ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
PyPI | PYSEC-2022-12 | null | IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerabili... | {'GHSA-pq7m-3gw7-gq5x', 'CVE-2022-21699'} | 2022-01-26T19:22:31.675139Z | 2022-01-19T22:15:00Z | null | null | null | {'https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html', 'https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x', 'https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699', 'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c... | null | {'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668'} | {'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668'} |
PyPI | PYSEC-2020-134 | null | In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, inde... | {'GHSA-cvpc-8phh-8f45', 'CVE-2020-15211'} | 2020-10-29T16:15:00Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/cd31fd0ce0449a9e0f83dcad08d6ed7f1d6bef3f', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/fff2c8326280c07733828f990548979bdc893859', 'https://github.com/tensorflow/tensorflow/commit/e11f5558... | null | {'https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35', 'https://github.com/tensorflow/tensorflow/commit/cd31fd0ce0449a9e0f83dcad08d6ed7f1d6bef3f', 'https://github.com/tensorflow/tensorflow/commit/e11f55585f614645b360563072ffeb5c3eeff162', 'https://github.com/tensorflow/tensorflow/c... | {'https://github.com/tensorflow/tensorflow/commit/00302787b788c5ff04cb6f62aed5a74d936e86c0', 'https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35', 'https://github.com/tensorflow/tensorflow/commit/e11f55585f614645b360563072ffeb5c3eeff162', 'https://github.com/tensorflow/tensorflow/c... |
PyPI | PYSEC-2021-837 | null | Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. A... | {'CVE-2021-43781', 'GHSA-xr38-w74q-r8jv'} | 2021-12-10T06:37:24.185813Z | 2021-12-06T18:15:00Z | null | null | null | {'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv', 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'} | null | {'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'} | {'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'} |
PyPI | GHSA-2473-9hgq-j7xw | Cross-Site Scripting in Wagtail | ### Impact
When a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form rendering helpers such as `form.as_p` ([as directed in the documentation](https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage)... | {'CVE-2020-15118'} | 2022-03-03T05:13:59.610986Z | 2020-07-20T17:50:30Z | MODERATE | null | {'CWE-79'} | {'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34', 'https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-2473-9hgq-j7xw', 'https://docs.wagtail.io/en/stable/reference/contrib/forms/ind... | null | {'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34'} | {'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34'} |
PyPI | GHSA-x9j7-x98r-r4w2 | Segmentation fault in tensorflow-lite | ### Impact
If a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption.
### Patches
We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3.
We... | {'CVE-2020-15210'} | 2022-03-03T05:14:16.385167Z | 2020-09-25T18:28:51Z | MODERATE | null | {'CWE-20', 'CWE-787'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2', 'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov... | null | {'https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453'} | {'https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453'} |
PyPI | PYSEC-2018-46 | null | Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, ... | {'CVE-2018-1000089'} | 2021-07-05T00:01:17.580240Z | 2018-03-13T15:29:00Z | null | null | null | {'https://github.com/anymail/django-anymail/releases/tag/v1.4', 'https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef'} | null | {'https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef'} | {'https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef'} |
PyPI | PYSEC-2021-134 | null | Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.27.0, the notification emails sent for notifications for missed messages or for an expiring account are subject to HTML injection. I... | {'GHSA-c5f8-35qr-q4fm', 'CVE-2021-21333'} | 2021-08-27T03:22:06.710356Z | 2021-03-26T20:15:00Z | null | null | null | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df', 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0', 'https://github.com/matrix-org/synapse/pull/9200', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm'} | null | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'} | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'} |
PyPI | PYSEC-2021-564 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8... | {'GHSA-hpv4-7p9c-mvfr', 'CVE-2021-37651'} | 2021-12-09T06:35:03.344534Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr'} | null | {'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30'} | {'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30'} |
PyPI | GHSA-2r8p-fg3c-wcj4 | Heap OOB and CHECK fail in `ResourceGather` | ### Impact
An attacker can trigger a crash via a `CHECK`-fail in debug builds of TensorFlow using `tf.raw_ops.ResourceGather` or a read from outside the bounds of heap allocated data in the same API in a release build:
```python
import tensorflow as tf
tensor = tf.constant(value=[[1,2],[3,4],[5,6]],shape=(3,2),dtype=... | {'CVE-2021-37654'} | 2022-03-03T05:13:57.699257Z | 2021-08-25T14:43:01Z | HIGH | null | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37654', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d'} | null | {'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d'} | {'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d'} |
PyPI | PYSEC-2020-39 | null | Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means ... | {'GHSA-vhr6-pvjm-9qwf', 'CVE-2020-15105'} | 2020-07-21T18:06:00Z | 2020-07-10T21:15:00Z | null | null | null | {'https://github.com/Bouke/django-two-factor-auth/blob/master/CHANGELOG.md#112---2020-07-08', 'https://github.com/Bouke/django-two-factor-auth/security/advisories/GHSA-vhr6-pvjm-9qwf', 'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359'} | null | {'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359'} | {'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359'} |
PyPI | PYSEC-2021-572 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations). The [implementation](https://github.co... | {'CVE-2021-37659', 'GHSA-q3g3-h9r4-prrc'} | 2021-12-09T06:35:04.007163Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc', 'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec'} | null | {'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec'} | {'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec'} |
PyPI | GHSA-5xp3-jfq3-5q8x | Improper Input Validation in pip | A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1. | {'CVE-2021-3572'} | 2022-04-22T15:47:50.401286Z | 2021-11-15T17:45:01Z | MODERATE | null | {'CWE-20'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pypa/pip', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3572', 'https://access.redhat.com/errata/RHSA-2021:3254', 'https://bugzilla.redhat.com/show_bug.cgi?id=1962856', 'https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb3... | null | {'https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b'} | {'https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b'} |
PyPI | GHSA-m342-ff57-4jcc | Heap OOB read in `tf.raw_ops.SparseCountSparseOutput` | ### Impact
The [shape inference functions for `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/ops/count_ops.cc#L43-L50) can trigger a read outside of bounds of heap allocated array:
```python
import tensorflow as tf
@tf.function
def fun... | {'CVE-2021-41210'} | 2022-03-03T05:14:12.419108Z | 2021-11-10T19:01:44Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41210'} | null | {'https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2'} | {'https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2'} |
PyPI | PYSEC-2021-821 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `tf.ragged.cross` has an undefined behavior due to binding a reference to `nullptr`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and ... | {'GHSA-vwhq-49r4-gj9v', 'CVE-2021-41214'} | 2021-12-09T06:35:43.281523Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v'} | null | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} |
PyPI | GHSA-8h46-5m9h-7553 | Heap out of bounds write in `RaggedBinCount` | ### Impact
If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow:
```python
import tensorflow as tf
tf.raw_ops.RaggedBincount(splits=[7,8], values= [5, 16, 51, 76, 29... | {'CVE-2021-29514'} | 2022-03-03T05:13:37.569995Z | 2021-05-21T14:20:51Z | LOW | null | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29514'} | null | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'} | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'} |
PyPI | PYSEC-2020-122 | null | In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has the minimum required number of elements. Code uses this quantity to initialize a different data structure. Since `Ba... | {'GHSA-x5cp-9pcf-pp3h', 'CVE-2020-15199'} | 2021-09-01T08:19:33.217572Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x5cp-9pcf-pp3h', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
PyPI | PYSEC-2021-43 | null | Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. The prob... | {'GHSA-jff3-mwp3-f8cw', 'CVE-2021-21360'} | 2021-03-12T18:05:00Z | 2021-03-09T01:15:00Z | null | null | null | {'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57', 'https://pypi.org/project/Products.GenericSetup/', 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw'} | null | {'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'} | {'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'} |
PyPI | PYSEC-2021-749 | null | TensorFlow is an end-to-end open source platform for machine learning. Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490... | {'GHSA-hwr7-8gxx-fj5p', 'CVE-2021-37638'} | 2021-12-09T06:35:35.577694Z | 2021-08-12T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p'} | null | {'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314'} | {'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314'} |
PyPI | GHSA-j47f-4232-hvv8 | Heap out of bounds read in `RaggedCross` | ### Impact
An attacker can force accesses outside the bounds of heap allocated arrays by passing in invalid tensor values to `tf.raw_ops.RaggedCross`:
```python
import tensorflow as tf
ragged_values = []
ragged_row_splits = []
sparse_indices = []
sparse_values = []
sparse_shape = []
dense_inputs_elem = tf.constant(... | {'CVE-2021-29532'} | 2022-03-03T05:12:53.744101Z | 2021-05-21T14:22:17Z | LOW | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8', 'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29532'} | null | {'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'} | {'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'} |
PyPI | PYSEC-2020-319 | null | In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code imm... | {'GHSA-q8gv-q7wr-9jf8', 'CVE-2020-15204'} | 2021-12-09T06:35:13.891462Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1'} | {'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1'} |
PyPI | PYSEC-2021-460 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can force accesses outside the bounds of heap allocated arrays by passing in invalid tensor values to `tf.raw_ops.RaggedCross`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/efea03b38fb8d3b81762237dc85e... | {'CVE-2021-29532', 'GHSA-j47f-4232-hvv8'} | 2021-12-09T06:34:48.349137Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8', 'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'} | null | {'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'} | {'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'} |
PyPI | GHSA-wjw6-2cqr-j4qr | Client metadata path-traversal | ### Impact
In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path tr... | {'CVE-2021-41131'} | 2022-03-03T05:13:15.399393Z | 2021-10-19T20:14:36Z | HIGH | null | {'CWE-22'} | {'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102', 'https://github.com/theupdateframework/python-tuf/issues/1527', 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr', 'https://github.com/theupdateframework/python-tuf', 'https://nv... | null | {'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102'} | {'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102'} |
PyPI | PYSEC-2022-53 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `UnravelIndex` is vulnerable to a division by zero caused by an integer overflow bug. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are... | {'GHSA-34f9-hjfq-rr8j', 'CVE-2022-21729'} | 2022-03-09T00:17:30.437565Z | 2022-02-03T13:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-34f9-hjfq-rr8j', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135', 'https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af'} | null | {'https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af'} | {'https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af'} |
PyPI | PYSEC-2020-81 | null | libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. | {'CVE-2020-5310', 'GHSA-vcqg-3p29-xw73'} | 2020-01-31T04:15:00Z | 2020-01-03T01:15:00Z | null | null | null | {'https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4', 'https://usn.ubuntu.com/4272-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://lists.fedoraproject.org/archives/list/package-announc... | null | {'https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4'} | {'https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4'} |
PyPI | GHSA-6g85-3hm8-83f9 | CHECK-fail in `QuantizeAndDequantizeV4Grad` | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`:
```python
import tensorflow as tf
gradient_tensor = tf.constant([0.0], shape=[1])
input_tensor = tf.constant([0.0], shape=[1])
input_min = tf.constant([[0.0]], shape=[1, 1])
input_max = tf.constant([... | {'CVE-2021-29544'} | 2022-03-03T05:13:03.019061Z | 2021-05-21T14:23:22Z | LOW | null | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29544', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} | null | {'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} | {'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} |
PyPI | PYSEC-2021-175 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a division by zero to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L5... | {'GHSA-j8qc-5fqr-52fp', 'CVE-2021-29538'} | 2021-08-27T03:22:28.180235Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qc-5fqr-52fp', 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'} | null | {'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'} | {'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'} |
PyPI | PYSEC-2021-525 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83). An a... | {'GHSA-v52p-hfjf-wg88', 'CVE-2021-29597'} | 2021-12-09T06:34:58.435866Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88'} | null | {'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'} | {'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'} |
PyPI | GHSA-rpx7-33j2-xx9x | Arbitrary file deletion in NeMo ASR webapp | ### Description
NVIDIA NeMo contains a vulnerability in ASR WebApp, where Relative Path Traversal (CWE-23) may lead to deletion of any directory through the "../" structure when admin privileges are available.
CVSS Score = 2.0
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L... | null | 2022-04-15T19:46:57.518536Z | 2022-02-15T01:57:18Z | LOW | null | null | {'https://github.com/NVIDIA/NeMo', 'https://github.com/NVIDIA/NeMo/security/advisories/GHSA-rpx7-33j2-xx9x', 'https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0'} | null | {'https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0'} | {'https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0'} |
PyPI | PYSEC-2021-461 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/... | {'GHSA-393f-2jr3-cp69', 'CVE-2021-29533'} | 2021-12-09T06:34:48.500169Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-393f-2jr3-cp69', 'https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87'} | null | {'https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87'} | {'https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87'} |
PyPI | PYSEC-2022-52 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check fo... | {'GHSA-6gmv-pjp9-p8w8', 'CVE-2022-21728'} | 2022-03-09T00:17:30.293594Z | 2022-02-03T11:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gmv-pjp9-p8w8', 'https:/... | null | {'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995'} | {'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995'} |
PyPI | GHSA-4w8p-x6g8-fv64 | Server-Side Request Forgery in calibreweb | calibreweb prior to version 0.6.16 contains a Server-Side Request Forgery (SSRF) vulnerability. | {'CVE-2022-0339'} | 2022-04-04T21:46:56.538317Z | 2022-02-01T00:48:54Z | MODERATE | null | {'CWE-918'} | {'https://github.com/janeczku/calibre-web/commit/35f6f4c727c887f8f3607fe3233dbc1980d15020', 'https://github.com/janeczku/calibre-web/commit/3b216bfa07ec7992eff03e55d61732af6df9bb92', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0339', 'https://github.com/janeczku/calibre-web', 'https://huntr.dev/bounties/499688c4-6ac4-40... | null | {'https://github.com/janeczku/calibre-web/commit/3b216bfa07ec7992eff03e55d61732af6df9bb92', 'https://github.com/janeczku/calibre-web/commit/35f6f4c727c887f8f3607fe3233dbc1980d15020'} | {'https://github.com/janeczku/calibre-web/commit/3b216bfa07ec7992eff03e55d61732af6df9bb92', 'https://github.com/janeczku/calibre-web/commit/35f6f4c727c887f8f3607fe3233dbc1980d15020'} |
PyPI | PYSEC-2021-174 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedResizeBilinear` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/50711818d2e61ccce012591eeb4fdf93a849672... | {'GHSA-8c89-2vwr-chcq', 'CVE-2021-29537'} | 2021-08-27T03:22:28.012732Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq'} | null | {'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694'} | {'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694'} |
PyPI | PYSEC-2014-25 | null | The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method. | {'CVE-2011-4104'} | 2021-07-25T23:34:28.733002Z | 2014-10-27T01:55:00Z | null | null | null | {'https://groups.google.com/forum/#!topic/django-tastypie/i2aNGDHTUBI', 'http://www.openwall.com/lists/oss-security/2011/11/02/7', 'https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/', 'http://www.openwall.com/lists/oss-security/2011/11/02/1', 'https://github.com/toastdriven/django-... | null | {'https://github.com/toastdriven/django-tastypie/commit/e8af315211b07c8f48f32a063233cc3f76dd5bc2'} | {'https://github.com/toastdriven/django-tastypie/commit/e8af315211b07c8f48f32a063233cc3f76dd5bc2'} |
PyPI | PYSEC-2021-524 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `EmbeddingLookup` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74). An att... | {'GHSA-4vrf-ff7v-hpgr', 'CVE-2021-29596'} | 2021-12-09T06:34:58.287349Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr'} | null | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'} | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'} |
PyPI | PYSEC-2021-748 | null | TensorFlow is an end-to-end open source platform for machine learning. It is possible to trigger a null pointer dereference in TensorFlow by passing an invalid input to `tf.raw_ops.CompressElement`. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/co... | {'CVE-2021-37637', 'GHSA-c9qf-r67m-p7cg'} | 2021-12-09T06:35:35.492639Z | 2021-08-12T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9qf-r67m-p7cg'} | null | {'https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5'} | {'https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5'} |
PyPI | PYSEC-2020-318 | null | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issu... | {'GHSA-xmq7-7fxm-rr79', 'CVE-2020-15203'} | 2021-12-09T06:35:13.671465Z | 2020-09-25T19:15:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79', 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'} | {'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'} |
PyPI | GHSA-6445-fm66-fvq2 | Integer overflows in Tensorflow | ### Impact
The [implementation of `AddManySparseToTensorsMap`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc) is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an a... | {'CVE-2022-23568'} | 2022-03-03T05:13:28.738493Z | 2022-02-09T23:39:11Z | MODERATE | null | {'CWE-190'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23568', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a44... | null | {'https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c', 'https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8'} | {'https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c', 'https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8'} |
PyPI | PYSEC-2021-436 | null | Synapse is a package for Matrix homeservers written in Python 3/Twisted. Prior to version 1.47.1, Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory. No authentication is required for the affected endpoint. The last 2 directories a... | {'CVE-2021-41281', 'GHSA-3hfw-x7gx-437c'} | 2021-11-29T23:11:29.870597Z | 2021-11-23T20:15:00Z | null | null | null | {'https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c', 'https://github.com/matrix-org/synapse/commit/91f2bd090', 'https://github.com/matrix-org/synapse/releases/tag/v1.47.1'} | null | {'https://github.com/matrix-org/synapse/commit/91f2bd090'} | {'https://github.com/matrix-org/synapse/commit/91f2bd090'} |
PyPI | PYSEC-2021-573 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b... | {'GHSA-cm5x-837x-jf3c', 'CVE-2021-37660'} | 2021-12-09T06:35:04.091418Z | 2021-08-12T18:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c', 'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'} | null | {'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'} | {'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'} |
PyPI | PYSEC-2018-51 | null | An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized. | {'GHSA-m9mq-p2f9-cfqv', 'CVE-2018-7753'} | 2021-07-15T02:22:07.141398Z | 2018-03-07T23:29:00Z | null | null | null | {'https://bugs.debian.org/892252', 'https://github.com/advisories/GHSA-m9mq-p2f9-cfqv', 'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef', 'https://github.com/mozilla/bleach/releases/tag/v2.1.3'} | null | {'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'} | {'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'} |
PyPI | GHSA-2xgj-xhgf-ggjv | Heap buffer overflow in `BandedTriangularSolve` | ### Impact
An attacker can trigger a heap buffer overflow in Eigen implementation of `tf.raw_ops.BandedTriangularSolve`:
```python
import tensorflow as tf
import numpy as np
matrix_array = np.array([])
matrix_tensor = tf.convert_to_tensor(np.reshape(matrix_array,(0,1)),dtype=tf.float32)
rhs_array = np.array([1,1])
... | {'CVE-2021-29612'} | 2022-03-03T05:12:03.570252Z | 2021-05-21T14:28:37Z | LOW | null | {'CWE-120'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29612', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0'} | null | {'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'} | {'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0'} |
PyPI | PYSEC-2021-820 | null | TensorFlow is an open source platform for machine learning. In affected versions the code behind `tf.function` API can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive. This occurs due to using a non-reentrant `Lock` Python object. Loading any model which contains mutually re... | {'GHSA-h67m-xg8f-fxcf', 'CVE-2021-41213'} | 2021-12-09T06:35:43.109542Z | 2021-11-05T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf', 'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'} | null | {'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'} | {'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'} |
PyPI | PYSEC-2020-123 | null | In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Thus, the code sets up conditions to ... | {'CVE-2020-15200', 'GHSA-x7rp-74x2-mjf3'} | 2021-09-01T08:19:33.281926Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x7rp-74x2-mjf3', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
PyPI | GHSA-c87f-fq5g-63r2 | Cross-site scripting in Unicorn framework | The Unicorn framework through 0.35.3 for Django allows XSS via component.name. | {'CVE-2021-42053'} | 2022-03-03T05:14:06.409650Z | 2021-10-12T17:51:11Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-42053', 'http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html', 'https://github.com/adamghill/django-unicorn', 'https://github.com/adamghill/django-unicorn/compare/0.35.3...0.36.0', 'https://github.com/adamghill/django-unicorn/pull/288/c... | null | {'https://github.com/adamghill/django-unicorn/pull/288/commits/aa5b9835d946bd9893ef02e556859e3ea62cc5e2'} | {'https://github.com/adamghill/django-unicorn/pull/288/commits/aa5b9835d946bd9893ef02e556859e3ea62cc5e2'} |
PyPI | GHSA-2647-c639-qv2j | Server-Side Request Forgery in calibreweb | calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is due to an incomplete fix for [CVE-2022-0339](https://github.com/advisories/GHSA-4w8p-x6g8-fv64). The blacklist does not check for `0.0.0.0`, which would result in a payload of `0.0.0.0` resolving to `localhost`. | {'CVE-2022-0766'} | 2022-03-18T21:32:04.972354Z | 2022-03-08T00:00:31Z | CRITICAL | null | {'CWE-918'} | {'https://huntr.dev/bounties/7f2a5bb4-e6c7-4b6a-b8eb-face9e3add7b', 'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8', 'https://github.com/janeczku/calibre-web', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0766'} | null | {'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8'} | {'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8'} |
PyPI | GHSA-r4c4-5fpq-56wg | Heap OOB in boosted trees | ### Impact
An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `BoostedTreesSparseCalculateBestFeatureSplit`:
```python
import tensorflow as tf
tf.raw_ops.BoostedTreesSparseCalculateBestFeatureSplit(
node_id_range=[0,10],
stats_summary_indices=[[1, ... | {'CVE-2021-37664'} | 2022-03-03T05:13:33.318020Z | 2021-08-25T14:42:20Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37664', 'https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378'} | null | {'https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378'} | {'https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378'} |
PyPI | GHSA-hc6c-75p4-hmq4 | Reference binding to null pointer in `MatrixDiag*` ops | ### Impact
The implementation of [`MatrixDiag*` operations](https://github.com/tensorflow/tensorflow/blob/4c4f420e68f1cfaf8f4b6e8e3eb857e9e4c3ff33/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L195-L197) does not validate that the tensor arguments are non-empty:
```cc
num_rows = context->input(2).flat<int32>(... | {'CVE-2021-29515'} | 2022-03-03T05:13:41.020454Z | 2021-05-21T14:20:54Z | LOW | null | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hc6c-75p4-hmq4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29515'} | null | {'https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6'} | {'https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6'} |
PyPI | GHSA-v82p-hv3v-p6qp | Incomplete validation in MKL requantization | ### Impact
Due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays:
```python
import tensorflow as tf
tf.raw_ops.RequantizationRangePerChannel(
input=[],... | {'CVE-2021-37665'} | 2022-03-03T05:13:28.232290Z | 2021-08-25T14:42:16Z | HIGH | null | {'CWE-20'} | {'https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp', 'https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9', 'https:... | null | {'https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69', 'https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9'} | {'https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9', 'https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69'} |
PyPI | PYSEC-2013-21 | null | The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "... | {'CVE-2013-6044'} | 2021-07-15T02:22:09.088856Z | 2013-10-04T17:55:00Z | null | null | null | {'http://secunia.com/advisories/54476', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/86437', 'https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a', 'http://www.debian.org/security/2013/dsa-2740', 'http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html', 'http://seclists.o... | null | {'https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a', 'https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762', 'https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f'} | {'https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a', 'https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762', 'https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f'} |
PyPI | GHSA-hm45-mgqm-gjm4 | Remote Code Execution (RCE) Exploit on Cross Site Scripting (XSS) Vulnerability | ### Impact
A RCE exploit has been discovered in the Red Discord Bot - Dashboard Webserver: this exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access ... | {'CVE-2020-26249'} | 2022-03-03T05:13:57.306089Z | 2020-12-08T23:55:54Z | HIGH | null | {'CWE-79'} | {'https://github.com/Cog-Creators/Red-Dashboard/security/advisories/GHSA-hm45-mgqm-gjm4', 'https://github.com/Cog-Creators/Red-Dashboard/commit/a6b9785338003ec87fb75305e7d1cc2d40c7ab91', 'https://pypi.org/project/Red-Dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26249', 'https://github.com/Cog-Creators/Red-Das... | null | {'https://github.com/Cog-Creators/Red-Dashboard/commit/a6b9785338003ec87fb75305e7d1cc2d40c7ab91', 'https://github.com/Cog-Creators/Red-Dashboard/commit/99d88b840674674166ce005b784ae8e31e955ab1'} | {'https://github.com/Cog-Creators/Red-Dashboard/commit/99d88b840674674166ce005b784ae8e31e955ab1', 'https://github.com/Cog-Creators/Red-Dashboard/commit/a6b9785338003ec87fb75305e7d1cc2d40c7ab91'} |
PyPI | PYSEC-2021-420 | null | TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it calls `eval` on user supplied strings. This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is ... | {'GHSA-3rcw-9p9x-582v', 'CVE-2021-41228'} | 2021-11-13T06:52:46.380831Z | 2021-11-05T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v'} | null | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'} | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'} |
PyPI | PYSEC-2022-13 | null | Wagtail is a Django based content management system focused on flexibility and user experience. When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in ... | {'GHSA-xqxm-2rpm-3889', 'CVE-2022-21683'} | 2022-01-26T19:22:48.977586Z | 2022-01-18T18:15:00Z | null | null | null | {'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889', 'https://github.com/wagtail/wagtail/releases/tag/v2.15.2'} | null | {'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd'} | {'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd'} |
PyPI | PYSEC-2020-135 | null | In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `output_data` buffer. This... | {'GHSA-hx2x-85gr-wrpq', 'CVE-2020-15212'} | 2020-10-01T18:20:00Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx2x-85gr-wrpq', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'} | {'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'} |
PyPI | PYSEC-2021-836 | null | Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. A... | {'CVE-2021-43781', 'GHSA-xr38-w74q-r8jv'} | 2021-12-09T07:29:22.280279Z | 2021-12-06T18:15:00Z | null | null | null | {'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv', 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'} | null | {'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'} | {'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'} |
PyPI | PYSEC-2018-47 | null | Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | {'GHSA-42fp-4hm3-j8r7', 'CVE-2017-5934'} | 2021-07-05T00:01:23.080305Z | 2018-10-15T19:29:00Z | null | null | null | {'https://www.debian.org/security/2018/dsa-4318', 'http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html', 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7', 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024', 'http://moinmo.in/SecurityFixes', 'https://lists.de... | null | {'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'} | {'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'} |
PyPI | PYSEC-2021-135 | null | Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.33.2 "Push rules" can specify conditions under which they will match, including `event_match`, which matches event content against a... | {'GHSA-x345-32rc-8h85', 'CVE-2021-29471'} | 2021-08-27T03:22:06.756710Z | 2021-05-11T15:15:00Z | null | null | null | {'https://github.com/matrix-org/synapse/security/advisories/GHSA-x345-32rc-8h85', 'https://github.com/matrix-org/synapse/releases/tag/v1.33.2', 'https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c'} | null | {'https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c'} | {'https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c'} |
PyPI | GHSA-hxmp-pqch-c8mm | Denial of service attack via incorrect parameters in Matrix Synapse | ### Impact
A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request.
This can lead to a denial of service in which future events will not be correctly sent to... | {'CVE-2020-26257'} | 2022-03-03T05:12:45.625321Z | 2020-12-09T18:21:29Z | LOW | null | {'CWE-400', 'CWE-74', 'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26257', 'https://github.com/matrix-org/synapse/pull/8776', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-hxmp-pqch-c8mm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QR4MMYZKX5N5GYGH4H5LBUUC5TLAFHI7/', 'htt... | null | {'https://github.com/matrix-org/synapse/commit/3ce2f303f15f6ac3dc352298972dc6e04d9b7a8b'} | {'https://github.com/matrix-org/synapse/commit/3ce2f303f15f6ac3dc352298972dc6e04d9b7a8b'} |
PyPI | PYSEC-2021-565 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.BoostedTreesCreateEnsemble` can result in a use after free error if an attacker supplies specially crafted arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa15... | {'CVE-2021-37652', 'GHSA-m7fm-4jfh-jrg6'} | 2021-12-09T06:35:03.429357Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6'} | null | {'https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab'} | {'https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab'} |
PyPI | GHSA-83rh-hx5x-q9p5 | Out-of-bounds Read in OpenCV | In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer over-read exists in the function cv::HdrDecoder::checkSignature in modules/imgcodecs/src/grfmt_hdr.cpp. | {'CVE-2017-18009'} | 2022-03-03T05:13:35.314834Z | 2021-10-12T22:03:23Z | HIGH | null | {'CWE-125'} | {'http://www.securityfocus.com/bid/106945', 'https://github.com/opencv/opencv/issues/10479', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18009', 'https://github.com/opencv/opencv/pull/10480/commits/4ca89db22dea962690f31c1781bce5937ee91837', 'https://github.com/opencv/opencv-python'} | null | {'https://github.com/opencv/opencv/pull/10480/commits/4ca89db22dea962690f31c1781bce5937ee91837'} | {'https://github.com/opencv/opencv/pull/10480/commits/4ca89db22dea962690f31c1781bce5937ee91837'} |
PyPI | GHSA-75f6-78jr-4656 | Null pointer dereference in `EditDistance` | ### Impact
An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.EditDistance`:
```python
import tensorflow as tf
hypothesis_indices = tf.constant([247, 247, 247], shape=[1, 3], dtype=tf.int64)
hypothesis_values = tf.constant([-9.9999], shape=[1], dtype=tf.float32)
hypothesis_sh... | {'CVE-2021-29564'} | 2022-03-03T05:12:50.250682Z | 2021-05-21T14:25:08Z | LOW | null | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-75f6-78jr-4656', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29564', 'https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3'} | null | {'https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3'} | {'https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3'} |
PyPI | PYSEC-2021-709 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow. If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers. The implementation(https://github.com/tensorf... | {'GHSA-9xh4-23q4-v6wr', 'CVE-2021-29583'} | 2021-12-09T06:35:29.040868Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9xh4-23q4-v6wr', 'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'} | null | {'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'} | {'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'} |
PyPI | GHSA-c2w9-48qc-qpj4 | High severity vulnerability that affects ansible | An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability. | {'CVE-2017-2809'} | 2022-03-03T05:12:59.249805Z | 2018-07-13T15:16:54Z | HIGH | null | {'CWE-94'} | {'https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2809', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305', 'https://github.com/tomoh1r/ansible-vault', 'http://www.securityfocus.com/bid/100824', 'https://github... | null | {'https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04'} | {'https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04'} |
PyPI | PYSEC-2021-359 | null | Flask-AppBuilder is an application development framework, built on top of Flask. In affected versions if using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open red... | {'GHSA-624f-cqvr-3qw4', 'CVE-2021-32805'} | 2021-10-11T01:16:40.573932Z | 2021-09-08T18:15:00Z | null | null | null | {'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-624f-cqvr-3qw4'} | null | {'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74'} | {'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74'} |
PyPI | GHSA-5crj-c72x-m7gq | Null pointer exception when `Exit` node is not preceded by `Enter` op | ### Impact
The [process of building the control flow graph](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/common_runtime/immutable_executor_state.cc#L284-L346) for a TensorFlow model is vulnerable to a null pointer exception when nodes that should be paired are n... | {'CVE-2021-41217'} | 2022-03-03T05:13:47.828697Z | 2021-11-10T18:55:11Z | MODERATE | null | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41217', 'https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq'} | null | {'https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff'} | {'https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff'} |
PyPI | GHSA-cqv6-3phm-hcwx | Access to invalid memory during shape inference in `Cudnn*` ops | ### Impact
The [shape inference code](https://github.com/tensorflow/tensorflow/blob/9ff27787893f76d6971dcd1552eb5270d254f31b/tensorflow/core/ops/cudnn_rnn_ops.cc) for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow:
```python
import tensorflow as tf
@tf.f... | {'CVE-2021-41221'} | 2022-03-03T05:13:53.720856Z | 2021-11-10T18:50:17Z | HIGH | null | {'CWE-120', 'CWE-787'} | {'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41221', 'https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6'} | null | {'https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6'} | {'https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6'} |
PyPI | GHSA-f4g9-h89h-jgv9 | SAML XML Signature wrapping in PySAML2 | ### Impact
All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not validate the SAML document against an XML schema. This allows invalid XML documents to trick the verification process, by presenting elements with a val... | {'CVE-2021-21238'} | 2022-03-03T05:13:23.568436Z | 2021-01-21T14:12:16Z | LOW | null | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21238', 'https://pypi.org/project/pysaml2', 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0', 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-f4g9-h89h-jgv9', 'https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f04... | null | {'https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f048157cc14'} | {'https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f048157cc14'} |
PyPI | PYSEC-2020-79 | null | In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file. | {'GHSA-vj42-xq3r-hr3r', 'CVE-2020-10994'} | 2020-07-27T19:15:00Z | 2020-06-25T19:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-vj42-xq3r-hr3r', 'https://github.com/python-pillow/Pillow/pull/4505', 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https:... | null | {'https://github.com/python-pillow/Pillow/commits/master/src/libImaging/'} | {'https://github.com/python-pillow/Pillow/commits/master/src/libImaging/'} |
PyPI | PYSEC-2021-477 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880... | {'GHSA-x83m-p7pv-ch8v', 'CVE-2021-29549'} | 2021-12-09T06:34:50.949292Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v', 'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'} | null | {'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'} | {'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'} |
PyPI | PYSEC-2021-532 | null | TensorFlow is an end-to-end open source platform for machine learning. The TFLite implementation of hashtable lookup is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115) An attacker can cra... | {'GHSA-8rm6-75mf-7r7r', 'CVE-2021-29604'} | 2021-12-09T06:34:59.535781Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r', 'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2'} | null | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2'} | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2'} |
PyPI | PYSEC-2021-162 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625... | {'GHSA-xm2v-8rrw-w9pm', 'CVE-2021-29525'} | 2021-08-27T03:22:25.775857Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xm2v-8rrw-w9pm', 'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'} | null | {'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'} | {'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'} |
PyPI | PYSEC-2021-498 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/ef0c008ee84bad91ec6725d... | {'CVE-2021-29570', 'GHSA-545v-42p7-98fq'} | 2021-12-09T06:34:54.218525Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-545v-42p7-98fq', 'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886'} | null | {'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886'} | {'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886'} |
PyPI | GHSA-c3xq-cj8f-7829 | Inadequate Encryption Strength in python-keystoneclient | python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass | {'CVE-2013-2166'} | 2022-03-23T20:00:07.261776Z | 2021-10-12T16:31:43Z | CRITICAL | null | {'CWE-326'} | {'http://www.openwall.com/lists/oss-security/2013/06/19/5', 'http://www.securityfocus.com/bid/60684', 'https://github.com/openstack/python-keystoneclient', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html', 'https://nvd.nist.... | null | {'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'} | {'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'} |
PyPI | GHSA-rv6r-3f5q-9rgx | Twisted SSH client and server deny of service during SSH handshake. | ### Impact
The Twisted SSH client and server implementation naively accepted an infinite amount of data for the peer's SSH version identifier.
A malicious peer can trivially craft a request that uses all available memory and crash the server, resulting in denial of service. The attack is as simple as `nc -rv localho... | {'CVE-2022-21716'} | 2022-04-22T15:47:19.222481Z | 2022-03-03T19:02:08Z | HIGH | null | {'CWE-120'} | {'https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1', 'https://github.com/twisted/twisted/releases/tag/twisted-22.2.0', 'https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21716', 'https://lists.debian.org/debian-lts-a... | null | {'https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9', 'https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1'} | {'https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1', 'https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9'} |
PyPI | GHSA-9vpm-rcf4-9wqw | Division by 0 in `MaxPoolGradWithArgmax` | ### Impact
The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0:
```python
import tensorflow as tf
input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
grad = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
argmax = tf.constant([], shape=[0], dtype=tf.int64)
ksize =... | {'CVE-2021-29573'} | 2022-03-03T05:14:00.057449Z | 2021-05-21T14:26:07Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw', 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29573'} | null | {'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} | {'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} |
PyPI | PYSEC-2021-549 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/s... | {'CVE-2021-37636', 'GHSA-hp4c-x6r7-6555'} | 2021-12-09T06:35:02.050023Z | 2021-08-12T18:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555'} | null | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'} | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'} |
PyPI | PYSEC-2020-119 | null | In Tensorflow version 2.3.0, the `SparseCountSparseOutput` and `RaggedCountSparseOutput` implementations don't validate that the `weights` tensor has the same shape as the data. The check exists for `DenseCountSparseOutput`, where both tensors are fully specified. In the sparse and ragged count weights are still access... | {'GHSA-pg59-2f92-5cph', 'CVE-2020-15196'} | 2021-09-01T08:19:33.034745Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pg59-2f92-5cph', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
PyPI | GHSA-27j5-4p9v-pp67 | `std::abort` raised from `TensorListReserve` | ### Impact
Providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements:
```python
import tensorflow as tf
tf.raw_ops.TensorListReserve(
element_shape = tf.constant([1... | {'CVE-2021-37644'} | 2022-03-03T05:13:01.903089Z | 2021-08-25T14:43:40Z | MODERATE | null | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37644'} | null | {'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2'} | {'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2'} |
PyPI | GHSA-37cf-r3w2-gjfw | django-nopassword stores secrets in cleartext | django-nopassword before 5.0.0 stores cleartext secrets in the database. | {'CVE-2019-10682'} | 2022-03-03T05:12:46.065476Z | 2020-06-05T16:09:19Z | HIGH | null | {'CWE-522', 'CWE-312'} | {'https://github.com/relekang/django-nopassword/commit/d8b4615f5fbfe3997d96cf4cb3e342406396193c', 'https://github.com/relekang/django-nopassword/compare/v4.0.1...v5.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10682', 'https://github.com/relekang/django-nopassword/blob/8e8cfc765ee00adfed120c2c79bf71ef856e9022/nopas... | null | {'https://github.com/relekang/django-nopassword/commit/d8b4615f5fbfe3997d96cf4cb3e342406396193c'} | {'https://github.com/relekang/django-nopassword/commit/d8b4615f5fbfe3997d96cf4cb3e342406396193c'} |
PyPI | PYSEC-2022-110 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `mi... | {'CVE-2022-21731', 'GHSA-m4hf-j54p-p353'} | 2022-03-09T00:18:23.826464Z | 2022-02-03T12:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85c... | null | {'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'} | {'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'} |
PyPI | PYSEC-2021-375 | null | Cobbler before 3.3.0 allows authorization bypass for modification of settings. | {'GHSA-cr3f-r24j-3chw', 'CVE-2021-40325'} | 2021-10-19T21:47:31.769581Z | 2021-10-04T06:15:00Z | null | null | null | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0', 'https://github.com/advisories/GHSA-cr3f-r24j-3chw'} | null | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'} | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'} |
PyPI | PYSEC-2021-725 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `Split` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65). An attacker can craft a mod... | {'CVE-2021-29599', 'GHSA-97wf-p777-86jq'} | 2021-12-09T06:35:31.883346Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97wf-p777-86jq', 'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'} | null | {'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'} | {'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'} |
PyPI | PYSEC-2021-230 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An att... | {'GHSA-cfx7-2xpc-8w4h', 'CVE-2021-29593'} | 2021-08-27T03:22:37.941172Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h', 'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'} | null | {'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'} | {'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'} |
PyPI | GHSA-p45v-v4pw-77jr | Division by 0 in `QuantizedBatchNormWithGlobalNormalization` | ### Impact
An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`:
```python
import tensorflow as tf
t = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8)
t_min = tf.constant(-10.0, dtype=tf.float32)
t_max = tf.constant(-10.0, dtype=tf... | {'CVE-2021-29548'} | 2022-03-03T05:14:08.985186Z | 2021-05-21T14:23:34Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p45v-v4pw-77jr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29548', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'} | null | {'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'} | {'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'} |
PyPI | GHSA-c94w-c95p-phf8 | Integer overflow in Tensorflow | ### Impact
The [implementation of `OpLevelCostEstimator::CalculateTensorSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558) is vulnerable to an integer overflow if an attacker can create an operation which w... | {'CVE-2022-23575'} | 2022-03-03T05:13:34.318775Z | 2022-02-10T00:32:59Z | MODERATE | null | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23575', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estima... | null | {'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'} | {'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'} |
PyPI | PYSEC-2021-660 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.SparseConcat`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b432a38fe0e1b4b904a6c222cbce794c39703e87/tensorflow/core/kernels/sparse_con... | {'CVE-2021-29534', 'GHSA-6j9c-grc6-5m6g'} | 2021-12-09T06:35:20.598497Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g'} | null | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'} | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'} |
PyPI | GHSA-cmgw-8vpc-rc59 | Segfault on strings tensors with mistmatched dimensions, due to Go code | ### Impact
Under certain conditions, Go code can trigger a segfault in string deallocation.
For string tensors, `C.TF_TString_Dealloc` is called during garbage collection within a finalizer function. However, tensor structure isn't checked until encoding to avoid a performance penalty. The current method for deallo... | {'CVE-2021-37692'} | 2022-03-03T05:09:55.555709Z | 2021-08-25T14:38:57Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37692', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59', 'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22', 'https://github.com/tensorflow/tensorflow/pull/50508'} | null | {'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22'} | {'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22'} |
PyPI | PYSEC-2020-230 | null | In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be ext... | {'GHSA-5fq8-3q2f-4m5g', 'CVE-2020-5224'} | 2021-08-27T03:21:57.616152Z | 2020-01-24T20:15:00Z | null | null | null | {'https://github.com/Bouke/django-user-sessions/security/advisories/GHSA-5fq8-3q2f-4m5g', 'https://github.com/jazzband/django-user-sessions/commit/f0c4077e7d1436ba6d721af85cee89222ca5d2d9'} | null | {'https://github.com/jazzband/django-user-sessions/commit/f0c4077e7d1436ba6d721af85cee89222ca5d2d9'} | {'https://github.com/jazzband/django-user-sessions/commit/f0c4077e7d1436ba6d721af85cee89222ca5d2d9'} |
PyPI | GHSA-qx3f-p745-w4hr | Integer overflow in Tensorflow | ### Impact
The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations.
### Patches
We have patched the issue in GitHub commit [f0147751fd5d2ff23251149ebad9af9f03010732](https://github.com/tensorflow/tensorflow/commit/f0147751fd5... | {'CVE-2022-23562'} | 2022-03-03T05:14:16.853671Z | 2022-02-09T23:54:07Z | HIGH | null | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/issues/52676', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23562', 'https://github.com/tensorflow/tensorflow/pull/51733', 'https://github.com... | null | {'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732'} | {'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732'} |
PyPI | GHSA-vxp9-wv2f-wqmw | High severity vulnerability that affects superset | Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation. | {'CVE-2018-8021'} | 2022-03-23T22:15:05.776608Z | 2018-11-09T17:40:56Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/apache/superset/commit/2c72a7ae4fc0a8bac1f037a79efa90e1c5549710', 'https://www.exploit-db.com/exploits/45933/', 'https://github.com/apache/superset/pull/4243', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8021', 'https://github.com/apache/superset'} | null | {'https://github.com/apache/superset/commit/2c72a7ae4fc0a8bac1f037a79efa90e1c5549710'} | {'https://github.com/apache/superset/commit/2c72a7ae4fc0a8bac1f037a79efa90e1c5549710'} |
PyPI | GHSA-m85c-9mf8-m2m6 | Critical severity vulnerability that affects confire | An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python ... | {'CVE-2017-16763'} | 2022-03-03T05:13:26.050847Z | 2018-07-18T18:28:26Z | CRITICAL | null | null | {'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea', 'https://github.com/advisories/GHSA-m85c-9mf8-m2m6', 'https://github.com/bbengfort/confire', 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/', 'https://github.com/bbengfort/... | null | {'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'} | {'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'} |
PyPI | GHSA-cpf4-wx82-gxp6 | Segfault due to negative splits in `SplitV` | ### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/split_v_op.cc#L49-L205) of `SplitV` can trigger a segfault is an attacker supplies negative arguments:
```python
import tensorflow as tf
tf.raw_ops.SplitV(
value=tf.constant... | {'CVE-2021-41222'} | 2022-03-03T05:13:07.507477Z | 2021-11-10T18:48:15Z | MODERATE | null | {'CWE-682'} | {'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41222', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6', 'https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6'} | null | {'https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6'} | {'https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6'} |
PyPI | PYSEC-2017-8 | null | HKDF in cryptography before 1.5.2 returns an empty byte-string if used with a length less than algorithm.digest_size. | {'CVE-2016-9243'} | 2021-07-05T00:01:17.464237Z | 2017-03-27T17:59:00Z | null | null | null | {'http://www.securityfocus.com/bid/94216', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQ5G7KHKZC4SI23JE7277KZXM57GEQKT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R2ZOBMPWDFFHUZ6QOZZY36A6H5CGJXL/', 'https://gith... | null | {'https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874'} | {'https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874'} |
PyPI | PYSEC-2022-87 | null | Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, TensorFlow can leak memory in the implementation of `ImmutableExecutorState::Initialize`. Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak. The... | {'GHSA-8r7c-3cm2-3h8f', 'CVE-2022-23578'} | 2022-03-09T00:17:34.646320Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8r7c-3cm2-3h8f', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262', 'https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd... | null | {'https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd'} | {'https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd'} |
PyPI | PYSEC-2022-147 | null | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dty... | {'CVE-2022-23583', 'GHSA-gjqc-q9g6-q2j3'} | 2022-03-09T00:18:28.843331Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137', 'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3'} | null | {'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'} | {'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'} |
PyPI | PYSEC-2018-108 | null | The SSH server implementation of AsyncSSH before 1.12.1 does not properly check whether authentication is completed before processing other requests. A customized SSH client can simply skip the authentication step. | {'CVE-2018-7749'} | 2021-12-13T06:35:08.979709Z | 2018-03-12T19:29:00Z | null | null | null | {'https://github.com/ronf/asyncssh/commit/c161e26cdc0d41b745b63d9f17b437f073bf7ba4', 'https://groups.google.com/forum/#!msg/asyncssh-announce/57_5O7kiHSA/8BXZ_hxHAQAJ'} | null | {'https://github.com/ronf/asyncssh/commit/c161e26cdc0d41b745b63d9f17b437f073bf7ba4'} | {'https://github.com/ronf/asyncssh/commit/c161e26cdc0d41b745b63d9f17b437f073bf7ba4'} |
PyPI | GHSA-grfj-wjv9-4f9v | Open redirect in Jupyter Server | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability - a maliciously crafted link to a jupyter server could redirect the browser to a different website.
All jupyter servers are technically affected, however, these maliciously crafted links can only be reasonably made for known j... | {'CVE-2020-26232'} | 2022-03-03T05:13:24.890200Z | 2020-11-24T21:20:52Z | MODERATE | null | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26232', 'https://github.com/jupyter/jupyter_server/security/advisories/GHSA-grfj-wjv9-4f9v', 'https://github.com/jupyter-server/jupyter_server/commit/3d83e49090289c431da253e2bdb8dc479cbcb157', 'https://github.com/jupyter-server/jupyter_server/blob/master/CHANGELOG.md#106---20... | null | {'https://github.com/jupyter-server/jupyter_server/commit/3d83e49090289c431da253e2bdb8dc479cbcb157'} | {'https://github.com/jupyter-server/jupyter_server/commit/3d83e49090289c431da253e2bdb8dc479cbcb157'} |
PyPI | GHSA-w74j-v8xh-3w5h | Reference binding to nullptr in unicode encoding | ### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.UnicodeEncode`:
```python
import tensorflow as tf
from tensorflow.python.ops import gen_string_ops
gen_string_ops.unicode_encode(
input_values=[],
input_splits=[],
output_encoding='UTF-8',
errors='ignore... | {'CVE-2021-37667'} | 2022-03-03T05:13:33.464306Z | 2021-08-25T14:42:09Z | HIGH | null | {'CWE-824'} | {'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37667', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h'} | null | {'https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6'} | {'https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6'} |
PyPI | PYSEC-2022-68 | null | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. I... | {'GHSA-98p5-x8x4-c9m5', 'CVE-2022-23559'} | 2022-03-09T00:17:32.298949Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4', 'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379... | null | {'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01', 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4'} | {'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01', 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4'} |
PyPI | PYSEC-2021-772 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c4... | {'CVE-2021-37661', 'GHSA-gf88-j2mg-cc82'} | 2021-12-09T06:35:37.616060Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82'} | null | {'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'} | {'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'} |
PyPI | PYSEC-2021-288 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToVariant`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/... | {'CVE-2021-37666', 'GHSA-w4xf-2pqw-5mq7'} | 2021-08-27T03:22:45.481654Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7'} | null | {'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'} | {'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.