ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
PyPI
PYSEC-2020-262
null
In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.
{'GHSA-cvcq-gmc3-q6m8', 'CVE-2020-17511'}
2021-11-16T03:58:43.269619Z
2020-12-14T10:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-cvcq-gmc3-q6m8', 'https://lists.apache.org/thread.html/ree782a29d927b96bf0b39fb92e2f1f09ea3112a985f7a08ce93765ac%40%3Cusers.airflow.apache.org%3E'}
null
PyPI
GHSA-59q2-x2qc-4c97
Heap OOB access in unicode ops
### Impact An attacker can access data outside of bounds of heap allocated array in `tf.raw_ops.UnicodeEncode`: ```python import tensorflow as tf input_values = tf.constant([58], shape=[1], dtype=tf.int32) input_splits = tf.constant([[81, 101, 0]], shape=[3], dtype=tf.int32) output_encoding = "UTF-8" tf.raw_ops.UnicodeEncode( input_values=input_values, input_splits=input_splits, output_encoding=output_encoding) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/472c1f12ad9063405737679d4f6bd43094e1d36d/tensorflow/core/kernels/unicode_ops.cc) assumes that the `input_value`/`input_splits` pair specify a valid sparse tensor. ### Patches We have patched the issue in GitHub commit [51300ba1cc2f487aefec6e6631fef03b0e08b298](https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29559'}
2022-03-03T05:13:35.130003Z
2021-05-21T14:24:54Z
LOW
null
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-59q2-x2qc-4c97', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29559'}
null
PyPI
PYSEC-2021-632
null
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `FusedBatchNorm` kernels is vulnerable to a heap OOB access. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41223', 'GHSA-f54p-f6jp-4rhr'}
2021-12-09T06:35:10.813181Z
2021-11-05T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr'}
null
PyPI
GHSA-4vrf-ff7v-hpgr
Division by zero in TFLite's implementation of `EmbeddingLookup`
The implementation of the `EmbeddingLookup` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74): ```cc const int row_size = SizeOfDimension(value, 0); const int row_bytes = value->bytes / row_size; ``` An attacker can craft a model such that the first dimension of the `value` input is 0. ### Patches We have patched the issue in GitHub commit [f61c57bd425878be108ec787f4d96390579fb83e](https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29596'}
2022-03-03T05:13:43.036660Z
2021-05-21T14:27:51Z
LOW
null
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29596', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'}
null
PyPI
PYSEC-2022-8
null
path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.
{'GHSA-pw3c-h7wp-cvhx', 'CVE-2022-22815'}
2022-01-24T23:48:19.580598Z
2022-01-10T14:12:00Z
null
null
null
{'https://github.com/advisories/GHSA-pw3c-h7wp-cvhx', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331'}
null
PyPI
PYSEC-2021-262
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.SparseReshape` can be made to trigger an integral division by 0 exception. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L176-L181) calls the reshaping functor whenever there is at least an index in the input but does not check that shape of the input or the target shape have both a non-zero number of elements. The [reshape functor](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L40-L78) blindly divides by the dimensions of the target shape. Hence, if this is not checked, code will result in a division by 0. We have patched the issue in GitHub commit 4923de56ec94fff7770df259ab7f2288a74feb41. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1 as this is the other affected version.
{'GHSA-95xm-g58g-3p88', 'CVE-2021-37640'}
2021-08-27T03:22:43.107664Z
2021-08-12T18:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-95xm-g58g-3p88', 'https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41'}
null
PyPI
PYSEC-2021-798
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation. Hence, an attacker can read arbitrary data from the heap by carefully crafting a model with negative values in `indices`. Similar issue exists in [`Gather` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather.cc). We have patched the issue in GitHub commits bb6a0383ed553c286f87ca88c207f6774d5c4a8f and eb921122119a6b6e470ee98b89e65d721663179d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-jwf9-w5xm-f437', 'CVE-2021-37687'}
2021-12-09T06:35:39.946066Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d', 'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f'}
null
PyPI
GHSA-x3v8-c8qx-3j3r
Null pointer exception in `DeserializeSparse`
### Impact The [shape inference code for `DeserializeSparse`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/sparse_ops.cc#L152-L168) can trigger a null pointer dereference: ```python import tensorflow as tf dataset = tf.data.Dataset.range(3) @tf.function def test(): y = tf.raw_ops.DeserializeSparse( serialized_sparse=tf.data.experimental.to_variant(dataset), dtype=tf.int32) test() ``` This is because the shape inference function assumes that the `serialize_sparse` tensor is a tensor with positive rank (and having `3` as the last dimension). However, in the example above, the argument is a scalar (i.e., rank 0). ### Patches We have patched the issue in GitHub commit [d3738dd70f1c9ceb547258cbb82d853da8771850](https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41215'}
2022-03-03T05:13:55.396022Z
2021-11-10T18:57:45Z
MODERATE
null
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r', 'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41215'}
null
PyPI
PYSEC-2021-777
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToVariant`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L129) has an incomplete validation of the splits values, missing the case when the argument would be empty. We have patched the issue in GitHub commit be7a4de6adfbd303ce08be4332554dff70362612. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37666', 'GHSA-w4xf-2pqw-5mq7'}
2021-12-09T06:35:38.080205Z
2021-08-12T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7'}
null
PyPI
PYSEC-2021-92
null
An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load.
{'CVE-2021-28676', 'GHSA-7r7m-5h27-29hp'}
2021-06-09T05:01:16.347355Z
2021-06-02T16:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-7r7m-5h27-29hp', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://github.com/python-pillow/Pillow/pull/5377'}
null
PyPI
PYSEC-2019-14
null
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
{'GHSA-v9qg-3j8p-r63v', 'CVE-2019-14235'}
2020-08-24T17:37:00Z
2019-08-02T15:15:00Z
null
null
null
{'https://seclists.org/bugtraq/2019/Aug/15', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://www.debian.org/security/2019/dsa-4498', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://security.gentoo.org/glsa/202004-17', 'https://github.com/advisories/GHSA-v9qg-3j8p-r63v', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}
null
PyPI
PYSEC-2021-327
null
Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack on an inefficient regular expression. The vulnerable regular expression is [here](https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359). The problem has been patched in release version 0.9.5.1. Users who are unable to upgrade are advised to remove `apprise/plugins/NotifyIFTTT.py` to eliminate the service.
{'CVE-2021-39229', 'GHSA-qhmp-h54x-38qr'}
2021-09-23T00:10:35.209283Z
2021-09-20T22:15:00Z
null
null
null
{'https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr', 'https://github.com/caronc/apprise/pull/436', 'https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359'}
null
PyPI
GHSA-jr2m-29wj-w9qc
SQL Injection in FreeTAKServer-UI
FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser.
{'CVE-2022-25506'}
2022-03-29T19:15:09.659924Z
2022-03-12T00:00:37Z
MODERATE
null
{'CWE-89'}
{'https://github.com/FreeTAKTeam/UI', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25506', 'https://github.com/FreeTAKTeam/UI/issues/27'}
null
PyPI
PYSEC-2020-327
null
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `output_data` buffer. This might result in a segmentation fault but it can also be used to further corrupt the memory and can be chained with other vulnerabilities to create more advanced exploits. The issue is patched in commit 204945b19e44b57906c9344c0d00120eeeae178a and is released in TensorFlow versions 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that the segment ids are all positive, although this only handles the case when the segment ids are stored statically in the model. A similar validation could be done if the segment ids are generated at runtime between inference steps. If the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
{'GHSA-hx2x-85gr-wrpq', 'CVE-2020-15212'}
2021-12-09T06:35:15.513160Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx2x-85gr-wrpq', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}
null
PyPI
PYSEC-2019-224
null
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent.
{'CVE-2018-7576'}
2021-08-27T03:22:22.321158Z
2019-04-23T21:29:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-002.md'}
null
PyPI
GHSA-28mg-98xm-q493
Open Redirect in archivy
archivy prior to version 1.7.1 is vulnerable to open redirect.
{'CVE-2022-0697'}
2022-04-05T00:15:24.394396Z
2022-03-08T00:00:32Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0697', 'https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b', 'https://github.com/archivy/archivy/releases/tag/v1.7.1', 'https://github.com/pypa/advisory-database/tree/main/vulns/archivy/PYSEC-2022-161.yaml', 'https://github.com/archivy/archivy', 'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'}
null
PyPI
PYSEC-2020-46
null
In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.
{'CVE-2020-11078', 'GHSA-gg84-qgv9-w4pq'}
2020-08-19T18:56:00Z
2020-05-20T16:15:00Z
null
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZJ3D6JSM7CFZESZZKGUW2VX55BOSOXI/', 'https://lists.apache.org/thread.html/rad8872fc99f670958c2774e2bf84ee32a3a0562a0c787465cf3dfa23@%3Cissues.beam.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00000.html', 'https://lists.apache.org/thread.html/r4d35dac106fab979f0db75a07fc4e320ad848b722103e79667ff99e1@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc9eff9572946142b657c900fe63ea4bbd3535911e8d4ce4d08fe4b89@%3Ccommits.allura.apache.org%3E', 'https://lists.apache.org/thread.html/r69a462e690b5f2c3d418a288a2c98ae764d58587bd0b5d6ab141f25f@%3Cissues.beam.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXCX2AWROGWGY5GXR7VN3BKF34A2FO6J/', 'https://lists.apache.org/thread.html/r23711190c2e98152cb6f216b95090d5eeb978543bb7e0bad22ce47fc@%3Cissues.beam.apache.org%3E', 'https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e', 'https://github.com/httplib2/httplib2/security/advisories/GHSA-gg84-qgv9-w4pq', 'https://lists.apache.org/thread.html/r7f364000066748299b331b615ba51c62f55ab5b201ddce9a22d98202@%3Cissues.beam.apache.org%3E'}
null
PyPI
PYSEC-2021-448
null
TensorFlow is an end-to-end open source platform for machine learning. Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/4814fafb0ca6b5ab58a09411523b2193fed23fed/tensorflow/core/kernels/conv_grad_shape_utils.cc#L94-L153) assumes that the `input`, `filter_sizes` and `out_backprop` tensors have the same shape, as they are accessed in parallel. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29520', 'GHSA-wcv5-qrj6-9pfm'}
2021-12-09T06:34:46.522398Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-qrj6-9pfm', 'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197'}
null
PyPI
GHSA-247x-2f9f-5wp7
Stack overflow in TensorFlow
### Impact The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`: ``` library { function { signature { name: "SomeOp" description: "Self recursive op" } node_def { name: "1" op: "SomeOp" } node_def { name: "2" op: "SomeOp" } } } ``` This would result in a stack overflow during execution as resolving each `NodeDef` means resolving the function itself and its nodes. ### Patches We have patched the issue in GitHub commit [448a16182065bd08a202d9057dd8ca541e67996c](https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23591'}
2022-03-03T05:14:16.294002Z
2022-02-09T23:30:01Z
HIGH
null
{'CWE-400'}
{'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7', 'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23591'}
null
PyPI
PYSEC-2022-154
null
Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering a `StatusOr` value that is an error and forcibly extracting the value from it. We have patched the issue in multiple GitHub commits and these will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, as both are affected.
{'CVE-2022-23590', 'GHSA-pqrv-8r2f-7278'}
2022-03-09T00:18:29.813618Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L560-L567', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pqrv-8r2f-7278'}
null
PyPI
PYSEC-2016-31
null
MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using the "page creation" approach, related to a "Cross Site Scripting (XSS)" issue affecting the action=AttachFile (via page name) component.
{'CVE-2016-7148'}
2021-08-27T03:22:07.805432Z
2016-11-10T17:59:00Z
null
null
null
{'http://www.debian.org/security/2016/dsa-3715', 'https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html', 'http://www.securityfocus.com/bid/94259', 'http://www.ubuntu.com/usn/USN-3137-1'}
null
PyPI
GHSA-2m34-jcjv-45xf
XSS in Django
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
{'CVE-2020-13596'}
2022-03-03T05:12:52.418816Z
2020-06-05T16:24:28Z
MODERATE
null
{'CWE-79'}
{'https://github.com/django/django', 'https://security.netapp.com/advisory/ntap-20200611-0002/', 'https://www.djangoproject.com/weblog/2020/jun/03/security-releases/', 'https://docs.djangoproject.com/en/3.0/releases/security/', 'https://www.debian.org/security/2020/dsa-4705', 'https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://usn.ubuntu.com/4381-2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13596', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://usn.ubuntu.com/4381-1/'}
null
PyPI
PYSEC-2022-94
null
Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the function, without allowing for the memory free to occur. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-fq6p-6334-8gr4', 'CVE-2022-23585'}
2022-03-09T00:17:35.562344Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416', 'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4'}
null
PyPI
PYSEC-2008-9
null
Multiple unspecified vulnerabilities in Roundup before 1.4.4 have unknown impact and attack vectors, some of which may be related to cross-site scripting (XSS).
{'CVE-2008-1474'}
2021-08-27T03:22:19.598501Z
2008-03-24T22:44:00Z
null
null
null
{'http://roundup.cvs.sourceforge.net/roundup/roundup/CHANGES.txt?revision=1.939&view=markup', 'http://www.debian.org/security/2008/dsa-1554', 'http://secunia.com/advisories/29375', 'https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html', 'http://www.vupen.com/english/advisories/2008/0891', 'https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html', 'http://secunia.com/advisories/29848', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/41241', 'http://secunia.com/advisories/29336', 'http://security.gentoo.org/glsa/glsa-200805-21.xml', 'https://bugzilla.redhat.com/show_bug.cgi?id=436546', 'http://secunia.com/advisories/30274', 'http://www.securityfocus.com/bid/28239'}
null
PyPI
PYSEC-2021-274
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.BoostedTreesCreateEnsemble` can result in a use after free error if an attacker supplies specially crafted arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/boosted_trees/resource_ops.cc#L55) uses a reference counted resource and decrements the refcount if the initialization fails, as it should. However, when the code was written, the resource was represented as a naked pointer but later refactoring has changed it to be a smart pointer. Thus, when the pointer leaves the scope, a subsequent `free`-ing of the resource occurs, but this fails to take into account that the refcount has already reached 0, thus the resource has been already freed. During this double-free process, members of the resource object are accessed for cleanup but they are invalid as the entire resource has been freed. We have patched the issue in GitHub commit 5ecec9c6fbdbc6be03295685190a45e7eee726ab. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37652', 'GHSA-m7fm-4jfh-jrg6'}
2021-08-27T03:22:44.162996Z
2021-08-12T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6'}
null
PyPI
PYSEC-2021-624
null
TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `DeserializeSparse` can trigger a null pointer dereference. This is because the shape inference function assumes that the `serialize_sparse` tensor is a tensor with positive rank (and having `3` as the last dimension). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-x3v8-c8qx-3j3r', 'CVE-2021-41215'}
2021-12-09T06:35:09.664583Z
2021-11-05T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r', 'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'}
null
PyPI
PYSEC-2020-274
null
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments. Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1."
{'CVE-2020-15194', 'GHSA-9mqp-7v2h-2382'}
2021-12-09T06:34:41.172167Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382'}
null
PyPI
GHSA-p6h9-gw49-rqm4
Moderate severity vulnerability that affects markdown2
An issue was discovered in markdown2 (aka python-markdown2) through 2.3.5. The safe_mode feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final '>' character from an IMG tag.
{'CVE-2018-5773'}
2022-03-03T05:12:38.617059Z
2018-07-12T20:29:21Z
MODERATE
null
{'CWE-79'}
{'https://github.com/trentm/python-markdown2/issues/285', 'https://github.com/trentm/python-markdown2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5773', 'https://github.com/advisories/GHSA-p6h9-gw49-rqm4'}
null
PyPI
GHSA-qrmm-w4v4-q7f8
Unauthorized access through URL manipulation
### Impact The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. ### Patches The vulnerability has been patched in version 1.2.65 of the `master` branch, version 1.1.113 of the 1.1.x series, and version 1.0.12 of the `stable` branch. The Docker image on docker.io has been patched. ### Workarounds If upgrading is not possible, manually apply the changes of https://github.com/jhpyle/docassemble/commit/e3dbf6ce054b3c0310996f0657289f5eed0a73fe and restart the server (e.g., by pressing Save on the Configuration screen). ### Credit The vulnerability was discovered by Jim Platania of Seiso LLC (@jimmio). ### For more information If you have any questions or comments about this advisory: * Open an issue in [docassemble](https://github.com/jhpyle/docassemble/issues) * Join the [Slack channel](https://join.slack.com/t/docassemble/shared_invite/zt-ohrn8y9z-_Fb3RAl~JPBU6Km7odBPfQ) * Email us at [jhpyle@gmail.com](mailto:jhpyle@gmail.com)
null
2022-03-03T05:13:13.076883Z
2021-05-06T15:27:22Z
HIGH
null
{'CWE-552'}
{'https://github.com/jhpyle/docassemble/security/advisories/GHSA-qrmm-w4v4-q7f8'}
null
PyPI
PYSEC-2019-232
null
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow before 1.7.1, could result in a crash or read from other parts of process memory.
{'CVE-2018-7577'}
2021-12-09T06:35:11.800944Z
2019-04-24T17:29:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-005.md'}
null
PyPI
PYSEC-2015-21
null
validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
{'CVE-2015-5145'}
2021-07-15T02:22:09.798596Z
2015-07-14T17:59:00Z
null
null
null
{'http://www.securitytracker.com/id/1032820', 'https://www.djangoproject.com/weblog/2015/jul/08/security-releases/', 'http://www.securityfocus.com/bid/75691', 'https://security.gentoo.org/glsa/201510-06'}
null
PyPI
PYSEC-2020-331
null
In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is patched in eccb7ec454e6617738554a255d77f08e60ee0808 and TensorFlow 2.4.0 will be released containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
{'GHSA-xwhf-g6j5-j5gc', 'CVE-2020-15266'}
2021-12-09T06:35:15.790944Z
2020-10-21T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/issues/42129', 'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc'}
null
PyPI
GHSA-v52p-hfjf-wg88
Division by zero in TFLite's implementation of `SpaceToBatchNd`
### Impact The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83): ```cc TF_LITE_ENSURE_EQ(context, final_dim_size % block_shape[dim], 0); output_size->data[dim + 1] = final_dim_size / block_shape[dim]; ``` An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. ### Patches We have patched the issue in GitHub commit [6d36ba65577006affb272335b7c1abd829010708](https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29597'}
2022-03-03T05:12:47.220689Z
2021-05-21T14:27:54Z
LOW
null
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29597', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88', 'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'}
null
PyPI
PYSEC-2021-331
null
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
{'CVE-2021-34552', 'GHSA-7534-mm45-c74v'}
2021-09-23T00:11:05.797411Z
2021-07-13T17:15:00Z
null
null
null
{'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://github.com/advisories/GHSA-7534-mm45-c74v', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow'}
null
PyPI
PYSEC-2021-84
null
Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document.
{'GHSA-hm2h-f456-6j88', 'CVE-2021-33512'}
2021-06-02T03:48:11.504291Z
2021-05-21T22:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-hm2h-f456-6j88', 'https://plone.org/security/hotfix/20210518/stored-xss-from-file-upload-svg-html', 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}
null
PyPI
PYSEC-2021-761
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/to_tf_record_op.cc#L93-L102) assumes that all records in the dataset are of string type. However, there is no check for that, and the example given above uses numeric types. We have patched the issue in GitHub commit e0b6e58c328059829c3eb968136f17aa72b6c876. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37650', 'GHSA-f8h4-7rgh-q2gm'}
2021-12-09T06:35:36.648389Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm', 'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'}
null
PyPI
PYSEC-2022-103
null
Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-fpcp-9h7m-ffpx', 'CVE-2022-23595'}
2022-03-09T00:17:36.537526Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104'}
null
PyPI
GHSA-2ccw-7px8-vmpf
Open Redirect in Flask-AppBuilder
Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder)
{'CVE-2022-24776'}
2022-04-07T00:15:32.741611Z
2022-03-25T19:27:39Z
MODERATE
null
{'CWE-601'}
{'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea', 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.4.5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24776', 'https://github.com/dpgaspar/Flask-AppBuilder', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-2ccw-7px8-vmpf'}
null
PyPI
GHSA-cg54-gpgr-4rm6
user-readable api tokens in systemd units for JupyterHub
### Impact user API tokens issued to single-user servers are specified in the environment of systemd units, which are accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. ### Patches Patched in jupyterhub-systemdspawner v0.15 ### Workarounds No workaround other than upgrading systemdspawner to 0.15 ### For more information If you have any questions or comments about this advisory: * Open a thread in [the Jupyter forum](https://discourse.jupyter.org) * Email us at [security@ipython.org](mailto:security@ipython.org)
{'CVE-2020-26261'}
2022-03-03T05:12:51.750152Z
2020-12-09T16:27:43Z
HIGH
null
{'CWE-668'}
{'https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26261', 'https://github.com/jupyterhub/systemdspawner/security/advisories/GHSA-cg54-gpgr-4rm6', 'https://github.com/jupyterhub/systemdspawner/blob/master/CHANGELOG.md#v015', 'https://pypi.org/project/jupyterhub-systemdspawner/'}
null
PyPI
PYSEC-2018-97
null
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
{'GHSA-6528-wvf6-f6qg', 'CVE-2018-6594'}
2021-08-27T03:22:16.704345Z
2018-02-03T15:29:00Z
null
null
null
{'https://github.com/dlitz/pycrypto/issues/253', 'https://github.com/TElgamal/attack-on-pycrypto-elgamal', 'https://security.gentoo.org/glsa/202007-62', 'https://github.com/advisories/GHSA-6528-wvf6-f6qg', 'https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html', 'https://usn.ubuntu.com/3616-1/', 'https://usn.ubuntu.com/3616-2/'}
null
PyPI
PYSEC-2020-11
null
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
{'GHSA-923p-fr2c-g5m2', 'CVE-2020-1739'}
2020-05-29T14:09:00Z
2020-03-12T18:15:00Z
null
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739', 'https://github.com/advisories/GHSA-923p-fr2c-g5m2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/', 'https://github.com/ansible/ansible/issues/67797'}
null
PyPI
PYSEC-2016-9
null
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
{'GHSA-w4vg-rf63-f3j3', 'CVE-2016-9190'}
2021-07-05T00:01:24.189764Z
2016-11-04T10:59:00Z
null
null
null
{'https://github.com/python-pillow/Pillow/issues/2105', 'http://www.securityfocus.com/bid/94234', 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'https://security.gentoo.org/glsa/201612-52', 'http://www.debian.org/security/2016/dsa-3710', 'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af', 'https://github.com/advisories/GHSA-w4vg-rf63-f3j3'}
null
PyPI
PYSEC-2010-18
null
Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.9.x before 1.9.3 allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) action/SlideShow.py, (2) action/anywikidraw.py, and (3) action/language_setup.py, a similar issue to CVE-2010-2487.
{'CVE-2010-2970'}
2021-07-16T01:31:23.812033Z
2010-08-05T13:22:00Z
null
null
null
{'http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg', 'http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES', 'http://marc.info/?l=oss-security&m=127809682420259&w=2', 'http://www.vupen.com/english/advisories/2010/1981', 'http://www.securityfocus.com/bid/40549', 'http://hg.moinmo.in/moin/1.9/rev/e50b087c4572', 'http://marc.info/?l=oss-security&m=127799369406968&w=2', 'http://moinmo.in/SecurityFixes', 'http://moinmo.in/MoinMoinRelease1.9', 'http://hg.moinmo.in/moin/1.9/rev/4fe9951788cb', 'http://secunia.com/advisories/40836', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809', 'http://www.debian.org/security/2010/dsa-2083'}
null
PyPI
PYSEC-2021-809
null
TensorFlow is an open source platform for machine learning. In affeced versions during execution, `EinsumHelper::ParseEquation()` is supposed to set the flags in `input_has_ellipsis` vector and `*output_has_ellipsis` boolean to indicate whether there is ellipsis in the corresponding inputs and output. However, the code only changes these flags to `true` and never assigns `false`. This results in unitialized variable access if callers assume that `EinsumHelper::ParseEquation()` always sets these flags. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41201', 'GHSA-j86v-p27c-73fm'}
2021-12-09T06:35:41.402625Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm', 'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6'}
null
PyPI
PYSEC-2018-78
null
uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
{'CVE-2018-7490'}
2021-08-25T04:30:36.296302Z
2018-02-26T22:29:00Z
null
null
null
{'https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.17.html', 'https://www.debian.org/security/2018/dsa-4142', 'https://www.exploit-db.com/exploits/44223/'}
null
PyPI
GHSA-32w7-9whp-cjp9
High severity vulnerability that affects tryton
The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
{'CVE-2018-19443'}
2021-08-31T20:33:23Z
2018-11-29T21:30:56Z
MODERATE
null
{'CWE-384'}
{'https://discuss.tryton.org/t/security-release-for-issue7792/830', 'https://github.com/advisories/GHSA-32w7-9whp-cjp9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19443', 'https://bugs.tryton.org/issue7792'}
null
PyPI
GHSA-qj5r-f9mv-rffh
`CHECK`-fails when building invalid tensor shapes in Tensorflow
### Impact Multiple operations in TensorFlow can be used to trigger a denial of service via `CHECK`-fails (i.e., assertion failures). This is similar to [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and has similar fixes. ### Patches We have patched the reported issues in multiple GitHub commits. It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-23569'}
2022-03-03T05:13:36.275609Z
2022-02-09T23:38:56Z
MODERATE
null
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23569', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qj5r-f9mv-rffh'}
null
PyPI
GHSA-4jh2-3c85-q67h
Improper Privilege Management in apache-airflow
In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for.
{'CVE-2021-45230'}
2022-03-03T05:12:55.739393Z
2022-01-28T21:55:34Z
MODERATE
null
{'CWE-269'}
{'https://lists.apache.org/thread/m778ojn0k595rwco4ht9wjql89mjoxnl', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45230'}
null
PyPI
GHSA-8pmx-p244-g88h
Interpreter crash from `tf.io.decode_raw`
### Impact The implementation of `tf.io.decode_raw` produces incorrect results and crashes the Python interpreter when combining `fixed_length` and wider datatypes. ```python import tensorflow as tf tf.io.decode_raw(tf.constant(["1","2","3","4"]), tf.uint16, fixed_length=4) ``` The [implementation of the padded version](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc) is buggy due to a confusion about pointer arithmetic rules. First, the code [computes](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L61) the width of each output element by dividing the `fixed_length` value to the size of the type argument: ```cc int width = fixed_length / sizeof(T); ``` The `fixed_length` argument is also used to determine the [size needed for the output tensor](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L63-L79): ```cc TensorShape out_shape = input.shape(); out_shape.AddDim(width); Tensor* output_tensor = nullptr; OP_REQUIRES_OK(context, context->allocate_output("output", out_shape, &output_tensor)); auto out = output_tensor->flat_inner_dims<T>(); T* out_data = out.data(); memset(out_data, 0, fixed_length * flat_in.size()); ``` This is followed by [reencoding code](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L85-L94): ```cc for (int64 i = 0; i < flat_in.size(); ++i) { const T* in_data = reinterpret_cast<const T*>(flat_in(i).data()); if (flat_in(i).size() > fixed_length) { memcpy(out_data, in_data, fixed_length); } else { memcpy(out_data, in_data, flat_in(i).size()); } out_data += fixed_length; } ``` The erroneous code is the last line above: it is moving the `out_data` pointer by `fixed_length * sizeof(T)` bytes whereas it only copied at most `fixed_length` bytes from the input. This results in parts of the input not being decoded into the output. Furthermore, because the pointer advance is far wider than desired, this quickly leads to writing to outside the bounds of the backing data. This OOB write leads to interpreter crash in the reproducer mentioned here, but more severe attacks can be mounted too, given that this gadget allows writing to periodically placed locations in memory. ### Patches We have patched the issue in GitHub commit [698e01511f62a3c185754db78ebce0eee1f0184d](https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-29614'}
2022-04-26T18:17:02.885921Z
2021-05-21T14:28:42Z
HIGH
null
{'CWE-787', 'CWE-665'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8pmx-p244-g88h', 'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29614'}
null
PyPI
GHSA-fxmx-pfm2-85m2
Cross-site Scripting in Ericsson CodeChecker
In Ericsson CodeChecker prior to 6.18.2, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.
{'CVE-2021-44217'}
2022-03-03T05:13:28.302927Z
2022-01-21T23:32:32Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Ericsson/codechecker', 'https://github.com/Ericsson/codechecker/releases/tag/v6.18.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44217', 'https://codechecker-demo.eastus.cloudapp.azure.com/', 'https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png', 'https://github.com/Ericsson/codechecker/pull/3549', 'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1', 'https://github.com/Hyperkopite/CVE-2021-44217/blob/main/README.md'}
null
PyPI
GHSA-m4hf-j54p-p353
Type confusion leading to segfault in Tensorflow
### Impact The [implementation of shape inference for `ConcatV2`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059) can be used to trigger a denial of service attack via a segfault caused by a type confusion: ```python import tensorflow as tf @tf.function def test(): y = tf.raw_ops.ConcatV2( values=[[1,2,3],[4,5,6]], axis = 0xb500005b) return y test() ``` The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `min_rank` is computed based on `concat_dim`. This is then used to validate that the `values` tensor has at least the required rank: ```cc int64_t concat_dim; if (concat_dim_t->dtype() == DT_INT32) { concat_dim = static_cast<int64_t>(concat_dim_t->flat<int32>()(0)); } else { concat_dim = concat_dim_t->flat<int64_t>()(0); } // Minimum required number of dimensions. const int min_rank = concat_dim < 0 ? -concat_dim : concat_dim + 1; // ... ShapeHandle input = c->input(end_value_index - 1); TF_RETURN_IF_ERROR(c->WithRankAtLeast(input, min_rank, &input)); ``` However, [`WithRankAtLeast`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358) receives the lower bound as a 64-bits value and then compares it against the maximum 32-bits integer value that could be represented: ```cc Status InferenceContext::WithRankAtLeast(ShapeHandle shape, int64_t rank, ShapeHandle* out) { if (rank > kint32max) { return errors::InvalidArgument("Rank cannot exceed kint32max"); } // ... } ``` Due to the fact that `min_rank` is a 32-bits value and the value of `axis`, the `rank` argument is a [negative value](https://godbolt.org/z/Gcr5haMob), so the error check is bypassed. ### Patches We have patched the issue in GitHub commit [08d7b00c0a5a20926363849f611729f53f3ec022](https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
{'CVE-2022-21731'}
2022-03-03T05:13:25.254801Z
2022-02-10T00:19:50Z
MODERATE
null
{'CWE-843', 'CWE-754'}
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21731', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059', 'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022', 'https://github.com/tensorflow/tensorflow/'}
null
PyPI
PYSEC-2020-223
null
In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ password, and access to connection information including the plaintext password for the current connection. It would also be possible to run arbitrary methods on the database connection object for the Presto or Hive connection, allowing the user to bypass security controls internal to Superset. This vulnerability is present in every Apache Superset version < 0.37.2.
{'CVE-2020-13952', 'GHSA-77pw-c3j2-5fc8'}
2021-08-27T03:21:55.668622Z
2020-09-30T21:15:00Z
null
null
null
{'https://lists.apache.org/thread.html/rf1faa368f580d2cb691576bee1277855f769667f3114d5df1dacbea6%40%3Cdev.superset.apache.org%3E', 'https://github.com/advisories/GHSA-77pw-c3j2-5fc8'}
null
PyPI
PYSEC-2021-673
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc#L176-L189) assumes the inputs are not empty. If any of these inputs is empty, `.flat<T>()` is an empty buffer, so accessing the element at index 0 is accessing data outside of bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-4fg4-p75j-w5xj', 'CVE-2021-29547'}
2021-12-09T06:35:22.966902Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'}
null
PyPI
PYSEC-2021-389
null
TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-m539-j985-hcr8', 'CVE-2021-41196'}
2021-11-13T06:52:41.665281Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8'}
null
PyPI
PYSEC-2021-223
null
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling implementations in TFLite fail to check that the stride arguments are not 0 before calling `ComputePaddingHeightWidth`(https://github.com/tensorflow/tensorflow/blob/3f24ccd932546416ec906a02ddd183b48a1d2c83/tensorflow/lite/kernels/pooling.cc#L90). Since users can craft special models which will have `params->stride_{height,width}` be zero, this will result in a division by zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29586', 'GHSA-26j7-6w8w-7922'}
2021-08-27T03:22:36.699869Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-26j7-6w8w-7922'}
null
PyPI
PYSEC-2021-736
null
TensorFlow is an end-to-end open source platform for machine learning. The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:. The validation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74-L77) uses `||` to mix two different conditions. If `axis_ < -1` the condition in `OP_REQUIRES` will still be true, but this value of `axis_` results in heap underflow. This allows attackers to read/write to other data on the heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-mq5c-prh3-3f3h', 'CVE-2021-29610'}
2021-12-09T06:35:33.722327Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h', 'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'}
null
PyPI
GHSA-894g-6j7q-2hx6
Cross site scripting in flask-admin
helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL.
{'CVE-2018-16516'}
2022-03-26T01:00:11.052935Z
2018-12-19T19:23:52Z
MODERATE
null
{'CWE-79'}
{'https://github.com/flask-admin/flask-admin', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16516', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIYCWIH3BRLI2QNC53CQXLKVP27X7EH/', 'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1', 'https://github.com/flask-admin/flask-admin/pull/1699', 'https://github.com/advisories/GHSA-894g-6j7q-2hx6', 'https://github.com/flask-admin/flask-admin/releases/tag/v1.5.3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/'}
null
PyPI
PYSEC-2021-366
null
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0.
{'CVE-2021-41122', 'GHSA-c7pr-343r-5c46'}
2021-10-11T01:16:43.215640Z
2021-10-05T23:15:00Z
null
null
null
{'https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46', 'https://github.com/vyperlang/vyper/pull/2447'}
null
PyPI
GHSA-hvr8-466p-75rh
Integer overflow discovered in Pillow
Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.
{'CVE-2016-4009'}
2022-04-26T18:33:06.960690Z
2018-07-24T20:15:48Z
CRITICAL
null
{'CWE-119'}
{'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e', 'https://github.com/python-pillow/Pillow/pull/1714', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://security.gentoo.org/glsa/201612-52', 'http://www.securityfocus.com/bid/86064', 'https://github.com/python-pillow/Pillow', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4009', 'https://github.com/advisories/GHSA-hvr8-466p-75rh'}
null
PyPI
GHSA-pvrc-hg3f-58r6
Heap OOB access in `Dilation2DBackpropInput`
### Impact An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`: ```python import tensorflow as tf input_tensor = tf.constant([1.1] * 81, shape=[3, 3, 3, 3], dtype=tf.float32) filter = tf.constant([], shape=[0, 0, 3], dtype=tf.float32) out_backprop = tf.constant([1.1] * 1062, shape=[3, 2, 59, 3], dtype=tf.float32) tf.raw_ops.Dilation2DBackpropInput( input=input_tensor, filter=filter, out_backprop=out_backprop, strides=[1, 40, 1, 1], rates=[1, 56, 56, 1], padding='VALID') ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4a63a573d/tensorflow/core/kernels/dilation_ops.cc#L321-L322) does not validate before writing to the output array. ```cc in_backprop(b, h_in_max, w_in_max, d) += out_backprop(b, h_out, w_out, d); ``` The values for `h_out` and `w_out` are guaranteed to be in range for `out_backprop` (as they are loop indices bounded by the size of the array). However, there are no similar guarantees relating `h_in_max`/`w_in_max` and `in_backprop`. ### Patches We have patched the issue in GitHub commit [3f6fe4dfef6f57e768260b48166c27d148f3015f](https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29566'}
2022-03-03T05:12:48.377376Z
2021-05-21T14:25:13Z
LOW
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29566', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'}
null
PyPI
PYSEC-2019-212
null
Python Twisted 14.0 trustRoot is not respected in HTTP client
{'GHSA-3c45-wgjp-7v9r', 'CVE-2014-7143'}
2021-08-27T03:22:49.575116Z
2019-11-12T14:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-3c45-wgjp-7v9r', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96135', 'https://security-tracker.debian.org/tracker/CVE-2014-7143', 'http://www.openwall.com/lists/oss-security/2014/09/22/2', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-7143'}
null
PyPI
PYSEC-2020-311
null
In Tensorflow version 2.3.0, the `SparseCountSparseOutput` and `RaggedCountSparseOutput` implementations don't validate that the `weights` tensor has the same shape as the data. The check exists for `DenseCountSparseOutput`, where both tensors are fully specified. In the sparse and ragged count weights are still accessed in parallel with the data. But, since there is no validation, a user passing fewer weights than the values for the tensors can generate a read from outside the bounds of the heap buffer allocated for the weights. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1.
{'GHSA-pg59-2f92-5cph', 'CVE-2020-15196'}
2021-12-09T06:35:12.960487Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pg59-2f92-5cph'}
null
PyPI
PYSEC-2011-7
null
Multiple SQL injection vulnerabilities in the get_userinfo method in the MySQLAuthHandler class in DAVServer/mysqlauth.py in PyWebDAV before 0.9.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) pw argument. NOTE: some of these details are obtained from third party information.
{'CVE-2011-0432'}
2021-07-05T00:01:25.487912Z
2011-03-14T19:55:00Z
null
null
null
{'http://www.debian.org/security/2011/dsa-2177', 'http://pywebdav.googlecode.com/files/PyWebDAV-0.9.4.1.tar.gz', 'http://code.google.com/p/pywebdav/updates/list', 'http://secunia.com/advisories/43703', 'http://www.vupen.com/english/advisories/2011/0553', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055444.html', 'http://secunia.com/advisories/43571', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055412.html', 'http://secunia.com/advisories/43602', 'https://bugzilla.redhat.com/show_bug.cgi?id=677718', 'http://www.vupen.com/english/advisories/2011/0634', 'http://www.vupen.com/english/advisories/2011/0554', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055413.html', 'http://www.securityfocus.com/bid/46655'}
null
PyPI
PYSEC-2019-22
null
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
{'CVE-2019-10195'}
2020-02-05T00:15:00Z
2019-11-27T08:15:00Z
null
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/', 'https://www.freeipa.org/page/Releases/4.8.3', 'https://access.redhat.com/errata/RHBA-2019:4268', 'https://www.freeipa.org/page/Releases/4.6.7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/', 'https://www.freeipa.org/page/Releases/4.7.4', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195', 'https://access.redhat.com/errata/RHSA-2020:0378'}
null
PyPI
PYSEC-2021-311
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/compiler/mlir/lite/transforms/optimize.cc#L67-L70) unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements. We have patched the issue in GitHub commit d6b57f461b39fd1aa8c1b870f1b974aac3554955. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-wf5p-c75w-w3wh', 'CVE-2021-37689'}
2021-08-27T03:22:47.601647Z
2021-08-12T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh'}
null
PyPI
GHSA-9x52-887g-fhc2
Out of bounds read in Tensorflow
### Impact The [TFG dialect of TensorFlow (MLIR)](https://github.com/tensorflow/tensorflow/tree/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/ir/importexport) makes several assumptions about the incoming `GraphDef` before converting it to the MLIR-based dialect. If an attacker changes the `SavedModel` format on disk to invalidate these assumptions and the `GraphDef` is then converted to MLIR-based IR then they can cause a crash in the Python interpreter. Under certain scenarios, heap OOB read/writes are possible. These issues have been discovered via fuzzing and it is possible that more weaknesses exist. We will patch them as they are discovered. ### Patches We have patched the issue in multiple GitHub commits and these will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, as both are affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23594'}
2022-02-11T19:56:20Z
2022-02-09T23:32:41Z
HIGH
null
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23594', 'https://github.com/tensorflow/tensorflow/tree/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/ir/importexport', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9x52-887g-fhc2'}
null
PyPI
PYSEC-2018-4
null
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.
{'CVE-2018-6188', 'GHSA-rf4j-j272-fj86'}
2021-06-16T00:03:23.096188Z
2018-02-05T03:29:00Z
null
null
null
{'https://www.djangoproject.com/weblog/2018/feb/01/security-releases/', 'http://www.securitytracker.com/id/1040422', 'https://usn.ubuntu.com/3559-1/', 'https://github.com/advisories/GHSA-rf4j-j272-fj86'}
null
PyPI
PYSEC-2021-741
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `ParseAttrValue`(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/framework/attr_value_util.cc#L397-L453) can be tricked into stack overflow due to recursion by giving in a specially crafted input. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-qw5h-7f53-xrp6', 'CVE-2021-29615'}
2021-12-09T06:35:34.555865Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qw5h-7f53-xrp6', 'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1'}
null
PyPI
GHSA-vwcg-7xqw-qcxw
Heap Overflow in PyMiniRacer
A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption. More details on https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/.
{'CVE-2020-25489'}
2022-03-03T05:12:42.509418Z
2020-09-18T18:03:59Z
MODERATE
null
{'CWE-119'}
{'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d', 'https://github.com/sqreen/PyMiniRacer/compare/v0.2.0...v0.3.0', 'https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25489', 'https://github.com/sqreen/PyMiniRacer/security/advisories/GHSA-vwcg-7xqw-qcxw'}
null
PyPI
GHSA-68wv-rjrm-576p
Low severity vulnerability that affects apache-airflow
In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow.
{'CVE-2017-17835'}
2022-03-03T05:13:05.913048Z
2019-01-25T16:19:14Z
HIGH
null
{'CWE-352'}
{'https://github.com/advisories/GHSA-68wv-rjrm-576p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17835', 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}
null
PyPI
PYSEC-2021-254
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via `CHECK`-fail in `tf.strings.substr` with invalid arguments. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29617', 'GHSA-mmq6-q8r3-48fm'}
2021-08-27T03:22:42.200654Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mmq6-q8r3-48fm', 'https://github.com/tensorflow/issues/46900', 'https://github.com/tensorflow/issues/46974', 'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f'}
null
PyPI
GHSA-x7gm-rfgv-w973
Potential DoS with NumberFilter conversion to integer values.
### Impact Automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. ### Patches Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50 to the form field used by `NumberFilter` instances. In addition, `NumberFilter` implements the new `get_max_validator()` which should return a configured validator instance to customise the limit, or else `None` to disable the additional validation. ### Workarounds Users may manually apply an equivalent validator if they are not able to upgrade. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the django-filter repo](https://github.com/carltongibson/django-filter) Thanks to Marcin Waraksa for the report.
{'CVE-2020-15225'}
2022-03-03T05:14:04.602145Z
2020-09-28T19:05:29Z
HIGH
null
{'CWE-681'}
{'https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973', 'https://pypi.org/project/django-filter/', 'https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b', 'https://github.com/carltongibson/django-filter/releases/tag/2.4.0', 'https://security.netapp.com/advisory/ntap-20210604-0010/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAT2ZAEF6DM3VFSOHKB7X3ASSHGQHJAK/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15225', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPHENTRHRAYFXYPPBT7JRHZRWILRY44S/', 'https://github.com/carltongibson/django-filter'}
null
PyPI
GHSA-3m93-m4q6-mc6v
Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
{'CVE-2019-14864'}
2022-04-25T23:46:52.658702Z
2020-02-26T19:54:31Z
MODERATE
null
{'CWE-532'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://github.com/ansible/ansible/pull/64748', 'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e', 'https://github.com/ansible/ansible/pull/64273', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864', 'https://github.com/ansible/ansible/pull/63527', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html', 'https://github.com/ansible/ansible/issues/63522', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14864', 'https://github.com/ansible/ansible/pull/64274', 'https://www.debian.org/security/2021/dsa-4950'}
null
PyPI
PYSEC-2021-604
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projection.cc#L118). We have patched the issue in GitHub commit 0575b640091680cfb70f4dd93e70658de43b94f9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick thiscommit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37691', 'GHSA-27qf-jwm8-g7f3'}
2021-12-09T06:35:06.759272Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3'}
null
PyPI
PYSEC-2020-254
null
In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to default initialize the quantized floating point types in Eigen. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
{'GHSA-qhxx-j73r-qpm2', 'CVE-2020-26266'}
2021-08-27T03:22:22.698179Z
2020-12-10T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhxx-j73r-qpm2'}
null
PyPI
GHSA-6f84-42vf-ppwp
Division by 0 in `QuantizedMul`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`: ```python import tensorflow as tf x = tf.zeros([4, 1], dtype=tf.quint8) y = tf.constant([], dtype=tf.quint8) min_x = tf.constant(0.0) max_x = tf.constant(0.0010000000474974513) min_y = tf.constant(0.0) max_y = tf.constant(0.0010000000474974513) tf.raw_ops.QuantizedMul(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55900e961ed4a23b438392024912154a2c2f5e85/tensorflow/core/kernels/quantized_mul_op.cc#L188-L198) does a division by a quantity that is controlled by the caller: ```cc template <class T, class Toutput> void VectorTensorMultiply(const T* vector_data, int32 vector_offset, int64 vector_num_elements, const T* tensor_data, int32 tensor_offset, int64 tensor_num_elements, Toutput* output) { for (int i = 0; i < tensor_num_elements; ++i) { const int64 vector_i = i % vector_num_elements; ... } } ``` ### Patches We have patched the issue in GitHub commit [a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6](https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29528'}
2022-03-03T05:13:53.881160Z
2021-05-21T14:22:02Z
LOW
null
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29528', 'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp'}
null
PyPI
PYSEC-2017-103
null
An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for SleekXMPP up to 1.3.1 and Slixmpp all versions up to 1.2.3, as bundled in poezio (0.8 - 0.10) and other products.
{'CVE-2017-5591'}
2021-12-14T08:19:29.328413Z
2017-02-09T20:59:00Z
null
null
null
{'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf', 'https://github.com/poezio/slixmpp/commit/22664ee7b86c8e010f312b66d12590fb47160ad8', 'http://openwall.com/lists/oss-security/2017/02/09/29', 'http://www.securityfocus.com/bid/96166', 'https://rt-solutions.de/en/2017/02/CVE-2017-5589_xmpp_carbons/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5591', 'https://pypi.org/project/sleekxmpp'}
null
PyPI
GHSA-f5g8-5qq7-938w
Out-of-bounds Read
In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.
{'CVE-2020-35653'}
2022-04-25T23:46:55.516826Z
2021-03-18T19:55:41Z
HIGH
null
{'CWE-125'}
{'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/', 'https://github.com/python-pillow/Pillow', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35653'}
null
PyPI
GHSA-fv3h-8x5j-pvgq
XSS in python-markdown2
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
{'CVE-2020-11888'}
2022-03-22T19:01:54.493660Z
2020-04-22T20:59:50Z
MODERATE
null
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00035.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQLRBGRVRRZK7P5SFL2MNGXFX37YHJAV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XOAIRJJCZNJUALXDHSIGH5PS2H63A3J/', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00031.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN6QSHRFZXRQAYZJQ4MOW5MKIXBYOMED/', 'https://github.com/trentm/python-markdown2/issues/348', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11888'}
null
PyPI
PYSEC-2016-11
null
model/modelstorage.py in trytond 3.2.x before 3.2.10, 3.4.x before 3.4.8, 3.6.x before 3.6.5, and 3.8.x before 3.8.1 allows remote authenticated users to bypass intended access restrictions and write to arbitrary fields via a sequence of records.
{'CVE-2015-0861'}
2021-07-05T00:01:27.588881Z
2016-04-13T15:59:00Z
null
null
null
{'http://www.debian.org/security/2015/dsa-3425', 'http://www.tryton.org/posts/security-release-for-issue5167.html', 'https://bugs.tryton.org/issue5167'}
null
PyPI
PYSEC-2021-487
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can access data outside of bounds of heap allocated array in `tf.raw_ops.UnicodeEncode`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/472c1f12ad9063405737679d4f6bd43094e1d36d/tensorflow/core/kernels/unicode_ops.cc) assumes that the `input_value`/`input_splits` pair specify a valid sparse tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29559', 'GHSA-59q2-x2qc-4c97'}
2021-12-09T06:34:52.523360Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-59q2-x2qc-4c97'}
null
PyPI
PYSEC-2020-89
null
Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking.
{'CVE-2020-7940'}
2020-01-24T22:52:00Z
2020-01-23T21:15:00Z
null
null
null
{'https://plone.org/security/hotfix/20200121', 'https://www.openwall.com/lists/oss-security/2020/01/22/1', 'http://www.openwall.com/lists/oss-security/2020/01/24/1', 'https://plone.org/security/hotfix/20200121/password-strength-checks-were-not-always-checked'}
null
PyPI
GHSA-cvpc-8phh-8f45
Out of bounds access in tensorflow-lite
### Impact In TensorFlow Lite, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor:https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/kernel_util.cc#L36 However, some operators can have some tensors be optional. To handle this scenario, the flatbuffer model uses a negative `-1` value as index for these tensors: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/c/common.h#L82 This results in special casing during validation at model loading time: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/core/subgraph.cc#L566-L580 Unfortunately, this means that the `-1` index is a valid tensor index for any operator, including those that don't expect optional inputs and including for output tensors. Thus, this allows writing and reading from outside the bounds of heap allocated arrays, although only at a specific offset from the start of these arrays. This results in both read and write gadgets, albeit very limited in scope. ### Patches We have patched the issue in several commits (46d5b0852, 00302787b7, e11f5558, cd31fd0ce, 1970c21, and fff2c83). We will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### Workarounds A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that only operators which accept optional inputs use the `-1` special value and only for the tensors that they expect to be optional. Since this allow-list type approach is erro-prone, we advise upgrading to the patched code. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15211'}
2022-03-03T05:13:25.109992Z
2020-09-25T18:28:49Z
MODERATE
null
{'CWE-787', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15211', 'https://github.com/tensorflow/tensorflow/commit/fff2c8326280c07733828f990548979bdc893859', 'https://github.com/tensorflow/tensorflow/commit/46d5b0852528ddfd614ded79bccc75589f801bd9', 'https://github.com/tensorflow/tensorflow/commit/cd31fd0ce0449a9e0f83dcad08d6ed7f1d6bef3f', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45', 'https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35', 'https://github.com/tensorflow/tensorflow/commit/e11f55585f614645b360563072ffeb5c3eeff162', 'https://github.com/tensorflow/tensorflow/commit/00302787b788c5ff04cb6f62aed5a74d936e86c0', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}
null
PyPI
PYSEC-2020-66
null
MISP MISP-maltego 1.4.4 incorrectly shares a MISP connection across users in a remote-transform use case.
{'CVE-2020-12889'}
2020-05-19T13:38:00Z
2020-05-15T18:15:00Z
null
null
null
{'https://github.com/MISP/MISP-maltego/commit/3ccde66dab4096ab5663e69f352992cc73e1160b'}
null
PyPI
PYSEC-2021-468
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L495-L497) computes the size of the filter tensor but does not validate that it matches the number of elements in `filter_sizes`. Later, when reading/writing to this buffer, code uses the value computed here, instead of the number of elements in the tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-xgc3-m89p-vr3x', 'CVE-2021-29540'}
2021-12-09T06:34:49.596439Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xgc3-m89p-vr3x', 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'}
null
PyPI
PYSEC-2021-192
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.FusedBatchNorm`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/828f346274841fa7505f7020e88ca36c22e557ab/tensorflow/core/kernels/fused_batch_norm_op.cc#L295-L297) performs a division based on the last dimension of the `x` tensor. Since this is controlled by the user, an attacker can trigger a denial of service. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29555', 'GHSA-r35g-4525-29fq'}
2021-08-27T03:22:31.200110Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq', 'https://github.com/tensorflow/tensorflow/commit/1a2a87229d1d61e23a39373777c056161eb4084d'}
null
PyPI
PYSEC-2022-174
null
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.
{'CVE-2022-22941'}
2022-03-29T18:37:44.070893Z
2022-03-29T17:15:00Z
null
null
null
{'https://saltproject.io/security_announcements/salt-security-advisory-release/,', 'https://github.com/saltstack/salt/releases,', 'https://repo.saltproject.io/'}
null
PyPI
PYSEC-2021-716
null
TensorFlow is an end-to-end open source platform for machine learning. The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because the broadcasting implementation(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/maximum_minimum.h#L52-L56) indexes in both tensors with the same index but does not validate that the index is within bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-24x6-8c7m-hv3f', 'CVE-2021-29590'}
2021-12-09T06:35:30.403366Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x6-8c7m-hv3f', 'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578'}
null
PyPI
PYSEC-2011-15
null
Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422.
{'CVE-2011-1949', 'GHSA-h6hq-c896-w882'}
2021-07-25T23:34:43.166940Z
2011-06-06T19:55:00Z
null
null
null
{'http://osvdb.org/72728', 'http://secunia.com/advisories/44775', 'http://www.securityfocus.com/archive/1/518155/100/0/threaded', 'http://securityreason.com/securityalert/8269', 'http://www.securityfocus.com/bid/48005', 'https://github.com/advisories/GHSA-h6hq-c896-w882', 'http://secunia.com/advisories/44776', 'http://plone.org/products/plone/security/advisories/CVE-2011-1949', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67694'}
null
PyPI
PYSEC-2013-28
null
Directory traversal vulnerability in the client in Tryton 3.0.0, as distributed before 20131104 and earlier, allows remote servers to write arbitrary files via path separators in the extension of a report.
{'CVE-2013-4510'}
2021-07-25T23:34:56.639990Z
2013-11-18T02:55:00Z
null
null
null
{'http://www.tryton.org/posts/security-release-for-issue3446.html', 'http://www.openwall.com/lists/oss-security/2013/11/04/21', 'http://www.debian.org/security/2013/dsa-2791', 'http://hg.tryton.org/tryton/rev/357d0a4d9cb8', 'https://bugs.tryton.org/issue3446'}
null
PyPI
PYSEC-2021-346
null
An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper behaviour of the given minion software.
{'CVE-2021-22004'}
2022-03-28T17:35:08.412287Z
2021-09-08T15:15:00Z
null
null
null
{'https://saltproject.io/security_announcements/salt-security-advisory-2021-sep-02/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBAHHSGZLEJRCG4DX6J4RBWJAAWH55RQ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVT7M4YLZRLWWQ6SGRK3C6TOF4FXOXT/'}
null
PyPI
GHSA-v6r6-84gr-92rm
Heap buffer overflow in `AvgPool3DGrad`
### Impact The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow: ```python import tensorflow as tf orig_input_shape = tf.constant([10, 6, 3, 7, 7], shape=[5], dtype=tf.int32) grad = tf.constant([0.01, 0, 0], shape=[3, 1, 1, 1, 1], dtype=tf.float32) ksize = [1, 1, 1, 1, 1] strides = [1, 1, 1, 1, 1] padding = "SAME" tf.raw_ops.AvgPool3DGrad( orig_input_shape=orig_input_shape, grad=grad, ksize=ksize, strides=strides, padding=padding) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) assumes that the `orig_input_shape` and `grad` tensors have similar first and last dimensions but does not check that this assumption is validated. ### Patches We have patched the issue in GitHub commit [6fc9141f42f6a72180ecd24021c3e6b36165fe0d](https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29577'}
2022-03-03T05:11:42.423697Z
2021-05-21T14:26:18Z
LOW
null
{'CWE-787', 'CWE-119'}
{'https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29577', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v6r6-84gr-92rm'}
null
PyPI
GHSA-69q2-p9xp-739v
XML Injection in petl
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
{'CVE-2020-29128'}
2022-03-22T22:32:01.161329Z
2021-04-20T16:32:08Z
CRITICAL
null
{'CWE-91'}
{'https://github.com/petl-developers/petl/pull/527', 'https://github.com/petl-developers/petl/issues/526', 'https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29128', 'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8', 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347', 'https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8', 'https://petl.readthedocs.io/en/stable/changes.html', 'https://github.com/petl-developers/petl'}
null
PyPI
PYSEC-2017-84
null
An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team.
{'CVE-2017-16613'}
2021-08-25T04:30:33.081491Z
2017-11-21T13:29:00Z
null
null
null
{'https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298', 'https://bugs.launchpad.net/swift/+bug/1655781', 'https://www.debian.org/security/2017/dsa-4044', 'http://www.securityfocus.com/bid/101926', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882314'}
null
PyPI
PYSEC-2020-203
null
The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4657.
{'CVE-2014-4678'}
2021-07-02T02:41:33.286907Z
2020-02-20T03:15:00Z
null
null
null
{'https://www.openwall.com/lists/oss-security/2014/06/26/30', 'https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2c493ac8-205e-11e5-a4a5-002590263bf5', 'https://security-tracker.debian.org/tracker/CVE-2014-4678', 'https://github.com/ansible/ansible/commit/5429b85b9f6c2e640074176f36ff05fd5e4d1916', 'https://www.openwall.com/lists/oss-security/2014/07/02/2', 'https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q93ThkY9rIJ', 'https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-4678'}
null
PyPI
PYSEC-2021-653
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L259) does a division by a quantity that is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-x4g7-fvjj-prg8', 'CVE-2021-29527'}
2021-12-09T06:35:19.411969Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4g7-fvjj-prg8', 'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b'}
null
PyPI
PYSEC-2021-203
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4a63a573d/tensorflow/core/kernels/dilation_ops.cc#L321-L322) does not validate before writing to the output array. The values for `h_out` and `w_out` are guaranteed to be in range for `out_backprop` (as they are loop indices bounded by the size of the array). However, there are no similar guarantees relating `h_in_max`/`w_in_max` and `in_backprop`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-pvrc-hg3f-58r6', 'CVE-2021-29566'}
2021-08-27T03:22:33.149908Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'}
null
PyPI
GHSA-6cm4-gm85-972c
Command Injection in Cobbler
An issue was discovered in Cobbler through 3.3.0. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.)
{'CVE-2021-45082'}
2022-03-29T22:31:56.848872Z
2022-02-20T00:00:35Z
HIGH
null
{'CWE-77'}
{'https://bugzilla.suse.com/show_bug.cgi?id=1193678', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.1', 'https://github.com/cobbler/cobbler/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45082', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/', 'https://github.com/cobbler/cobbler/pull/2945', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/', 'https://github.com/cobbler/cobbler', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/'}
null
PyPI
PYSEC-2021-829
null
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SplitV` can trigger a segfault is an attacker supplies negative arguments. This occurs whenever `size_splits` contains more than one value and at least one value is negative. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-cpf4-wx82-gxp6', 'CVE-2021-41222'}
2021-12-09T06:35:44.467539Z
2021-11-05T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6'}
null
PyPI
GHSA-hmg3-c7xj-6qwm
Heap buffer overflow in `SparseTensorToCSRSparseMatrix`
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in converting sparse tensors to CSR Sparse matrices: ```python import tensorflow as tf import numpy as np from tensorflow.python.ops.linalg.sparse import sparse_csr_matrix_ops indices_array = np.array([[0, 0]]) value_array = np.array([0.0], dtype=np.float32) dense_shape = [0, 0] st = tf.SparseTensor(indices_array, value_array, dense_shape) values_tensor = sparse_csr_matrix_ops.sparse_tensor_to_csr_sparse_matrix( st.indices, st.values, st.dense_shape) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/800346f2c03a27e182dd4fba48295f65e7790739/tensorflow/core/kernels/sparse/kernels.cc#L66) does a double redirection to access an element of an array allocated on the heap: ```cc csr_row_ptr(indices(i, 0) + 1) += 1; ``` If the value at `indices(i, 0)` is such that `indices(i, 0) + 1` is outside the bounds of `csr_row_ptr`, this results in writing outside of bounds of heap allocated data. ### Patches We have patched the issue in GitHub commit [1e922ccdf6bf46a3a52641f99fd47d54c1decd13](https://github.com/tensorflow/tensorflow/commit/1e922ccdf6bf46a3a52641f99fd47d54c1decd13). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29545'}
2022-03-03T05:14:12.303446Z
2021-05-21T14:23:25Z
LOW
null
{'CWE-131'}
{'https://github.com/tensorflow/tensorflow/commit/1e922ccdf6bf46a3a52641f99fd47d54c1decd13', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hmg3-c7xj-6qwm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29545'}
null