ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
PyPI | PYSEC-2018-58 | null | An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed. | {'CVE-2016-8647', 'GHSA-x4cm-m36h-c6qj'} | 2021-07-25T23:34:24.709864Z | 2018-07-26T14:29:00Z | null | null | null | {'https://access.redhat.com/errata/RHSA-2017:1685', 'https://github.com/advisories/GHSA-x4cm-m36h-c6qj', 'https://github.com/ansible/ansible-modules-core/pull/5388', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647'} | null |
PyPI | PYSEC-2019-183 | null | Koji through 1.18.0 allows remote Directory Traversal, with resultant Privilege Escalation. | {'CVE-2019-17109'} | 2021-08-27T03:22:05.900614Z | 2019-10-09T22:15:00Z | null | null | null | {'https://docs.pagure.org/koji/CVE-2019-17109/', 'https://pagure.io/koji/commits/master', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BGUXMZIAQFFNNQ7PEFDAYQCXXKJR76U/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DEQYYGWLJBQQVTAC7E7XSDGVF27NPMPB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PSCCFHLNVFLDPC7DB4UJGXD6ZWBSY57/', 'http://www.openwall.com/lists/oss-security/2019/10/09/5'} | null |
PyPI | PYSEC-2022-123 | null | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version. | {'GHSA-98p5-x8x4-c9m5', 'CVE-2022-23559'} | 2022-03-09T00:18:25.518342Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4', 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043', 'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01'} | null |
PyPI | GHSA-hjfx-8p6c-g7gx | Insufficient Verification of Data Authenticity in Pillow | An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data. | {'CVE-2021-28678'} | 2022-03-03T05:12:01.145169Z | 2021-06-08T18:49:20Z | MODERATE | null | {'CWE-345'} | {'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/pull/5377/commits/496245aa4365d0827390bd0b6fbd11287453b3a1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28678', 'https://github.com/python-pillow/Pillow/pull/5377'} | null |
PyPI | PYSEC-2021-595 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions all TFLite operations that use quantization can be made to use unitialized values. [For example](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/depthwise_conv.cc#L198-L200). The issue stems from the fact that `quantization.params` is only valid if `quantization.type` is different that `kTfLiteNoQuantization`. However, these checks are missing in large parts of the code. We have patched the issue in GitHub commits 537bc7c723439b9194a358f64d871dd326c18887, 4a91f2069f7145aab6ba2d8cfe41be8a110c18a5 and 8933b8a21280696ab119b63263babdb54c298538. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37682', 'GHSA-4c4g-crqm-xrxw'} | 2021-12-09T06:35:05.976648Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw', 'https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538', 'https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5'} | null |
PyPI | PYSEC-2014-94 | null | PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | {'CVE-2013-6444'} | 2021-08-27T03:22:18.708966Z | 2014-05-05T17:06:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1044246', 'http://seclists.org/oss-sec/2013/q4/524', 'http://www.securityfocus.com/bid/64544', 'http://sourceforge.net/p/pywbem/mailman/message/31757312/', 'http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html', 'http://sourceforge.net/p/pywbem/code/627/'} | null |
PyPI | PYSEC-2020-5 | null | A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'. | {'GHSA-g4mq-6fp5-qwcf', 'CVE-2020-1733'} | 2020-06-13T04:15:00Z | 2020-03-11T19:15:00Z | null | null | null | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://github.com/ansible/ansible/issues/67791', 'https://github.com/advisories/GHSA-g4mq-6fp5-qwcf', 'https://security.gentoo.org/glsa/202006-11'} | null |
PyPI | GHSA-47wv-vhj2-g66m | Use of insecure temporary file in Horovod | ### Impact
The insecure `tempfile.mktemp()` is used when Horovod is run in an LSF job with `jsrun`. In that situation, a jsrun rank file is created with `mktemp`, which could be hijacked by another process to read or manipulate the content.
This issue does not impact the use of MPI, Gloo, Spark or Ray.
### Patches
The problem has been fixed in [b96ecae4](https://github.com/horovod/horovod/commit/b96ecae4dc69fc0a83c7c2d3f1dde600c20a1b41).
### Workarounds
The rank file is not created when `binding_args` are provided in the `Settings` instance.
### References
Please see https://github.com/horovod/horovod/pull/3358 for details.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/horovod/horovod](https://github.com/horovod/horovod/issues/new/choose) | {'CVE-2022-0315'} | 2022-04-05T00:15:26.847759Z | 2022-03-29T19:18:32Z | HIGH | null | {'CWE-668', 'CWE-377'} | {'https://github.com/horovod/horovod', 'https://huntr.dev/bounties/7e50397b-dd63-4bb5-b56d-704094a7da45', 'https://github.com/advisories/GHSA-47wv-vhj2-g66m', 'https://github.com/horovod/horovod/pull/3358', 'https://github.com/horovod/horovod/commit/b96ecae4dc69fc0a83c7c2d3f1dde600c20a1b41', 'https://github.com/pypa/advisory-database/tree/main/vulns/horovod/PYSEC-2022-175.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0315', 'https://github.com/horovod/horovod/security/advisories/GHSA-47wv-vhj2-g66m'} | null |
PyPI | GHSA-8cxv-76p7-jxwr | Null-dereference in Tensorflow | ### Impact
The [implementation of `GetInitOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61) is vulnerable to a crash caused by dereferencing a null pointer:
```cc
const auto& init_op_sig_it =
meta_graph_def.signature_def().find(kSavedModelInitOpSignatureKey);
if (init_op_sig_it != sig_def_map.end()) {
*init_op_name = init_op_sig_it->second.outputs()
.find(kSavedModelInitOpSignatureKey)
->second.name();
return Status::OK();
}
```
Here, we have a nested map and we assume that if the first `.find` succeeds then so would be the search in the internal map. However, the maps are built based on the `SavedModel` protobuf format and a malicious user can alter that on disk before loading to cause the second `.find` to return `nullptr`.
### Patches
We have patched the issue in GitHub commit [4f38b1ac8e42727e18a2f0bde06d3bee8e77b250](https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23577'} | 2022-03-03T05:12:44.907686Z | 2022-02-10T00:32:29Z | MODERATE | null | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23577', 'https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8cxv-76p7-jxwr', 'https://github.com/tensorflow/tensorflow/'} | null |
PyPI | PYSEC-2020-31 | null | An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. | {'CVE-2020-13254', 'GHSA-wpjr-j57x-wxfw'} | 2021-01-20T15:15:00Z | 2020-06-03T14:15:00Z | null | null | null | {'https://security.netapp.com/advisory/ntap-20200611-0002/', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html', 'https://github.com/advisories/GHSA-wpjr-j57x-wxfw', 'https://www.djangoproject.com/weblog/2020/jun/03/security-releases/', 'https://docs.djangoproject.com/en/3.0/releases/security/', 'https://www.debian.org/security/2020/dsa-4705', 'https://usn.ubuntu.com/4381-2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://usn.ubuntu.com/4381-1/'} | null |
PyPI | PYSEC-2021-350 | null | In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped. | {'GHSA-5pcx-vqjp-p34w', 'CVE-2021-25963'} | 2021-09-30T10:32:36.636402Z | 2021-09-30T08:15:00Z | null | null | null | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963', 'https://github.com/shuup/shuup/commit/75714c37e32796eb7cbb0d977af5bcaa26573588', 'https://github.com/advisories/GHSA-5pcx-vqjp-p34w'} | null |
PyPI | PYSEC-2021-700 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPool3DGradGrad` exhibits undefined behavior by dereferencing null pointers backing attacker-supplied empty tensors. The implementation(https://github.com/tensorflow/tensorflow/blob/72fe792967e7fd25234342068806707bbc116618/tensorflow/core/kernels/pooling_ops_3d.cc#L679-L703) fails to validate that the 3 tensor inputs are not empty. If any of them is empty, then accessing the elements in the tensor results in dereferencing a null pointer. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-828x-qc2p-wprq', 'CVE-2021-29574'} | 2021-12-09T06:35:27.544548Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828x-qc2p-wprq'} | null |
PyPI | GHSA-vx6v-xg64-pmr8 | Cross-site Scripting in django-helpdesk | django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3945'} | 2022-03-03T05:13:26.671191Z | 2021-11-15T23:12:41Z | HIGH | null | {'CWE-79'} | {'https://github.com/django-helpdesk/django-helpdesk', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3945', 'https://github.com/django-helpdesk/django-helpdesk/commit/2c7065e0c4296e0c692fb4a7ee19c7357583af30', 'https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4'} | null |
PyPI | PYSEC-2021-215 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalAvgPoolGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/dcba796a28364d6d7f003f6fe733d82726dda713/tensorflow/core/kernels/fractional_avg_pool_op.cc#L216) fails to validate that the pooling sequence arguments have enough elements as required by the `out_backprop` tensor shape. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29578', 'GHSA-6f89-8j54-29xf'} | 2021-08-27T03:22:35.223640Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f89-8j54-29xf', 'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f'} | null |
PyPI | PYSEC-2021-645 | null | TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op.cc#L114-L116) is tricked to consider a tensor of type `tstring` which in fact contains integral elements. Fixing the type confusion by preventing mixing `DT_STRING` and `DT_INT64` types solves this issue. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-772j-h9xw-ffp5', 'CVE-2021-29519'} | 2021-12-09T06:35:18.174701Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772j-h9xw-ffp5'} | null |
PyPI | PYSEC-2020-215 | null | Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5. | {'GHSA-c7vm-f5p4-8fqh', 'CVE-2020-26215'} | 2021-08-11T11:14:19.531087Z | 2020-11-18T22:15:00Z | null | null | null | {'https://github.com/jupyter/notebook/commit/3cec4bbe21756de9f0c4bccf18cf61d840314d74', 'https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00004.html'} | null |
PyPI | PYSEC-2017-92 | null | Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file. | {'CVE-2016-3076'} | 2021-08-27T03:22:10.292415Z | 2017-04-24T18:59:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1321929', 'http://www.securityfocus.com/bid/98042', 'http://pillow.readthedocs.io/en/4.1.x/releasenotes/3.1.2.html'} | null |
PyPI | PYSEC-2010-3 | null | The default configuration of cfg.packagepages_actions_excluded in MoinMoin before 1.8.7 does not prevent unsafe package actions, which has unspecified impact and attack vectors. | {'CVE-2010-0717'} | 2021-07-05T00:01:22.874295Z | 2010-02-26T19:30:00Z | null | null | null | {'https://exchange.xforce.ibmcloud.com/vulnerabilities/56595', 'http://moinmo.in/MoinMoinRelease1.8', 'http://hg.moinmo.in/moin/1.8/raw-file/1.8.7/docs/CHANGES', 'http://www.debian.org/security/2010/dsa-2014', 'http://www.openwall.com/lists/oss-security/2010/02/15/2', 'http://www.vupen.com/english/advisories/2010/0600', 'http://secunia.com/advisories/38903'} | null |
PyPI | GHSA-pcwm-8jc3-qxvj | Moderate severity vulnerability that affects Plone | Plone 4.1.3 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. | {'CVE-2011-4462'} | 2022-03-03T05:12:53.393560Z | 2018-07-23T19:50:52Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2011-4462', 'http://www.ocert.org/advisories/ocert-2011-003.html', 'http://secunia.com/advisories/47406', 'https://github.com/advisories/GHSA-pcwm-8jc3-qxvj', 'http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html', 'https://github.com/plone/plone', 'http://www.nruns.com/_downloads/advisory28122011.pdf', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72018', 'http://www.kb.cert.org/vuls/id/903934'} | null |
PyPI | PYSEC-2019-195 | null | It was discovered that the C++ implementation (which underlies the R, Python and Ruby implementations) of Apache Arrow 0.14.0 to 0.14.1 had a uninitialized memory bug when building arrays with null values in some cases. This can lead to uninitialized memory being unintentionally shared if Arrow Arrays are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats. | {'CVE-2019-12408'} | 2021-08-27T03:22:16.533972Z | 2019-11-08T19:15:00Z | null | null | null | {'https://lists.apache.org/thread.html/49f067b1c5fb7493d952580f0d2d032819ba351f7a78743c21126269@%3Cdev.arrow.apache.org%3E', 'https://lists.apache.org/thread.html/efd8bbf57427d3c303b5316d208a335f8d0c0dbe0dc4c87cfa995073@%3Cannounce.apache.org%3E'} | null |
PyPI | PYSEC-2012-13 | null | Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database. | {'CVE-2012-2146'} | 2021-08-27T03:22:03.583910Z | 2012-08-26T21:55:00Z | null | null | null | {'http://www.openwall.com/lists/oss-security/2012/04/29/1', 'http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1', 'https://bugzilla.redhat.com/show_bug.cgi?id=810013', 'http://elixir.ematia.de/trac/ticket/119', 'http://www.openwall.com/lists/oss-security/2012/04/27/8', 'http://www.openwall.com/lists/oss-security/2012/04/28/2'} | null |
PyPI | PYSEC-2020-27 | null | In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option. | {'CVE-2020-6802', 'GHSA-q65m-pv3f-wr5r'} | 2021-03-30T22:15:00Z | 2020-03-24T22:15:00Z | null | null | null | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/', 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach', 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r', 'https://advisory.checkmarx.net/advisory/CX-2020-4276', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/'} | null |
PyPI | PYSEC-2021-429 | null | SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173 | {'CVE-2021-22557', 'GHSA-j28r-j54m-gpc4'} | 2021-11-16T21:20:29.712720Z | 2021-10-04T10:15:00Z | null | null | null | {'http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html', 'https://github.com/google/slo-generator/pull/173', 'https://github.com/advisories/GHSA-j28r-j54m-gpc4'} | null |
PyPI | GHSA-4f99-p9c2-3j8x | Undefined behavior via `nullptr` reference binding in sparse matrix multiplication | ### Impact
The [code for sparse matrix multiplication](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/sparse_matmul_op.cc#L954-L1086) is vulnerable to undefined behavior via binding a reference to `nullptr`:
```python
import tensorflow as tf
tf.raw_ops.SparseMatMul(
a=[[1.0,1.0,1.0]],
b=[[],[],[]],
transpose_a=False,
transpose_b=False,
a_is_sparse=False,
b_is_sparse=True)
```
This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor should be allocated (to conserve the invariant that output tensors are always allocated when the operation is successful) but nothing should be written to it (that is, we should return early from the kernel implementation). Otherwise, attempts to write to this empty tensor would result in heap OOB access.
### Patches
We have patched the issue in GitHub commit [e6cf28c72ba2eb949ca950d834dd6d66bb01cfae](https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
| {'CVE-2021-41219'} | 2022-03-03T05:12:41.464426Z | 2021-11-10T18:51:51Z | HIGH | null | {'CWE-824', 'CWE-125'} | {'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41219', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x', 'https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae'} | null |
PyPI | PYSEC-2014-82 | null | FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user's uid. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402. | {'CVE-2014-0012'} | 2021-08-27T03:22:05.027573Z | 2014-05-19T14:55:00Z | null | null | null | {'http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml', 'http://secunia.com/advisories/60738', 'https://github.com/mitsuhiko/jinja2/commit/acb672b6a179567632e032f547582f30fa2f4aa7', 'http://seclists.org/oss-sec/2014/q1/73', 'https://github.com/mitsuhiko/jinja2/pull/296', 'https://bugzilla.redhat.com/show_bug.cgi?id=1051421', 'https://github.com/mitsuhiko/jinja2/pull/292', 'http://secunia.com/advisories/56328'} | null |
PyPI | GHSA-5pcx-vqjp-p34w | Cross-site Scripting in shuup | In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped. | {'CVE-2021-25963'} | 2022-03-03T05:13:23.214501Z | 2021-10-04T20:11:03Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25963', 'https://github.com/shuup/shuup', 'https://github.com/shuup/shuup/commit/75714c37e32796eb7cbb0d977af5bcaa26573588', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963'} | null |
PyPI | PYSEC-2021-583 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument. A similar issue occurs in `tf.raw_ops.LowerBound`. We have patched the issue in GitHub commit 42459e4273c2e47a3232cc16c4f4fff3b3a35c38. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-9697-98pf-4rw7', 'CVE-2021-37670'} | 2021-12-09T06:35:04.970183Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7'} | null |
PyPI | PYSEC-2022-135 | null | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-j3mj-fhpq-qqjj', 'CVE-2022-23571'} | 2022-03-09T00:18:27.136787Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj', 'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3'} | null |
PyPI | PYSEC-2021-757 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/string_ngrams_op.cc#L184) calls `reserve` on a `tstring` with a value that sometimes can be negative if user supplies negative `ngram_widths`. The `reserve` method calls `TF_TString_Reserve` which has an `unsigned long` argument for the size of the buffer. Hence, the implicit conversion transforms the negative value to a large integer. We have patched the issue in GitHub commit c283e542a3f422420cfdb332414543b62fc4e4a5. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37646', 'GHSA-h6jh-7gv5-28vg'} | 2021-12-09T06:35:36.306207Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg'} | null |
PyPI | PYSEC-2021-307 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data. If `axis` is a large negative value (e.g., `-100000`), then after the first `if` it would still be negative. The check following the `if` statement will pass and the `for` loop would read one element before the start of `input_dims.data` (when `i = 0`). We have patched the issue in GitHub commit d94ffe08a65400f898241c0374e9edc6fa8ed257. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37685', 'GHSA-c545-c4f9-rf6v'} | 2021-08-27T03:22:47.234797Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v'} | null |
PyPI | PYSEC-2020-307 | null | In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure. The issue occurs because the `status` argument during validation failures is not properly checked. Since each of the above methods can return an error status, the `status` value must be checked before continuing. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1. | {'CVE-2020-15192', 'GHSA-8fxw-76px-3rxv'} | 2021-12-09T06:35:12.356862Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'} | null |
PyPI | GHSA-wpjr-j57x-wxfw | Data leakage via cache key collision in Django | An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. | {'CVE-2020-13254'} | 2022-03-03T05:13:34.214123Z | 2020-06-05T16:20:44Z | MODERATE | null | {'CWE-295'} | {'https://github.com/django/django', 'https://security.netapp.com/advisory/ntap-20200611-0002/', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html', 'https://www.djangoproject.com/weblog/2020/jun/03/security-releases/', 'https://docs.djangoproject.com/en/3.0/releases/security/', 'https://www.debian.org/security/2020/dsa-4705', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13254', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ', 'https://usn.ubuntu.com/4381-2/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://usn.ubuntu.com/4381-1/'} | null |
PyPI | PYSEC-2015-17 | null | The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect. | {'CVE-2015-2296'} | 2021-07-05T00:01:25.716066Z | 2015-03-18T16:59:00Z | null | null | null | {'http://www.ubuntu.com/usn/USN-2531-1', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:133', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153594.html', 'http://www.openwall.com/lists/oss-security/2015/03/15/1', 'https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc', 'http://advisories.mageia.org/MGASA-2015-0120.html', 'http://www.openwall.com/lists/oss-security/2015/03/14/4', 'https://warehouse.python.org/project/requests/2.6.0/'} | null |
PyPI | GHSA-hmr4-m2h5-33qx | SQL injection in Django | Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL. | {'CVE-2020-7471'} | 2022-03-21T20:45:05.942353Z | 2020-02-11T21:03:20Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7471', 'https://github.com/django/django', 'https://seclists.org/bugtraq/2020/Feb/30', 'https://security.gentoo.org/glsa/202004-17', 'https://www.openwall.com/lists/oss-security/2020/02/03/1', 'https://www.djangoproject.com/weblog/2020/feb/03/security-releases/', 'http://www.openwall.com/lists/oss-security/2020/02/03/1', 'https://usn.ubuntu.com/4264-1/', 'https://security.netapp.com/advisory/ntap-20200221-0006/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136', 'https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI', 'https://www.debian.org/security/2020/dsa-4629'} | null |
PyPI | PYSEC-2019-204 | null | Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file. | {'GHSA-q492-f7gr-27rp', 'CVE-2018-10055'} | 2021-08-27T03:22:22.150023Z | 2019-04-24T17:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-q492-f7gr-27rp', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-006.md'} | null |
PyPI | GHSA-w873-xcqq-x922 | Command Injection in Simiki | Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component 'simiki/blob/master/simiki/config.py'. | {'CVE-2020-19001'} | 2022-03-23T21:00:06.730124Z | 2021-09-01T18:37:24Z | CRITICAL | null | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-19001', 'https://github.com/tankywoo/simiki', 'https://github.com/tankywoo/simiki/issues/123'} | null |
PyPI | PYSEC-2014-4 | null | The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated. | {'CVE-2014-0480'} | 2021-07-05T00:01:18.862505Z | 2014-08-26T14:55:00Z | null | null | null | {'http://www.debian.org/security/2014/dsa-3010', 'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html', 'http://secunia.com/advisories/59782', 'http://secunia.com/advisories/61281', 'https://www.djangoproject.com/weblog/2014/aug/20/security/', 'http://secunia.com/advisories/61276', 'http://www.securityfocus.com/bid/69425'} | null |
PyPI | PYSEC-2020-242 | null | netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks. | {'SNYK-PYTHON-NETIUS-569141', 'GHSA-wm2m-xrrp-j74c', 'CVE-2020-7655'} | 2021-11-23T06:07:22.013113Z | 2020-05-21T15:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-wm2m-xrrp-j74c', 'https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141'} | null |
PyPI | GHSA-6cc5-2vg4-cc7m | Injection in Twisted | In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF. | {'CVE-2019-12387'} | 2022-03-03T05:13:04.554292Z | 2019-06-10T18:05:06Z | MODERATE | null | {'CWE-74'} | {'https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2', 'https://usn.ubuntu.com/4308-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12387', 'https://labs.twistedmatrix.com/2019/06/twisted-1921-released.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html', 'https://twistedmatrix.com/pipermail/twisted-python/2019-June/032352.html', 'https://usn.ubuntu.com/4308-2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2G5RPDQ4BNB336HL6WW5ZJ344MAWNN7N/'} | null |
PyPI | PYSEC-2021-612 | null | TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'CVE-2021-41202', 'GHSA-xrqm-fpgr-6hhx'} | 2021-12-09T06:35:07.917442Z | 2021-11-05T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx', 'https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94', 'https://github.com/tensorflow/tensorflow/issues/46912', 'https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899', 'https://github.com/tensorflow/tensorflow/issues/46889'} | null |
PyPI | GHSA-q3p4-gw7r-wqjc | A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views | A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. This also presented a Local File Disclosure vulnerability to any file readable by the webserver process. | {'CVE-2019-12417'} | 2022-03-03T05:13:48.567521Z | 2019-11-22T13:45:22Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12417', 'https://lists.apache.org/thread.html/f3aa5ff9c7cdb5424b6463c9013f6cf5db83d26c66ea77130cbbe1bc@%3Cusers.airflow.apache.org%3E'} | null |
PyPI | PYSEC-2021-242 | null | TensorFlow is an end-to-end open source platform for machine learning. The TFLite code for allocating `TFLiteIntArray`s is vulnerable to an integer overflow issue(https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27). An attacker can craft a model such that the `size` multiplier is so large that the return value overflows the `int` datatype and becomes negative. In turn, this results in invalid value being given to `malloc`(https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L47-L52). In this case, `ret->size` would dereference an invalid pointer. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-jf7h-7m85-w2v2', 'CVE-2021-29605'} | 2021-08-27T03:22:40.058012Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5'} | null |
PyPI | PYSEC-2021-868 | null | An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager. The issue results from the faulty comparison of GVA and GPA while calling uc_mem_map_ptr to free part of a claimed memory block. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code on the host machine. | {'CVE-2021-44078'} | 2022-01-07T19:23:22.112610Z | 2021-12-26T05:15:00Z | null | null | null | {'https://github.com/unicorn-engine/unicorn/compare/2.0.0-rc4...2.0.0-rc5', 'https://github.com/jwang-a/CTF/blob/master/MyChallenges/Pwn/Unicorns_Aisle/UnicornsAisle.pdf', 'https://github.com/unicorn-engine/unicorn/commit/c733bbada356b0373fa8aa72c044574bb855fd24', 'https://www.unicorn-engine.org/changelog/', 'https://gist.github.com/jwang-a/cb4b6e9551457aa299066076b836a2cd'} | null |
PyPI | PYSEC-2018-19 | null | transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step. | {'GHSA-232r-66cg-79px', 'CVE-2018-7750'} | 2021-06-10T06:50:48.065198Z | 2018-03-13T18:29:00Z | null | null | null | {'https://www.exploit-db.com/exploits/45712/', 'https://github.com/paramiko/paramiko/issues/1175', 'https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst', 'https://access.redhat.com/errata/RHSA-2018:1525', 'https://access.redhat.com/errata/RHSA-2018:1972', 'https://github.com/advisories/GHSA-232r-66cg-79px', 'https://usn.ubuntu.com/3603-1/', 'https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516', 'https://access.redhat.com/errata/RHSA-2018:1125', 'https://access.redhat.com/errata/RHSA-2018:1328', 'http://www.securityfocus.com/bid/103713', 'https://access.redhat.com/errata/RHSA-2018:0591', 'https://access.redhat.com/errata/RHSA-2018:1274', 'https://usn.ubuntu.com/3603-2/', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html', 'https://access.redhat.com/errata/RHSA-2018:1213', 'https://access.redhat.com/errata/RHSA-2018:0646', 'https://access.redhat.com/errata/RHSA-2018:1124'} | null |
PyPI | GHSA-vcqg-3p29-xw73 | Integer overflow in Pillow | libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. | {'CVE-2020-5310'} | 2022-03-03T05:12:56.420256Z | 2021-11-03T18:04:41Z | MODERATE | null | {'CWE-190'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4', 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml', 'https://github.com/python-pillow/Pillow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5310'} | null |
PyPI | GHSA-f897-875p-23x7 | Hard coded credentials in FreeTAKServer | FreeTAKServer 1.9.8 contains a hardcoded Flask secret key which allows attackers to create crafted cookies to bypass authentication or escalate privileges. | {'CVE-2022-25510'} | 2022-03-28T22:46:57.966406Z | 2022-03-12T00:00:37Z | HIGH | null | {'CWE-798'} | {'https://github.com/FreeTAKTeam/FreeTakServer/issues/292', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25510', 'https://github.com/FreeTAKTeam/FreeTakServer'} | null |
PyPI | PYSEC-2021-1 | null | A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality. | {'CVE-2021-20228'} | 2021-05-03T20:43:00Z | 2021-04-29T16:15:00Z | null | null | null | {'https://github.com/ansible/ansible/pull/73487', 'https://bugzilla.redhat.com/show_bug.cgi?id=1925002'} | null |
PyPI | PYSEC-2021-491 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`. Eigen code operating on an empty matrix can trigger on an assertion and will cause program termination. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-ph87-fvjr-v33w', 'CVE-2021-29563'} | 2021-12-09T06:34:53.142665Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ph87-fvjr-v33w'} | null |
PyPI | PYSEC-2022-162 | null | Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affected. The issues were fixed in the 4.11.1 release. | {'GHSA-3872-f48p-pxqj', 'CVE-2022-24727'} | 2022-03-11T17:35:01.661733Z | 2022-03-04T17:15:00Z | null | null | null | {'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj', 'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8'} | null |
PyPI | PYSEC-2021-184 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc#L176-L189) assumes the inputs are not empty. If any of these inputs is empty, `.flat<T>()` is an empty buffer, so accessing the element at index 0 is accessing data outside of bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-4fg4-p75j-w5xj', 'CVE-2021-29547'} | 2021-08-27T03:22:29.791310Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'} | null |
PyPI | PYSEC-2020-70 | null | In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk. | {'CVE-2020-15141', 'GHSA-7wgr-7666-7pwj'} | 2020-08-20T18:02:00Z | 2020-08-14T17:15:00Z | null | null | null | {'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj', 'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746', 'https://pypi.org/project/openapi-python-client', 'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13'} | null |
PyPI | GHSA-v7q8-wvvh-c97p | Moderate severity vulnerability that affects Zope2 | Cross-site scripting (XSS) vulnerability in Zope 2.8.x before 2.8.12, 2.9.x before 2.9.12, 2.10.x before 2.10.11, 2.11.x before 2.11.6, and 2.12.x before 2.12.3 allows remote attackers to inject arbitrary web script or HTML via vectors related to error messages. | {'CVE-2010-1104'} | 2022-03-03T05:13:50.849051Z | 2018-07-23T19:51:28Z | MODERATE | null | {'CWE-79'} | {'http://www.securityfocus.com/bid/37765', 'http://secunia.com/advisories/38007', 'https://github.com/advisories/GHSA-v7q8-wvvh-c97p', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/55599', 'https://nvd.nist.gov/vuln/detail/CVE-2010-1104', 'https://mail.zope.org/pipermail/zope-announce/2010-January/002229.html', 'http://www.osvdb.org/61655', 'http://www.vupen.com/english/advisories/2010/0104'} | null |
PyPI | PYSEC-2020-239 | null | meinheld prior to 1.0.2 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. | {'SNYK-PYTHON-MEINHELD-569140', 'CVE-2020-7658'} | 2021-08-27T03:22:06.793758Z | 2020-05-22T16:15:00Z | null | null | null | {'https://snyk.io/vuln/SNYK-PYTHON-MEINHELD-569140', 'https://github.com/mopemope/meinheld/blob/master/CHANGES.rst,'} | null |
PyPI | PYSEC-2021-669 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CHECK_LT` inserted to validate some invariants. When this condition is false, the program aborts, instead of returning a valid error to the user. This abnormal termination can be weaponized in denial of service attacks. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-fphq-gw9m-ghrv', 'CVE-2021-29543'} | 2021-12-09T06:35:22.170510Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv', 'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'} | null |
PyPI | GHSA-c2fx-8r76-gh36 | High severity vulnerability that affects python-gnupg | python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors. | {'CVE-2013-7323'} | 2022-03-03T05:13:09.618274Z | 2018-11-06T23:14:22Z | HIGH | null | null | {'http://secunia.com/advisories/56616', 'http://seclists.org/oss-sec/2014/q1/294', 'http://seclists.org/oss-sec/2014/q1/243', 'http://secunia.com/advisories/59031', 'http://seclists.org/oss-sec/2014/q1/244', 'http://www.debian.org/security/2014/dsa-2946', 'https://github.com/advisories/GHSA-c2fx-8r76-gh36', 'https://code.google.com/p/python-gnupg/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7323'} | null |
PyPI | PYSEC-2021-26 | null | Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. Note that the groups feature is not part of the Matrix specification and the chosen maximum lengths are arbitrary. Not all clients might abide by them. Refer to referenced GitHub security advisory for additional details including workarounds. | {'GHSA-jrh7-mhhx-6h88', 'CVE-2021-21393'} | 2021-04-21T16:45:00Z | 2021-04-12T22:15:00Z | null | null | null | {'https://github.com/matrix-org/synapse/pull/9393', 'https://github.com/matrix-org/synapse/pull/9321', 'https://pypi.org/project/matrix-synapse/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88'} | null |
PyPI | PYSEC-2021-393 | null | TensorFlow is an open source platform for machine learning. In affected versions if `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-gh8h-7j2j-qv4f', 'CVE-2021-41200'} | 2021-11-13T06:52:42.348013Z | 2021-11-05T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f', 'https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e', 'https://github.com/tensorflow/tensorflow/issues/46909'} | null |
PyPI | PYSEC-2021-239 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `DepthwiseConv` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/depthwise_conv.cc#L287-L288). An attacker can craft a model such that `input`'s fourth dimension would be 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-rf3h-xgv5-2q39', 'CVE-2021-29602'} | 2021-08-27T03:22:39.570829Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rf3h-xgv5-2q39'} | null |
PyPI | GHSA-84mw-34w6-2q43 | Null pointer dereference via invalid Ragged Tensors | ### Impact
Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference:
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32)
filter_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32)
tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 56, 56, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 23, 1])
```
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[2, 2, 2, 2, 0], dtype=tf.float32)
filter_tensor = tf.constant([], shape=[0, 0, 2, 6, 2], dtype=tf.float32)
tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 39, 34, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1])
```
The implementation of [`RaggedTensorToVariant` operations](https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6c70380d5313d282d248a776baa1/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L39-L40) does not validate that the ragged tensor argument is non-empty:
```cc
int ragged_rank = batched_ragged.ragged_rank();
auto batched_splits_top_vec = batched_ragged.splits(0).vec<SPLIT_TYPE>();
```
Since `batched_ragged` contains no elements, `batched_ragged.splits` is a null vector, thus `batched_ragged.splits(0)` will result in dereferencing `nullptr`.
### Patches
We have patched the issue in GitHub commit [b055b9c474cd376259dde8779908f9eeaf097d93](https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29516'} | 2022-03-03T05:14:02.406102Z | 2021-05-21T14:20:58Z | LOW | null | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-84mw-34w6-2q43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29516'} | null |
PyPI | PYSEC-2013-12 | null | Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine. | {'CVE-2013-4435'} | 2021-07-05T00:01:25.968572Z | 2013-11-05T18:55:00Z | null | null | null | {'http://docs.saltstack.com/topics/releases/0.17.1.html', 'http://www.openwall.com/lists/oss-security/2013/10/18/3'} | null |
PyPI | PYSEC-2021-686 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) uses the same index to access two arrays in parallel. Since the user controls the shape of the input arguments, an attacker could trigger a heap OOB access when `parent_output_index` is shorter than `row_split`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-8gv3-57p6-g35r', 'CVE-2021-29560'} | 2021-12-09T06:35:25.121902Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r'} | null |
PyPI | PYSEC-2017-51 | null | Multiple cross-site request forgery (CSRF) vulnerabilities in Zope Management Interface 4.3.7 and earlier, and Plone before 5.x. | {'CVE-2015-7293'} | 2021-07-25T23:34:47.925835Z | 2017-09-25T21:29:00Z | null | null | null | {'https://plone.org/security/hotfix/20151006', 'http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html', 'https://www.exploit-db.com/exploits/38411/', 'https://pypi.python.org/pypi/plone4.csrffixes'} | null |
PyPI | PYSEC-2022-119 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-21740', 'GHSA-44qp-9wwf-734r'} | 2022-03-09T00:18:24.990899Z | 2022-02-03T15:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273', 'https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3'} | null |
PyPI | GHSA-68w8-qjq3-2gfm | Path Traversal in Django | Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories. | {'CVE-2021-33203'} | 2022-03-03T05:13:08.484696Z | 2021-06-10T17:21:00Z | MODERATE | null | {'CWE-22'} | {'https://github.com/django/django', 'https://groups.google.com/forum/#!forum/django-announce', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33203', 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/', 'https://security.netapp.com/advisory/ntap-20210727-0004/', 'https://github.com/django/django/commit/053cc9534d174dc89daba36724ed2dcb36755b90'} | null |
PyPI | PYSEC-2021-405 | null | TensorFlow is an open source platform for machine learning. In affected versions the code behind `tf.function` API can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive. This occurs due to using a non-reentrant `Lock` Python object. Loading any model which contains mutually recursive functions is vulnerable. An attacker can cause denial of service by causing users to load such models and calling a recursive `tf.function`, although this is not a frequent scenario. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-h67m-xg8f-fxcf', 'CVE-2021-41213'} | 2021-11-13T06:52:44.160284Z | 2021-11-05T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf', 'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'} | null |
PyPI | PYSEC-2022-36 | null | Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher. | {'GHSA-hhm3-48h2-597v', 'CVE-2021-44451'} | 2022-03-09T00:15:53.337058Z | 2022-02-01T14:15:00Z | null | null | null | {'https://lists.apache.org/thread/xww1pccs2ckb5506wrf1v4lmxg198vkb', 'https://github.com/advisories/GHSA-hhm3-48h2-597v'} | null |
PyPI | PYSEC-2019-156 | null | The scipy.weave component in SciPy before 0.12.1 creates insecure temporary directories. | {'CVE-2013-4251'} | 2021-07-05T00:01:27.093286Z | 2019-11-04T20:15:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4251', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120696.html', 'https://github.com/scipy/scipy/commit/bd296e0336420b840fcd2faabb97084fd252a973', 'https://access.redhat.com/security/cve/cve-2013-4251', 'https://security-tracker.debian.org/tracker/CVE-2013-4251', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4251', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119759.html', 'http://www.securityfocus.com/bid/63008', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/88052', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119771.html'} | null |
PyPI | PYSEC-2009-1 | null | Cross-site scripting (XSS) vulnerability in the waterfall web status view (status/web/waterfall.py) in Buildbot 0.7.6 through 0.7.11p1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | {'CVE-2009-2959'} | 2021-07-15T02:22:07.208084Z | 2009-08-25T17:30:00Z | null | null | null | {'http://buildbot.net/trac#SecurityAlert', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00978.html', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00985.html', 'http://www.securityfocus.com/bid/36100', 'http://sourceforge.net/mailarchive/message.php?msg_name=42338fbf0908121232mb790a6cn787ac3de90e8bc31%40mail.gmail.com', 'http://www.vupen.com/english/advisories/2009/2352', 'http://secunia.com/advisories/36418', 'http://secunia.com/advisories/36352'} | null |
PyPI | GHSA-qjj8-32p7-h289 | Division by 0 in `ResourceGather` | ### Impact
An attacker can trigger a crash via a floating point exception in `tf.raw_ops.ResourceGather`:
```python
import tensorflow as tf
tensor = tf.constant(value=[[]],shape=(0,1),dtype=tf.uint32)
v = tf.Variable(tensor)
tf.raw_ops.ResourceGather(
resource=v.handle,
indices=[0],
dtype=tf.uint32,
batch_dims=1,
validate_indices=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L725-L731) computes the value of a value, `batch_size`, and then divides by it without checking that this value is not 0.
### Patches
We have patched the issue in GitHub commit [ac117ee8a8ea57b73d34665cdf00ef3303bc0b11](https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37653'} | 2022-03-03T05:13:31.939194Z | 2021-08-25T14:43:04Z | MODERATE | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289', 'https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11', 'https://github.com/tensorflow/tensorflow/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37653'} | null |
PyPI | PYSEC-2021-813 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for the `QuantizeAndDequantizeV*` operations can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'CVE-2021-41205', 'GHSA-49rx-x2rw-pc6f'} | 2021-12-09T06:35:42.034732Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f'} | null |
PyPI | GHSA-j2h6-73x8-22c4 | Exposure of Sensitive Information to an Unauthorized Actor in ansible | A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality. | {'CVE-2020-1746'} | 2022-03-03T05:12:55.174649Z | 2021-04-20T16:43:53Z | MODERATE | null | {'CWE-200'} | {'https://github.com/ansible/ansible/pull/67866', 'https://github.com/ansible/ansible', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1746', 'https://www.debian.org/security/2021/dsa-4950', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1746'} | null |
PyPI | PYSEC-2020-110 | null | In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg. | {'GHSA-j257-jfvv-h3x5', 'CVE-2020-15251', 'GHSA-23pc-4339-95vg'} | 2021-05-04T14:02:00Z | 2020-10-13T18:15:00Z | null | null | null | {'https://github.com/MirahezeBots/sopel-channelmgnt/pull/3', 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5', 'https://phab.bots.miraheze.wiki/T117', 'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/', 'https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg'} | null |
PyPI | GHSA-m7fm-4jfh-jrg6 | Use after free in boosted trees creation | ### Impact
The implementation for `tf.raw_ops.BoostedTreesCreateEnsemble` can result in a use after free error if an attacker supplies specially crafted arguments:
```python
import tensorflow as tf
v= tf.Variable([0.0])
tf.raw_ops.BoostedTreesCreateEnsemble(
tree_ensemble_handle=v.handle,
stamp_token=[0],
tree_ensemble_serialized=['0'])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/boosted_trees/resource_ops.cc#L55) uses a reference counted resource and decrements the refcount if the initialization fails, as it should. However, when the code was written, the resource was represented as a naked pointer but later refactoring has changed it to be a smart pointer. Thus, when the pointer leaves the scope, a subsequent `free`-ing of the resource occurs, but this fails to take into account that the refcount has already reached 0, thus the resource has been already freed. During this double-free process, members of the resource object are accessed for cleanup but they are invalid as the entire resource has been freed.
### Patches
We have patched the issue in GitHub commit [5ecec9c6fbdbc6be03295685190a45e7eee726ab](https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37652'} | 2022-03-03T05:13:39.615885Z | 2021-08-25T14:43:07Z | HIGH | null | {'CWE-416'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37652', 'https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6'} | null |
PyPI | PYSEC-2018-62 | null | An issue was discovered in aubio 0.4.6. A SEGV signal can occur in aubio_pitch_set_unit in pitch/pitch.c, as demonstrated by aubionotes. | {'CVE-2018-14522'} | 2021-08-25T04:29:55.802886Z | 2018-07-23T08:29:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00071.html', 'https://github.com/aubio/aubio/issues/188', 'http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00031.html'} | null |
PyPI | PYSEC-2013-6 | null | Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012. | {'CVE-2012-6081'} | 2021-07-05T00:01:22.974248Z | 2013-01-03T01:55:00Z | null | null | null | {'http://secunia.com/advisories/51676', 'http://www.debian.org/security/2012/dsa-2593', 'http://www.securityfocus.com/bid/57082', 'http://www.openwall.com/lists/oss-security/2012/12/29/6', 'http://secunia.com/advisories/51696', 'http://moinmo.in/SecurityFixes', 'http://moinmo.in/MoinMoinRelease1.9', 'http://secunia.com/advisories/51663', 'http://www.openwall.com/lists/oss-security/2012/12/30/4', 'https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599', 'http://www.exploit-db.com/exploits/25304', 'http://ubuntu.com/usn/usn-1680-1', 'http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f'} | null |
PyPI | PYSEC-2021-110 | null | In Plone 5.0 through 5.2.4, Editors are vulnerable to XSS in the folder contents view, if a Contributor has created a folder with a SCRIPT tag in the description field. | {'CVE-2021-35959'} | 2021-07-08T03:14:29.124687Z | 2021-06-30T01:15:00Z | null | null | null | {'https://plone.org/security/hotfix/20210518/stored-xss-in-folder-contents', 'http://www.openwall.com/lists/oss-security/2021/06/30/2'} | null |
PyPI | PYSEC-2021-540 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a heap buffer overflow in Eigen implementation of `tf.raw_ops.BandedTriangularSolve`. The implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L269-L278) calls `ValidateInputTensors` for input validation but fails to validate that the two tensors are not empty. Furthermore, since `OP_REQUIRES` macro only stops execution of current function after setting `ctx->status()` to a non-OK value, callers of helper functions that use `OP_REQUIRES` must check value of `ctx->status()` before continuing. This doesn't happen in this op's implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L219), hence the validation that is present is also not effective. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29612', 'GHSA-2xgj-xhgf-ggjv'} | 2021-12-09T06:35:00.791095Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv'} | null |
PyPI | GHSA-jrh7-mhhx-6h88 | Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints | ### Impact
Missing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields.
### Patches
This issue is fixed by #9321 and #9393.
### Workarounds
The groups feature can be disabled (by setting `enable_group_creation` to `False`) to mitigate this issue. Note that it is disabled by default.
### Other information
Note that the groups feature is not part of the [Matrix specification](https://matrix.org/docs/spec/) and the chosen maximum lengths are arbitrary. Not all clients might abide by them. | {'CVE-2021-21393'} | 2022-03-03T05:13:12.592814Z | 2021-04-13T15:12:40Z | MODERATE | null | {'CWE-20'} | {'https://github.com/matrix-org/synapse/pull/9393', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88', 'https://github.com/matrix-org/synapse/pull/9321', 'https://github.com/matrix-org/synapse', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21393', 'https://pypi.org/project/matrix-synapse/'} | null |
PyPI | PYSEC-2014-41 | null | python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (memory consumption) via a large value, related to formatColumns. | {'CVE-2012-5499'} | 2021-09-01T08:44:30.342149Z | 2014-09-30T14:55:00Z | null | null | null | {'https://plone.org/products/plone/security/advisories/20121106/15', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'http://rhn.redhat.com/errata/RHSA-2014-1194.html'} | null |
PyPI | GHSA-vhr6-pvjm-9qwf | User passwords are stored in clear text in the Django session | ### Impact
django-two-factor-auth versions 1.11 and before store the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password, and then leaves before entering their two-factor authentication code.
The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' password are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' password are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis).
### Patches
Upgrade to version 1.12 to resolve this issue.
After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas.
In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used.
### Workarounds
Switching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading.
### References
For an explanation of why storing cleartext password is a substantial vulnerability: [Hashing Passwords: One-Way Road to Security](https://auth0.com/blog/hashing-passwords-one-way-road-to-security/).
For documentation on configuring the Django session storage engine: [Django session documentation](https://docs.djangoproject.com/en/3.0/topics/http/sessions/).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the repo](https://github.com/Bouke/django-two-factor-auth) | {'CVE-2020-15105'} | 2022-03-03T05:13:41.560571Z | 2020-07-10T20:55:00Z | HIGH | null | {'CWE-312'} | {'https://github.com/Bouke/django-two-factor-auth/security/advisories/GHSA-vhr6-pvjm-9qwf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15105', 'https://github.com/Bouke/django-two-factor-auth/blob/master/CHANGELOG.md#112---2020-07-08', 'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359'} | null |
PyPI | PYSEC-2021-794 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc). There is no check that the divisor tensor does not contain zero elements. We have patched the issue in GitHub commit 1e206baedf8bef0334cca3eb92bab134ef525a28. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37683', 'GHSA-rhrq-64mq-hf9h'} | 2021-12-09T06:35:39.607152Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h', 'https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28'} | null |
PyPI | PYSEC-2022-4 | null | The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query. | {'GHSA-r478-c2pc-m7gx', 'CVE-2022-22846'} | 2022-01-10T17:03:19.898330Z | 2022-01-10T14:12:00Z | null | null | null | {'https://github.com/paulc/dnslib/issues/30', 'https://github.com/advisories/GHSA-r478-c2pc-m7gx'} | null |
PyPI | GHSA-f7qw-5fgj-247x | Cross-site Scripting and Open Redirect in plone.app.contenttypes | ### Impact
Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish.
The technique is known as cache poisoning.
Any later visitor can get redirected when clicking on a link on this page.
Usually only anonymous users are affected, but this depends on your cache settings.
### Patches
New versions of plone.app.contenttypes have been released.
Version 2.2.3 works on Plone 5.2 and will be included in Plone 5.2.7.
Version 3.0.0a9 works on Plone 6 and will be included in Plone 6.0.0a3.
Note that the Products.CMFPlone package has the same problem in the 4.3 series.
In Plone 5.0-5.2, the default Products.ATContentTypes version has the same problem. See [advisory](https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh).
For all unpatched versions of the three packages, you can use the following workaround.
### Workaround
Make sure the image_view_fullscreen page is not stored in the cache.
In Plone:
* Login as Manager and go to Site Setup.
* Go to the 'Caching' control panel. If this does not exist, or 'Enable caching' is not checked, you should normally not be vulnerable.
* Click on the tab 'Caching operations'.
* Under 'Legacy template mappings' locate the ruleset 'Content item view'.
* From the last column ('Templates') remove 'image_view_fullscreen'.
* Click on Save.
### Reporter
This vulnerability was responsibly disclosed to the Plone Security Team by Gustav Hansen, F-Secure Consulting. Thank you!
### For more information
If you have any questions or comments about this advisory, email us at [security@plone.org](mailto:security@plone.org)
This is also the correct address to use when you want to report a possible vulnerability.
See [our security report policy](https://plone.org/security/report). | null | 2022-03-03T05:13:46.619537Z | 2022-02-01T00:48:35Z | MODERATE | null | {'CWE-601', 'CWE-79'} | {'https://github.com/plone/plone.app.contenttypes', 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh', 'https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x'} | null |
PyPI | PYSEC-2021-71 | null | In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled. | {'CVE-2020-35655', 'GHSA-hf64-x4gq-p99h'} | 2021-01-29T00:46:00Z | 2021-01-12T09:15:00Z | null | null | null | {'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://github.com/advisories/GHSA-hf64-x4gq-p99h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'} | null |
PyPI | GHSA-xpm8-98mx-h4c5 | Critical severity vulnerability that affects MLAlchemy | An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability. | {'CVE-2017-16615'} | 2022-03-22T20:47:02.968039Z | 2018-07-13T16:01:07Z | CRITICAL | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16615', 'https://github.com/thanethomson/MLAlchemy/commit/bc795757febdcce430d89f9d08f75c32d6989d3c', 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16615-critical-restful-web-applications-vulnerability/', 'https://github.com/thanethomson/MLAlchemy/issues/1', 'https://github.com/advisories/GHSA-xpm8-98mx-h4c5', 'https://github.com/thanethomson/MLAlchemy'} | null |
PyPI | GHSA-g8q7-xv52-hf9f | Feedgen Vulnerable to XML Denial of Service Attacks | ### Impact
The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to [XML Denial of Service Attacks](https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses) (e.g. XML Bomb).
This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only.
### Patches
This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources.
### Workarounds
Updating is strongly recommended and should not be problematic. Nevertheless, as a workaround, avoid providing XML directly to feedgen or ensure that no entity expansion is part of the XML.
### References
- [Security Briefs - XML Denial of Service Attacks and Defenses](https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses)
- [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack#cite_note-2)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [lkiesow/python-feedgen](https://github.com/lkiesow/python-feedgen/issues)
- Send an email to security@lkiesow.de | {'CVE-2020-5227'} | 2022-03-03T05:14:08.476905Z | 2020-01-28T22:37:50Z | HIGH | null | {'CWE-776'} | {'https://github.com/lkiesow/python-feedgen/security/advisories/GHSA-g8q7-xv52-hf9f', 'https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5227', 'https://github.com/lkiesow/python-feedgen/commit/f57a01b20fa4aaaeccfa417f28e66b4084b9d0cf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6I5ENUYGFNMIH6ZQ62FZ6VU2WD3SIOI/'} | null |
PyPI | GHSA-9q2p-fj49-vpxj | In marshmallow library the schema "only" option treats an empty list as implying no "only" option | In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema "only" option treats an empty list as implying no "only" option, which allows a request that was intended to expose no fields to instead expose all fields (if the schema is being filtered dynamically using the "only" option, and there is a user role that produces an empty value for "only"). | {'CVE-2018-17175'} | 2022-04-26T18:48:01.175170Z | 2018-10-10T16:10:46Z | MODERATE | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2018-17175', 'https://github.com/marshmallow-code/marshmallow/issues/772', 'https://github.com/advisories/GHSA-9q2p-fj49-vpxj', 'https://github.com/marshmallow-code', 'https://github.com/marshmallow-code/marshmallow/pull/782', 'https://github.com/marshmallow-code/marshmallow/pull/777'} | null |
PyPI | GHSA-wq8f-wvqp-xvvm | Integer Overflow or Wraparound in OpenCV | In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function PxMDecoder::readData has an integer overflow when calculate src_pitch. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier. | {'CVE-2017-12863'} | 2022-03-03T05:13:34.468890Z | 2021-10-12T22:02:35Z | HIGH | null | {'CWE-190'} | {'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9371', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://security.gentoo.org/glsa/201712-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12863', 'https://github.com/opencv/opencv/pull/9376', 'https://github.com/opencv/opencv-python'} | null |
PyPI | PYSEC-2019-228 | null | NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of service via an invalid GIF file. | {'CVE-2019-9635'} | 2021-08-27T03:22:22.500832Z | 2019-04-24T17:29:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-001.md'} | null |
PyPI | PYSEC-2020-281 | null | In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, the code is prone to heap buffer overflow. If `split_values` does not end with a value at least `num_values` then the `while` loop condition will trigger a read outside of the bounds of `split_values` once `batch_idx` grows too large. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1. | {'CVE-2020-15201', 'GHSA-p5f8-gfw5-33w4'} | 2021-12-09T06:34:41.679840Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4'} | null |
PyPI | PYSEC-2019-18 | null | Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function. | {'GHSA-wh4h-v3f2-r2pp', 'CVE-2019-6975'} | 2020-08-24T17:37:00Z | 2019-02-11T13:29:00Z | null | null | null | {'https://www.openwall.com/lists/oss-security/2019/02/11/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/', 'https://usn.ubuntu.com/3890-1/', 'https://seclists.org/bugtraq/2019/Jul/10', 'https://www.djangoproject.com/weblog/2019/feb/11/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/', 'https://www.debian.org/security/2019/dsa-4476', 'https://github.com/advisories/GHSA-wh4h-v3f2-r2pp', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ', 'http://www.securityfocus.com/bid/106964'} | null |
PyPI | GHSA-hjmq-236j-8m87 | Denial of service in tensorflow-lite | ### Impact
In TensorFlow Lite models using segment sum can trigger a denial of service by causing an out of memory allocation in the implementation of segment sum. Since code uses the last element of the tensor holding them to determine the dimensionality of output tensor, attackers can use a very large value to trigger a large allocation:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/segment_sum.cc#L39-L44
### Patches
We have patched the issue in 204945b and will release patch releases for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1.
### Workarounds
A potential workaround would be to add a custom `Verifier` to limit the maximum value in the segment ids tensor. This only handles the case when the segment ids are stored statically in the model, but a similar validation could be done if the segment ids are generated at runtime, between inference steps.
However, if the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been discovered from a variant analysis of [GHSA-p2cq-cprg-frvm](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm). | {'CVE-2020-15213'} | 2021-08-26T15:19:56Z | 2020-09-25T18:28:53Z | MODERATE | null | {'CWE-119', 'CWE-770'} | {'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a', 'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15213', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hjmq-236j-8m87'} | null |
PyPI | PYSEC-2021-281 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations). The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr. We have patched the issue in GitHub commit 93f428fd1768df147171ed674fee1fc5ab8309ec. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37659', 'GHSA-q3g3-h9r4-prrc'} | 2021-08-27T03:22:44.808272Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc', 'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec'} | null |
PyPI | GHSA-8r7c-3cm2-3h8f | Memory leak in Tensorflow | ### Impact
If a graph node is invalid, TensorFlow can leak memory in the [implementation of `ImmutableExecutorState::Initialize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262):
```cc
Status s = params_.create_kernel(n->properties(), &item->kernel);
if (!s.ok()) {
item->kernel = nullptr;
s = AttachDef(s, *n);
return s;
}
```
Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak.
### Patches
We have patched the issue in GitHub commit [c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd](https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23578'} | 2022-03-03T05:12:43.766858Z | 2022-02-10T00:33:13Z | MODERATE | null | {'CWE-401'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23578', 'https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8r7c-3cm2-3h8f', 'https://github.com/tensorflow/tensorflow/'} | null |
PyPI | PYSEC-2022-61 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount` operations allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail. There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-21737', 'GHSA-f2vv-v9cg-qhh7'} | 2022-03-09T00:17:31.433747Z | 2022-02-03T14:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc', 'https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7'} | null |
PyPI | PYSEC-2021-452 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/496c2630e51c1a478f095b084329acedb253db6b/tensorflow/core/kernels/conv_grad_shape_utils.cc#L130) does a modulus operation where the divisor is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-r4pj-74mg-8868', 'CVE-2021-29524'} | 2021-12-09T06:34:47.095784Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868', 'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'} | null |
PyPI | PYSEC-2014-16 | null | Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the @action parameter to support/issue1. | {'CVE-2012-6131'} | 2021-07-05T00:01:25.823373Z | 2014-04-11T15:55:00Z | null | null | null | {'https://exchange.xforce.ibmcloud.com/vulnerabilities/84190', 'https://bugzilla.redhat.com/show_bug.cgi?id=722672', 'https://pypi.python.org/pypi/roundup/1.4.20', 'http://www.openwall.com/lists/oss-security/2013/02/13/8', 'http://issues.roundup-tracker.org/issue2550711', 'http://www.openwall.com/lists/oss-security/2012/11/10/2'} | null |
PyPI | PYSEC-2021-517 | null | TensorFlow is an end-to-end open source platform for machine learning. The reference implementation of the `GatherNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966). An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-3w67-q784-6w7c', 'CVE-2021-29589'} | 2021-12-09T06:34:57.180094Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3w67-q784-6w7c'} | null |
PyPI | GHSA-hg4c-rgvm-964g | SQL Injection in pycsw | A SQL injection vulnerability in pycsw all versions before 2.0.2, 1.10.5 and 1.8.6 that leads to read and extract of any data from any table in the pycsw database that the database user has access to. Also on PostgreSQL (at least) it is possible to perform updates/inserts/deletes and database modifications to any table the database user has access to. | {'CVE-2016-8640'} | 2022-03-23T18:30:05.643922Z | 2018-08-15T20:02:53Z | CRITICAL | null | {'CWE-89'} | {'http://seclists.org/oss-sec/2016/q4/406', 'https://github.com/geopython/pycsw/pull/474/files', 'https://github.com/geopython/pycsw', 'https://github.com/advisories/GHSA-hg4c-rgvm-964g', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8640', 'https://patch-diff.githubusercontent.com/raw/geopython/pycsw/pull/474.patch', 'http://www.securityfocus.com/bid/94302'} | null |
PyPI | PYSEC-2021-147 | null | in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information. | {'CVE-2021-25925', 'GHSA-rmp7-f2vp-3rq4'} | 2021-08-27T03:22:21.507681Z | 2021-04-12T14:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-rmp7-f2vp-3rq4', 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.