ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
OSS-Fuzz
OSV-2020-540
Heap-buffer-overflow in byte_from_wkb_state
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16591 Crash type: Heap-buffer-overflow READ 1 Crash state: byte_from_wkb_state lwgeom_from_wkb_state lwcollection_from_wkb_state
null
2021-03-09T04:49:05.943217Z
2020-07-01T00:00:15.605041Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16591', 'https://git.osgeo.org/gitea/postgis/postgis/commit/b1abe27db0869d345ac5c0240a21e322a725fff9'}
{'https://git.osgeo.org/gitea/postgis/postgis/commit/e0b9fcce14c44a6a3be8e79a4cb3a2d13e79fc7a'}
OSS-Fuzz
OSV-2020-76
Heap-use-after-free in pixAverageRasterScans
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22760 ``` Crash type: Heap-use-after-free READ 1 Crash state: pixAverageRasterScans pixExtractBarcodeCrossings pixExtractBarcodeWidths1 ```
null
2022-04-13T03:04:32.704451Z
2020-06-24T01:51:13.003871Z
HIGH
null
null
{'https://github.com/DanBloomberg/leptonica/commit/7b5ba2afc759b7a44f6776a53030b494c6d985c3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22760'}
{'https://github.com/DanBloomberg/leptonica/commit/f053b173bc94ef35a99ddf8eb608f63ae794b5fa'}
OSS-Fuzz
OSV-2020-405
Stack-buffer-overflow in ZSTD_decodeLiteralsBlock
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16445 ``` Crash type: Stack-buffer-overflow WRITE {*} Crash state: ZSTD_decodeLiteralsBlock ZSTD_decompressBlock ZSTD_decompressDCtx ```
null
2022-04-13T03:19:42.457329Z
2020-07-01T00:00:07.677115Z
HIGH
null
null
{'https://github.com/facebook/zstd/commit/a42bbb4e058063be8b61b3e00306eb6fb886a836', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16445'}
{'https://github.com/facebook/zstd/commit/610a81ecf9593893ed2f69718d3ecbd234297804'}
OSS-Fuzz
OSV-2021-1311
Null-dereference READ in unzOpenCurrentFile3
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38873 ``` Crash type: Null-dereference READ Crash state: unzOpenCurrentFile3 unzOpenCurrentFile Assimp::ZipFileInfo::Extract ```
null
2022-04-13T03:04:42.679623Z
2021-09-18T00:00:37.776159Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38873', 'https://github.com/assimp/assimp/commit/310c81aaa20b7328ce7a354897db817f8becac3a'}
{'https://github.com/assimp/assimp/commit/8a975549a99bd21b7a2c09cc37b73e52a3919fed'}
OSS-Fuzz
OSV-2018-156
Heap-buffer-overflow in dotnet_parse_us
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11945 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: dotnet_parse_us dotnet_parse_com dotnet__load ```
null
2022-04-13T03:04:42.270609Z
2021-01-13T00:01:07.126725Z
MEDIUM
null
null
{'https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11945'}
{'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'}
OSS-Fuzz
OSV-2020-956
Heap-buffer-overflow in ndpi_workflow_process_packet
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20644 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: ndpi_workflow_process_packet fuzz_ndpi_reader.c HonggfuzzPersistentLoop ```
null
2022-04-13T03:04:35.902440Z
2020-07-22T00:00:25.708813Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20644', 'https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a'}
{'https://github.com/ntop/nDPI/commit/98d9f524f9ff7746d0345939fe543020f8057212'}
OSS-Fuzz
OSV-2021-1741
Stack-buffer-overflow in line_join_points
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42796 Crash type: Stack-buffer-overflow WRITE 4 Crash state: line_join_points stroke_add_compat gx_stroke_path_only
null
2021-12-23T00:00:50.608103Z
2021-12-23T00:00:50.607893Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42796', 'git://git.ghostscript.com/ghostpdl/commit/07cfc24d532beadf23d50effa3b8a0bca45b849d'}
{'git://git.ghostscript.com/ghostpdl/commit/866d8b4b104e2dcbd8352cf86edff28bbf9ad165'}
OSS-Fuzz
OSV-2020-1423
Use-of-uninitialized-value in txt2sd
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22219 ``` Crash type: Use-of-uninitialized-value Crash state: txt2sd fuzz_mdns_xht.cc txt2sd ```
null
2022-04-15T00:06:34.889356Z
2020-07-28T00:00:16.191970Z
MEDIUM
null
null
{'https://github.com/open62541/open62541/commit/6f21ecb48a49fd292d568feb3751a50e51e083a3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22219'}
{'https://github.com/open62541/open62541/commit/2919785d72474ed553317c4f3bafadf3e8c027f2', 'https://github.com/open62541/open62541/commit/798210374ad7a5fd43b31fc3c178a34a3ac21a0c'}
OSS-Fuzz
OSV-2020-8
Heap-buffer-overflow in findNextBorderPixel
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: findNextBorderPixel pixGetHoleBorder pixGetCCBorders ```
null
2022-04-13T03:04:32.639074Z
2020-06-24T01:51:09.673990Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433', 'https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842'}
{'https://github.com/DanBloomberg/leptonica/commit/a53cfc7bd554dc4c2644b8f27ac5296fd926725f'}
OSS-Fuzz
OSV-2020-1264
Use-of-uninitialized-value in AnnotAppearanceBuilder::drawText
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17607 Crash type: Use-of-uninitialized-value Crash state: AnnotAppearanceBuilder::drawText AnnotAppearanceBuilder::drawFormFieldChoice AnnotAppearanceBuilder::drawFormField
null
2021-06-23T06:26:15.714573Z
2020-07-22T21:50:01.559473Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17607', 'https://gitlab.freedesktop.org/poppler/poppler/commit/0e8ed9a34e04cc4e56b31f4057c267630c4a7656'}
{'https://gitlab.freedesktop.org/poppler/poppler/commit/c9e2dc7ea7e098875e6b93566bdb1d14451c3673'}
OSS-Fuzz
OSV-2021-242
Heap-buffer-overflow in rans_uncompress_to_4x16
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29939 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: rans_uncompress_to_4x16 rans_decode uncompress ```
null
2022-04-13T03:04:32.338631Z
2021-01-26T23:45:33.235035Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29939', 'https://github.com/samtools/htslib/commit/b8dcbd12b2c535fb792a5dfb275e875b626e929d', 'https://github.com/samtools/htslib/commit/9d9e60c83487a8ac4644079e9636e34a9dd4bb08'}
{'https://github.com/samtools/htslib/commit/0d1971cbebb269d90a563464e4f56987290e20ab'}
OSS-Fuzz
OSV-2020-2018
Heap-use-after-free in fpixChangeRefcount
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26260 ``` Crash type: Heap-use-after-free READ 4 Crash state: fpixChangeRefcount fpixDestroy fpix2_fuzzer.cc ```
null
2022-04-13T03:04:32.714945Z
2020-10-12T00:00:40.582555Z
HIGH
null
null
{'https://github.com/DanBloomberg/leptonica/commit/7d0c940768fa3f7d07396dbae1d668cfded6bf05', 'https://github.com/DanBloomberg/leptonica/commit/20b8d16e4f3fa4d94b606a7f7804ee56c776768b', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26260'}
{'https://github.com/DanBloomberg/leptonica/commit/ef35b298c87cee04bf35dac4bc7c8c489d26fbc4'}
OSS-Fuzz
OSV-2020-612
Use-of-uninitialized-value in std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std::
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18066 ``` Crash type: Use-of-uninitialized-value Crash state: std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std:: Sass::ComplexSelector::resolve_parent_refs Sass::Eval::operator ```
null
2022-04-13T03:04:38.465562Z
2020-07-01T00:00:20.375619Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18066', 'https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d'}
{'https://github.com/sass/libsass/commit/f964dcddd76f4c1f00da06bfd905be790618c33b'}
OSS-Fuzz
OSV-2020-242
Heap-buffer-overflow in ndpi_workflow_process_packet
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20089 ``` Crash type: Heap-buffer-overflow READ 2 Crash state: ndpi_workflow_process_packet fuzz_ndpi_reader.c ```
null
2022-04-13T03:04:36.221336Z
2020-06-26T00:00:09.227452Z
MEDIUM
null
null
{'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20089'}
{'https://github.com/ntop/nDPI/commit/10738a0ca334104377e19a1e683bd13f2451a9e2'}
OSS-Fuzz
OSV-2021-1805
Heap-buffer-overflow in ndpi_search_kerberos
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43925 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: ndpi_search_kerberos check_ndpi_detection_func ndpi_check_flow_func ```
null
2022-04-13T03:04:36.014290Z
2022-01-23T00:00:37.838585Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43925', 'https://github.com/ntop/nDPI/commit/9dcc4a2334fa10d7d0a3c019ee35dfde4c06e044'}
{'https://github.com/ntop/nDPI/commit/ed51987e3a4838dd9aef27dfab2c0651f2f52836'}
OSS-Fuzz
OSV-2020-757
Heap-buffer-overflow in cras_channel_remix_conv_create
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23612 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: cras_channel_remix_conv_create audio_thread_config_global_remix ccr_handle_message_from_client ```
null
2022-04-13T03:04:42.576554Z
2020-07-09T00:00:09.165795Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23612', 'https://chromium.googlesource.com/chromiumos/third_party/adhd/commit/144bf3828e41b26c7746be463d17d6ea55dd7163'}
{'https://chromium.googlesource.com/chromiumos/third_party/adhd/commit/829025d88c2f1d4cbe0daa02ed37f88b4b3fffd7'}
OSS-Fuzz
OSV-2020-307
Heap-buffer-overflow in spng_decode_image
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16830 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: spng_decode_image spng_read_fuzzer.cc ```
null
2022-04-13T03:04:33.693276Z
2020-06-30T00:00:49.046191Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16830', 'https://github.com/randy408/libspng/commit/d7d4cced14f6107d05b52b5e7758207f79aa3465'}
{'https://github.com/randy408/libspng/commit/d48a9fa212cee4c05c51178b9c7813cd1299dcb3'}
OSS-Fuzz
OSV-2021-1413
UNKNOWN READ in helper_uc_tracecode
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39559 ``` Crash type: UNKNOWN READ Crash state: helper_uc_tracecode ```
null
2022-04-13T03:26:07.599894Z
2021-10-05T00:01:45.386128Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39559', 'https://github.com/unicorn-engine/unicorn/commit/3fadb5aa5aad22926f5f816dbe396f8661990374'}
{'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'}
OSS-Fuzz
OSV-2021-757
Use-of-uninitialized-value in nn_check_initialized
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34156 ``` Crash type: Use-of-uninitialized-value Crash state: nn_check_initialized nn_zero ecgdsa_sign_raw ```
null
2022-04-13T03:04:31.416903Z
2021-05-12T00:01:05.638739Z
MEDIUM
null
null
{'https://github.com/ANSSI-FR/libecc/commit/d6cbbbb0c4afb6097dfea9eadf1516759dd337eb', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34156'}
{'https://github.com/ANSSI-FR/libecc/commit/f3abf297e84874278129fb91bc1b89356dd66627'}
OSS-Fuzz
OSV-2021-307
UNKNOWN READ in cpu_arm_exec_armeb
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30444 ``` Crash type: UNKNOWN READ Crash state: cpu_arm_exec_armeb resume_all_vcpus_armeb vm_start_armeb ```
null
2022-04-13T03:27:15.927960Z
2021-02-08T00:00:08.491999Z
MEDIUM
null
null
{'https://github.com/unicorn-engine/unicorn/commit/7ca7e8a79d85ca57bb523be49009b0326b7a5210', 'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8', 'https://github.com/unicorn-engine/unicorn/commit/e2a924a32b6fd3f24163b93996ac91782f518a25', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30444'}
{'https://github.com/unicorn-engine/unicorn/commit/07f94ad1fc62293cac330df9714d739be6354926'}
OSS-Fuzz
OSV-2020-1321
UNKNOWN READ in FlowGetHash
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21479 ``` Crash type: UNKNOWN READ Crash state: FlowGetHash FlowSetupPacket DecodeICMPV4 ```
null
2022-04-13T03:04:32.748792Z
2020-07-22T21:50:06.291563Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21479', 'https://github.com/OISF/suricata/commit/8cbae1371f18d1427244f18fe2110256496a9f9f'}
{'https://github.com/OISF/suricata/commit/19fe8d9894207f18dbd305a5834820f3a698dc32'}
OSS-Fuzz
OSV-2018-204
UNKNOWN WRITE in __msan_memcpy.part.51
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9845 ``` Crash type: UNKNOWN WRITE Crash state: __msan_memcpy.part.51 QuickOpen::ReadRaw QuickOpen::ReadNext ```
null
2022-04-13T03:04:35.292989Z
2021-01-13T00:01:23.035709Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9845'}
{'https://github.com/aawc/unrar/commit/bc53b57bf64fa0919981c362252637f9c57012b2'}
OSS-Fuzz
OSV-2018-64
Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11522 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: BEInt<unsigned int, 4>::operator unsigned int void hb_sanitize_context_t::set_object<OT::KernSubTable<OT::KernAATSubTableHeade AAT::KerxTable<OT::KernAAT>::sanitize ```
null
2022-04-13T03:04:32.803589Z
2021-01-13T00:00:31.625117Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11522', 'https://github.com/harfbuzz/harfbuzz/commit/8dcc1913a1670ede7b124f7b5b775d7ab8791386'}
{'https://github.com/harfbuzz/harfbuzz/commit/758c9d68e2143493978d8ac8391f4af2a2abc26a'}
OSS-Fuzz
OSV-2020-184
Heap-buffer-overflow in file_strncmp
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23044 ``` Crash type: Heap-buffer-overflow READ 13 Crash state: file_strncmp magiccheck match ```
null
2022-04-13T03:04:30.870815Z
2020-06-24T01:51:17.908691Z
MEDIUM
null
null
{'https://github.com/file/file/commit/3c6b51d4a1f5682f8144fef1553b0357d3d83aaf', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23044'}
{'https://github.com/file/file/commit/020876142969029eefc7a52d5545d0475203c472'}
OSS-Fuzz
OSV-2021-887
Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35436 ``` Crash type: Use-after-poison WRITE 8 Crash state: AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr AK::String::String JS::abstract_relation ```
null
2022-04-13T03:04:32.211472Z
2021-06-22T00:01:25.243822Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35436', 'https://github.com/SerenityOS/serenity/commit/5d24b5f4bec315cba22746f8a0985b1c0877a315'}
{'https://github.com/SerenityOS/serenity/commit/c31392510aa21d3ce5000f19a12dcf43abf9613d'}
OSS-Fuzz
OSV-2020-2274
Heap-buffer-overflow in McCopyWidthEq4_c
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28769 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: McCopyWidthEq4_c McCopy_sse2 McChroma_ssse3 ```
null
2022-04-13T03:04:37.647508Z
2020-12-19T00:00:41.113564Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28769', 'https://github.com/cisco/openh264/commit/992c1c147175126c3fe7ab78216aa0395f9e6c71', 'https://github.com/cisco/openh264/commit/f15f940425eebf24ce66984db2445733cf500b7b'}
{'https://github.com/cisco/openh264/commit/66ef706acd55b0b8daec32ca299d2586a1f473c9'}
OSS-Fuzz
OSV-2020-1008
Use-of-uninitialized-value in ihevc_recon_32x32
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20476 ``` Crash type: Use-of-uninitialized-value Crash state: ihevc_recon_32x32 ihevcd_iquant_itrans_recon_ctb ihevcd_process ```
null
2022-04-13T03:29:09.175087Z
2020-07-22T21:49:39.707812Z
MEDIUM
null
null
{'https://android.googlesource.com/platform/external/libhevc/commit/35d222d35253c15e130762fcf54a43d4543a2785', 'https://android.googlesource.com/platform/external/libhevc/commit/229e7ee2142c0f78c7736518a5c8cc1d131f4a30', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20476'}
{'https://android.googlesource.com/platform/external/libhevc/commit/d28f2210ee8e65afdfb07a1fd6582285d3d178e0'}
OSS-Fuzz
OSV-2021-1690
Global-buffer-overflow in search_table_1
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42266 Crash type: Global-buffer-overflow READ 1 Crash state: search_table_1 split_bogus_operator pdfi_interpret_stream_operator
null
2021-12-14T00:01:39.477871Z
2021-12-14T00:01:39.477607Z
null
null
null
{'git://git.ghostscript.com/ghostpdl/commit/82b097fe8e76ea92f69ef483f45c0cf491a98d43', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42266'}
{'git://git.ghostscript.com/ghostpdl/commit/75fbddf52051987287e62d13c659eb73ba16982f'}
OSS-Fuzz
OSV-2021-184
Heap-buffer-overflow in H5HL__fl_deserialize
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29580 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: H5HL__fl_deserialize H5HL__cache_datablock_deserialize H5C_load_entry ```
null
2022-04-13T03:04:43.102279Z
2021-01-15T00:00:16.202094Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29580'}
{'git://git.code.sf.net/p/matio/matio/commit/1ce8f2d1845ecdde19a35605cabdbb884776d52d'}
OSS-Fuzz
OSV-2020-868
Use-of-uninitialized-value in fetchARGB32ToRGBA64PM_avx2
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21808 ``` Crash type: Use-of-uninitialized-value Crash state: fetchARGB32ToRGBA64PM_avx2 blend_untransformed_generic_rgb64 fillRect_normalized ```
null
2022-05-08T00:03:51.202662Z
2020-07-14T22:13:50.828646Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21808'}
{'https://invent.kde.org/frameworks/kimageformats/commit/c60e77c048d32ccf743cec695743b77b2b25dc87'}
OSS-Fuzz
OSV-2021-1385
Heap-buffer-overflow in Assimp::BaseImporter::ConvertToUTF8
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39339 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: Assimp::BaseImporter::ConvertToUTF8 Assimp::BaseImporter::TextFileToBuffer Assimp::OpenGEX::OpenGEXImporter::InternReadFile ```
null
2022-04-13T03:04:42.673761Z
2021-09-28T00:00:07.486971Z
MEDIUM
null
null
{'https://github.com/assimp/assimp/commit/215f4e1f4dcca57f1dee9f18519df1af659ad62c', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39339'}
{'https://github.com/assimp/assimp/commit/8a975549a99bd21b7a2c09cc37b73e52a3919fed'}
OSS-Fuzz
OSV-2021-868
Heap-buffer-overflow in ndpi_set_detected_protocol
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35288 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: ndpi_set_detected_protocol ndpi_match_hostname_protocol processClientServerHello ```
null
2022-04-13T03:04:36.145859Z
2021-06-18T00:00:07.405397Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35288', 'https://github.com/ntop/nDPI/commit/b0b3e1bc6c8db7cf8a2a26dbb29ffdb057d86121'}
{'https://github.com/ntop/nDPI/commit/be808c30f3f4582009df4c5efccd4f3bb0c6ef1d'}
OSS-Fuzz
OSV-2020-491
Stack-buffer-overflow in Mat_VarReadNextInfo5
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17119 ``` Crash type: Stack-buffer-overflow READ 4 Crash state: Mat_VarReadNextInfo5 Mat_GetDir MatioRead ```
null
2022-04-13T03:04:43.112894Z
2020-07-01T00:00:12.708028Z
MEDIUM
null
null
{'git://git.code.sf.net/p/matio/matio/commit/8b3ee30a8d9cfdc3799252a4a42572fc6f8e205e', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17119'}
{'git://git.code.sf.net/p/matio/matio/commit/f94c087aa9be54ec86a01e267b80fd61108069be'}
OSS-Fuzz
OSV-2020-215
Use-of-uninitialized-value in xmlStrdup
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23144 Crash type: Use-of-uninitialized-value Crash state: xmlStrdup __xmlRaiseError xmlErrValidNode
null
2021-03-09T04:49:05.688089Z
2020-06-24T01:51:19.309469Z
MEDIUM
null
null
{'https://gitlab.gnome.org/GNOME/libxml2/commit/2af3c2a8b974cb5896cd3beb74561ba979de9f34', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23144'}
{'https://gitlab.gnome.org/GNOME/libxml2/commit/00ed736eecf93aeab49089abb06e0e5fc0e7e091'}
OSS-Fuzz
OSV-2020-1233
Heap-buffer-overflow in getTLScertificate
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19269 ``` Crash type: Heap-buffer-overflow READ 6 Crash state: getTLScertificate tlsDetectProtocolFromCertificate ndpi_search_tls_tcp_udp ```
null
2022-04-13T03:04:36.352534Z
2020-07-22T21:49:58.860561Z
MEDIUM
null
null
{'https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19269'}
{'https://github.com/ntop/nDPI/commit/e695dd6eade754b2d50bdf297ca8bdc4105f93ff'}
OSS-Fuzz
OSV-2020-1726
Heap-use-after-free in xmlXPathNodeSetAdd
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25536 Crash type: Heap-use-after-free READ 4 Crash state: xmlXPathNodeSetAdd xmlXPathGetElementsByIds xmlXPathIdFunction
null
2021-03-09T04:49:05.408455Z
2020-09-11T00:00:07.083398Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25536', 'https://gitlab.gnome.org/GNOME/libxml2/commit/b215c270fa3b1436314cc56654718bd12182cfec'}
{'https://gitlab.gnome.org/GNOME/libxml2/commit/f0fd1b67fc883a24cdd039abb3d4fe4696104d72'}
OSS-Fuzz
OSV-2021-700
UNKNOWN READ in ReadLEB_u32
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33749 ``` Crash type: UNKNOWN READ Crash state: ReadLEB_u32 InitElements Compile_ExtendedOpcode ```
null
2022-04-13T03:04:30.651451Z
2021-04-29T00:00:12.162949Z
MEDIUM
null
null
{'https://github.com/wasm3/wasm3/commit/6bb612ccbfd5f8993a07a99092fab534722df1c3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33749'}
{'https://github.com/wasm3/wasm3/commit/8cb2fd424309fa6ff70cf00bfcedc4e66d3355c0'}
OSS-Fuzz
OSV-2020-700
Stack-buffer-overflow in ot::Message::Write
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15380 ``` Crash type: Stack-buffer-overflow READ {*} Crash state: ot::Message::Write ot::Message::Append ot::Mle::Mle::AppendResponse ```
null
2022-04-13T03:04:38.888636Z
2020-07-01T00:00:25.618153Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15380', 'https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb'}
{'https://github.com/openthread/openthread/commit/b694b00951eeeb4986387de1179d55dd38643a87'}
OSS-Fuzz
OSV-2021-429
Heap-buffer-overflow in blosc_d
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31170 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: blosc_d _blosc_getitem blosc2_getitem_ctx ```
null
2022-04-13T03:04:40.451804Z
2021-02-22T00:00:20.030600Z
HIGH
null
null
{'https://github.com/Blosc/c-blosc2/commit/cb44cf0fc82cf19efb002bba0eb5cc42e9527c3f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31170'}
{'https://github.com/Blosc/c-blosc2/commit/861ba79f31393dec0a0782ca11cf32cebb6f6610'}
OSS-Fuzz
OSV-2020-429
Heap-buffer-overflow in MEM_read32
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14368 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: MEM_read32 ZSTDv05_decodeSequence ZSTDv05_decompressSequences ```
null
2022-04-13T03:04:31.653842Z
2020-07-01T00:00:08.999234Z
MEDIUM
null
null
{'https://github.com/facebook/zstd/commit/0fd322f812211e653a83492c0c114b933f8b6bc5', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14368'}
{'https://github.com/facebook/zstd/commit/610a81ecf9593893ed2f69718d3ecbd234297804'}
OSS-Fuzz
OSV-2020-2223
Heap-use-after-free in e1000e_write_packet_to_guest
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28194 Crash type: Heap-use-after-free READ 8 Crash state: e1000e_write_packet_to_guest e1000e_receive_iov e1000e_nc_receive_iov
null
2021-03-09T04:49:05.727354Z
2020-12-04T00:00:19.497055Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28194', 'https://git.qemu.org/git/qemu/commit/b98b9fdef00e2383f63f939e079fe2c9eba87ca1'}
{'https://git.qemu.org/git/qemu/commit/7564bf7701f00214cdc8a678a9f7df765244def1'}
OSS-Fuzz
OSV-2018-33
Heap-buffer-overflow in yr_object_set_string
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14560 ``` Crash type: Heap-buffer-overflow READ {*} Crash state: yr_object_set_string dotnet_parse_us dotnet_parse_com ```
null
2022-04-13T03:04:42.242196Z
2021-01-13T00:00:14.651679Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14560', 'https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f'}
{'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'}
OSS-Fuzz
OSV-2022-67
Heap-buffer-overflow in cli_bcomp_freemeta
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43816 ``` Crash type: Heap-buffer-overflow READ 8 Crash state: cli_bcomp_freemeta cli_bcomp_addpatt cli_parse_add ```
null
2022-04-13T03:04:39.425407Z
2022-01-21T00:00:45.048694Z
MEDIUM
null
null
{'https://github.com/Cisco-Talos/clamav/commit/618e3b6bcfc2867a713d29a0696d9b87be197ed6', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43816'}
{'https://github.com/Cisco-Talos/clamav/commit/0037f5825b0b17a789c7eb29c9cb9a2d39c452bc'}
OSS-Fuzz
OSV-2020-1819
Heap-buffer-overflow in void cv::copyToMat<int>
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25779 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: void cv::copyToMat<int> cv::decodeSRGBData cv::Jpeg2KOpjDecoder::readData ```
null
2022-04-13T03:04:31.501046Z
2020-09-21T00:00:12.969129Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25779', 'https://github.com/opencv/opencv/commit/f7b8f522ff4084d584628811a02a621736c3a731'}
{'https://github.com/opencv/opencv/commit/bfd056ceb1ad6529e1a2103f60e6f089c6b70109'}
OSS-Fuzz
OSV-2021-1628
Stack-buffer-overflow in sprint_realloc_hinted_integer
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41372 ``` Crash type: Stack-buffer-overflow WRITE 1 Crash state: sprint_realloc_hinted_integer sprint_realloc_integer snprint_integer ```
null
2022-04-13T03:04:35.842933Z
2021-11-27T00:01:21.208846Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41372'}
{'https://github.com/net-snmp/net-snmp/commit/94436b16947c3f9039b96c4cc135507d864b422d'}
OSS-Fuzz
OSV-2018-195
Heap-buffer-overflow in gmp_emsa_pkcs1_signature_data
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10671 ``` Crash type: Heap-buffer-overflow WRITE 1 Crash state: gmp_emsa_pkcs1_signature_data verify_emsa_pkcs1_signature verify ```
null
2022-04-13T03:04:34.061437Z
2021-01-13T00:01:21.218732Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10671', 'https://github.com/strongswan/strongswan/commit/129ab919a8c3abfc17bea776f0774e0ccf33ca09'}
{'https://github.com/strongswan/strongswan/commit/5955db5b124a1ee5f44c0845b6e00c86fddae67c'}
OSS-Fuzz
OSV-2018-300
Use-of-uninitialized-value in fz_unpack_tile
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=8326 Crash type: Use-of-uninitialized-value Crash state: fz_unpack_tile fz_decomp_image_from_stream compressed_image_get_pixmap
null
2021-06-23T06:24:53.189401Z
2021-01-15T00:00:27.081384Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=8326', 'git://git.ghostscript.com/mupdf/commit/43a0278d42ac1b350ce6b582f9d0e3d7785a17b6'}
{'git://git.ghostscript.com/mupdf/commit/11ee2bcf4d23bcb443d6b39caa2ac62fdd9920b2'}
OSS-Fuzz
OSV-2020-653
Heap-buffer-overflow in perfetto::base::Hash::Update
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14753 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: perfetto::base::Hash::Update perfetto::base::StringView::Hash perfetto::trace_processor::StringPool::InternString ```
null
2022-04-13T03:40:10.578056Z
2020-07-01T00:00:22.674176Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14753', 'https://android.googlesource.com/platform/external/perfetto//commit/71a18f6f4b01143a6ac7bba2261a4139076ea396'}
{'https://android.googlesource.com/platform/external/perfetto//commit/2ffc4a93685c45efec70e07c8acddf60eb1ae60a'}
OSS-Fuzz
OSV-2017-16
Heap-buffer-overflow in file_strncmp
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=750 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: file_strncmp magiccheck match ```
null
2022-04-13T03:04:30.843383Z
2021-01-13T00:00:27.841127Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=750'}
{'https://github.com/file/file/commit/17f892b32cc92f7505f02d198142c1a57204582f'}
OSS-Fuzz
OSV-2017-154
Heap-buffer-overflow in TetrahedralInterpFloat
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=852 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: TetrahedralInterpFloat _LUTeval16 CachedXFORM ```
null
2022-04-13T03:04:33.907967Z
2021-01-15T00:01:25.369737Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=852', 'https://github.com/mm2/Little-CMS/commit/76d1dccf3e5ce0c67125964d0908b322e7d1afb9'}
{'https://github.com/mm2/Little-CMS/commit/46a9220375da02b179bb6c0314b5cef40a433792'}
OSS-Fuzz
OSV-2021-1452
Heap-buffer-overflow in mrb_funcall_with_block
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39937 ``` Crash type: Heap-buffer-overflow WRITE 8 Crash state: mrb_funcall_with_block mrb_instance_new mrb_funcall_with_block ```
null
2022-04-13T03:04:39.698442Z
2021-10-15T00:00:40.001741Z
HIGH
null
null
{'https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39937'}
{'https://github.com/mruby/mruby/commit/dccd66f9efecd0a974b735c62836fe566015cf37'}
OSS-Fuzz
OSV-2020-1730
Bad-cast to RDKit::Atom
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25547 ``` Crash type: Bad-cast Crash state: Bad-cast to RDKit::Atom ```
null
2022-04-13T03:04:41.515246Z
2020-09-11T00:00:51.334144Z
HIGH
null
null
{'https://github.com/rdkit/rdkit/commit/759b7a4b603c8a3c4bbb8bc31594bbab501094e3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25547'}
{'https://github.com/rdkit/rdkit/commit/a9010da8a4af17479c706f2cf4e8c6acdc1585ce'}
OSS-Fuzz
OSV-2018-245
Use-of-uninitialized-value in fz_keep_imp
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6837 ``` Crash type: Use-of-uninitialized-value Crash state: fz_keep_imp pdf_copy_pattern_gstate pdf_show_pattern ```
null
2022-04-13T03:04:31.216503Z
2021-01-15T00:00:05.471739Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6837', 'git://git.ghostscript.com/mupdf/commit/04c37454b9ef5a0576c3dd34adc7426450bf18e7'}
{'git://git.ghostscript.com/mupdf/commit/11ee2bcf4d23bcb443d6b39caa2ac62fdd9920b2'}
OSS-Fuzz
OSV-2020-1049
Heap-use-after-free in WelsDec::WelsReorderRefList
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14027 ``` Crash type: Heap-use-after-free READ 4 Crash state: WelsDec::WelsReorderRefList WelsDec::InitRefPicList WelsDec::DecodeCurrentAccessUnit ```
null
2022-04-13T03:04:37.547498Z
2020-07-22T21:49:43.177956Z
HIGH
null
null
{'https://github.com/cisco/openh264/commit/519b0ff554e9713198bc3b3185da809be42be20c', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14027'}
{'https://github.com/cisco/openh264/commit/70eeb783515dbfee3e0c781d6667838caba5113b'}
OSS-Fuzz
OSV-2020-829
Heap-use-after-free in check_content_type_and_change_protocol
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23834 ``` Crash type: Heap-use-after-free READ 2 Crash state: check_content_type_and_change_protocol ndpi_check_http_tcp ndpi_search_http_tcp ```
null
2022-04-13T03:04:36.363405Z
2020-07-14T05:37:49.889652Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23834', 'https://github.com/ntop/nDPI/commit/d6a97219ea14f0eb4d7d0831d4aefc971878caae'}
{'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8'}
OSS-Fuzz
OSV-2020-254
Heap-buffer-overflow in pixReadFromTiffStream
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: pixReadFromTiffStream pixReadMemTiff pixReadMem ```
null
2022-04-13T03:04:32.633763Z
2020-06-26T00:00:11.669926Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654', 'https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c', 'https://github.com/DanBloomberg/leptonica/commit/8466a469b8c3a8d521f0fced041f8c5367eac21e'}
{'https://github.com/DanBloomberg/leptonica/commit/26425b91ea850552d11af0ead0557eb0a328785f'}
OSS-Fuzz
OSV-2017-41
Heap-buffer-overflow in OSS_FUZZ_png_combine_row
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3606 ``` Crash type: Heap-buffer-overflow WRITE 4 Crash state: OSS_FUZZ_png_combine_row OSS_FUZZ_png_read_row _start ```
null
2022-04-13T03:04:35.564255Z
2021-01-13T21:56:05.092063Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3606', 'https://github.com/glennrp/libpng/commit/a3d1057a735d923626f1f6bdc0f662a13d0cba6f'}
{'https://github.com/glennrp/libpng/commit/ab791fc9d69580c1982af726c9f61b533357234f'}
OSS-Fuzz
OSV-2020-604
UNKNOWN READ in Sass::Parser::parseCompoundSelector
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15904 ``` Crash type: UNKNOWN READ Crash state: Sass::Parser::parseCompoundSelector Sass::Parser::parseComplexSelector Sass::Parser::parseSelectorList ```
null
2022-04-13T03:04:38.493199Z
2020-07-01T00:00:19.975718Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15904', 'https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a'}
{'https://github.com/sass/libsass/commit/f964dcddd76f4c1f00da06bfd905be790618c33b'}
OSS-Fuzz
OSV-2021-1110
Stack-buffer-overflow in TranslateWord2
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36932 ``` Crash type: Stack-buffer-overflow WRITE 1 Crash state: TranslateWord2 TranslateClause SpeakNextClause ```
null
2022-04-13T03:04:34.189849Z
2021-08-08T00:02:17.026887Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36932'}
{'https://github.com/espeak-ng/espeak-ng/commit/0a713d52bbf3e061823d1a7f35e5303e7320f27a'}
OSS-Fuzz
OSV-2020-1272
Heap-buffer-overflow in ASN1_get_object
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13803 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: ASN1_get_object asn1_check_tlen asn1_item_ex_d2i ```
null
2022-04-13T03:04:38.807734Z
2020-07-22T21:50:02.220943Z
MEDIUM
null
null
{'https://github.com/libressl-portable/portable/commit/2f7827344a0234320c7ad8d2fc2418e9d8a586c9', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13803'}
{'https://github.com/libressl-portable/portable/commit/4ea2a01a0d2cc889e95316f51c7a36f8f158df44'}
OSS-Fuzz
OSV-2022-318
UNKNOWN READ
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46356 ``` Crash type: UNKNOWN READ Crash state: NULL```
null
2022-04-13T03:04:38.037322Z
2022-04-07T00:01:51.631058Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46356', 'https://github.com/libvips/libvips/commit/2dc319b1b1610e4c8ae95b8ca47b46926cd41ce1'}
{'https://github.com/libvips/libvips/commit/9228e50f46b79dc448b9416a5ae1dfdcfdfcf98c'}
OSS-Fuzz
OSV-2021-1540
Heap-buffer-overflow in consume_list
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40723 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: consume_list pn_amqp_decode_DqEoQBIoIe pn_message_decode ```
null
2022-04-13T03:04:36.938644Z
2021-11-06T00:01:33.530210Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40723', 'https://github.com/apache/qpid-proton/commit/b788baad3e9d9ba028d3d115e272e94a30227e17'}
{'https://github.com/apache/qpid-proton/commit/72c87537a136dbfc63a0c811d159631ecd0e3986'}
OSS-Fuzz
OSV-2018-212
Heap-buffer-overflow in token_stream_prepare
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9805 Crash type: Heap-buffer-overflow READ 1 Crash state: token_stream_prepare parse typedecl_parse
null
2021-06-23T06:25:21.922868Z
2021-01-13T00:01:26.134181Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9805', 'https://gitlab.gnome.org/GNOME/glib/commit/297941e049f819771f0ce0ba5623a6e60da9c208'}
{'https://gitlab.gnome.org/GNOME/glib/commit/10ee7301e8edb13e59143ee5653cd2b46e26c044'}
OSS-Fuzz
OSV-2021-1055
UNKNOWN WRITE in jxl::ModularFrameDecoder::DecodeGroup
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456 ``` Crash type: UNKNOWN WRITE Crash state: jxl::ModularFrameDecoder::DecodeGroup jxl::FrameDecoder::ProcessACGroup jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections ```
null
2022-04-13T03:30:05.347108Z
2021-07-25T00:00:32.621715Z
HIGH
null
null
{'https://github.com/libvips/libvips/commit/86466a9b9ab37c0f469d84797d477260aa669cfa', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456'}
{'https://github.com/libvips/libvips/commit/813a5f84cf94c9e7c0fe9b043c545500aef11411'}
OSS-Fuzz
OSV-2020-741
Heap-buffer-overflow in uri_decoder
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23815 Crash type: Heap-buffer-overflow READ 1 Crash state: uri_decoder uri_decode g_uri_parse_params
null
2021-03-09T04:49:06.051645Z
2020-07-04T00:00:01.437763Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23815', 'https://gitlab.gnome.org/GNOME/glib/commit/f9d165add1342ecae6cdde1b95e9ce63320768dd'}
{'https://gitlab.gnome.org/GNOME/glib/commit/44524b9daa622058e3e55617b9b0d4c986e3b8b3'}
OSS-Fuzz
OSV-2020-891
Heap-buffer-overflow in ccr_handle_message_from_client
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23965 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: ccr_handle_message_from_client cras_rclient_buffer_from_client rclient_message.cc ```
null
2022-04-13T03:04:42.581747Z
2020-07-21T00:00:05.825108Z
MEDIUM
null
null
{'https://chromium.googlesource.com/chromiumos/third_party/adhd/commit/1cfc1dc496821d3c5d8d160cc10941b25b9f95a0', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23965'}
{'https://chromium.googlesource.com/chromiumos/third_party/adhd/commit/144bf3828e41b26c7746be463d17d6ea55dd7163'}
OSS-Fuzz
OSV-2021-1686
Segv on unknown address in chunk_free_object
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42312 Crash type: Segv on unknown address Crash state: chunk_free_object file_close_file sclose
null
2021-12-14T00:00:38.296462Z
2021-12-14T00:00:38.296258Z
null
null
null
{'git://git.ghostscript.com/ghostpdl/commit/31e249d5cbd561d76dd2149ceee5fe3a2d84d658', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42312'}
{'git://git.ghostscript.com/ghostpdl/commit/6a4847cd2566e8446753fd0ba17fe2f42c6e0315'}
OSS-Fuzz
OSV-2021-891
Heap-buffer-overflow in __cil_cat_expr_range_to_bitmap_helper
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35492 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: __cil_cat_expr_range_to_bitmap_helper __cil_expr_to_bitmap __evaluate_cat_expression ```
null
2022-04-13T03:04:42.328918Z
2021-06-24T00:00:40.542962Z
MEDIUM
null
null
{'https://github.com/SELinuxProject/selinux/commit/8470058934e89d1876b8e034d1ea818bde62b994', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35492'}
{'https://github.com/SELinuxProject/selinux/commit/982ec302b67f3c7f8df667dadb67352b1e4a6d18'}
OSS-Fuzz
OSV-2020-468
Stack-buffer-overflow in ot::Ip6::Address::FromString
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14821 ``` Crash type: Stack-buffer-overflow WRITE 1 Crash state: ot::Ip6::Address::FromString ot::Cli::Coap::ProcessRequest ot::Cli::Interpreter::ProcessCoap ```
null
2022-04-13T03:04:38.893804Z
2020-07-01T00:00:11.286088Z
HIGH
null
null
{'https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14821'}
{'https://github.com/openthread/openthread/commit/1a4b249a9527c88ea2f573fea9fda39bb025b5b1'}
OSS-Fuzz
OSV-2018-72
Use-of-uninitialized-value in read_pbkdf2_params
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10143 ``` Crash type: Use-of-uninitialized-value Crash state: read_pbkdf2_params _gnutls_read_pkcs_schema_params pkcs8_key_decrypt ```
null
2022-04-13T03:04:35.613386Z
2021-01-13T00:00:34.744580Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10143', 'https://gitlab.com/gnutls/gnutls/commit/f6b4695ccafd6945cc7affda4ab9f7b9f9ed8616'}
{'https://gitlab.com/gnutls/gnutls/commit/344b2cc8f68cdde1744198034276d0e6720b1d19'}
OSS-Fuzz
OSV-2020-487
UNKNOWN READ in crc32
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15278 ``` Crash type: UNKNOWN READ Crash state: crc32 update_crc push_data_ready ```
null
2022-04-13T03:04:41.162898Z
2020-07-01T00:00:12.477818Z
MEDIUM
null
null
{'https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15278'}
{'https://github.com/libarchive/libarchive/commit/4bd12b6f40cb4413c8970c52f15f3b6885b5e32f'}
OSS-Fuzz
OSV-2021-1239
Heap-buffer-overflow in stbi__load_and_postprocess_8bit
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38394 ``` Crash type: Heap-buffer-overflow READ 2 Crash state: stbi__load_and_postprocess_8bit stb_image.h ```
null
2022-04-13T03:04:40.826791Z
2021-09-12T00:01:05.421369Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38394'}
{'https://github.com/nothings/stb/commit/8c15cc9c79bf6f180d74808657046caf2ec0b445'}
OSS-Fuzz
OSV-2021-487
UNKNOWN READ in blosc_run_decompression_with_context
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31611 ``` Crash type: UNKNOWN READ Crash state: blosc_run_decompression_with_context blosc2_decompress_ctx frame_decompress_chunk ```
null
2022-04-13T03:04:40.286519Z
2021-03-04T00:02:22.600849Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31611', 'https://github.com/Blosc/c-blosc2/commit/cf02dfc992ae5544c92f69befc7093aacf168e77'}
{'https://github.com/Blosc/c-blosc2/commit/861ba79f31393dec0a0782ca11cf32cebb6f6610'}
PyPI
PYSEC-2020-85
null
An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1 allows an attacker to craft a link to a Plone Site that, when followed, and possibly after login, will redirect to an attacker's site.
{'CVE-2020-7936'}
2020-01-24T21:32:00Z
2020-01-23T21:15:00Z
null
null
null
{'https://plone.org/security/hotfix/20200121', 'https://www.openwall.com/lists/oss-security/2020/01/22/1', 'https://plone.org/security/hotfix/20200121/an-open-redirection-on-the-login-form-and-possibly-other-places', 'http://www.openwall.com/lists/oss-security/2020/01/24/1'}
null
PyPI
GHSA-mq5c-prh3-3f3h
Invalid validation in `QuantizeAndDequantizeV2`
### Impact The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument: ```python import tensorflow as tf input_tensor = tf.constant([0.0], shape=[1], dtype=float) input_min = tf.constant(-10.0) input_max = tf.constant(-10.0) tf.raw_ops.QuantizeAndDequantizeV2( input=input_tensor, input_min=input_min, input_max=input_max, signed_input=False, num_bits=1, range_given=False, round_mode='HALF_TO_EVEN', narrow_range=False, axis=-2) ``` The [validation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74-L77) uses `||` to mix two different conditions: ```cc OP_REQUIRES(ctx, (axis_ == -1 || axis_ < input.shape().dims()), errors::InvalidArgument(...)); ``` If `axis_ < -1` the condition in `OP_REQUIRES` will still be true, but this value of `axis_` results in heap underflow. This allows attackers to read/write to other data on the heap. ### Patches We have patched the issue in GitHub commit [c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9](https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29610'}
2022-03-03T05:14:14.075606Z
2021-05-21T14:28:32Z
LOW
null
{'CWE-665'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h', 'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29610'}
null
PyPI
PYSEC-2021-171
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.SparseConcat`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b432a38fe0e1b4b904a6c222cbce794c39703e87/tensorflow/core/kernels/sparse_concat_op.cc#L76) takes the values specified in `shapes[0]` as dimensions for the output shape. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29534', 'GHSA-6j9c-grc6-5m6g'}
2021-08-27T03:22:27.421981Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g'}
null
PyPI
PYSEC-2021-521
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-cfx7-2xpc-8w4h', 'CVE-2021-29593'}
2021-12-09T06:34:57.775345Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h'}
null
PyPI
GHSA-5wv5-4vpf-pj6m
Unexpected memory usage in Pallets Project Flask
The Pallets Project Flask before 1.0 is affected by unexpected memory usage. The impact is denial of service. The attack vector is crafted encoded JSON data. The fixed version is 1. NOTE this may overlap CVE-2018-1000656.
{'CVE-2019-1010083'}
2022-03-03T05:14:18.976195Z
2019-07-19T16:12:46Z
HIGH
null
{'CWE-400'}
{'https://www.palletsprojects.com/blog/flask-1-0-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010083'}
null
PyPI
PYSEC-2014-20
null
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
{'CVE-2014-3730'}
2021-09-01T08:18:55.675902Z
2014-05-16T15:55:00Z
null
null
null
{'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html', 'http://www.openwall.com/lists/oss-security/2014/05/15/3', 'http://secunia.com/advisories/61281', 'http://ubuntu.com/usn/usn-2212-1', 'http://www.securityfocus.com/bid/67410', 'https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/', 'http://www.openwall.com/lists/oss-security/2014/05/14/10', 'http://www.debian.org/security/2014/dsa-2934'}
null
PyPI
PYSEC-2021-464
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a324ac84e573fba362a5e53d4e74d5de6729933e/tensorflow/core/kernels/quantized_reshape_op.cc#L38-L55) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly. However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29536', 'GHSA-2gfx-95x2-5v3x'}
2021-12-09T06:34:48.953620Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x', 'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'}
null
PyPI
PYSEC-2022-57
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-98j8-c9q4-r38g', 'CVE-2022-21733'}
2022-03-09T00:17:30.939427Z
2022-02-03T12:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161', 'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g'}
null
PyPI
PYSEC-2019-137
null
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
{'CVE-2019-16786', 'GHSA-g2xc-35jw-c63p'}
2020-02-25T17:15:00Z
2019-12-20T23:15:00Z
null
null
null
{'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}
null
PyPI
GHSA-qg48-85hg-mqc5
Division by 0 in `DenseCountSparseOutput`
### Impact An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`: ```python import tensorflow as tf values = tf.constant([], shape=[0, 0], dtype=tf.int64) weights = tf.constant([]) tf.raw_ops.DenseCountSparseOutput( values=values, weights=weights, minlength=-1, maxlength=58, binary_output=True) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kernels/count_ops.cc#L123-L127) computes a divisor value from user data but does not check that the result is 0 before doing the division: ```cc int num_batch_elements = 1; for (int i = 0; i < num_batch_dimensions; ++i) { num_batch_elements *= data.shape().dim_size(i); } int num_value_elements = data.shape().num_elements() / num_batch_elements; ``` Since `data` is given by the `values` argument, `num_batch_elements` is 0. ### Patches We have patched the issue in GitHub commit [da5ff2daf618591f64b2b62d9d9803951b945e9f](https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, and TensorFlow 2.3.3, as these are also affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29554'}
2022-03-03T05:14:16.368742Z
2021-05-21T14:23:55Z
LOW
null
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29554', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5', 'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'}
null
PyPI
GHSA-fvx8-v524-8579
Cleartext Storage of Sensitive Information
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
{'CVE-2020-17495'}
2022-03-03T05:13:08.031054Z
2021-06-04T21:46:52Z
HIGH
null
{'CWE-312'}
{'https://github.com/celery/django-celery-results/issues/142', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17495'}
null
PyPI
PYSEC-2018-8
null
io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter.
{'GHSA-8jxq-75rw-fhj9', 'CVE-2018-8097'}
2021-06-10T06:51:29.570871Z
2018-03-14T12:29:00Z
null
null
null
{'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/advisories/GHSA-8jxq-75rw-fhj9'}
null
PyPI
GHSA-3rcw-9p9x-582v
Code injection in `saved_model_cli`
### Impact TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it [calls `eval` on user supplied strings](https://github.com/tensorflow/tensorflow/blob/87462bfac761435a46641ff2f10ad0b6e5414a4b/tensorflow/python/tools/saved_model_cli.py#L524-L550) ```python def preprocess_input_exprs_arg_string(input_exprs_str): ... for input_raw in filter(bool, input_exprs_str.split(';')): ... input_key, expr = input_raw.split('=', 1) input_dict[input_key] = eval(expr) ... ``` This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users. ### Patches We have patched the issue in GitHub commit [8b202f08d52e8206af2bdb2112a62fafbc546ec7](https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Omer Kaspi from Vdoo.
{'CVE-2021-41228'}
2022-03-03T05:13:08.134086Z
2021-11-10T16:54:02Z
HIGH
null
{'CWE-78', 'CWE-94'}
{'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v', 'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41228'}
null
PyPI
PYSEC-2017-30
null
modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
{'CVE-2015-1839'}
2021-07-05T00:01:26.213768Z
2017-04-13T14:59:00Z
null
null
null
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175568.html', 'https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html', 'https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81', 'https://bugzilla.redhat.com/show_bug.cgi?id=1212788', 'https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c'}
null
PyPI
GHSA-p7xc-35m8-57pr
FedMsg not properly completing message validation
FedMsg 0.18.1 and older is vulnerable to a message validation flaw resulting in message validation not being enabled if configured to be on.
{'CVE-2017-1000001'}
2022-04-26T18:17:10.344041Z
2018-07-13T15:17:14Z
HIGH
null
{'CWE-20'}
{'https://github.com/fedora-infra/fedmsg/blob/0.18.2/CHANGELOG.rst', 'https://github.com/fedora-infra/fedmsg', 'https://github.com/advisories/GHSA-p7xc-35m8-57pr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000001'}
null
PyPI
PYSEC-2020-258
null
In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a malicious attacker can send a data point which contains a string instead of a tf.float16 value. Similar effects can be obtained by manipulating saved models and checkpoints whereby replacing a scalar tf.float16 value with a scalar string will trigger this issue due to automatic conversions. This can be easily reproduced by tf.constant("hello", tf.float16), if eager execution is enabled. This issue is patched in TensorFlow 1.15.1 and 2.0.1 with this vulnerability patched. TensorFlow 2.1.0 was released after we fixed the issue, thus it is not affected. Users are encouraged to switch to TensorFlow 1.15.1, 2.0.1 or 2.1.0.
{'GHSA-977j-xj7q-2jr9', 'CVE-2020-5215'}
2021-08-27T03:22:23.423115Z
2020-01-28T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-977j-xj7q-2jr9', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.0.1', 'https://github.com/tensorflow/tensorflow/releases/tag/v1.15.2'}
null
PyPI
PYSEC-2021-608
null
TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-2p25-55c9-h58q', 'CVE-2021-41198'}
2021-12-09T06:35:07.301547Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f', 'https://github.com/tensorflow/tensorflow/issues/46911', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q'}
null
PyPI
GHSA-fvq6-392h-6mjj
Out-of-bounds Read in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the function icvCvt_BGRA2BGR_8u_C4C3R when reading an image file by using cv::imread.
{'CVE-2017-12599'}
2022-03-03T05:14:01.003471Z
2021-10-12T22:01:08Z
HIGH
null
{'CWE-125'}
{'https://github.com/opencv/opencv-python/releases/tag/11', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://security.gentoo.org/glsa/201712-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12599', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/opencv/opencv-python/releases/tag/9', 'https://github.com/opencv/opencv/pull/9376', 'https://github.com/opencv/opencv-python'}
null
PyPI
PYSEC-2021-47
null
Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patched with fixes available in the following versions: v1.8.2, v1.7.4, v1.6.2. All these versions are available on pypi(https://pypi.org/project/pydantic/#history), and will be available on conda-forge(https://anaconda.org/conda-forge/pydantic) soon. See the changelog(https://pydantic-docs.helpmanual.io/) for details. If you absolutely can't upgrade, you can work around this risk using a validator(https://pydantic-docs.helpmanual.io/usage/validators/) to catch these values. This is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue at https://github.com/samuelcolvin/pydantic/issues requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic.
{'GHSA-5jqp-qgf6-3pvh', 'CVE-2021-29510'}
2021-05-13T19:15:00Z
2021-05-13T19:15:00Z
null
null
null
{'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468', 'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh'}
null
PyPI
GHSA-xv8x-pr4h-73jv
Memory corruption when returning a literal struct with a private call inside of it
### Impact When performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. ### Patches 0.3.0 / #2447 *
{'CVE-2021-41121'}
2022-03-03T05:13:29.096526Z
2021-10-12T15:59:29Z
HIGH
null
{'CWE-119'}
{'https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv', 'https://github.com/vyperlang/vyper/pull/2447', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41121', 'https://github.com/vyperlang/vyper'}
null
PyPI
PYSEC-2021-258
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately. We have patched the issue in GitHub commit d9204be9f49520cdaaeb2541d1dc5187b23f31d9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37636', 'GHSA-hp4c-x6r7-6555'}
2021-08-27T03:22:42.737707Z
2021-08-12T18:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555'}
null
PyPI
PYSEC-2014-77
null
Bottle 0.10.x before 0.10.12, 0.11.x before 0.11.7, and 0.12.x before 0.12.6 does not properly limit content types, which allows remote attackers to bypass intended access restrictions via an accepted Content-Type followed by a ; (semi-colon) and a Content-Type that would not be accepted, as demonstrated in YouCompleteMe to execute arbitrary code.
{'CVE-2014-3137'}
2021-08-27T03:21:56.361083Z
2014-10-25T22:55:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1093255', 'http://www.debian.org/security/2014/dsa-2948', 'https://github.com/defnull/bottle/issues/616', 'http://www.openwall.com/lists/oss-security/2014/05/01/15'}
null
PyPI
PYSEC-2021-576
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor. We have patched the issue in GitHub commit 6da6620efad397c85493b8f8667b821403516708. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-g25h-jr74-qp5j', 'CVE-2021-37663'}
2021-12-09T06:35:04.358938Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j', 'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'}
null
PyPI
PYSEC-2021-126
null
A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
{'CVE-2021-3533'}
2022-05-04T22:49:28.127460Z
2021-06-09T12:15:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1956477'}
null
PyPI
PYSEC-2018-54
null
helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL.
{'GHSA-894g-6j7q-2hx6', 'CVE-2018-16516'}
2021-07-15T02:22:14.431955Z
2018-09-05T14:29:00Z
null
null
null
{'https://github.com/advisories/GHSA-894g-6j7q-2hx6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIYCWIH3BRLI2QNC53CQXLKVP27X7EH/', 'https://github.com/flask-admin/flask-admin/pull/1699'}
null
PyPI
PYSEC-2020-126
null
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
{'GHSA-xmq7-7fxm-rr79', 'CVE-2020-15203'}
2020-10-29T16:15:00Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'}
null
PyPI
GHSA-xm2v-8rrw-w9pm
Division by 0 in `Conv2DBackpropInput`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`: ```python import tensorflow as tf input_tensor = tf.constant([52, 1, 1, 5], shape=[4], dtype=tf.int32) filter_tensor = tf.constant([], shape=[0, 1, 5, 0], dtype=tf.float32) out_backprop = tf.constant([], shape=[52, 1, 1, 0], dtype=tf.float32) tf.raw_ops.Conv2DBackpropInput(input_sizes=input_tensor, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1], use_cudnn_on_gpu=True, padding='SAME', explicit_paddings=[], data_format='NHWC', dilations=[1, 1, 1, 1]) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625-L655) does a division by a quantity that is controlled by the caller: ```cc const size_t size_A = output_image_size * dims.out_depth; const size_t size_B = filter_total_size * dims.out_depth; const size_t size_C = output_image_size * filter_total_size; const size_t work_unit_size = size_A + size_B + size_C; ... const size_t shard_size = use_parallel_contraction ? 1 : (target_working_set_size + work_unit_size - 1) / work_unit_size; ``` ### Patches We have patched the issue in GitHub commit [2be2cdf3a123e231b16f766aa0e27d56b4606535](https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29525'}
2022-03-03T05:14:18.787736Z
2021-05-21T14:21:51Z
LOW
null
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29525', 'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xm2v-8rrw-w9pm'}
null