ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
PyPI
GHSA-4278-2v5v-65r4
Heap buffer overflow in `RaggedBinCount`
### Impact If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow: ```python import tensorflow as tf tf.raw_ops.RaggedBincount(splits=[0], values=[1,1,1,1,1], size=5, weights=[1,2,3,4], binary_output=False) ``` This will cause a read from outside the bounds of the `splits` tensor buffer in the [implementation of the `RaggedBincount` op](https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L433): ```cc for (int idx = 0; idx < num_values; ++idx) { while (idx >= splits(batch_idx)) { batch_idx++; } ... } ``` Before the `for` loop, `batch_idx` is set to 0. The user controls the `splits` array, making it contain only one element, 0. Thus, the code in the `while` loop would increment `batch_idx` and then try to read `splits(1)`, which is outside of bounds. ### Patches We have patched the issue in GitHub commit [eebb96c2830d48597d055d247c0e9aebaea94cd5](https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29512'}
2022-03-03T05:13:33.208875Z
2021-05-21T14:20:40Z
LOW
null
{'CWE-120', 'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4278-2v5v-65r4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29512', 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'}
null
PyPI
PYSEC-2018-35
null
aio-libs aiohttp-session version 2.6.0 and earlier contains a Other/Unknown vulnerability in EncryptedCookieStorage and NaClCookieStorage that can result in Non-expiring sessions / Infinite lifespan. This attack appear to be exploitable via Recreation of a cookie post-expiry with the same value.
{'CVE-2018-1000814', 'GHSA-mr4x-c4v9-x729'}
2021-07-02T02:41:32.834524Z
2018-12-20T15:29:00Z
null
null
null
{'https://github.com/aio-libs/aiohttp-session/pull/331', 'https://github.com/advisories/GHSA-mr4x-c4v9-x729', 'https://github.com/aio-libs/aiohttp-session/issues/325'}
null
PyPI
PYSEC-2020-147
null
TUF (aka The Update Framework) through 0.12.1 has Improper Verification of a Cryptographic Signature.
{'GHSA-pwqf-9h7j-7mv8', 'CVE-2020-6174'}
2020-02-07T19:19:00Z
2020-02-05T16:15:00Z
null
null
null
{'https://github.com/theupdateframework/tuf/pull/974', 'https://github.com/advisories/GHSA-pwqf-9h7j-7mv8'}
null
PyPI
GHSA-rfw2-x9f8-2f6m
Cross-Site Scripting
LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
{'CVE-2021-26722'}
2022-03-03T05:13:54.478783Z
2021-04-30T17:27:53Z
MODERATE
null
{'CWE-79'}
{'https://github.com/linkedin/oncall/issues/341', 'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225', 'https://pypi.org/project/oncall/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26722'}
null
PyPI
PYSEC-2017-1
null
The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack.
{'CVE-2017-12852'}
2021-06-29T22:52:17.919949Z
2017-08-15T16:29:00Z
null
null
null
{'https://github.com/BT123/testcasesForMyRequest/tree/master/CVE-2017-12852', 'https://github.com/numpy/numpy/issues/9560#issuecomment-322395292'}
null
PyPI
PYSEC-2021-844
null
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. This is similar to CVE-2021-29584 (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the implementation (both on CPU and GPU) computes the output shape using `AddDim`. However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use `AddDimWithStatus`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-cq76-mxrc-vchh', 'CVE-2021-41195'}
2021-12-13T06:20:24.247166Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/pull/51733', 'https://github.com/tensorflow/tensorflow/issues/46888', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'}
null
PyPI
GHSA-fwf6-rw69-hhj4
Improper Neutralization of Formula Elements in a CSV File in html-2-csv
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via CSV files.
{'CVE-2021-23654'}
2021-12-01T14:33:13Z
2021-11-30T22:22:16Z
MODERATE
null
{'CWE-1236'}
{'https://snyk.io/vuln/SNYK-PYTHON-HTMLTOCSV-1582784', 'https://github.com/hanwentao/html2csv', 'https://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23654'}
null
PyPI
PYSEC-2020-278
null
In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel. Thus, a shape mismatch can result in accesses outside the bounds of heap allocated buffers. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1.
{'CVE-2020-15198', 'GHSA-jc87-6vpp-7ff3'}
2021-12-09T06:34:41.523521Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
null
PyPI
PYSEC-2021-628
null
TensorFlow is an open source platform for machine learning. In affected versions the code for sparse matrix multiplication is vulnerable to undefined behavior via binding a reference to `nullptr`. This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor should be allocated (to conserve the invariant that output tensors are always allocated when the operation is successful) but nothing should be written to it (that is, we should return early from the kernel implementation). Otherwise, attempts to write to this empty tensor would result in heap OOB access. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41219', 'GHSA-4f99-p9c2-3j8x'}
2021-12-09T06:35:10.275299Z
2021-11-05T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x', 'https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae'}
null
PyPI
PYSEC-2021-67
null
JupyterHub 1.1.0 allows CSRF in the admin panel via a request that lacks an _xsrf field, as demonstrated by a /hub/api/user request (to add or remove a user account).
{'CVE-2020-36191'}
2021-01-19T19:58:00Z
2021-01-13T04:15:00Z
null
null
null
{'https://github.com/jupyterhub/jupyterhub/issues/3304', 'https://github.com/jupyterhub/jupyterhub/releases'}
null
PyPI
PYSEC-2021-278
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/ragged_tensor_to_sparse_kernel.cc#L30) has an incomplete validation of the splits values: it does not check that they are in increasing order. We have patched the issue in GitHub commit 1071f554dbd09f7e101324d366eec5f4fe5a3ece. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-4xfp-4pfp-89wg', 'CVE-2021-37656'}
2021-08-27T03:22:44.528249Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg'}
null
PyPI
PYSEC-2021-782
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.Map*` and `tf.raw_ops.OrderedMap*` operations. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L222-L248) has a check in place to ensure that `indices` is in ascending order, but does not check that `indices` is not empty. We have patched the issue in GitHub commit 532f5c5a547126c634fefd43bbad1dc6417678ac. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37671', 'GHSA-qr82-2c78-4m8h'}
2021-12-09T06:35:38.525134Z
2021-08-12T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h', 'https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac'}
null
PyPI
PYSEC-2021-297
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions most implementations of convolution operators in TensorFlow are affected by a division by 0 vulnerability where an attacker can trigger a denial of service via a crash. The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/framework/common_shape_fns.cc#L577) is missing several validations before doing divisions and modulo operations. We have patched the issue in GitHub commit 8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37675', 'GHSA-9c8h-2mv3-49ww'}
2021-08-27T03:22:46.293986Z
2021-08-12T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww'}
null
PyPI
GHSA-7vvr-h4p5-m7fh
NULL Pointer Dereference in aubio
aubio v0.4.0 to v0.4.8 has a NULL pointer dereference in new_aubio_filterbank
{'CVE-2018-19801'}
2022-03-03T05:14:17.642480Z
2019-07-26T16:10:20Z
HIGH
null
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19801', 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog'}
null
PyPI
GHSA-gc9g-67cq-p7v4
Server-Side Request Forgery in Plone
Plone though 5.2.4 allows SSRF via the lxml parser. This affects Diazo themes, Dexterity TTW schemas, and modeleditors in plone.app.theming, plone.app.dexterity, and plone.supermodel.
{'CVE-2021-33511'}
2022-03-03T05:13:53.663299Z
2021-06-15T16:12:04Z
HIGH
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33511', 'https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-lxml-parser', 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}
null
PyPI
PYSEC-2021-88
null
Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
{'GHSA-962m-m8jw-8wrr', 'GHSA-5pr9-v234-jw36', 'CVE-2021-32633'}
2021-06-02T03:47:57.190321Z
2021-05-21T14:15:00Z
null
null
null
{'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://github.com/advisories/GHSA-962m-m8jw-8wrr', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'http://www.openwall.com/lists/oss-security/2021/05/21/1'}
null
PyPI
PYSEC-2020-297
null
In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to default initialize the quantized floating point types in Eigen. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
{'GHSA-qhxx-j73r-qpm2', 'CVE-2020-26266'}
2021-12-09T06:34:44.221678Z
2020-12-10T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhxx-j73r-qpm2'}
null
PyPI
GHSA-gg84-qgv9-w4pq
CRLF injection in httplib2
### Impact Attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. Impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. ### Patches Problem has been fixed in 0.18.0 Space, CR, LF characters are now quoted before any use. This solution should not impact any valid usage of httplib2 library, that is uri constructed by urllib. ### Workarounds Create URI with `urllib.parse` family functions: `urlencode`, `urlunsplit`. ```diff user_input = " HTTP/1.1\r\ninjected: attack\r\nignore-http:" -uri = "https://api.server/?q={}".format(user_input) +uri = urllib.parse.urlunsplit(("https", "api.server", "/v1", urllib.parse.urlencode({"q": user_input}), "")) http.request(uri) ``` ### References https://cwe.mitre.org/data/definitions/93.html https://docs.python.org/3/library/urllib.parse.html Thanks to Recar https://github.com/Ciyfly for finding vulnerability and discrete notification. ### For more information If you have any questions or comments about this advisory: * Open an issue in [httplib2](https://github.com/httplib2/httplib2/issues/new) * Email [current maintainer at 2020-05](mailto:temotor@gmail.com)
{'CVE-2020-11078'}
2022-03-03T05:13:27.348443Z
2020-05-20T15:55:47Z
LOW
null
{'CWE-93'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZJ3D6JSM7CFZESZZKGUW2VX55BOSOXI/', 'https://lists.apache.org/thread.html/rad8872fc99f670958c2774e2bf84ee32a3a0562a0c787465cf3dfa23@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r4d35dac106fab979f0db75a07fc4e320ad848b722103e79667ff99e1@%3Cissues.beam.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00000.html', 'https://lists.apache.org/thread.html/rc9eff9572946142b657c900fe63ea4bbd3535911e8d4ce4d08fe4b89@%3Ccommits.allura.apache.org%3E', 'https://lists.apache.org/thread.html/r69a462e690b5f2c3d418a288a2c98ae764d58587bd0b5d6ab141f25f@%3Cissues.beam.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11078', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXCX2AWROGWGY5GXR7VN3BKF34A2FO6J/', 'https://lists.apache.org/thread.html/r23711190c2e98152cb6f216b95090d5eeb978543bb7e0bad22ce47fc@%3Cissues.beam.apache.org%3E', 'https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e', 'https://github.com/httplib2/httplib2/security/advisories/GHSA-gg84-qgv9-w4pq', 'https://lists.apache.org/thread.html/r7f364000066748299b331b615ba51c62f55ab5b201ddce9a22d98202@%3Cissues.beam.apache.org%3E'}
null
PyPI
PYSEC-2017-10
null
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
{'CVE-2017-7234', 'GHSA-h4hv-m4h4-mhwg'}
2021-07-05T00:01:20.782735Z
2017-04-04T17:59:00Z
null
null
null
{'http://www.securitytracker.com/id/1038177', 'http://www.debian.org/security/2017/dsa-3835', 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg', 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/', 'http://www.securityfocus.com/bid/97401'}
null
PyPI
GHSA-8fxw-76px-3rxv
Memory leak in Tensorflow
### Impact If a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L100-L104 The allocated memory is from https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L256 The issue occurs because the `status` argument during validation failures is not properly checked: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267 Since each of the above methods can return an error status, the `status` value must be checked before continuing. ### Patches We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v).
{'CVE-2020-15192'}
2021-08-26T15:09:35Z
2020-09-25T18:28:17Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15192', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}
null
PyPI
PYSEC-2022-158
null
Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-fpcp-9h7m-ffpx', 'CVE-2022-23595'}
2022-03-09T00:18:30.220756Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104'}
null
PyPI
PYSEC-2021-444
null
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference. The implementation of `RaggedTensorToVariant` operations(https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6c70380d5313d282d248a776baa1/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L39-L40) does not validate that the ragged tensor argument is non-empty. Since `batched_ragged` contains no elements, `batched_ragged.splits` is a null vector, thus `batched_ragged.splits(0)` will result in dereferencing `nullptr`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-84mw-34w6-2q43', 'CVE-2021-29516'}
2021-12-09T06:34:45.869282Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-84mw-34w6-2q43', 'https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93'}
null
PyPI
PYSEC-2022-77
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-23568', 'GHSA-6445-fm66-fvq2'}
2022-03-09T00:17:33.439630Z
2022-02-03T12:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6445-fm66-fvq2', 'https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c'}
null
PyPI
GHSA-frxx-2m33-6wcr
Improper Restriction of Operations within the Bounds of a Memory Buffer in Google TensorFlow
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute arbitrary code (local).
{'CVE-2018-8825'}
2022-03-03T05:11:40.011680Z
2019-04-24T16:11:30Z
HIGH
null
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8825', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-003.md'}
null
PyPI
GHSA-2rcm-phc9-3945
Moderate severity vulnerability that affects pyopenssl
Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
{'CVE-2018-1000808'}
2022-03-03T05:14:02.870494Z
2018-10-10T16:10:23Z
MODERATE
null
{'CWE-404'}
{'https://access.redhat.com/errata/RHSA-2019:0085', 'https://github.com/advisories/GHSA-2rcm-phc9-3945', 'https://usn.ubuntu.com/3813-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000808', 'https://github.com/pyca/pyopenssl/pull/723', 'https://github.com/pyca/pyopenssl', 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html'}
null
PyPI
PYSEC-2019-117
null
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
{'CVE-2019-17626'}
2020-07-27T03:15:00Z
2019-10-16T12:15:00Z
null
null
null
{'https://usn.ubuntu.com/4273-1/', 'https://access.redhat.com/errata/RHSA-2020:0230', 'https://www.debian.org/security/2020/dsa-4663', 'https://access.redhat.com/errata/RHSA-2020:0195', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZPHP2BJSTP4IYCSJRQINP763IHO6ASL/', 'https://access.redhat.com/errata/RHSA-2020:0197', 'https://access.redhat.com/errata/RHSA-2020:0201', 'https://security.gentoo.org/glsa/202007-35', 'https://bitbucket.org/rptlab/reportlab/src/default/CHANGES.md', 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00002.html', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00019.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSCTOE3DITFICY2XKBYZ5WAF5TSQ52DM/', 'https://bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remote-code'}
null
PyPI
GHSA-f5gc-p5m3-v347
XXE in petl
### Impact Information Disclosure ### Summary [petl](https://github.com/petl-developers/petl) is a Python library that provides functions for extraction, transformation, and loading (ETL) of data. petl before 1.68, in some configurations, allows resolution of entities in XML input. An attacker who is able to submit XML input to an application using petl can disclose arbitrary files on the file system in the context of the user under which the application is running. ### Affected Applications Applications that: - accept attacker-supplied XML input that is processed using petl < 1.68 - return the response generated by petl back to the attacker - configure lxml as the underlying XML processing library used by petl - have read privileges in filesystem files with sensitive information ### Mitigation Update to petl >= 1.68 ### Workarounds - Assure there is no user/external access to the application using [petl](https://github.com/petl-developers/petl) - Assure your application is not using the function [fromxml()](https://petl.readthedocs.io/en/stable/io.html#petl.io.xml.fromxml) ### References - https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md - https://github.com/petl-developers/petl/pull/527 - https://github.com/petl-developers/petl/releases/tag/v1.6.8 - https://petl.readthedocs.io/en/stable/changes.html - https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing ### For more information If you have any questions or comments about this advisory: * Add a comment in the Github [issue](https://github.com/petl-developers/petl/pull/527) Thaks to Naveen Sunkavally.
null
2022-03-03T05:13:07.975382Z
2020-12-02T18:28:30Z
LOW
null
{'CWE-611'}
{'https://github.com/petl-developers/petl/pull/527', 'https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing', 'https://github.com/petl-developers/petl/releases/tag/v1.6.8', 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347', 'https://petl.readthedocs.io/en/stable/changes.html'}
null
PyPI
PYSEC-2012-2
null
The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.
{'CVE-2012-3442'}
2021-07-05T00:01:18.211806Z
2012-07-31T17:55:00Z
null
null
null
{'http://www.debian.org/security/2012/dsa-2529', 'http://www.mandriva.com/security/advisories?name=MDVSA-2012:143', 'http://www.openwall.com/lists/oss-security/2012/07/31/1', 'http://www.ubuntu.com/usn/USN-1560-1', 'http://www.openwall.com/lists/oss-security/2012/07/31/2', 'https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/'}
null
PyPI
GHSA-634c-v2xv-ffpg
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12597.
{'CVE-2017-14136'}
2022-03-03T05:13:23.497420Z
2021-10-12T22:02:51Z
MODERATE
null
{'CWE-787'}
{'https://github.com/opencv/opencv/pull/9448', 'https://github.com/opencv/opencv/issues/9443', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14136', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/opencv/opencv-python'}
null
PyPI
PYSEC-2008-5
null
Cross-site scripting (XSS) vulnerability in the wiki engine in Trac before 0.10.5 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
{'CVE-2008-3328'}
2021-07-16T01:31:34.385513Z
2008-07-27T22:41:00Z
null
null
null
{'https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html', 'http://www.vupen.com/english/advisories/2008/2223/references', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/44016', 'http://secunia.com/advisories/31231', 'http://trac.edgewall.org/wiki/ChangeLog', 'http://secunia.com/advisories/31314', 'http://www.securityfocus.com/bid/30400', 'https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html'}
null
PyPI
PYSEC-2020-151
null
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
{'GHSA-f97h-2pfx-f59f', 'CVE-2020-7695', 'SNYK-PYTHON-UVICORN-570471'}
2020-07-29T19:15:00Z
2020-07-27T12:15:00Z
null
null
null
{'https://github.com/encode/uvicorn', 'https://github.com/advisories/GHSA-f97h-2pfx-f59f', 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471'}
null
PyPI
PYSEC-2018-23
null
Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.
{'CVE-2018-1000807', 'GHSA-p28m-34f6-967q'}
2021-06-10T06:50:39.370732Z
2018-10-08T15:29:00Z
null
null
null
{'https://access.redhat.com/errata/RHSA-2019:0085', 'https://github.com/advisories/GHSA-p28m-34f6-967q', 'https://usn.ubuntu.com/3813-1/', 'https://github.com/pyca/pyopenssl/pull/723', 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html'}
null
PyPI
PYSEC-2022-98
null
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect. We have a similar issue during `IsIdentityConsumingSwitch`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-23589', 'GHSA-9px9-73fg-3fqp'}
2022-03-09T00:17:36.051133Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497', 'https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74', 'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf'}
null
PyPI
PYSEC-2021-151
null
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` argument of `RaggedBincount` does not specify a valid `SparseTensor`(https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow. This will cause a read from outside the bounds of the `splits` tensor buffer in the implementation of the `RaggedBincount` op(https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L446). Before the `for` loop, `batch_idx` is set to 0. The attacker sets `splits(0)` to be 7, hence the `while` loop does not execute and `batch_idx` remains 0. This then results in writing to `out(-1, bin)`, which is before the heap allocated buffer for the output tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected.
{'CVE-2021-29514', 'GHSA-8h46-5m9h-7553'}
2021-08-27T03:22:23.861341Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553', 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'}
null
PyPI
PYSEC-2021-501
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0. The implementation(https://github.com/tensorflow/tensorflow/blob/279bab6efa22752a2827621b7edb56a730233bd8/tensorflow/core/kernels/maxpooling_op.cc#L1033-L1034) fails to validate that the batch dimension of the tensor is non-zero, before dividing by this quantity. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-9vpm-rcf4-9wqw', 'CVE-2021-29573'}
2021-12-09T06:34:54.700321Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw', 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'}
null
PyPI
GHSA-cjvr-mfj7-j4j8
Incorrect Authorization and Exposure of Sensitive Information to an Unauthorized Actor in scrapy
### Impact If you manually define cookies on a [`Request`](https://docs.scrapy.org/en/latest/topics/request-response.html#scrapy.http.Request) object, and that `Request` object gets a redirect response, the new `Request` object scheduled to follow the redirect keeps those user-defined cookies, regardless of the target domain. ### Patches Upgrade to Scrapy 2.6.0, which resets cookies when creating `Request` objects to follow redirects¹, and drops the ``Cookie`` header if manually-defined if the redirect target URL domain name does not match the source URL domain name². If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.6.0 is not an option, you may upgrade to Scrapy 1.8.2 instead. ¹ At that point the original, user-set cookies have been processed by the cookie middleware into the global or request-specific cookiejar, with their domain restricted to the domain of the original URL, so when the cookie middleware processes the new (redirect) request it will incorporate those cookies into the new request as long as the domain of the new request matches the domain of the original request. ² This prevents cookie leaks to unintended domains even if the cookies middleware is not used. ### Workarounds If you cannot upgrade, set your cookies using a list of dictionaries instead of a single dictionary, as described in the [`Request` documentation](https://docs.scrapy.org/en/latest/topics/request-response.html#scrapy.http.Request), and set the right domain for each cookie. Alternatively, you can [disable cookies altogether](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#std-setting-COOKIES_ENABLED), or [limit target domains](https://docs.scrapy.org/en/latest/topics/spiders.html#scrapy.spiders.Spider.allowed_domains) to domains that you trust with all your user-set cookies. ### References * Originally reported at [huntr.dev](https://huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585/) ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy/scrapy/issues) * [Email us](mailto:opensource@zyte.com)
{'CVE-2022-0577'}
2022-04-05T19:00:24.954658Z
2022-03-01T22:12:47Z
MODERATE
null
{'CWE-863', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0577', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html', 'https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2022-159.yaml', 'https://huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585', 'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8', 'https://github.com/scrapy/scrapy'}
null
PyPI
GHSA-92vm-mxjf-jqf3
Improper Verification of Cryptographic Signature in starkbank-ecdsa
The `verify` function in the Stark Bank Python ECDSA library (starkbank-ecdsa) 2.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
{'CVE-2021-43572'}
2022-03-29T22:16:59.824727Z
2021-11-10T20:41:39Z
CRITICAL
null
{'CWE-347'}
{'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-python', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43572', 'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1'}
null
PyPI
GHSA-pwqf-9h7j-7mv8
Incorrect threshold signature computation in TUF
### Impact Metadadata signature verification, as used in `tuf.client.updater`, counted each of multiple signatures with identical authorized keyids separately towards the threshold. Therefore, an attacker with access to a valid signing key could create multiple valid signatures in order to meet the minimum threshold of keys before the metadata was considered valid. The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue. ### Patches A [fix](https://github.com/theupdateframework/tuf/pull/974) is available in version [0.12.2](https://github.com/theupdateframework/tuf/releases/tag/v0.12.2) or newer. ### Workarounds No workarounds are known for this issue. ### References * [CVE-2020-6174](https://nvd.nist.gov/vuln/detail/CVE-2020-6174) * Pull request resolving the issue [PR 974](https://github.com/theupdateframework/tuf/pull/974)
{'CVE-2020-6174'}
2022-03-23T23:15:05.623162Z
2020-08-21T16:25:26Z
CRITICAL
null
{'CWE-347'}
{'https://github.com/theupdateframework/tuf', 'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e', 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-pwqf-9h7j-7mv8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6174', 'https://github.com/theupdateframework/tuf/pull/974'}
null
PyPI
PYSEC-2021-385
null
EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`.
{'CVE-2021-39182', 'GHSA-35m5-8cvj-8783'}
2021-11-09T21:27:02.006228Z
2021-11-08T15:15:00Z
null
null
null
{'https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783', 'https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce'}
null
PyPI
PYSEC-2021-30
null
OctoPrint before 1.6.0 allows XSS because API error messages include the values of input parameters.
{'CVE-2021-32561'}
2021-05-11T15:18:00Z
2021-05-11T14:15:00Z
null
null
null
{'https://www.brzozowski.io', 'https://octoprint.org/blog/2021/04/27/new-release-1.6.0/', 'https://github.com/OctoPrint/OctoPrint/releases/tag/1.6.0'}
null
PyPI
GHSA-gwcx-jrx4-92w2
Segfault in `simplifyBroadcast` in Tensorflow
### Impact The [`simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/mlir/tfrt/jit/transforms/tf_cpurt_symbolic_shape_optimization.cc#L149-L205) is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. ```cc size_t maxRank = 0; for (auto shape : llvm::enumerate(shapes)) { auto found_shape = analysis.dimensionsForShapeTensor(shape.value()); if (!found_shape) return {}; shapes_found.push_back(*found_shape); maxRank = std::max(maxRank, found_shape->size()); } SmallVector<const ShapeComponentAnalysis::SymbolicDimension*> joined_dimensions(maxRank); ``` If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. ### Patches We have patched the issue in GitHub commit [35f0fabb4c178253a964d7aabdbb15c6a398b69a](https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a). The fix will be included in TensorFlow 2.8.0. This is the only affected version. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23593'}
2022-03-28T19:45:16.566211Z
2022-02-09T23:32:08Z
HIGH
null
{'CWE-754'}
{'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gwcx-jrx4-92w2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23593', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/mlir/tfrt/jit/transforms/tf_cpurt_symbolic_shape_optimization.cc#L149-L205', 'https://github.com/tensorflow/tensorflow/'}
null
PyPI
PYSEC-2017-47
null
Cross-site request forgery in the REST API in IPython 2 and 3.
{'CVE-2015-5607'}
2021-07-15T02:22:14.864070Z
2017-09-20T16:29:00Z
null
null
null
{'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162671.html', 'http://www.openwall.com/lists/oss-security/2015/07/21/3', 'https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0', 'https://bugzilla.redhat.com/show_bug.cgi?id=1243842', 'https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162936.html'}
null
PyPI
GHSA-jcxv-2j3h-mg59
Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV
OpenCV 3.3.1 (corresponding with opencv-python and opencv-contrib-python 3.3.1.11) has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.
{'CVE-2017-17760'}
2022-03-03T05:13:10.385850Z
2021-10-12T22:03:09Z
MODERATE
null
{'CWE-119'}
{'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/10351', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17760', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html', 'https://github.com/opencv/opencv-python', 'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c', 'http://www.securityfocus.com/bid/102974'}
null
PyPI
GHSA-6w9p-88qg-p3g3
Cross-site Scripting in CKAN
In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture
{'CVE-2021-25967'}
2022-03-03T05:13:24.940426Z
2021-12-03T20:44:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967', 'https://github.com/ckan/ckan/pull/6477', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25967', 'https://github.com/ckan/ckan'}
null
PyPI
PYSEC-2021-690
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.EditDistance`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/79865b542f9ffdc9caeb255631f7c56f1d4b6517/tensorflow/core/kernels/edit_distance_op.cc#L103-L159) has incomplete validation of the input parameters. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29564', 'GHSA-75f6-78jr-4656'}
2021-12-09T06:35:25.817127Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-75f6-78jr-4656'}
null
PyPI
GHSA-rcx2-m7jp-p9wj
Moderate severity vulnerability that affects notebook
In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This issue exists because of an incomplete fix for CVE-2019-10255.
{'CVE-2019-10856'}
2022-03-03T05:14:14.075087Z
2019-04-09T19:47:27Z
MODERATE
null
{'CWE-601'}
{'https://github.com/advisories/GHSA-rcx2-m7jp-p9wj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10856', 'https://github.com/jupyter/notebook', 'https://github.com/jupyter/notebook/compare/16cf97c...b8e30ea', 'https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4'}
null
PyPI
PYSEC-2016-5
null
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
{'CVE-2016-0740', 'GHSA-hggx-3h72-49ww'}
2021-07-05T00:01:23.915090Z
2016-04-13T16:59:00Z
null
null
null
{'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e', 'http://www.debian.org/security/2016/dsa-3499', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://github.com/advisories/GHSA-hggx-3h72-49ww'}
null
PyPI
PYSEC-2019-140
null
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
{'CVE-2019-14806', 'GHSA-gq9m-qvpx-68hc'}
2019-09-11T00:15:00Z
2019-08-09T15:15:00Z
null
null
null
{'https://palletsprojects.com/blog/werkzeug-0-15-3-released/', 'https://github.com/advisories/GHSA-gq9m-qvpx-68hc', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00047.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00034.html', 'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246', 'https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L168'}
null
PyPI
PYSEC-2022-20
null
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
{'GHSA-6cw3-g6wv-c2xv', 'CVE-2022-23833'}
2022-02-03T06:35:23.159453Z
2022-02-03T02:15:00Z
null
null
null
{'https://groups.google.com/forum/#!forum/django-announce', 'https://github.com/advisories/GHSA-6cw3-g6wv-c2xv', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://www.djangoproject.com/weblog/2022/feb/01/security-releases/'}
null
PyPI
GHSA-qc53-44cj-vfvx
Denial of Service in Tensorflow
### Impact The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has rank 2. This tensor must be a matrix because code assumes its elements are accessed as elements of a matrix: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L185 However, malicious users can pass in tensors of different rank, resulting in a `CHECK` assertion failure and a crash. This can be used to cause denial of service in serving installations, if users are allowed to control the components of the input sparse tensor. ### Patches We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release. We recommend users to upgrade to TensorFlow 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)
{'CVE-2020-15197'}
2021-08-26T15:12:09Z
2020-09-25T18:28:30Z
MODERATE
null
{'CWE-20', 'CWE-617'}
{'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15197', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qc53-44cj-vfvx'}
null
PyPI
PYSEC-2021-413
null
TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow. This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41221', 'GHSA-cqv6-3phm-hcwx'}
2021-11-13T06:52:45.325083Z
2021-11-05T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx'}
null
PyPI
GHSA-xf8c-3cgx-fcwm
Improper Access Control in novajoin
A flaw was discovered in the python-novajoin plugin, all versions up to, excluding 1.1.1, for Red Hat OpenStack Platform. The novajoin API lacked sufficient access control, allowing any keystone authenticated user to generate FreeIPA tokens.
{'CVE-2019-10138'}
2022-03-03T05:14:13.226450Z
2020-03-12T16:54:06Z
HIGH
null
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10138', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10138', 'https://review.opendev.org/#/c/631240/'}
null
PyPI
GHSA-6cw3-g6wv-c2xv
Infinite Loop in Django
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
{'CVE-2022-23833'}
2022-03-03T05:12:51.704454Z
2022-02-04T00:00:26Z
HIGH
null
{'CWE-835'}
{'https://github.com/django/django', 'https://groups.google.com/forum/#!forum/django-announce', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://www.djangoproject.com/weblog/2022/feb/01/security-releases/', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://security.netapp.com/advisory/ntap-20220221-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23833'}
null
PyPI
PYSEC-2014-57
null
typeswidget.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce the immutable setting on unspecified content edit forms, which allows remote attackers to hide fields on the forms via a crafted URL.
{'CVE-2013-4193'}
2021-07-25T23:34:46.454886Z
2014-03-11T19:37:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=978469', 'http://plone.org/products/plone-hotfix/releases/20130618', 'http://seclists.org/oss-sec/2013/q3/261', 'http://plone.org/products/plone/security/advisories/20130618-announcement'}
null
PyPI
PYSEC-2005-1
null
Cross-site scripting (XSS) vulnerability in the HTML WikiProcessor in Edgewall Trac 0.9.2 allows remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag.
{'CVE-2005-4644'}
2021-07-16T01:31:33.917972Z
2005-12-31T05:00:00Z
null
null
null
{'http://trac.edgewall.org/ticket/2473', 'http://secunia.com/advisories/18465', 'http://secunia.com/advisories/18555', 'http://www.vupen.com/english/advisories/2006/0226', 'http://www.debian.org/security/2006/dsa-951', 'http://www.securityfocus.com/bid/16198', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/24183', 'http://projects.edgewall.com/trac/ticket/2473'}
null
PyPI
PYSEC-2021-556
null
TensorFlow is an end-to-end open source platform for machine learning. If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L89) reads the first value from a tensor buffer without first checking that the tensor has values to read from. We have patched the issue in GitHub commit 482da92095c4d48f8784b1f00dda4f81c28d2988. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37643', 'GHSA-fcwc-p4fc-c5cc'}
2021-12-09T06:35:02.665889Z
2021-08-12T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc'}
null
PyPI
PYSEC-2021-106
null
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
{'GHSA-wv5p-gmmv-wh9v', 'CVE-2021-20178'}
2021-07-02T02:41:35.206595Z
2021-05-26T12:15:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1914774', 'https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/', 'https://github.com/advisories/GHSA-wv5p-gmmv-wh9v', 'https://github.com/ansible-collections/community.general/pull/1635,', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/'}
null
PyPI
PYSEC-2018-74
null
Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation.
{'GHSA-vxp9-wv2f-wqmw', 'CVE-2018-8021'}
2021-08-25T04:30:32.701868Z
2018-11-07T14:29:00Z
null
null
null
{'https://github.com/apache/incubator-superset/pull/4243', 'https://github.com/advisories/GHSA-vxp9-wv2f-wqmw', 'https://www.exploit-db.com/exploits/45933/'}
null
PyPI
PYSEC-2020-106
null
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
{'CVE-2020-25592'}
2021-03-30T13:48:00Z
2020-11-06T08:15:00Z
null
null
null
{'https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/', 'https://security.gentoo.org/glsa/202011-13', 'https://www.debian.org/security/2021/dsa-4837', 'https://docs.saltstack.com/en/latest/topics/releases/index.html', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html', 'http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html'}
null
PyPI
PYSEC-2021-805
null
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. This is similar to CVE-2021-29584. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-prcg-wp5q-rv7p', 'CVE-2021-41197'}
2021-12-09T06:35:40.728775Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf', 'https://github.com/tensorflow/tensorflow/issues/51908', 'https://github.com/tensorflow/tensorflow/issues/46890', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p', 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15'}
null
PyPI
PYSEC-2010-14
null
MoinMoin 1.9 before 1.9.1 does not perform the expected clearing of the sys.argv array in situations where the GATEWAY_INTERFACE environment variable is set, which allows remote attackers to obtain sensitive information via unspecified vectors.
{'CVE-2010-0667'}
2021-07-16T01:31:23.463823Z
2010-02-26T19:30:00Z
null
null
null
{'http://marc.info/?l=oss-security&m=126625972814888&w=2', 'http://www.openwall.com/lists/oss-security/2010/01/21/6', 'http://moinmo.in/SecurityFixes', 'http://www.openwall.com/lists/oss-security/2010/02/15/2', 'http://hg.moinmo.in/moin/1.9/rev/04afdde50094', 'http://marc.info/?l=oss-security&m=126676896601156&w=2', 'http://hg.moinmo.in/moin/1.9/raw-file/1.9.1/docs/CHANGES', 'http://moinmo.in/MoinMoinChat/Logs/moin-dev/2010-01-18', 'http://hg.moinmo.in/moin/1.9/rev/9d8e7ce3c3a2', 'http://secunia.com/advisories/38242'}
null
PyPI
PYSEC-2019-141
null
ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.
{'CVE-2018-16876'}
2021-06-10T06:51:54.692225Z
2019-01-03T15:29:00Z
null
null
null
{'https://access.redhat.com/errata/RHSA-2018:3835', 'https://access.redhat.com/errata/RHSA-2019:0590', 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html', 'https://access.redhat.com/errata/RHSA-2018:3837', 'https://www.debian.org/security/2019/dsa-4396', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16876', 'https://access.redhat.com/errata/RHSA-2019:0564', 'https://usn.ubuntu.com/4072-1/', 'http://www.securityfocus.com/bid/106225', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html', 'https://access.redhat.com/errata/RHSA-2018:3838', 'https://access.redhat.com/errata/RHSA-2018:3836', 'https://github.com/ansible/ansible/pull/49569'}
null
PyPI
PYSEC-2016-4
null
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
{'CVE-2016-6298'}
2021-07-05T00:01:22.078687Z
2016-09-01T23:59:00Z
null
null
null
{'http://www.securityfocus.com/bid/92729', 'https://github.com/latchset/jwcrypto/releases/tag/v0.3.2', 'https://github.com/latchset/jwcrypto/issues/65', 'https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba', 'https://github.com/latchset/jwcrypto/pull/66'}
null
PyPI
PYSEC-2022-21
null
Products.ATContentTypes are the core content types for Plone 2.1 - 4.3. Versions of Plone that are dependent on Products.ATContentTypes prior to version 3.0.6 are vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Usually only anonymous users are affected, but this depends on the user's cache settings. Version 3.0.6 of Products.ATContentTypes has been released with a fix. This version works on Plone 5.2, Python 2 only. As a workaround, make sure the image_view_fullscreen page is not stored in the cache. More information about the vulnerability and cvmitigation measures is available in the GitHub Security Advisory.
{'CVE-2022-23599', 'GHSA-g4c2-ghfg-g5rh'}
2022-02-04T17:23:45.077200Z
2022-01-28T22:15:00Z
null
null
null
{'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8', 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh'}
null
PyPI
PYSEC-2021-412
null
TensorFlow is an open source platform for machine learning. In affected versions the async implementation of `CollectiveReduceV2` suffers from a memory leak and a use after free. This occurs due to the asynchronous computation and the fact that objects that have been `std::move()`d from are still accessed. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected.
{'GHSA-gpfh-jvf9-7wg5', 'CVE-2021-41220'}
2021-11-13T06:52:45.180075Z
2021-11-05T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5', 'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'}
null
PyPI
GHSA-7xc5-ggpp-g249
Server-Side Template Injection in pwntools
This affects the package pwntools before 4.3.1. The shellcraft generator for affected versions of this module are vulnerable to Server-Side Template Injection (SSTI), which can lead to remote code execution.
{'CVE-2020-28468'}
2022-03-03T05:12:54.322023Z
2021-04-20T16:13:24Z
CRITICAL
null
{'CWE-74'}
{'https://github.com/Gallopsled/pwntools/issues/1427', 'https://github.com/Gallopsled/pwntools/pull/1732', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28468', 'https://snyk.io/vuln/SNYK-PYTHON-PWNTOOLS-1047345'}
null
PyPI
GHSA-3wvg-mj6g-m9cv
Uncontrolled Resource Consumption
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
{'CVE-2021-27922'}
2022-03-03T05:13:27.581195Z
2021-03-18T19:55:21Z
HIGH
null
{'CWE-400'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27922', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/', 'https://security.gentoo.org/glsa/202107-33', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}
null
PyPI
GHSA-pqrv-8r2f-7278
Crash due to erroneous `StatusOr` in TensorFlow
### Impact A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering [a `StatusOr` value that is an error and forcibly extracting the value from it](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L560-L567): ```cc if (op_reg_data->type_ctor != nullptr) { VLOG(3) << "AddNode: found type constructor for " << node_def.name(); const auto ctor_type = full_type::SpecializeType(AttrSlice(node_def), op_reg_data->op_def); const FullTypeDef ctor_typedef = ctor_type.ValueOrDie(); if (ctor_typedef.type_id() != TFT_UNSET) { *(node_def.mutable_experimental_type()) = ctor_typedef; } } ``` If `ctor_type` is an error status, `ValueOrDie` results in a crash. ### Patches We have patched the issue in GitHub commit [955059813cc325dc1db5e2daa6221271406d4439](https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439). We have patched the issue in multiple GitHub commits and these will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, as both are affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23590'}
2022-02-11T20:00:42Z
2022-02-09T23:29:38Z
MODERATE
null
{'CWE-754'}
{'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23590', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L560-L567', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pqrv-8r2f-7278'}
null
PyPI
PYSEC-2014-56
null
sendto.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to spoof emails via unspecified vectors.
{'CVE-2013-4192'}
2021-07-25T23:34:46.316071Z
2014-03-11T19:37:00Z
null
null
null
{'http://plone.org/products/plone-hotfix/releases/20130618', 'http://seclists.org/oss-sec/2013/q3/261', 'http://plone.org/products/plone/security/advisories/20130618-announcement', 'https://bugzilla.redhat.com/show_bug.cgi?id=978464'}
null
PyPI
PYSEC-2021-557
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/list_kernels.cc#L312) calls `std::vector.resize()` with the new size controlled by input given by the user, without checking that this input is valid. We have patched the issue in GitHub commit 8a6e874437670045e6c7dc6154c7412b4a2135e2. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-27j5-4p9v-pp67', 'CVE-2021-37644'}
2021-12-09T06:35:02.745951Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67', 'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2'}
null
PyPI
GHSA-jrh2-hc4r-7jwx
Directory-traversal in Django
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
{'CVE-2021-45452'}
2022-03-03T05:14:16.376467Z
2022-01-12T19:21:04Z
MODERATE
null
{'CWE-22'}
{'https://github.com/django/django', 'https://groups.google.com/forum/#!forum/django-announce', 'https://www.djangoproject.com/weblog/2022/jan/04/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45452', 'https://security.netapp.com/advisory/ntap-20220121-0005/', 'https://docs.djangoproject.com/en/4.0/releases/security/'}
null
PyPI
PYSEC-2021-107
null
A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
{'CVE-2021-3447'}
2021-07-02T02:41:35.257212Z
2021-04-01T18:15:00Z
null
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MS4VPUYVLGSAKOX26IT52BSMEZRZ3KS/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RUTGO4RS4ZXZSPBU2CHVPT75IAFVTTL3/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939349', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBZ75MAMVQVZROPYHMRDQKPPVASP63DG/'}
null
PyPI
PYSEC-2018-75
null
OISF suricata-update version 1.0.0a1 contains an Insecure Deserialization vulnerability in the insecure yaml.load-Function as used in the following files: config.py:136, config.py:142, sources.py:99 and sources.py:131. The "list-sources"-command is affected by this bug. that can result in Remote Code Execution(even as root if suricata-update is called by root). This attack appears to be exploitable via a specially crafted yaml-file at https://www.openinfosecfoundation.org/rules/index.yaml. This vulnerability appears to have been fixed in 1.0.0b1.
{'CVE-2018-1000167'}
2021-08-25T04:30:32.993759Z
2018-04-18T19:29:00Z
null
null
null
{'https://redmine.openinfosecfoundation.org/issues/2359', 'https://tech.feedyourhead.at/content/remote-code-execution-in-suricata-update'}
null
PyPI
GHSA-4365-fhm5-qcrx
Maliciously Crafted Model Archive Can Lead To Arbitrary File Write
### Impact An Archive Extraction (Zip Slip) vulnerability in the functionality that allows a user to load a trained model archive in Rasa 2.8.9 and older allows an attacker arbitrary write capability within specific directories using a malicious crafted archive file. ### Patches The vulnerability is fixed in Rasa 2.8.10 ### Workarounds Mitigating steps for vulnerable end users are to ensure that they do not upload untrusted model files, and restrict CLI or API endpoint access where a malicious actor could target a deployed Rasa instance. ### For more information If you have any questions or comments about this advisory: * Email [the Rasa Security Team](mailto:security@rasa.com)
{'CVE-2021-41127'}
2022-03-03T05:13:21.545751Z
2021-10-22T16:19:13Z
HIGH
null
{'CWE-23', 'CWE-22'}
{'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989', 'https://github.com/RasaHQ/rasa', 'https://github.com/RasaHQ/rasa/security/advisories/GHSA-4365-fhm5-qcrx'}
null
PyPI
PYSEC-2020-107
null
** DISPUTED ** scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner.
{'CVE-2020-13092'}
2020-05-19T19:05:00Z
2020-05-15T19:15:00Z
null
null
null
{'https://github.com/0FuzzingQ/vuln/blob/master/sklearn%20unserialize.md', 'https://scikit-learn.org/stable/modules/model_persistence.html#security-maintainability-limitations'}
null
PyPI
PYSEC-2010-15
null
Unspecified vulnerability in MoinMoin 1.5.x through 1.7.x, 1.8.x before 1.8.7, and 1.9.x before 1.9.2 has unknown impact and attack vectors, related to configurations that have a non-empty superuser list, the xmlrpc action enabled, the SyncPages action enabled, or OpenID configured.
{'CVE-2010-0668'}
2021-07-16T01:31:23.566810Z
2010-02-26T19:30:00Z
null
null
null
{'http://www.debian.org/security/2010/dsa-2014', 'http://www.openwall.com/lists/oss-security/2010/02/15/2', 'http://marc.info/?l=oss-security&m=126625972814888&w=2', 'http://secunia.com/advisories/38444', 'http://www.securityfocus.com/bid/38023', 'http://secunia.com/advisories/38903', 'https://bugzilla.redhat.com/show_bug.cgi?id=565604', 'http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035438.html', 'http://hg.moinmo.in/moin/1.8/raw-file/1.8.7/docs/CHANGES', 'http://www.vupen.com/english/advisories/2010/0266', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569975', 'http://www.vupen.com/english/advisories/2010/0600', 'http://marc.info/?l=oss-security&m=126676896601156&w=2', 'http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035374.html', 'http://moinmo.in/MoinMoinRelease1.8', 'http://secunia.com/advisories/38709', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/56002', 'http://moinmo.in/SecurityFixes', 'http://www.osvdb.org/62043'}
null
PyPI
GHSA-624f-cqvr-3qw4
URL Redirection to Untrusted Site ('Open Redirect') in Flask-AppBuilder
### Impact If using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open redirect vulnerability ### Patches Install Flask-AppBuilder 3.2.2 or above ### Workarounds Filter HTTP traffic containing `?next={next-site}` where the `next-site` domain is different from the application you are protecting
{'CVE-2021-32805'}
2022-03-03T05:14:09.479675Z
2021-09-08T21:11:14Z
HIGH
null
{'CWE-601'}
{'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32805', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-624f-cqvr-3qw4', 'https://pypi.org/project/Flask-AppBuilder/', 'https://github.com/dpgaspar/Flask-AppBuilder', 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.2'}
null
PyPI
PYSEC-2021-804
null
TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-m539-j985-hcr8', 'CVE-2021-41196'}
2021-12-09T06:35:40.561915Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8'}
null
PyPI
PYSEC-2021-31
null
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0.
{'CVE-2021-21376', 'GHSA-gfp2-w5jm-955q'}
2021-03-27T01:59:00Z
2021-03-23T16:15:00Z
null
null
null
{'https://pypi.org/project/omero-web/', 'https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q', 'https://www.openmicroscopy.org/security/advisories/2021-SV1/', 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021'}
null
PyPI
PYSEC-2021-384
null
FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs.
{'CVE-2021-41194', 'GHSA-5xvc-vgmp-jgc3'}
2021-11-03T14:26:52.434933Z
2021-10-28T20:15:00Z
null
null
null
{'https://github.com/jupyterhub/firstuseauthenticator/pull/38', 'https://github.com/jupyterhub/firstuseauthenticator/security/advisories/GHSA-5xvc-vgmp-jgc3', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch'}
null
PyPI
GHSA-3qpr-7rmg-73v8
Moderate severity vulnerability that affects Plone and Zope2
AccessControl/AuthEncoding.py in Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain passwords via vectors involving timing discrepancies in password validation.
{'CVE-2012-5507'}
2022-03-03T05:12:54.984864Z
2018-07-23T19:51:02Z
MODERATE
null
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2012-5507', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://plone.org/products/plone/security/advisories/20121106/23', 'https://bugs.launchpad.net/zope2/+bug/1071067', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://github.com/advisories/GHSA-3qpr-7rmg-73v8'}
null
PyPI
GHSA-hwfp-hg2m-9vr2
Integer overflow in pywin32
An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process.
{'CVE-2021-32559'}
2022-03-03T05:13:35.675967Z
2021-08-09T20:43:44Z
MODERATE
null
{'CWE-190'}
{'https://github.com/mhammond/pywin32/pull/1701', 'https://github.com/mhammond/pywin32/issues/1700', 'https://github.com/mhammond/pywin32/releases', 'https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0017/FEYE-2021-0017.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32559'}
null
PyPI
PYSEC-2017-46
null
Cross-site scripting (XSS) vulnerability in IPython before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/notebooks path.
{'CVE-2015-4707'}
2021-07-15T02:22:14.812507Z
2017-09-20T18:29:00Z
null
null
null
{'https://ipython.org/ipython-doc/3/whatsnew/version3.html', 'https://github.com/ipython/ipython/commit/c2078a53543ed502efd968649fee1125e0eb549c', 'http://www.openwall.com/lists/oss-security/2015/06/22/7', 'https://bugzilla.redhat.com/show_bug.cgi?id=1235688', 'http://www.securityfocus.com/bid/75328', 'https://github.com/ipython/ipython/commit/7222bd53ad089a65fd610fab4626f9d0ab47dfce'}
null
PyPI
GHSA-5vq5-pg3r-9ph3
Path Traversal in Zope
Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. The problem has been fixed in Zope 5.2.1 and 4.6.1. The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
{'CVE-2021-32674'}
2022-03-03T05:13:51.482119Z
2021-06-10T17:22:08Z
HIGH
null
{'CWE-12', 'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32674', 'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6', 'https://github.com/zopefoundation/Zope', 'https://pypi.org/project/Zope/', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36'}
null
PyPI
GHSA-7wgr-7666-7pwj
Path Traversal in openapi-python-client
### Impact Path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk. Giving this a CVSS score of 3.0 (Low) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C ### Patches A fix is being worked on for version 0.5.3 ### Workarounds Inspect OpenAPI documents before generating clients for them. ### For more information If you have any questions or comments about this advisory: * Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues) * Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com)
{'CVE-2020-15141'}
2022-03-03T05:13:07.819928Z
2020-08-20T14:38:13Z
LOW
null
{'CWE-22'}
{'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj', 'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15141', 'https://pypi.org/project/openapi-python-client', 'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13', 'https://pypi.org/project/openapi-python-client/'}
null
PyPI
PYSEC-2021-691
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.SparseFillEmptyRows`. This is because of missing validation(https://github.com/tensorflow/tensorflow/blob/fdc82089d206e281c628a93771336bf87863d5e8/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L230-L231) that was covered under a `TODO`. If the `dense_shape` tensor is empty, then `dense_shape_t.vec<>()` would cause a null pointer dereference in the implementation of the op. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-r6pg-pjwc-j585', 'CVE-2021-29565'}
2021-12-09T06:35:26.009362Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6pg-pjwc-j585', 'https://github.com/tensorflow/tensorflow/commit/faa76f39014ed3b5e2c158593b1335522e573c7f'}
null
PyPI
PYSEC-2022-159
null
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1.
{'CVE-2022-0577', 'GHSA-cjvr-mfj7-j4j8'}
2022-03-09T19:24:19.981012Z
2022-03-02T04:15:00Z
null
null
null
{'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a', 'https://github.com/advisories/GHSA-cjvr-mfj7-j4j8', 'https://huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585'}
null
PyPI
PYSEC-2018-116
null
Cross-site scripting (XSS) vulnerability in Airbnb Knowledge Repo 0.7.4 allows remote attackers to inject arbitrary web scripts or HTML via the post comments functionality, as demonstrated by the post/posts/new_report.kp URI.
{'CVE-2018-12104'}
2021-12-14T08:16:52.814070Z
2018-06-17T20:29:00Z
null
null
null
{'http://www.securityfocus.com/bid/104487', 'https://github.com/airbnb/knowledge-repo/issues/431', 'https://pypi.org/project/knowledge-repo', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12104'}
null
PyPI
PYSEC-2021-445
null
TensorFlow is an end-to-end open source platform for machine learning. A malicious user could trigger a division by 0 in `Conv3D` implementation. The implementation(https://github.com/tensorflow/tensorflow/blob/42033603003965bffac51ae171b51801565e002d/tensorflow/core/kernels/conv_ops_3d.cc#L143-L145) does a modulo operation based on user controlled input. Thus, when `filter` has a 0 as the fifth element, this results in a division by 0. Additionally, if the shape of the two tensors is not valid, an Eigen assertion can be triggered, resulting in a program crash. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-772p-x54p-hjrv', 'CVE-2021-29517'}
2021-12-09T06:34:46.030158Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/799f835a3dfa00a4d852defa29b15841eea9d64f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772p-x54p-hjrv'}
null
PyPI
GHSA-jr9p-r423-9m2r
Vulnerability in markdown2
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
{'CVE-2021-26813'}
2022-03-03T05:12:48.433276Z
2021-06-02T21:44:28Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26813', 'https://github.com/trentm/python-markdown2/pull/387', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRP5RN35JZTSJ3JT4722F447ZDK7LZS5/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTIX5UXRDJZJ57DO4V33ZNJTNKWGBQLY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J752422YELXLMLZJPVJVKD2KKHHQRVEH/'}
null
PyPI
PYSEC-2022-76
null
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-rrx2-r989-2c43', 'CVE-2022-23567'}
2022-03-09T00:17:33.310692Z
2022-02-03T12:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc'}
null
PyPI
PYSEC-2019-116
null
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
{'GHSA-vrcf-g539-x6h3', 'CVE-2019-17206'}
2019-12-09T19:06:00Z
2019-10-05T23:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-vrcf-g539-x6h3', 'https://github.com/frostming/rediswrapper/pull/1', 'https://github.com/frostming/rediswrapper/releases/tag/v0.3.0', 'https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0'}
null
PyPI
PYSEC-2012-3
null
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
{'CVE-2012-3443'}
2021-07-05T00:01:18.288820Z
2012-07-31T17:55:00Z
null
null
null
{'http://www.debian.org/security/2012/dsa-2529', 'http://www.mandriva.com/security/advisories?name=MDVSA-2012:143', 'http://www.openwall.com/lists/oss-security/2012/07/31/1', 'http://www.ubuntu.com/usn/USN-1560-1', 'http://www.openwall.com/lists/oss-security/2012/07/31/2', 'https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/'}
null
PyPI
PYSEC-2008-4
null
Open redirect vulnerability in the search script in Trac before 0.10.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the q parameter, possibly related to the quickjump function.
{'CVE-2008-2951'}
2021-07-16T01:31:34.307332Z
2008-07-27T22:41:00Z
null
null
null
{'https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/44043', 'http://www.securityfocus.com/bid/30402', 'http://trac.edgewall.org/wiki/ChangeLog', 'http://www.osvdb.org/46513', 'http://secunia.com/advisories/31314', 'http://holisticinfosec.org/content/view/72/45/', 'https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html'}
null
PyPI
PYSEC-2021-853
null
vault-cli is a configurable command-line interface tool (and python library) to interact with Hashicorp Vault. In versions before 3.0.0 vault-cli features the ability for rendering templated values. When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template. Jinja2 is a powerful templating engine and is not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. Users are advised to upgrade as soon as possible. For users unable to upgrade a workaround does exist. Using the environment variable `VAULT_CLI_RENDER=false` or the flag `--no-render` (placed between `vault-cli` and the subcommand, e.g. `vault-cli --no-render get-all`) or adding `render: false` to the vault-cli configuration yaml file disables rendering and removes the vulnerability. Using the python library, you can use: `vault_cli.get_client(render=False)` when creating your client to get a client that will not render templated secrets and thus operates securely.
{'GHSA-q34h-97wf-8r8j', 'CVE-2021-43837'}
2021-12-16T21:30:16.499668Z
2021-12-16T19:15:00Z
null
null
null
{'https://github.com/peopledoc/vault-cli/security/advisories/GHSA-q34h-97wf-8r8j', 'https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/', 'https://github.com/peopledoc/vault-cli/commit/3ba3955887fd6b7d4d646c8b260f21cebf5db852'}
null
PyPI
GHSA-9wx7-jrvc-28mm
Signature verification vulnerability in Stark Bank ecdsa libraries
An attacker can forge signatures on arbitrary messages that will verify for any public key. This may allow attackers to authenticate as any user within the Stark Bank platform, and bypass signature verification needed to perform operations on the platform, such as send payments and transfer funds. Additionally, the ability for attackers to forge signatures may impact other users and projects using these libraries in different and unforeseen ways.
null
2022-03-03T05:13:29.259203Z
2021-11-08T21:51:18Z
HIGH
null
{'CWE-347'}
{'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-python', 'https://github.com/starkbank/ecdsa-dotnet', 'https://github.com/starkbank/ecdsa-node', 'https://github.com/starkbank/ecdsa-java', 'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1'}
null
PyPI
GHSA-77rm-9x9h-xj3g
NULL Pointer Dereference in Protocol Buffers
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
{'CVE-2021-22570'}
2022-05-03T04:47:56.706467Z
2022-01-27T00:01:15Z
HIGH
null
{'CWE-476'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/', 'https://github.com/protocolbuffers/protobuf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20220429-0005/', 'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22570'}
null
PyPI
PYSEC-2020-150
null
This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file).
{'CVE-2020-7694', 'SNYK-PYTHON-UVICORN-575560', 'GHSA-33c7-2mpw-hg34'}
2020-08-04T18:05:00Z
2020-07-27T12:15:00Z
null
null
null
{'https://github.com/encode/uvicorn', 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560', 'https://github.com/advisories/GHSA-33c7-2mpw-hg34'}
null
PyPI
PYSEC-2022-99
null
Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering a `StatusOr` value that is an error and forcibly extracting the value from it. We have patched the issue in multiple GitHub commits and these will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, as both are affected.
{'CVE-2022-23590', 'GHSA-pqrv-8r2f-7278'}
2022-03-09T00:17:36.120513Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L560-L567', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pqrv-8r2f-7278'}
null
PyPI
GHSA-cj78-rgw3-4h5p
Improper Restriction of XML External Entity Reference in trytond and proteus
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
{'CVE-2022-26661'}
2022-03-28T16:00:07.691572Z
2022-03-11T00:02:02Z
MODERATE
null
{'CWE-611'}
{'https://www.debian.org/security/2022/dsa-5098', 'https://www.debian.org/security/2022/dsa-5099', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26661', 'https://bugs.tryton.org/issue11219', 'https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059', 'https://hg.tryton.org/trytond', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00017.html', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00016.html'}
null