflow/commit/660ce5a89eb6766834bdc303d2ab3902aef99d3d). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by pattarakritr@smu.edu.sg ## Related CVE(s) BIT-tensorflow-2022-41909, CVE-2022-41909","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T22:17:43","updated":"2024-02-16T08:16:14","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41896","bom-ref":"CVE-2022-41896/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41896 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41896","name":"NVD"},"references":[{"id":"CVE-2022-41896","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41896","name":"NVD"}},{"id":"GHSA-rmg2-f698-wq35","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rmg2-f698-wq35"}}],"advisories":[{"title":"CVE-2022-41896","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41896"},{"title":"GitHub Advisory GHSA-rmg2-f698-wq35","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rmg2-f698-wq35"}],"cwes":[1284,20],"description":"`tf.raw_ops.Mfcc` crashes","detail":"# `tf.raw_ops.Mfcc` crashes ### Impact If [`ThreadUnsafeUnigramCandidateSampler`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/mirror_pad_op.cc) is given input `filterbank_channel_count` greater than the allowed max size, TensorFlow will crash. ```python import tensorflow as tf tf.raw_ops.Mfcc( spectrogram = [[[1.38, 6.32, 5.75, 9.51]]], sample_rate = 2, upper_frequency_limit = 5.0, lower_frequency_limit = 1.0, filterbank_channel_count = 2**31 - 1, dct_coefficient_count = 1 ) ``` ### Patches We have patched the issue in GitHub commit [39ec7eaf1428e90c37787e5b3fbd68ebd3c48860](https://github.com/tensorflow/tensorflow/commit/39ec7eaf1428e90c37787e5b3fbd68ebd3c48860). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Vul AI. ## Related CVE(s) BIT-tensorflow-2022-41896, CVE-2022-41896","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T21:53:52","updated":"2024-02-16T08:23:52","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41883","bom-ref":"CVE-2022-41883/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41883 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41883","name":"NVD"},"references":[{"id":"CVE-2022-41883","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41883","name":"NVD"}},{"id":"GHSA-w58w-79xv-6vcj","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w58w-79xv-6vcj"}}],"advisories":[{"title":"CVE-2022-41883","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41883"},{"title":"GitHub Advisory GHSA-w58w-79xv-6vcj","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w58w-79xv-6vcj"}],"cwes":[125],"description":"Out of bounds segmentation fault due to unequal op inputs in Tensorflow","detail":"# Out of bounds segmentation fault due to unequal op inputs in Tensorflow ### Impact [`tf.raw_ops.DynamicStitch`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/dynamic_stitch_op.cc) specifies input sizes when it is [registered](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ops/data_flow_ops.cc). ```cpp REGISTER_OP(\"DynamicStitch\") .Input(\"indices: N * int32\") .Input(\"data: N * T\") .Output(\"merged: T\") .Attr(\"N : int >= 1\") .Attr(\"T : type\") .SetShapeFn(DynamicStitchShapeFunction); ``` When it receives a differing number of inputs, such as when it is called with an `indices` size 1 and a `data` size 2, it will crash. ```python import tensorflow as tf # indices = 1*[tf.random.uniform([1,2], dtype=tf.dtypes.int32, maxval=100)] indices = [tf.constant([[0, 1]]),] # data = 2*[tf.random.uniform([1,2], dtype=tf.dtypes.float32, maxval=100)] data = [tf.constant([[5, 6]]), tf.constant([[7, 8]])] tf.raw_ops.DynamicStitch( indices=indices, data=data) ``` ### Patches We have patched the issue in GitHub commit [f5381e0e10b5a61344109c1b7c174c68110f7629](https://github.com/tensorflow/tensorflow/commit/f5381e0e10b5a61344109c1b7c174c68110f7629). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1 as this is also affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Zizhuang Deng of IIE, UCAS ## Related CVE(s) BIT-tensorflow-2022-41883, CVE-2022-41883","ratings":[{"method":"CVSSv31","severity":"medium","score":6.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H"}],"published":"2022-11-21T20:39:20","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-xf83-q765-xm6m","bom-ref":"GHSA-xf83-q765-xm6m/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve GHSA-xf83-q765-xm6m or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xf83-q765-xm6m"},"references":[{"id":"GHSA-xf83-q765-xm6m","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xf83-q765-xm6m"}}],"advisories":[{"title":"GitHub Advisory GHSA-xf83-q765-xm6m","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xf83-q765-xm6m"}],"cwes":[],"description":"`CHECK` fail in `TensorListScatter` and `TensorListScatterV2` in eager mode","detail":"# `CHECK` fail in `TensorListScatter` and `TensorListScatterV2` in eager mode ### Impact Another instance of CVE-2022-35991, where `TensorListScatter` and `TensorListScatterV2` crash via non scalar inputs in`element_shape`, was found in eager mode and fixed. ```python import tensorflow as tf arg_0=tf.random.uniform(shape=(2, 2, 2), dtype=tf.float16, maxval=None) arg_1=tf.random.uniform(shape=(2, 2, 2), dtype=tf.int32, maxval=65536) arg_2=tf.random.uniform(shape=(2, 2, 2), dtype=tf.int32, maxval=65536) arg_3='' tf.raw_ops.TensorListScatter(tensor=arg_0, indices=arg_1, element_shape=arg_2, name=arg_3) ``` ### Patches We have patched the issue in GitHub commit [bf9932fc907aff0e9e8cccf769e8b00d30fd81a1](https://github.com/tensorflow/tensorflow/commit/bf9932fc907aff0e9e8cccf769e8b00d30fd81a1). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Pattarakrit Rattankul","ratings":[{"method":"CVSSv31","severity":"low","score":3.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2022-11-21T23:51:30","updated":"2024-12-04T05:42:26","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41900","bom-ref":"CVE-2022-41900/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41900 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41900","name":"NVD"},"references":[{"id":"GHSA-xvwp-h6jv-7472","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvwp-h6jv-7472"}},{"id":"CVE-2022-41900","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41900","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-xvwp-h6jv-7472","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvwp-h6jv-7472"},{"title":"CVE-2022-41900","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41900"}],"cwes":[125,787],"description":"FractionalMaxPool and FractionalAVGPool heap out-of-bounds acess","detail":"# FractionalMaxPool and FractionalAVGPool heap out-of-bounds acess ### Impact An input `pooling_ratio` that is smaller than 1 will trigger a heap OOB in [`tf.raw_ops.FractionalMaxPool`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/fractional_max_pool_op.cc) and [`tf.raw_ops.FractionalAvgPool`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/fractional_avg_pool_op.cc). ### Patches We have patched the issue in GitHub commit [216525144ee7c910296f5b05d214ca1327c9ce48](https://github.com/tensorflow/tensorflow/commit/216525144ee7c910296f5b05d214ca1327c9ce48). The fix will be included in TensorFlow 2.11.0. We will also cherry pick this commit on TensorFlow 2.10.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ## Related CVE(s) BIT-tensorflow-2022-41900, CVE-2022-41900","ratings":[{"method":"CVSSv31","severity":"high","score":7.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"published":"2022-11-21T22:03:45","updated":"2023-12-06T01:02:38","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-41889","bom-ref":"CVE-2022-41889/pkg:pypi/tensorflow@2.10.0","affects":[{"ref":"pkg:pypi/tensorflow@2.10.0","versions":[{"range":"vers:pypi/>=2.10.0|<2.10.1|!=2.10.1","status":"affected"},{"version":"2.10.1","status":"unaffected"}]}],"recommendation":"Update to version 2.10.1 to resolve CVE-2022-41889 or update to version 2.12.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41889","name":"NVD"},"references":[{"id":"GHSA-xxcj-rhqg-m46g","source":{"name":"GitHub Advisory","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xxcj-rhqg-m46g"}},{"id":"CVE-2022-41889","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41889","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-xxcj-rhqg-m46g","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xxcj-rhqg-m46g"},{"title":"CVE-2022-41889","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41889"}],"cwes":[476],"description":"Segfault via invalid attributes in `pywrap_tfe_src.cc`","detail":"# Segfault via invalid attributes in `pywrap_tfe_src.cc` ### Impact If a list of quantized tensors is assigned to an attribute, the pywrap code fails to parse the tensor and returns a `nullptr`, which is not caught. An example can be seen in [`tf.compat.v1.extract_volume_patches`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/generate_box_proposals_op.cu.cc) by passing in quantized tensors as input `ksizes`. ```python import numpy as np import tensorflow as tf a_input = np.array([1, -1], dtype= np.int32) a_ksizes = a_strides = tf.constant(dtype=tf.dtypes.qint16, value=[[1, 4], [5, 2]]) tf.compat.v1.extract_volume_patches(input=a_input,ksizes=a_ksizes,strides=a_strides,padding='VALID') ``` ### Patches We have patched the issue in GitHub commit [e9e95553e5411834d215e6770c81a83a3d0866ce](https://github.com/tensorflow/tensorflow/commit/e9e95553e5411834d215e6770c81a83a3d0866ce). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Pattarakrit Rattankul. ## Related CVE(s) BIT-tensorflow-2022-41889, CVE-2022-41889","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-11-21T20:42:00","updated":"2025-01-15T17:55:49","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-2953","bom-ref":"CVE-2025-2953/pkg:pypi/torch@1.11.0","affects":[{"ref":"pkg:pypi/torch@1.11.0","versions":[{"range":"vers:pypi/>=1.0.0|<=2.7.0|<2.7.1-rc1|!=2.7.1-rc1","status":"affected"},{"version":"2.7.1-rc1","status":"unaffected"}]}],"recommendation":"Update to version 2.7.1-rc1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-2953","name":"NVD"},"references":[{"id":"vuldb-302006","source":{"name":"Vuldb Advisory","url":"https://vuldb.com/?id.302006"}},{"id":"CVE-2025-2953","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-2953","name":"NVD"}}],"advisories":[{"title":"Vuldb Advisory vuldb-302006","url":"https://vuldb.com/?id.302006"},{"title":"CVE-2025-2953","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-2953"}],"cwes":[404],"description":"PyTorch susceptible to local Denial of Service","detail":"# PyTorch susceptible to local Denial of Service A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. ## Related CVE(s) BIT-pytorch-2025-2953, CVE-2025-2953","ratings":[{"method":"CVSSv4","severity":"low","score":1.9,"vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"}],"published":"2025-03-30T18:30:24","updated":"2025-05-30T21:13:25","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 230 locations"}]},{"id":"CVE-2022-45907","bom-ref":"CVE-2022-45907/pkg:pypi/torch@1.11.0","affects":[{"ref":"pkg:pypi/torch@1.11.0","versions":[{"range":"vers:pypi/>=1.0.0|<=1.13.0|<1.13.1|!=1.13.1","status":"affected"},{"version":"1.13.1","status":"unaffected"}]}],"recommendation":"Update to version 1.13.1 to resolve CVE-2022-45907 or update to version 2.7.1-rc1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45907","name":"NVD"},"references":[{"id":"PYSEC-2022-43015","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2022-43015.yaml"}},{"id":"CVE-2022-45907","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45907","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2022-43015","url":"https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2022-43015.yaml"},{"title":"CVE-2022-45907","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45907"}],"cwes":[77],"description":"PyTorch vulnerable to arbitrary code execution","detail":"# PyTorch vulnerable to arbitrary code execution In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. The fix for this issue is available in version 1.13.1. There is a release checker in [issue #89855](https://github.com/pytorch/pytorch/issues/89855). ## Related CVE(s) BIT-pytorch-2022-45907, CVE-2022-45907, PYSEC-2022-43015","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-11-26T03:30:27","updated":"2024-11-13T23:01:42","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 230 locations"}]},{"id":"CVE-2025-32434","bom-ref":"CVE-2025-32434/pkg:pypi/torch@1.11.0","affects":[{"ref":"pkg:pypi/torch@1.11.0","versions":[{"range":"vers:pypi/>=1.0.0|<=2.5.1|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0 to resolve CVE-2025-32434 or update to version 2.7.1-rc1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32434","name":"NVD"},"references":[{"id":"CVE-2025-32434","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32434","name":"NVD"}},{"id":"PYSEC-2025-41","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2025-41.yaml"}},{"id":"GHSA-53q9-r3pm-6pq6","source":{"name":"GitHub Advisory","url":"https://github.com/pytorch/pytorch/security/advisories/GHSA-53q9-r3pm-6pq6"}}],"advisories":[{"title":"CVE-2025-32434","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32434"},{"title":"GitHub Advisory PYSEC-2025-41","url":"https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2025-41.yaml"},{"title":"GitHub Advisory GHSA-53q9-r3pm-6pq6","url":"https://github.com/pytorch/pytorch/security/advisories/GHSA-53q9-r3pm-6pq6"}],"cwes":[502],"description":"PyTorch: `torch.load` with `weights_only=True` leads to remote code execution","detail":"# PyTorch: `torch.load` with `weights_only=True` leads to remote code execution # Description I found a Remote Command Execution (RCE) vulnerability in PyTorch. When loading model using torch.load with weights_only=True, it can still achieve RCE. # Background knowledge https://github.com/pytorch/pytorch/security As you can see, the PyTorch official documentation considers using `torch.load()` with `weights_only=True` to be safe. ![image](https://github.com/user-attachments/assets/fdaa8520-d66a-473a-ab1f-163d793de298) Since everyone knows that weights_only=False is unsafe, so they will use the weights_only=True to mitigate the seucirty issue. But now, I just proved that even if you use weights_only=True, it can still achieve RCE. # Credit This vulnerability was found by Ji'an Zhou. ## Related CVE(s) BIT-pytorch-2025-32434, CVE-2025-32434, PYSEC-2025-41","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2025-04-18T15:19:28","updated":"2025-08-29T20:54:00","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 230 locations"}]},{"id":"CVE-2024-31580","bom-ref":"CVE-2024-31580/pkg:pypi/torch@1.11.0","affects":[{"ref":"pkg:pypi/torch@1.11.0","versions":[{"range":"vers:pypi/>=1.0.0|<=2.1.2|<2.2.0|!=2.2.0","status":"affected"},{"version":"2.2.0","status":"unaffected"}]}],"recommendation":"Update to version 2.2.0 to resolve CVE-2024-31580 or update to version 2.7.1-rc1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31580","name":"NVD"},"references":[{"id":"SNYK-PYTHON-TORCH-6649934","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-PYTHON-TORCH-6649934"}},{"id":"CVE-2024-31580","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31580","name":"NVD"}},{"id":"PYSEC-2024-252","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2024-252.yaml"}}],"advisories":[{"title":"Snyk Advisory SNYK-PYTHON-TORCH-6649934","url":"https://security.snyk.io/vuln/SNYK-PYTHON-TORCH-6649934"},{"title":"CVE-2024-31580","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31580"},{"title":"GitHub Advisory PYSEC-2024-252","url":"https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2024-252.yaml"}],"cwes":[122],"description":"PyTorch heap buffer overflow vulnerability","detail":"# PyTorch heap buffer overflow vulnerability PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. ## Related CVE(s) BIT-pytorch-2024-31580, CVE-2024-31580, PYSEC-2024-252","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-04-17T21:30:48","updated":"2025-06-11T14:36:51","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 230 locations"}]},{"id":"CVE-2025-3730","bom-ref":"CVE-2025-3730/pkg:pypi/torch@1.11.0","affects":[{"ref":"pkg:pypi/torch@1.11.0","versions":[{"range":"vers:pypi/>=1.0.0|<=2.7.1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-3730. Updating to version 2.7.1-rc1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3730","name":"NVD"},"references":[{"id":"CVE-2025-3730","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3730","name":"NVD"}},{"id":"vuldb-305076","source":{"name":"Vuldb Advisory","url":"https://vuldb.com/?id.305076"}}],"advisories":[{"title":"CVE-2025-3730","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3730"},{"title":"Vuldb Advisory vuldb-305076","url":"https://vuldb.com/?id.305076"}],"cwes":[404],"description":"PyTorch Improper Resource Shutdown or Release vulnerability","detail":"# PyTorch Improper Resource Shutdown or Release vulnerability A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 46fc5d8e360127361211cb237d5f9eef0223e567. It is recommended to apply a patch to fix this issue. ## Related CVE(s) BIT-pytorch-2025-3730, CVE-2025-3730","ratings":[{"method":"CVSSv4","severity":"medium","score":4.8,"vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}],"published":"2025-04-16T21:30:59","updated":"2025-06-17T23:08:42","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 230 locations"}]},{"id":"CVE-2024-31583","bom-ref":"CVE-2024-31583/pkg:pypi/torch@1.11.0","affects":[{"ref":"pkg:pypi/torch@1.11.0","versions":[{"range":"vers:pypi/>=1.0.0|<=2.1.2|<2.2.0|!=2.2.0","status":"affected"},{"version":"2.2.0","status":"unaffected"}]}],"recommendation":"Update to version 2.2.0 to resolve CVE-2024-31583 or update to version 2.7.1-rc1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31583","name":"NVD"},"references":[{"id":"CVE-2024-31583","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31583","name":"NVD"}},{"id":"SNYK-PYTHON-TORCH-6619806","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-PYTHON-TORCH-6619806"}},{"id":"PYSEC-2024-251","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2024-251.yaml"}}],"advisories":[{"title":"CVE-2024-31583","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31583"},{"title":"Snyk Advisory SNYK-PYTHON-TORCH-6619806","url":"https://security.snyk.io/vuln/SNYK-PYTHON-TORCH-6619806"},{"title":"GitHub Advisory PYSEC-2024-251","url":"https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2024-251.yaml"}],"cwes":[416],"description":"Pytorch use-after-free vulnerability","detail":"# Pytorch use-after-free vulnerability Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp. ## Related CVE(s) BIT-pytorch-2024-31583, CVE-2024-31583, PYSEC-2024-251","ratings":[{"method":"CVSSv31","severity":"high","score":7.8,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2024-04-17T21:30:48","updated":"2025-06-11T06:29:21","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 230 locations"}]},{"id":"CVE-2024-31584","bom-ref":"CVE-2024-31584/pkg:pypi/torch@1.11.0","affects":[{"ref":"pkg:pypi/torch@1.11.0","versions":[{"range":"vers:pypi/>=1.0.0|<=2.1.2|<2.2.0|!=2.2.0","status":"affected"},{"version":"2.2.0","status":"unaffected"}]}],"recommendation":"Update to version 2.2.0 to resolve CVE-2024-31584 or update to version 2.7.1-rc1 to resolve additional vulnerabilities for this package.","source":{"name":"Mitre"},"references":[],"advisories":[],"cwes":[],"description":"Summary","detail":"# Summary Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csrc/jit/mobile/flatbuffer_loader.cpp. ## Related CVE(s) BIT-pytorch-2024-31584, CVE-2024-31584","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2024-04-19T21:15:08","updated":"2025-06-04T15:57:11","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 230 locations"}]},{"id":"CVE-2024-48063","bom-ref":"CVE-2024-48063/pkg:pypi/torch@1.11.0","affects":[{"ref":"pkg:pypi/torch@1.11.0","versions":[{"range":"vers:pypi/>=1.0.0|<=2.4.1|<2.5.0|!=2.5.0","status":"affected"},{"version":"2.5.0","status":"unaffected"}]}],"recommendation":"Update to version 2.5.0 to resolve CVE-2024-48063 or update to version 2.7.1-rc1 to resolve additional vulnerabilities for this package.","source":{"name":"Mitre"},"references":[],"advisories":[],"cwes":[],"description":"Summary","detail":"# Summary In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing. ## Related CVE(s) BIT-pytorch-2024-48063, CVE-2024-48063","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-10-29T21:15:04","updated":"2025-07-16T09:57:09","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 230 locations"}]},{"id":"CVE-2024-5452","bom-ref":"CVE-2024-5452/pkg:pypi/lightning@1.8.1","affects":[{"ref":"pkg:pypi/lightning@1.8.1","versions":[{"range":"vers:pypi/>=1.8.0|<=2.3.2|<2.3.3|!=2.3.3","status":"affected"},{"version":"2.3.3","status":"unaffected"}]}],"recommendation":"Update to version 2.3.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5452","name":"NVD"},"references":[{"id":"CVE-2024-5452","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5452","name":"NVD"}},{"id":"486add92-275e-4a7b-92f9-42d84bc759da","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/486add92-275e-4a7b-92f9-42d84bc759da"}}],"advisories":[{"title":"CVE-2024-5452","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5452"},{"title":"Huntr Advisory 486add92-275e-4a7b-92f9-42d84bc759da","url":"https://huntr.com/bounties/486add92-275e-4a7b-92f9-42d84bc759da"}],"cwes":[913,915],"description":"Remote code execution in pytorch lightning","detail":"# Remote code execution in pytorch lightning A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the `deepdiff` library. The library uses `deepdiff.Delta` objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-06-06T18:30:58","updated":"2024-10-16T19:09:25","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 4 locations"}]},{"id":"CVE-2024-5980","bom-ref":"CVE-2024-5980/pkg:pypi/lightning@1.8.1","affects":[{"ref":"pkg:pypi/lightning@1.8.1","versions":[{"range":"vers:pypi/>=1.8.0|<=2.3.2|<2.3.3|!=2.3.3","status":"affected"},{"version":"2.3.3","status":"unaffected"}]}],"recommendation":"Update to version 2.3.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5980","name":"NVD"},"references":[{"id":"55a6ac6f-89c7-42ea-86f3-c6e93a2679f3","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/55a6ac6f-89c7-42ea-86f3-c6e93a2679f3"}},{"id":"CVE-2024-5980","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5980","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 55a6ac6f-89c7-42ea-86f3-c6e93a2679f3","url":"https://huntr.com/bounties/55a6ac6f-89c7-42ea-86f3-c6e93a2679f3"},{"title":"CVE-2024-5980","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5980"}],"cwes":[434],"description":"pytorch-lightning vulnerable to Arbitrary File Write via /v1/runs API endpoint","detail":"# pytorch-lightning vulnerable to Arbitrary File Write via /v1/runs API endpoint A vulnerability in the /v1/runs API endpoint of lightning-ai/pytorch-lightning v2.2.4 allows attackers to exploit path traversal when extracting tar.gz files. When the LightningApp is running with the plugin_server, attackers can deploy malicious tar.gz plugins that embed arbitrary files with path traversal vulnerabilities. This can result in arbitrary files being written to any directory in the victim's local file system, potentially leading to remote code execution.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"}],"published":"2024-06-27T21:32:08","updated":"2024-08-05T15:20:40","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 4 locations"}]},{"id":"CVE-2024-43598","bom-ref":"CVE-2024-43598/pkg:pypi/lightgbm","affects":[{"ref":"pkg:pypi/lightgbm","versions":[{"range":"vers:pypi/>=1.0.0|<4.6.0|!=4.6.0","status":"affected"},{"version":"4.6.0","status":"unaffected"}]}],"recommendation":"Update to version 4.6.0.","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43598"},"references":[{"id":"CVE-2024-43598","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43598"}},{"id":"CVE-2024-43598","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43598","name":"NVD"}},{"id":"PYSEC-2024-231","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/lightgbm/PYSEC-2024-231.yaml"}}],"advisories":[{"title":"Microsoft Advisory CVE-2024-43598","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43598"},{"title":"CVE-2024-43598","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43598"},{"title":"GitHub Advisory PYSEC-2024-231","url":"https://github.com/pypa/advisory-database/tree/main/vulns/lightgbm/PYSEC-2024-231.yaml"}],"cwes":[122],"description":"LightGBM Remote Code Execution Vulnerability","detail":"# LightGBM Remote Code Execution Vulnerability LightGBM Remote Code Execution Vulnerability ## Related CVE(s) CVE-2024-43598, PYSEC-2024-231","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"}],"published":"2024-11-12T18:30:58","updated":"2025-02-18T19:41:59","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-6854","bom-ref":"CVE-2024-6854/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.32.1.1|<=3.46.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-6854. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6854","name":"NVD"},"references":[{"id":"CVE-2024-6854","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6854","name":"NVD"}},{"id":"97d013f9-ac51-4c80-8dd7-8dfde11f33b2","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/97d013f9-ac51-4c80-8dd7-8dfde11f33b2"}}],"advisories":[{"title":"CVE-2024-6854","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6854"},{"title":"Huntr Advisory 97d013f9-ac51-4c80-8dd7-8dfde11f33b2","url":"https://huntr.com/bounties/97d013f9-ac51-4c80-8dd7-8dfde11f33b2"}],"cwes":[36],"description":"H2O Vulnerable to Arbitrary File Overwrite via File Export","detail":"# H2O Vulnerable to Arbitrary File Overwrite via File Export In h2oai/h2o-3 version 3.46.0, the endpoint for exporting models does not restrict the export location, allowing an attacker to export a model to any file in the server's file structure, thereby overwriting it. This vulnerability can be exploited to overwrite any file on the target server with a trained model file, although the content of the overwrite is not controllable by the attacker.","ratings":[{"method":"CVSSv3","severity":"high","score":7.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"published":"2025-03-20T12:32:45","updated":"2025-03-20T20:18:45","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-5979","bom-ref":"CVE-2024-5979/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.10.0.10|<=3.44.0.3","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-5979. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5979","name":"NVD"},"references":[{"id":"CVE-2024-5979","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5979","name":"NVD"}},{"id":"d80a2139-fc03-44b7-b739-de41e323b458","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/d80a2139-fc03-44b7-b739-de41e323b458"}}],"advisories":[{"title":"CVE-2024-5979","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5979"},{"title":"Huntr Advisory d80a2139-fc03-44b7-b739-de41e323b458","url":"https://huntr.com/bounties/d80a2139-fc03-44b7-b739-de41e323b458"}],"cwes":[400],"description":"h2o vulnerable to unexpected POST request shutting down server","detail":"# h2o vulnerable to unexpected POST request shutting down server In h2oai/h2o-3 version 3.46.0, the `run_tool` command in the `rapids` component allows the `main` function of any class under the `water.tools` namespace to be called. One such class, `MojoConvertTool`, crashes the server when invoked with an invalid argument, causing a denial of service.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2024-06-27T21:32:08","updated":"2024-06-28T21:29:29","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-8062","bom-ref":"CVE-2024-8062/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.2.0.1|<=3.46.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-8062. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8062","name":"NVD"},"references":[{"id":"a04190d9-4acb-449a-9a7f-f1bf6be1ed23","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/a04190d9-4acb-449a-9a7f-f1bf6be1ed23"}},{"id":"CVE-2024-8062","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8062","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory a04190d9-4acb-449a-9a7f-f1bf6be1ed23","url":"https://huntr.com/bounties/a04190d9-4acb-449a-9a7f-f1bf6be1ed23"},{"title":"CVE-2024-8062","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8062"}],"cwes":[1088],"description":"H2O Vulnerable to Denial of Service (DoS) via `HEAD` Request","detail":"# H2O Vulnerable to Denial of Service (DoS) via `HEAD` Request A vulnerability in the typeahead endpoint of h2oai/h2o-3 version 3.46.0 allows for a denial of service. The endpoint performs a `HEAD` request to verify the existence of a specified resource without setting a timeout. An attacker can exploit this by sending multiple requests to an attacker-controlled server that hangs, causing the application to block and become unresponsive to other requests.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:47","updated":"2025-03-20T20:39:02","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-7765","bom-ref":"CVE-2024-7765/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.32.1.2|<=3.46.0.2","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-7765. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7765","name":"NVD"},"references":[{"id":"0e58b1a5-bdca-4e60-af92-09de9c76a9ff","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/0e58b1a5-bdca-4e60-af92-09de9c76a9ff"}},{"id":"CVE-2024-7765","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7765","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 0e58b1a5-bdca-4e60-af92-09de9c76a9ff","url":"https://huntr.com/bounties/0e58b1a5-bdca-4e60-af92-09de9c76a9ff"},{"title":"CVE-2024-7765","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7765"}],"cwes":[409],"description":"H2O Vulnerable to Denial of Service (DoS) via Large GZIP Parsing","detail":"# H2O Vulnerable to Denial of Service (DoS) via Large GZIP Parsing In h2oai/h2o-3 version 3.46.0.2, a vulnerability exists where uploading and repeatedly parsing a large GZIP file can cause a denial of service. The server becomes unresponsive due to memory exhaustion and a large number of concurrent slow-running jobs. This issue arises from the improper handling of highly compressed data, leading to significant data amplification.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:46","updated":"2025-03-20T20:18:45","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-10550","bom-ref":"CVE-2024-10550/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.30.0.7|<=3.46.0.1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10550. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10550","name":"NVD"},"references":[{"id":"CVE-2024-10550","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10550","name":"NVD"}},{"id":"ef3f4d89-3b8b-4618-b134-cb93c1664ec6","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/ef3f4d89-3b8b-4618-b134-cb93c1664ec6"}}],"advisories":[{"title":"CVE-2024-10550","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10550"},{"title":"Huntr Advisory ef3f4d89-3b8b-4618-b134-cb93c1664ec6","url":"https://huntr.com/bounties/ef3f4d89-3b8b-4618-b134-cb93c1664ec6"}],"cwes":[1333],"description":"H2O Vulnerable to Denial of Service (DoS) via `/3/ParseSetup` Endpoint","detail":"# H2O Vulnerable to Denial of Service (DoS) via `/3/ParseSetup` Endpoint A vulnerability in the `/3/ParseSetup` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to cause inefficient regular expression complexity, leading to the exhaustion of server resources and making the server unresponsive.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:39","updated":"2025-03-20T19:58:32","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-8616","bom-ref":"CVE-2024-8616/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.10.4.1|<=3.46.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-8616. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8616","name":"NVD"},"references":[{"id":"aebf69a5-b9b1-4d2f-a8ff-902c11a8c97a","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/aebf69a5-b9b1-4d2f-a8ff-902c11a8c97a"}},{"id":"CVE-2024-8616","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8616","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory aebf69a5-b9b1-4d2f-a8ff-902c11a8c97a","url":"https://huntr.com/bounties/aebf69a5-b9b1-4d2f-a8ff-902c11a8c97a"},{"title":"CVE-2024-8616","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8616"}],"cwes":[73],"description":"H2O Vulnerable to Arbitrary File Overwrite","detail":"# H2O Vulnerable to Arbitrary File Overwrite In h2oai/h2o-3 version 3.46.0, the `/99/Models/{name}/json` endpoint allows for arbitrary file overwrite on the target server. The vulnerability arises from the `exportModelDetails` function in `ModelsHandler.java`, where the user-controllable `mexport.dir` parameter is used to specify the file path for writing model details. This can lead to overwriting files at arbitrary locations on the host system.","ratings":[{"method":"CVSSv3","severity":"high","score":8.2,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"published":"2025-03-20T12:32:48","updated":"2025-03-20T20:39:02","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-6569","bom-ref":"CVE-2023-6569/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.10.0.10|<=3.44.0.2","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-6569. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6569","name":"NVD"},"references":[{"id":"a5d003dc-c23e-4c98-8dcf-35ba9252fa3c","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c"}},{"id":"CVE-2023-6569","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6569","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory a5d003dc-c23e-4c98-8dcf-35ba9252fa3c","url":"https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c"},{"title":"CVE-2023-6569","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6569"}],"cwes":[610,73],"description":"External Control of File Name or Path in h2oai/h2o-3","detail":"# External Control of File Name or Path in h2oai/h2o-3 Remote unauthenticated attackers can overwrite arbitrary server files with attacker-controllable data. The data that the attacker can control is not entirely arbitrary. h2o writes a CSV/XLS/etc file to disk, so the attacker data is wrapped in quotations and starts with \"C1\", if they're exporting as CSV.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H"}],"published":"2023-12-14T15:30:22","updated":"2024-02-16T08:21:49","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-10553","bom-ref":"CVE-2024-10553/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.10.0.10|<=3.46.0.5|<3.46.0.6|!=3.46.0.6","status":"affected"},{"version":"3.46.0.6","status":"unaffected"}]}],"recommendation":"Update to version 3.46.0.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10553","name":"NVD"},"references":[{"id":"CVE-2024-10553","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10553","name":"NVD"}},{"id":"e6f550dd-eda2-428c-a740-ed8f893a084b","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/e6f550dd-eda2-428c-a740-ed8f893a084b"}}],"advisories":[{"title":"CVE-2024-10553","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10553"},{"title":"Huntr Advisory e6f550dd-eda2-428c-a740-ed8f893a084b","url":"https://huntr.com/bounties/e6f550dd-eda2-428c-a740-ed8f893a084b"}],"cwes":[502],"description":"H2O Deserialization of Untrusted Data Vulnerability","detail":"# H2O Deserialization of Untrusted Data Vulnerability A vulnerability in the h2oai/h2o-3 REST API versions 3.46.0.4 allows unauthenticated remote attackers to execute arbitrary code via deserialization of untrusted data. The vulnerability exists in the endpoints POST /99/ImportSQLTable and POST /3/SaveToHiveTable, where user-controlled JDBC URLs are passed to DriverManager.getConnection, leading to deserialization if a MySQL or PostgreSQL driver is available in the classpath. This issue is fixed in version 3.46.0.6.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2025-03-20T12:32:39","updated":"2025-03-20T20:00:53","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-6863","bom-ref":"CVE-2024-6863/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.32.1.2|<=3.46.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-6863. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6863","name":"NVD"},"references":[{"id":"10f55937-0cba-4530-897f-2abf30ed5270","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/10f55937-0cba-4530-897f-2abf30ed5270"}},{"id":"CVE-2024-6863","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6863","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 10f55937-0cba-4530-897f-2abf30ed5270","url":"https://huntr.com/bounties/10f55937-0cba-4530-897f-2abf30ed5270"},{"title":"CVE-2024-6863","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6863"}],"cwes":[749],"description":"H2O Vulnerable to Execution of Arbitrary Files","detail":"# H2O Vulnerable to Execution of Arbitrary Files In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vulnerability makes it possible for an attacker to encrypt arbitrary files with keys of their choice, making it exceedingly difficult for the target to recover the keys needed for decryption.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"published":"2025-03-20T12:32:45","updated":"2025-03-20T19:58:32","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-7768","bom-ref":"CVE-2024-7768/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.10.0.10|<=3.46.0.6","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-7768. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7768","name":"NVD"},"references":[{"id":"CVE-2024-7768","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7768","name":"NVD"}},{"id":"3fe640df-bef4-4072-8890-0d12bc2818f6","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/3fe640df-bef4-4072-8890-0d12bc2818f6"}}],"advisories":[{"title":"CVE-2024-7768","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7768"},{"title":"Huntr Advisory 3fe640df-bef4-4072-8890-0d12bc2818f6","url":"https://huntr.com/bounties/3fe640df-bef4-4072-8890-0d12bc2818f6"}],"cwes":[400],"description":"H2O Vulnerable to Denial of Service (DoS) via `/3/ImportFiles` Endpoint","detail":"# H2O Vulnerable to Denial of Service (DoS) via `/3/ImportFiles` Endpoint A vulnerability in the `/3/ImportFiles` endpoint of h2oai/h2o-3 version 3.46.1 allows an attacker to cause a denial of service. The endpoint takes a single GET parameter, `path`, which can be recursively set to reference itself. This leads the server to repeatedly call its own endpoint, eventually filling up the request queue and leaving the server unable to handle other requests.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:46","updated":"2025-03-20T20:39:02","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-10572","bom-ref":"CVE-2024-10572/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.34.0.1|<=3.46.0.1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10572. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10572","name":"NVD"},"references":[{"id":"db8939a0-9be8-4d0f-a8b0-1bd181666da2","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/db8939a0-9be8-4d0f-a8b0-1bd181666da2"}},{"id":"CVE-2024-10572","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10572","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory db8939a0-9be8-4d0f-a8b0-1bd181666da2","url":"https://huntr.com/bounties/db8939a0-9be8-4d0f-a8b0-1bd181666da2"},{"title":"CVE-2024-10572","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10572"}],"cwes":[400],"description":"H2O Vulnerable to Denial of Service (DoS) and File Write","detail":"# H2O Vulnerable to Denial of Service (DoS) and File Write In h2oai/h2o-3 version 3.46.0.1, the `run_tool` command exposes classes in the `water.tools` package through the `ast` parser. This includes the `XGBoostLibExtractTool` class, which can be exploited to shut down the server and write large files to arbitrary directories, leading to a denial of service.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:39","updated":"2025-03-20T19:58:32","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-10549","bom-ref":"CVE-2024-10549/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.30.0.7|<=3.46.0.1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10549. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10549","name":"NVD"},"references":[{"id":"CVE-2024-10549","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10549","name":"NVD"}},{"id":"ce7bd2d6-fd38-440d-a91a-dd8f3fc06bc2","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/ce7bd2d6-fd38-440d-a91a-dd8f3fc06bc2"}}],"advisories":[{"title":"CVE-2024-10549","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10549"},{"title":"Huntr Advisory ce7bd2d6-fd38-440d-a91a-dd8f3fc06bc2","url":"https://huntr.com/bounties/ce7bd2d6-fd38-440d-a91a-dd8f3fc06bc2"}],"cwes":[400],"description":"H2O Vulnerable to Denial of Service (DoS) via `/3/Parse` Endpoint","detail":"# H2O Vulnerable to Denial of Service (DoS) via `/3/Parse` Endpoint A vulnerability in the `/3/Parse` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint uses a user-specified string to construct a regular expression, which is then applied to another user-specified string. By sending multiple simultaneous requests, an attacker can exhaust all available threads, leading to a complete denial of service.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:39","updated":"2025-03-20T19:58:32","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-5550","bom-ref":"CVE-2024-5550/pkg:pypi/h2o","affects":[{"ref":"pkg:pypi/h2o","versions":[{"range":"vers:pypi/>=3.10.0.10|<=3.40.0.4","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-5550. Updating to version 3.46.0.6 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5550","name":"NVD"},"references":[{"id":"e76372c2-39be-4984-a7c8-7048a75a25dc","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/e76372c2-39be-4984-a7c8-7048a75a25dc"}},{"id":"CVE-2024-5550","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5550","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory e76372c2-39be-4984-a7c8-7048a75a25dc","url":"https://huntr.com/bounties/e76372c2-39be-4984-a7c8-7048a75a25dc"},{"title":"CVE-2024-5550","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5550"}],"cwes":[200],"description":"Arbitrary system path lookup in h20","detail":"# Arbitrary system path lookup in h20 In h2oai/h2o-3 version 3.40.0.4, an exposure of sensitive information vulnerability exists due to an arbitrary system path lookup feature. This vulnerability allows any remote user to view full paths in the entire file system where h2o-3 is hosted. Specifically, the issue resides in the Typeahead API call, which when requested with a typeahead lookup of '/', exposes the root filesystem including directories such as /home, /usr, /bin, among others. This vulnerability could allow attackers to explore the entire filesystem, and when combined with a Local File Inclusion (LFI) vulnerability, could make exploitation of the server trivial.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2024-06-06T21:30:37","updated":"2024-06-06T23:27:23","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-5187","bom-ref":"CVE-2024-5187/pkg:pypi/onnx@1.11.0","affects":[{"ref":"pkg:pypi/onnx@1.11.0","versions":[{"range":"vers:pypi/>=0.1|<=1.16.1|<1.16.2|!=1.16.2","status":"affected"},{"version":"1.16.2","status":"unaffected"}]}],"recommendation":"Update to version 1.16.2 to resolve CVE-2024-5187 or update to version 1.17.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5187","name":"NVD"},"references":[{"id":"CVE-2024-5187","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5187","name":"NVD"}},{"id":"50235ebd-3410-4ada-b064-1a648e11237e","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/50235ebd-3410-4ada-b064-1a648e11237e"}}],"advisories":[{"title":"CVE-2024-5187","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5187"},{"title":"Huntr Advisory 50235ebd-3410-4ada-b064-1a648e11237e","url":"https://huntr.com/bounties/50235ebd-3410-4ada-b064-1a648e11237e"}],"cwes":[22],"description":"onnx allows Arbitrary File Overwrite in download_model_with_test_data","detail":"# onnx allows Arbitrary File Overwrite in download_model_with_test_data A vulnerability in the `download_model_with_test_data` function of the onnx/onnx framework, versions before 1.16.2, allow for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability enables attackers to overwrite any file on the system, potentially leading to remote code execution, deletion of system, personal, or application files, thus impacting the integrity and availability of the system. The issue arises from the function's handling of tar file extraction without performing security checks on the paths within the tar file, as demonstrated by the ability to overwrite the `/home/kali/.ssh/authorized_keys` file by specifying an absolute path in the malicious tar file.","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2024-06-06T21:30:37","updated":"2025-01-27T23:23:24","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-25882","bom-ref":"CVE-2022-25882/pkg:pypi/onnx@1.11.0","affects":[{"ref":"pkg:pypi/onnx@1.11.0","versions":[{"range":"vers:pypi/>=0.1|<=1.12.0|<1.13.0|!=1.13.0","status":"affected"},{"version":"1.13.0","status":"unaffected"}]}],"recommendation":"Update to version 1.13.0 to resolve CVE-2022-25882 or update to version 1.17.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25882","name":"NVD"},"references":[{"id":"CVE-2022-25882","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25882","name":"NVD"}},{"id":"SNYK-PYTHON-ONNX-2395479","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479"}},{"id":"PYSEC-2023-38","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/onnx/PYSEC-2023-38.yaml"}}],"advisories":[{"title":"CVE-2022-25882","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25882"},{"title":"Snyk Advisory SNYK-PYTHON-ONNX-2395479","url":"https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479"},{"title":"GitHub Advisory PYSEC-2023-38","url":"https://github.com/pypa/advisory-database/tree/main/vulns/onnx/PYSEC-2023-38.yaml"}],"cwes":[22],"description":"Directory Traversal in onnx","detail":"# Directory Traversal in onnx Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example \"../../../etc/passwd\" ## Related CVE(s) CVE-2022-25882, PYSEC-2023-38","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2023-01-26T21:30:25","updated":"2025-04-01T21:59:48","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-7776","bom-ref":"CVE-2024-7776/pkg:pypi/onnx@1.11.0","affects":[{"ref":"pkg:pypi/onnx@1.11.0","versions":[{"range":"vers:pypi/>=0.1|<=1.16.2|<1.17.0|!=1.17.0","status":"affected"},{"version":"1.17.0","status":"unaffected"}]}],"recommendation":"Update to version 1.17.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7776","name":"NVD"},"references":[{"id":"a7a46cf6-1fa0-454b-988c-62d222e83f63","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/a7a46cf6-1fa0-454b-988c-62d222e83f63"}},{"id":"PYSEC-2025-10","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/onnx/PYSEC-2025-10.yaml"}},{"id":"CVE-2024-7776","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7776","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory a7a46cf6-1fa0-454b-988c-62d222e83f63","url":"https://huntr.com/bounties/a7a46cf6-1fa0-454b-988c-62d222e83f63"},{"title":"GitHub Advisory PYSEC-2025-10","url":"https://github.com/pypa/advisory-database/tree/main/vulns/onnx/PYSEC-2025-10.yaml"},{"title":"CVE-2024-7776","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7776"}],"cwes":[22],"description":"Open Neural Network Exchange (ONNX) Path Traversal Vulnerability","detail":"# Open Neural Network Exchange (ONNX) Path Traversal Vulnerability A vulnerability in the `download_model` function of the onnx/onnx framework, before and including version 1.16.1, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability can be exploited by an attacker to overwrite files in the user's directory, potentially leading to remote command execution. ## Related CVE(s) CVE-2024-7776, PYSEC-2025-10","ratings":[{"method":"CVSSv3","severity":"high","score":8.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"published":"2025-03-20T12:32:46","updated":"2025-03-27T17:52:58","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-27319","bom-ref":"CVE-2024-27319/pkg:pypi/onnx@1.11.0","affects":[{"ref":"pkg:pypi/onnx@1.11.0","versions":[{"range":"vers:pypi/>=0.1|<=1.15.0|<1.16.0|!=1.16.0","status":"affected"},{"version":"1.16.0","status":"unaffected"}]}],"recommendation":"Update to version 1.16.0 to resolve CVE-2024-27319 or update to version 1.17.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27319","name":"NVD"},"references":[{"id":"fedoraproject-msg-TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL"}},{"id":"CVE-2024-27319","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27319","name":"NVD"}},{"id":"fedoraproject-msg-FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY"}},{"id":"PYSEC-2024-223","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/onnx/PYSEC-2024-223.yaml"}}],"advisories":[{"title":"CVE-2024-27319","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27319"},{"title":"GitHub Advisory PYSEC-2024-223","url":"https://github.com/pypa/advisory-database/tree/main/vulns/onnx/PYSEC-2024-223.yaml"}],"cwes":[125],"description":"Onnx Out-of-bounds Read vulnerability","detail":"# Onnx Out-of-bounds Read vulnerability Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy. ## Related CVE(s) CVE-2024-27319, PYSEC-2024-223","ratings":[{"method":"CVSSv31","severity":"medium","score":4.4,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"published":"2024-02-23T18:30:59","updated":"2025-02-13T19:36:50","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-27318","bom-ref":"CVE-2024-27318/pkg:pypi/onnx@1.11.0","affects":[{"ref":"pkg:pypi/onnx@1.11.0","versions":[{"range":"vers:pypi/>=0.1|<=1.15.0|<1.16.0|!=1.16.0","status":"affected"},{"version":"1.16.0","status":"unaffected"}]}],"recommendation":"Update to version 1.16.0 to resolve CVE-2024-27318 or update to version 1.17.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27318","name":"NVD"},"references":[{"id":"PYSEC-2024-222","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/onnx/PYSEC-2024-222.yaml"}},{"id":"fedoraproject-msg-TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL"}},{"id":"SNYK-PYTHON-ONNX-2395479","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479"}},{"id":"fedoraproject-msg-FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY"}},{"id":"CVE-2024-27318","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27318","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-222","url":"https://github.com/pypa/advisory-database/tree/main/vulns/onnx/PYSEC-2024-222.yaml"},{"title":"Snyk Advisory SNYK-PYTHON-ONNX-2395479","url":"https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479"},{"title":"CVE-2024-27318","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27318"}],"cwes":[22],"description":"Onnx Directory Traversal vulnerability","detail":"# Onnx Directory Traversal vulnerability Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882. ## Related CVE(s) CVE-2024-27318, PYSEC-2024-222","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-02-23T18:30:59","updated":"2025-02-13T19:37:07","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52313","bom-ref":"CVE-2023-52313/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52313","name":"NVD"},"references":[{"id":"pdsa-2023-022","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-022.md"}},{"id":"PYSEC-2024-145","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-145.yaml"}},{"id":"CVE-2023-52313","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52313","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-022","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-022.md"},{"title":"GitHub Advisory PYSEC-2024-145","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-145.yaml"},{"title":"CVE-2023-52313","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52313"}],"cwes":[369],"description":"PaddlePaddle floating point exception in paddle.argmin and paddle.argmax","detail":"# PaddlePaddle floating point exception in paddle.argmin and paddle.argmax FPE in paddle.argmin and paddle.argmax\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-52313, PYSEC-2024-145","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:33:57","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-46741","bom-ref":"CVE-2022-46741/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.4.0rc0|<2.4|!=2.4","status":"affected"},{"version":"2.4","status":"unaffected"}]}],"recommendation":"Update to version 2.4 to resolve CVE-2022-46741 or update to version 2.6.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46741","name":"NVD"},"references":[{"id":"pdsa-2022-001","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-001.md"}},{"id":"CVE-2022-46741","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46741","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory pdsa-2022-001","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-001.md"},{"title":"CVE-2022-46741","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46741"}],"cwes":[125],"description":"PaddlePaddle Out-of-bounds Read vulnerability","detail":"# PaddlePaddle Out-of-bounds Read vulnerability Out-of-bounds read in `gather_tree` in PaddlePaddle before 2.4. A [patch](https://github.com/PaddlePaddle/Paddle/commit/6712e262fc6734873cc6d5ca4f45973339a88697) is available in the `release/2.4` branch.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"published":"2022-12-07T09:30:23","updated":"2023-11-08T04:10:57","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-0818","bom-ref":"CVE-2024-0818/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.6.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-0818. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0818","name":"NVD"},"references":[{"id":"85b06a1b-ac0b-4096-a06d-330891570cd9","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/85b06a1b-ac0b-4096-a06d-330891570cd9"}},{"id":"CVE-2024-0818","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0818","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 85b06a1b-ac0b-4096-a06d-330891570cd9","url":"https://huntr.com/bounties/85b06a1b-ac0b-4096-a06d-330891570cd9"},{"title":"CVE-2024-0818","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0818"}],"cwes":[22],"description":"PaddlePaddle Path Traversal vulnerability","detail":"# PaddlePaddle Path Traversal vulnerability Arbitrary File Overwrite Via Path Traversal in paddlepaddle/paddle before 2.6","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"}],"published":"2024-03-07T15:30:38","updated":"2025-01-23T23:37:55","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52303","bom-ref":"CVE-2023-52303/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52303","name":"NVD"},"references":[{"id":"pdsa-2023-012","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-012.md"}},{"id":"PYSEC-2024-135","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-135.yaml"}},{"id":"CVE-2023-52303","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52303","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-012","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-012.md"},{"title":"GitHub Advisory PYSEC-2024-135","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-135.yaml"},{"title":"CVE-2023-52303","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52303"}],"cwes":[476],"description":"PaddlePaddle segfault in paddle.put_along_axis","detail":"# PaddlePaddle segfault in paddle.put_along_axis Nullptr in paddle.put_along_axis\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-52303, PYSEC-2024-135","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:32","updated":"2024-11-22T18:23:55","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52314","bom-ref":"CVE-2023-52314/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52314","name":"NVD"},"references":[{"id":"CVE-2023-52314","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52314","name":"NVD"}},{"id":"pdsa-2023-023","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-023.md"}},{"id":"PYSEC-2024-146","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-146.yaml"}}],"advisories":[{"title":"CVE-2023-52314","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52314"},{"title":"GitHub Advisory pdsa-2023-023","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-023.md"},{"title":"GitHub Advisory PYSEC-2024-146","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-146.yaml"}],"cwes":[78],"description":"PaddlePaddle command injection in convert_shape_compare","detail":"# PaddlePaddle command injection in convert_shape_compare PaddlePaddle before 2.6.0 has a command injection in convert_shape_compare. This resulted in the ability to execute arbitrary commands on the operating system. ## Related CVE(s) CVE-2023-52314, PYSEC-2024-146","ratings":[{"method":"CVSSv31","severity":"critical","score":9.6,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:33:13","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52304","bom-ref":"CVE-2023-52304/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52304","name":"NVD"},"references":[{"id":"PYSEC-2024-136","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-136.yaml"}},{"id":"CVE-2023-52304","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52304","name":"NVD"}},{"id":"pdsa-2023-013","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-013.md"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-136","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-136.yaml"},{"title":"CVE-2023-52304","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52304"},{"title":"GitHub Advisory pdsa-2023-013","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-013.md"}],"cwes":[120,787],"description":"PaddlePaddle stack overflow in paddle.searchsorted","detail":"# PaddlePaddle stack overflow in paddle.searchsorted Stack overflow in paddle.searchsorted\u00a0in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage. ## Related CVE(s) CVE-2023-52304, PYSEC-2024-136","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:26:35","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52302","bom-ref":"CVE-2023-52302/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52302","name":"NVD"},"references":[{"id":"CVE-2023-52302","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52302","name":"NVD"}},{"id":"pdsa-2023-011","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-011.md"}},{"id":"PYSEC-2024-134","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-134.yaml"}}],"advisories":[{"title":"CVE-2023-52302","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52302"},{"title":"GitHub Advisory pdsa-2023-011","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-011.md"},{"title":"GitHub Advisory PYSEC-2024-134","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-134.yaml"}],"cwes":[476],"description":"PaddlePaddle null pointer dereference in paddle.nextafter","detail":"# PaddlePaddle null pointer dereference in paddle.nextafter Nullptr in paddle.nextafter\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-52302, PYSEC-2024-134","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:32","updated":"2024-12-03T06:08:21","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-45908","bom-ref":"CVE-2022-45908/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.4.0rc0|<2.4|!=2.4","status":"affected"},{"version":"2.4","status":"unaffected"}]}],"recommendation":"Update to version 2.4 to resolve CVE-2022-45908 or update to version 2.6.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45908","name":"NVD"},"references":[{"id":"CVE-2022-45908","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45908","name":"NVD"}},{"id":"pdsa-2022-002","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-002.md"}}],"advisories":[{"title":"CVE-2022-45908","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45908"},{"title":"GitHub Advisory pdsa-2022-002","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-002.md"}],"cwes":[94],"description":"PaddlePaddle vulnerable to code injection via winstr","detail":"# PaddlePaddle vulnerable to code injection via winstr In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-11-26T03:30:27","updated":"2023-11-08T04:10:54","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52309","bom-ref":"CVE-2023-52309/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52309","name":"NVD"},"references":[{"id":"pdsa-2023-018","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-018.md"}},{"id":"PYSEC-2024-141","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-141.yaml"}},{"id":"CVE-2023-52309","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52309","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-018","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-018.md"},{"title":"GitHub Advisory PYSEC-2024-141","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-141.yaml"},{"title":"CVE-2023-52309","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52309"}],"cwes":[120,787],"description":"PaddlePaddle heap buffer overflow in paddle.repeat_interleave","detail":"# PaddlePaddle heap buffer overflow in paddle.repeat_interleave Heap buffer overflow in paddle.repeat_interleave\u00a0in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible. ## Related CVE(s) CVE-2023-52309, PYSEC-2024-141","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:24:14","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38669","bom-ref":"CVE-2023-38669/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/1.8.5","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-38669. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38669","name":"NVD"},"references":[{"id":"PYSEC-2023-122","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-122.yaml"}},{"id":"pdsa-2023-001","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md"}},{"id":"CVE-2023-38669","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38669","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2023-122","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-122.yaml"},{"title":"GitHub Advisory pdsa-2023-001","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md"},{"title":"CVE-2023-38669","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38669"}],"cwes":[416],"description":"Use after free in PaddlePaddle","detail":"# Use after free in PaddlePaddle Use after free in paddle.diagonal in PaddlePaddle before 2.5.0. This resulted in a potentially exploitable condition. ## Related CVE(s) CVE-2023-38669, PYSEC-2023-122","ratings":[{"method":"CVSSv31","severity":"high","score":8.3,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"published":"2023-07-26T12:30:28","updated":"2025-02-13T05:13:20","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38673","bom-ref":"CVE-2023-38673/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/1.8.5","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-38673. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38673","name":"NVD"},"references":[{"id":"pdsa-2023-005","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md"}},{"id":"CVE-2023-38673","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38673","name":"NVD"}},{"id":"PYSEC-2023-126","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-126.yaml"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-005","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md"},{"title":"CVE-2023-38673","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38673"},{"title":"GitHub Advisory PYSEC-2023-126","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-126.yaml"}],"cwes":[78],"description":"Command injection in PaddlePaddle","detail":"# Command injection in PaddlePaddle PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in\u00a0the ability to execute arbitrary commands on the operating system. ## Related CVE(s) CVE-2023-38673, PYSEC-2023-126","ratings":[{"method":"CVSSv31","severity":"critical","score":9.6,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"published":"2023-07-26T12:30:28","updated":"2025-02-13T05:14:58","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38677","bom-ref":"CVE-2023-38677/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38677","name":"NVD"},"references":[{"id":"CVE-2023-38677","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38677","name":"NVD"}},{"id":"pdsa-2023-009","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md"}},{"id":"PYSEC-2024-132","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-132.yaml"}}],"advisories":[{"title":"CVE-2023-38677","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38677"},{"title":"GitHub Advisory pdsa-2023-009","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md"},{"title":"GitHub Advisory PYSEC-2024-132","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-132.yaml"}],"cwes":[369],"description":"PaddlePaddle floating point exception in paddle.linalg.eig","detail":"# PaddlePaddle floating point exception in paddle.linalg.eig FPE in paddle.linalg.eig in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-38677, PYSEC-2024-132","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:32","updated":"2024-11-22T18:26:44","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-0521","bom-ref":"CVE-2024-0521/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0521","name":"NVD"},"references":[{"id":"a569c64b-1e2b-4bed-a19f-47fd5a3da453","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/a569c64b-1e2b-4bed-a19f-47fd5a3da453"}},{"id":"CVE-2024-0521","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0521","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory a569c64b-1e2b-4bed-a19f-47fd5a3da453","url":"https://huntr.com/bounties/a569c64b-1e2b-4bed-a19f-47fd5a3da453"},{"title":"CVE-2024-0521","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0521"}],"cwes":[94],"description":"Code Injection in paddlepaddle","detail":"# Code Injection in paddlepaddle The vulnerability arises from the way the url parameter is incorporated into the command string without proper validation or sanitization. If the url is constructed from untrusted sources, an attacker could potentially inject malicious commands.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.3,"vector":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"published":"2024-01-20T21:30:25","updated":"2024-02-16T08:23:56","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38672","bom-ref":"CVE-2023-38672/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/1.8.5","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-38672. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38672","name":"NVD"},"references":[{"id":"CVE-2023-38672","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38672","name":"NVD"}},{"id":"pdsa-2023-004","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md"}},{"id":"PYSEC-2023-125","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-125.yaml"}}],"advisories":[{"title":"CVE-2023-38672","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38672"},{"title":"GitHub Advisory pdsa-2023-004","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md"},{"title":"GitHub Advisory PYSEC-2023-125","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-125.yaml"}],"cwes":[369],"description":"Float point exception (FPE) in paddlepaddle","detail":"# Float point exception (FPE) in paddlepaddle FPE in paddle.linalg.matrix_power in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-38672, PYSEC-2023-125","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2023-07-26T12:30:28","updated":"2025-02-13T05:14:24","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-0817","bom-ref":"CVE-2024-0817/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.6.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-0817. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0817","name":"NVD"},"references":[{"id":"44d5cbd9-a046-417b-a8d4-bea6fda9cbe3","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/44d5cbd9-a046-417b-a8d4-bea6fda9cbe3"}},{"id":"CVE-2024-0817","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0817","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 44d5cbd9-a046-417b-a8d4-bea6fda9cbe3","url":"https://huntr.com/bounties/44d5cbd9-a046-417b-a8d4-bea6fda9cbe3"},{"title":"CVE-2024-0817","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0817"}],"cwes":[77],"description":"PaddlePaddle command injection vulnerability","detail":"# PaddlePaddle command injection vulnerability Command injection in IrGraph.draw in paddlepaddle/paddle 2.6.0","ratings":[{"method":"CVSSv31","severity":"high","score":7.8,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-03-07T03:30:41","updated":"2025-01-21T18:27:01","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52307","bom-ref":"CVE-2023-52307/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52307","name":"NVD"},"references":[{"id":"CVE-2023-52307","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52307","name":"NVD"}},{"id":"pdsa-2023-016","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-016.md"}},{"id":"PYSEC-2024-139","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-139.yaml"}}],"advisories":[{"title":"CVE-2023-52307","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52307"},{"title":"GitHub Advisory pdsa-2023-016","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-016.md"},{"title":"GitHub Advisory PYSEC-2024-139","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-139.yaml"}],"cwes":[120,787],"description":"PaddlePaddle stack overflow in paddle.linalg.lu_unpack","detail":"# PaddlePaddle stack overflow in paddle.linalg.lu_unpack Stack overflow in paddle.linalg.lu_unpack\u00a0in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage. ## Related CVE(s) CVE-2023-52307, PYSEC-2024-139","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:39:46","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-46742","bom-ref":"CVE-2022-46742/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/1.8.5","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2022-46742. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46742","name":"NVD"},"references":[{"id":"pdsa-2022-002","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-002.md"}},{"id":"CVE-2022-46742","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46742","name":"NVD"}},{"id":"PYSEC-2022-43063","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2022-43063.yaml"}}],"advisories":[{"title":"GitHub Advisory pdsa-2022-002","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-002.md"},{"title":"CVE-2022-46742","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46742"},{"title":"GitHub Advisory PYSEC-2022-43063","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2022-43063.yaml"}],"cwes":[94],"description":"PaddlePaddle vulnerable to Code Injection","detail":"# PaddlePaddle vulnerable to Code Injection Code injection in `paddle.audio.functional.get_window` in PaddlePaddle 2.4.0-rc0 allows arbitrary code execution. A [patch](https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb) is available on the `develop` branch of the repository and anticipated to be part of a 2.4 release. ## Related CVE(s) CVE-2022-46742, PYSEC-2022-43063","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-12-07T09:30:23","updated":"2024-11-22T18:34:03","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38671","bom-ref":"CVE-2023-38671/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/1.8.5","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-38671. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38671","name":"NVD"},"references":[{"id":"CVE-2023-38671","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38671","name":"NVD"}},{"id":"PYSEC-2023-124","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-124.yaml"}},{"id":"pdsa-2023-003","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md"}}],"advisories":[{"title":"CVE-2023-38671","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38671"},{"title":"GitHub Advisory PYSEC-2023-124","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-124.yaml"},{"title":"GitHub Advisory pdsa-2023-003","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md"}],"cwes":[120,787],"description":"Heap buffer overflow in PaddlePaddle","detail":"# Heap buffer overflow in PaddlePaddle Heap buffer overflow in paddle.trace in PaddlePaddle before 2.5.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible. ## Related CVE(s) CVE-2023-38671, PYSEC-2023-124","ratings":[{"method":"CVSSv31","severity":"high","score":8.3,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"published":"2023-07-26T12:30:28","updated":"2025-02-13T05:14:42","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52310","bom-ref":"CVE-2023-52310/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52310","name":"NVD"},"references":[{"id":"pdsa-2023-019","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-019.md"}},{"id":"CVE-2023-52310","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52310","name":"NVD"}},{"id":"PYSEC-2024-142","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-142.yaml"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-019","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-019.md"},{"title":"CVE-2023-52310","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52310"},{"title":"GitHub Advisory PYSEC-2024-142","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-142.yaml"}],"cwes":[78],"description":"PaddlePaddle command injection in get_online_pass_interval","detail":"# PaddlePaddle command injection in get_online_pass_interval PaddlePaddle before 2.6.0 has a command injection in get_online_pass_interval. This resulted in the ability to execute arbitrary commands on the operating system. ## Related CVE(s) CVE-2023-52310, PYSEC-2024-142","ratings":[{"method":"CVSSv31","severity":"critical","score":9.6,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:32:51","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38675","bom-ref":"CVE-2023-38675/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38675","name":"NVD"},"references":[{"id":"PYSEC-2024-130","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-130.yaml"}},{"id":"CVE-2023-38675","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38675","name":"NVD"}},{"id":"pdsa-2023-007","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-007.md"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-130","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-130.yaml"},{"title":"CVE-2023-38675","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38675"},{"title":"GitHub Advisory pdsa-2023-007","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-007.md"}],"cwes":[369],"description":"PaddlePaddle floating point exception in paddle.linalg.matrix_rank","detail":"# PaddlePaddle floating point exception in paddle.linalg.matrix_rank FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-38675, PYSEC-2024-130","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:32","updated":"2024-11-22T18:26:53","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-1603","bom-ref":"CVE-2024-1603/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.6.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-1603. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1603","name":"NVD"},"references":[{"id":"CVE-2024-1603","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1603","name":"NVD"}},{"id":"7739eced-73a3-4a96-afcd-9c753c55929e","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e"}}],"advisories":[{"title":"CVE-2024-1603","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1603"},{"title":"Huntr Advisory 7739eced-73a3-4a96-afcd-9c753c55929e","url":"https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e"}],"cwes":[73],"description":"PaddlePaddle allows arbitrary file read via paddle.vision.ops.read_file","detail":"# PaddlePaddle allows arbitrary file read via paddle.vision.ops.read_file paddlepaddle/paddle 2.6.0 allows arbitrary file read via paddle.vision.ops.read_file.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-03-23T21:30:39","updated":"2025-01-24T20:23:39","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38678","bom-ref":"CVE-2023-38678/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38678","name":"NVD"},"references":[{"id":"pdsa-2023-010","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md"}},{"id":"CVE-2023-38678","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38678","name":"NVD"}},{"id":"PYSEC-2024-133","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-133.yaml"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-010","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md"},{"title":"CVE-2023-38678","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38678"},{"title":"GitHub Advisory PYSEC-2024-133","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-133.yaml"}],"cwes":[125],"description":"PaddlePaddle segfault in paddle.mode","detail":"# PaddlePaddle segfault in paddle.mode OOB access in paddle.mode\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-38678, PYSEC-2024-133","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:32","updated":"2024-11-22T18:22:17","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-0917","bom-ref":"CVE-2024-0917/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.6.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-0917. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0917","name":"NVD"},"references":[{"id":"CVE-2024-0917","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0917","name":"NVD"}},{"id":"2d840735-e255-4700-9709-6f7361829119","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119"}}],"advisories":[{"title":"CVE-2024-0917","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0917"},{"title":"Huntr Advisory 2d840735-e255-4700-9709-6f7361829119","url":"https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119"}],"cwes":[94],"description":"PaddlePaddle vulnerable to remote code execution","detail":"# PaddlePaddle vulnerable to remote code execution remote code execution in paddlepaddle/paddle 2.6.0","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-03-07T09:30:33","updated":"2025-01-21T18:36:21","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52312","bom-ref":"CVE-2023-52312/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52312","name":"NVD"},"references":[{"id":"pdsa-2023-021","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-021.md"}},{"id":"PYSEC-2024-144","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-144.yaml"}},{"id":"CVE-2023-52312","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52312","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-021","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-021.md"},{"title":"GitHub Advisory PYSEC-2024-144","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-144.yaml"},{"title":"CVE-2023-52312","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52312"}],"cwes":[476],"description":"PaddlePaddle nullptr dereference in paddle.crop","detail":"# PaddlePaddle nullptr dereference in paddle.crop Nullptr dereference in paddle.crop\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-52312, PYSEC-2024-144","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T21:07:56","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-0815","bom-ref":"CVE-2024-0815/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.6.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-0815. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0815","name":"NVD"},"references":[{"id":"CVE-2024-0815","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0815","name":"NVD"}},{"id":"83bf8191-b259-4b24-8ec9-0115d7c05350","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/83bf8191-b259-4b24-8ec9-0115d7c05350"}}],"advisories":[{"title":"CVE-2024-0815","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0815"},{"title":"Huntr Advisory 83bf8191-b259-4b24-8ec9-0115d7c05350","url":"https://huntr.com/bounties/83bf8191-b259-4b24-8ec9-0115d7c05350"}],"cwes":[78],"description":"PaddlePaddle command injection in paddle.utils.download._wget_download ","detail":"# PaddlePaddle command injection in paddle.utils.download._wget_download Command injection in paddle.utils.download._wget_download (bypass filter) in paddlepaddle/paddle 2.6.0","ratings":[{"method":"CVSSv31","severity":"high","score":8.8,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"published":"2024-03-07T06:30:30","updated":"2025-01-21T18:26:17","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52311","bom-ref":"CVE-2023-52311/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52311","name":"NVD"},"references":[{"id":"PYSEC-2024-143","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-143.yaml"}},{"id":"CVE-2023-52311","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52311","name":"NVD"}},{"id":"pdsa-2023-020","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-020.md"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-143","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-143.yaml"},{"title":"CVE-2023-52311","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52311"},{"title":"GitHub Advisory pdsa-2023-020","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-020.md"}],"cwes":[78],"description":"PaddlePaddle command injection in _wget_download","detail":"# PaddlePaddle command injection in _wget_download PaddlePaddle before 2.6.0 has a command injection in _wget_download. This resulted in the ability to execute arbitrary commands on the operating system. ## Related CVE(s) CVE-2023-52311, PYSEC-2024-143","ratings":[{"method":"CVSSv31","severity":"critical","score":9.6,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:33:34","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52306","bom-ref":"CVE-2023-52306/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52306","name":"NVD"},"references":[{"id":"pdsa-2023-015","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-015.md"}},{"id":"CVE-2023-52306","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52306","name":"NVD"}},{"id":"PYSEC-2024-138","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-138.yaml"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-015","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-015.md"},{"title":"CVE-2023-52306","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52306"},{"title":"GitHub Advisory PYSEC-2024-138","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-138.yaml"}],"cwes":[369],"description":"PaddlePaddle floating point exception in paddle.lerp","detail":"# PaddlePaddle floating point exception in paddle.lerp FPE in paddle.lerp\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-52306, PYSEC-2024-138","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:28:30","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38670","bom-ref":"CVE-2023-38670/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/1.8.5","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-38670. Updating to version 2.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38670","name":"NVD"},"references":[{"id":"pdsa-2023-002","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md"}},{"id":"CVE-2023-38670","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38670","name":"NVD"}},{"id":"PYSEC-2023-123","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-123.yaml"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-002","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md"},{"title":"CVE-2023-38670","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38670"},{"title":"GitHub Advisory PYSEC-2023-123","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-123.yaml"}],"cwes":[476],"description":"Null pointer dereference in PaddlePaddle","detail":"# Null pointer dereference in PaddlePaddle Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a runtime crash and denial of service. ## Related CVE(s) CVE-2023-38670, PYSEC-2023-123","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"published":"2023-07-26T12:30:28","updated":"2025-02-13T05:30:56","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52305","bom-ref":"CVE-2023-52305/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52305","name":"NVD"},"references":[{"id":"pdsa-2023-014","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-014.md"}},{"id":"CVE-2023-52305","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52305","name":"NVD"}},{"id":"PYSEC-2024-137","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-137.yaml"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-014","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-014.md"},{"title":"CVE-2023-52305","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52305"},{"title":"GitHub Advisory PYSEC-2024-137","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-137.yaml"}],"cwes":[369],"description":"PaddlePaddle floating point exception in paddle.topk","detail":"# PaddlePaddle floating point exception in paddle.topk FPE in paddle.topk\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-52305, PYSEC-2024-137","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:27:19","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-52308","bom-ref":"CVE-2023-52308/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52308","name":"NVD"},"references":[{"id":"PYSEC-2024-140","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-140.yaml"}},{"id":"pdsa-2023-017","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-017.md"}},{"id":"CVE-2023-52308","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52308","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-140","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-140.yaml"},{"title":"GitHub Advisory pdsa-2023-017","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-017.md"},{"title":"CVE-2023-52308","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52308"}],"cwes":[369],"description":"PaddlePaddle floating point exception in paddle.amin","detail":"# PaddlePaddle floating point exception in paddle.amin FPE in paddle.amin\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-52308, PYSEC-2024-140","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:33","updated":"2024-11-22T18:29:25","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38676","bom-ref":"CVE-2023-38676/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38676","name":"NVD"},"references":[{"id":"pdsa-2023-008","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md"}},{"id":"PYSEC-2024-131","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-131.yaml"}},{"id":"CVE-2023-38676","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38676","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory pdsa-2023-008","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md"},{"title":"GitHub Advisory PYSEC-2024-131","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-131.yaml"},{"title":"CVE-2023-38676","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38676"}],"cwes":[476],"description":"PaddlePaddle segfault in paddle.dot","detail":"# PaddlePaddle segfault in paddle.dot Nullptr in paddle.dot\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-38676, PYSEC-2024-131","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:32","updated":"2024-11-22T18:49:20","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38674","bom-ref":"CVE-2023-38674/pkg:pypi/paddlepaddle","affects":[{"ref":"pkg:pypi/paddlepaddle","versions":[{"range":"vers:pypi/>=1.8.5|<=2.5.2|<2.6.0|!=2.6.0","status":"affected"},{"version":"2.6.0","status":"unaffected"}]}],"recommendation":"Update to version 2.6.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38674","name":"NVD"},"references":[{"id":"CVE-2023-38674","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38674","name":"NVD"}},{"id":"pdsa-2023-006","source":{"name":"GitHub Advisory","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md"}},{"id":"PYSEC-2024-129","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-129.yaml"}}],"advisories":[{"title":"CVE-2023-38674","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38674"},{"title":"GitHub Advisory pdsa-2023-006","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md"},{"title":"GitHub Advisory PYSEC-2024-129","url":"https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-129.yaml"}],"cwes":[369],"description":"PaddlePaddle floating point exception in paddle.nanmedian","detail":"# PaddlePaddle floating point exception in paddle.nanmedian FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ## Related CVE(s) CVE-2023-38674, PYSEC-2024-129","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-01-03T09:30:31","updated":"2024-11-22T18:29:09","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-2800","bom-ref":"CVE-2023-2800/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.30.0|!=4.30.0","status":"affected"},{"version":"4.30.0","status":"unaffected"}]}],"recommendation":"Update to version 4.30.0 to resolve CVE-2023-2800 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2800","name":"NVD"},"references":[{"id":"CVE-2023-2800","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2800","name":"NVD"}},{"id":"PYSEC-2023-299","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2023-299.yaml"}}],"advisories":[{"title":"CVE-2023-2800","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2800"},{"title":"GitHub Advisory PYSEC-2023-299","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2023-299.yaml"}],"cwes":[377],"description":"transformers has Insecure Temporary File","detail":"# transformers has Insecure Temporary File Insecure Temporary File in GitHub repository huggingface/transformers 4.29.2 and prior. A fix is available at commit 80ca92470938bbcc348e2d9cf4734c7c25cb1c43 and has been released as part of version 4.30.0. ## Related CVE(s) CVE-2023-2800, PYSEC-2023-299","ratings":[{"method":"CVSSv31","severity":"medium","score":4.7,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-05-18T18:30:35","updated":"2024-11-22T20:46:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2025-3933","bom-ref":"CVE-2025-3933/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.52.1|!=4.52.1","status":"affected"},{"version":"4.52.1","status":"unaffected"}]}],"recommendation":"Update to version 4.52.1 to resolve CVE-2025-3933 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3933","name":"NVD"},"references":[{"id":"25282953-5827-4384-bb6f-5790d275721b","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/25282953-5827-4384-bb6f-5790d275721b"}},{"id":"CVE-2025-3933","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3933","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 25282953-5827-4384-bb6f-5790d275721b","url":"https://huntr.com/bounties/25282953-5827-4384-bb6f-5790d275721b"},{"title":"CVE-2025-3933","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3933"}],"cwes":[1333],"description":"Transformers is vulnerable to ReDoS attack through its DonutProcessor class","detail":"# Transformers is vulnerable to ReDoS attack through its DonutProcessor class A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's `token2json()` method. This vulnerability affects versions 4.51.3 and earlier, and is fixed in version 4.52.1. The issue arises from the regex pattern `` which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting document processing tasks using the Donut model.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2025-07-11T12:30:32","updated":"2025-08-07T16:11:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-3568","bom-ref":"CVE-2024-3568/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.38.0|!=4.38.0","status":"affected"},{"version":"4.38.0","status":"unaffected"}]}],"recommendation":"Update to version 4.38.0 to resolve CVE-2024-3568 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3568","name":"NVD"},"references":[{"id":"b3c36992-5264-4d7f-9906-a996efafba8f","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/b3c36992-5264-4d7f-9906-a996efafba8f"}},{"id":"CVE-2024-3568","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3568","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory b3c36992-5264-4d7f-9906-a996efafba8f","url":"https://huntr.com/bounties/b3c36992-5264-4d7f-9906-a996efafba8f"},{"title":"CVE-2024-3568","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3568"}],"cwes":[502],"description":"Transformers Deserialization of Untrusted Data vulnerability","detail":"# Transformers Deserialization of Untrusted Data vulnerability The huggingface/transformers library is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_repo_checkpoint()` function of the `TFPreTrainedModel()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine.","ratings":[{"method":"CVSSv3","severity":"low","score":3.4,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L"}],"published":"2024-04-10T18:30:48","updated":"2024-04-10T22:42:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-6730","bom-ref":"CVE-2023-6730/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.36.0|!=4.36.0","status":"affected"},{"version":"4.36.0","status":"unaffected"}]}],"recommendation":"Update to version 4.36.0 to resolve CVE-2023-6730 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6730","name":"NVD"},"references":[{"id":"CVE-2023-6730","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6730","name":"NVD"}},{"id":"PYSEC-2023-300","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2023-300.yaml"}},{"id":"423611ee-7a2a-442a-babb-3ed2f8385c16","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16"}}],"advisories":[{"title":"CVE-2023-6730","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6730"},{"title":"GitHub Advisory PYSEC-2023-300","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2023-300.yaml"},{"title":"Huntr Advisory 423611ee-7a2a-442a-babb-3ed2f8385c16","url":"https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16"}],"cwes":[502],"description":"transformers has a Deserialization of Untrusted Data vulnerability","detail":"# transformers has a Deserialization of Untrusted Data vulnerability Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.0. ## Related CVE(s) CVE-2023-6730, PYSEC-2023-300","ratings":[{"method":"CVSSv3","severity":"critical","score":9.0,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"}],"published":"2023-12-19T15:30:30","updated":"2024-11-22T21:07:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-3262","bom-ref":"CVE-2025-3262/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=4.49.0|<4.51.0|!=4.51.0","status":"affected"},{"version":"4.51.0","status":"unaffected"}]}],"recommendation":"Update to version 4.51.0 to resolve CVE-2025-3262 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3262","name":"NVD"},"references":[{"id":"CVE-2025-3262","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3262","name":"NVD"}},{"id":"ecf5ccc4-39e7-4fb3-b547-14a41d31a184","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/ecf5ccc4-39e7-4fb3-b547-14a41d31a184"}}],"advisories":[{"title":"CVE-2025-3262","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3262"},{"title":"Huntr Advisory ecf5ccc4-39e7-4fb3-b547-14a41d31a184","url":"https://huntr.com/bounties/ecf5ccc4-39e7-4fb3-b547-14a41d31a184"}],"cwes":[1333],"description":"Transformers vulnerable to ReDoS attack through its SETTING_RE variable","detail":"# Transformers vulnerable to ReDoS attack through its SETTING_RE variable A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the huggingface/transformers repository, specifically in version 4.49.0. The vulnerability is due to inefficient regular expression complexity in the `SETTING_RE` variable within the `transformers/commands/chat.py` file. The regex contains repetition groups and non-optimized quantifiers, leading to exponential backtracking when processing 'almost matching' payloads. This can degrade application performance and potentially result in a denial-of-service (DoS) when handling specially crafted input strings. The issue is fixed in version 4.51.0.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2025-07-07T12:30:22","updated":"2025-08-04T16:09:51","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-12720","bom-ref":"CVE-2024-12720/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.48.0|!=4.48.0","status":"affected"},{"version":"4.48.0","status":"unaffected"}]}],"recommendation":"Update to version 4.48.0 to resolve CVE-2024-12720 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12720","name":"NVD"},"references":[{"id":"4bed1214-7835-4252-a853-22bbad891f98","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/4bed1214-7835-4252-a853-22bbad891f98"}},{"id":"CVE-2024-12720","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12720","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 4bed1214-7835-4252-a853-22bbad891f98","url":"https://huntr.com/bounties/4bed1214-7835-4252-a853-22bbad891f98"},{"title":"CVE-2024-12720","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12720"}],"cwes":[1333],"description":"Transformers Regular Expression Denial of Service (ReDoS) vulnerability","detail":"# Transformers Regular Expression Denial of Service (ReDoS) vulnerability A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file tokenization_nougat_fast.py. The vulnerability occurs in the post_process_single() function, where a regular expression processes specially crafted input. The issue stems from the regex exhibiting exponential time complexity under certain conditions, leading to excessive backtracking. This can result in significantly high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.46.3.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2025-03-20T12:32:43","updated":"2025-03-21T18:03:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-5197","bom-ref":"CVE-2025-5197/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.53.0|!=4.53.0","status":"affected"},{"version":"4.53.0","status":"unaffected"}]}],"recommendation":"Update to version 4.53.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5197","name":"NVD"},"references":[{"id":"CVE-2025-5197","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5197","name":"NVD"}},{"id":"3f8b3fd0-166b-46e7-b60f-60dd9d2678bf","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/3f8b3fd0-166b-46e7-b60f-60dd9d2678bf"}}],"advisories":[{"title":"CVE-2025-5197","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5197"},{"title":"Huntr Advisory 3f8b3fd0-166b-46e7-b60f-60dd9d2678bf","url":"https://huntr.com/bounties/3f8b3fd0-166b-46e7-b60f-60dd9d2678bf"}],"cwes":[1333],"description":"Hugging Face Transformers Regular Expression Denial of Service (ReDoS) vulnerability","detail":"# Hugging Face Transformers Regular Expression Denial of Service (ReDoS) vulnerability A Regular Expression Denial of Service (ReDoS) vulnerability exists in the Hugging Face Transformers library, specifically in the `convert_tf_weight_name_to_pt_weight_name()` function. This function, responsible for converting TensorFlow weight names to PyTorch format, uses a regex pattern `/[^/]*___([^/]*)/` that can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. The vulnerability affects versions up to 4.51.3 and is fixed in version 4.53.0. This issue can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting model conversion processes between TensorFlow and PyTorch formats.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2025-08-06T12:31:20","updated":"2025-08-06T19:12:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-1194","bom-ref":"CVE-2025-1194/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.50.0|!=4.50.0","status":"affected"},{"version":"4.50.0","status":"unaffected"}]}],"recommendation":"Update to version 4.50.0 to resolve CVE-2025-1194 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1194","name":"NVD"},"references":[{"id":"86f58dcd-683f-4adc-a735-849f51e9abb2","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2"}},{"id":"CVE-2025-1194","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1194","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 86f58dcd-683f-4adc-a735-849f51e9abb2","url":"https://huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2"},{"title":"CVE-2025-1194","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1194"}],"cwes":[1333],"description":"Transformers Regular Expression Denial of Service (ReDoS) vulnerability","detail":"# Transformers Regular Expression Denial of Service (ReDoS) vulnerability A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the GPT-NeoX-Japanese model. The vulnerability occurs in the SubWordJapaneseTokenizer class, where regular expressions process specially crafted inputs. The issue stems from a regex exhibiting exponential complexity under certain conditions, leading to excessive backtracking. This can result in high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.48.1 (latest).","ratings":[{"method":"CVSSv31","severity":"medium","score":4.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"published":"2025-04-29T12:30:21","updated":"2025-08-04T16:29:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-11394","bom-ref":"CVE-2024-11394/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.48.0|!=4.48.0","status":"affected"},{"version":"4.48.0","status":"unaffected"}]}],"recommendation":"Update to version 4.48.0 to resolve CVE-2024-11394 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11394","name":"NVD"},"references":[{"id":"PYSEC-2024-229","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2024-229.yaml"}},{"id":"zero-day-initiative-exploit-ZDI-24-1515","source":{"name":"Zero Day Initiative Exploit","url":"https://www.zerodayinitiative.com/advisories/ZDI-24-1515"}},{"id":"CVE-2024-11394","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11394","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-229","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2024-229.yaml"},{"title":"CVE-2024-11394","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11394"}],"cwes":[502],"description":"Deserialization of Untrusted Data in Hugging Face Transformers","detail":"# Deserialization of Untrusted Data in Hugging Face Transformers Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of model files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25012. ## Related CVE(s) CVE-2024-11394, PYSEC-2024-229","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2024-11-23T03:31:58","updated":"2025-02-13T22:26:36","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nKnown Exploits"}]},{"id":"CVE-2025-3264","bom-ref":"CVE-2025-3264/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.51.0|!=4.51.0","status":"affected"},{"version":"4.51.0","status":"unaffected"}]}],"recommendation":"Update to version 4.51.0 to resolve CVE-2025-3264 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3264","name":"NVD"},"references":[{"id":"CVE-2025-3264","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3264","name":"NVD"}},{"id":"3c6f7822-9992-476d-8cf0-b0b1623427df","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/3c6f7822-9992-476d-8cf0-b0b1623427df"}}],"advisories":[{"title":"CVE-2025-3264","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3264"},{"title":"Huntr Advisory 3c6f7822-9992-476d-8cf0-b0b1623427df","url":"https://huntr.com/bounties/3c6f7822-9992-476d-8cf0-b0b1623427df"}],"cwes":[1333],"description":"Transformers vulnerable to ReDoS attack through its get_imports() function","detail":"# Transformers vulnerable to ReDoS attack through its get_imports() function A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_imports()` function within `dynamic_module_utils.py`. This vulnerability affects versions 4.49.0 and is fixed in version 4.51.0. The issue arises from a regular expression pattern `\\s*try\\s*:.*?except.*?:` used to filter out try/except blocks from Python code, which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to remote code loading disruption, resource exhaustion in model serving, supply chain attack vectors, and development pipeline disruption.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2025-07-07T12:30:22","updated":"2025-07-08T17:27:12","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-3777","bom-ref":"CVE-2025-3777/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.52.1|!=4.52.1","status":"affected"},{"version":"4.52.1","status":"unaffected"}]}],"recommendation":"Update to version 4.52.1 to resolve CVE-2025-3777 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3777","name":"NVD"},"references":[{"id":"CVE-2025-3777","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3777","name":"NVD"}},{"id":"ccba0730-9248-4853-b7ff-5c20e6364f09","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/ccba0730-9248-4853-b7ff-5c20e6364f09"}}],"advisories":[{"title":"CVE-2025-3777","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3777"},{"title":"Huntr Advisory ccba0730-9248-4853-b7ff-5c20e6364f09","url":"https://huntr.com/bounties/ccba0730-9248-4853-b7ff-5c20e6364f09"}],"cwes":[20],"description":"Transformers's Improper Input Validation vulnerability can be exploited through username injection","detail":"# Transformers's Improper Input Validation vulnerability can be exploited through username injection Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1.","ratings":[{"method":"CVSSv3","severity":"low","score":3.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-07-07T12:30:22","updated":"2025-07-08T17:42:13","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-3263","bom-ref":"CVE-2025-3263/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.51.0|!=4.51.0","status":"affected"},{"version":"4.51.0","status":"unaffected"}]}],"recommendation":"Update to version 4.51.0 to resolve CVE-2025-3263 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3263","name":"NVD"},"references":[{"id":"c7a69150-54f8-4e81-8094-791e7a2a0f29","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/c7a69150-54f8-4e81-8094-791e7a2a0f29"}},{"id":"CVE-2025-3263","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3263","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory c7a69150-54f8-4e81-8094-791e7a2a0f29","url":"https://huntr.com/bounties/c7a69150-54f8-4e81-8094-791e7a2a0f29"},{"title":"CVE-2025-3263","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3263"}],"cwes":[1333],"description":"Transformers's ReDoS vulnerability in get_configuration_file can lead to catastrophic backtracking","detail":"# Transformers's ReDoS vulnerability in get_configuration_file can lead to catastrophic backtracking A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_configuration_file()` function within the `transformers.configuration_utils` module. The affected version is 4.49.0, and the issue is resolved in version 4.51.0. The vulnerability arises from the use of a regular expression pattern `config\\.(.*)\\.json` that can be exploited to cause excessive CPU consumption through crafted input strings, leading to catastrophic backtracking. This can result in model serving disruption, resource exhaustion, and increased latency in applications using the library.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2025-07-07T12:30:22","updated":"2025-07-08T16:57:18","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-2099","bom-ref":"CVE-2025-2099/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.50.0|!=4.50.0","status":"affected"},{"version":"4.50.0","status":"unaffected"}]}],"recommendation":"Update to version 4.50.0 to resolve CVE-2025-2099 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-2099","name":"NVD"},"references":[{"id":"PYSEC-2025-40","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2025-40.yaml"}},{"id":"97b780f3-ffca-424f-ad5d-0e1c57a5bde4","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/97b780f3-ffca-424f-ad5d-0e1c57a5bde4"}},{"id":"CVE-2025-2099","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-2099","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2025-40","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2025-40.yaml"},{"title":"Huntr Advisory 97b780f3-ffca-424f-ad5d-0e1c57a5bde4","url":"https://huntr.com/bounties/97b780f3-ffca-424f-ad5d-0e1c57a5bde4"},{"title":"CVE-2025-2099","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-2099"}],"cwes":[1333],"description":"Hugging Face Transformers Regular Expression Denial of Service","detail":"# Hugging Face Transformers Regular Expression Denial of Service A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils` module in huggingface/transformers version v4.48.3 allows for a Regular Expression Denial of Service (ReDoS) attack. The regular expression used to process code blocks in docstrings contains nested quantifiers, leading to exponential backtracking when processing input with a large number of newline characters. An attacker can exploit this by providing a specially crafted payload, causing high CPU usage and potential application downtime, effectively resulting in a Denial of Service (DoS) scenario. ## Related CVE(s) CVE-2025-2099, PYSEC-2025-40","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2025-05-19T12:30:33","updated":"2025-05-22T18:50:32","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-11392","bom-ref":"CVE-2024-11392/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.48.0|!=4.48.0","status":"affected"},{"version":"4.48.0","status":"unaffected"}]}],"recommendation":"Update to version 4.48.0 to resolve CVE-2024-11392 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11392","name":"NVD"},"references":[{"id":"CVE-2024-11392","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11392","name":"NVD"}},{"id":"zero-day-initiative-exploit-ZDI-24-1513","source":{"name":"Zero Day Initiative Exploit","url":"https://www.zerodayinitiative.com/advisories/ZDI-24-1513"}},{"id":"PYSEC-2024-227","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2024-227.yaml"}}],"advisories":[{"title":"CVE-2024-11392","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11392"},{"title":"GitHub Advisory PYSEC-2024-227","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2024-227.yaml"}],"cwes":[502],"description":"Deserialization of Untrusted Data in Hugging Face Transformers","detail":"# Deserialization of Untrusted Data in Hugging Face Transformers Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of configuration files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-24322. ## Related CVE(s) CVE-2024-11392, PYSEC-2024-227","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2024-11-23T03:31:58","updated":"2025-02-13T22:26:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nKnown Exploits"}]},{"id":"CVE-2023-7018","bom-ref":"CVE-2023-7018/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.36.0|!=4.36.0","status":"affected"},{"version":"4.36.0","status":"unaffected"}]}],"recommendation":"Update to version 4.36.0 to resolve CVE-2023-7018 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-7018","name":"NVD"},"references":[{"id":"e1a3e548-e53a-48df-b708-9ee62140963c","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c"}},{"id":"PYSEC-2023-301","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2023-301.yaml"}},{"id":"CVE-2023-7018","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-7018","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory e1a3e548-e53a-48df-b708-9ee62140963c","url":"https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c"},{"title":"GitHub Advisory PYSEC-2023-301","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2023-301.yaml"},{"title":"CVE-2023-7018","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-7018"}],"cwes":[502],"description":"transformers has a Deserialization of Untrusted Data vulnerability","detail":"# transformers has a Deserialization of Untrusted Data vulnerability Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. ## Related CVE(s) CVE-2023-7018, PYSEC-2023-301","ratings":[{"method":"CVSSv31","severity":"high","score":7.8,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2023-12-20T18:30:32","updated":"2024-11-22T21:07:38","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-11393","bom-ref":"CVE-2024-11393/pkg:pypi/transformers","affects":[{"ref":"pkg:pypi/transformers","versions":[{"range":"vers:pypi/>=0.1|<=4.9.2|<4.48.0|!=4.48.0","status":"affected"},{"version":"4.48.0","status":"unaffected"}]}],"recommendation":"Update to version 4.48.0 to resolve CVE-2024-11393 or update to version 4.53.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11393","name":"NVD"},"references":[{"id":"PYSEC-2024-228","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2024-228.yaml"}},{"id":"CVE-2024-11393","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11393","name":"NVD"}},{"id":"zero-day-initiative-exploit-ZDI-24-1514","source":{"name":"Zero Day Initiative Exploit","url":"https://www.zerodayinitiative.com/advisories/ZDI-24-1514"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-228","url":"https://github.com/pypa/advisory-database/tree/main/vulns/transformers/PYSEC-2024-228.yaml"},{"title":"CVE-2024-11393","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11393"}],"cwes":[502],"description":"Deserialization of Untrusted Data in Hugging Face Transformers","detail":"# Deserialization of Untrusted Data in Hugging Face Transformers Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of model files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25191. ## Related CVE(s) CVE-2024-11393, PYSEC-2024-228","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2024-11-23T03:31:58","updated":"2025-02-13T22:27:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/torchmetrics@1.8.1\", \"pkg:pypi/transformers@4.56.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nKnown Exploits"}]},{"id":"CVE-2024-23751","bom-ref":"CVE-2024-23751/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.4.10|<=0.9.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-23751. Updating to version 0.12.41 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23751","name":"NVD"},"references":[{"id":"PYSEC-2024-12","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2024-12.yaml"}},{"id":"CVE-2024-23751","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23751","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-12","url":"https://github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2024-12.yaml"},{"title":"CVE-2024-23751","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23751"}],"cwes":[89],"description":"SQL injection in llama-index","detail":"# SQL injection in llama-index LlamaIndex (aka llama_index) through 0.9.35 allows SQL injection via the Text-to-SQL feature in NLSQLTableQueryEngine, SQLTableRetrieverQueryEngine, NLSQLRetriever, RetrieverQueryEngine, and PGVectorSQLQueryEngine. For example, an attacker might be able to delete this year's student records via \"Drop the Students table\" within English language input. ## Related CVE(s) CVE-2024-23751, PYSEC-2024-12","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-01-22T03:30:26","updated":"2024-02-16T08:23:56","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-39662","bom-ref":"CVE-2023-39662/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.4.10|<=0.9.9|<0.9.14|!=0.9.14","status":"affected"},{"version":"0.9.14","status":"unaffected"}]}],"recommendation":"Update to version 0.9.14 to resolve CVE-2023-39662 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39662","name":"NVD"},"references":[{"id":"PYSEC-2023-148","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2023-148.yaml"}},{"id":"CVE-2023-39662","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39662","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2023-148","url":"https://github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2023-148.yaml"},{"title":"CVE-2023-39662","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39662"}],"cwes":[74,94],"description":"llama-index vulnerable to arbitrary code execution","detail":"# llama-index vulnerable to arbitrary code execution An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function. ## Related CVE(s) CVE-2023-39662, PYSEC-2023-148","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-08-15T18:31:32","updated":"2024-09-30T16:44:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-6211","bom-ref":"CVE-2025-6211/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.10.0|<=0.9.9|<0.12.41|!=0.12.41","status":"affected"},{"version":"0.12.41","status":"unaffected"}]}],"recommendation":"Update to version 0.12.41.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6211","name":"NVD"},"references":[{"id":"1a48a011-a3c5-4979-9ffc-9652280bc389","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/1a48a011-a3c5-4979-9ffc-9652280bc389"}},{"id":"CVE-2025-6211","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6211","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 1a48a011-a3c5-4979-9ffc-9652280bc389","url":"https://huntr.com/bounties/1a48a011-a3c5-4979-9ffc-9652280bc389"},{"title":"CVE-2025-6211","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6211"}],"cwes":[440],"description":"LlamaIndex vulnerable to data loss through hash collisions in its DocugamiReader class ","detail":"# LlamaIndex vulnerable to data loss through hash collisions in its DocugamiReader class A vulnerability in the DocugamiReader class of the run-llama/llama_index repository, up to but excluding version 0.12.41, involves the use of MD5 hashing to generate IDs for document chunks. This approach leads to hash collisions when structurally distinct chunks contain identical text, resulting in one chunk overwriting another. This can cause loss of semantically or legally important document content, breakage of parent-child chunk hierarchies, and inaccurate or hallucinated responses in AI outputs. The issue is resolved in version 0.3.1.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"published":"2025-07-10T15:31:27","updated":"2025-07-10T19:12:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-1752","bom-ref":"CVE-2025-1752/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.12.15|<0.12.21|!=0.12.21","status":"affected"},{"version":"0.12.21","status":"unaffected"}]}],"recommendation":"Update to version 0.12.21 to resolve CVE-2025-1752 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1752","name":"NVD"},"references":[{"id":"CVE-2025-1752","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1752","name":"NVD"}},{"id":"cd7b9082-7d75-42e4-84f5-dbee23cbc467","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/cd7b9082-7d75-42e4-84f5-dbee23cbc467"}}],"advisories":[{"title":"CVE-2025-1752","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1752"},{"title":"Huntr Advisory cd7b9082-7d75-42e4-84f5-dbee23cbc467","url":"https://huntr.com/bounties/cd7b9082-7d75-42e4-84f5-dbee23cbc467"}],"cwes":[400],"description":"LlamaIndex Vulnerable to Denial of Service (DoS)","detail":"# LlamaIndex Vulnerable to Denial of Service (DoS) A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). The vulnerability arises due to inappropriate secure coding measures, specifically the lack of proper implementation of the max_depth parameter in the get_article_urls function. This allows an attacker to exhaust Python's recursion limit through repeated function calls, leading to resource consumption and ultimately crashing the Python process.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-05-10T15:30:28","updated":"2025-05-12T21:12:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-12704","bom-ref":"CVE-2024-12704/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.10.0|<=0.9.9|<0.12.6|!=0.12.6","status":"affected"},{"version":"0.12.6","status":"unaffected"}]}],"recommendation":"Update to version 0.12.6 to resolve CVE-2024-12704 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12704","name":"NVD"},"references":[{"id":"a0b638fd-21c6-4ba7-b381-6ab98472a02a","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/a0b638fd-21c6-4ba7-b381-6ab98472a02a"}},{"id":"CVE-2024-12704","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12704","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory a0b638fd-21c6-4ba7-b381-6ab98472a02a","url":"https://huntr.com/bounties/a0b638fd-21c6-4ba7-b381-6ab98472a02a"},{"title":"CVE-2024-12704","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12704"}],"cwes":[755],"description":"LlamaIndex Improper Handling of Exceptional Conditions vulnerability","detail":"# LlamaIndex Improper Handling of Exceptional Conditions vulnerability A vulnerability in the LangChainLLM class of the run-llama/llama_index repository, version v0.12.5, allows for a Denial of Service (DoS) attack. The stream_complete method executes the llm using a thread and retrieves the result via the get_response_gen method of the StreamingGeneratorCallbackHandler class. If the thread terminates abnormally before the _llm.predict is executed, there is no exception handling for this case, leading to an infinite loop in the get_response_gen function. This can be triggered by providing an input of an incorrect type, causing the thread to terminate and the process to continue running indefinitely.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:43","updated":"2025-03-21T18:03:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-12911","bom-ref":"CVE-2024-12911/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.10.0|<=0.9.9|<0.12.3|!=0.12.3","status":"affected"},{"version":"0.12.3","status":"unaffected"}]}],"recommendation":"Update to version 0.12.3 to resolve CVE-2024-12911 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12911","name":"NVD"},"references":[{"id":"CVE-2024-12911","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12911","name":"NVD"}},{"id":"095f9e67-311d-494c-99c5-5e61a0adb8f3","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/095f9e67-311d-494c-99c5-5e61a0adb8f3"}}],"advisories":[{"title":"CVE-2024-12911","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12911"},{"title":"Huntr Advisory 095f9e67-311d-494c-99c5-5e61a0adb8f3","url":"https://huntr.com/bounties/095f9e67-311d-494c-99c5-5e61a0adb8f3"}],"cwes":[379],"description":"LlamaIndex vulnerable to Creation of Temporary File in Directory with Insecure Permissions","detail":"# LlamaIndex vulnerable to Creation of Temporary File in Directory with Insecure Permissions A vulnerability in the `default_jsonalyzer` function of the `JSONalyzeQueryEngine` in the run-llama/llama_index repository allows for SQL injection via prompt injection. This can lead to arbitrary file creation and Denial-of-Service (DoS) attacks. The vulnerability affects the latest version and is fixed in version 0.12.3.","ratings":[{"method":"CVSSv3","severity":"high","score":7.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"published":"2025-03-20T12:32:44","updated":"2025-03-21T19:04:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-12910","bom-ref":"CVE-2024-12910/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.10.0|<=0.9.9|<0.12.9|!=0.12.9","status":"affected"},{"version":"0.12.9","status":"unaffected"}]}],"recommendation":"Update to version 0.12.9 to resolve CVE-2024-12910 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12910","name":"NVD"},"references":[{"id":"CVE-2024-12910","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12910","name":"NVD"}},{"id":"27883f22-35ff-49df-aaa5-05031c7d6ad8","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/27883f22-35ff-49df-aaa5-05031c7d6ad8"}},{"id":"PYSEC-2025-11","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2025-11.yaml"}}],"advisories":[{"title":"CVE-2024-12910","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12910"},{"title":"Huntr Advisory 27883f22-35ff-49df-aaa5-05031c7d6ad8","url":"https://huntr.com/bounties/27883f22-35ff-49df-aaa5-05031c7d6ad8"},{"title":"GitHub Advisory PYSEC-2025-11","url":"https://github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2025-11.yaml"}],"cwes":[400],"description":"LlamaIndex Uncontrolled Resource Consumption vulnerability","detail":"# LlamaIndex Uncontrolled Resource Consumption vulnerability A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index repository, version latest, allows an attacker to cause a Denial of Service (DoS) by controlling a URL variable to contain the root URL. This leads to infinite recursive calls to the `get_article_urls` method, exhausting system resources and potentially crashing the application. ## Related CVE(s) CVE-2024-12910, PYSEC-2025-11","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:44","updated":"2025-04-02T01:20:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-4181","bom-ref":"CVE-2024-4181/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.10.0|<=0.9.9|<0.10.13|!=0.10.13","status":"affected"},{"version":"0.10.13","status":"unaffected"}]}],"recommendation":"Update to version 0.10.13 to resolve CVE-2024-4181 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4181","name":"NVD"},"references":[{"id":"1a204520-598a-434e-b13d-0d34f2a5ddc1","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1"}},{"id":"CVE-2024-4181","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4181","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 1a204520-598a-434e-b13d-0d34f2a5ddc1","url":"https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1"},{"title":"CVE-2024-4181","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4181"}],"cwes":[94],"description":"RunGptLLM class in LlamaIndex has a command injection","detail":"# RunGptLLM class in LlamaIndex has a command injection A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines.","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2024-05-16T09:33:08","updated":"2024-05-19T02:24:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-1793","bom-ref":"CVE-2025-1793/pkg:pypi/llama-index","affects":[{"ref":"pkg:pypi/llama-index","versions":[{"range":"vers:pypi/>=0.10.0|<=0.9.9|<0.12.28|!=0.12.28","status":"affected"},{"version":"0.12.28","status":"unaffected"}]}],"recommendation":"Update to version 0.12.28 to resolve CVE-2025-1793 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1793","name":"NVD"},"references":[{"id":"8cb1555a-9655-4122-b0d6-60059e79183c","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/8cb1555a-9655-4122-b0d6-60059e79183c"}},{"id":"CVE-2025-1793","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1793","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 8cb1555a-9655-4122-b0d6-60059e79183c","url":"https://huntr.com/bounties/8cb1555a-9655-4122-b0d6-60059e79183c"},{"title":"CVE-2025-1793","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1793"}],"cwes":[89],"description":"llama_index vulnerable to SQL Injection","detail":"# llama_index vulnerable to SQL Injection Multiple vector store integrations in run-llama/llama_index version v0.12.21 have SQL injection vulnerabilities. These vulnerabilities allow an attacker to read and write data using SQL, potentially leading to unauthorized access to data of other users depending on the usage of the llama-index library in a web application.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2025-06-05T06:30:26","updated":"2025-06-06T21:12:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-cloud-services@0.6.54\", \"pkg:pypi/llama-index-core@0.12.52.post1\", \"pkg:pypi/llama-index-workflows@1.3.0\", \"pkg:pypi/llama-index-instrumentation@0.4.0\", \"pkg:pypi/llama-index-agent-openai@0.4.12\", \"pkg:pypi/llama-index-llms-openai@0.4.7\", \"pkg:pypi/llama-index-cli@0.4.4\", \"pkg:pypi/llama-index-embeddings-openai@0.3.1\", \"pkg:pypi/llama-index-indices-managed-llama-cloud@0.8.0\", \"pkg:pypi/llama-index-multi-modal-llms-openai@0.5.3\", \"pkg:pypi/llama-index-program-openai@0.3.2\", \"pkg:pypi/llama-index-question-gen-openai@0.3.1\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/llama-index-readers-llama-parse@0.4.0\", \"pkg:pypi/llama-index@0.12.52\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-36258","bom-ref":"CVE-2023-36258/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.247|!=0.0.247","status":"affected"},{"version":"0.0.247","status":"unaffected"}]}],"recommendation":"Update to version 0.0.247 to resolve CVE-2023-36258 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36258","name":"NVD"},"references":[{"id":"CVE-2023-36258","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36258","name":"NVD"}},{"id":"PYSEC-2023-98","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-98.yaml"}}],"advisories":[{"title":"CVE-2023-36258","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36258"},{"title":"GitHub Advisory PYSEC-2023-98","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-98.yaml"}],"cwes":[94],"description":"langchain arbitrary code execution vulnerability","detail":"# langchain arbitrary code execution vulnerability An issue in langchain allows an attacker to execute arbitrary code via the PALChain in the python exec method. ## Related CVE(s) CVE-2023-36258, PYSEC-2023-98","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-07-03T21:30:57","updated":"2024-11-22T23:04:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-2965","bom-ref":"CVE-2024-2965/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.2.4|<0.2.5|!=0.2.5","status":"affected"},{"version":"0.2.5","status":"unaffected"}]}],"recommendation":"Update to version 0.2.5.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2965","name":"NVD"},"references":[{"id":"CVE-2024-2965","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2965","name":"NVD"}},{"id":"PYSEC-2024-118","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-118.yaml"}},{"id":"90b0776d-9fa6-4841-aac4-09fde5918cae","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/90b0776d-9fa6-4841-aac4-09fde5918cae"}}],"advisories":[{"title":"CVE-2024-2965","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2965"},{"title":"GitHub Advisory PYSEC-2024-118","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-118.yaml"},{"title":"Huntr Advisory 90b0776d-9fa6-4841-aac4-09fde5918cae","url":"https://huntr.com/bounties/90b0776d-9fa6-4841-aac4-09fde5918cae"}],"cwes":[400,674],"description":"Denial of service in langchain-community","detail":"# Denial of service in langchain-community Denial of service in `SitemapLoader` Document Loader in the `langchain-community` package, affecting versions below 0.2.5. The `parse_sitemap` method, responsible for parsing sitemaps and extracting URLs, lacks a mechanism to prevent infinite recursion when a sitemap URL refers to the current sitemap itself. This oversight allows for the possibility of an infinite loop, leading to a crash by exceeding the maximum recursion depth in Python. This vulnerability can be exploited to occupy server socket/port resources and crash the Python process, impacting the availability of services relying on this functionality. ## Related CVE(s) CVE-2024-2965, PYSEC-2024-118","ratings":[{"method":"CVSSv3","severity":"medium","score":4.2,"vector":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2024-06-06T21:30:36","updated":"2024-11-04T15:32:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-8309","bom-ref":"CVE-2024-8309/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.2.0rc2|<0.2.0|!=0.2.0","status":"affected"},{"version":"0.2.0","status":"unaffected"}]}],"recommendation":"Update to version 0.2.0 to resolve CVE-2024-8309 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8309","name":"NVD"},"references":[{"id":"8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5"}},{"id":"PYSEC-2024-115","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-115.yaml"}},{"id":"CVE-2024-8309","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8309","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5","url":"https://huntr.com/bounties/8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5"},{"title":"GitHub Advisory PYSEC-2024-115","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-115.yaml"},{"title":"CVE-2024-8309","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8309"}],"cwes":[74,89],"description":"Langchain SQL Injection vulnerability","detail":"# Langchain SQL Injection vulnerability A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. This vulnerability can lead to unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database. ## Related CVE(s) CVE-2024-8309, PYSEC-2024-115","ratings":[{"method":"CVSSv4","severity":"low","score":2.1,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"}],"published":"2024-10-29T15:32:05","updated":"2024-11-12T20:01:32","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-36188","bom-ref":"CVE-2023-36188/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.236|!=0.0.236","status":"affected"},{"version":"0.0.236","status":"unaffected"}]}],"recommendation":"Update to version 0.0.236 to resolve CVE-2023-36188 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36188","name":"NVD"},"references":[{"id":"CVE-2023-36188","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36188","name":"NVD"}},{"id":"PYSEC-2023-109","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-109.yaml"}}],"advisories":[{"title":"CVE-2023-36188","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36188"},{"title":"GitHub Advisory PYSEC-2023-109","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-109.yaml"}],"cwes":[74],"description":"langchain vulnerable to arbitrary code execution","detail":"# langchain vulnerable to arbitrary code execution An issue in langchain allows a remote attacker to execute arbitrary code via the PALChain parameter in the Python exec method. ## Related CVE(s) CVE-2023-36188, PYSEC-2023-109","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2023-07-06T15:30:33","updated":"2025-02-16T05:28:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-46229","bom-ref":"CVE-2023-46229/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.317|!=0.0.317","status":"affected"},{"version":"0.0.317","status":"unaffected"}]}],"recommendation":"Update to version 0.0.317 to resolve CVE-2023-46229 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46229","name":"NVD"},"references":[{"id":"CVE-2023-46229","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46229","name":"NVD"}},{"id":"PYSEC-2023-205","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-205.yaml"}}],"advisories":[{"title":"CVE-2023-46229","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46229"},{"title":"GitHub Advisory PYSEC-2023-205","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-205.yaml"}],"cwes":[918],"description":"LangChain Server Side Request Forgery vulnerability","detail":"# LangChain Server Side Request Forgery vulnerability LangChain before 0.0.317 allows SSRF via `document_loaders/recursive_url_loader.py` because crawling can proceed from an external server to an internal server. ## Related CVE(s) CVE-2023-46229, PYSEC-2023-205","ratings":[{"method":"CVSSv4","severity":"high","score":8.6,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-10-19T06:30:23","updated":"2024-09-30T16:26:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-34541","bom-ref":"CVE-2023-34541/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.247|!=0.0.247","status":"affected"},{"version":"0.0.247","status":"unaffected"}]}],"recommendation":"Update to version 0.0.247 to resolve CVE-2023-34541 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34541","name":"NVD"},"references":[{"id":"PYSEC-2023-92","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-92.yaml"}},{"id":"CVE-2023-34541","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34541","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2023-92","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-92.yaml"},{"title":"CVE-2023-34541","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34541"}],"cwes":[],"description":"Langchain vulnerable to arbitrary code execution","detail":"# Langchain vulnerable to arbitrary code execution Langchain 0.0.171 is vulnerable to Arbitrary code execution in `load_prompt`. ## Related CVE(s) CVE-2023-34541, PYSEC-2023-92","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-06-20T15:31:09","updated":"2024-12-07T05:37:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-32786","bom-ref":"CVE-2023-32786/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.329|!=0.0.329","status":"affected"},{"version":"0.0.329","status":"unaffected"}]}],"recommendation":"Update to version 0.0.329 to resolve CVE-2023-32786 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32786","name":"NVD"},"references":[{"id":"CVE-2023-32786","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32786","name":"NVD"}}],"advisories":[{"title":"CVE-2023-32786","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32786"}],"cwes":[74,918],"description":"Langchain Server-Side Request Forgery vulnerability","detail":"# Langchain Server-Side Request Forgery vulnerability In Langchain before 0.0.329, prompt injection allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF and potentially injecting content into downstream tasks.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2023-10-21T00:30:47","updated":"2024-02-16T08:16:38","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-36281","bom-ref":"CVE-2023-36281/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.312|!=0.0.312","status":"affected"},{"version":"0.0.312","status":"unaffected"}]}],"recommendation":"Update to version 0.0.312 to resolve CVE-2023-36281 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36281","name":"NVD"},"references":[{"id":"CVE-2023-36281","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36281","name":"NVD"}},{"id":"PYSEC-2023-151","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml"}}],"advisories":[{"title":"CVE-2023-36281","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36281"},{"title":"GitHub Advisory PYSEC-2023-151","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml"}],"cwes":[94],"description":"langchain vulnerable to arbitrary code execution","detail":"# langchain vulnerable to arbitrary code execution An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the `load_prompt` parameter. This is related to `__subclasses__` or a template. ## Related CVE(s) CVE-2023-36281, PYSEC-2023-151","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-08-22T21:30:27","updated":"2024-09-30T16:36:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-36189","bom-ref":"CVE-2023-36189/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.247|!=0.0.247","status":"affected"},{"version":"0.0.247","status":"unaffected"}]}],"recommendation":"Update to version 0.0.247 to resolve CVE-2023-36189 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36189","name":"NVD"},"references":[{"id":"CVE-2023-36189","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36189","name":"NVD"}},{"id":"PYSEC-2023-110","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-110.yaml"}}],"advisories":[{"title":"CVE-2023-36189","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36189"},{"title":"GitHub Advisory PYSEC-2023-110","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-110.yaml"}],"cwes":[89],"description":"langchain SQL Injection vulnerability","detail":"# langchain SQL Injection vulnerability SQL injection vulnerability in langchain allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component. ## Related CVE(s) CVE-2023-36189, PYSEC-2023-110","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2023-07-06T15:30:33","updated":"2024-10-21T21:01:20","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-32785","bom-ref":"CVE-2023-32785/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.247|!=0.0.247","status":"affected"},{"version":"0.0.247","status":"unaffected"}]}],"recommendation":"Update to version 0.0.247 to resolve CVE-2023-32785 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32785","name":"NVD"},"references":[{"id":"CVE-2023-32785","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32785","name":"NVD"}}],"advisories":[{"title":"CVE-2023-32785","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32785"}],"cwes":[74,89],"description":"Langchain SQL Injection vulnerability","detail":"# Langchain SQL Injection vulnerability In Langchain before 0.0.247, prompt injection allows execution of arbitrary code against the SQL service provided by the chain.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2023-10-21T00:30:47","updated":"2024-11-07T16:00:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38896","bom-ref":"CVE-2023-38896/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.236|!=0.0.236","status":"affected"},{"version":"0.0.236","status":"unaffected"}]}],"recommendation":"Update to version 0.0.236 to resolve CVE-2023-38896 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38896","name":"NVD"},"references":[{"id":"CVE-2023-38896","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38896","name":"NVD"}},{"id":"PYSEC-2023-146","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-146.yaml"}},{"id":"1668711587287375876","source":{"name":"Twitter Advisory","url":"https://twitter.com/llm_sec/status/1668711587287375876"}}],"advisories":[{"title":"CVE-2023-38896","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38896"},{"title":"GitHub Advisory PYSEC-2023-146","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-146.yaml"},{"title":"Twitter Advisory 1668711587287375876","url":"https://twitter.com/llm_sec/status/1668711587287375876"}],"cwes":[74,94],"description":"LangChain vulnerable to arbitrary code execution","detail":"# LangChain vulnerable to arbitrary code execution An issue in Harrison Chase langchain before version 0.0.236 allows a remote attacker to execute arbitrary code via the `from_math_prompt` and `from_colored_object_prompt` functions. ## Related CVE(s) CVE-2023-38896, PYSEC-2023-146","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-08-15T18:31:32","updated":"2024-09-27T21:48:10","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-39631","bom-ref":"CVE-2023-39631/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.308|!=0.0.308","status":"affected"},{"version":"0.0.308","status":"unaffected"}]}],"recommendation":"Update to version 0.0.308 to resolve CVE-2023-39631 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39631","name":"NVD"},"references":[{"id":"CVE-2023-39631","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39631","name":"NVD"}},{"id":"PYSEC-2023-162","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-162.yaml"}},{"id":"PYSEC-2023-163","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/numexpr/PYSEC-2023-163.yaml"}}],"advisories":[{"title":"CVE-2023-39631","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39631"},{"title":"GitHub Advisory PYSEC-2023-162","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-162.yaml"},{"title":"GitHub Advisory PYSEC-2023-163","url":"https://github.com/pypa/advisory-database/tree/main/vulns/numexpr/PYSEC-2023-163.yaml"}],"cwes":[94],"description":"Langchain vulnerable to arbitrary code execution via the evaluate function in the numexpr library","detail":"# Langchain vulnerable to arbitrary code execution via the evaluate function in the numexpr library An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary code via the evaluate function in the numexpr library. Patches: Released in v.0.0.308. numexpr dependency is optional for langchain. ## Related CVE(s) CVE-2023-39631, PYSEC-2023-162, PYSEC-2023-163","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2023-09-01T18:30:41","updated":"2025-02-20T23:01:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-38860","bom-ref":"CVE-2023-38860/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.247|!=0.0.247","status":"affected"},{"version":"0.0.247","status":"unaffected"}]}],"recommendation":"Update to version 0.0.247 to resolve CVE-2023-38860 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38860","name":"NVD"},"references":[{"id":"CVE-2023-38860","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38860","name":"NVD"}},{"id":"PYSEC-2023-145","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-145.yaml"}}],"advisories":[{"title":"CVE-2023-38860","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38860"},{"title":"GitHub Advisory PYSEC-2023-145","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-145.yaml"}],"cwes":[94],"description":"LangChain vulnerable to arbitrary code execution","detail":"# LangChain vulnerable to arbitrary code execution An issue in LangChain prior to v.0.0.247 allows a remote attacker to execute arbitrary code via the prompt parameter. ## Related CVE(s) CVE-2023-38860, PYSEC-2023-145","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-08-15T18:31:32","updated":"2024-09-27T18:01:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-29374","bom-ref":"CVE-2023-29374/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-29374. Updating to version 0.2.5 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-29374","name":"NVD"},"references":[{"id":"PYSEC-2023-18","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-18.yaml"}},{"id":"CVE-2023-29374","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-29374","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2023-18","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-18.yaml"},{"title":"CVE-2023-29374","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-29374"}],"cwes":[74,94],"description":"LangChain vulnerable to code injection","detail":"# LangChain vulnerable to code injection In LangChain through 0.0.131, the `LLMMathChain` chain allows prompt injection attacks that can execute arbitrary code via the Python `exec()` method. ## Related CVE(s) CVE-2023-29374, PYSEC-2023-18","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-04-05T03:30:17","updated":"2025-02-12T18:43:20","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-36095","bom-ref":"CVE-2023-36095/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.236|!=0.0.236","status":"affected"},{"version":"0.0.236","status":"unaffected"}]}],"recommendation":"Update to version 0.0.236 to resolve CVE-2023-36095 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36095","name":"NVD"},"references":[{"id":"PYSEC-2023-138","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-138.yaml"}},{"id":"CVE-2023-36095","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36095","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2023-138","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-138.yaml"},{"title":"CVE-2023-36095","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36095"}],"cwes":[94],"description":"langchain Code Injection vulnerability","detail":"# langchain Code Injection vulnerability An issue in Harrison Chase langchain allows an attacker to execute arbitrary code via the PALChain,from_math_prompt(llm).run in the python exec method. ## Related CVE(s) CVE-2023-36095, PYSEC-2023-138","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-08-05T03:30:19","updated":"2024-09-27T18:01:36","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-28088","bom-ref":"CVE-2024-28088/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.339|!=0.0.339","status":"affected"},{"version":"0.0.339","status":"unaffected"}]}],"recommendation":"Update to version 0.0.339 to resolve CVE-2024-28088 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28088","name":"NVD"},"references":[{"id":"PYSEC-2024-43","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-43.yaml"}},{"id":"CVE-2024-28088","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28088","name":"NVD"}},{"id":"PYSEC-2024-45","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain-core/PYSEC-2024-45.yaml"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2024-43","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-43.yaml"},{"title":"CVE-2024-28088","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28088"},{"title":"GitHub Advisory PYSEC-2024-45","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain-core/PYSEC-2024-45.yaml"}],"cwes":[],"description":"LangChain directory traversal vulnerability","detail":"# LangChain directory traversal vulnerability LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. ## Related CVE(s) CVE-2024-28088, PYSEC-2024-43, PYSEC-2024-45","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2024-03-04T00:30:53","updated":"2024-12-03T05:59:19","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-0243","bom-ref":"CVE-2024-0243/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.1.0|!=0.1.0","status":"affected"},{"version":"0.1.0","status":"unaffected"}]}],"recommendation":"Update to version 0.1.0 to resolve CVE-2024-0243 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0243","name":"NVD"},"references":[{"id":"370904e7-10ac-40a4-a8d4-e2d16e1ca861","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861"}},{"id":"PYSEC-2024-235","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain-exa/PYSEC-2024-235.yaml"}},{"id":"CVE-2024-0243","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0243","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 370904e7-10ac-40a4-a8d4-e2d16e1ca861","url":"https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861"},{"title":"GitHub Advisory PYSEC-2024-235","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain-exa/PYSEC-2024-235.yaml"},{"title":"CVE-2024-0243","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0243"}],"cwes":[918],"description":"langchain Server-Side Request Forgery vulnerability","detail":"# langchain Server-Side Request Forgery vulnerability With the following crawler configuration: ```python from bs4 import BeautifulSoup as Soup url = \"https://example.com\" loader = RecursiveUrlLoader( url=url, max_depth=2, extractor=lambda x: Soup(x, \"html.parser\").text ) docs = loader.load() ``` An attacker in control of the contents of `https://example.com` could place a malicious HTML file in there with links like \"https://example.completely.different/my_file.html\" and the crawler would proceed to download that file as well even though `prevent_outside=True`. https://github.com/langchain-ai/langchain/blob/bf0b3cc0b5ade1fb95a5b1b6fa260e99064c2e22/libs/community/langchain_community/document_loaders/recursive_url_loader.py#L51-L51 Resolved in https://github.com/langchain-ai/langchain/pull/15559 ## Related CVE(s) CVE-2024-0243, PYSEC-2024-235","ratings":[{"method":"CVSSv3","severity":"low","score":3.7,"vector":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N"}],"published":"2024-02-26T18:30:29","updated":"2025-02-26T22:32:54","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-39659","bom-ref":"CVE-2023-39659/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.325|!=0.0.325","status":"affected"},{"version":"0.0.325","status":"unaffected"}]}],"recommendation":"Update to version 0.0.325 to resolve CVE-2023-39659 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39659","name":"NVD"},"references":[{"id":"CVE-2023-39659","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39659","name":"NVD"}},{"id":"PYSEC-2023-147","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-147.yaml"}}],"advisories":[{"title":"CVE-2023-39659","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39659"},{"title":"GitHub Advisory PYSEC-2023-147","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-147.yaml"}],"cwes":[74],"description":"LangChain vulnerable to arbitrary code execution","detail":"# LangChain vulnerable to arbitrary code execution An issue in langchain langchain-ai before version 0.0.325 allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component. ## Related CVE(s) CVE-2023-39659, PYSEC-2023-147","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-08-15T18:31:32","updated":"2024-09-27T21:33:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-3571","bom-ref":"CVE-2024-3571/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.353|!=0.0.353","status":"affected"},{"version":"0.0.353","status":"unaffected"}]}],"recommendation":"Update to version 0.0.353 to resolve CVE-2024-3571 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3571","name":"NVD"},"references":[{"id":"2df3acdc-ee4f-4257-bbf8-a7de3870a9d8","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/2df3acdc-ee4f-4257-bbf8-a7de3870a9d8"}},{"id":"CVE-2024-3571","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3571","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 2df3acdc-ee4f-4257-bbf8-a7de3870a9d8","url":"https://huntr.com/bounties/2df3acdc-ee4f-4257-bbf8-a7de3870a9d8"},{"title":"CVE-2024-3571","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3571"}],"cwes":[22],"description":"langchain vulnerable to path traversal","detail":"# langchain vulnerable to path traversal langchain-ai/langchain is vulnerable to path traversal due to improper limitation of a pathname to a restricted directory ('Path Traversal') in its LocalFileStore functionality. An attacker can leverage this vulnerability to read or write files anywhere on the filesystem, potentially leading to information disclosure or remote code execution. The issue lies in the handling of file paths in the mset and mget methods, where user-supplied input is not adequately sanitized, allowing directory traversal sequences to reach unintended directories.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-04-16T00:30:34","updated":"2024-04-16T18:42:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-34540","bom-ref":"CVE-2023-34540/pkg:pypi/langchain","affects":[{"ref":"pkg:pypi/langchain","versions":[{"range":"vers:pypi/>=0.0.1|<=0.0.99rc0|<0.0.225|!=0.0.225","status":"affected"},{"version":"0.0.225","status":"unaffected"}]}],"recommendation":"Update to version 0.0.225 to resolve CVE-2023-34540 or update to version 0.2.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34540","name":"NVD"},"references":[{"id":"CVE-2023-34540","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34540","name":"NVD"}},{"id":"PYSEC-2023-91","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-91.yaml"}}],"advisories":[{"title":"CVE-2023-34540","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34540"},{"title":"GitHub Advisory PYSEC-2023-91","url":"https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-91.yaml"}],"cwes":[78],"description":"Langchain OS Command Injection vulnerability","detail":"# Langchain OS Command Injection vulnerability Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the \"releases/tag\" reference, a fix is available. ## Related CVE(s) CVE-2023-34540, PYSEC-2023-91","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2023-06-14T15:30:39","updated":"2025-02-21T05:28:32","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/langchain-community@0.3.29\", \"pkg:pypi/langchain-core@0.3.75\", \"pkg:pypi/langchain-openai@0.3.32\", \"pkg:pypi/langchain-text-splitters@0.3.11\", \"pkg:pypi/langchain@0.3.27\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-4888","bom-ref":"CVE-2024-4888/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.35.36|!=1.35.36","status":"affected"},{"version":"1.35.36","status":"unaffected"}]}],"recommendation":"Update to version 1.35.36 to resolve CVE-2024-4888 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4888","name":"NVD"},"references":[{"id":"CVE-2024-4888","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4888","name":"NVD"}},{"id":"48461d89-cf13-4ad3-a43e-0d37da08fc6c","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c"}}],"advisories":[{"title":"CVE-2024-4888","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4888"},{"title":"Huntr Advisory 48461d89-cf13-4ad3-a43e-0d37da08fc6c","url":"https://huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c"}],"cwes":[20,862],"description":"Arbitrary file deletion in litellm","detail":"# Arbitrary file deletion in litellm BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.","ratings":[{"method":"CVSSv4","severity":"high","score":7.0,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-06-06T21:30:37","updated":"2024-11-04T15:32:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-2952","bom-ref":"CVE-2024-2952/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.34.42|!=1.34.42","status":"affected"},{"version":"1.34.42","status":"unaffected"}]}],"recommendation":"Update to version 1.34.42 to resolve CVE-2024-2952 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2952","name":"NVD"},"references":[{"id":"CVE-2024-2952","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2952","name":"NVD"}},{"id":"a9e0a164-6de0-43a4-a640-0cbfb54220a4","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4"}}],"advisories":[{"title":"CVE-2024-2952","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2952"},{"title":"Huntr Advisory a9e0a164-6de0-43a4-a640-0cbfb54220a4","url":"https://huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4"}],"cwes":[76],"description":"LiteLLM has Server-Side Template Injection vulnerability in /completions endpoint","detail":"# LiteLLM has Server-Side Template Injection vulnerability in /completions endpoint BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` parameter from the `tokenizer_config.json` file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious `tokenizer_config.json` files that execute arbitrary code on the server.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-04-10T18:30:48","updated":"2024-04-11T16:01:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-6825","bom-ref":"CVE-2024-6825/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=1.40.3.dev2|<=1.40.12","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-6825. Updating to version 1.61.15 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6825","name":"NVD"},"references":[{"id":"CVE-2024-6825","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6825","name":"NVD"}},{"id":"1d98bebb-6cf4-46c9-87c3-d3b1972973b5","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/1d98bebb-6cf4-46c9-87c3-d3b1972973b5"}}],"advisories":[{"title":"CVE-2024-6825","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6825"},{"title":"Huntr Advisory 1d98bebb-6cf4-46c9-87c3-d3b1972973b5","url":"https://huntr.com/bounties/1d98bebb-6cf4-46c9-87c3-d3b1972973b5"}],"cwes":[77],"description":"LiteLLM Vulnerable to Remote Code Execution (RCE)","detail":"# LiteLLM Vulnerable to Remote Code Execution (RCE) BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' mark, with the last part considered the function name and the remaining part appended with the '.py' extension and imported. This allows an attacker to set a system method, such as 'os.system', as a callback, enabling the execution of arbitrary commands when a chat response is processed.","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2025-03-20T12:32:45","updated":"2025-03-20T20:18:45","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-4264","bom-ref":"CVE-2024-4264/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-4264. Updating to version 1.61.15 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4264","name":"NVD"},"references":[{"id":"a3221b0c-6e25-4295-ab0f-042997e8fc61","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/a3221b0c-6e25-4295-ab0f-042997e8fc61"}},{"id":"CVE-2024-4264","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4264","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory a3221b0c-6e25-4295-ab0f-042997e8fc61","url":"https://huntr.com/bounties/a3221b0c-6e25-4295-ab0f-042997e8fc61"},{"title":"CVE-2024-4264","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4264"}],"cwes":[94],"description":"litellm passes untrusted data to `eval` function without sanitization","detail":"# litellm passes untrusted data to `eval` function without sanitization A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()` method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the `eval` function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the `/config/update` endpoint, which allows for the update of settings in `proxy_server_config.yaml`.","ratings":[{"method":"CVSSv31","severity":"high","score":7.2,"vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-05-18T00:30:42","updated":"2024-05-20T16:56:55","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-0330","bom-ref":"CVE-2025-0330/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-0330. Updating to version 1.61.15 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0330","name":"NVD"},"references":[{"id":"CVE-2025-0330","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0330","name":"NVD"}},{"id":"661b388a-44d8-4ad5-862b-4dc5b80be30a","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/661b388a-44d8-4ad5-862b-4dc5b80be30a"}}],"advisories":[{"title":"CVE-2025-0330","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0330"},{"title":"Huntr Advisory 661b388a-44d8-4ad5-862b-4dc5b80be30a","url":"https://huntr.com/bounties/661b388a-44d8-4ad5-862b-4dc5b80be30a"}],"cwes":[1230],"description":"LiteLLM Has a Leakage of Langfuse API Keys","detail":"# LiteLLM Has a Leakage of Langfuse API Keys In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. This vulnerability exposes sensitive information, including langfuse_secret and langfuse_public_key, which can provide full access to the Langfuse project storing all requests.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2025-03-20T12:32:52","updated":"2025-03-20T21:19:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-4890","bom-ref":"CVE-2024-4890/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-4890. Updating to version 1.61.15 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4890","name":"NVD"},"references":[{"id":"a4f6d357-5b44-4e00-9cac-f1cc351211d2","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/a4f6d357-5b44-4e00-9cac-f1cc351211d2"}},{"id":"CVE-2024-4890","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4890","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory a4f6d357-5b44-4e00-9cac-f1cc351211d2","url":"https://huntr.com/bounties/a4f6d357-5b44-4e00-9cac-f1cc351211d2"},{"title":"CVE-2024-4890","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4890"}],"cwes":[89],"description":"SQL injection in litellm","detail":"# SQL injection in litellm A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by injecting malicious SQL commands through the 'user_id' parameter, leading to potential unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. The affected version is 1.27.14.","ratings":[{"method":"CVSSv3","severity":"medium","score":4.9,"vector":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-06-06T21:30:37","updated":"2024-06-06T23:12:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-8984","bom-ref":"CVE-2024-8984/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.56.2|!=1.56.2","status":"affected"},{"version":"1.56.2","status":"unaffected"}]}],"recommendation":"Update to version 1.56.2 to resolve CVE-2024-8984 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8984","name":"NVD"},"references":[{"id":"CVE-2024-8984","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8984","name":"NVD"}},{"id":"554fc76b-3097-4223-b4cf-110b853e9355","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/554fc76b-3097-4223-b4cf-110b853e9355"}}],"advisories":[{"title":"CVE-2024-8984","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8984"},{"title":"Huntr Advisory 554fc76b-3097-4223-b4cf-110b853e9355","url":"https://huntr.com/bounties/554fc76b-3097-4223-b4cf-110b853e9355"}],"cwes":[400],"description":"LiteLLM Vulnerable to Denial of Service (DoS) via Crafted HTTP Request","detail":"# LiteLLM Vulnerable to Denial of Service (DoS) via Crafted HTTP Request A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:49","updated":"2025-04-08T15:04:18","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-0628","bom-ref":"CVE-2025-0628/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.61.15|!=1.61.15","status":"affected"},{"version":"1.61.15","status":"unaffected"}]}],"recommendation":"Update to version 1.61.15.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0628","name":"NVD"},"references":[{"id":"6c0e2f75-2d03-42f9-9530-e16a973317fc","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/6c0e2f75-2d03-42f9-9530-e16a973317fc"}},{"id":"CVE-2025-0628","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0628","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 6c0e2f75-2d03-42f9-9530-e16a973317fc","url":"https://huntr.com/bounties/6c0e2f75-2d03-42f9-9530-e16a973317fc"},{"title":"CVE-2025-0628","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0628"}],"cwes":[285],"description":"LiteLLM Has an Improper Authorization Vulnerability","detail":"# LiteLLM Has an Improper Authorization Vulnerability An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.","ratings":[{"method":"CVSSv3","severity":"high","score":8.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"published":"2025-03-20T12:32:52","updated":"2025-03-20T21:19:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-6587","bom-ref":"CVE-2024-6587/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.44.8|!=1.44.8","status":"affected"},{"version":"1.44.8","status":"unaffected"}]}],"recommendation":"Update to version 1.44.8 to resolve CVE-2024-6587 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6587","name":"NVD"},"references":[{"id":"CVE-2024-6587","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6587","name":"NVD"}},{"id":"4001e1a2-7b7a-4776-a3ae-e6692ec3d997","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/4001e1a2-7b7a-4776-a3ae-e6692ec3d997"}}],"advisories":[{"title":"CVE-2024-6587","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6587"},{"title":"Huntr Advisory 4001e1a2-7b7a-4776-a3ae-e6692ec3d997","url":"https://huntr.com/bounties/4001e1a2-7b7a-4776-a3ae-e6692ec3d997"}],"cwes":[918],"description":"LiteLLM Server-Side Request Forgery (SSRF) vulnerability","detail":"# LiteLLM Server-Side Request Forgery (SSRF) vulnerability A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the request to the domain specified by `api_base`. This request includes the OpenAI API key. A malicious user can set the `api_base` to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key.","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2024-09-13T18:31:47","updated":"2024-09-13T19:42:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-9606","bom-ref":"CVE-2024-9606/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.44.12|!=1.44.12","status":"affected"},{"version":"1.44.12","status":"unaffected"}]}],"recommendation":"Update to version 1.44.12 to resolve CVE-2024-9606 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9606","name":"NVD"},"references":[{"id":"4a03796f-a8d4-4293-84ef-d3959456223a","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/4a03796f-a8d4-4293-84ef-d3959456223a"}},{"id":"CVE-2024-9606","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9606","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 4a03796f-a8d4-4293-84ef-d3959456223a","url":"https://huntr.com/bounties/4a03796f-a8d4-4293-84ef-d3959456223a"},{"title":"CVE-2024-9606","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9606"}],"cwes":[117],"description":"LiteLLM Reveals Portion of API Key via a Logging File","detail":"# LiteLLM Reveals Portion of API Key via a Logging File In berriai/litellm before version 1.44.12, the `litellm/litellm_core_utils/litellm_logging.py` file contains a vulnerability where the API key masking code only masks the first 5 characters of the key. This results in the leakage of almost the entire API key in the logs, exposing a significant amount of the secret key. The issue affects version v1.44.9.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2025-03-20T12:32:51","updated":"2025-03-20T21:19:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-5751","bom-ref":"CVE-2024-5751/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.40.16|!=1.40.16","status":"affected"},{"version":"1.40.16","status":"unaffected"}]}],"recommendation":"Update to version 1.40.16 to resolve CVE-2024-5751 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5751","name":"NVD"},"references":[{"id":"ae623c2f-b64b-4245-9ed4-f13a0a5824ce","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/ae623c2f-b64b-4245-9ed4-f13a0a5824ce"}},{"id":"CVE-2024-5751","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5751","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory ae623c2f-b64b-4245-9ed4-f13a0a5824ce","url":"https://huntr.com/bounties/ae623c2f-b64b-4245-9ed4-f13a0a5824ce"},{"title":"CVE-2024-5751","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5751"}],"cwes":[94],"description":"litellm vulnerable to remote code execution based on using eval unsafely","detail":"# litellm vulnerable to remote code execution based on using eval unsafely BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the `add_deployment` function, which decodes and decrypts environment variables from base64 and assigns them to `os.environ`. An attacker can exploit this by sending a malicious payload to the `/config/update` endpoint, which is then processed and executed by the server when the `get_secret` function is triggered. This requires the server to use Google KMS and a database to store a model.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-06-27T21:32:08","updated":"2024-06-28T22:00:46","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-10188","bom-ref":"CVE-2024-10188/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.53.1.dev1|!=1.53.1.dev1","status":"affected"},{"version":"1.53.1.dev1","status":"unaffected"}]}],"recommendation":"Update to version 1.53.1.dev1 to resolve CVE-2024-10188 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10188","name":"NVD"},"references":[{"id":"CVE-2024-10188","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10188","name":"NVD"}},{"id":"96a32812-213c-4819-ba4e-36143d35e95b","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/96a32812-213c-4819-ba4e-36143d35e95b"}}],"advisories":[{"title":"CVE-2024-10188","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10188"},{"title":"Huntr Advisory 96a32812-213c-4819-ba4e-36143d35e95b","url":"https://huntr.com/bounties/96a32812-213c-4819-ba4e-36143d35e95b"}],"cwes":[400],"description":"LiteLLM Vulnerable to Denial of Service (DoS)","detail":"# LiteLLM Vulnerable to Denial of Service (DoS) A vulnerability in BerriAI/litellm, as of commit 26c03c9, allows unauthenticated users to cause a Denial of Service (DoS) by exploiting the use of ast.literal_eval to parse user input. This function is not safe and is prone to DoS attacks, which can crash the litellm Python server.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-03-20T12:32:38","updated":"2025-03-20T19:38:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-5225","bom-ref":"CVE-2024-5225/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.40.0|!=1.40.0","status":"affected"},{"version":"1.40.0","status":"unaffected"}]}],"recommendation":"Update to version 1.40.0 to resolve CVE-2024-5225 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5225","name":"NVD"},"references":[{"id":"491e4884-0306-4cd4-8fe2-9a19de33bf5c","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/491e4884-0306-4cd4-8fe2-9a19de33bf5c"}},{"id":"CVE-2024-5225","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5225","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 491e4884-0306-4cd4-8fe2-9a19de33bf5c","url":"https://huntr.com/bounties/491e4884-0306-4cd4-8fe2-9a19de33bf5c"},{"title":"CVE-2024-5225","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5225"}],"cwes":[89],"description":"SQL injection in litellm","detail":"# SQL injection in litellm An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated `api_key` parameter directly into the query, making it susceptible to SQL Injection if the `api_key` contains malicious data. This issue affects the latest version of the repository. Successful exploitation of this vulnerability could lead to unauthorized access, data manipulation, exposure of confidential information, and denial of service (DoS).","ratings":[{"method":"CVSSv3","severity":"medium","score":6.4,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"}],"published":"2024-06-06T21:30:37","updated":"2024-06-06T23:12:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-5710","bom-ref":"CVE-2024-5710/pkg:pypi/litellm","affects":[{"ref":"pkg:pypi/litellm","versions":[{"range":"vers:pypi/>=0.1.0|<=1.9.dev0|<1.40.15|!=1.40.15","status":"affected"},{"version":"1.40.15","status":"unaffected"}]}],"recommendation":"Update to version 1.40.15 to resolve CVE-2024-5710 or update to version 1.61.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5710","name":"NVD"},"references":[{"id":"70897f59-a966-4d93-b71e-745e3da91970","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/70897f59-a966-4d93-b71e-745e3da91970"}},{"id":"CVE-2024-5710","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5710","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 70897f59-a966-4d93-b71e-745e3da91970","url":"https://huntr.com/bounties/70897f59-a966-4d93-b71e-745e3da91970"},{"title":"CVE-2024-5710","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5710"}],"cwes":[284],"description":"litellm vulnerable to improper access control in team management","detail":"# litellm vulnerable to improper access control in team management berriai/litellm version 1.34.34 is vulnerable to improper access control in its team management functionality. This vulnerability allows attackers to perform unauthorized actions such as creating, updating, viewing, deleting, blocking, and unblocking any teams, as well as adding or deleting any member to or from any teams. The vulnerability stems from insufficient access control checks in various team management endpoints, enabling attackers to exploit these functionalities without proper authorization.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"published":"2024-06-27T21:32:08","updated":"2024-07-05T18:23:10","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/banks@2.2.0\", \"pkg:pypi/litellm@1.76.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-24816","bom-ref":"CVE-2023-24816/pkg:pypi/ipython@8.7.0","affects":[{"ref":"pkg:pypi/ipython@8.7.0","versions":[{"range":"vers:pypi/>=0.10|<=8.9.0|<8.10.0|!=8.10.0","status":"affected"},{"version":"8.10.0","status":"unaffected"}]}],"recommendation":"Update to version 8.10.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24816","name":"NVD"},"references":[{"id":"GHSA-29gw-9793-fvw7","source":{"name":"GitHub Advisory","url":"https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7"}},{"id":"CVE-2023-24816","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24816","name":"NVD"}},{"id":"PYSEC-2023-17","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/ipython/PYSEC-2023-17.yaml"}}],"advisories":[{"title":"GitHub Advisory GHSA-29gw-9793-fvw7","url":"https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7"},{"title":"CVE-2023-24816","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24816"},{"title":"GitHub Advisory PYSEC-2023-17","url":"https://github.com/pypa/advisory-database/tree/main/vulns/ipython/PYSEC-2023-17.yaml"}],"cwes":[20,78],"description":"IPython vulnerable to command injection via set_term_title","detail":"# IPython vulnerable to command injection via set_term_title IPython provides an interactive Python shell and Jupyter kernel to use Python interactively. Versions prior to 8.10.0 are vulnerable to command injection in the `set_term_title` [function](https://github.com/ipython/ipython/blob/3f0bf05f072a91b2a3042d23ce250e5e906183fd/IPython/utils/terminal.py#L103-L117) under specific conditions. This has been patched in version 8.10.0. ### Impact Users are only vulnerable when calling this function in Windows in a Python environment where [ctypes](https://docs.python.org/3/library/ctypes.html) is not available. The dependency on ctypes in `IPython.utils._process_win32` prevents the vulnerable code from ever being reached (making it effectively dead code). However, as a library that could be used by another tool, `set_term_title` could introduce a vulnerability for dependencies. Currently `set_term_title` is only called with (semi-)trusted input that contain the current working directory of the current IPython session. If an attacker can control directory names, and manage to get a user to `cd` into this directory, then the attacker can execute arbitrary commands contained in the folder names.","ratings":[{"method":"CVSSv4","severity":"low","score":2.0,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"}],"published":"2023-02-10T19:55:53","updated":"2025-02-15T05:26:10","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-1550","bom-ref":"CVE-2025-1550/pkg:pypi/keras","affects":[{"ref":"pkg:pypi/keras","versions":[{"range":"vers:pypi/>=3.0.0|<3.9.0|!=3.9.0","status":"affected"},{"version":"3.9.0","status":"unaffected"}]}],"recommendation":"Update to version 3.9.0 to resolve CVE-2025-1550 or update to version 3.11.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1550","name":"NVD"},"references":[{"id":"CVE-2025-1550","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1550","name":"NVD"}},{"id":"GHSA-48g7-3x6r-xfhp","source":{"name":"GitHub Advisory","url":"https://github.com/keras-team/keras/security/advisories/GHSA-48g7-3x6r-xfhp"}}],"advisories":[{"title":"CVE-2025-1550","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1550"},{"title":"GitHub Advisory GHSA-48g7-3x6r-xfhp","url":"https://github.com/keras-team/keras/security/advisories/GHSA-48g7-3x6r-xfhp"}],"cwes":[94],"description":"Arbitrary Code Execution via Crafted Keras Config for Model Loading","detail":"# Arbitrary Code Execution via Crafted Keras Config for Model Loading ### Impact The Keras `Model.load_model` function permits arbitrary code execution, even with `safe_mode=True`, through a manually constructed, malicious `.keras` archive. By altering the `config.json` file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading. ### Patches This problem is fixed starting with version `3.9`. ### Workarounds Only load models from trusted sources and model archives created with Keras. ### References - https://www.cve.org/cverecord?id=CVE-2025-1550 - https://github.com/keras-team/keras/pull/20751","ratings":[{"method":"CVSSv4","severity":"high","score":7.3,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"}],"published":"2025-03-11T20:07:32","updated":"2025-03-11T20:27:01","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/tensorflow@2.16.2\", \"pkg:pypi/keras@3.11.3\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-8747","bom-ref":"CVE-2025-8747/pkg:pypi/keras","affects":[{"ref":"pkg:pypi/keras","versions":[{"range":"vers:pypi/>=3.0.0|<3.11.0|!=3.11.0","status":"affected"},{"version":"3.11.0","status":"unaffected"}]}],"recommendation":"Update to version 3.11.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-8747","name":"NVD"},"references":[{"id":"GHSA-c9rc-mg46-23w3","source":{"name":"GitHub Advisory","url":"https://github.com/keras-team/keras/security/advisories/GHSA-c9rc-mg46-23w3"}},{"id":"CVE-2025-8747","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-8747","name":"NVD"}},{"id":"keras-safe_mode-bypass-vulnerability","source":{"name":"JFrog Advisory","url":"https://jfrog.com/blog/keras-safe_mode-bypass-vulnerability"}}],"advisories":[{"title":"GitHub Advisory GHSA-c9rc-mg46-23w3","url":"https://github.com/keras-team/keras/security/advisories/GHSA-c9rc-mg46-23w3"},{"title":"CVE-2025-8747","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-8747"},{"title":"JFrog Advisory keras-safe_mode-bypass-vulnerability","url":"https://jfrog.com/blog/keras-safe_mode-bypass-vulnerability"}],"cwes":[502],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv31","severity":"high","score":8.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2025-08-12T19:33:07","updated":"2025-08-12T20:27:29","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/tensorflow@2.16.2\", \"pkg:pypi/keras@3.11.3\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-55459","bom-ref":"CVE-2024-55459/pkg:pypi/keras","affects":[{"ref":"pkg:pypi/keras","versions":[{"range":"vers:pypi/>=0.2.0|<=3.7.0","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-55459. Updating to version 3.11.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-55459","name":"NVD"},"references":[{"id":"CVE-2024-55459","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-55459","name":"NVD"}}],"advisories":[{"title":"CVE-2024-55459","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-55459"}],"cwes":[22],"description":"keras Path Traversal vulnerability","detail":"# keras Path Traversal vulnerability An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function.","ratings":[{"method":"CVSSv4","severity":"medium","score":5.5,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"}],"published":"2025-01-08T18:30:48","updated":"2025-01-08T20:12:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/tensorflow@2.16.2\", \"pkg:pypi/keras@3.11.3\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-3660","bom-ref":"CVE-2024-3660/pkg:pypi/keras","affects":[{"ref":"pkg:pypi/keras","versions":[{"range":"vers:pypi/>=0.2.0|<=2.9.0rc2|<2.13.1rc0|!=2.13.1rc0","status":"affected"},{"version":"2.13.1rc0","status":"unaffected"}]}],"recommendation":"Update to version 2.13.1rc0 to resolve CVE-2024-3660 or update to version 3.11.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3660","name":"NVD"},"references":[{"id":"253266","source":{"name":"Cert Advisory","url":"https://kb.cert.org/vuls/id/253266"}},{"id":"CVE-2024-3660","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3660","name":"NVD"}},{"id":"253266","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/253266"}}],"advisories":[{"title":"Cert Advisory 253266","url":"https://kb.cert.org/vuls/id/253266"},{"title":"CVE-2024-3660","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3660"},{"title":"Cert Advisory 253266","url":"https://www.kb.cert.org/vuls/id/253266"}],"cwes":[94],"description":"Keras code injection vulnerability","detail":"# Keras code injection vulnerability A arbitrary code injection vulnerability in TensorFlow's Keras framework (<2.13) allows attackers to execute arbitrary code with the same permissions as the application using a model that allow arbitrary code irrespective of the application.","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-04-16T21:31:28","updated":"2024-08-02T16:42:04","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/tensorflow@2.16.2\", \"pkg:pypi/keras@3.11.3\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-23j4-mw76-5v7h","bom-ref":"GHSA-23j4-mw76-5v7h/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=0.10.4.2364|<=2.9.0|<2.11.2|!=2.11.2","status":"affected"},{"version":"2.11.2","status":"unaffected"}]}],"recommendation":"Update to version 2.11.2.","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-23j4-mw76-5v7h"},"references":[{"id":"GHSA-23j4-mw76-5v7h","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-23j4-mw76-5v7h"}}],"advisories":[{"title":"GitHub Advisory GHSA-23j4-mw76-5v7h","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-23j4-mw76-5v7h"}],"cwes":[552],"description":"Scrapy allows redirect following in protocols other than HTTP","detail":"# Scrapy allows redirect following in protocols other than HTTP ### Impact Scrapy was following redirects regardless of the URL protocol, so redirects were working for `data://`, `file://`, `ftp://`, `s3://`, and any other scheme defined in the `DOWNLOAD_HANDLERS` setting. However, HTTP redirects should only work between URLs that use the `http://` or `https://` schemes. A malicious actor, given write access to the start requests (e.g. ability to define `start_urls`) of a spider and read access to the spider output, could exploit this vulnerability to: - Redirect to any local file using the `file://` scheme to read its contents. - Redirect to an `ftp://` URL of a malicious FTP server to obtain the FTP username and password configured in the spider or project. - Redirect to any `s3://` URL to read its content using the S3 credentials configured in the spider or project. For `file://` and `s3://`, how the spider implements its parsing of input data into an output item determines what data would be vulnerable. A spider that always outputs the entire contents of a response would be completely vulnerable, while a spider that extracted only fragments from the response could significantly limit vulnerable data. ### Patches Upgrade to Scrapy 2.11.2. ### Workarounds Replace the built-in retry middlewares (`RedirectMiddleware` and `MetaRefreshMiddleware`) with custom ones that implement the fix from Scrapy 2.11.2, and verify that they work as intended. ### References This security issue was reported by @mvsantos at https://github.com/scrapy/scrapy/issues/457.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-05-14T20:14:49","updated":"2024-11-28T05:42:50","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-1968","bom-ref":"CVE-2024-1968/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=0.10.4.2364|<=2.9.0|<2.11.2|!=2.11.2","status":"affected"},{"version":"2.11.2","status":"unaffected"}]}],"recommendation":"Update to version 2.11.2.","source":{"name":"Mitre"},"references":[{"id":"27f6a021-a891-446a-ada5-0226d619dd1a","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/27f6a021-a891-446a-ada5-0226d619dd1a"}},{"id":"GHSA-4qqq-9vqf-3h3f","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-4qqq-9vqf-3h3f"}}],"advisories":[{"title":"Huntr Advisory 27f6a021-a891-446a-ada5-0226d619dd1a","url":"https://huntr.com/bounties/27f6a021-a891-446a-ada5-0226d619dd1a"},{"title":"GitHub Advisory GHSA-4qqq-9vqf-3h3f","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-4qqq-9vqf-3h3f"}],"cwes":[200],"description":"Scrapy leaks the authorization header on same-domain but cross-origin redirects","detail":"# Scrapy leaks the authorization header on same-domain but cross-origin redirects ### Impact Since version 2.11.1, Scrapy drops the `Authorization` header when a request is redirected to a different domain. However, it keeps the header if the domain remains the same but the scheme (http/https) or the port change, all scenarios where the header should also be dropped. In the context of a man-in-the-middle attack, this could be used to get access to the value of that `Authorization` header ### Patches Upgrade to Scrapy 2.11.2. ### Workarounds There is no easy workaround for unpatched versions of Scrapy. You can replace the built-in redirect middlewares with custom ones patched for this issue, but you have to patch them yourself, manually. ### References This security issue was reported and fixed by @szarny at https://huntr.com/bounties/27f6a021-a891-446a-ada5-0226d619dd1a/. ## Related CVE(s) CVE-2024-1968, PYSEC-2024-258","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-05-14T20:14:33","updated":"2025-07-15T18:12:02","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-3572","bom-ref":"CVE-2024-3572/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=2.0.0|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2024-3572 or update to version 2.11.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3572","name":"NVD"},"references":[{"id":"c4a0fac9-0c5a-4718-9ee4-2d06d58adabb","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb"}},{"id":"CVE-2024-3572","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3572","name":"NVD"}},{"id":"GHSA-7j7m-v7m3-jqm7","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-7j7m-v7m3-jqm7"}}],"advisories":[{"title":"Huntr Advisory c4a0fac9-0c5a-4718-9ee4-2d06d58adabb","url":"https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb"},{"title":"CVE-2024-3572","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3572"},{"title":"GitHub Advisory GHSA-7j7m-v7m3-jqm7","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-7j7m-v7m3-jqm7"}],"cwes":[409],"description":"Scrapy decompression bomb vulnerability","detail":"# Scrapy decompression bomb vulnerability ### Impact Scrapy limits allowed response sizes by default through the [`DOWNLOAD_MAXSIZE`](https://docs.scrapy.org/en/latest/topics/settings.html#download-maxsize) and [`DOWNLOAD_WARNSIZE`](https://docs.scrapy.org/en/latest/topics/settings.html#download-warnsize) settings. However, those limits were only being enforced during the download of the raw, usually-compressed response bodies, and not during decompression, making Scrapy vulnerable to [decompression bombs](https://cwe.mitre.org/data/definitions/409.html). A malicious website being scraped could send a small response that, on decompression, could exhaust the memory available to the Scrapy process, potentially affecting any other process sharing that memory, and affecting disk usage in case of uncompressed response caching. ### Patches Upgrade to Scrapy 2.11.1. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead. ### Workarounds There is no easy workaround. Disabling HTTP decompression altogether is impractical, as HTTP compression is a rather common practice. However, it is technically possible to manually backport the 2.11.1 or 1.8.4 fix, replacing the corresponding components of an unpatched version of Scrapy with patched versions copied into your own code. ### Acknowledgements This security issue was reported by @dmandefy [through huntr.com](https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb/).","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2024-02-16T16:07:13","updated":"2024-04-16T14:41:49","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-9x8m-2xpf-crp3","bom-ref":"GHSA-9x8m-2xpf-crp3/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=0.10.4.2364|<=1.8.2|<1.8.3|!=1.8.3","status":"affected"},{"version":"1.8.3","status":"unaffected"}]}],"recommendation":"Update to version 1.8.3 to resolve GHSA-9x8m-2xpf-crp3 or update to version 2.11.2 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-9x8m-2xpf-crp3"},"references":[{"id":"GHSA-9x8m-2xpf-crp3","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-9x8m-2xpf-crp3"}}],"advisories":[{"title":"GitHub Advisory GHSA-9x8m-2xpf-crp3","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-9x8m-2xpf-crp3"}],"cwes":[],"description":"Scrapy before 2.6.2 and 1.8.3 vulnerable to one proxy sending credentials to another","detail":"# Scrapy before 2.6.2 and 1.8.3 vulnerable to one proxy sending credentials to another ### Impact When the [built-in HTTP proxy downloader middleware](https://docs.scrapy.org/en/2.6/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpproxy) processes a request with `proxy` metadata, and that `proxy` metadata includes proxy credentials, the built-in HTTP proxy downloader middleware sets the `Proxy-Authentication` header, but only if that header is not already set. There are third-party proxy-rotation downloader middlewares that set different `proxy` metadata every time they process a request. Because of request retries and redirects, the same request can be processed by downloader middlewares more than once, including both the built-in HTTP proxy downloader middleware and any third-party proxy-rotation downloader middleware. These third-party proxy-rotation downloader middlewares could change the `proxy` metadata of a request to a new value, but fail to remove the `Proxy-Authentication` header from the previous value of the `proxy` metadata, causing the credentials of one proxy to be leaked to a different proxy. If you rotate proxies from different proxy providers, and any of those proxies requires credentials, you are affected, unless you are handling proxy rotation as described under **Workarounds** below. If you use a third-party downloader middleware for proxy rotation, the same applies to that downloader middleware, and installing a patched version of Scrapy may not be enough; patching that downloader middlware may be necessary as well. ### Patches Upgrade to Scrapy 2.6.2. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.6.2 is not an option, you may upgrade to Scrapy 1.8.3 instead. ### Workarounds If you cannot upgrade, make sure that any code that changes the value of the `proxy` request meta also removes the `Proxy-Authorization` header from the request if present. ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy/scrapy/issues) * [Email us](mailto:opensource@zyte.com)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"2022-07-29T22:26:57","updated":"2024-11-28T05:41:04","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-1892","bom-ref":"CVE-2024-1892/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=2|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2024-1892 or update to version 2.11.2 to resolve additional vulnerabilities for this package.","source":{"name":"Mitre"},"references":[{"id":"GHSA-cc65-xxvf-f7r9","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-cc65-xxvf-f7r9"}},{"id":"271f94f2-1e05-4616-ac43-41752389e26b","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b"}},{"id":"PYSEC-2024-162","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2024-162.yaml"}}],"advisories":[{"title":"GitHub Advisory GHSA-cc65-xxvf-f7r9","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-cc65-xxvf-f7r9"},{"title":"Huntr Advisory 271f94f2-1e05-4616-ac43-41752389e26b","url":"https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b"},{"title":"GitHub Advisory PYSEC-2024-162","url":"https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2024-162.yaml"}],"cwes":[1333],"description":"Scrapy vulnerable to ReDoS via XMLFeedSpider","detail":"# Scrapy vulnerable to ReDoS via XMLFeedSpider ### Impact The following parts of the Scrapy API were found to be vulnerable to a [ReDoS attack](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS): - The [`XMLFeedSpider`](https://docs.scrapy.org/en/latest/topics/spiders.html#scrapy.spiders.XMLFeedSpider) class or any subclass that uses the default node iterator: `iternodes`, as well as direct uses of the `scrapy.utils.iterators.xmliter` function. - **Scrapy 2.6.0 to 2.11.0**: The [`open_in_browser`](https://docs.scrapy.org/en/latest/topics/debug.html#scrapy.utils.response.open_in_browser) function for a response without a [base tag](https://www.w3schools.com/tags/tag_base.asp). Handling a malicious response could cause extreme CPU and memory usage during the parsing of its content, due to the use of vulnerable regular expressions for that parsing. ### Patches Upgrade to Scrapy 2.11.1. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead. ### Workarounds For `XMLFeedSpider`, switch the node iterator to ``xml`` or ``html``. For `open_in_browser`, before using the function, either manually review the response content to discard a ReDos attack or manually define the base tag to avoid its automatic definition by `open_in_browser` later. ### Acknowledgements This security issue was reported by @nicecatch2000 [through huntr.com](https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b/). ## Related CVE(s) CVE-2024-1892, PYSEC-2024-162","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2024-02-15T15:22:02","updated":"2025-01-14T17:20:10","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-0577","bom-ref":"CVE-2022-0577/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=0.10.4.2364|<=1.8.1|<1.8.2|!=1.8.2","status":"affected"},{"version":"1.8.2","status":"unaffected"}]}],"recommendation":"Update to version 1.8.2 to resolve CVE-2022-0577 or update to version 2.11.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0577","name":"NVD"},"references":[{"id":"GHSA-cjvr-mfj7-j4j8","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8"}},{"id":"CVE-2022-0577","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0577","name":"NVD"}},{"id":"debian-msg-msg00021","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html"}},{"id":"PYSEC-2022-159","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2022-159.yaml"}}],"advisories":[{"title":"GitHub Advisory GHSA-cjvr-mfj7-j4j8","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8"},{"title":"CVE-2022-0577","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0577"},{"title":"GitHub Advisory PYSEC-2022-159","url":"https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2022-159.yaml"}],"cwes":[200,863],"description":"Incorrect Authorization and Exposure of Sensitive Information to an Unauthorized Actor in scrapy","detail":"# Incorrect Authorization and Exposure of Sensitive Information to an Unauthorized Actor in scrapy ### Impact If you manually define cookies on a [`Request`](https://docs.scrapy.org/en/latest/topics/request-response.html#scrapy.http.Request) object, and that `Request` object gets a redirect response, the new `Request` object scheduled to follow the redirect keeps those user-defined cookies, regardless of the target domain. ### Patches Upgrade to Scrapy 2.6.0, which resets cookies when creating `Request` objects to follow redirects\u00b9, and drops the ``Cookie`` header if manually-defined if the redirect target URL domain name does not match the source URL domain name\u00b2. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.6.0 is not an option, you may upgrade to Scrapy 1.8.2 instead. \u00b9 At that point the original, user-set cookies have been processed by the cookie middleware into the global or request-specific cookiejar, with their domain restricted to the domain of the original URL, so when the cookie middleware processes the new (redirect) request it will incorporate those cookies into the new request as long as the domain of the new request matches the domain of the original request. \u00b2 This prevents cookie leaks to unintended domains even if the cookies middleware is not used. ### Workarounds If you cannot upgrade, set your cookies using a list of dictionaries instead of a single dictionary, as described in the [`Request` documentation](https://docs.scrapy.org/en/latest/topics/request-response.html#scrapy.http.Request), and set the right domain for each cookie. Alternatively, you can [disable cookies altogether](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#std-setting-COOKIES_ENABLED), or [limit target domains](https://docs.scrapy.org/en/latest/topics/spiders.html#scrapy.spiders.Spider.allowed_domains) to domains that you trust with all your user-set cookies. ### References * Originally reported at [huntr.dev](https://huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585/) ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy/scrapy/issues) * [Email us](mailto:opensource@zyte.com) ## Related CVE(s) CVE-2022-0577, PYSEC-2022-159","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2022-03-01T22:12:47","updated":"2024-10-22T17:04:45","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2024-3574","bom-ref":"CVE-2024-3574/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=2|<2.11.1|!=2.11.1","status":"affected"},{"version":"2.11.1","status":"unaffected"}]}],"recommendation":"Update to version 2.11.1 to resolve CVE-2024-3574 or update to version 2.11.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3574","name":"NVD"},"references":[{"id":"GHSA-cw9j-q3vf-hrrv","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-cw9j-q3vf-hrrv"}},{"id":"CVE-2024-3574","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3574","name":"NVD"}},{"id":"49974321-2718-43e3-a152-62b16eed72a9","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9"}}],"advisories":[{"title":"GitHub Advisory GHSA-cw9j-q3vf-hrrv","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-cw9j-q3vf-hrrv"},{"title":"CVE-2024-3574","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3574"},{"title":"Huntr Advisory 49974321-2718-43e3-a152-62b16eed72a9","url":"https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9"}],"cwes":[200],"description":"Scrapy authorization header leakage on cross-domain redirect","detail":"# Scrapy authorization header leakage on cross-domain redirect ### Impact When you send a request with the `Authorization` header to one domain, and the response asks to redirect to a different domain, Scrapy\u2019s built-in redirect middleware creates a follow-up redirect request that keeps the original `Authorization` header, leaking its content to that second domain. The [right behavior](https://fetch.spec.whatwg.org/#ref-for-cors-non-wildcard-request-header-name) would be to drop the `Authorization` header instead, in this scenario. ### Patches Upgrade to Scrapy 2.11.1. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead. ### Workarounds If you cannot upgrade, make sure that you are not using the `Authentication` header, either directly or through some third-party plugin. If you need to use that header in some requests, add `\"dont_redirect\": True` to the `request.meta` dictionary of those requests to disable following redirects for them. If you need to keep (same domain) redirect support on those requests, make sure you trust the target website not to redirect your requests to a different domain. ### Acknowledgements This security issue was reported by @ranjit-git [through huntr.com](https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9/).","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-02-15T15:32:15","updated":"2024-04-16T14:41:41","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-jm3v-qxmh-hxwv","bom-ref":"GHSA-jm3v-qxmh-hxwv/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=0.10.4.2364|<=2.9.0|<2.11.2|!=2.11.2","status":"affected"},{"version":"2.11.2","status":"unaffected"}]}],"recommendation":"Update to version 2.11.2.","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-jm3v-qxmh-hxwv"},"references":[{"id":"GHSA-jm3v-qxmh-hxwv","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-jm3v-qxmh-hxwv"}}],"advisories":[{"title":"GitHub Advisory GHSA-jm3v-qxmh-hxwv","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-jm3v-qxmh-hxwv"}],"cwes":[],"description":"Scrapy's redirects ignoring scheme-specific proxy settings","detail":"# Scrapy's redirects ignoring scheme-specific proxy settings ### Impact When using system proxy settings, which are scheme-specific (i.e. specific to `http://` or `https://` URLs), Scrapy was not accounting for scheme changes during redirects. For example, an HTTP request would use the proxy configured for HTTP and, when redirected to an HTTPS URL, the new HTTPS request would still use the proxy configured for HTTP instead of switching to the proxy configured for HTTPS. Same the other way around. If you have different proxy configurations for HTTP and HTTPS in your system for security reasons (e.g., maybe you don\u2019t want one of your proxy providers to be aware of the URLs that you visit with the other one), this would be a security issue. ### Patches Upgrade to Scrapy 2.11.2. ### Workarounds Replace the built-in retry middlewares (`RedirectMiddleware` and `MetaRefreshMiddleware`) and the `HttpProxyMiddleware` middleware with custom ones that implement the fix from Scrapy 2.11.2, and verify that they work as intended. ### References This security issue was reported by @redapple at https://github.com/scrapy/scrapy/issues/767.","ratings":[{"method":"CVSSv31","severity":"medium","score":4.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"published":"2024-05-14T20:14:43","updated":"2024-11-28T05:39:05","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-41125","bom-ref":"CVE-2021-41125/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=0.10.4.2364|<=1.8.0|<1.8.1|!=1.8.1","status":"affected"},{"version":"1.8.1","status":"unaffected"}]}],"recommendation":"Update to version 1.8.1 to resolve CVE-2021-41125 or update to version 2.11.2 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41125","name":"NVD"},"references":[{"id":"downloader-middleware","source":{"name":"Scrapy Advisory","url":"http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth"}},{"id":"PYSEC-2021-363","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2021-363.yaml"}},{"id":"GHSA-jwqp-28gf-p498","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498"}},{"id":"CVE-2021-41125","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41125","name":"NVD"}},{"id":"debian-msg-msg00021","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html"}}],"advisories":[{"title":"Scrapy Advisory downloader-middleware","url":"http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth"},{"title":"GitHub Advisory PYSEC-2021-363","url":"https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2021-363.yaml"},{"title":"GitHub Advisory GHSA-jwqp-28gf-p498","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498"},{"title":"CVE-2021-41125","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41125"}],"cwes":[200,522],"description":"Scrapy HTTP authentication credentials potentially leaked to target websites ","detail":"# Scrapy HTTP authentication credentials potentially leaked to target websites ### Impact If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. ### Patches Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. ### Workarounds If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the [`w3lib.http.basic_auth_header`](https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header) function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy/scrapy/issues) * [Email us](mailto:opensource@zyte.com) ## Related CVE(s) CVE-2021-41125, PYSEC-2021-363","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2021-10-06T17:46:22","updated":"2024-10-26T23:01:30","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-mfjm-vh54-3f96","bom-ref":"GHSA-mfjm-vh54-3f96/pkg:pypi/scrapy","affects":[{"ref":"pkg:pypi/scrapy","versions":[{"range":"vers:pypi/>=0.10.4.2364|<=1.8.1|<1.8.2|!=1.8.2","status":"affected"},{"version":"1.8.2","status":"unaffected"}]}],"recommendation":"Update to version 1.8.2 to resolve GHSA-mfjm-vh54-3f96 or update to version 2.11.2 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96"},"references":[{"id":"GHSA-mfjm-vh54-3f96","source":{"name":"GitHub Advisory","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96"}}],"advisories":[{"title":"GitHub Advisory GHSA-mfjm-vh54-3f96","url":"https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96"}],"cwes":[],"description":"Scrapy cookie-setting is not restricted based on the public suffix list","detail":"# Scrapy cookie-setting is not restricted based on the public suffix list ### Impact Responses from domain names whose public domain name suffix contains 1 or more periods (e.g. responses from `example.co.uk`, given its public domain name suffix is `co.uk`) are able to set cookies that are included in requests to any other domain sharing the same domain name suffix. ### Patches Upgrade to Scrapy 2.6.0, which restricts cookies with their domain set to any of those in the [public suffix list](https://publicsuffix.org/). If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.6.0 is not an option, you may upgrade to Scrapy 1.8.2 instead. ### Workarounds The only workaround for unpatched versions of Scrapy is to [disable cookies altogether](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#std-setting-COOKIES_ENABLED), or [limit target domains](https://docs.scrapy.org/en/latest/topics/spiders.html#scrapy.spiders.Spider.allowed_domains) to a subset that does not include domain names with one of the public domain suffixes affected (those with 1 or more periods). ### References * https://publicsuffix.org/ ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy/scrapy/issues) * [Email us](mailto:opensource@zyte.com)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"2022-03-01T22:13:28","updated":"2024-12-07T05:40:29","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-27516","bom-ref":"CVE-2025-27516/pkg:pypi/jinja2@3.0.3","affects":[{"ref":"pkg:pypi/jinja2@3.0.3","versions":[{"range":"vers:pypi/>=2.0|<=3.1.5|<3.1.6|!=3.1.6","status":"affected"},{"version":"3.1.6","status":"unaffected"}]}],"recommendation":"Update to version 3.1.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-27516","name":"NVD"},"references":[{"id":"CVE-2025-27516","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-27516","name":"NVD"}},{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00045.html"}},{"id":"GHSA-cpwx-vrp4-4pq7","source":{"name":"GitHub Advisory","url":"https://github.com/pallets/jinja/security/advisories/GHSA-cpwx-vrp4-4pq7"}}],"advisories":[{"title":"CVE-2025-27516","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-27516"},{"title":"GitHub Advisory GHSA-cpwx-vrp4-4pq7","url":"https://github.com/pallets/jinja/security/advisories/GHSA-cpwx-vrp4-4pq7"}],"cwes":[1336],"description":"Jinja2 vulnerable to sandbox breakout through attr filter selecting format method","detail":"# Jinja2 vulnerable to sandbox breakout through attr filter selecting format method An oversight in how the Jinja sandboxed environment interacts with the `|attr` filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to `str.format` and ensures they don't escape the sandbox. However, it's possible to use the `|attr` filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the `|attr` filter no longer bypasses the environment's attribute lookup.","ratings":[{"method":"CVSSv4","severity":"medium","score":5.4,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2025-03-05T20:40:14","updated":"2025-05-01T04:08:20","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 9 locations"}]},{"id":"CVE-2024-56201","bom-ref":"CVE-2024-56201/pkg:pypi/jinja2@3.0.3","affects":[{"ref":"pkg:pypi/jinja2@3.0.3","versions":[{"range":"vers:pypi/>=3.0.0|<=3.1.4|<3.1.5|!=3.1.5","status":"affected"},{"version":"3.1.5","status":"unaffected"}]}],"recommendation":"Update to version 3.1.5 to resolve CVE-2024-56201 or update to version 3.1.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56201","name":"NVD"},"references":[{"id":"CVE-2024-56201","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56201","name":"NVD"}},{"id":"GHSA-gmj6-6f8f-6699","source":{"name":"GitHub Advisory","url":"https://github.com/pallets/jinja/security/advisories/GHSA-gmj6-6f8f-6699"}}],"advisories":[{"title":"CVE-2024-56201","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56201"},{"title":"GitHub Advisory GHSA-gmj6-6f8f-6699","url":"https://github.com/pallets/jinja/security/advisories/GHSA-gmj6-6f8f-6699"}],"cwes":[150],"description":"Jinja has a sandbox breakout through malicious filenames","detail":"# Jinja has a sandbox breakout through malicious filenames A bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used. To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename.","ratings":[{"method":"CVSSv4","severity":"medium","score":5.4,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-12-23T17:54:12","updated":"2025-01-08T16:26:10","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 9 locations"}]},{"id":"CVE-2024-22195","bom-ref":"CVE-2024-22195/pkg:pypi/jinja2@3.0.3","affects":[{"ref":"pkg:pypi/jinja2@3.0.3","versions":[{"range":"vers:pypi/>=2.0|<=3.1.2|<3.1.3|!=3.1.3","status":"affected"},{"version":"3.1.3","status":"unaffected"}]}],"recommendation":"Update to version 3.1.3 to resolve CVE-2024-22195 or update to version 3.1.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22195","name":"NVD"},"references":[{"id":"fedoraproject-msg-DELCVUUYX75I5K4Q5WMJG4MUZJA6VAIP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DELCVUUYX75I5K4Q5WMJG4MUZJA6VAIP"}},{"id":"fedoraproject-msg-O7YWRBX6JQCWC2XXCTZ55C7DPMGICCN3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7YWRBX6JQCWC2XXCTZ55C7DPMGICCN3"}},{"id":"CVE-2024-22195","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22195","name":"NVD"}},{"id":"fedoraproject-msg-5XCWZD464AJJJUBOO7CMPXQ4ROBC6JX2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5XCWZD464AJJJUBOO7CMPXQ4ROBC6JX2"}},{"id":"debian-msg-msg00010","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00010.html"}},{"id":"GHSA-h5c8-rqwp-cp95","source":{"name":"GitHub Advisory","url":"https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95"}}],"advisories":[{"title":"CVE-2024-22195","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22195"},{"title":"GitHub Advisory GHSA-h5c8-rqwp-cp95","url":"https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95"}],"cwes":[79],"description":"Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter","detail":"# Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter The `xmlattr` filter in affected versions of Jinja accepts keys containing spaces. XML/HTML attributes cannot contain spaces, as each would then be interpreted as a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. Note that accepting keys as user input is not common or a particularly intended use case of the `xmlattr` filter, and an application doing so should already be verifying what keys are provided regardless of this fix.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.4,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"published":"2024-01-11T15:20:48","updated":"2025-02-13T19:36:34","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 9 locations"}]},{"id":"CVE-2024-34064","bom-ref":"CVE-2024-34064/pkg:pypi/jinja2@3.0.3","affects":[{"ref":"pkg:pypi/jinja2@3.0.3","versions":[{"range":"vers:pypi/>=2.0|<=3.1.3|<3.1.4|!=3.1.4","status":"affected"},{"version":"3.1.4","status":"unaffected"}]}],"recommendation":"Update to version 3.1.4 to resolve CVE-2024-34064 or update to version 3.1.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34064","name":"NVD"},"references":[{"id":"fedoraproject-msg-GCLF44KY43BSVMTE6S53B4V5WP3FRRSE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCLF44KY43BSVMTE6S53B4V5WP3FRRSE"}},{"id":"fedoraproject-msg-ZALNWE3TXPPHVPSI3AZ5CTMSTAVN5UMS","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZALNWE3TXPPHVPSI3AZ5CTMSTAVN5UMS"}},{"id":"fedoraproject-msg-567XIGSZMABG6TSMYWD7MIYNJSUQQRUC","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/567XIGSZMABG6TSMYWD7MIYNJSUQQRUC"}},{"id":"fedoraproject-msg-SSCBHIL6BYKR5NRCBXP4XMP2CEEKGFVS","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SSCBHIL6BYKR5NRCBXP4XMP2CEEKGFVS"}},{"id":"CVE-2024-34064","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34064","name":"NVD"}},{"id":"GHSA-h75v-3vvj-5mfj","source":{"name":"GitHub Advisory","url":"https://github.com/pallets/jinja/security/advisories/GHSA-h75v-3vvj-5mfj"}}],"advisories":[{"title":"CVE-2024-34064","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34064"},{"title":"GitHub Advisory GHSA-h75v-3vvj-5mfj","url":"https://github.com/pallets/jinja/security/advisories/GHSA-h75v-3vvj-5mfj"}],"cwes":[79],"description":"Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter","detail":"# Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for the previous GHSA-h5c8-rqwp-cp95 CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. ## Related CVE(s) CGA-g5xx-83xq-8g5j, CVE-2024-34064","ratings":[{"method":"CVSSv31","severity":"medium","score":5.4,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"published":"2024-05-06T14:20:59","updated":"2024-10-22T05:28:58","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 9 locations"}]},{"id":"CVE-2024-56326","bom-ref":"CVE-2024-56326/pkg:pypi/jinja2@3.0.3","affects":[{"ref":"pkg:pypi/jinja2@3.0.3","versions":[{"range":"vers:pypi/>=2.0|<=3.1.4|<3.1.5|!=3.1.5","status":"affected"},{"version":"3.1.5","status":"unaffected"}]}],"recommendation":"Update to version 3.1.5 to resolve CVE-2024-56326 or update to version 3.1.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56326","name":"NVD"},"references":[{"id":"CVE-2024-56326","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56326","name":"NVD"}},{"id":"GHSA-q2x7-8rv6-6q7h","source":{"name":"GitHub Advisory","url":"https://github.com/pallets/jinja/security/advisories/GHSA-q2x7-8rv6-6q7h"}}],"advisories":[{"title":"CVE-2024-56326","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56326"},{"title":"GitHub Advisory GHSA-q2x7-8rv6-6q7h","url":"https://github.com/pallets/jinja/security/advisories/GHSA-q2x7-8rv6-6q7h"}],"cwes":[693],"description":"Jinja has a sandbox breakout through indirect reference to format method","detail":"# Jinja has a sandbox breakout through indirect reference to format method An oversight in how the Jinja sandboxed environment detects calls to `str.format` allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to `str.format` and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's `format` method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox.","ratings":[{"method":"CVSSv4","severity":"medium","score":5.4,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-12-23T17:56:08","updated":"2024-12-27T19:24:19","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 9 locations"}]},{"id":"CVE-2025-6209","bom-ref":"CVE-2025-6209/pkg:pypi/llama-index-core@0.12.34","affects":[{"ref":"pkg:pypi/llama-index-core@0.12.34","versions":[{"range":"vers:pypi/>=0.11.23|<0.12.41|!=0.12.41","status":"affected"},{"version":"0.12.41","status":"unaffected"}]}],"recommendation":"Update to version 0.12.41.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6209","name":"NVD"},"references":[{"id":"e89d14f8-bfe8-4c9a-bb2a-656c01cc9a68","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/e89d14f8-bfe8-4c9a-bb2a-656c01cc9a68"}},{"id":"PYSEC-2025-65","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2025-65.yaml"}},{"id":"CVE-2025-6209","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6209","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory e89d14f8-bfe8-4c9a-bb2a-656c01cc9a68","url":"https://huntr.com/bounties/e89d14f8-bfe8-4c9a-bb2a-656c01cc9a68"},{"title":"GitHub Advisory PYSEC-2025-65","url":"https://github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2025-65.yaml"},{"title":"CVE-2025-6209","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6209"}],"cwes":[29],"description":"LlamaIndex vulnerable to Path Traversal attack through its encode_image function","detail":"# LlamaIndex vulnerable to Path Traversal attack through its encode_image function A path traversal vulnerability exists in run-llama/llama_index versions 0.11.23 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41. ## Related CVE(s) CVE-2025-6209, PYSEC-2025-65","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2025-07-07T15:30:37","updated":"2025-07-08T18:56:25","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-5472","bom-ref":"CVE-2025-5472/pkg:pypi/llama-index-core@0.12.34","affects":[{"ref":"pkg:pypi/llama-index-core@0.12.34","versions":[{"range":"vers:pypi/>=0.10.0|<=0.9.56|<0.12.38|!=0.12.38","status":"affected"},{"version":"0.12.38","status":"unaffected"}]}],"recommendation":"Update to version 0.12.38 to resolve CVE-2025-5472 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5472","name":"NVD"},"references":[{"id":"df187bda-7911-4823-a19a-e15b2c66b0d4","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/df187bda-7911-4823-a19a-e15b2c66b0d4"}},{"id":"CVE-2025-5472","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5472","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory df187bda-7911-4823-a19a-e15b2c66b0d4","url":"https://huntr.com/bounties/df187bda-7911-4823-a19a-e15b2c66b0d4"},{"title":"CVE-2025-5472","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5472"}],"cwes":[674],"description":"LlamaIndex vulnerable to DoS attack through uncontrolled recursive JSON parsing","detail":"# LlamaIndex vulnerable to DoS attack through uncontrolled recursive JSON parsing The JSONReader in run-llama/llama_index versions 0.12.28 is vulnerable to a stack overflow due to uncontrolled recursive JSON parsing. This vulnerability allows attackers to trigger a Denial of Service (DoS) by submitting deeply nested JSON structures, leading to a RecursionError and crashing applications. The root cause is the unsafe recursive traversal design and lack of depth validation, which makes the JSONReader susceptible to stack overflow when processing deeply nested JSON. This impacts the availability of services, making them unreliable and disrupting workflows. The issue is resolved in version 0.12.38.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"published":"2025-07-07T12:30:23","updated":"2025-07-08T18:44:46","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-5302","bom-ref":"CVE-2025-5302/pkg:pypi/llama-index-core@0.12.34","affects":[{"ref":"pkg:pypi/llama-index-core@0.12.34","versions":[{"range":"vers:pypi/>=0.10.0|<=0.9.56|<0.12.38|!=0.12.38","status":"affected"},{"version":"0.12.38","status":"unaffected"}]}],"recommendation":"Update to version 0.12.38 to resolve CVE-2025-5302 or update to version 0.12.41 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5302","name":"NVD"},"references":[{"id":"70041b81-de9e-4046-8c0e-6ccd557048a6","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/70041b81-de9e-4046-8c0e-6ccd557048a6"}},{"id":"CVE-2025-5302","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5302","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory 70041b81-de9e-4046-8c0e-6ccd557048a6","url":"https://huntr.com/bounties/70041b81-de9e-4046-8c0e-6ccd557048a6"},{"title":"CVE-2025-5302","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5302"}],"cwes":[674],"description":"LlamaIndex affected by a Denial of Service (DOS) in JSONReader","detail":"# LlamaIndex affected by a Denial of Service (DOS) in JSONReader A denial of service vulnerability exists in the JSONReader component of the run-llama/llama_index repository, specifically in version v0.12.37. The vulnerability is caused by uncontrolled recursion when parsing deeply nested JSON files, which can lead to Python hitting its maximum recursion depth limit. This results in high resource consumption and potential crashes of the Python process. The issue is resolved in version 0.12.38.","ratings":[{"method":"CVSSv3","severity":"high","score":8.6,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"published":"2025-08-26T00:31:13","updated":"2025-08-26T18:12:26","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-3108","bom-ref":"CVE-2025-3108/pkg:pypi/llama-index-core@0.12.34","affects":[{"ref":"pkg:pypi/llama-index-core@0.12.34","versions":[{"range":"vers:pypi/>=0.11.15|<=0.12.40|<0.12.41|!=0.12.41","status":"affected"},{"version":"0.12.41","status":"unaffected"}]}],"recommendation":"Update to version 0.12.41.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3108","name":"NVD"},"references":[{"id":"CVE-2025-3108","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3108","name":"NVD"}},{"id":"9b55a5e8-74e6-4241-b323-e360dc8b110a","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/9b55a5e8-74e6-4241-b323-e360dc8b110a"}}],"advisories":[{"title":"CVE-2025-3108","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3108"},{"title":"Huntr Advisory 9b55a5e8-74e6-4241-b323-e360dc8b110a","url":"https://huntr.com/bounties/9b55a5e8-74e6-4241-b323-e360dc8b110a"}],"cwes":[1112],"description":"LlamaIndex has Incomplete Documentation of Program Execution related to JsonPickleSerializer component","detail":"# LlamaIndex has Incomplete Documentation of Program Execution related to JsonPickleSerializer component Incomplete Documentation of Program Execution exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause involves the use of an insecure fallback strategy without sufficient input validation or protective safeguards. Version 0.12.41 renames JsonPickleSerializer to PickleSerializer and adds a warning to the docs to only use PickleSerializer to deserialize safe things.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.0,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"2025-07-07T00:30:18","updated":"2025-07-07T23:42:18","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2025-50817","bom-ref":"CVE-2025-50817/pkg:pypi/future@1.0.0","affects":[{"ref":"pkg:pypi/future@1.0.0","versions":[{"range":"vers:pypi/>=0.14.0|*","status":"affected"},{"version":"*","status":"unaffected"}]}],"recommendation":"Fix unavailable.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-50817","name":"NVD"},"references":[{"id":"GHSA-xqrq-4mgf-ff32","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-xqrq-4mgf-ff32"}},{"id":"CVE-2025-50817","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-50817","name":"NVD"}},{"id":"cve-2025-50817-python-future-module-arbitrary-code-execution-via-unintended-import-of-test-py-f0818ea93cf4","source":{"name":"Medium Advisory","url":"https://medium.com/@abcd_68700/cve-2025-50817-python-future-module-arbitrary-code-execution-via-unintended-import-of-test-py-f0818ea93cf4"}}],"advisories":[{"title":"GitHub Advisory GHSA-xqrq-4mgf-ff32","url":"https://github.com/advisories/GHSA-xqrq-4mgf-ff32"},{"title":"CVE-2025-50817","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-50817"},{"title":"Medium Advisory cve-2025-50817-python-future-module-arbitrary-code-execution-via-unintended-import-of-test-py-f0818ea93cf4","url":"https://medium.com/@abcd_68700/cve-2025-50817-python-future-module-arbitrary-code-execution-via-unintended-import-of-test-py-f0818ea93cf4"}],"cwes":[],"description":"Python-Future Module Arbitrary Code Execution via Unintended Import of test.py","detail":"# Python-Future Module Arbitrary Code Execution via Unintended Import of test.py A vulnerability in Python-Future modules 0.14.0 and above allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2025-08-14T18:31:30","updated":"2025-08-22T23:18:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/hyperopt@0.2.7\", \"pkg:pypi/future@1.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency\\nNot maintained"}]},{"id":"CVE-2025-55197","bom-ref":"CVE-2025-55197/pkg:pypi/pypdf@5.9.0","affects":[{"ref":"pkg:pypi/pypdf@5.9.0","versions":[{"range":"vers:pypi/>=1.0|<=5.9.0|<6.0.0|!=6.0.0","status":"affected"},{"version":"6.0.0","status":"unaffected"}]}],"recommendation":"Update to version 6.0.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55197","name":"NVD"},"references":[{"id":"GHSA-7hfw-26vp-jp8m","source":{"name":"GitHub Advisory","url":"https://github.com/py-pdf/pypdf/security/advisories/GHSA-7hfw-26vp-jp8m"}},{"id":"CVE-2025-55197","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55197","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-7hfw-26vp-jp8m","url":"https://github.com/py-pdf/pypdf/security/advisories/GHSA-7hfw-26vp-jp8m"},{"title":"CVE-2025-55197","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55197"}],"cwes":[400,770],"description":"PyPDF's Manipulated FlateDecode streams can exhaust RAM","detail":"# PyPDF's Manipulated FlateDecode streams can exhaust RAM ### Impact An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access. ### Patches This has been fixed in [pypdf==6.0.0](https://github.com/py-pdf/pypdf/releases/tag/6.0.0). ### Workarounds If you cannot upgrade yet, you might want to implement the workaround for `pypdf.filters.decompress` yourself: https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143 ### References This issue has been reported in #3429 and fixed in #3430.","ratings":[{"method":"CVSSv4","severity":"medium","score":6.6,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"}],"published":"2025-08-13T19:51:24","updated":"2025-08-14T14:22:18","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/llama-index@0.12.52\", \"pkg:pypi/llama-index-readers-file@0.4.11\", \"pkg:pypi/pypdf@5.9.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]}],"annotations":[{"subjects":["urn:uuid:9de136dd-8777-472e-973a-444033354d20"],"annotator":{"component":{"type":"application","name":"owasp-depscan","version":"6.0.0b3","purl":"pkg:pypi/owasp-depscan@6.0.0b3","bom-ref":"pkg:pypi/owasp-depscan@6.0.0b3"}},"timestamp":"2025-09-02T20:54:23Z","text":"\n Prioritized Vulnerabilities \n\nThe vulnerabilities below have been prioritized by depscan. Follow your team\u2019s remediation workflow to address these findings. \n\n Top Priority (BOM) \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 Package \u2502 Prioritized CVEs \u2502 Fix Version \u2502 Next Steps \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 pkg:pypi/pyspark \u2502 CVE-2022-33891 \u2502 \u2502 Try to make the CVEs non-reachable by adding the necessary workarounds and validations. Check \u2551\n\u2551 \u2502 \u2502 \u2502 alternative vulnerability databases for potential upgrade versions. \u2551\n\u2551 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2502 \u2502 \u2502 Manifest file: \u2551\n\u2551 \u2502 \u2502 \u2502 requirements/doc-requirements.txt \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Prioritized count: 1 \n\n\n Proactive Measures \n\nBelow are the top reachable packages identified by depscan. Set up alerts and notifications to actively monitor them for new vulnerabilities and exploits. \n\n \ud83d\udca5 Top Endpoint-Reachable Packages \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 Package \u2502 Reachable Flows \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 pkg:pypi/langchain-core@0.3.75 \u2502 986 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 pkg:pypi/sqlalchemy@2.0.43 \u2502 776 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 pkg:pypi/flask@3.1.2 \u2502 16 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n\n\n Vulnerability Disclosure Report \n\nThe table below lists all vulnerabilities identified in this project. \n\n Dependency Scan Results (BOM) \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 Dependency Tree \u2502 Insights \u2502 Fix Version \u2502 Severity \u2502 Score \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 azure-identity@1.6.1 \u2b05 CVE-2024-35255 \u2502 \ud83d\udcd3 Indirect dependency \u2502 1.16.1 \u2502 MEDIUM \u2502 6.8 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 azure-storage-blob@12.0.0 \u2b05 CVE-2022-30187 \u2502 \ud83d\udcd3 Indirect dependency \u2502 12.13.0 \u2502 MEDIUM \u2502 4.7 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 black@23.7.0 \u2b05 CVE-2024-21503 \u2502 \ud83d\udcd3 Indirect dependency \u2502 24.3.0 \u2502 MEDIUM \u2502 5.3 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 hyperopt@0.2.7 \u2502 \ud83d\udcd3 Indirect dependency \u2502 \u2502 HIGH \u2502 7.3 \u2551\n\u2551 \u2514\u2500\u2500 future@1.0.0 \u2b05 CVE-2025-50817 \u2502 Not maintained \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-8616 \u2502 \ud83d\udcd3 Indirect dependency \u2502 3.46.0.6 \u2502 HIGH \u2502 8.2 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-8062 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-7768 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-7765 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-6863 \u2502 \u2502 \u2502 MEDIUM \u2502 6.5 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-6854 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-5979 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-5550 \u2502 \u2502 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-10572 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-10553 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-10550 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2024-10549 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 h2o@3.46.0.7 \u2b05 CVE-2023-6569 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 ipython@8.7.0 \u2b05 CVE-2023-24816 \u2502 \ud83d\udcd3 Indirect dependency \u2502 8.10.0 \u2502 LOW \u2502 2.0 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 jinja2@3.0.3 \u2b05 CVE-2025-27516 \u2502 \ud83c\udfaf Used in 9 locations \u2502 3.1.6 \u2502 MEDIUM \u2502 5.4 \u2551\n\u2551 jinja2@3.0.3 \u2b05 CVE-2024-56326 \u2502 \u2502 \u2502 MEDIUM \u2502 5.4 \u2551\n\u2551 jinja2@3.0.3 \u2b05 CVE-2024-56201 \u2502 \u2502 \u2502 MEDIUM \u2502 5.4 \u2551\n\u2551 jinja2@3.0.3 \u2b05 CVE-2024-34064 \u2502 \u2502 \u2502 MEDIUM \u2502 5.4 \u2551\n\u2551 jinja2@3.0.3 \u2b05 CVE-2024-22195 \u2502 \u2502 \u2502 MEDIUM \u2502 5.4 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 tensorflow@2.16.2 \u2502 \ud83d\udcd3 Indirect dependency \u2502 3.11.0 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 keras@3.11.3 \u2b05 CVE-2025-8747 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 tensorflow@2.16.2 \u2502 \u2502 \u2502 HIGH \u2502 7.3 \u2551\n\u2551 \u2514\u2500\u2500 keras@3.11.3 \u2b05 CVE-2025-1550 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 tensorflow@2.16.2 \u2502 \u2502 \u2502 MEDIUM \u2502 5.5 \u2551\n\u2551 \u2514\u2500\u2500 keras@3.11.3 \u2b05 CVE-2024-55459 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 tensorflow@2.16.2 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 keras@3.11.3 \u2b05 CVE-2024-3660 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2024-8309 \u2502 \ud83d\udcd3 Indirect dependency \u2502 0.2.5 \u2502 LOW \u2502 2.1 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2024-8309 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2024-8309 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2024-8309 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2024-8309 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2024-3571 \u2502 \u2502 \u2502 MEDIUM \u2502 6.5 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2024-3571 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2024-3571 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2024-3571 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2024-3571 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2024-2965 \u2502 \u2502 \u2502 MEDIUM \u2502 4.2 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2024-2965 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2024-2965 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2024-2965 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2024-2965 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2024-28088 \u2502 \u2502 \u2502 LOW \u2502 2.0 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2024-28088 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2024-28088 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2024-28088 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2024-28088 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2024-0243 \u2502 \u2502 \u2502 LOW \u2502 3.7 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2024-0243 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2024-0243 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2024-0243 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2024-0243 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-46229 \u2502 \u2502 \u2502 HIGH \u2502 8.6 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-46229 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-46229 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-46229 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-46229 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-39659 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-39659 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-39659 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-39659 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-39659 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-39631 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-39631 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-39631 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-39631 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-39631 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-38896 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-38896 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-38896 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-38896 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-38896 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-38860 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-38860 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-38860 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-38860 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-38860 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-36281 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-36281 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-36281 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-36281 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-36281 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-36258 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-36258 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-36258 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-36258 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-36258 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-36189 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-36189 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-36189 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-36189 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-36189 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-36188 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-36188 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-36188 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-36188 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-36188 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-36095 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-36095 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-36095 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-36095 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-36095 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-34541 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-34541 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-34541 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-34541 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-34541 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-34540 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-34540 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-34540 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-34540 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-34540 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-32786 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-32786 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-32786 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-32786 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-32786 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-32785 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-32785 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-32785 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-32785 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-32785 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 langchain-community@0.3.29 \u2b05 CVE-2023-29374 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 langchain-core@0.3.75 \u2b05 CVE-2023-29374 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-openai@0.3.32 \u2b05 CVE-2023-29374 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain-text-splitters@0.3.11 \u2b05 CVE-2023-29374 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 langchain@0.3.27 \u2b05 CVE-2023-29374 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 lightgbm@4.6.0 \u2b05 CVE-2024-43598 \u2502 \ud83d\udcd3 Indirect dependency \u2502 4.6.0 \u2502 HIGH \u2502 8.1 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 lightning@1.8.1 \u2b05 CVE-2024-5980 \u2502 \ud83c\udfaf Used in 4 locations \u2502 2.3.3 \u2502 CRITICAL \u2502 9.1 \u2551\n\u2551 lightning@1.8.1 \u2b05 CVE-2024-5452 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 banks@2.2.0 \u2502 \ud83d\udcd3 Indirect dependency \u2502 1.61.15 \u2502 HIGH \u2502 8.1 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2025-0628 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2025-0330 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-9606 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-8984 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-6825 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-6587 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-5751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-5710 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 MEDIUM \u2502 6.4 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-5225 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 MEDIUM \u2502 4.9 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-4890 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 HIGH \u2502 7.0 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-4888 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 HIGH \u2502 7.2 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-4264 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-2952 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 banks@2.2.0 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 litellm@1.76.1 \u2b05 CVE-2024-10188 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 llama-cloud-services@0.6.54 \u2502 \ud83d\udcd3 Indirect dependency \u2502 0.12.41 \u2502 MEDIUM \u2502 6.5 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2025-6211 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 llama-cloud-services@0.6.54 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2025-1793 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 llama-cloud-services@0.6.54 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2025-1752 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 llama-cloud-services@0.6.54 \u2502 \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2024-4181 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 llama-cloud-services@0.6.54 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2024-23751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 llama-cloud-services@0.6.54 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2024-12911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 llama-cloud-services@0.6.54 \u2502 \u2502 \u2502 MEDIUM \u2502 5.9 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2024-12910 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 llama-cloud-services@0.6.54 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2024-12704 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 llama-cloud-services@0.6.54 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-core@0.12.52.post1 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-workflows@1.3.0 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-instrumentation@0.4.0 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-agent-openai@0.4.12 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-llms-openai@0.4.7 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-cli@0.4.4 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-embeddings-openai@0.3.1 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-indices-managed-llama-cloud@0.8.0 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-multi-modal-llms-openai@0.5.3 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-program-openai@0.3.2 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-question-gen-openai@0.3.1 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-llama-parse@0.4.0 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 llama-index@0.12.52 \u2b05 CVE-2023-39662 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 llama-index-core@0.12.34 \u2b05 CVE-2025-6209 \u2502 \ud83d\udcd3 Indirect dependency \u2502 0.12.41 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 llama-index-core@0.12.34 \u2b05 CVE-2025-5472 \u2502 \u2502 \u2502 MEDIUM \u2502 6.5 \u2551\n\u2551 llama-index-core@0.12.34 \u2b05 CVE-2025-5302 \u2502 \u2502 \u2502 HIGH \u2502 8.6 \u2551\n\u2551 llama-index-core@0.12.34 \u2b05 CVE-2025-3108 \u2502 \u2502 \u2502 MEDIUM \u2502 5.0 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 torchmetrics@1.8.1 \u2502 \ud83d\udcd3 Indirect dependency \u2502 3.9 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 nltk@3.9.1 \u2b05 CVE-2024-39705 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 nltk@3.9.1 \u2b05 CVE-2021-43854 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \ud83d\udcd4 Has PoC \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 nltk@3.9.1 \u2b05 CVE-2021-3842 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \ud83d\udcd4 Has PoC \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 nltk@3.9.1 \u2b05 CVE-2021-3828 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 nltk@3.9.1 \u2b05 CVE-2019-14751 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 onnx@1.11.0 \u2b05 CVE-2024-7776 \u2502 \ud83d\udcd3 Indirect dependency \u2502 1.17.0 \u2502 HIGH \u2502 8.1 \u2551\n\u2551 onnx@1.11.0 \u2b05 CVE-2024-5187 \u2502 \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 onnx@1.11.0 \u2b05 CVE-2024-27319 \u2502 \u2502 \u2502 MEDIUM \u2502 4.4 \u2551\n\u2551 onnx@1.11.0 \u2b05 CVE-2024-27318 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 onnx@1.11.0 \u2b05 CVE-2022-25882 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2024-1603 \u2502 \ud83d\udcd3 Indirect dependency \u2502 2.6.0 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2024-0917 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2024-0818 \u2502 \u2502 \u2502 CRITICAL \u2502 9.1 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2024-0817 \u2502 \u2502 \u2502 HIGH \u2502 7.8 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2024-0815 \u2502 \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2024-0521 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52314 \u2502 \u2502 \u2502 CRITICAL \u2502 9.6 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52313 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52312 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52311 \u2502 \u2502 \u2502 CRITICAL \u2502 9.6 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52310 \u2502 \u2502 \u2502 CRITICAL \u2502 9.6 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52309 \u2502 \u2502 \u2502 HIGH \u2502 8.2 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52308 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52307 \u2502 \u2502 \u2502 HIGH \u2502 8.2 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52306 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52305 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52304 \u2502 \u2502 \u2502 HIGH \u2502 8.2 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52303 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-52302 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38678 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38677 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38676 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38675 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38674 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38673 \u2502 \u2502 \u2502 CRITICAL \u2502 9.6 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38672 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38671 \u2502 \u2502 \u2502 HIGH \u2502 8.3 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38670 \u2502 \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2023-38669 \u2502 \u2502 \u2502 HIGH \u2502 8.3 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2022-46742 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2022-46741 \u2502 \u2502 \u2502 CRITICAL \u2502 9.1 \u2551\n\u2551 paddlepaddle@3.1.1 \u2b05 CVE-2022-45908 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 matplotlib@3.10.6 \u2502 \ud83d\udcd3 Indirect dependency \u2502 11.3.0 \u2502 LOW \u2502 2.0 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 PYSEC-2023-175 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 GHSA-jgpv-4h4c-xhw3 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 LOW \u2502 2.0 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 GHSA-4fx9-vc88-q2xc \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2025-48379 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 7.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2024-28219 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2023-50447 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2023-4863 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2023-44271 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2022-45199 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2022-45198 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2022-30595 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2022-24303 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2022-22817 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 MEDIUM \u2502 6.9 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2022-22816 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 MEDIUM \u2502 6.9 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2022-22815 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-34552 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 MEDIUM \u2502 6.8 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-28678 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-28677 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-28676 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-28675 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-27923 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-27922 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-27921 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-25293 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 MEDIUM \u2502 6.9 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-25292 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-25291 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-25290 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-25289 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-25288 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-25287 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2021-23437 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-5313 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-5312 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-5311 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-5310 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 MEDIUM \u2502 6.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-35655 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.6 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-35654 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.3 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-35653 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 CRITICAL \u2502 9.2 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-11538 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-10994 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-10379 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.2 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-10378 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2020-10177 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2019-19911 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 matplotlib@3.10.6 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 pillow@11.0.0 \u2b05 CVE-2019-16865 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 accelerate@1.10.1 \u2502 \ud83c\udfaf Used in 51 locations \u2502 5.6.6 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2514\u2500\u2500 psutil@7.0.0 \u2b05 CVE-2019-18874 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 llama-index@0.12.52 \u2502 \ud83d\udcd3 Indirect dependency \u2502 6.0.0 \u2502 MEDIUM \u2502 6.6 \u2551\n\u2551 \u2514\u2500\u2500 llama-index-readers-file@0.4.11 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 pypdf@5.9.0 \u2b05 CVE-2025-55197 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 pyspark@4.0.0 \u2b05 CVE-2023-32007 \u2502 \ud83d\udcd3 Indirect dependency \u2502 3.3.2 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 \u2502 \ud83e\uddfe Reachable \u2502 \u2502 \u2502 \u2551\n\u2551 pyspark@4.0.0 \u2b05 CVE-2023-22946 \u2502 \ud83e\uddfe Reachable \u2502 \u2502 CRITICAL \u2502 9.9 \u2551\n\u2551 pyspark@4.0.0 \u2b05 CVE-2022-33891 \u2502 \u2757 Reachable and Exploitable \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 pyspark@4.0.0 \u2b05 CVE-2022-31777 \u2502 \ud83e\uddfe Reachable \u2502 \u2502 MEDIUM \u2502 5.4 \u2551\n\u2551 pyspark@4.0.0 \u2b05 CVE-2021-38296 \u2502 \ud83e\uddfe Reachable \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 pyspark@4.0.0 \u2b05 CVE-2020-9480 \u2502 \ud83e\uddfe Reachable \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 pyspark@4.0.0 \u2b05 CVE-2019-10099 \u2502 \ud83e\uddfe Reachable \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 pyspark@4.0.0 \u2b05 CVE-2018-1334 \u2502 \ud83e\uddfe Reachable \u2502 \u2502 MEDIUM \u2502 6.0 \u2551\n\u2551 pyspark@4.0.0 \u2b05 CVE-2018-11760 \u2502 \ud83e\uddfe Reachable \u2502 \u2502 MEDIUM \u2502 6.8 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 pkg:pypi/scrapy \u2b05 GHSA-mfjm-vh54-3f96 \u2502 \ud83d\udcd3 Indirect dependency \u2502 2.11.2 \u2502 MEDIUM \u2502 5.0 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 GHSA-jm3v-qxmh-hxwv \u2502 \u2502 \u2502 MEDIUM \u2502 4.3 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 GHSA-9x8m-2xpf-crp3 \u2502 \u2502 \u2502 MEDIUM \u2502 5.0 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 GHSA-23j4-mw76-5v7h \u2502 \u2502 \u2502 MEDIUM \u2502 6.5 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 CVE-2024-3574 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 CVE-2024-3572 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 CVE-2024-1968 \u2502 \u2502 \u2502 MEDIUM \u2502 5.9 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 CVE-2024-1892 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 CVE-2022-0577 \u2502 \ud83d\udcd4 Has PoC \u2502 \u2502 MEDIUM \u2502 6.5 \u2551\n\u2551 pkg:pypi/scrapy \u2b05 CVE-2021-41125 \u2502 \u2502 \u2502 MEDIUM \u2502 6.9 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 tensorflow@2.10.0 \u2b05 GHSA-xf83-q765-xm6m \u2502 \ud83d\udcd3 Indirect dependency \u2502 2.12.1 \u2502 LOW \u2502 3.1 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 GHSA-cqvq-fvhr-v6hc \u2502 \u2502 \u2502 LOW \u2502 3.1 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-33976 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-27579 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25801 \u2502 \u2502 \u2502 HIGH \u2502 8.0 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25676 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25675 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25674 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25673 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25672 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25671 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25670 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25669 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25668 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25667 \u2502 \u2502 \u2502 MEDIUM \u2502 6.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25666 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25665 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25664 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25663 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25662 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25661 \u2502 \u2502 \u2502 MEDIUM \u2502 6.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25660 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25659 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2023-25658 \u2502 \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41911 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41910 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41909 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41908 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41907 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41902 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41901 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41900 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41899 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41898 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41897 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41896 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41895 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41894 \u2502 \u2502 \u2502 HIGH \u2502 7.1 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41893 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41891 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41890 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41889 \u2502 \u2502 \u2502 MEDIUM \u2502 5.5 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41888 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41887 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41886 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41884 \u2502 \u2502 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41883 \u2502 \u2502 \u2502 MEDIUM \u2502 6.8 \u2551\n\u2551 tensorflow@2.10.0 \u2b05 CVE-2022-41880 \u2502 \u2502 \u2502 MEDIUM \u2502 6.8 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 torch@1.11.0 \u2b05 CVE-2025-3730 \u2502 \ud83c\udfaf Used in 230 locations \u2502 2.7.1-rc1 \u2502 MEDIUM \u2502 4.8 \u2551\n\u2551 torch@1.11.0 \u2b05 CVE-2025-32434 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u2551 torch@1.11.0 \u2b05 CVE-2025-2953 \u2502 \u2502 \u2502 LOW \u2502 1.9 \u2551\n\u2551 torch@1.11.0 \u2b05 CVE-2024-48063 \u2502 \u2502 \u2502 CRITICAL \u2502 9.8 \u2551\n\u2551 torch@1.11.0 \u2b05 CVE-2024-31584 \u2502 \u2502 \u2502 LOW \u2502 2.0 \u2551\n\u2551 torch@1.11.0 \u2b05 CVE-2024-31583 \u2502 \u2502 \u2502 HIGH \u2502 7.8 \u2551\n\u2551 torch@1.11.0 \u2b05 CVE-2024-31580 \u2502 \u2502 \u2502 HIGH \u2502 8.7 \u2551\n\u2551 torch@1.11.0 \u2b05 CVE-2022-45907 \u2502 \u2502 \u2502 CRITICAL \u2502 9.3 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 huggingface-hub@0.34.4 \u2502 \ud83d\udcd3 Indirect dependency \u2502 4.66.3 \u2502 LOW \u2502 3.9 \u2551\n\u2551 \u2514\u2500\u2500 tqdm@4.67.1 \u2b05 CVE-2024-34062 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 torchmetrics@1.8.1 \u2502 \ud83d\udcd3 Indirect dependency \u2502 4.53.0 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2025-5197 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2025-3933 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 LOW \u2502 3.5 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2025-3777 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2025-3264 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2025-3263 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2025-3262 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2025-2099 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 MEDIUM \u2502 4.3 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2025-1194 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 LOW \u2502 3.4 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2024-3568 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 MEDIUM \u2502 5.3 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2024-12720 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2757 Known Exploits \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2024-11394 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2757 Known Exploits \u2502 \u2502 HIGH \u2502 8.8 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2024-11393 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2757 Known Exploits \u2502 \u2502 HIGH \u2502 7.5 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2024-11392 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 HIGH \u2502 7.8 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2023-7018 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \u2502 \u2502 CRITICAL \u2502 9.0 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2023-6730 \u2502 \u2502 \u2502 \u2502 \u2551\n\u2551 torchmetrics@1.8.1 \u2502 \ud83d\udcd4 Has PoC \u2502 \u2502 MEDIUM \u2502 4.7 \u2551\n\u2551 \u2514\u2500\u2500 transformers@4.56.0 \u2b05 CVE-2023-2800 \u2502 \u2502 \u2502 \u2502 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Vulnerabilities count: 258 \n\n\n Service Endpoints \n\nThe following endpoints and code hotspots were identified by depscan. Verify that proper authentication and authorization mechanisms are in place to secure them. \n\n Endpoints \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2564\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 URL Pattern \u2502 HTTP Methods \u2502 Code Hotspots \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 /health \u2502 GET \u2502 build/lib/mlflow/pyfunc/scoring_server/__init__.py#485 \u2551\n\u2551 \u2502 HEAD \u2502 libs/skinny/mlflow/pyfunc/scoring_server/__init__.py#485 \u2551\n\u2551 \u2502 OPTIONS \u2502 libs/tracing/mlflow/pyfunc/scoring_server/__init__.py#485 \u2551\n\u2551 \u2502 \u2502 mlflow/pyfunc/scoring_server/__init__.py#485 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 /invocations \u2502 GET \u2502 build/lib/mlflow/pyfunc/scoring_server/__init__.py#502 \u2551\n\u2551 \u2502 HEAD \u2502 libs/skinny/mlflow/pyfunc/scoring_server/__init__.py#502 \u2551\n\u2551 \u2502 OPTIONS \u2502 libs/tracing/mlflow/pyfunc/scoring_server/__init__.py#502 \u2551\n\u2551 \u2502 POST \u2502 mlflow/pyfunc/scoring_server/__init__.py#502 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 /ping \u2502 GET \u2502 build/lib/mlflow/pyfunc/scoring_server/__init__.py#484 \u2551\n\u2551 \u2502 HEAD \u2502 libs/skinny/mlflow/pyfunc/scoring_server/__init__.py#484 \u2551\n\u2551 \u2502 OPTIONS \u2502 libs/tracing/mlflow/pyfunc/scoring_server/__init__.py#484 \u2551\n\u2551 \u2502 \u2502 mlflow/pyfunc/scoring_server/__init__.py#484 \u2551\n\u255f\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u253c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2562\n\u2551 /version \u2502 GET \u2502 build/lib/mlflow/pyfunc/scoring_server/__init__.py#495 \u2551\n\u2551 \u2502 HEAD \u2502 libs/skinny/mlflow/pyfunc/scoring_server/__init__.py#495 \u2551\n\u2551 \u2502 OPTIONS \u2502 libs/tracing/mlflow/pyfunc/scoring_server/__init__.py#495 \u2551\n\u2551 \u2502 \u2502 mlflow/pyfunc/scoring_server/__init__.py#495 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2567\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Identified Endpoints: 4 \n\n\n Reachable Flows \n\nBelow are some reachable flows, including those accessible via endpoints, identified by depscan. Use the generated OpenAPI specification to evaluate these endpoints for vulnerabilities and risk. \n\n#1 Reachable data-flow. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 mlflow/utils/rest_utils.py#58 http_request(host_creds) \u21a9 \u2551\n\u2551 Tags: framework-input \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#101 host_creds.host \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/string_utils.py#15 strip_suffix(original) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/string_utils.py#16 original.endswith(suffix) \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/string_utils.py#17 original[Slice(None,Some(UnaryOp(USub,Call(Name(len,17,28,17,30),Buffer(Name(suffix,17,32,17,37)),Buffer(),17,28,17,38),17,27,17,38)),None,17,25,17,38)] \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#101 strip_suffix(host_creds.host, \"/\") \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#102 {cleaned_hostname} \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#232 _get_http_response_with_retries(method, url, max_retries, backoff_factor, backoff_jitter, retry_codes, raise_on_status, headers = headers, verify = host_creds.verify, timeout = timeout, \u2551\n\u2551 \u2502 respect_retry_after_header = respect_retry_after_header) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/request_utils.py#195 _get_http_response_with_retries(url) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/request_utils.py#237 session.request(method, url, allow_redirects = allow_redirects) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#137 http_request(host_creds = get_databricks_host_creds(self.target_uri), endpoint = posixpath.join(prefix, \"serving-endpoints\", route or \"\"), method = method, \u2551\n\u2551 \u2502 timeout = MLFLOW_HTTP_REQUEST_TIMEOUT.get() if timeout is None else timeout, raise_on_status = False, retry_codes = MLFLOW_DEPLOYMENT_CLIENT_REQUEST_RETRY_CODES, extra_headers = tmp1 = {} \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#147 augmented_raise_for_status(response) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#148 response.json() \u2551\n\u2551 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#2 Reachable data-flow. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 mlflow/utils/rest_utils.py#60 http_request(method) \u21a9 \u2551\n\u2551 Tags: framework-input \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#146 kwargs.get(\"json\") \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#147 kwargs.get(\"files\") \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#148 kwargs.get(\"data\") \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#146 kwargs.get(\"json\") \u2934 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#143 tmp0.do(method = method, path = endpoint, headers = headers, raw = True, query = kwargs.get(\"params\"), body = kwargs.get(\"json\"), files = kwargs.get(\"files\"), data = kwargs.get(\"data\")) \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#147 kwargs.get(\"files\") \u2934 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#145 kwargs.get(\"params\") \u2934 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#231 _get_http_response_with_retries(method, url, max_retries, backoff_factor, backoff_jitter, retry_codes, raise_on_status, headers = headers, verify = host_creds.verify, timeout = timeout, \u2551\n\u2551 \u2502 respect_retry_after_header = respect_retry_after_header) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/request_utils.py#194 _get_http_response_with_retries(method) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/request_utils.py#237 session.request(method, url, allow_redirects = allow_redirects) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#137 http_request(host_creds = get_databricks_host_creds(self.target_uri), endpoint = posixpath.join(prefix, \"serving-endpoints\", route or \"\"), method = method, \u2551\n\u2551 \u2502 timeout = MLFLOW_HTTP_REQUEST_TIMEOUT.get() if timeout is None else timeout, raise_on_status = False, retry_codes = MLFLOW_DEPLOYMENT_CLIENT_REQUEST_RETRY_CODES, extra_headers = tmp1 = {} \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#147 augmented_raise_for_status(response) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#148 response.json() \u2551\n\u2551 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#3 Reachable data-flow. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 mlflow/utils/rest_utils.py#70 http_request(kwargs) \u21a9 \u2551\n\u2551 Tags: framework-input \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#146 kwargs.get(\"json\") \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#147 kwargs.get(\"files\") \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#148 kwargs.get(\"data\") \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#146 kwargs.get(\"json\") \u2934 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#143 tmp0.do(method = method, path = endpoint, headers = headers, raw = True, query = kwargs.get(\"params\"), body = kwargs.get(\"json\"), files = kwargs.get(\"files\"), data = kwargs.get(\"data\")) \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#147 kwargs.get(\"files\") \u2934 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#145 kwargs.get(\"params\") \u2934 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/rest_utils.py#231 _get_http_response_with_retries(method, url, max_retries, backoff_factor, backoff_jitter, retry_codes, raise_on_status, headers = headers, verify = host_creds.verify, timeout = timeout, \u2551\n\u2551 \u2502 respect_retry_after_header = respect_retry_after_header) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/request_utils.py#194 _get_http_response_with_retries(method) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/utils/request_utils.py#237 session.request(method, url, allow_redirects = allow_redirects) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#137 http_request(host_creds = get_databricks_host_creds(self.target_uri), endpoint = posixpath.join(prefix, \"serving-endpoints\", route or \"\"), method = method, \u2551\n\u2551 \u2502 timeout = MLFLOW_HTTP_REQUEST_TIMEOUT.get() if timeout is None else timeout, raise_on_status = False, retry_codes = MLFLOW_DEPLOYMENT_CLIENT_REQUEST_RETRY_CODES, extra_headers = tmp1 = {} \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#147 augmented_raise_for_status(response) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/deployments/databricks/__init__.py#148 response.json() \u2551\n\u2551 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#4 argument chat_request \u2b55 to the function _convert_chat_request can be used to reach 2 packages from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/langchain/utils/chat.py#253 _convert_chat_request(chat_request) \u21a9 \u2551\n\u2551 Tags: framework-input \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#254 isinstance(chat_request, list) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#255 chat_request.__iter__() \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#247 _convert_chat_request_or_throw(chat_request) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#249 ChatCompletionRequest.validate_compat(chat_request) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#250 model.messages \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#88 _chat_model_to_langchain_message(message) \u21a9 \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#99 message.tool_call_id \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#250 _chat_model_to_langchain_message(message) \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#255 _convert_chat_request_or_throw(request) \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/langchain-core@0.3.75 \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#5 argument json_message \u2b55 to the function json_dict_might_be_chat_request can be used to reach 2 packages from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/langchain/utils/chat.py#318 json_dict_might_be_chat_request(json_message) \u21a9 \u2551\n\u2551 Tags: framework-input \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#320 isinstance(json_message, dict) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#321 \"messages\" in json_message \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#338 json_dict_might_be_chat_request(request_json) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#330 is_list_of_chat_messages(json_message) \u21a9 \u2551\n\u2551 \u2502 Tags: validation \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#331 isinstance(json_message, list) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#332 json_message.__iter__() \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#349 _convert_chat_request(request_json) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#253 _convert_chat_request(chat_request) \u21a9 \u2551\n\u2551 \u2502 Tags: framework-input \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#254 isinstance(chat_request, list) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#255 chat_request.__iter__() \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#247 _convert_chat_request_or_throw(chat_request) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#249 ChatCompletionRequest.validate_compat(chat_request) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#250 model.messages \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#88 _chat_model_to_langchain_message(message) \u21a9 \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#99 message.tool_call_id \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#250 _chat_model_to_langchain_message(message) \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#255 _convert_chat_request_or_throw(request) \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n \u25fd Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements. \n Reachable Packages: \n pkg:pypi/langchain-core@0.3.75 \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#6 argument chat_request \u2b55 to the function _convert_chat_request can be used to reach 2 packages from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/langchain/utils/chat.py#253 _convert_chat_request(chat_request) \u21a9 \u2551\n\u2551 Tags: framework-input \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#254 isinstance(chat_request, list) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#257 _convert_chat_request_or_throw(chat_request) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#247 _convert_chat_request_or_throw(chat_request) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#249 ChatCompletionRequest.validate_compat(chat_request) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#250 model.messages \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#88 _chat_model_to_langchain_message(message) \u21a9 \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#99 message.tool_call_id \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/langchain/utils/chat.py#250 _chat_model_to_langchain_message(message) \u2551\n\u2551 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/langchain-core@0.3.75 \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#7 argument col \u21a9 to the function _infer_required can be used to reach 3 packages. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/types/utils.py#514 _infer_required(col) \u21a9 \u2551\n\u2551 Tags: framework-input \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#515 isinstance(col, (list, pd.Series)) \u2551\n\u2551 \u2502 Tags: pkg:pypi/pyspark, pkg:pypi/pyspark@3.5.6, pkg:pypi/pyspark@4.0.0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#516 col.__iter__() \u2551\n\u2551 \u2502 Tags: pkg:pypi/pyspark, pkg:pypi/pyspark@3.5.6, pkg:pypi/pyspark@4.0.0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#507 _is_none_or_nan(x) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#508 isinstance(x, float) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#511 x is None \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/types/utils.py#516 _is_none_or_nan(x) \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/pyspark@4.0.0 \n pkg:pypi/pyspark@3.5.6 \n pkg:pypi/pyspark \n\n#8 argument col \u21a9 to the function _infer_required can be used to reach 3 packages. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/types/utils.py#514 _infer_required(col) \u21a9 \u2551\n\u2551 Tags: framework-input \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#515 isinstance(col, (list, pd.Series)) \u2551\n\u2551 \u2502 Tags: pkg:pypi/pyspark, pkg:pypi/pyspark@3.5.6, pkg:pypi/pyspark@4.0.0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#517 _is_none_or_nan(col) \u2551\n\u2551 \u2502 Tags: pkg:pypi/pyspark, pkg:pypi/pyspark@3.5.6, pkg:pypi/pyspark@4.0.0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#507 _is_none_or_nan(x) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#508 isinstance(x, float) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/types/utils.py#511 x is None \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/types/utils.py#517 _is_none_or_nan(col) \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/pyspark@4.0.0 \n pkg:pypi/pyspark@3.5.6 \n pkg:pypi/pyspark \n\n#9 argument input \u2b55 to the function invoke can be used to reach this package from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/langchain/chat_agent_langgraph.py#308 invoke(input) \u21a9 \u2551\n\u2551 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#315 input[\"messages\"] \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#316 messages.__iter__() \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#320 convert_to_messages(messages) \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#322 tmp19.invoke(input, config) \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#326 result[\"messages\"] \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#328 m.content \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#339 parse_message(m, attachments = return_obj.get(\"attachments\")) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#279 parse_message(msg) \u21a9 \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#341 parse_message(m) \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#284 convert_lc_message_to_chat_message(msg) \u2551\n\u2551 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/langchain-core@0.3.75 \n\n#10 argument input \u2b55 to the function invoke can be used to reach this package from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/langchain/chat_agent_langgraph.py#308 invoke(input) \u21a9 \u2551\n\u2551 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#315 input[\"messages\"] \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#316 messages.__iter__() \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#320 convert_to_messages(messages) \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#322 tmp19.invoke(input, config) \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#326 result[\"messages\"] \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#328 m.content \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#339 parse_message(m, attachments = return_obj.get(\"attachments\")) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#279 parse_message(msg) \u21a9 \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#341 parse_message(m) \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#284 convert_lc_message_to_chat_message(msg) \u2551\n\u2551 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/langchain-core@0.3.75 \n\n#11 argument self \u2b55 to the function get_logged_model can be used to reach 2 packages from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 mlflow/tracking/client.py#5447 get_logged_model(self) \u21a9 \u2551\n\u2551 Tags: cli-source \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/client.py#5458 self._tracking_client \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#772 tmp122.get_logged_model(parsed_model_uri.model_id) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#774 model.source_run_id \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#785 not run_id \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#803 SqlModelVersion(name = name, version = version, creation_time = creation_time, last_updated_time = creation_time, source = source, storage_location = \u2551\n\u2551 \u2502 storage_location, run_id = run_id, run_link = run_link, description = description) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#813 \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#816 model_version.to_mlflow_entity() \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#113 to_mlflow_entity(self) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#126 self.model_version_tags \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#115 self.name \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#121 self.current_stage \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#127 self.run_link \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#116 self.version \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#118 self.last_updated_time \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#122 self.source \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#120 self.user_id \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#125 self.status_message \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#117 self.creation_time \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#123 self.run_id \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#119 self.description \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#124 self.status \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#114 ModelVersion(self.name, self.version, self.creation_time, self.last_updated_time, self.description, self.user_id, self.current_stage, self.source, self.run_id, \u2551\n\u2551 \u2502 self.status, self.status_message, tmp12 = [] \u2934 \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#822 _logger.info(\"Model Version creation error (name=%s) Retrying %s more time%s.\", name, str(more_retries), \"s\" if more_retries > 1 else \"\") \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#793 self._get_registered_model(session, name) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#814 session.flush() \u2551\n\u2551 \u2502 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#815 self._populate_model_version_aliases(session, name, model_version.to_mlflow_entity()) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#791 self.CREATE_MODEL_VERSION_RETRIES \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#793 self._get_registered_model(session, name) \u2934 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#795 next_version(sql_registered_model) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#755 next_version(sql_registered_model) \u21a9 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#757 sql_registered_model.model_versions \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/sqlalchemy@2.0.43 \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#12 argument self \u2b55 to the function get_logged_model can be used to reach 2 packages from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 mlflow/tracking/client.py#5447 get_logged_model(self) \u21a9 \u2551\n\u2551 Tags: cli-source \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/client.py#5458 self._tracking_client \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#786 tmp123.get_logged_model(model_id) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#787 model.source_run_id \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#803 SqlModelVersion(name = name, version = version, creation_time = creation_time, last_updated_time = creation_time, source = source, storage_location = \u2551\n\u2551 \u2502 storage_location, run_id = run_id, run_link = run_link, description = description) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#813 \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#816 model_version.to_mlflow_entity() \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#113 to_mlflow_entity(self) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#126 self.model_version_tags \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#115 self.name \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#121 self.current_stage \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#127 self.run_link \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#116 self.version \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#118 self.last_updated_time \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#122 self.source \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#120 self.user_id \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#125 self.status_message \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#117 self.creation_time \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#123 self.run_id \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#119 self.description \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#124 self.status \u2551\n\u2551 \u251c\u2500\u2500 mlflow/store/model_registry/dbmodels/models.py#114 ModelVersion(self.name, self.version, self.creation_time, self.last_updated_time, self.description, self.user_id, self.current_stage, self.source, self.run_id, \u2551\n\u2551 \u2502 self.status, self.status_message, tmp12 = [] \u2934 \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#822 _logger.info(\"Model Version creation error (name=%s) Retrying %s more time%s.\", name, str(more_retries), \"s\" if more_retries > 1 else \"\") \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#793 self._get_registered_model(session, name) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#814 session.flush() \u2551\n\u2551 \u2502 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#815 self._populate_model_version_aliases(session, name, model_version.to_mlflow_entity()) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#791 self.CREATE_MODEL_VERSION_RETRIES \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#793 self._get_registered_model(session, name) \u2934 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#795 next_version(sql_registered_model) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#755 next_version(sql_registered_model) \u21a9 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/store/model_registry/sqlalchemy_store.py#757 sql_registered_model.model_versions \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/sqlalchemy@2.0.43 \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#13 argument name \u2b55 to the function get_experiment_by_name can be used to reach 2 packages from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 mlflow/tracking/client.py#1706 get_experiment_by_name(name) \u21a9 \u2551\n\u2551 Tags: cli-source \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/client.py#1738 tmp46.get_experiment_by_name(name) \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/fluent.py#3013 tmp161.get_experiment_by_name(experiment_name) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/fluent.py#3015 exp.experiment_id \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/fluent.py#3018 {experiment_id} \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/fluent.py#3026 experiment_id is not None \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/fluent.py#3028 tmp163.get_experiment(experiment_id) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/client.py#1672 get_experiment(experiment_id) \u21a9 \u2551\n\u2551 \u2502 Tags: cli-source \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/client.py#1704 tmp45.get_experiment(experiment_id) \u2551\n\u2551 \u251c\u2500\u2500 mlflow/tracking/fluent.py#3043 _get_experiment_id_from_env() \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#884 _get_experiment_id() \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#880 metric.key \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#883 SqlLoggedModelMetric(model_id = metric.model_id, metric_name = metric.key, metric_timestamp_ms = metric.timestamp, metric_step = metric.step, metric_value = \u2551\n\u2551 \u2502 value, experiment_id = experiment_id or _get_experiment_id(), run_id = run_id, dataset_uuid = dataset_uuid, dataset_name = metric.dataset_name, dataset_digest = metric.dataset_digest) \u2551\n\u2551 \u2502 Tags: pkg:pypi/mlflow@3.3.3.dev0 \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#881 metric.timestamp \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#888 metric.dataset_digest \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#877 metric_instances.append(SqlLoggedModelMetric(model_id = metric.model_id, metric_name = metric.key, metric_timestamp_ms = metric.timestamp, metric_step = \u2551\n\u2551 \u2502 metric.step, metric_value = value, experiment_id = experiment_id or _get_experiment_id(), run_id = run_id, dataset_uuid = dataset_uuid, dataset_name = metric.dataset_name, dataset_digest = metric.dataset_digest)) \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#894 session.add_all(metric_instances) \u2551\n\u2551 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/sqlalchemy@2.0.43 \n pkg:pypi/mlflow@3.3.3.dev0 \n\n#14 argument session \u2b55 to the function _apply_order_by_search_logged_models can be used to reach this package from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2261 _apply_order_by_search_logged_models(session) \u21a9 \u2551\n\u2551 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2258 _apply_order_by_search_logged_models(self, models, session, order_by) \u2551\n\u2551 \u2502 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2261 _apply_order_by_search_logged_models(session) \u21a9 \u2551\n\u2551 \u2502 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2304 session.query(SqlLoggedModelMetric.model_id, SqlLoggedModelMetric.metric_value, tmp516 = tmp519 = func.rank() \u2551\n\u2551 \u2502 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2305 SqlLoggedModelMetric.model_id \u2551\n\u2551 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/sqlalchemy@2.0.43 \n\n#15 argument session \u2b55 to the function _apply_order_by_search_logged_models can be used to reach this package from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2261 _apply_order_by_search_logged_models(session) \u21a9 \u2551\n\u2551 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2258 _apply_order_by_search_logged_models(self, models, session, order_by) \u2551\n\u2551 \u2502 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2261 _apply_order_by_search_logged_models(session) \u21a9 \u2551\n\u2551 \u2502 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2304 session.query(SqlLoggedModelMetric.model_id, SqlLoggedModelMetric.metric_value, tmp516 = tmp519 = func.rank() \u2551\n\u2551 \u2502 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/store/tracking/sqlalchemy_store.py#2306 SqlLoggedModelMetric.metric_value \u2551\n\u2551 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/sqlalchemy@2.0.43 \n\n#16 argument msg \u2b55 to the function parse_message can be used to reach this package from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/langchain/chat_agent_langgraph.py#279 parse_message(msg) \u21a9 \u2551\n\u2551 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#339 parse_message(m, attachments = return_obj.get(\"attachments\")) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#341 parse_message(m) \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#284 convert_lc_message_to_chat_message(msg) \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u251c\u2500\u2500 mlflow/langchain/utils/chat.py#48 convert_lc_message_to_chat_message(lc_message) \u21a9 \u2551\n\u2551 \u2502 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2502 \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/langchain/chat_agent_langgraph.py#286 msg.name \u2551\n\u2551 Tags: pkg:pypi/langchain-core@0.3.75, framework, ml \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/langchain-core@0.3.75 \n\n#17 argument engine \u2b55 to the function migrate can be used to reach 2 packages from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/server/auth/db/utils.py#24 migrate(engine) \u21a9 \u2551\n\u2551 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/server/auth/db/utils.py#25 engine.url \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/server/auth/db/utils.py#14 _get_alembic_config(url) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/server/auth/db/utils.py#19 url.replace(\"%\", \"%%\") \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/server/auth/db/utils.py#20 alembic_cfg.set_main_option(\"sqlalchemy.url\", url) \u2551\n\u2551 Tags: pkg:pypi/alembic@1.16.5 \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/alembic@1.16.5 \n pkg:pypi/sqlalchemy@2.0.43 \n\n#18 argument engine \u2b55 to the function migrate_if_needed can be used to reach 2 packages from certain endpoints. \n\u2554\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2557\n\u2551 build/lib/mlflow/server/auth/db/utils.py#31 migrate_if_needed(engine) \u21a9 \u2551\n\u2551 Tags: pkg:pypi/sqlalchemy@2.0.43, framework \u2551\n\u2551 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/server/auth/db/utils.py#32 engine.url \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/server/auth/db/utils.py#14 _get_alembic_config(url) \u21a9 \u2551\n\u2551 \u251c\u2500\u2500 build/lib/mlflow/server/auth/db/utils.py#19 url.replace(\"%\", \"%%\") \u2551\n\u2551 \u2514\u2500\u2500 build/lib/mlflow/server/auth/db/utils.py#20 alembic_cfg.set_main_option(\"sqlalchemy.url\", url) \u2551\n\u2551 Tags: pkg:pypi/alembic@1.16.5 \u2551\n\u2551 \u2551\n\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u255d\n Reachable Packages: \n pkg:pypi/alembic@1.16.5 \n pkg:pypi/sqlalchemy@2.0.43 \n\n Secure Design Tips \n\n \u2022 Review the validation and sanitization methods used in the application. \n \u2022 To enhance the security posture, implement a common validation middleware. \n"}]}