ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
PyPI | PYSEC-2021-97 | null | The thefuck (aka The Fuck) package before 3.31 for Python allows Path Traversal that leads to arbitrary file deletion via the "undo archive operation" feature. | {'GHSA-8wwf-2644-f8x4', 'CVE-2021-34363'} | 2021-06-16T00:03:24.982635Z | 2021-06-10T11:15:00Z | null | null | null | {'https://vuln.ryotak.me/advisories/48', 'https://github.com/nvbn/thefuck/releases/tag/3.31', 'https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092', 'https://github.com/advisories/GHSA-8wwf-2644-f8x4'} | null | {'https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092'} | {'https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092'} |
PyPI | PYSEC-2021-322 | null | Wasmtime is an open source runtime for WebAssembly & WASI. Wasmtime before version 0.30.0 is affected by a type confusion vulnerability. As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible ... | {'CVE-2021-39219', 'GHSA-q879-9g95-56mx'} | 2021-09-17T22:30:49.947373Z | 2021-09-17T20:15:00Z | null | null | null | {'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q879-9g95-56mx', 'https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff', 'https://crates.io/crates/wasmtime'} | null | {'https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff'} | {'https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff'} |
PyPI | PYSEC-2020-288 | null | In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where th... | {'GHSA-mxjj-953w-2c2v', 'CVE-2020-15208'} | 2021-12-09T06:34:43.041754Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'} | {'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'} |
PyPI | PYSEC-2020-322 | null | In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not tri... | {'CVE-2020-15207', 'GHSA-q4qf-3fc6-8x34'} | 2021-12-09T06:35:14.570909Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'} | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'} |
PyPI | PYSEC-2020-267 | null | Red Discord Bot before version 3.4.1 has an unauthorized privilege escalation exploit in the Mod module. This exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, ... | {'CVE-2020-15278', 'GHSA-mp9m-g7qj-6vqr'} | 2021-11-16T03:58:45.518170Z | 2020-10-28T17:15:00Z | null | null | null | {'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr', 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'} | null | {'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'} | {'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'} |
PyPI | PYSEC-2021-637 | null | TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it calls `eval` on user supplied strings. This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is ... | {'GHSA-3rcw-9p9x-582v', 'CVE-2021-41228'} | 2021-12-09T06:35:11.562556Z | 2021-11-05T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v'} | null | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'} | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'} |
PyPI | PYSEC-2021-267 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. The [implem... | {'CVE-2021-37645', 'GHSA-9w2p-5mgw-p94c'} | 2021-08-27T03:22:43.539250Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c'} | null | {'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1'} | {'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1'} |
PyPI | PYSEC-2021-508 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty. The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process. The ... | {'CVE-2021-29580', 'GHSA-x8h6-xgqx-jqgp'} | 2021-12-09T06:34:55.778346Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x8h6-xgqx-jqgp'} | null | {'https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925'} | {'https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925'} |
PyPI | PYSEC-2021-158 | null | TensorFlow is an end-to-end open source platform for machine learning. Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken. This is because the implementation(https://github.com/tensor... | {'CVE-2021-29521', 'GHSA-hr84-fqvp-48mm'} | 2021-08-27T03:22:25.027733Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hr84-fqvp-48mm'} | null | {'https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5'} | {'https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5'} |
PyPI | PYSEC-2022-91 | null | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that `TensorByteSize` would trigger `CHECK` failures. `TensorShape` constructor throws a `CHECK`-fail if shape is partial or has a number of elements that would overflow the size of an... | {'CVE-2022-23582', 'GHSA-4j82-5ccr-4r8v'} | 2022-03-09T00:17:35.169396Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50', 'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'} | null | {'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'} | {'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'} |
PyPI | GHSA-968f-66r5-5v74 | HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers (Follow-up) | ### Impact
The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data.
This updates the existing CVE with ID: CVE-2019-16789
### Patches
Waitress version 1.4.2... | {'CVE-2019-16789'} | 2022-04-25T23:16:55.739172Z | 2020-01-06T18:44:21Z | HIGH | null | {'CWE-444'} | {'https://github.com/Pylons/waitress/security/advisories/GHSA-968f-66r5-5v74', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://www.oracle.com/security-alerts/cpuapr2022.html', ... | null | {'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017'} | {'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017'} |
PyPI | PYSEC-2020-158 | null | In xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other ... | {'GHSA-hwv5-w8gm-fq9f', 'CVE-2020-15239'} | 2020-10-23T03:09:00Z | 2020-10-06T19:15:00Z | null | null | null | {'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f', 'https://pypi.org/project/xmpp-http-upload/#history', 'https://github.com/horazont/xmpp-http-upload/pull/12', 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'} | null | {'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'} | {'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'} |
PyPI | GHSA-vf94-36g5-69v8 | Division by zero in TFLite's implementation of `DepthToSpace` | ### Impact
The implementation of the `DepthToSpace` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/depth_to_space.cc#L63-L69):
```cc
const int block_size = params->block_size;
...
const int input... | {'CVE-2021-29595'} | 2022-03-03T05:14:04.139271Z | 2021-05-21T14:27:49Z | LOW | null | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29595', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vf94-36g5-69v8', 'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9'} | null | {'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9'} | {'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9'} |
PyPI | PYSEC-2022-151 | null | Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow is vulnerable to an integer overflow during cost estimation for crop and resize. Since the cropping parameters are user controlled, a malicious person can trigger undefined behavior. The fix will be includ... | {'CVE-2022-23587', 'GHSA-8jj7-5vxc-pg2q'} | 2022-03-09T00:18:29.453433Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8jj7-5vxc-pg2q', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L2621-L2689', 'https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383... | null | {'https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f'} | {'https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f'} |
PyPI | PYSEC-2020-334 | null | In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the Python interpreter as it tries to write to the memory area. If the file... | {'CVE-2020-26268', 'GHSA-hhvc-g5hv-48c6'} | 2021-12-09T06:35:16.406292Z | 2020-12-10T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hhvc-g5hv-48c6', 'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7'} | null | {'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7'} | {'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7'} |
PyPI | PYSEC-2017-19 | null | An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have be... | {'CVE-2017-16615', 'GHSA-xpm8-98mx-h4c5'} | 2021-07-05T00:01:22.762966Z | 2017-11-08T03:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-xpm8-98mx-h4c5', 'https://github.com/thanethomson/MLAlchemy/commit/bc795757febdcce430d89f9d08f75c32d6989d3c', 'https://github.com/thanethomson/MLAlchemy/issues/1', 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16615-critical-restful-web-applications-vulnerability... | null | {'https://github.com/thanethomson/MLAlchemy/commit/bc795757febdcce430d89f9d08f75c32d6989d3c'} | {'https://github.com/thanethomson/MLAlchemy/commit/bc795757febdcce430d89f9d08f75c32d6989d3c'} |
PyPI | PYSEC-2015-24 | null | Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name. NOTE: this was originally reported as a cross-site request forgery (CSRF) vu... | {'CVE-2015-6938'} | 2021-07-15T02:22:14.906376Z | 2015-09-21T19:59:00Z | null | null | null | {'http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html', 'https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3', 'http://lists.opensuse.org/opensuse-updates/2015-10/msg0... | null | {'https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892', 'https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed', 'https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3'} | {'https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892', 'https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3', 'https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed'} |
PyPI | PYSEC-2021-334 | null | parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users shou... | {'CVE-2021-39207', 'GHSA-m87f-9fvv-2mgg'} | 2021-09-23T16:57:40.954858Z | 2021-09-10T23:15:00Z | null | null | null | {'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'} | null | {'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'} | {'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'} |
PyPI | PYSEC-2021-764 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a crash via a floating point exception in `tf.raw_ops.ResourceGather`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/r... | {'GHSA-qjj8-32p7-h289', 'CVE-2021-37653'} | 2021-12-09T06:35:36.903192Z | 2021-08-12T18:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289', 'https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11'} | null | {'https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11'} | {'https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11'} |
PyPI | GHSA-xpfp-f569-q3p2 | SQL Injection in Django | Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. | {'CVE-2021-35042'} | 2022-03-07T20:46:57.413338Z | 2021-09-22T17:34:49Z | CRITICAL | null | {'CWE-89'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/', 'https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9', 'https://groups.google.com/forum/#!forum/django-announce', 'https://www.djangoproject.com/weblog/2021/j... | null | {'https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9'} | {'https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9'} |
PyPI | GHSA-5hmm-x8q8-w5jh | LDAP authentication bypass with empty password | ### Impact
Users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider.
Only deployments where LDAP servers are configured to allow unauthenticated binds (eg. default on Active Directory) are affected.
### Patches
A fix ha... | {'CVE-2020-26214'} | 2022-03-03T05:13:21.868248Z | 2020-11-06T17:35:49Z | HIGH | null | {'CWE-287'} | {'https://github.com/alerta/alerta/issues/1277', 'https://github.com/alerta/alerta/security/advisories/GHSA-5hmm-x8q8-w5jh', 'https://github.com/alerta/alerta/commit/2bfa31779a4c9df2fa68fa4d0c5c909698c5ef65', 'https://github.com/alerta/alerta/pull/1345', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26214', 'https://pypi.... | null | {'https://github.com/alerta/alerta/commit/2bfa31779a4c9df2fa68fa4d0c5c909698c5ef65'} | {'https://github.com/alerta/alerta/commit/2bfa31779a4c9df2fa68fa4d0c5c909698c5ef65'} |
PyPI | PYSEC-2021-271 | null | TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.raw_ops.UncompressElement` can be made to trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/comp... | {'CVE-2021-37649', 'GHSA-6gv8-p3vj-pxvr'} | 2021-08-27T03:22:43.879548Z | 2021-08-12T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr'} | null | {'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd'} | {'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd'} |
PyPI | GHSA-fr77-rrx3-cp7g | Heap OOB read in `tf.ragged.cross` | ### Impact
The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) can trigger a read outside of bounds of heap allocated array:
```python
import tensorflow as tf
@tf.function
def test():
y =... | {'CVE-2021-41212'} | 2022-03-03T05:13:40.961532Z | 2021-11-10T19:00:31Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g', 'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41212', 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} | null | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} |
PyPI | PYSEC-2021-621 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `tf.ragged.cross` can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and Tenso... | {'GHSA-fr77-rrx3-cp7g', 'CVE-2021-41212'} | 2021-12-09T06:35:09.206142Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g', 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} | null | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} |
PyPI | PYSEC-2020-271 | null | In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked. Hence, code following these meth... | {'GHSA-q8qj-fc9q-cphr', 'CVE-2020-15191'} | 2021-12-09T06:34:40.816458Z | 2020-09-25T19:15:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'} | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'} |
PyPI | PYSEC-2022-106 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `Dequantize` is vulnerable to an integer overflow weakness. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortun... | {'CVE-2022-21727', 'GHSA-c6fh-56w7-fvjw'} | 2022-03-09T00:18:23.259781Z | 2022-02-03T11:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw', 'https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034'} | null | {'https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b'} | {'https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b'} |
PyPI | GHSA-8p5c-f328-9fvv | Diffoscope may write to arbitrary locations due to an untrusted archive | diffoscope before 76 writes to arbitrary locations on disk based on the contents of an untrusted archive. | {'CVE-2017-0359'} | 2022-04-26T18:33:06.821118Z | 2018-07-13T16:01:21Z | CRITICAL | null | {'CWE-22'} | {'https://github.com/anthraxx/diffoscope', 'https://github.com/anthraxx/diffoscope/commit/632a40828a54b399787c25e7fa243f732aef7e05', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0359', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854723', 'https://security-tracker.debian.org/tracker/CVE-2017-0359'} | null | {'https://github.com/anthraxx/diffoscope/commit/632a40828a54b399787c25e7fa243f732aef7e05'} | {'https://github.com/anthraxx/diffoscope/commit/632a40828a54b399787c25e7fa243f732aef7e05'} |
PyPI | PYSEC-2021-733 | null | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blo... | {'GHSA-gv26-jpj9-c8gq', 'CVE-2021-29607'} | 2021-12-09T06:35:33.208696Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gv26-jpj9-c8gq', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a'} | null | {'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'} | {'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a'} |
PyPI | PYSEC-2021-363 | null | Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots... | {'GHSA-jwqp-28gf-p498', 'CVE-2021-41125'} | 2021-10-11T01:16:42.905582Z | 2021-10-06T18:15:00Z | null | null | null | {'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth', 'https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header', 'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6', 'https://github.com/scrapy/scrapy/secur... | null | {'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'} | {'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'} |
PyPI | PYSEC-2021-699 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0. The implementation(https://github.com/tensorflow/tensorflow/blob/279bab6efa22752a2827621b7edb56a730233bd8/tensorflow/core/kernels/maxpooling_op.cc#L1033-L1034... | {'GHSA-9vpm-rcf4-9wqw', 'CVE-2021-29573'} | 2021-12-09T06:35:27.365628Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw', 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} | null | {'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} | {'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} |
PyPI | GHSA-3x4c-pq33-4w3q | Improper authorisation of members discloses room membership to non-members | ### Impact
Unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the roo... | {'CVE-2021-39164'} | 2022-03-03T05:12:37.503297Z | 2021-09-01T18:25:27Z | LOW | null | {'CWE-200'} | {'https://github.com/matrix-org/synapse/commit/cb35df940a', 'https://github.com/matrix-org/synapse', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39164', 'https://github.com/matrix-org/synap... | null | {'https://github.com/matrix-org/synapse/commit/cb35df940a'} | {'https://github.com/matrix-org/synapse/commit/cb35df940a'} |
PyPI | GHSA-mqh2-9wrp-vx84 | Heap buffer overflow in `SparseSplit` | ### Impact
An attacker can cause a heap buffer overflow in `tf.raw_ops.SparseSplit`:
```python
import tensorflow as tf
shape_dims = tf.constant(0, dtype=tf.int64)
indices = tf.ones([1, 1], dtype=tf.int64)
values = tf.ones([1], dtype=tf.int64)
shape = tf.ones([1], dtype=tf.int64)
tf.raw_ops.SparseSplit(
split_dim... | {'CVE-2021-29558'} | 2022-03-03T05:13:00.168493Z | 2021-05-21T14:24:51Z | LOW | null | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29558', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mqh2-9wrp-vx84'} | null | {'https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31'} | {'https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31'} |
PyPI | GHSA-98p5-x8x4-c9m5 | Integer overflow in TFLite | ### Impact
An attacker can craft a TFLite model that would cause an integer overflow [in embedding lookup operations](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189):
```cc
int embedding_size = 1;
int lookup_size ... | {'CVE-2022-23559'} | 2022-03-03T05:13:07.271919Z | 2022-02-09T23:52:51Z | HIGH | null | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23559', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4', 'https://github.com/tenso... | null | {'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01', 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4'} | {'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01', 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4'} |
PyPI | PYSEC-2021-676 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core... | {'GHSA-f78g-q7r4-9wcv', 'CVE-2021-29550'} | 2021-12-09T06:35:23.467562Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f78g-q7r4-9wcv'} | null | {'https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96'} | {'https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96'} |
PyPI | GHSA-g4h2-gqm3-c9wq | Segfault in tf.raw_ops.ImmutableConst | ### Impact
Calling [`tf.raw_ops.ImmutableConst`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/ImmutableConst) with a `dtype` of `tf.resource` or `tf.variant` results in a segfault in the implementation as code assumes that the tensor contents are pure scalars.
```python
>>> import tensorflow as tf
>>> tf.raw_... | {'CVE-2021-29539'} | 2022-03-03T05:13:39.768588Z | 2021-05-21T14:23:05Z | LOW | null | {'CWE-681'} | {'https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d29609980fa4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g4h2-gqm3-c9wq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29539'} | null | {'https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d29609980fa4'} | {'https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d29609980fa4'} |
PyPI | PYSEC-2021-226 | null | TensorFlow is an end-to-end open source platform for machine learning. The reference implementation of the `GatherNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.... | {'GHSA-3w67-q784-6w7c', 'CVE-2021-29589'} | 2021-08-27T03:22:37.235055Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3w67-q784-6w7c', 'https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d'} | null | {'https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d'} | {'https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d'} |
PyPI | PYSEC-2021-251 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.io.decode_raw` produces incorrect results and crashes the Python interpreter when combining `fixed_length` and wider datatypes. The implementation of the padded version(https://github.com/tensorflow/tensorflow/blob/1d8903e5... | {'GHSA-8pmx-p244-g88h', 'CVE-2021-29614'} | 2021-08-27T03:22:41.712204Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8pmx-p244-g88h'} | null | {'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'} | {'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'} |
PyPI | PYSEC-2021-601 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d9... | {'GHSA-vcjj-9vg7-vf68', 'CVE-2021-37688'} | 2021-12-09T06:35:06.517637Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68', 'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'} | null | {'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'} | {'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'} |
PyPI | GHSA-mv78-g7wq-mhp4 | Division by zero in padding computation in TFLite | ### Impact
The TFLite computation for size of output after padding, [`ComputeOutSize`](https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is not 0 before doing the division.
```cc
inline int Comput... | {'CVE-2021-29585'} | 2022-03-03T05:12:56.224293Z | 2021-05-21T14:26:41Z | LOW | null | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29585', 'https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4'} | null | {'https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948'} | {'https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948'} |
PyPI | GHSA-9vg3-cf92-h2h7 | Insufficient Verification of Data Authenticity in python-keystoneclient | python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass | {'CVE-2013-2167'} | 2022-03-23T20:00:10.830873Z | 2020-03-10T20:39:05Z | CRITICAL | null | {'CWE-345'} | {'https://security-tracker.debian.org/tracker/CVE-2013-2167', 'http://www.openwall.com/lists/oss-security/2013/06/19/5', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2167', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html', 'https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167', 'https:... | null | {'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'} | {'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'} |
PyPI | PYSEC-2020-314 | null | In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has the minimum required number of elements. Code uses this quantity to initialize a different data structure. Since `Ba... | {'GHSA-x5cp-9pcf-pp3h', 'CVE-2020-15199'} | 2021-12-09T06:35:13.149576Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x5cp-9pcf-pp3h', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
PyPI | GHSA-86vp-x3pr-79rx | Cross-site scripting in Apache airflow | The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.14. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely. | {'CVE-2020-17515'} | 2022-03-03T05:12:26.343329Z | 2021-04-20T16:40:14Z | MODERATE | null | {'CWE-79'} | {'https://github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E', 'https://github.com/apache/airflow/releases/tag/2.0.2', 'https://lists.apache.org/thread.html/r4656959c8ed06c1... | null | {'https://github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953'} | {'https://github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953'} |
PyPI | GHSA-6m9g-jr8c-cqw3 | Depth counting error in guard() leading to multiple potential security issues in aioxmpp | ### Impact
Possible remote Denial of Service or Data Injection.
### Patches
Patches are available in https://github.com/horazont/aioxmpp/pull/268. They have been backported to the 0.10 release series and 0.10.3 is the first release to contain the fix.
### Workarounds
To make the bug exploitable, an error suppressing ... | {'CVE-2019-1000007'} | 2022-03-03T05:14:02.836006Z | 2020-04-29T17:12:39Z | HIGH | null | {'CWE-237'} | {'https://github.com/horazont/aioxmpp/commit/29ff0838a40f58efe30a4bbcea95aa8dab7da475', 'https://github.com/horazont/aioxmpp/pull/268', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000007', 'https://github.com/horazont/aioxmpp/commit/f151f920f439d97d4103fc11057ed6dc34fe98be', 'https://github.com/horazont/aioxmpp/securit... | null | {'https://github.com/horazont/aioxmpp/commit/29ff0838a40f58efe30a4bbcea95aa8dab7da475', 'https://github.com/horazont/aioxmpp/commit/f151f920f439d97d4103fc11057ed6dc34fe98be'} | {'https://github.com/horazont/aioxmpp/commit/29ff0838a40f58efe30a4bbcea95aa8dab7da475', 'https://github.com/horazont/aioxmpp/commit/f151f920f439d97d4103fc11057ed6dc34fe98be'} |
PyPI | PYSEC-2021-314 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions under certain conditions, Go code can trigger a segfault in string deallocation. For string tensors, `C.TF_TString_Dealloc` is called during garbage collection within a finalizer function. However, tensor structure isn't checked... | {'CVE-2021-37692', 'GHSA-cmgw-8vpc-rc59'} | 2021-08-27T03:22:47.865620Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59', 'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22', 'https://github.com/tensorflow/tensorflow/pull/50508'} | null | {'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22'} | {'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22'} |
PyPI | PYSEC-2021-744 | null | TensorFlow is an end-to-end open source platform for machine learning. Passing a complex argument to `tf.transpose` at the same time as passing `conjugate=True` argument results in a crash. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlo... | {'GHSA-xqfj-cr6q-pc8w', 'CVE-2021-29618'} | 2021-12-09T06:35:35.049527Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/issues/46973', 'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-cr6q-pc8w', 'https://github.com/tensorflow/issues/42105'} | null | {'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88'} | {'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88'} |
PyPI | PYSEC-2021-197 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_ten... | {'GHSA-8gv3-57p6-g35r', 'CVE-2021-29560'} | 2021-08-27T03:22:32.127822Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r'} | null | {'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121'} | {'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121'} |
PyPI | GHSA-3c5c-7235-994j | Moderate severity vulnerability that affects Pillow | Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. | {'CVE-2016-2533'} | 2022-03-03T05:14:10.628337Z | 2018-07-24T20:15:13Z | MODERATE | null | {'CWE-119'} | {'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow', 'https://github.com/advisories/GHSA-3c5c-7235-994j', 'https://github.com/python-pillow/Pillow/pull/1706', 'http://www.oracle.com/technetwork/topics... | null | {'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b'} | {'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b'} |
PyPI | PYSEC-2021-528 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `OneHot` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72). An attacker can craft a ... | {'GHSA-j8qh-3xrq-c825', 'CVE-2021-29600'} | 2021-12-09T06:34:58.930299Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'} | null | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'} | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'} |
PyPI | PYSEC-2021-178 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.... | {'CVE-2021-29541', 'GHSA-xqfj-35wv-m3cr'} | 2021-08-27T03:22:28.768951Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr', 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} | null | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} |
PyPI | PYSEC-2021-482 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kerne... | {'GHSA-qg48-85hg-mqc5', 'CVE-2021-29554'} | 2021-12-09T06:34:51.766391Z | 2021-05-14T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5', 'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'} | null | {'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'} | {'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'} |
PyPI | PYSEC-2020-178 | null | Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent i... | {'CVE-2019-16792', 'GHSA-4ppp-gpcr-7qf6'} | 2020-01-30T17:07:00Z | 2020-01-22T19:15:00Z | null | null | null | {'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'} | null | {'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'} | {'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'} |
PyPI | PYSEC-2021-19 | null | An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users... | {'CVE-2021-28957', 'GHSA-jq4v-f5q6-mjqq'} | 2021-03-30T18:47:00Z | 2021-03-21T05:15:00Z | null | null | null | {'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html', 'https://bugs.launchpad.net/lxml/+bug/1888153', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://github.com/advisories/GHSA-jq4v-f5q6-mjqq', 'https://www.debian.org/security/2021/dsa-4880', 'https://... | null | {'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270'} | {'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270'} |
PyPI | PYSEC-2021-656 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168a... | {'GHSA-xcwj-wfcm-m23c', 'CVE-2021-29530'} | 2021-12-09T06:35:19.918878Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} | null | {'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} | {'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} |
PyPI | PYSEC-2021-206 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/ac328eaa3870491ababc147... | {'CVE-2021-29569', 'GHSA-3h8m-483j-7xxm'} | 2021-08-27T03:22:33.683964Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm', 'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'} | null | {'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'} | {'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'} |
PyPI | GHSA-rmp7-f2vp-3rq4 | Cross-site scripting in SiCKRAGE | in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information. | {'CVE-2021-25925'} | 2022-03-03T05:13:35.635168Z | 2021-04-20T16:31:54Z | MODERATE | null | {'CWE-79'} | {'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925'} | null | {'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'} | {'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'} |
PyPI | PYSEC-2021-713 | null | TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step of the `SpaceToDepth` TFLite operator does not check for 0 before division(https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). An attacker can ... | {'CVE-2021-29587', 'GHSA-j7rm-8ww4-xx2g'} | 2021-12-09T06:35:29.871064Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g', 'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} | null | {'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} | {'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} |
PyPI | GHSA-6pc9-xqrg-wfqw | Exposure of Sensitive information in httpie | httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0. | {'CVE-2022-0430'} | 2022-04-05T19:00:40.328192Z | 2022-03-16T00:00:47Z | LOW | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0430', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b', 'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/httpie/httpie', 'https://github.com/pypa/advisory-database/tree/main/vulns/httpie/PYSEC-2022-167.y... | null | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} |
PyPI | PYSEC-2021-590 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the shape inference code for `tf.raw_ops.Dequantize` has a vulnerability that could trigger a denial of service via a segfault if an attacker provides invalid arguments. The shape inference [implementation](https://github.com/te... | {'CVE-2021-37677', 'GHSA-qfpc-5pjr-mh26'} | 2021-12-09T06:35:05.572307Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26', 'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'} | null | {'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'} | {'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'} |
PyPI | PYSEC-2022-126 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlo... | {'GHSA-qx3f-p745-w4hr', 'CVE-2022-23562'} | 2022-03-09T00:18:25.916972Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/issues/52676', 'https://github.com/tensorflow/tensorflow/pull/51733', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr', 'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732'} | null | {'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732'} | {'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732'} |
PyPI | GHSA-3qxp-qjq7-w4hf | CHECK-fail in tf.raw_ops.EncodePng | ### Impact
An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data:
```python
import tensorflow as tf
image = tf.zeros([0, 0, 3])
image = tf.cast(image, dtype=tf.uint8)
tf.raw_ops.EncodePng(image=image)
```
This is because the [implementation](https://github.com/... | {'CVE-2021-29531'} | 2022-03-03T05:14:18.316115Z | 2021-05-21T14:22:13Z | LOW | null | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29531', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf'} | null | {'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1'} | {'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1'} |
PyPI | PYSEC-2021-210 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0. The implementation(https://github.com/tensorflow/tensorflow/blob/279bab6efa22752a2827621b7edb56a730233bd8/tensorflow/core/kernels/maxpooling_op.cc#L1033-L1034... | {'GHSA-9vpm-rcf4-9wqw', 'CVE-2021-29573'} | 2021-08-27T03:22:34.367051Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw', 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} | null | {'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} | {'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} |
PyPI | PYSEC-2021-640 | null | TensorFlow is an end-to-end open source platform for machine learning. If the `splits` argument of `RaggedBincount` does not specify a valid `SparseTensor`(https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow. This will cause a read from outside the bou... | {'CVE-2021-29514', 'GHSA-8h46-5m9h-7553'} | 2021-12-09T06:35:17.368785Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553'} | null | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'} | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'} |
PyPI | GHSA-r38r-qp28-2m63 | Critical severity vulnerability that affects rope | base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load. | {'CVE-2014-3539'} | 2022-03-23T21:00:09.517202Z | 2018-07-26T16:08:49Z | CRITICAL | null | null | {'https://github.com/python-rope/rope', 'http://www.openwall.com/lists/oss-security/2015/02/07/1', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3539', 'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb', 'https://bugzilla.redhat.com/show_bug.cgi?id=1116485'} | null | {'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'} | {'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'} |
PyPI | GHSA-fcwc-p4fc-c5cc | Null pointer dereference in `MatrixDiagPartOp` | ### Impact
If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first:
```python
import tensorflow as tf
tf.raw_ops.MatrixDiagPartV2(
input=tf.ones(2,dtype=... | {'CVE-2021-37643'} | 2022-03-03T05:13:40.355999Z | 2021-08-25T14:43:42Z | HIGH | null | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37643', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc', 'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'} | null | {'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'} | {'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'} |
PyPI | PYSEC-2017-78 | null | An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python ... | {'GHSA-m85c-9mf8-m2m6', 'CVE-2017-16763'} | 2021-08-25T04:29:57.582065Z | 2017-11-10T09:29:00Z | null | null | null | {'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea', 'https://github.com/advisories/GHSA-m85c-9mf8-m2m6', 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/', 'https://github.com/bbengfort/confire/issues/24'} | null | {'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'} | {'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'} |
PyPI | GHSA-962m-m8jw-8wrr | Path Traversal in Zope | Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted u... | {'CVE-2021-32633'} | 2022-03-03T05:13:58.513548Z | 2021-06-15T16:10:49Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32633', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/zopefoundation/Zope', 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/', 'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/zopefoundati... | null | {'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'} | {'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'} |
PyPI | PYSEC-2021-355 | null | “Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload g... | {'GHSA-663j-rjcr-789f', 'CVE-2021-25962'} | 2021-09-30T23:26:29.598032Z | 2021-09-29T14:15:00Z | null | null | null | {'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51', 'https://github.com/advisories/GHSA-663j-rjcr-789f', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962'} | null | {'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51'} | {'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51'} |
PyPI | GHSA-vq36-27g6-p492 | Out of bounds read in Tensorflow | ### Impact
TensorFlow's [type inference](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229) can cause a heap OOB read as the bounds checking is done in a `DCHECK` (which is a no-op during production):
```cc
if (node_t.type_id() != TFT_UNSET)... | {'CVE-2022-23592'} | 2022-03-28T19:45:06.569091Z | 2022-02-09T23:31:48Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23592', ... | null | {'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd'} | {'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd'} |
PyPI | GHSA-q2q7-5pp4-w6pg | Catastrophic backtracking in URL authority parser when passed URL containing many @ characters | ### Impact
When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
### Patches
The issue has been fixed in urllib3 v1.... | {'CVE-2021-33503'} | 2022-03-03T05:13:06.285390Z | 2021-06-01T21:19:32Z | HIGH | null | {'CWE-400'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33503', 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg', 'https://github.com/urllib3/urllib3', 'https://lists.fedoraproject.org/archives/lis... | null | {'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'} | {'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'} |
PyPI | PYSEC-2021-705 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/ab1e644b48c82cb71493f4362b4dd38f4577a1cf/tensorflow/core/kernels/maxpooling_op.cc#L194-L203) fai... | {'GHSA-79fv-9865-4qcv', 'CVE-2021-29579'} | 2021-12-09T06:35:28.365362Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79fv-9865-4qcv', 'https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7'} | null | {'https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7'} | {'https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7'} |
PyPI | PYSEC-2022-130 | null | Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commi... | {'CVE-2022-23566', 'GHSA-5qw5-89mw-wcg2'} | 2022-03-09T00:18:26.438942Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394', 'https://github.com/tensorf... | null | {'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd'} | {'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd'} |
PyPI | PYSEC-2021-586 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_sta... | {'CVE-2021-37673', 'GHSA-278g-rq84-9hmg'} | 2021-12-09T06:35:05.237190Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg'} | null | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'} | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'} |
PyPI | PYSEC-2021-569 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/t... | {'GHSA-4xfp-4pfp-89wg', 'CVE-2021-37656'} | 2021-12-09T06:35:03.759832Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg'} | null | {'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece'} | {'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece'} |
PyPI | GHSA-hwv5-w8gm-fq9f | Directory Traversal vulnerability in GET/PUT allows attackers to Disclose Information or Write Files via a crafted GET/PUT request | ### Impact
#### Information Disclosure
When the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other l... | {'CVE-2020-15239'} | 2022-03-03T05:13:07.970107Z | 2020-10-06T18:21:02Z | LOW | null | {'CWE-22'} | {'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f', 'https://github.com/horazont/xmpp-http-upload/pull/12', 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75', 'https://pypi.org/project/xmpp-http-upload/#history', 'https://nvd.nist.gov/vul... | null | {'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'} | {'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'} |
PyPI | PYSEC-2012-16 | null | PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key. | {'CVE-2012-2417'} | 2021-08-27T03:22:16.601238Z | 2012-06-17T03:41:00Z | null | null | null | {'http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html', 'https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog', 'http://secunia.com/advisories/49263', 'http://www.debian.or... | null | {'https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2'} | {'https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2'} |
PyPI | PYSEC-2020-139 | null | In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is patched in eccb7e... | {'GHSA-xwhf-g6j5-j5gc', 'CVE-2020-15266'} | 2021-09-01T08:19:35.637564Z | 2020-10-21T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/issues/42129', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc', 'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845'} | null | {'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845'} | {'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845'} |
PyPI | GHSA-24x4-6qmh-88qg | Use after free in `DecodePng` kernel | ### Impact
A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346):
```cc
if (/* ... error conditions ... */) {
png::CommonFreeDecode(&decode);
O... | {'CVE-2022-23584'} | 2022-03-03T05:13:53.559196Z | 2022-02-09T23:57:42Z | HIGH | null | {'CWE-416'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23584', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff... | null | {'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'} | {'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'} |
PyPI | GHSA-vvg4-vgrv-xfr7 | Incomplete validation in `tf.raw_ops.CTCLoss` | ### Impact
Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[10, 16, 0], dtype=tf.float32)
labels_indices = tf.constant([], shape=[8, 0], dtype=tf.int64)
labels_values = tf.constant([-100] * 8, shape=[8... | {'CVE-2021-29613'} | 2022-03-03T05:14:18.725259Z | 2021-05-21T14:28:39Z | MODERATE | null | {'CWE-665'} | {'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vvg4-vgrv-xfr7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29613'} | null | {'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c', 'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b'} | {'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c'} |
PyPI | PYSEC-2021-58 | null | sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to ... | {'CVE-2021-21431', 'GHSA-23c7-6444-399m'} | 2021-05-04T13:59:00Z | 2021-04-09T16:15:00Z | null | null | null | {'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856', 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'} | null | {'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856'} | {'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856'} |
PyPI | PYSEC-2021-617 | null | TensorFlow is an open source platform for machine learning. In affected versions the code for boosted trees in TensorFlow is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `n... | {'GHSA-57wx-m983-2f88', 'CVE-2021-41208'} | 2021-12-09T06:35:08.671870Z | 2021-11-05T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88', 'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c'} | null | {'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c'} | {'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c'} |
PyPI | GHSA-fphq-gw9m-ghrv | CHECK-fail in `CTCGreedyDecoder` | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[18, 2, 0], dtype=tf.float32)
sequence_length = tf.constant([-100, 17], shape=[2], dtype=tf.int32)
merge_repeated = False
tf.raw_ops.CTCGreedyDe... | {'CVE-2021-29543'} | 2022-03-03T05:13:59.592746Z | 2021-05-21T14:23:18Z | LOW | null | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv', 'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29543'} | null | {'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'} | {'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'} |
PyPI | PYSEC-2021-247 | null | TensorFlow is an end-to-end open source platform for machine learning. The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:. The validation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_... | {'GHSA-mq5c-prh3-3f3h', 'CVE-2021-29610'} | 2021-08-27T03:22:41.001819Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h'} | null | {'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'} | {'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'} |
PyPI | PYSEC-2021-752 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions if the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d7... | {'CVE-2021-37641', 'GHSA-9c8h-vvrj-w2p8'} | 2021-12-09T06:35:35.841569Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8', 'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'} | null | {'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'} | {'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'} |
PyPI | PYSEC-2021-302 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc... | {'CVE-2021-37680', 'GHSA-cfpj-3q4c-jhvr'} | 2021-08-27T03:22:46.794136Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr', 'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'} | null | {'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'} | {'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'} |
PyPI | PYSEC-2020-302 | null | In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_inde... | {'CVE-2020-26271', 'GHSA-q263-fvxm-m5mw'} | 2021-12-09T06:34:45.035634Z | 2020-12-10T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw', 'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b'} | null | {'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b'} | {'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b'} |
PyPI | PYSEC-2022-167 | null | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0. | {'GHSA-6pc9-xqrg-wfqw', 'CVE-2022-0430'} | 2022-03-23T14:28:20.245559Z | 2022-03-15T15:15:00Z | null | null | null | {'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/advisories/GHSA-6pc9-xqrg-wfqw', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} | null | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} |
PyPI | PYSEC-2021-181 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/ker... | {'CVE-2021-29544', 'GHSA-6g85-3hm8-83f9'} | 2021-08-27T03:22:29.285990Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} | null | {'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} | {'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} |
PyPI | GHSA-4ph2-8337-hm62 | Key Caching behavior in the DynamoDB Encryption Client. | ### Impact
This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified.
When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider... | null | 2022-03-03T05:13:41.146598Z | 2021-02-08T17:43:49Z | LOW | null | {'CWE-862'} | {'https://github.com/aws/aws-dynamodb-encryption-python/blob/master/CHANGELOG.rst#130----2021-02-04', 'https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62', 'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b', 'https://pypi.or... | null | {'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b'} | {'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b'} |
PyPI | PYSEC-2019-128 | null | In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF. | {'GHSA-6cc5-2vg4-cc7m', 'CVE-2019-12387'} | 2020-08-24T17:37:00Z | 2019-06-10T12:29:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2G5RPDQ4BNB336HL6WW5ZJ344MAWNN7N/', 'https://github.com/advisories/GHSA-6cc5-2vg4-cc7m', 'https://usn.ubuntu.com/4308-1/', 'https://www.oracle.co... | null | {'https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2'} | {'https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2'} |
PyPI | PYSEC-2020-75 | null | petl before 1.68, in some configurations, allows resolution of entities in an XML document. | {'CVE-2020-29128', 'GHSA-69q2-p9xp-739v', 'GHSA-f5gc-p5m3-v347'} | 2020-12-03T16:48:00Z | 2020-11-26T05:15:00Z | null | null | null | {'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8', 'https://petl.readthedocs.io/en/stable/changes.html', 'https://github.com/petl-developers/petl/pull/527', 'https://github.com/petl-developers/petl/issues/526', 'https://github.com/petl-developers/petl/security/advisori... | null | {'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8'} | {'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8'} |
PyPI | GHSA-9mqp-7v2h-2382 | Denial of Service in Tensorflow | ### Impact
The `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L235-L241
Although `reverse_index_map_t` and `grad_values_t` are ... | {'CVE-2020-15194'} | 2022-03-03T05:14:22.542012Z | 2020-09-25T18:28:19Z | MODERATE | null | {'CWE-20', 'CWE-617'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15194', 'https://githu... | null | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'} | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'} |
PyPI | GHSA-55x5-fj6c-h6m8 | HTML Cleaner allows crafted and SVG embedded scripts to pass through | ### Impact
The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs.
Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5.
### Patches
The issue has been resolved in lxml 4.6.5.
### Workar... | {'CVE-2021-43818'} | 2022-04-22T15:47:20.348262Z | 2021-12-13T18:14:36Z | HIGH | null | {'CWE-74', 'CWE-79'} | {'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/', 'https://github.com/lxml/lxml', 'http... | null | {'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'} | {'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'} |
PyPI | PYSEC-2021-494 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4... | {'GHSA-pvrc-hg3f-58r6', 'CVE-2021-29566'} | 2021-12-09T06:34:53.596467Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} | null | {'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} | {'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} |
PyPI | GHSA-6hpv-v2rx-c5g6 | FPE in convolutions with zero size filters | ### Impact
The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments.
### Patches
We have patched the issue in GitHub commit [f2c3931113eaafe... | {'CVE-2021-41209'} | 2022-03-03T05:13:34.997508Z | 2021-11-10T19:02:17Z | MODERATE | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41209', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} | null | {'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} | {'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} |
PyPI | PYSEC-2021-729 | null | TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of `ArgMin`/`ArgMax`(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L... | {'GHSA-crch-j389-5f84', 'CVE-2021-29603'} | 2021-12-09T06:35:32.536343Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84'} | null | {'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'} | {'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'} |
PyPI | GHSA-j7rm-8ww4-xx2g | Division by zero in TFLite's implementation of `SpaceToDepth` | ### Impact
The `Prepare` step of the `SpaceToDepth` TFLite operator [does not check for 0 before division](https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67).
```cc
const int block_size = params->block_size;
const int input_height ... | {'CVE-2021-29587'} | 2022-03-03T05:13:23.496562Z | 2021-05-21T14:26:45Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29587', 'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} | null | {'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} | {'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} |
PyPI | PYSEC-2021-379 | null | OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted... | {'CVE-2021-41132', 'GHSA-g67g-hvc3-xmvf'} | 2021-10-24T23:24:38.547709Z | 2021-10-14T16:15:00Z | null | null | null | {'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf', 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424', 'https://www.openmicroscopy.org/security/advisories/2021-SV3/'} | null | {'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'} | {'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'} |
PyPI | PYSEC-2021-683 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`. The division by 0 occurs deep in Eigen code because the `b` tensor is empty. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this c... | {'GHSA-xw93-v57j-fcgh', 'CVE-2021-29557'} | 2021-12-09T06:35:24.626277Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh'} | null | {'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5'} | {'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5'} |
PyPI | GHSA-hm3x-jwwf-jpr9 | Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates | An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may ai... | {'CVE-2021-4180'} | 2022-03-31T20:48:39.881307Z | 2022-03-24T00:00:17Z | MODERATE | null | {'CWE-200'} | {'https://bugs.launchpad.net/tripleo/+bug/1955397', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180', 'https://github.com/openstack/tripleo-heat-templates', 'https://github.com/openstack/tripleo-heat-templates/commit/... | null | {'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'} | {'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'} |
PyPI | PYSEC-2021-23 | null | Sydent is a reference matrix identity server. A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example. This issue has been fixed in 4469d1d. | {'CVE-2021-29432', 'GHSA-mh74-4m5g-fcjx'} | 2021-04-22T15:25:00Z | 2021-04-15T21:15:00Z | null | null | null | {'https://pypi.org/project/matrix-sydent/', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-mh74-4m5g-fcjx', 'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'} | null | {'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42'} | {'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.