ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
PyPI | GHSA-3h8m-483j-7xxm | Heap out of bounds read in `RequantizationRange` | ### Impact
The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs:
```python
import tensorflow as tf
input = tf.constant([1], shape=[1], dtype=tf.qint32)
input_max = tf.constant([], dtype=tf.float32)
input_min = ... | {'CVE-2021-29569'} | 2022-03-03T05:12:04.409348Z | 2021-05-21T14:25:22Z | LOW | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29569', 'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'} | null | {'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'} | {'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'} |
PyPI | PYSEC-2021-372 | null | OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted... | {'CVE-2021-41132', 'GHSA-g67g-hvc3-xmvf'} | 2021-10-17T22:58:18.538383Z | 2021-10-14T16:15:00Z | null | null | null | {'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf', 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424', 'https://www.openmicroscopy.org/security/advisories/2021-SV3/'} | null | {'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'} | {'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'} |
PyPI | GHSA-mcg6-h362-cmq5 | Improper Authorization in cobbler | ### Impact
If PAM is correctly configured and a user account is set to expired, the expired user-account is still able to successfully log into Cobbler in all places (Web UI, CLI & XMLRPC-API).
The same applies to user accounts with passwords set to be expired.
### Patches
There is a patch for the latest Cobbler `3... | {'CVE-2022-0860'} | 2022-04-01T20:17:01.937311Z | 2022-03-11T20:52:04Z | HIGH | null | {'CWE-863', 'CWE-285'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0860', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYWYHWVVRUSPCV5SWBOSAMQJQLTSBTKY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4KCNZYBQC2FM5SEEDRQZO4LRZ4ZECMG/', 'http... | null | {'https://github.com/cobbler/cobbler/commit/9044aa990a94752fa5bd5a24051adde099280bfa'} | {'https://github.com/cobbler/cobbler/commit/9044aa990a94752fa5bd5a24051adde099280bfa'} |
PyPI | PYSEC-2021-688 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.IRFFT`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, ... | {'CVE-2021-29562', 'GHSA-36vm-xw34-x4pj'} | 2021-12-09T06:35:25.478301Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-36vm-xw34-x4pj', 'https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2'} | null | {'https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2'} | {'https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2'} |
PyPI | PYSEC-2021-722 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `EmbeddingLookup` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74). An att... | {'GHSA-4vrf-ff7v-hpgr', 'CVE-2021-29596'} | 2021-12-09T06:35:31.406437Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr'} | null | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'} | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'} |
PyPI | GHSA-hwr7-8gxx-fj5p | Null pointer dereference in `RaggedTensorToTensor` | ### Impact
Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior:
```python
import tensorflow as tf
tf.raw_ops.RaggedTensorToTensor(
shape=1,
values=10,
default_value=21,
row_partition_tensors=tf.constant([0,0,0... | {'CVE-2021-37638'} | 2022-03-03T05:14:10.600697Z | 2021-08-25T14:44:09Z | HIGH | null | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37638', 'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p'} | null | {'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314'} | {'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314'} |
PyPI | GHSA-q8gv-q7wr-9jf8 | Segfault in Tensorflow | ### Impact
In eager mode, TensorFlow does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/session_ops.cc#L45
I... | {'CVE-2020-15204'} | 2022-03-03T05:13:50.625303Z | 2020-09-25T18:28:41Z | MODERATE | null | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15204', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4... | null | {'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1'} | {'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1'} |
PyPI | PYSEC-2021-237 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `OneHot` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72). An attacker can craft a ... | {'GHSA-j8qh-3xrq-c825', 'CVE-2021-29600'} | 2021-08-27T03:22:39.194303Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'} | null | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'} | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'} |
PyPI | GHSA-jwqp-28gf-p498 | HTTP authentication credentials potentially leaked to target websites | ### Impact
If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target.
This includes ... | {'CVE-2021-41125'} | 2022-04-25T23:46:57.785253Z | 2021-10-06T17:46:22Z | MODERATE | null | {'CWE-522', 'CWE-200'} | {'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41125', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498', 'https://github.com/scrapy/scrapy', 'https://lists.debian.org/debian-lts-annou... | null | {'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'} | {'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'} |
PyPI | PYSEC-2021-667 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.... | {'CVE-2021-29541', 'GHSA-xqfj-35wv-m3cr'} | 2021-12-09T06:35:21.834705Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr', 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} | null | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} |
PyPI | GHSA-qhxx-j73r-qpm2 | Uninitialized memory access in TensorFlow | ### Impact
Under certain cases, a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to [default initialize the quantized floating point types in Eigen](https://github.com/tensorflow/tensorflow/bl... | {'CVE-2020-26266'} | 2022-03-03T05:13:51.980464Z | 2020-12-10T19:07:24Z | LOW | null | {'CWE-908'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhxx-j73r-qpm2', 'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26266'} | null | {'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2'} | {'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2'} |
PyPI | GHSA-2hwx-mjrm-v3g8 | Denial of service attack via .well-known lookups | ### Impact
A malicious homeserver could redirect requests to their .well-known file to a large file. This can lead to a denial of service attack where homeservers will consume significantly more resources when requesting the .well-known file of a malicious homeserver.
This affects any server which accepts federation r... | {'CVE-2021-21274'} | 2022-03-03T05:13:28.871198Z | 2021-03-01T19:34:54Z | MODERATE | null | {'CWE-400'} | {'https://github.com/matrix-org/synapse/pull/8950', 'https://github.com/matrix-org/synapse', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21274', 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0', 'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6', 'https://github.com/matri... | null | {'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'} | {'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'} |
PyPI | PYSEC-2022-117 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.... | {'GHSA-x4qx-4fjv-hmw6', 'CVE-2022-21738'} | 2022-03-09T00:18:24.751245Z | 2022-02-03T14:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273'} | null | {'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a'} | {'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a'} |
PyPI | GHSA-7r94-xv9v-63jw | A use of uninitialized value vulnerability in Tensorflow | ### Impact
TensorFlow's Grappler optimizer has a [use of unitialized variable](https://github.com/tensorflow/tensorflow/blob/3457a2b122e50b4d44ceaaed5a663d635e5c22df/tensorflow/core/grappler/optimizers/auto_parallel.cc#L155-L164):
```cc
const NodeDef* dequeue_node;
for (const auto& train_node : train_nodes) {
... | {'CVE-2021-41225'} | 2022-03-03T05:12:47.207669Z | 2021-11-10T18:44:11Z | MODERATE | null | {'CWE-908'} | {'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41225', 'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw'} | null | {'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3'} | {'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3'} |
PyPI | GHSA-vq2r-5xvm-3hc3 | Segfault in `CTCBeamSearchDecoder` | ### Impact
Due to lack of validation in `tf.raw_ops.CTCBeamSearchDecoder`, an attacker can trigger denial of service via segmentation faults:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[18, 8, 0], dtype=tf.float32)
sequence_length = tf.constant([11, -43, -92, 11, -89, -83, -35, -100],
shape=[8],... | {'CVE-2021-29581'} | 2022-03-03T05:13:03.293126Z | 2021-05-21T14:26:30Z | LOW | null | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29581', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq2r-5xvm-3hc3', 'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e'} | null | {'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e'} | {'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e'} |
PyPI | PYSEC-2021-309 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for... | {'GHSA-jwf9-w5xm-f437', 'CVE-2021-37687'} | 2021-08-27T03:22:47.431884Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437', 'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d'} | null | {'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d'} | {'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d'} |
PyPI | GHSA-qm57-vhq3-3fwf | Header injection possible in Django | In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpRespo... | {'CVE-2021-32052'} | 2022-03-03T05:12:23.541212Z | 2021-06-09T17:14:51Z | MODERATE | null | {'CWE-88', 'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32052', 'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://groups.google.com/forum/#!forum/django-announce', 'https://bugzilla.redhat.com/show_bug.cgi?id=1944801', 'https://w... | null | {'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f'} | {'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f'} |
PyPI | GHSA-rhm9-p9w5-fwm7 | Symmetrically encrypting large values can lead to integer overflow | cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. When certain sequences of `update()` calls with large values (multiple GBs) for symetric encryption or decryption occur, it's possible for an integer overflow to happen, leading to mishandling of buffers. This is pat... | {'CVE-2020-36242'} | 2022-04-22T18:45:09.196238Z | 2021-02-10T01:32:27Z | CRITICAL | null | {'CWE-190', 'CWE-787'} | {'https://github.com/pyca/cryptography/security/advisories/GHSA-rhm9-p9w5-fwm7', 'https://github.com/pyca/cryptography/compare/3.3.1...3.3.2', 'https://github.com/pyca/cryptography/issues/5615', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pyca/cryptography', 'https://github.com/pyca/cr... | null | {'https://github.com/pyca/cryptography/commit/82b6ce28389f0a317bc55ba2091a74b346db7cae'} | {'https://github.com/pyca/cryptography/commit/82b6ce28389f0a317bc55ba2091a74b346db7cae'} |
PyPI | GHSA-93xj-8mrv-444m | Regular Expression Denial of Service (REDoS) in httplib2 | ### Impact
A malicious server which responds with long series of `\xa0` characters in the `www-authenticate` header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server.
### Patches
Version 0.19.0 contains new implementation of auth headers parsing, using pyparsing l... | {'CVE-2021-21240'} | 2022-03-03T05:13:25.212878Z | 2021-02-08T19:41:59Z | LOW | null | {'CWE-400'} | {'https://pypi.org/project/httplib2', 'https://github.com/httplib2/httplib2/pull/182', 'https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21240', 'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc'} | null | {'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc'} | {'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc'} |
PyPI | PYSEC-2021-759 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5... | {'CVE-2021-37648', 'GHSA-wp77-4gmm-7cq8'} | 2021-12-09T06:35:36.478576Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8', 'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'} | null | {'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'} | {'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'} |
PyPI | GHSA-6r3c-8xf3-ggrr | Directory traversal outside of SENDFILE_ROOT in django-sendfile2 | django-sendfile2 currently relies on the backend to correctly limit file paths to `SENDFILE_ROOT`. This is not the case for the `simple` and `development` backends, it is also not necessarily the case for any of the other backends either (it's just an assumption that was made by the original author).
This will be fixe... | null | 2022-03-03T05:14:17.489854Z | 2020-06-24T17:15:26Z | MODERATE | null | {'CWE-22'} | {'https://github.com/moggers87/django-sendfile2/security/advisories/GHSA-6r3c-8xf3-ggrr', 'https://github.com/moggers87/django-sendfile2', 'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1'} | null | {'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1'} | {'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1'} |
PyPI | PYSEC-2020-309 | null | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments. Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape.... | {'CVE-2020-15194', 'GHSA-9mqp-7v2h-2382'} | 2021-12-09T06:35:12.701793Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'} | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'} |
PyPI | GHSA-7cqx-92hp-x6wh | Heap buffer overflow in `MaxPool3DGradGrad` | ### Impact
The implementation of `tf.raw_ops.MaxPool3DGradGrad` is vulnerable to a heap buffer overflow:
```python
import tensorflow as tf
values = [0.01] * 11
orig_input = tf.constant(values, shape=[11, 1, 1, 1, 1], dtype=tf.float32)
orig_output = tf.constant([0.01], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
grad = ... | {'CVE-2021-29576'} | 2022-04-26T18:17:16.903104Z | 2021-05-21T14:26:16Z | LOW | null | {'CWE-787', 'CWE-119'} | {'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7cqx-92hp-x6wh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29576'} | null | {'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09'} | {'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09'} |
PyPI | PYSEC-2021-470 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow by passing crafted inputs to `tf.raw_ops.StringNGrams`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/st... | {'CVE-2021-29542', 'GHSA-4hrh-9vmp-2jgg'} | 2021-12-09T06:34:49.894355Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hrh-9vmp-2jgg'} | null | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} |
PyPI | GHSA-947x-pv47-pp3q | Cross-site scripting in pywb | Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped. | {'CVE-2021-39286'} | 2022-03-03T05:13:35.590334Z | 2021-09-02T17:16:18Z | MODERATE | null | {'CWE-79'} | {'https://github.com/webrecorder/pywb/compare/v-2.5.0...v-2.6.0', 'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9', 'https://github.com/webrecorder/pywb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39286'} | null | {'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9'} | {'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9'} |
PyPI | GHSA-mfjm-vh54-3f96 | Cookie-setting is not restricted based on the public suffix list | ### Impact
Responses from domain names whose public domain name suffix contains 1 or more periods (e.g. responses from `example.co.uk`, given its public domain name suffix is `co.uk`) are able to set cookies that are included in requests to any other domain sharing the same domain name suffix.
### Patches
Upgrade to... | null | 2022-03-07T20:47:42.301001Z | 2022-03-01T22:13:28Z | MODERATE | null | null | {'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96'} | null | {'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a'} | {'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a'} |
PyPI | PYSEC-2018-17 | null | Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPos... | {'CVE-2018-19351', 'GHSA-49qr-xh3w-h436'} | 2021-06-10T06:51:21.489049Z | 2018-11-18T17:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-49qr-xh3w-h436', 'https://pypi.org/project/notebook/#history', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY', 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst', 'https://g... | null | {'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'} | {'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'} |
PyPI | PYSEC-2021-535 | null | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blo... | {'GHSA-gv26-jpj9-c8gq', 'CVE-2021-29607'} | 2021-12-09T06:35:00.010376Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gv26-jpj9-c8gq', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a'} | null | {'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'} | {'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a'} |
PyPI | PYSEC-2021-165 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55900e961ed4a23b438392024912154a2c2f5e85/tensorflow/core/kernels/quantized_mul_op.cc#L188-L198) do... | {'CVE-2021-29528', 'GHSA-6f84-42vf-ppwp'} | 2021-08-27T03:22:26.348588Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp', 'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'} | null | {'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'} | {'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'} |
PyPI | GHSA-r5qj-cvf9-p85h | Code Injection in PyTorch Lightning | PyTorch Lightning version 1.5.10 and prior is vulnerable to code injection. There is currently a [patch](https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae) available, anticipated to be part of the `1.6.0` release. | {'CVE-2022-0845'} | 2022-03-18T21:31:59.050920Z | 2022-03-06T00:00:16Z | CRITICAL | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0845', 'https://github.com/PyTorchLightning/pytorch-lightning/pull/12212', 'https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae', 'https://github.com/pytorchlightning/pytorch-lightning/', 'https://huntr.dev/bounties/a795bf93-c... | null | {'https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae'} | {'https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae'} |
PyPI | GHSA-f5cx-5wr3-5qrc | Reference binding to nullptr in boosted trees | ### Impact
An attacker can generate undefined behavior via a reference binding to nullptr in `BoostedTreesCalculateBestGainsPerFeature`:
```python
import tensorflow as tf
tf.raw_ops.BoostedTreesCalculateBestGainsPerFeature(
node_id_range=[],
stats_summary_list=[[1,2,3]],
l1=[1.0],
l2=[1.0],
tree_complexity ... | {'CVE-2021-37662'} | 2022-03-03T05:14:14.804038Z | 2021-08-25T14:42:26Z | HIGH | null | {'CWE-824'} | {'https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f5cx-5wr3-5qrc', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7', 'https:... | null | {'https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7', 'https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad'} | {'https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7', 'https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad'} |
PyPI | GHSA-r4pj-74mg-8868 | Division by 0 in `Conv2DBackpropFilter` | ### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropFilter`:
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[0, 0, 1, 0], dtype=tf.float32)
filter_sizes = tf.constant([1, 1, 1, 1], shape=[4], dtype=tf.int32)
out_backprop = tf.constant([], shape=[0, 0, 1, 1], dtype=t... | {'CVE-2021-29524'} | 2022-03-03T05:14:19.072094Z | 2021-05-21T14:21:47Z | LOW | null | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29524', 'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868'} | null | {'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'} | {'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'} |
PyPI | GHSA-98j8-c9q4-r38g | Memory exhaustion in Tensorflow | ### Impact
The [implementation of `StringNGrams`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161) can be used to trigger a denial of service attack by causing an OOM condition after an integer overflow:
```python
import tenso... | {'CVE-2022-21733'} | 2022-03-03T05:14:01.870612Z | 2022-02-10T00:20:51Z | MODERATE | null | {'CWE-190', 'CWE-400'} | {'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161', 'https://github.com/tensorflow/tensorflow/', 'https://nvd.nist.gov/vuln/detail/CVE-2... | null | {'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'} | {'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'} |
PyPI | GHSA-w5gh-2wr2-pm6g | Denial of Service in Tensorflow | ### Impact
Changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments.
We have added fixes to this ... | {'CVE-2020-15206'} | 2022-03-03T05:13:13.746372Z | 2020-09-25T18:28:40Z | CRITICAL | null | {'CWE-20'} | {'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15206', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/ten... | null | {'https://github.com/tensorflow/tensorflow/commit/fcfef195637c6e365577829c4d67681695956e7d', 'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6', 'https://github.com/tensorflow/tensorflow/commit/f760f88b4267d981e13f4b302c437ae800445968'} | {'https://github.com/tensorflow/tensorflow/commit/f760f88b4267d981e13f4b302c437ae800445968', 'https://github.com/tensorflow/tensorflow/commit/fcfef195637c6e365577829c4d67681695956e7d', 'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6'} |
PyPI | GHSA-c5f8-35qr-q4fm | HTML injection in email and account expiry notifications | ### Impact
The notification emails sent for notifications for missed messages or for an expiring account are subject to HTML injection. In the case of the notification for missed messages, this could allow an attacker to insert forged content into the email.
The account expiry feature is not enabled by default and the... | {'CVE-2021-21333'} | 2022-03-03T05:13:04.847018Z | 2021-03-26T19:53:04Z | MODERATE | null | {'CWE-74'} | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df', 'https://github.com/matrix-org/synapse', 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21333', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedora... | null | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'} | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'} |
PyPI | PYSEC-2013-30 | null | bson/_cbsonmodule.c in the mongo-python-driver (aka. pymongo) before 2.5.2, as used in MongoDB, allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to decoding of an "invalid DBRef." | {'CVE-2013-2132'} | 2021-08-27T03:22:17.455260Z | 2013-08-15T17:55:00Z | null | null | null | {'http://ubuntu.com/usn/usn-1897-1', 'https://github.com/mongodb/mongo-python-driver/commit/a060c15ef87e0f0e72974c7c0e57fe811bbd06a2', 'http://www.debian.org/security/2013/dsa-2705', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=710597', 'http://www.osvdb.org/93804', 'https://jira.mongodb.org/browse/PYTHON-532', 'h... | null | {'https://github.com/mongodb/mongo-python-driver/commit/a060c15ef87e0f0e72974c7c0e57fe811bbd06a2'} | {'https://github.com/mongodb/mongo-python-driver/commit/a060c15ef87e0f0e72974c7c0e57fe811bbd06a2'} |
PyPI | GHSA-f8mr-jv2c-v8mg | Invalid root may become trusted root in The Update Framework (TUF) | ### Impact
The Python TUF reference implementation `tuf<0.12` will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a man-in-the-middle attack) culminating in a version wh... | {'CVE-2020-15163'} | 2022-03-03T05:12:35.740359Z | 2020-09-09T17:29:27Z | HIGH | null | {'CWE-863', 'CWE-345'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15163', 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg', 'https://github.com/theupdateframework/tuf', 'https://pypi.org/project/tuf', 'https://github.com/theupdateframework/tuf/releases/tag/v0.12.0', 'https://github.com/theupdateframework/t... | null | {'https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7'} | {'https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7'} |
PyPI | PYSEC-2022-14 | null | Improper Privilege Management in Conda loguru prior to 0.5.3. | {'CVE-2022-0338'} | 2022-01-28T21:25:28.417398Z | 2022-01-25T09:15:00Z | null | null | null | {'https://github.com/delgan/loguru/commit/ea39375e62f9b8f18e2ca798a5c0fb8c972b7eaa', 'https://huntr.dev/bounties/359bea50-2bc6-426a-b2f9-175d401b1ed0'} | null | {'https://github.com/delgan/loguru/commit/ea39375e62f9b8f18e2ca798a5c0fb8c972b7eaa'} | {'https://github.com/delgan/loguru/commit/ea39375e62f9b8f18e2ca798a5c0fb8c972b7eaa'} |
PyPI | GHSA-rwv7-3v45-hg29 | Out-of-bounds Read | An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i. This dates to Pillow 2.4.0. | {'CVE-2021-25288'} | 2022-03-07T20:47:09.921948Z | 2021-06-08T18:49:28Z | CRITICAL | null | {'CWE-125'} | {'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25288', 'https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470', 'https://security.gentoo.org/glsa/202107-33', 'https://lists.fedor... | null | {'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'} | {'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'} |
PyPI | GHSA-wp77-4gmm-7cq8 | Incorrect validation of `SaveV2` inputs | ### Impact
The code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference:
```python
import tensorflow as tf
tf.raw_ops.SaveV2(
prefix=['tensorflow'],
tensor_name=['v'],
shape_and_slices=[],
tensors=[1,2,3])
```
The [implementation](https://git... | {'CVE-2021-37648'} | 2022-03-03T05:13:32.840734Z | 2021-08-25T14:43:29Z | HIGH | null | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37648', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8', 'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'} | null | {'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'} | {'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'} |
PyPI | GHSA-h6fg-mjxg-hqq4 | Integer truncation in Shard API usage | ### Impact
The `Shard` API in TensorFlow expects the last argument to be a function taking two `int64` (i.e., `long long`) arguments:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/util/work_sharder.h#L59-L60
However, there are several places in TensorFlow where ... | {'CVE-2020-15202'} | 2022-03-03T05:14:22.856243Z | 2020-09-25T18:28:35Z | CRITICAL | null | {'CWE-197', 'CWE-754'} | {'https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15202', 'https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575', 'https... | null | {'https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575', 'https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832'} | {'https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575', 'https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832'} |
PyPI | PYSEC-2021-427 | null | A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.0.0 when the mpmathify function is called. | {'CVE-2021-29063', 'GHSA-f865-m6cq-j9vx'} | 2021-11-16T21:20:29.021535Z | 2021-06-21T20:15:00Z | null | null | null | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3M5O55E7VUDMXCPQR6MQTOIFDKHP36AA/', 'https://github.com/advisories/GHSA-f865-m6cq-j9vx', 'https://github.com/yetingli/SaveResults/blob/main/js/hosted-git-info.js', 'https://github.com/fredrik-johansson/mpmath/commit/46d44c3... | null | {'https://github.com/fredrik-johansson/mpmath/commit/46d44c3c8f3244017fe1eb102d564eb4ab8ef750'} | {'https://github.com/fredrik-johansson/mpmath/commit/46d44c3c8f3244017fe1eb102d564eb4ab8ef750'} |
PyPI | PYSEC-2021-132 | null | Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.25.0, a malicious homeserver could redirect requests to their .well-known file to a large file. This can lead to a denial of service... | {'CVE-2021-21274', 'GHSA-2hwx-mjrm-v3g8'} | 2021-08-27T03:22:06.616674Z | 2021-02-26T18:15:00Z | null | null | null | {'https://github.com/matrix-org/synapse/releases/tag/v1.25.0', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-2hwx-mjrm-v3g8', 'https://github.com/matrix-org/synapse/pull/8950', 'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'} | null | {'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'} | {'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'} |
PyPI | PYSEC-2021-562 | null | TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.raw_ops.UncompressElement` can be made to trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/comp... | {'CVE-2021-37649', 'GHSA-6gv8-p3vj-pxvr'} | 2021-12-09T06:35:03.183506Z | 2021-08-12T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr'} | null | {'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd'} | {'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd'} |
PyPI | PYSEC-2021-831 | null | TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseFillEmptyRows` can be made to trigger a heap OOB access. This occurs whenever the size of `indices` does not match the size of `values`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick thi... | {'GHSA-rg3m-hqc5-344v', 'CVE-2021-41224'} | 2021-12-09T06:35:44.787766Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v', 'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'} | null | {'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'} | {'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'} |
PyPI | PYSEC-2020-132 | null | In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes... | {'GHSA-qh32-6jjc-qprm', 'CVE-2020-15209'} | 2020-10-29T16:15:00Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8'} | {'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8'} |
PyPI | PYSEC-2021-718 | null | TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-2020-15209(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15209) missed the case when the target shape of `Reshape` operator is given by the elements of a 1-D tensor. As such, the fix for the vulnerability(https://github.com... | {'CVE-2021-29592', 'GHSA-jjr8-m8g8-p6wv'} | 2021-12-09T06:35:30.746202Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jjr8-m8g8-p6wv'} | null | {'https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16'} | {'https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16'} |
PyPI | GHSA-fr28-569j-53c4 | Incorrect Default Permissions | An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077. | {'CVE-2020-24584'} | 2022-03-03T05:12:56.107855Z | 2021-03-18T20:30:01Z | HIGH | null | {'CWE-276'} | {'https://usn.ubuntu.com/4479-1/', 'https://www.openwall.com/lists/oss-security/2020/09/01/2', 'https://github.com/django/django/commit/1853724acaf17ed7414d54c7d2b5563a25025a71', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/', 'https://... | null | {'https://github.com/django/django/commit/1853724acaf17ed7414d54c7d2b5563a25025a71'} | {'https://github.com/django/django/commit/1853724acaf17ed7414d54c7d2b5563a25025a71'} |
PyPI | PYSEC-2021-431 | null | django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'GHSA-vfrc-ggmc-5jwv', 'CVE-2021-3950'} | 2021-11-23T19:22:08.078180Z | 2021-11-19T12:15:00Z | null | null | null | {'https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60', 'https://github.com/advisories/GHSA-vfrc-ggmc-5jwv', 'https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e'} | null | {'https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60'} | {'https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60'} |
PyPI | PYSEC-2020-124 | null | In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, the code is prone to heap buff... | {'CVE-2020-15201', 'GHSA-p5f8-gfw5-33w4'} | 2021-09-01T08:19:33.344299Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
PyPI | PYSEC-2021-827 | null | TensorFlow is an open source platform for machine learning. In affected versions the async implementation of `CollectiveReduceV2` suffers from a memory leak and a use after free. This occurs due to the asynchronous computation and the fact that objects that have been `std::move()`d from are still accessed. The fix will... | {'GHSA-gpfh-jvf9-7wg5', 'CVE-2021-41220'} | 2021-12-09T06:35:44.147623Z | 2021-11-05T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5'} | null | {'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'} | {'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'} |
PyPI | GHSA-mr7p-25v2-35wr | Path Traversal in nltk | NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction. | {'CVE-2019-14751'} | 2022-03-03T05:13:40.004453Z | 2019-08-23T21:53:51Z | HIGH | null | {'CWE-22'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D/', 'https://github.com/mssalvatore/CVE-2019-14751_PoC', 'https://github.com/nltk/nltk/blob/3.4.5/ChangeLog', 'ht... | null | {'https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10'} | {'https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10'} |
PyPI | PYSEC-2021-574 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c4... | {'CVE-2021-37661', 'GHSA-gf88-j2mg-cc82'} | 2021-12-09T06:35:04.173783Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82'} | null | {'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'} | {'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'} |
PyPI | PYSEC-2021-45 | null | Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an open redirect vulnerability. A maliciously crafted link to the login form and login functionality could redirect the browser to a different website. The problem... | {'CVE-2021-21337', 'GHSA-p44j-xrqg-4xrr'} | 2021-03-12T13:48:00Z | 2021-03-08T21:15:00Z | null | null | null | {'https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr', 'https://pypi.org/project/Products.PluggableAuthService/', 'https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa'} | null | {'https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa'} | {'https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa'} |
PyPI | GHSA-xmq7-7fxm-rr79 | Denial of Service in Tensorflow | ### Impact
By controlling the `fill` argument of [`tf.strings.as_string`](https://www.tensorflow.org/api_docs/python/tf/strings/as_string), a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed: https://github.com/tensorflow/tensor... | {'CVE-2020-15203'} | 2022-03-03T05:14:01.043032Z | 2020-09-25T18:28:37Z | HIGH | null | {'CWE-20', 'CWE-134'} | {'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15203', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/adv... | null | {'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'} | {'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'} |
PyPI | GHSA-hh7m-rx4f-4vpv | CSRF can expose users authentication token | ### Issue
The /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token.
### Patches
Version 3.4.5 and soon to be released 4... | {'CVE-2021-21241'} | 2022-03-03T05:13:30.663886Z | 2021-01-11T20:38:28Z | HIGH | null | {'CWE-352'} | {'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-hh7m-rx4f-4vpv', 'https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a', 'https://github.com/Flask-Middleware/flask-security/releases/tag/3.4.5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21241',... | null | {'https://github.com/Flask-Middleware/flask-security/commit/61d313150b5f620d0b800896c4f2199005e84b1f', 'https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a'} | {'https://github.com/Flask-Middleware/flask-security/commit/61d313150b5f620d0b800896c4f2199005e84b1f', 'https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a'} |
PyPI | PYSEC-2022-55 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `mi... | {'CVE-2022-21731', 'GHSA-m4hf-j54p-p353'} | 2022-03-09T00:17:30.689879Z | 2022-02-03T12:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85c... | null | {'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'} | {'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'} |
PyPI | PYSEC-2020-68 | null | OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by OAuthenticator class... | {'CVE-2020-26250', 'GHSA-384w-5v3f-q499'} | 2020-12-08T17:50:00Z | 2020-12-01T21:15:00Z | null | null | null | {'https://jupyterhub.readthedocs.io/en/1.2.2/getting-started/authenticators-users-basics.html#add-or-remove-users-from-the-hub', 'https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-384w-5v3f-q499', 'https://github.com/jupyterhub/oauthenticator/blob/master/docs/source/changelog.md#0122---2020-11-30', ... | null | {'https://github.com/jupyterhub/oauthenticator/commit/a4aac191c16cf6281f3d346615aefa75702b02d7'} | {'https://github.com/jupyterhub/oauthenticator/commit/a4aac191c16cf6281f3d346615aefa75702b02d7'} |
PyPI | PYSEC-2019-135 | null | When using wagtail-2fa before 1.3.0, if someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0. | {'GHSA-89px-ww3j-g2mm', 'CVE-2019-16766'} | 2020-10-09T13:27:00Z | 2019-11-29T17:15:00Z | null | null | null | {'https://github.com/LabD/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca', 'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81'} | null | {'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'} | {'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'} |
PyPI | PYSEC-2021-466 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a division by zero to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L5... | {'GHSA-j8qc-5fqr-52fp', 'CVE-2021-29538'} | 2021-12-09T06:34:49.257791Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qc-5fqr-52fp', 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'} | null | {'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'} | {'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'} |
PyPI | PYSEC-2021-173 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a324ac84e573fba362a5e53d4e74d5de6729933e/tenso... | {'CVE-2021-29536', 'GHSA-2gfx-95x2-5v3x'} | 2021-08-27T03:22:27.845923Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x'} | null | {'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'} | {'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'} |
PyPI | PYSEC-2021-489 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from `tf.raw_ops.LoadAndRemapMatrix`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorfl... | {'CVE-2021-29561', 'GHSA-gvm4-h8j3-rjrq'} | 2021-12-09T06:34:52.832408Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq', 'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} | null | {'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} | {'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} |
PyPI | GHSA-27qf-jwm8-g7f3 | FPE in LSH in TFLite | ### Impact
An attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projection.cc#L118).
```cc
int RunningSignBit(const TfLiteTensor* input, const TfLiteTe... | {'CVE-2021-37691'} | 2022-03-03T05:13:33.257862Z | 2021-08-25T14:39:17Z | MODERATE | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37691'} | null | {'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9'} | {'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9'} |
PyPI | PYSEC-2021-523 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `DepthToSpace` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/depth_to_space.cc#L63-L69). An attacker... | {'CVE-2021-29595', 'GHSA-vf94-36g5-69v8'} | 2021-12-09T06:34:58.107477Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vf94-36g5-69v8', 'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9'} | null | {'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9'} | {'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9'} |
PyPI | PYSEC-2014-22 | null | The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwri... | {'CVE-2014-1932'} | 2021-07-15T02:22:16.928376Z | 2014-04-17T14:55:00Z | null | null | null | {'http://www.securityfocus.com/bid/65511', 'http://www.openwall.com/lists/oss-security/2014/02/11/1', 'https://security.gentoo.org/glsa/201612-52', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059', 'http://www.ubuntu.com/usn/USN-2168-1', 'http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html', 'htt... | null | {'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7'} | {'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7'} |
PyPI | PYSEC-2020-173 | null | The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. | {'CVE-2019-20916', 'GHSA-gpvv-69j7-gwj8'} | 2021-03-15T16:18:00Z | 2020-09-04T20:15:00Z | null | null | null | {'https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html', 'https://github.com/pypa/pip/issues/6413', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html', 'https://github.com/gzpan123/pip/commit/a4c735b14a... | null | {'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'} | {'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'} |
PyPI | GHSA-x7rp-74x2-mjf3 | Segfault in Tensorflow | ### Impact
The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Thus, the [following code](https://github.com/tensorflow/tenso... | {'CVE-2020-15200'} | 2021-08-26T15:13:38Z | 2020-09-25T18:28:32Z | MODERATE | null | {'CWE-20', 'CWE-787', 'CWE-122'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15200', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x7rp-74x2-mjf3', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/releas... | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
PyPI | GHSA-hggx-3h72-49ww | Moderate severity vulnerability that affects Pillow | Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file. | {'CVE-2016-0740'} | 2022-03-03T05:13:15.863124Z | 2018-07-24T20:03:51Z | MODERATE | null | {'CWE-119'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-0740', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-hggx-3h72-49ww', 'https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054... | null | {'https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e'} | {'https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e'} |
PyPI | GHSA-hx2x-85gr-wrpq | Out of bounds access in tensorflow-lite | ### Impact
In TensorFlow Lite models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reference_ops.... | {'CVE-2020-15212'} | 2021-08-26T15:20:18Z | 2020-09-25T18:29:00Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15212', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx2x-85gr-wrpq', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/releas... | null | {'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'} | {'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'} |
PyPI | GHSA-xr2c-5w89-63pv | Untrusted Search Path in Poetry | Poetry prior to v1.1.9 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS. | {'CVE-2022-26184'} | 2022-03-30T21:17:05.181660Z | 2022-03-23T00:00:24Z | CRITICAL | null | {'CWE-426'} | {'https://github.com/python-poetry/', 'https://github.com/python-poetry/poetry/releases/tag/1.1.9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26184', 'https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7'} | null | {'https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7'} | {'https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7'} |
PyPI | PYSEC-2021-807 | null | TensorFlow is an open source platform for machine learning. In affected versions if `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overfl... | {'CVE-2021-41199', 'GHSA-5hx2-qx8j-qjqm'} | 2021-12-09T06:35:41.080668Z | 2021-11-05T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm', 'https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837', 'https://github.com/tensorflow/tensorflow/issues/46914'} | null | {'https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837'} | {'https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837'} |
PyPI | GHSA-43fq-w8qq-v88h | Out-of-bounds read in Pillow | In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311. | {'CVE-2020-11538'} | 2022-03-03T05:13:46.477221Z | 2020-07-27T21:52:36Z | HIGH | null | {'CWE-125'} | {'https://github.com/python-pillow/Pillow/pull/4504', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11538', 'https://github.com/python-pillow/Pillow/commit/2ef59fdbaeb756bc512ab3f2ad15ac45665b303d', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3... | null | {'https://github.com/python-pillow/Pillow/commit/2ef59fdbaeb756bc512ab3f2ad15ac45665b303d'} | {'https://github.com/python-pillow/Pillow/commit/2ef59fdbaeb756bc512ab3f2ad15ac45665b303d'} |
PyPI | PYSEC-2021-554 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions if the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d7... | {'CVE-2021-37641', 'GHSA-9c8h-vvrj-w2p8'} | 2021-12-09T06:35:02.493921Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8', 'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'} | null | {'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'} | {'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'} |
PyPI | GHSA-mcgw-5fhw-3fq8 | Incorrect Authorization in saleor | Incorrect Authorization in saleor prior to 3.1.2. | {'CVE-2022-0932'} | 2022-03-25T19:31:58.123393Z | 2022-03-12T00:00:34Z | MODERATE | null | {'CWE-863'} | {'https://huntr.dev/bounties/88ae4cbc-c697-401b-8b04-7dc4e03ad8eb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0932', 'https://github.com/saleor/saleor/commit/521dfd6394f3926a77c60d8633c058e16d0f916d', 'https://github.com/saleor/saleor'} | null | {'https://github.com/saleor/saleor/commit/521dfd6394f3926a77c60d8633c058e16d0f916d'} | {'https://github.com/saleor/saleor/commit/521dfd6394f3926a77c60d8633c058e16d0f916d'} |
PyPI | GHSA-hj5v-574p-mj7c | Regular expression deinal of service in py | A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. | {'CVE-2020-29651'} | 2022-03-03T05:13:39.087574Z | 2021-04-20T16:39:57Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-29651', 'https://github.com/pytest-dev/py/issues/256', 'https://github.com/pytest-dev/py/pull/257', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/', 'https://github.com/pytest-dev/py/pull/257/c... | null | {'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144'} | {'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144'} |
PyPI | PYSEC-2021-104 | null | Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can ... | {'GHSA-5pr9-v234-jw36', 'CVE-2021-32674', 'GHSA-rpcg-f9q6-2mq6', 'GHSA-5vq5-pg3r-9ph3'} | 2021-06-22T04:54:57.652841Z | 2021-06-08T18:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-5vq5-pg3r-9ph3', 'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21', 'https://pypi.org/project/Zope/', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://github.com/zopefoundation/Zope/security/advisories/... | null | {'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'} | {'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'} |
PyPI | PYSEC-2021-411 | null | TensorFlow is an open source platform for machine learning. In affected versions the code for sparse matrix multiplication is vulnerable to undefined behavior via binding a reference to `nullptr`. This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor s... | {'CVE-2021-41219', 'GHSA-4f99-p9c2-3j8x'} | 2021-11-13T06:52:45.099185Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x'} | null | {'https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae'} | {'https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae'} |
PyPI | PYSEC-2016-7 | null | Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow. | {'CVE-2016-4009', 'GHSA-hvr8-466p-75rh'} | 2021-07-05T00:01:24.042207Z | 2016-04-13T16:59:00Z | null | null | null | {'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-hvr8-466p-75rh', 'http://www.securityfocus.com/bid/86064', 'https://github.com/python-pillow/Pillow/pull/1714', 'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e', 'https://github.com/python-pillow/... | null | {'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e'} | {'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e'} |
PyPI | GHSA-2gfx-95x2-5v3x | Heap buffer overflow in `QuantizedReshape` | ### Impact
An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization:
```python
import tensorflow as tf
tensor = tf.constant([], dtype=tf.qint32)
shape = tf.constant([], dtype=tf.int32)
input_min = tf.constant([], dtype=tf.float32)
input_max = tf.constant... | {'CVE-2021-29536'} | 2022-03-03T05:14:05.624783Z | 2021-05-21T14:22:32Z | LOW | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29536', 'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x'} | null | {'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'} | {'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'} |
PyPI | PYSEC-2018-99 | null | pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks. | {'GHSA-xrr4-74mc-rpjc', 'CVE-2011-2765'} | 2021-08-27T03:22:17.581707Z | 2018-08-20T13:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-xrr4-74mc-rpjc', 'https://pythonhosted.org/Pyro/12-changes.html', 'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e', 'https://bugs.debian.org/631912'} | null | {'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'} | {'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'} |
PyPI | PYSEC-2022-22 | null | Improper Access Control in Pypi calibreweb prior to 0.6.16. | {'CVE-2022-0273', 'GHSA-vgmw-9cww-qq99'} | 2022-02-04T19:19:26.662601Z | 2022-01-30T14:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-vgmw-9cww-qq99', 'https://huntr.dev/bounties/8f27686f-d698-4ab6-8ef0-899125792f13', 'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'} | null | {'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'} | {'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'} |
PyPI | PYSEC-2021-368 | null | Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and 5.3 have a remote code execution security issue. In order to be affected, one must use Python 3 for one's Zope deployment, run Zope 4 below version 4.6.3 or Zope 5 below version 5.3, and have the optional `Products.PythonScripts` a... | {'GHSA-g4gq-j4p2-j8fr', 'CVE-2021-32811', 'GHSA-qcx9-j53g-ccgf'} | 2021-10-12T02:55:36.218662Z | 2021-08-02T22:15:00Z | null | null | null | {'https://github.com/zopefoundation/Zope/security/advisories/GHSA-g4gq-j4p2-j8fr', 'https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988', 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf'} | null | {'https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988'} | {'https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988'} |
PyPI | PYSEC-2021-692 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4... | {'GHSA-pvrc-hg3f-58r6', 'CVE-2021-29566'} | 2021-12-09T06:35:26.175336Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} | null | {'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} | {'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} |
PyPI | PYSEC-2021-738 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a heap buffer overflow in Eigen implementation of `tf.raw_ops.BandedTriangularSolve`. The implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/ba... | {'CVE-2021-29612', 'GHSA-2xgj-xhgf-ggjv'} | 2021-12-09T06:35:34.038446Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0'} | null | {'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'} | {'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0'} |
PyPI | PYSEC-2017-45 | null | Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/contents path. | {'CVE-2015-4706'} | 2021-07-15T02:22:14.767338Z | 2017-09-21T14:29:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1235688', 'http://www.securityfocus.com/bid/75328', 'https://github.com/ipython/ipython/commit/7222bd53ad089a65fd610fab4626f9d0ab47dfce', 'https://ipython.org/ipython-doc/3/whatsnew/version3.html', 'http://www.openwall.com/lists/oss-security/2015/06/22/7', 'https://github.c... | null | {'https://github.com/ipython/ipython/commit/7222bd53ad089a65fd610fab4626f9d0ab47dfce', 'https://github.com/ipython/ipython/commit/c2078a53543ed502efd968649fee1125e0eb549c'} | {'https://github.com/ipython/ipython/commit/7222bd53ad089a65fd610fab4626f9d0ab47dfce', 'https://github.com/ipython/ipython/commit/c2078a53543ed502efd968649fee1125e0eb549c'} |
PyPI | GHSA-crch-j389-5f84 | Heap OOB write in TFLite | ### Impact
A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of [`ArgMin`/`ArgMax`](https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59):
```cc
TfLiteIntArray* output_dims = TfLiteIntArrayCr... | {'CVE-2021-29603'} | 2022-03-03T05:13:27.649387Z | 2021-05-21T14:28:15Z | LOW | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29603', 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84'} | null | {'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'} | {'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'} |
PyPI | GHSA-246w-56m2-5899 | Cross-site scripting (XSS) vulnerability in the password reset endpoint | ### Impact
The password reset endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the sam... | {'CVE-2021-21332'} | 2022-03-03T05:12:57.224765Z | 2021-03-26T19:52:54Z | MODERATE | null | {'CWE-79'} | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df', 'https://github.com/matrix-org/synapse', 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21332', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedora... | null | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'} | {'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'} |
PyPI | GHSA-qf7v-8hj3-4xw7 | Improper Verification of Cryptographic Signature in PySAML2 | PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed,... | {'CVE-2020-5390'} | 2022-03-03T05:14:15.972813Z | 2020-05-06T19:41:29Z | HIGH | null | {'CWE-347'} | {'https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html', 'https://usn.ubuntu.com/4245-1/', 'https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0', 'https://pypi.org/project/pysaml2/5.0.0/', 'https://githu... | null | {'https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e', 'https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25'} | {'https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25', 'https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e'} |
PyPI | PYSEC-2021-32 | null | OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redi... | {'GHSA-g4rf-pc26-6hmr', 'CVE-2021-21377'} | 2021-03-27T02:20:00Z | 2021-03-23T16:15:00Z | null | null | null | {'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://pypi.org/project/omero-web/', 'https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr', 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021', 'https://www.openmicroscopy.org/security/adv... | null | {'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'} | {'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'} |
PyPI | PYSEC-2021-153 | null | TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference. The implementation of `RaggedTensorToVariant` operations(https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6... | {'GHSA-84mw-34w6-2q43', 'CVE-2021-29516'} | 2021-08-27T03:22:24.214869Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-84mw-34w6-2q43'} | null | {'https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93'} | {'https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93'} |
PyPI | GHSA-v6rh-hp5x-86rv | Potential bypass of an upstream access control based on URL paths in Django | In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. This issue has low severity, according to the Django security policy. | {'CVE-2021-44420'} | 2022-03-03T05:12:27.798936Z | 2021-12-09T19:09:37Z | HIGH | null | {'CWE-287'} | {'https://security.netapp.com/advisory/ntap-20211229-0006/', 'https://www.djangoproject.com/weblog/2021/dec/07/security-releases/', 'https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6', 'https://groups.google.com/forum/#!forum/django-announce', 'https://www.openwall.com/lists/oss-security/... | null | {'https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6'} | {'https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6'} |
PyPI | PYSEC-2021-503 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.ReverseSequence` allows for stack overflow and/or `CHECK`-fail based denial of service. The implementation(https://github.com/tensorflow/tensorflow/blob/5b3b071975e01f0d250c928b2a8f901cd53b90a7/tensorflow/core/kerne... | {'GHSA-6qgm-fv6v-rfpv', 'CVE-2021-29575'} | 2021-12-09T06:34:55.002066Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6qgm-fv6v-rfpv', 'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23'} | null | {'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23'} | {'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23'} |
PyPI | PYSEC-2021-850 | null | In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notificati... | {'GHSA-3m3h-v9hv-9j4h', 'CVE-2021-25986'} | 2021-12-14T08:21:59.357980Z | 2021-11-23T20:15:00Z | null | null | null | {'https://pypi.org/project/wiki', 'https://github.com/advisories/GHSA-3m3h-v9hv-9j4h', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986', 'https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25986'} | null | {'https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5'} | {'https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5'} |
PyPI | PYSEC-2020-48 | null | Hyperledger Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity. In Hyperledger Indy before version 1.12.4, there is lack of signature verification on a specific transaction which enables an attacker to make certain unauthorized alterations to the ledger. Updating a DID with... | {'GHSA-wh2w-39f4-rpv2', 'CVE-2020-11093'} | 2020-12-31T19:25:00Z | 2020-12-24T20:15:00Z | null | null | null | {'https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1124', 'https://github.com/hyperledger/indy-node/blob/master/docs/source/auth_rules.md', 'https://github.com/hyperledger/indy-node/commit/55056f22c83b7c3520488b615e1577e0f895d75a', 'https://github.com/hyperledger/indy-node/security/advisories/GHSA-wh2w... | null | {'https://github.com/hyperledger/indy-node/commit/55056f22c83b7c3520488b615e1577e0f895d75a'} | {'https://github.com/hyperledger/indy-node/commit/55056f22c83b7c3520488b615e1577e0f895d75a'} |
PyPI | PYSEC-2022-75 | null | Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commi... | {'CVE-2022-23566', 'GHSA-5qw5-89mw-wcg2'} | 2022-03-09T00:17:33.179728Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394', 'https://github.com/tensorf... | null | {'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd'} | {'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd'} |
PyPI | PYSEC-2021-446 | null | TensorFlow is an end-to-end open source platform for machine learning. In eager mode (default in TF 2.0 and later), session operations are invalid. However, users could still call the raw ops associated with them and trigger a null pointer dereference. The implementation(https://github.com/tensorflow/tensorflow/blob/ee... | {'GHSA-62gx-355r-9fhg', 'CVE-2021-29518'} | 2021-12-09T06:34:46.214930Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-62gx-355r-9fhg', 'https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba'} | null | {'https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba'} | {'https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba'} |
PyPI | PYSEC-2020-295 | null | In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`. This results in accessing a dimension outside the rank of the input tensor in the C++ kernel implementation. However, dim_size only does a DCHECK to validate the argument and then uses it to ac... | {'GHSA-rrfp-j2mp-hq9c', 'CVE-2020-15265'} | 2021-12-09T06:34:43.980213Z | 2020-10-21T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/issues/42105', 'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrfp-j2mp-hq9c'} | null | {'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'} | {'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'} |
PyPI | PYSEC-2021-295 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_sta... | {'CVE-2021-37673', 'GHSA-278g-rq84-9hmg'} | 2021-08-27T03:22:46.123018Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg'} | null | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'} | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'} |
PyPI | GHSA-5p3x-r448-pc62 | Improper Verification of Cryptographic Signature in PySAML2 | ### Impact
All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not ensure that a signed SAML document is correctly signed. The default `CryptoBackendXmlSec1` backend is using the `xmlsec1` binary to verify the signature... | {'CVE-2021-21239'} | 2022-03-03T05:12:33.192423Z | 2021-01-21T14:12:18Z | LOW | null | {'CWE-347'} | {'https://github.com/IdentityPython/pysaml2/commit/46578df0695269a16f1c94171f1429873f90ed99', 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62', 'https://pypi.org/project/pysaml2', 'https://www.aleksey.com/pipermail/xmlsec/2013/009717.html', 'https://github.com/IdentityPython/pysaml2/r... | null | {'https://github.com/IdentityPython/pysaml2/commit/46578df0695269a16f1c94171f1429873f90ed99'} | {'https://github.com/IdentityPython/pysaml2/commit/46578df0695269a16f1c94171f1429873f90ed99'} |
PyPI | PYSEC-2021-780 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause denial of service in applications serving models using `tf.raw_ops.NonMaxSuppressionV5` by triggering a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00... | {'GHSA-vmjw-c2vp-p33c', 'CVE-2021-37669'} | 2021-12-09T06:35:38.342648Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c', 'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58', 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d'} | null | {'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d', 'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58'} | {'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58', 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.