ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
PyPI
PYSEC-2018-58
null
An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.
{'CVE-2016-8647', 'GHSA-x4cm-m36h-c6qj'}
2021-07-25T23:34:24.709864Z
2018-07-26T14:29:00Z
null
null
null
{'https://access.redhat.com/errata/RHSA-2017:1685', 'https://github.com/advisories/GHSA-x4cm-m36h-c6qj', 'https://github.com/ansible/ansible-modules-core/pull/5388', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647'}
null
PyPI
PYSEC-2019-183
null
Koji through 1.18.0 allows remote Directory Traversal, with resultant Privilege Escalation.
{'CVE-2019-17109'}
2021-08-27T03:22:05.900614Z
2019-10-09T22:15:00Z
null
null
null
{'https://docs.pagure.org/koji/CVE-2019-17109/', 'https://pagure.io/koji/commits/master', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BGUXMZIAQFFNNQ7PEFDAYQCXXKJR76U/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DEQYYGWLJBQQVTAC7E7XSDGVF27NPMPB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PSCCFHLNVFLDPC7DB4UJGXD6ZWBSY57/', 'http://www.openwall.com/lists/oss-security/2019/10/09/5'}
null
PyPI
PYSEC-2022-123
null
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version.
{'GHSA-98p5-x8x4-c9m5', 'CVE-2022-23559'}
2022-03-09T00:18:25.518342Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4', 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043', 'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01'}
null
PyPI
GHSA-hjfx-8p6c-g7gx
Insufficient Verification of Data Authenticity in Pillow
An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.
{'CVE-2021-28678'}
2022-03-03T05:12:01.145169Z
2021-06-08T18:49:20Z
MODERATE
null
{'CWE-345'}
{'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/pull/5377/commits/496245aa4365d0827390bd0b6fbd11287453b3a1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28678', 'https://github.com/python-pillow/Pillow/pull/5377'}
null
PyPI
PYSEC-2021-595
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions all TFLite operations that use quantization can be made to use unitialized values. [For example](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/depthwise_conv.cc#L198-L200). The issue stems from the fact that `quantization.params` is only valid if `quantization.type` is different that `kTfLiteNoQuantization`. However, these checks are missing in large parts of the code. We have patched the issue in GitHub commits 537bc7c723439b9194a358f64d871dd326c18887, 4a91f2069f7145aab6ba2d8cfe41be8a110c18a5 and 8933b8a21280696ab119b63263babdb54c298538. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37682', 'GHSA-4c4g-crqm-xrxw'}
2021-12-09T06:35:05.976648Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw', 'https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538', 'https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5'}
null
PyPI
PYSEC-2014-94
null
PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
{'CVE-2013-6444'}
2021-08-27T03:22:18.708966Z
2014-05-05T17:06:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1044246', 'http://seclists.org/oss-sec/2013/q4/524', 'http://www.securityfocus.com/bid/64544', 'http://sourceforge.net/p/pywbem/mailman/message/31757312/', 'http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html', 'http://sourceforge.net/p/pywbem/code/627/'}
null
PyPI
PYSEC-2020-5
null
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
{'GHSA-g4mq-6fp5-qwcf', 'CVE-2020-1733'}
2020-06-13T04:15:00Z
2020-03-11T19:15:00Z
null
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://github.com/ansible/ansible/issues/67791', 'https://github.com/advisories/GHSA-g4mq-6fp5-qwcf', 'https://security.gentoo.org/glsa/202006-11'}
null
PyPI
GHSA-47wv-vhj2-g66m
Use of insecure temporary file in Horovod
### Impact The insecure `tempfile.mktemp()` is used when Horovod is run in an LSF job with `jsrun`. In that situation, a jsrun rank file is created with `mktemp`, which could be hijacked by another process to read or manipulate the content. This issue does not impact the use of MPI, Gloo, Spark or Ray. ### Patches The problem has been fixed in [b96ecae4](https://github.com/horovod/horovod/commit/b96ecae4dc69fc0a83c7c2d3f1dde600c20a1b41). ### Workarounds The rank file is not created when `binding_args` are provided in the `Settings` instance. ### References Please see https://github.com/horovod/horovod/pull/3358 for details. ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/horovod/horovod](https://github.com/horovod/horovod/issues/new/choose)
{'CVE-2022-0315'}
2022-04-05T00:15:26.847759Z
2022-03-29T19:18:32Z
HIGH
null
{'CWE-668', 'CWE-377'}
{'https://github.com/horovod/horovod', 'https://huntr.dev/bounties/7e50397b-dd63-4bb5-b56d-704094a7da45', 'https://github.com/advisories/GHSA-47wv-vhj2-g66m', 'https://github.com/horovod/horovod/pull/3358', 'https://github.com/horovod/horovod/commit/b96ecae4dc69fc0a83c7c2d3f1dde600c20a1b41', 'https://github.com/pypa/advisory-database/tree/main/vulns/horovod/PYSEC-2022-175.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0315', 'https://github.com/horovod/horovod/security/advisories/GHSA-47wv-vhj2-g66m'}
null
PyPI
GHSA-8cxv-76p7-jxwr
Null-dereference in Tensorflow
### Impact The [implementation of `GetInitOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61) is vulnerable to a crash caused by dereferencing a null pointer: ```cc const auto& init_op_sig_it = meta_graph_def.signature_def().find(kSavedModelInitOpSignatureKey); if (init_op_sig_it != sig_def_map.end()) { *init_op_name = init_op_sig_it->second.outputs() .find(kSavedModelInitOpSignatureKey) ->second.name(); return Status::OK(); } ``` Here, we have a nested map and we assume that if the first `.find` succeeds then so would be the search in the internal map. However, the maps are built based on the `SavedModel` protobuf format and a malicious user can alter that on disk before loading to cause the second `.find` to return `nullptr`. ### Patches We have patched the issue in GitHub commit [4f38b1ac8e42727e18a2f0bde06d3bee8e77b250](https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23577'}
2022-03-03T05:12:44.907686Z
2022-02-10T00:32:29Z
MODERATE
null
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23577', 'https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8cxv-76p7-jxwr', 'https://github.com/tensorflow/tensorflow/'}
null
PyPI
PYSEC-2020-31
null
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
{'CVE-2020-13254', 'GHSA-wpjr-j57x-wxfw'}
2021-01-20T15:15:00Z
2020-06-03T14:15:00Z
null
null
null
{'https://security.netapp.com/advisory/ntap-20200611-0002/', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html', 'https://github.com/advisories/GHSA-wpjr-j57x-wxfw', 'https://www.djangoproject.com/weblog/2020/jun/03/security-releases/', 'https://docs.djangoproject.com/en/3.0/releases/security/', 'https://www.debian.org/security/2020/dsa-4705', 'https://usn.ubuntu.com/4381-2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://usn.ubuntu.com/4381-1/'}
null
PyPI
PYSEC-2021-350
null
In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped.
{'GHSA-5pcx-vqjp-p34w', 'CVE-2021-25963'}
2021-09-30T10:32:36.636402Z
2021-09-30T08:15:00Z
null
null
null
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963', 'https://github.com/shuup/shuup/commit/75714c37e32796eb7cbb0d977af5bcaa26573588', 'https://github.com/advisories/GHSA-5pcx-vqjp-p34w'}
null
PyPI
PYSEC-2021-700
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPool3DGradGrad` exhibits undefined behavior by dereferencing null pointers backing attacker-supplied empty tensors. The implementation(https://github.com/tensorflow/tensorflow/blob/72fe792967e7fd25234342068806707bbc116618/tensorflow/core/kernels/pooling_ops_3d.cc#L679-L703) fails to validate that the 3 tensor inputs are not empty. If any of them is empty, then accessing the elements in the tensor results in dereferencing a null pointer. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-828x-qc2p-wprq', 'CVE-2021-29574'}
2021-12-09T06:35:27.544548Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828x-qc2p-wprq'}
null
PyPI
GHSA-vx6v-xg64-pmr8
Cross-site Scripting in django-helpdesk
django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3945'}
2022-03-03T05:13:26.671191Z
2021-11-15T23:12:41Z
HIGH
null
{'CWE-79'}
{'https://github.com/django-helpdesk/django-helpdesk', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3945', 'https://github.com/django-helpdesk/django-helpdesk/commit/2c7065e0c4296e0c692fb4a7ee19c7357583af30', 'https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4'}
null
PyPI
PYSEC-2021-215
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalAvgPoolGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/dcba796a28364d6d7f003f6fe733d82726dda713/tensorflow/core/kernels/fractional_avg_pool_op.cc#L216) fails to validate that the pooling sequence arguments have enough elements as required by the `out_backprop` tensor shape. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29578', 'GHSA-6f89-8j54-29xf'}
2021-08-27T03:22:35.223640Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f89-8j54-29xf', 'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f'}
null
PyPI
PYSEC-2021-645
null
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op.cc#L114-L116) is tricked to consider a tensor of type `tstring` which in fact contains integral elements. Fixing the type confusion by preventing mixing `DT_STRING` and `DT_INT64` types solves this issue. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-772j-h9xw-ffp5', 'CVE-2021-29519'}
2021-12-09T06:35:18.174701Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772j-h9xw-ffp5'}
null
PyPI
PYSEC-2020-215
null
Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.
{'GHSA-c7vm-f5p4-8fqh', 'CVE-2020-26215'}
2021-08-11T11:14:19.531087Z
2020-11-18T22:15:00Z
null
null
null
{'https://github.com/jupyter/notebook/commit/3cec4bbe21756de9f0c4bccf18cf61d840314d74', 'https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00004.html'}
null
PyPI
PYSEC-2017-92
null
Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.
{'CVE-2016-3076'}
2021-08-27T03:22:10.292415Z
2017-04-24T18:59:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1321929', 'http://www.securityfocus.com/bid/98042', 'http://pillow.readthedocs.io/en/4.1.x/releasenotes/3.1.2.html'}
null
PyPI
PYSEC-2010-3
null
The default configuration of cfg.packagepages_actions_excluded in MoinMoin before 1.8.7 does not prevent unsafe package actions, which has unspecified impact and attack vectors.
{'CVE-2010-0717'}
2021-07-05T00:01:22.874295Z
2010-02-26T19:30:00Z
null
null
null
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/56595', 'http://moinmo.in/MoinMoinRelease1.8', 'http://hg.moinmo.in/moin/1.8/raw-file/1.8.7/docs/CHANGES', 'http://www.debian.org/security/2010/dsa-2014', 'http://www.openwall.com/lists/oss-security/2010/02/15/2', 'http://www.vupen.com/english/advisories/2010/0600', 'http://secunia.com/advisories/38903'}
null
PyPI
GHSA-pcwm-8jc3-qxvj
Moderate severity vulnerability that affects Plone
Plone 4.1.3 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
{'CVE-2011-4462'}
2022-03-03T05:12:53.393560Z
2018-07-23T19:50:52Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2011-4462', 'http://www.ocert.org/advisories/ocert-2011-003.html', 'http://secunia.com/advisories/47406', 'https://github.com/advisories/GHSA-pcwm-8jc3-qxvj', 'http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html', 'https://github.com/plone/plone', 'http://www.nruns.com/_downloads/advisory28122011.pdf', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72018', 'http://www.kb.cert.org/vuls/id/903934'}
null
PyPI
PYSEC-2019-195
null
It was discovered that the C++ implementation (which underlies the R, Python and Ruby implementations) of Apache Arrow 0.14.0 to 0.14.1 had a uninitialized memory bug when building arrays with null values in some cases. This can lead to uninitialized memory being unintentionally shared if Arrow Arrays are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats.
{'CVE-2019-12408'}
2021-08-27T03:22:16.533972Z
2019-11-08T19:15:00Z
null
null
null
{'https://lists.apache.org/thread.html/49f067b1c5fb7493d952580f0d2d032819ba351f7a78743c21126269@%3Cdev.arrow.apache.org%3E', 'https://lists.apache.org/thread.html/efd8bbf57427d3c303b5316d208a335f8d0c0dbe0dc4c87cfa995073@%3Cannounce.apache.org%3E'}
null
PyPI
PYSEC-2012-13
null
Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
{'CVE-2012-2146'}
2021-08-27T03:22:03.583910Z
2012-08-26T21:55:00Z
null
null
null
{'http://www.openwall.com/lists/oss-security/2012/04/29/1', 'http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1', 'https://bugzilla.redhat.com/show_bug.cgi?id=810013', 'http://elixir.ematia.de/trac/ticket/119', 'http://www.openwall.com/lists/oss-security/2012/04/27/8', 'http://www.openwall.com/lists/oss-security/2012/04/28/2'}
null
PyPI
PYSEC-2020-27
null
In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option.
{'CVE-2020-6802', 'GHSA-q65m-pv3f-wr5r'}
2021-03-30T22:15:00Z
2020-03-24T22:15:00Z
null
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/', 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach', 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r', 'https://advisory.checkmarx.net/advisory/CX-2020-4276', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/'}
null
PyPI
PYSEC-2021-429
null
SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173
{'CVE-2021-22557', 'GHSA-j28r-j54m-gpc4'}
2021-11-16T21:20:29.712720Z
2021-10-04T10:15:00Z
null
null
null
{'http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html', 'https://github.com/google/slo-generator/pull/173', 'https://github.com/advisories/GHSA-j28r-j54m-gpc4'}
null
PyPI
GHSA-4f99-p9c2-3j8x
Undefined behavior via `nullptr` reference binding in sparse matrix multiplication
### Impact The [code for sparse matrix multiplication](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/sparse_matmul_op.cc#L954-L1086) is vulnerable to undefined behavior via binding a reference to `nullptr`: ```python import tensorflow as tf tf.raw_ops.SparseMatMul( a=[[1.0,1.0,1.0]], b=[[],[],[]], transpose_a=False, transpose_b=False, a_is_sparse=False, b_is_sparse=True) ``` This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor should be allocated (to conserve the invariant that output tensors are always allocated when the operation is successful) but nothing should be written to it (that is, we should return early from the kernel implementation). Otherwise, attempts to write to this empty tensor would result in heap OOB access. ### Patches We have patched the issue in GitHub commit [e6cf28c72ba2eb949ca950d834dd6d66bb01cfae](https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41219'}
2022-03-03T05:12:41.464426Z
2021-11-10T18:51:51Z
HIGH
null
{'CWE-824', 'CWE-125'}
{'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41219', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x', 'https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae'}
null
PyPI
PYSEC-2014-82
null
FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user's uid. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402.
{'CVE-2014-0012'}
2021-08-27T03:22:05.027573Z
2014-05-19T14:55:00Z
null
null
null
{'http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml', 'http://secunia.com/advisories/60738', 'https://github.com/mitsuhiko/jinja2/commit/acb672b6a179567632e032f547582f30fa2f4aa7', 'http://seclists.org/oss-sec/2014/q1/73', 'https://github.com/mitsuhiko/jinja2/pull/296', 'https://bugzilla.redhat.com/show_bug.cgi?id=1051421', 'https://github.com/mitsuhiko/jinja2/pull/292', 'http://secunia.com/advisories/56328'}
null
PyPI
GHSA-5pcx-vqjp-p34w
Cross-site Scripting in shuup
In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped.
{'CVE-2021-25963'}
2022-03-03T05:13:23.214501Z
2021-10-04T20:11:03Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25963', 'https://github.com/shuup/shuup', 'https://github.com/shuup/shuup/commit/75714c37e32796eb7cbb0d977af5bcaa26573588', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963'}
null
PyPI
PYSEC-2021-583
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument. A similar issue occurs in `tf.raw_ops.LowerBound`. We have patched the issue in GitHub commit 42459e4273c2e47a3232cc16c4f4fff3b3a35c38. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-9697-98pf-4rw7', 'CVE-2021-37670'}
2021-12-09T06:35:04.970183Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7'}
null
PyPI
PYSEC-2022-135
null
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-j3mj-fhpq-qqjj', 'CVE-2022-23571'}
2022-03-09T00:18:27.136787Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj', 'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3'}
null
PyPI
PYSEC-2021-757
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/string_ngrams_op.cc#L184) calls `reserve` on a `tstring` with a value that sometimes can be negative if user supplies negative `ngram_widths`. The `reserve` method calls `TF_TString_Reserve` which has an `unsigned long` argument for the size of the buffer. Hence, the implicit conversion transforms the negative value to a large integer. We have patched the issue in GitHub commit c283e542a3f422420cfdb332414543b62fc4e4a5. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37646', 'GHSA-h6jh-7gv5-28vg'}
2021-12-09T06:35:36.306207Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg'}
null
PyPI
PYSEC-2021-307
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data. If `axis` is a large negative value (e.g., `-100000`), then after the first `if` it would still be negative. The check following the `if` statement will pass and the `for` loop would read one element before the start of `input_dims.data` (when `i = 0`). We have patched the issue in GitHub commit d94ffe08a65400f898241c0374e9edc6fa8ed257. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37685', 'GHSA-c545-c4f9-rf6v'}
2021-08-27T03:22:47.234797Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v'}
null
PyPI
PYSEC-2020-307
null
In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure. The issue occurs because the `status` argument during validation failures is not properly checked. Since each of the above methods can return an error status, the `status` value must be checked before continuing. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.
{'CVE-2020-15192', 'GHSA-8fxw-76px-3rxv'}
2021-12-09T06:35:12.356862Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}
null
PyPI
GHSA-wpjr-j57x-wxfw
Data leakage via cache key collision in Django
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
{'CVE-2020-13254'}
2022-03-03T05:13:34.214123Z
2020-06-05T16:20:44Z
MODERATE
null
{'CWE-295'}
{'https://github.com/django/django', 'https://security.netapp.com/advisory/ntap-20200611-0002/', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html', 'https://www.djangoproject.com/weblog/2020/jun/03/security-releases/', 'https://docs.djangoproject.com/en/3.0/releases/security/', 'https://www.debian.org/security/2020/dsa-4705', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13254', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ', 'https://usn.ubuntu.com/4381-2/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://usn.ubuntu.com/4381-1/'}
null
PyPI
PYSEC-2015-17
null
The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
{'CVE-2015-2296'}
2021-07-05T00:01:25.716066Z
2015-03-18T16:59:00Z
null
null
null
{'http://www.ubuntu.com/usn/USN-2531-1', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:133', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153594.html', 'http://www.openwall.com/lists/oss-security/2015/03/15/1', 'https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc', 'http://advisories.mageia.org/MGASA-2015-0120.html', 'http://www.openwall.com/lists/oss-security/2015/03/14/4', 'https://warehouse.python.org/project/requests/2.6.0/'}
null
PyPI
GHSA-hmr4-m2h5-33qx
SQL injection in Django
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
{'CVE-2020-7471'}
2022-03-21T20:45:05.942353Z
2020-02-11T21:03:20Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7471', 'https://github.com/django/django', 'https://seclists.org/bugtraq/2020/Feb/30', 'https://security.gentoo.org/glsa/202004-17', 'https://www.openwall.com/lists/oss-security/2020/02/03/1', 'https://www.djangoproject.com/weblog/2020/feb/03/security-releases/', 'http://www.openwall.com/lists/oss-security/2020/02/03/1', 'https://usn.ubuntu.com/4264-1/', 'https://security.netapp.com/advisory/ntap-20200221-0006/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136', 'https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI', 'https://www.debian.org/security/2020/dsa-4629'}
null
PyPI
PYSEC-2019-204
null
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.
{'GHSA-q492-f7gr-27rp', 'CVE-2018-10055'}
2021-08-27T03:22:22.150023Z
2019-04-24T17:29:00Z
null
null
null
{'https://github.com/advisories/GHSA-q492-f7gr-27rp', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-006.md'}
null
PyPI
GHSA-w873-xcqq-x922
Command Injection in Simiki
Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component 'simiki/blob/master/simiki/config.py'.
{'CVE-2020-19001'}
2022-03-23T21:00:06.730124Z
2021-09-01T18:37:24Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-19001', 'https://github.com/tankywoo/simiki', 'https://github.com/tankywoo/simiki/issues/123'}
null
PyPI
PYSEC-2014-4
null
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
{'CVE-2014-0480'}
2021-07-05T00:01:18.862505Z
2014-08-26T14:55:00Z
null
null
null
{'http://www.debian.org/security/2014/dsa-3010', 'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html', 'http://secunia.com/advisories/59782', 'http://secunia.com/advisories/61281', 'https://www.djangoproject.com/weblog/2014/aug/20/security/', 'http://secunia.com/advisories/61276', 'http://www.securityfocus.com/bid/69425'}
null
PyPI
PYSEC-2020-242
null
netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks.
{'SNYK-PYTHON-NETIUS-569141', 'GHSA-wm2m-xrrp-j74c', 'CVE-2020-7655'}
2021-11-23T06:07:22.013113Z
2020-05-21T15:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-wm2m-xrrp-j74c', 'https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141'}
null
PyPI
GHSA-6cc5-2vg4-cc7m
Injection in Twisted
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.
{'CVE-2019-12387'}
2022-03-03T05:13:04.554292Z
2019-06-10T18:05:06Z
MODERATE
null
{'CWE-74'}
{'https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2', 'https://usn.ubuntu.com/4308-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12387', 'https://labs.twistedmatrix.com/2019/06/twisted-1921-released.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html', 'https://twistedmatrix.com/pipermail/twisted-python/2019-June/032352.html', 'https://usn.ubuntu.com/4308-2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2G5RPDQ4BNB336HL6WW5ZJ344MAWNN7N/'}
null
PyPI
PYSEC-2021-612
null
TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41202', 'GHSA-xrqm-fpgr-6hhx'}
2021-12-09T06:35:07.917442Z
2021-11-05T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx', 'https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94', 'https://github.com/tensorflow/tensorflow/issues/46912', 'https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899', 'https://github.com/tensorflow/tensorflow/issues/46889'}
null
PyPI
GHSA-q3p4-gw7r-wqjc
A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views
A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. This also presented a Local File Disclosure vulnerability to any file readable by the webserver process.
{'CVE-2019-12417'}
2022-03-03T05:13:48.567521Z
2019-11-22T13:45:22Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12417', 'https://lists.apache.org/thread.html/f3aa5ff9c7cdb5424b6463c9013f6cf5db83d26c66ea77130cbbe1bc@%3Cusers.airflow.apache.org%3E'}
null
PyPI
PYSEC-2021-242
null
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code for allocating `TFLiteIntArray`s is vulnerable to an integer overflow issue(https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27). An attacker can craft a model such that the `size` multiplier is so large that the return value overflows the `int` datatype and becomes negative. In turn, this results in invalid value being given to `malloc`(https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L47-L52). In this case, `ret->size` would dereference an invalid pointer. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-jf7h-7m85-w2v2', 'CVE-2021-29605'}
2021-08-27T03:22:40.058012Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5'}
null
PyPI
PYSEC-2021-868
null
An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager. The issue results from the faulty comparison of GVA and GPA while calling uc_mem_map_ptr to free part of a claimed memory block. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code on the host machine.
{'CVE-2021-44078'}
2022-01-07T19:23:22.112610Z
2021-12-26T05:15:00Z
null
null
null
{'https://github.com/unicorn-engine/unicorn/compare/2.0.0-rc4...2.0.0-rc5', 'https://github.com/jwang-a/CTF/blob/master/MyChallenges/Pwn/Unicorns_Aisle/UnicornsAisle.pdf', 'https://github.com/unicorn-engine/unicorn/commit/c733bbada356b0373fa8aa72c044574bb855fd24', 'https://www.unicorn-engine.org/changelog/', 'https://gist.github.com/jwang-a/cb4b6e9551457aa299066076b836a2cd'}
null
PyPI
PYSEC-2018-19
null
transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
{'GHSA-232r-66cg-79px', 'CVE-2018-7750'}
2021-06-10T06:50:48.065198Z
2018-03-13T18:29:00Z
null
null
null
{'https://www.exploit-db.com/exploits/45712/', 'https://github.com/paramiko/paramiko/issues/1175', 'https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst', 'https://access.redhat.com/errata/RHSA-2018:1525', 'https://access.redhat.com/errata/RHSA-2018:1972', 'https://github.com/advisories/GHSA-232r-66cg-79px', 'https://usn.ubuntu.com/3603-1/', 'https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516', 'https://access.redhat.com/errata/RHSA-2018:1125', 'https://access.redhat.com/errata/RHSA-2018:1328', 'http://www.securityfocus.com/bid/103713', 'https://access.redhat.com/errata/RHSA-2018:0591', 'https://access.redhat.com/errata/RHSA-2018:1274', 'https://usn.ubuntu.com/3603-2/', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html', 'https://access.redhat.com/errata/RHSA-2018:1213', 'https://access.redhat.com/errata/RHSA-2018:0646', 'https://access.redhat.com/errata/RHSA-2018:1124'}
null
PyPI
GHSA-vcqg-3p29-xw73
Integer overflow in Pillow
libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.
{'CVE-2020-5310'}
2022-03-03T05:12:56.420256Z
2021-11-03T18:04:41Z
MODERATE
null
{'CWE-190'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4', 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml', 'https://github.com/python-pillow/Pillow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5310'}
null
PyPI
GHSA-f897-875p-23x7
Hard coded credentials in FreeTAKServer
FreeTAKServer 1.9.8 contains a hardcoded Flask secret key which allows attackers to create crafted cookies to bypass authentication or escalate privileges.
{'CVE-2022-25510'}
2022-03-28T22:46:57.966406Z
2022-03-12T00:00:37Z
HIGH
null
{'CWE-798'}
{'https://github.com/FreeTAKTeam/FreeTakServer/issues/292', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25510', 'https://github.com/FreeTAKTeam/FreeTakServer'}
null
PyPI
PYSEC-2021-1
null
A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.
{'CVE-2021-20228'}
2021-05-03T20:43:00Z
2021-04-29T16:15:00Z
null
null
null
{'https://github.com/ansible/ansible/pull/73487', 'https://bugzilla.redhat.com/show_bug.cgi?id=1925002'}
null
PyPI
PYSEC-2021-491
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`. Eigen code operating on an empty matrix can trigger on an assertion and will cause program termination. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-ph87-fvjr-v33w', 'CVE-2021-29563'}
2021-12-09T06:34:53.142665Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ph87-fvjr-v33w'}
null
PyPI
PYSEC-2022-162
null
Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affected. The issues were fixed in the 4.11.1 release.
{'GHSA-3872-f48p-pxqj', 'CVE-2022-24727'}
2022-03-11T17:35:01.661733Z
2022-03-04T17:15:00Z
null
null
null
{'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj', 'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8'}
null
PyPI
PYSEC-2021-184
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc#L176-L189) assumes the inputs are not empty. If any of these inputs is empty, `.flat<T>()` is an empty buffer, so accessing the element at index 0 is accessing data outside of bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-4fg4-p75j-w5xj', 'CVE-2021-29547'}
2021-08-27T03:22:29.791310Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'}
null
PyPI
PYSEC-2020-70
null
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
{'CVE-2020-15141', 'GHSA-7wgr-7666-7pwj'}
2020-08-20T18:02:00Z
2020-08-14T17:15:00Z
null
null
null
{'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj', 'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746', 'https://pypi.org/project/openapi-python-client', 'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13'}
null
PyPI
GHSA-v7q8-wvvh-c97p
Moderate severity vulnerability that affects Zope2
Cross-site scripting (XSS) vulnerability in Zope 2.8.x before 2.8.12, 2.9.x before 2.9.12, 2.10.x before 2.10.11, 2.11.x before 2.11.6, and 2.12.x before 2.12.3 allows remote attackers to inject arbitrary web script or HTML via vectors related to error messages.
{'CVE-2010-1104'}
2022-03-03T05:13:50.849051Z
2018-07-23T19:51:28Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/37765', 'http://secunia.com/advisories/38007', 'https://github.com/advisories/GHSA-v7q8-wvvh-c97p', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/55599', 'https://nvd.nist.gov/vuln/detail/CVE-2010-1104', 'https://mail.zope.org/pipermail/zope-announce/2010-January/002229.html', 'http://www.osvdb.org/61655', 'http://www.vupen.com/english/advisories/2010/0104'}
null
PyPI
PYSEC-2020-239
null
meinheld prior to 1.0.2 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing.
{'SNYK-PYTHON-MEINHELD-569140', 'CVE-2020-7658'}
2021-08-27T03:22:06.793758Z
2020-05-22T16:15:00Z
null
null
null
{'https://snyk.io/vuln/SNYK-PYTHON-MEINHELD-569140', 'https://github.com/mopemope/meinheld/blob/master/CHANGES.rst,'}
null
PyPI
PYSEC-2021-669
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CHECK_LT` inserted to validate some invariants. When this condition is false, the program aborts, instead of returning a valid error to the user. This abnormal termination can be weaponized in denial of service attacks. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-fphq-gw9m-ghrv', 'CVE-2021-29543'}
2021-12-09T06:35:22.170510Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv', 'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'}
null
PyPI
GHSA-c2fx-8r76-gh36
High severity vulnerability that affects python-gnupg
python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
{'CVE-2013-7323'}
2022-03-03T05:13:09.618274Z
2018-11-06T23:14:22Z
HIGH
null
null
{'http://secunia.com/advisories/56616', 'http://seclists.org/oss-sec/2014/q1/294', 'http://seclists.org/oss-sec/2014/q1/243', 'http://secunia.com/advisories/59031', 'http://seclists.org/oss-sec/2014/q1/244', 'http://www.debian.org/security/2014/dsa-2946', 'https://github.com/advisories/GHSA-c2fx-8r76-gh36', 'https://code.google.com/p/python-gnupg/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7323'}
null
PyPI
PYSEC-2021-26
null
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. Note that the groups feature is not part of the Matrix specification and the chosen maximum lengths are arbitrary. Not all clients might abide by them. Refer to referenced GitHub security advisory for additional details including workarounds.
{'GHSA-jrh7-mhhx-6h88', 'CVE-2021-21393'}
2021-04-21T16:45:00Z
2021-04-12T22:15:00Z
null
null
null
{'https://github.com/matrix-org/synapse/pull/9393', 'https://github.com/matrix-org/synapse/pull/9321', 'https://pypi.org/project/matrix-synapse/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88'}
null
PyPI
PYSEC-2021-393
null
TensorFlow is an open source platform for machine learning. In affected versions if `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-gh8h-7j2j-qv4f', 'CVE-2021-41200'}
2021-11-13T06:52:42.348013Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f', 'https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e', 'https://github.com/tensorflow/tensorflow/issues/46909'}
null
PyPI
PYSEC-2021-239
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `DepthwiseConv` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/depthwise_conv.cc#L287-L288). An attacker can craft a model such that `input`'s fourth dimension would be 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-rf3h-xgv5-2q39', 'CVE-2021-29602'}
2021-08-27T03:22:39.570829Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rf3h-xgv5-2q39'}
null
PyPI
GHSA-84mw-34w6-2q43
Null pointer dereference via invalid Ragged Tensors
### Impact Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference: ```python import tensorflow as tf input_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) filter_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 56, 56, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 23, 1]) ``` ```python import tensorflow as tf input_tensor = tf.constant([], shape=[2, 2, 2, 2, 0], dtype=tf.float32) filter_tensor = tf.constant([], shape=[0, 0, 2, 6, 2], dtype=tf.float32) tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 39, 34, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) ``` The implementation of [`RaggedTensorToVariant` operations](https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6c70380d5313d282d248a776baa1/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L39-L40) does not validate that the ragged tensor argument is non-empty: ```cc int ragged_rank = batched_ragged.ragged_rank(); auto batched_splits_top_vec = batched_ragged.splits(0).vec<SPLIT_TYPE>(); ``` Since `batched_ragged` contains no elements, `batched_ragged.splits` is a null vector, thus `batched_ragged.splits(0)` will result in dereferencing `nullptr`. ### Patches We have patched the issue in GitHub commit [b055b9c474cd376259dde8779908f9eeaf097d93](https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29516'}
2022-03-03T05:14:02.406102Z
2021-05-21T14:20:58Z
LOW
null
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-84mw-34w6-2q43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29516'}
null
PyPI
PYSEC-2013-12
null
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
{'CVE-2013-4435'}
2021-07-05T00:01:25.968572Z
2013-11-05T18:55:00Z
null
null
null
{'http://docs.saltstack.com/topics/releases/0.17.1.html', 'http://www.openwall.com/lists/oss-security/2013/10/18/3'}
null
PyPI
PYSEC-2021-686
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) uses the same index to access two arrays in parallel. Since the user controls the shape of the input arguments, an attacker could trigger a heap OOB access when `parent_output_index` is shorter than `row_split`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-8gv3-57p6-g35r', 'CVE-2021-29560'}
2021-12-09T06:35:25.121902Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r'}
null
PyPI
PYSEC-2017-51
null
Multiple cross-site request forgery (CSRF) vulnerabilities in Zope Management Interface 4.3.7 and earlier, and Plone before 5.x.
{'CVE-2015-7293'}
2021-07-25T23:34:47.925835Z
2017-09-25T21:29:00Z
null
null
null
{'https://plone.org/security/hotfix/20151006', 'http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html', 'https://www.exploit-db.com/exploits/38411/', 'https://pypi.python.org/pypi/plone4.csrffixes'}
null
PyPI
PYSEC-2022-119
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-21740', 'GHSA-44qp-9wwf-734r'}
2022-03-09T00:18:24.990899Z
2022-02-03T15:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273', 'https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3'}
null
PyPI
GHSA-68w8-qjq3-2gfm
Path Traversal in Django
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
{'CVE-2021-33203'}
2022-03-03T05:13:08.484696Z
2021-06-10T17:21:00Z
MODERATE
null
{'CWE-22'}
{'https://github.com/django/django', 'https://groups.google.com/forum/#!forum/django-announce', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33203', 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/', 'https://security.netapp.com/advisory/ntap-20210727-0004/', 'https://github.com/django/django/commit/053cc9534d174dc89daba36724ed2dcb36755b90'}
null
PyPI
PYSEC-2021-405
null
TensorFlow is an open source platform for machine learning. In affected versions the code behind `tf.function` API can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive. This occurs due to using a non-reentrant `Lock` Python object. Loading any model which contains mutually recursive functions is vulnerable. An attacker can cause denial of service by causing users to load such models and calling a recursive `tf.function`, although this is not a frequent scenario. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-h67m-xg8f-fxcf', 'CVE-2021-41213'}
2021-11-13T06:52:44.160284Z
2021-11-05T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf', 'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'}
null
PyPI
PYSEC-2022-36
null
Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher.
{'GHSA-hhm3-48h2-597v', 'CVE-2021-44451'}
2022-03-09T00:15:53.337058Z
2022-02-01T14:15:00Z
null
null
null
{'https://lists.apache.org/thread/xww1pccs2ckb5506wrf1v4lmxg198vkb', 'https://github.com/advisories/GHSA-hhm3-48h2-597v'}
null
PyPI
PYSEC-2019-156
null
The scipy.weave component in SciPy before 0.12.1 creates insecure temporary directories.
{'CVE-2013-4251'}
2021-07-05T00:01:27.093286Z
2019-11-04T20:15:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4251', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120696.html', 'https://github.com/scipy/scipy/commit/bd296e0336420b840fcd2faabb97084fd252a973', 'https://access.redhat.com/security/cve/cve-2013-4251', 'https://security-tracker.debian.org/tracker/CVE-2013-4251', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4251', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119759.html', 'http://www.securityfocus.com/bid/63008', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/88052', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119771.html'}
null
PyPI
PYSEC-2009-1
null
Cross-site scripting (XSS) vulnerability in the waterfall web status view (status/web/waterfall.py) in Buildbot 0.7.6 through 0.7.11p1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
{'CVE-2009-2959'}
2021-07-15T02:22:07.208084Z
2009-08-25T17:30:00Z
null
null
null
{'http://buildbot.net/trac#SecurityAlert', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00978.html', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00985.html', 'http://www.securityfocus.com/bid/36100', 'http://sourceforge.net/mailarchive/message.php?msg_name=42338fbf0908121232mb790a6cn787ac3de90e8bc31%40mail.gmail.com', 'http://www.vupen.com/english/advisories/2009/2352', 'http://secunia.com/advisories/36418', 'http://secunia.com/advisories/36352'}
null
PyPI
GHSA-qjj8-32p7-h289
Division by 0 in `ResourceGather`
### Impact An attacker can trigger a crash via a floating point exception in `tf.raw_ops.ResourceGather`: ```python import tensorflow as tf tensor = tf.constant(value=[[]],shape=(0,1),dtype=tf.uint32) v = tf.Variable(tensor) tf.raw_ops.ResourceGather( resource=v.handle, indices=[0], dtype=tf.uint32, batch_dims=1, validate_indices=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L725-L731) computes the value of a value, `batch_size`, and then divides by it without checking that this value is not 0. ### Patches We have patched the issue in GitHub commit [ac117ee8a8ea57b73d34665cdf00ef3303bc0b11](https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37653'}
2022-03-03T05:13:31.939194Z
2021-08-25T14:43:04Z
MODERATE
null
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289', 'https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11', 'https://github.com/tensorflow/tensorflow/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37653'}
null
PyPI
PYSEC-2021-813
null
TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for the `QuantizeAndDequantizeV*` operations can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41205', 'GHSA-49rx-x2rw-pc6f'}
2021-12-09T06:35:42.034732Z
2021-11-05T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f'}
null
PyPI
GHSA-j2h6-73x8-22c4
Exposure of Sensitive Information to an Unauthorized Actor in ansible
A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.
{'CVE-2020-1746'}
2022-03-03T05:12:55.174649Z
2021-04-20T16:43:53Z
MODERATE
null
{'CWE-200'}
{'https://github.com/ansible/ansible/pull/67866', 'https://github.com/ansible/ansible', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1746', 'https://www.debian.org/security/2021/dsa-4950', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1746'}
null
PyPI
PYSEC-2020-110
null
In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.
{'GHSA-j257-jfvv-h3x5', 'CVE-2020-15251', 'GHSA-23pc-4339-95vg'}
2021-05-04T14:02:00Z
2020-10-13T18:15:00Z
null
null
null
{'https://github.com/MirahezeBots/sopel-channelmgnt/pull/3', 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5', 'https://phab.bots.miraheze.wiki/T117', 'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/', 'https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg'}
null
PyPI
GHSA-m7fm-4jfh-jrg6
Use after free in boosted trees creation
### Impact The implementation for `tf.raw_ops.BoostedTreesCreateEnsemble` can result in a use after free error if an attacker supplies specially crafted arguments: ```python import tensorflow as tf v= tf.Variable([0.0]) tf.raw_ops.BoostedTreesCreateEnsemble( tree_ensemble_handle=v.handle, stamp_token=[0], tree_ensemble_serialized=['0']) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/boosted_trees/resource_ops.cc#L55) uses a reference counted resource and decrements the refcount if the initialization fails, as it should. However, when the code was written, the resource was represented as a naked pointer but later refactoring has changed it to be a smart pointer. Thus, when the pointer leaves the scope, a subsequent `free`-ing of the resource occurs, but this fails to take into account that the refcount has already reached 0, thus the resource has been already freed. During this double-free process, members of the resource object are accessed for cleanup but they are invalid as the entire resource has been freed. ### Patches We have patched the issue in GitHub commit [5ecec9c6fbdbc6be03295685190a45e7eee726ab](https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37652'}
2022-03-03T05:13:39.615885Z
2021-08-25T14:43:07Z
HIGH
null
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37652', 'https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6'}
null
PyPI
PYSEC-2018-62
null
An issue was discovered in aubio 0.4.6. A SEGV signal can occur in aubio_pitch_set_unit in pitch/pitch.c, as demonstrated by aubionotes.
{'CVE-2018-14522'}
2021-08-25T04:29:55.802886Z
2018-07-23T08:29:00Z
null
null
null
{'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00071.html', 'https://github.com/aubio/aubio/issues/188', 'http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00031.html'}
null
PyPI
PYSEC-2013-6
null
Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012.
{'CVE-2012-6081'}
2021-07-05T00:01:22.974248Z
2013-01-03T01:55:00Z
null
null
null
{'http://secunia.com/advisories/51676', 'http://www.debian.org/security/2012/dsa-2593', 'http://www.securityfocus.com/bid/57082', 'http://www.openwall.com/lists/oss-security/2012/12/29/6', 'http://secunia.com/advisories/51696', 'http://moinmo.in/SecurityFixes', 'http://moinmo.in/MoinMoinRelease1.9', 'http://secunia.com/advisories/51663', 'http://www.openwall.com/lists/oss-security/2012/12/30/4', 'https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599', 'http://www.exploit-db.com/exploits/25304', 'http://ubuntu.com/usn/usn-1680-1', 'http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f'}
null
PyPI
PYSEC-2021-110
null
In Plone 5.0 through 5.2.4, Editors are vulnerable to XSS in the folder contents view, if a Contributor has created a folder with a SCRIPT tag in the description field.
{'CVE-2021-35959'}
2021-07-08T03:14:29.124687Z
2021-06-30T01:15:00Z
null
null
null
{'https://plone.org/security/hotfix/20210518/stored-xss-in-folder-contents', 'http://www.openwall.com/lists/oss-security/2021/06/30/2'}
null
PyPI
PYSEC-2021-540
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a heap buffer overflow in Eigen implementation of `tf.raw_ops.BandedTriangularSolve`. The implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L269-L278) calls `ValidateInputTensors` for input validation but fails to validate that the two tensors are not empty. Furthermore, since `OP_REQUIRES` macro only stops execution of current function after setting `ctx->status()` to a non-OK value, callers of helper functions that use `OP_REQUIRES` must check value of `ctx->status()` before continuing. This doesn't happen in this op's implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L219), hence the validation that is present is also not effective. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29612', 'GHSA-2xgj-xhgf-ggjv'}
2021-12-09T06:35:00.791095Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv'}
null
PyPI
GHSA-jrh7-mhhx-6h88
Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints
### Impact Missing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields. ### Patches This issue is fixed by #9321 and #9393. ### Workarounds The groups feature can be disabled (by setting `enable_group_creation` to `False`) to mitigate this issue. Note that it is disabled by default. ### Other information Note that the groups feature is not part of the [Matrix specification](https://matrix.org/docs/spec/) and the chosen maximum lengths are arbitrary. Not all clients might abide by them.
{'CVE-2021-21393'}
2022-03-03T05:13:12.592814Z
2021-04-13T15:12:40Z
MODERATE
null
{'CWE-20'}
{'https://github.com/matrix-org/synapse/pull/9393', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88', 'https://github.com/matrix-org/synapse/pull/9321', 'https://github.com/matrix-org/synapse', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21393', 'https://pypi.org/project/matrix-synapse/'}
null
PyPI
PYSEC-2014-41
null
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (memory consumption) via a large value, related to formatColumns.
{'CVE-2012-5499'}
2021-09-01T08:44:30.342149Z
2014-09-30T14:55:00Z
null
null
null
{'https://plone.org/products/plone/security/advisories/20121106/15', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'http://rhn.redhat.com/errata/RHSA-2014-1194.html'}
null
PyPI
GHSA-vhr6-pvjm-9qwf
User passwords are stored in clear text in the Django session
### Impact django-two-factor-auth versions 1.11 and before store the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password, and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' password are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' password are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis). ### Patches Upgrade to version 1.12 to resolve this issue. After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas. In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used. ### Workarounds Switching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading. ### References For an explanation of why storing cleartext password is a substantial vulnerability: [Hashing Passwords: One-Way Road to Security](https://auth0.com/blog/hashing-passwords-one-way-road-to-security/). For documentation on configuring the Django session storage engine: [Django session documentation](https://docs.djangoproject.com/en/3.0/topics/http/sessions/). ### For more information If you have any questions or comments about this advisory: * Open an issue in [the repo](https://github.com/Bouke/django-two-factor-auth)
{'CVE-2020-15105'}
2022-03-03T05:13:41.560571Z
2020-07-10T20:55:00Z
HIGH
null
{'CWE-312'}
{'https://github.com/Bouke/django-two-factor-auth/security/advisories/GHSA-vhr6-pvjm-9qwf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15105', 'https://github.com/Bouke/django-two-factor-auth/blob/master/CHANGELOG.md#112---2020-07-08', 'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359'}
null
PyPI
PYSEC-2021-794
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc). There is no check that the divisor tensor does not contain zero elements. We have patched the issue in GitHub commit 1e206baedf8bef0334cca3eb92bab134ef525a28. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37683', 'GHSA-rhrq-64mq-hf9h'}
2021-12-09T06:35:39.607152Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h', 'https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28'}
null
PyPI
PYSEC-2022-4
null
The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.
{'GHSA-r478-c2pc-m7gx', 'CVE-2022-22846'}
2022-01-10T17:03:19.898330Z
2022-01-10T14:12:00Z
null
null
null
{'https://github.com/paulc/dnslib/issues/30', 'https://github.com/advisories/GHSA-r478-c2pc-m7gx'}
null
PyPI
GHSA-f7qw-5fgj-247x
Cross-site Scripting and Open Redirect in plone.app.contenttypes
### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Usually only anonymous users are affected, but this depends on your cache settings. ### Patches New versions of plone.app.contenttypes have been released. Version 2.2.3 works on Plone 5.2 and will be included in Plone 5.2.7. Version 3.0.0a9 works on Plone 6 and will be included in Plone 6.0.0a3. Note that the Products.CMFPlone package has the same problem in the 4.3 series. In Plone 5.0-5.2, the default Products.ATContentTypes version has the same problem. See [advisory](https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh). For all unpatched versions of the three packages, you can use the following workaround. ### Workaround Make sure the image_view_fullscreen page is not stored in the cache. In Plone: * Login as Manager and go to Site Setup. * Go to the 'Caching' control panel. If this does not exist, or 'Enable caching' is not checked, you should normally not be vulnerable. * Click on the tab 'Caching operations'. * Under 'Legacy template mappings' locate the ruleset 'Content item view'. * From the last column ('Templates') remove 'image_view_fullscreen'. * Click on Save. ### Reporter This vulnerability was responsibly disclosed to the Plone Security Team by Gustav Hansen, F-Secure Consulting. Thank you! ### For more information If you have any questions or comments about this advisory, email us at [security@plone.org](mailto:security@plone.org) This is also the correct address to use when you want to report a possible vulnerability. See [our security report policy](https://plone.org/security/report).
null
2022-03-03T05:13:46.619537Z
2022-02-01T00:48:35Z
MODERATE
null
{'CWE-601', 'CWE-79'}
{'https://github.com/plone/plone.app.contenttypes', 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh', 'https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x'}
null
PyPI
PYSEC-2021-71
null
In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.
{'CVE-2020-35655', 'GHSA-hf64-x4gq-p99h'}
2021-01-29T00:46:00Z
2021-01-12T09:15:00Z
null
null
null
{'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://github.com/advisories/GHSA-hf64-x4gq-p99h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}
null
PyPI
GHSA-xpm8-98mx-h4c5
Critical severity vulnerability that affects MLAlchemy
An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
{'CVE-2017-16615'}
2022-03-22T20:47:02.968039Z
2018-07-13T16:01:07Z
CRITICAL
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16615', 'https://github.com/thanethomson/MLAlchemy/commit/bc795757febdcce430d89f9d08f75c32d6989d3c', 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16615-critical-restful-web-applications-vulnerability/', 'https://github.com/thanethomson/MLAlchemy/issues/1', 'https://github.com/advisories/GHSA-xpm8-98mx-h4c5', 'https://github.com/thanethomson/MLAlchemy'}
null
PyPI
GHSA-g8q7-xv52-hf9f
Feedgen Vulnerable to XML Denial of Service Attacks
### Impact The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to [XML Denial of Service Attacks](https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses) (e.g. XML Bomb). This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only. ### Patches This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources. ### Workarounds Updating is strongly recommended and should not be problematic. Nevertheless, as a workaround, avoid providing XML directly to feedgen or ensure that no entity expansion is part of the XML. ### References - [Security Briefs - XML Denial of Service Attacks and Defenses](https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses) - [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack#cite_note-2) ### For more information If you have any questions or comments about this advisory: - Open an issue in [lkiesow/python-feedgen](https://github.com/lkiesow/python-feedgen/issues) - Send an email to security@lkiesow.de
{'CVE-2020-5227'}
2022-03-03T05:14:08.476905Z
2020-01-28T22:37:50Z
HIGH
null
{'CWE-776'}
{'https://github.com/lkiesow/python-feedgen/security/advisories/GHSA-g8q7-xv52-hf9f', 'https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5227', 'https://github.com/lkiesow/python-feedgen/commit/f57a01b20fa4aaaeccfa417f28e66b4084b9d0cf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6I5ENUYGFNMIH6ZQ62FZ6VU2WD3SIOI/'}
null
PyPI
GHSA-9q2p-fj49-vpxj
In marshmallow library the schema "only" option treats an empty list as implying no "only" option
In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema "only" option treats an empty list as implying no "only" option, which allows a request that was intended to expose no fields to instead expose all fields (if the schema is being filtered dynamically using the "only" option, and there is a user role that produces an empty value for "only").
{'CVE-2018-17175'}
2022-04-26T18:48:01.175170Z
2018-10-10T16:10:46Z
MODERATE
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17175', 'https://github.com/marshmallow-code/marshmallow/issues/772', 'https://github.com/advisories/GHSA-9q2p-fj49-vpxj', 'https://github.com/marshmallow-code', 'https://github.com/marshmallow-code/marshmallow/pull/782', 'https://github.com/marshmallow-code/marshmallow/pull/777'}
null
PyPI
GHSA-wq8f-wvqp-xvvm
Integer Overflow or Wraparound in OpenCV
In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function PxMDecoder::readData has an integer overflow when calculate src_pitch. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier.
{'CVE-2017-12863'}
2022-03-03T05:13:34.468890Z
2021-10-12T22:02:35Z
HIGH
null
{'CWE-190'}
{'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9371', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://security.gentoo.org/glsa/201712-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12863', 'https://github.com/opencv/opencv/pull/9376', 'https://github.com/opencv/opencv-python'}
null
PyPI
PYSEC-2019-228
null
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of service via an invalid GIF file.
{'CVE-2019-9635'}
2021-08-27T03:22:22.500832Z
2019-04-24T17:29:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-001.md'}
null
PyPI
PYSEC-2020-281
null
In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, the code is prone to heap buffer overflow. If `split_values` does not end with a value at least `num_values` then the `while` loop condition will trigger a read outside of the bounds of `split_values` once `batch_idx` grows too large. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1.
{'CVE-2020-15201', 'GHSA-p5f8-gfw5-33w4'}
2021-12-09T06:34:41.679840Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4'}
null
PyPI
PYSEC-2019-18
null
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
{'GHSA-wh4h-v3f2-r2pp', 'CVE-2019-6975'}
2020-08-24T17:37:00Z
2019-02-11T13:29:00Z
null
null
null
{'https://www.openwall.com/lists/oss-security/2019/02/11/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/', 'https://usn.ubuntu.com/3890-1/', 'https://seclists.org/bugtraq/2019/Jul/10', 'https://www.djangoproject.com/weblog/2019/feb/11/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/', 'https://www.debian.org/security/2019/dsa-4476', 'https://github.com/advisories/GHSA-wh4h-v3f2-r2pp', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ', 'http://www.securityfocus.com/bid/106964'}
null
PyPI
GHSA-hjmq-236j-8m87
Denial of service in tensorflow-lite
### Impact In TensorFlow Lite models using segment sum can trigger a denial of service by causing an out of memory allocation in the implementation of segment sum. Since code uses the last element of the tensor holding them to determine the dimensionality of output tensor, attackers can use a very large value to trigger a large allocation: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/segment_sum.cc#L39-L44 ### Patches We have patched the issue in 204945b and will release patch releases for all affected versions. We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1. ### Workarounds A potential workaround would be to add a custom `Verifier` to limit the maximum value in the segment ids tensor. This only handles the case when the segment ids are stored statically in the model, but a similar validation could be done if the segment ids are generated at runtime, between inference steps. However, if the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been discovered from a variant analysis of [GHSA-p2cq-cprg-frvm](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm).
{'CVE-2020-15213'}
2021-08-26T15:19:56Z
2020-09-25T18:28:53Z
MODERATE
null
{'CWE-119', 'CWE-770'}
{'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a', 'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15213', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hjmq-236j-8m87'}
null
PyPI
PYSEC-2021-281
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations). The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr. We have patched the issue in GitHub commit 93f428fd1768df147171ed674fee1fc5ab8309ec. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37659', 'GHSA-q3g3-h9r4-prrc'}
2021-08-27T03:22:44.808272Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc', 'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec'}
null
PyPI
GHSA-8r7c-3cm2-3h8f
Memory leak in Tensorflow
### Impact If a graph node is invalid, TensorFlow can leak memory in the [implementation of `ImmutableExecutorState::Initialize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262): ```cc Status s = params_.create_kernel(n->properties(), &item->kernel); if (!s.ok()) { item->kernel = nullptr; s = AttachDef(s, *n); return s; } ``` Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak. ### Patches We have patched the issue in GitHub commit [c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd](https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23578'}
2022-03-03T05:12:43.766858Z
2022-02-10T00:33:13Z
MODERATE
null
{'CWE-401'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23578', 'https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8r7c-3cm2-3h8f', 'https://github.com/tensorflow/tensorflow/'}
null
PyPI
PYSEC-2022-61
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount` operations allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail. There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-21737', 'GHSA-f2vv-v9cg-qhh7'}
2022-03-09T00:17:31.433747Z
2022-02-03T14:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc', 'https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7'}
null
PyPI
PYSEC-2021-452
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/496c2630e51c1a478f095b084329acedb253db6b/tensorflow/core/kernels/conv_grad_shape_utils.cc#L130) does a modulus operation where the divisor is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-r4pj-74mg-8868', 'CVE-2021-29524'}
2021-12-09T06:34:47.095784Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868', 'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'}
null
PyPI
PYSEC-2014-16
null
Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the @action parameter to support/issue1.
{'CVE-2012-6131'}
2021-07-05T00:01:25.823373Z
2014-04-11T15:55:00Z
null
null
null
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/84190', 'https://bugzilla.redhat.com/show_bug.cgi?id=722672', 'https://pypi.python.org/pypi/roundup/1.4.20', 'http://www.openwall.com/lists/oss-security/2013/02/13/8', 'http://issues.roundup-tracker.org/issue2550711', 'http://www.openwall.com/lists/oss-security/2012/11/10/2'}
null
PyPI
PYSEC-2021-517
null
TensorFlow is an end-to-end open source platform for machine learning. The reference implementation of the `GatherNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966). An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-3w67-q784-6w7c', 'CVE-2021-29589'}
2021-12-09T06:34:57.180094Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3w67-q784-6w7c'}
null
PyPI
GHSA-hg4c-rgvm-964g
SQL Injection in pycsw
A SQL injection vulnerability in pycsw all versions before 2.0.2, 1.10.5 and 1.8.6 that leads to read and extract of any data from any table in the pycsw database that the database user has access to. Also on PostgreSQL (at least) it is possible to perform updates/inserts/deletes and database modifications to any table the database user has access to.
{'CVE-2016-8640'}
2022-03-23T18:30:05.643922Z
2018-08-15T20:02:53Z
CRITICAL
null
{'CWE-89'}
{'http://seclists.org/oss-sec/2016/q4/406', 'https://github.com/geopython/pycsw/pull/474/files', 'https://github.com/geopython/pycsw', 'https://github.com/advisories/GHSA-hg4c-rgvm-964g', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8640', 'https://patch-diff.githubusercontent.com/raw/geopython/pycsw/pull/474.patch', 'http://www.securityfocus.com/bid/94302'}
null
PyPI
PYSEC-2021-147
null
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
{'CVE-2021-25925', 'GHSA-rmp7-f2vp-3rq4'}
2021-08-27T03:22:21.507681Z
2021-04-12T14:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-rmp7-f2vp-3rq4', 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925'}
null