ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
PyPI
PYSEC-2021-209
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer. The implementation(https://github.com/tensorflow/tensorflow/blob/60a45c8b6192a4699f2e2709a2645a751d435cc3/tensorflow/core/kernels/sdca_internal.cc) does not validate that the user supplied arguments satisfy all constraints expected by the op(https://www.tensorflow.org/api_docs/python/tf/raw_ops/SdcaOptimizer). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-5gqf-456p-4836', 'CVE-2021-29572'}
2021-08-27T03:22:34.191182Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836', 'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb'}
null
PyPI
PYSEC-2021-659
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L148-L165) uses `CHECK_*` assertions instead of `OP_REQUIRES` to validate user controlled inputs. Whereas `OP_REQUIRES` allows returning an error condition back to the user, the `CHECK_*` macros result in a crash if the condition is false, similar to `assert`. In this case, `height` is 0 from the `images` input. This results in `max_box_row_clamp` being negative and the assertion being falsified, followed by aborting program execution. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-393f-2jr3-cp69', 'CVE-2021-29533'}
2021-12-09T06:35:20.437161Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-393f-2jr3-cp69'}
null
PyPI
PYSEC-2021-16
null
httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
{'CVE-2021-21240', 'GHSA-93xj-8mrv-444m'}
2021-02-12T14:56:00Z
2021-02-08T20:15:00Z
null
null
null
{'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc', 'https://github.com/httplib2/httplib2/pull/182', 'https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m', 'https://pypi.org/project/httplib2'}
null
PyPI
GHSA-6p52-jr3q-c94g
Arbitrary code execution due to YAML deserialization
### Impact Nameko can be tricked to perform arbitrary code execution when deserialising a YAML config file. Example: ``` yaml # malicious.yaml !!python/object/new:type args: ['z', !!python/tuple [], {'extend': !!python/name:exec }] listitems: "__import__('os').system('cat /etc/passwd')" ``` ``` shell $ nameko run --config malicious.yaml test root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/usr/sbin/nologin sys:x:3:3:sys:/dev:/usr/sbin/nologin sync:x:4:65534:sync:/bin:/bin/sync games:x:5:60:games:/usr/games:/usr/sbin/nologin ... ``` ### Patches The problem was fixed in https://github.com/nameko/nameko/pull/722 and released in version 2.14.0, and in rc10 of the v3 pre-release. Versions prior to 2.14.0, and v3.0.0rc0 through v3.0.0rc9 are still vulnerable. ### Workarounds The vulnerability is exploited by config files with malicious content. It can be avoided by only using config files that you trust.
{'CVE-2021-41078'}
2022-03-03T05:13:47.698322Z
2021-10-19T15:28:57Z
HIGH
null
{'CWE-502'}
{'https://github.com/nameko/nameko/releases/tag/v2.14.0', 'https://github.com/nameko/nameko/releases/tag/v3.0.0-rc10', 'https://github.com/nameko/nameko', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41078', 'https://github.com/nameko/nameko/security/advisories/GHSA-6p52-jr3q-c94g'}
null
PyPI
PYSEC-2021-136
null
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.
{'CVE-2021-20267'}
2021-08-27T03:22:08.884816Z
2021-05-28T19:15:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1934330'}
null
PyPI
GHSA-2f9x-5v75-3qv4
Moderate severity vulnerability that affects django
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
{'CVE-2018-7537'}
2022-03-03T05:13:46.373778Z
2019-01-04T17:50:00Z
MODERATE
null
{'CWE-185'}
{'https://usn.ubuntu.com/3591-1/', 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/', 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4', 'http://www.securityfocus.com/bid/103357', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.debian.org/security/2018/dsa-4161', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html', 'https://access.redhat.com/errata/RHSA-2019:0265', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537'}
null
PyPI
PYSEC-2014-67
null
Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to obtain the installation path via vectors related to a file object for unspecified documentation which is initialized in class scope.
{'CVE-2013-7060'}
2021-07-25T23:34:50.035277Z
2014-05-02T14:55:00Z
null
null
null
{'http://www.openwall.com/lists/oss-security/2013/12/10/15', 'https://plone.org/security/20131210/path-leak', 'http://www.openwall.com/lists/oss-security/2013/12/12/3'}
null
PyPI
GHSA-2x54-j4m3-r6wx
High severity vulnerability that affects sqla-yaml-fixtures
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
{'CVE-2019-3575'}
2022-03-03T05:13:54.824008Z
2019-01-04T17:44:48Z
HIGH
null
{'CWE-94'}
{'https://github.com/schettino72/sqla_yaml_fixtures', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575', 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx', 'https://github.com/schettino72/sqla_yaml_fixtures/issues/20'}
null
PyPI
PYSEC-2021-566
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a crash via a floating point exception in `tf.raw_ops.ResourceGather`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L725-L731) computes the value of a value, `batch_size`, and then divides by it without checking that this value is not 0. We have patched the issue in GitHub commit ac117ee8a8ea57b73d34665cdf00ef3303bc0b11. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-qjj8-32p7-h289', 'CVE-2021-37653'}
2021-12-09T06:35:03.512666Z
2021-08-12T18:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289', 'https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11'}
null
PyPI
GHSA-pgww-xf46-h92r
XSS in lxml
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
{'CVE-2020-27783'}
2022-03-03T05:14:14.706013Z
2021-01-07T21:54:01Z
MODERATE
null
{'CWE-79'}
{'https://pypi.org/project/lxml/', 'https://security.netapp.com/advisory/ntap-20210521-0003/', 'https://snyk.io/vuln/SNYK-PYTHON-LXML-1047473', 'https://advisory.checkmarx.net/advisory/CX-2020-4286', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/', 'https://www.debian.org/security/2020/dsa-4810', 'https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27783', 'https://bugzilla.redhat.com/show_bug.cgi?id=1901633', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html'}
null
PyPI
PYSEC-2020-136
null
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger a denial of service by causing an out of memory allocation in the implementation of segment sum. Since code uses the last element of the tensor holding them to determine the dimensionality of output tensor, attackers can use a very large value to trigger a large allocation. The issue is patched in commit 204945b19e44b57906c9344c0d00120eeeae178a and is released in TensorFlow versions 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to limit the maximum value in the segment ids tensor. This only handles the case when the segment ids are stored statically in the model, but a similar validation could be done if the segment ids are generated at runtime, between inference steps. However, if the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
{'CVE-2020-15213', 'GHSA-hjmq-236j-8m87'}
2020-10-01T23:15:00Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hjmq-236j-8m87', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}
null
PyPI
PYSEC-2010-24
null
The ftp_STOU function in FTPServer.py in pyftpdlib before 0.2.0 does not limit the number of attempts to discover a unique filename, which might allow remote authenticated users to cause a denial of service via a STOU command.
{'CVE-2007-6740'}
2010-10-20T04:00:00Z
2010-10-19T20:00:00Z
null
null
null
{'http://code.google.com/p/pyftpdlib/issues/detail?id=25', 'http://code.google.com/p/pyftpdlib/source/detail?r=37', 'http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY', 'http://code.google.com/p/pyftpdlib/source/diff?spec=svn37&r=37&format=side&path=/trunk/pyftpdlib/FTPServer.py'}
null
PyPI
PYSEC-2021-835
null
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it calls `eval` on user supplied strings. This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-3rcw-9p9x-582v', 'CVE-2021-41228'}
2021-12-09T06:35:45.436106Z
2021-11-05T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v', 'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'}
null
PyPI
PYSEC-2018-44
null
Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.
{'CVE-2018-16837'}
2021-07-02T02:41:34.271290Z
2018-10-23T15:29:00Z
null
null
null
{'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html', 'https://www.debian.org/security/2019/dsa-4396', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16837', 'http://www.securityfocus.com/bid/105700', 'https://usn.ubuntu.com/4072-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html', 'https://access.redhat.com/errata/RHSA-2018:3463', 'https://access.redhat.com/errata/RHSA-2018:3461', 'https://access.redhat.com/errata/RHSA-2018:3462', 'https://access.redhat.com/errata/RHSA-2018:3460', 'https://access.redhat.com/security/cve/cve-2018-16837', 'https://access.redhat.com/errata/RHSA-2018:3505', 'https://lists.debian.org/debian-lts-announce/2018/11/msg00012.html'}
null
PyPI
PYSEC-2019-170
null
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.
{'GHSA-j3jp-gvr5-7hwq', 'CVE-2019-13611'}
2021-08-25T04:30:27.861588Z
2019-07-16T00:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-j3jp-gvr5-7hwq', 'https://github.com/miguelgrinberg/python-engineio/issues/128'}
null
PyPI
PYSEC-2022-10
null
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method.
{'GHSA-8vj2-vxx3-667w', 'CVE-2022-22817'}
2022-01-24T23:48:19.853348Z
2022-01-10T14:12:00Z
null
null
null
{'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval', 'https://github.com/advisories/GHSA-8vj2-vxx3-667w'}
null
PyPI
GHSA-xrr4-74mc-rpjc
Pyro mishandles pid files in temporary directory locations and opening the pid file as root
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
{'CVE-2011-2765'}
2022-04-26T18:32:54.526435Z
2018-08-21T17:01:29Z
HIGH
null
{'CWE-59'}
{'https://github.com/advisories/GHSA-xrr4-74mc-rpjc', 'https://bugs.debian.org/631912', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2765', 'https://pythonhosted.org/Pyro/12-changes.html', 'https://github.com/irmen/Pyro3', 'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'}
null
PyPI
PYSEC-2014-88
null
python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof Bugzilla servers via a crafted certificate.
{'CVE-2013-2191'}
2021-08-27T03:22:17.861270Z
2014-02-08T00:55:00Z
null
null
null
{'https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef', 'http://www.openwall.com/lists/oss-security/2013/06/19/6', 'https://bugzilla.redhat.com/show_bug.cgi?id=951594', 'http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html', 'http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html', 'https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html'}
null
PyPI
PYSEC-2021-589
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.SparseFillEmptyRows`. The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/sparse_ops.cc#L608-L634) does not validate that the input arguments are not empty tensors. We have patched the issue in GitHub commit 578e634b4f1c1c684d4b4294f9e5281b2133b3ed. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37676', 'GHSA-v768-w7m9-2vmm'}
2021-12-09T06:35:05.480275Z
2021-08-12T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm'}
null
PyPI
PYSEC-2021-423
null
An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.
{'CVE-2020-19003', 'GHSA-q6j2-g8qf-wvf7'}
2021-11-16T03:58:44.124463Z
2021-10-06T13:15:00Z
null
null
null
{'https://github.com/liftoff/GateOne/issues/728', 'https://github.com/advisories/GHSA-q6j2-g8qf-wvf7'}
null
PyPI
PYSEC-2017-77
null
The swri_audio_convert function in audioconvert.c in FFmpeg libswresample through 3.0.101, as used in FFmpeg 3.4.1, aubio 0.4.6, and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted audio file.
{'CVE-2017-17555'}
2021-08-25T04:29:55.717031Z
2017-12-12T01:29:00Z
null
null
null
{'https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%20was%20found%20in%20function%20swri_audio_convert%20of%20ffmpeg%20libswresample.md', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00012.html'}
null
PyPI
GHSA-v936-j8gp-9q3p
Open redirects on some federation and push requests
### Impact Requests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although limited modification of request bodies was possible. For the most thorough protection server administrators should remove the deprecated `federation_ip_range_blacklist` from their settings after upgrading to Synapse v1.25.0 which will result in Synapse using the improved default IP address restrictions. See the new `ip_range_blacklist` and `ip_range_whitelist` settings if more specific control is necessary. ### Patches Issue is resolved by #8821. Further improvements to protect homeservers by default were made in #8870 and #8954. ### Workarounds Requests to internal IP addresses could be blocked at the system or network level.
{'CVE-2021-21273'}
2022-03-03T05:14:08.012098Z
2021-02-26T17:28:34Z
LOW
null
{'CWE-601'}
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-v936-j8gp-9q3p', 'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21273', 'https://github.com/matrix-org/synapse', 'https://github.com/matrix-org/synapse/pull/8821'}
null
PyPI
PYSEC-2013-34
null
Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093.
{'CVE-2013-5942'}
2021-11-16T21:20:28.715114Z
2013-09-27T10:08:00Z
null
null
null
{'https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst', 'http://secunia.com/advisories/54556'}
null
PyPI
GHSA-9jhm-8m8c-c3f4
SSRF in Sydent due to missing validation of hostnames
### Impact Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration. ### Patches Fixed in 9e57334, 8936925, 3d531ed, 0f00412 ### Workarounds A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
{'CVE-2021-29431'}
2022-03-03T05:14:17.907013Z
2021-04-19T14:54:15Z
HIGH
null
{'CWE-20', 'CWE-918'}
{'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f', 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://pypi.org/project/matrix-sydent/', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29431'}
null
PyPI
GHSA-5jqp-qgf6-3pvh
Use of "infinity" as an input to datetime and date fields causes infinite loop in pydantic
Impact Passing either 'infinity', 'inf' or float('inf') (or their negatives) to datetime or date fields causes validation to run forever with 100% CPU usage (on one CPU). Patches Pydantic is be patched with fixes available in the following versions: v1.8.2 v1.7.4 v1.6.2 All these versions are available on pypi, and will be available on conda-forge soon. See the changelog for details. Workarounds If you absolutely can't upgrade, you can work around this risk using a validator to catch these values, brief demo: from datetime import date from pydantic import BaseModel, validator class DemoModel(BaseModel): date_of_birth: date @validator('date_of_birth', pre=True) def skip_infinite_values(cls, v): try: seconds = float(v) except (ValueError, TypeError): return v else: if seconds == float('inf'): return date.max elif seconds == float('-inf'): return date.min else: return seconds Note: this is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic. References This was fixed in commit 7e83fdd.
{'CVE-2021-29510'}
2022-03-03T05:13:24.568205Z
2021-05-13T20:23:17Z
LOW
null
{'CWE-835'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMKAJX4O6IGBBCE32CO2G7PZQCCQSBLV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEFWM7DYKD2ZHE7R5YT5EQWJPV4ZKYRB/', 'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29510', 'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2HT266L6Q7H6ICP7DFGXOGBJHNNKMKB/'}
null
PyPI
GHSA-xfrw-hxr5-ghqf
Cross-site Scripting in wagtail
### Impact When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin). ### Patches Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch). Site implementors who wish to retain the existing behaviour of allowing editors to insert HTML content in these blocks (and are willing to accept the risk of untrusted editors inserting arbitrary code) may disable the escaping by surrounding the relevant `{% include_block %}` tag in `{% autoescape off %}...{% endautoescape %}`. ### Workarounds Site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`. ### Acknowledgements Many thanks to Karen Tracey for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) * Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
{'CVE-2021-32681'}
2022-03-03T05:13:02.133305Z
2021-06-17T20:10:42Z
MODERATE
null
{'CWE-79'}
{'https://github.com/wagtail/wagtail/security/advisories/GHSA-xfrw-hxr5-ghqf', 'https://github.com/wagtail/wagtail/releases/tag/v2.12.5', 'https://github.com/wagtail/wagtail/releases/tag/v2.13.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32681', 'https://github.com/wagtail/wagtail/releases/tag/v2.11.8'}
null
PyPI
PYSEC-2010-9
null
ftpserver.py in pyftpdlib before 0.5.2 does not require the l permission for the MLST command, which allows remote authenticated users to bypass intended access restrictions and list the root directory via an FTP session.
{'CVE-2009-5012'}
2021-07-05T00:01:24.817551Z
2010-10-19T20:00:00Z
null
null
null
{'http://code.google.com/p/pyftpdlib/source/detail?r=596', 'http://code.google.com/p/pyftpdlib/source/diff?spec=svn596&r=596&format=side&path=/trunk/pyftpdlib/ftpserver.py', 'http://code.google.com/p/pyftpdlib/issues/detail?id=114', 'http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY'}
null
PyPI
GHSA-rcrv-228c-gprj
Invalid URL generation in bitlyshortener
### Impact Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.6.0 generate invalid short URLs. All users are affected and must update immediately. ### Patches Upgrading `bitlyshortener` to 0.6.0 or newer will prevent the generation such invalid short URLs. ### Workarounds A workaround is to replace "https://j.mp/" in each generated short URL with "https://bit.ly/". ### References * [Release notes](https://github.com/impredicative/bitlyshortener/releases)
null
2022-03-03T05:12:58.970600Z
2022-01-21T18:39:40Z
MODERATE
null
null
{'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-rcrv-228c-gprj', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.6.0', 'https://github.com/impredicative/bitlyshortener', 'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'}
null
PyPI
PYSEC-2017-98
null
Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.
{'CVE-2016-9015'}
2021-08-27T03:42:51.689777Z
2017-01-11T16:59:00Z
null
null
null
{'http://www.openwall.com/lists/oss-security/2016/10/27/6', 'http://www.securityfocus.com/bid/93941'}
null
PyPI
PYSEC-2020-95
null
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
{'CVE-2020-9480'}
2021-04-02T12:15:00Z
2020-06-23T22:15:00Z
null
null
null
{'https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E', 'https://spark.apache.org/security.html#CVE-2020-9480', 'https://lists.apache.org/thread.html/ree9e87aae81852330290a478692e36ea6db47a52a694545c7d66e3e2@%3Cdev.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb3956440747e41940d552d377d50b144b60085e7ff727adb0e575d8d@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b@%3Cuser.spark.apache.org%3E'}
null
PyPI
PYSEC-2018-13
null
An issue was discovered in markdown2 (aka python-markdown2) through 2.3.5. The safe_mode feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final '>' character from an IMG tag.
{'GHSA-p6h9-gw49-rqm4', 'CVE-2018-5773'}
2021-06-16T00:03:23.657711Z
2018-01-18T21:29:00Z
null
null
null
{'https://github.com/trentm/python-markdown2/issues/285', 'https://github.com/advisories/GHSA-p6h9-gw49-rqm4'}
null
PyPI
PYSEC-2021-862
null
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.
{'GHSA-743r-5g92-5vgf', 'CVE-2021-40829'}
2022-01-05T02:16:12.435653Z
2021-11-23T00:15:00Z
null
null
null
{'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/advisories/GHSA-743r-5g92-5vgf', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/awslabs/aws-c-io/'}
null
PyPI
PYSEC-2020-161
null
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
{'GHSA-gwr8-5j83-483c', 'CVE-2019-14904'}
2021-01-28T18:00:00Z
2020-08-26T03:15:00Z
null
null
null
{'https://github.com/ansible/ansible/pull/65686', 'https://github.com/advisories/GHSA-gwr8-5j83-483c', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1776944'}
null
PyPI
GHSA-x83m-p7pv-ch8v
Division by 0 in `QuantizedAdd`
### Impact An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedAdd`: ```python import tensorflow as tf x = tf.constant([68, 228], shape=[2, 1], dtype=tf.quint8) y = tf.constant([], shape=[2, 0], dtype=tf.quint8) min_x = tf.constant(10.723421015884028) max_x = tf.constant(15.19578006631113) min_y = tf.constant(-5.539003866682977) max_y = tf.constant(42.18819949559947) tf.raw_ops.QuantizedAdd(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero. ```cc void VectorTensorAddition(const T* vector_data, float min_vector, float max_vector, int64 vector_num_elements, const T* tensor_data, float min_tensor, float max_tensor, int64 tensor_num_elements, float output_min, float output_max, Toutput* output) { for (int i = 0; i < tensor_num_elements; ++i) { const int64 vector_i = i % vector_num_elements; ... } } ``` Since `vector_num_elements` is [determined based on input shapes](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0. ### Patches We have patched the issue in GitHub commit [744009c9e5cc5d0447f0dc39d055f917e1fd9e16](https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29549'}
2022-03-03T05:12:52.895242Z
2021-05-21T14:23:38Z
LOW
null
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29549', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v', 'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'}
null
PyPI
PYSEC-2021-531
null
TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of `ArgMin`/`ArgMax`(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-crch-j389-5f84', 'CVE-2021-29603'}
2021-12-09T06:34:59.386976Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84', 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'}
null
PyPI
PYSEC-2014-30
null
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.
{'CVE-2012-5488'}
2021-09-01T08:44:29.194034Z
2014-09-30T14:55:00Z
null
null
null
{'https://plone.org/products/plone-hotfix/releases/20121106', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'https://plone.org/products/plone/security/advisories/20121106/04', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'http://rhn.redhat.com/errata/RHSA-2014-1194.html'}
null
PyPI
GHSA-wq5h-f9p5-q7fx
Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields
### Impact When saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. ### Patches Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch). ### Workarounds For sites that cannot easily upgrade to a current supported version, the vulnerability can be patched by adding the following code to a `wagtail_hooks.py` module in any installed app: ```python from draftjs_exporter.dom import DOM from wagtail.admin.rich_text.converters.html_to_contentstate import ExternalLinkElementHandler, PageLinkElementHandler from wagtail.core import hooks from wagtail.core.whitelist import check_url def link_entity(props): id_ = props.get('id') link_props = {} if id_ is not None: link_props['linktype'] = 'page' link_props['id'] = id_ else: link_props['href'] = check_url(props.get('url')) return DOM.create_element('a', link_props, props['children']) @hooks.register('register_rich_text_features', order=1) def register_link(features): features.register_converter_rule('contentstate', 'link', { 'from_database_format': { 'a[href]': ExternalLinkElementHandler('LINK'), 'a[linktype="page"]': PageLinkElementHandler('LINK'), }, 'to_database_format': { 'entity_decorators': {'LINK': link_entity} } }) ``` ### Acknowledgements Many thanks to Kevin Breen for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) * Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
{'CVE-2021-29434'}
2022-03-03T05:12:45.312573Z
2021-04-20T14:02:30Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29434', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx', 'https://pypi.org/project/wagtail/'}
null
PyPI
PYSEC-2021-161
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/496c2630e51c1a478f095b084329acedb253db6b/tensorflow/core/kernels/conv_grad_shape_utils.cc#L130) does a modulus operation where the divisor is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-r4pj-74mg-8868', 'CVE-2021-29524'}
2021-08-27T03:22:25.604287Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868', 'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'}
null
PyPI
PYSEC-2021-474
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`. This is because the implementation of the Eigen kernel(https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/tensorflow/core/kernels/quantization_utils.h#L812-L849) does a division by the number of elements of the smaller input (based on shape) without checking that this is not zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29546', 'GHSA-m34j-p8rj-wjxq'}
2021-12-09T06:34:50.495115Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m34j-p8rj-wjxq', 'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'}
null
PyPI
PYSEC-2022-168
null
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
{'CVE-2022-24303'}
2022-03-28T05:28:10.602682Z
2022-03-28T02:15:00Z
null
null
null
{'https://github.com/python-pillow/Pillow/pull/3450', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security'}
null
PyPI
PYSEC-2022-47
null
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.
{'CVE-2022-21696', 'GHSA-68vr-8f46-vc9f'}
2022-03-09T00:16:43.504149Z
2022-01-18T20:15:00Z
null
null
null
{'https://github.com/onionshare/onionshare/security/advisories/GHSA-68vr-8f46-vc9f', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'}
null
PyPI
GHSA-xrcv-f9gm-v42c
Out-of-bounds Read in Pillow
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
{'CVE-2022-22816'}
2022-03-03T05:13:32.849115Z
2022-01-12T20:07:41Z
MODERATE
null
{'CWE-125'}
{'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22816', 'https://github.com/python-pillow/Pillow', 'https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331', 'https://www.debian.org/security/2022/dsa-5053'}
null
PyPI
PYSEC-2019-127
null
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
{'CVE-2019-10868'}
2020-08-26T12:45:00Z
2019-04-05T01:29:00Z
null
null
null
{'https://seclists.org/bugtraq/2019/Apr/14', 'https://hg.tryton.org/trytond/rev/f58bbfe0aefb', 'https://www.debian.org/security/2019/dsa-4426', 'https://discuss.tryton.org/t/security-release-for-issue8189/1262'}
null
PyPI
GHSA-8rm6-75mf-7r7r
Division by zero in TFLite's implementation of hashtable lookup
### Impact The TFLite implementation of hashtable lookup is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115): ```cc const int num_rows = SizeOfDimension(value, 0); const int row_bytes = value->bytes / num_rows; ``` An attacker can craft a model such that `values`'s first dimension would be 0. ### Patches We have patched the issue in GitHub commit [5117e0851348065ed59c991562c0ec80d9193db2](https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29604'}
2022-03-03T05:12:57.748379Z
2021-05-21T14:28:19Z
LOW
null
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29604'}
null
PyPI
GHSA-gvm4-h8j3-rjrq
CHECK-fail in `LoadAndRemapMatrix`
### Impact An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from `tf.raw_ops.LoadAndRemapMatrix`: ```python import tensorflow as tf ckpt_path = tf.constant([], shape=[0], dtype=tf.string) old_tensor_name = tf.constant("") row_remapping = tf.constant([], shape=[0], dtype=tf.int64) col_remapping = tf.constant([1], shape=[1], dtype=tf.int64) initializing_values = tf.constant(1.0) tf.raw_ops.LoadAndRemapMatrix( ckpt_path=ckpt_path, old_tensor_name=old_tensor_name, row_remapping=row_remapping, col_remapping=col_remapping, initializing_values=initializing_values, num_rows=0, num_cols=1) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) assumes that the `ckpt_path` is always a valid scalar. ```cc const string& ckpt_path = ckpt_path_t->scalar<tstring>()(); ``` However, an attacker can send any other tensor as the first argument of `LoadAndRemapMatrix`. This would cause the rank `CHECK` in `scalar<T>()()` to trigger and terminate the process. ### Patches We have patched the issue in GitHub commit [77dd114513d7796e1e2b8aece214a380af26fbf4](https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29561'}
2022-03-03T05:13:13.590105Z
2021-05-21T14:24:59Z
LOW
null
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29561', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq', 'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'}
null
PyPI
PYSEC-2017-20
null
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
{'CVE-2016-9119'}
2021-07-05T00:01:23.049637Z
2017-01-30T22:59:00Z
null
null
null
{'http://www.debian.org/security/2016/dsa-3715', 'http://www.ubuntu.com/usn/USN-3137-1', 'http://www.securityfocus.com/bid/94501', 'https://moinmo.in/SecurityFixes'}
null
PyPI
GHSA-wh37-37xw-54hr
Improper Authentication in requests-kerberos
python-requests-Kerberos through 0.5 does not handle mutual authentication
{'CVE-2014-8650'}
2022-03-23T20:45:05.632995Z
2020-03-10T18:02:31Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/requests/requests-kerberos/blob/0.6/HISTORY.rst', 'https://github.com/mkomitee/requests-kerberos', 'https://github.com/requests/requests-kerberos/issues/35', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8650', 'http://www.openwall.com/lists/oss-security/2014/11/07/1', 'https://github.com/requests/requests-kerberos/pull/36', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8650', 'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6', 'http://www.securityfocus.com/bid/70909', 'https://security-tracker.debian.org/tracker/CVE-2014-8650'}
null
PyPI
PYSEC-2020-248
null
Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).
{'GHSA-2c8c-84w2-j38j', 'CVE-2020-28736'}
2021-08-27T03:22:11.576448Z
2020-12-30T19:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-2c8c-84w2-j38j', 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://www.misakikata.com/codes/plone/python-en.html', 'https://github.com/plone/Products.CMFPlone/issues/3209'}
null
PyPI
PYSEC-2021-248
null
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. The implementation(https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.cc#L40) has no validation that the input arguments specify a valid sparse tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are the only affected versions.
{'GHSA-9rpc-5v9q-5r7f', 'CVE-2021-29611'}
2021-08-27T03:22:41.176381Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9rpc-5v9q-5r7f'}
null
PyPI
PYSEC-2021-618
null
TensorFlow is an open source platform for machine learning. In affected versions the implementations for convolution operators trigger a division by 0 if passed empty filter tensor arguments. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-6hpv-v2rx-c5g6', 'CVE-2021-41209'}
2021-12-09T06:35:08.821435Z
2021-11-05T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6'}
null
PyPI
PYSEC-2021-57
null
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
{'CVE-2021-3197'}
2021-03-31T14:15:00Z
2021-02-27T05:15:00Z
null
null
null
{'https://github.com/saltstack/salt/releases', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/', 'https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/', 'https://security.gentoo.org/glsa/202103-01', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/'}
null
PyPI
PYSEC-2022-113
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-gcvh-66ff-4mwm', 'CVE-2022-21734'}
2022-03-09T00:18:24.222206Z
2022-02-03T13:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm', 'https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d'}
null
PyPI
GHSA-p737-p57g-4cpr
Insertion of Sensitive Information into Log File in Jupyter notebook
### Impact _What kind of vulnerability is it?_ Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Upgrade to Jupyter Server version 1.15.4 ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org). Credit: @3coins for reporting. Thank you!
{'CVE-2022-24757'}
2022-03-29T22:02:00.697152Z
2022-03-25T19:20:39Z
HIGH
null
{'CWE-532'}
{'https://github.com/jupyter-server/jupyter_server', 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24757', 'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a'}
null
PyPI
GHSA-jwcc-j78w-j73w
High severity vulnerability that affects ansible
Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.
{'CVE-2018-10855'}
2022-03-03T05:13:48.507350Z
2018-10-10T17:23:20Z
HIGH
null
{'CWE-532'}
{'https://access.redhat.com/errata/RHSA-2019:0054', 'https://www.debian.org/security/2019/dsa-4396', 'https://access.redhat.com/errata/RHSA-2018:1949', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10855', 'https://access.redhat.com/errata/RHSA-2018:2585', 'https://access.redhat.com/errata/RHSA-2018:1948', 'https://access.redhat.com/errata/RHSA-2018:2184', 'https://usn.ubuntu.com/4072-1/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10855', 'https://github.com/ansible/ansible', 'https://access.redhat.com/errata/RHSA-2018:2079', 'https://access.redhat.com/errata/RHSA-2018:2022', 'https://github.com/advisories/GHSA-jwcc-j78w-j73w', 'https://access.redhat.com/errata/RHBA-2018:3788'}
null
PyPI
PYSEC-2018-87
null
Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1.
{'CVE-2018-1000132'}
2021-08-27T03:22:07.192158Z
2018-03-14T13:29:00Z
null
null
null
{'https://access.redhat.com/errata/RHSA-2019:2276', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00034.html', 'https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.5.1_.2F_4.5.2_.282018-03-06.29', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00032.html'}
null
PyPI
PYSEC-2018-68
null
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 and 0.7.x before 0.7.3. When using JupyterHub with GitLab group whitelisting for access control, group membership was not checked correctly, allowing members not in the whitelisted groups to create accounts on the Hub. (Users were not allowed to access other users' accounts, but could create their own accounts on the Hub linked to their GitLab account. GitLab authentication not using gitlab_group_whitelist is unaffected. No other Authenticators are affected.)
{'CVE-2018-7206'}
2021-08-25T04:30:14.910557Z
2018-02-18T03:29:00Z
null
null
null
{'https://github.com/jupyterhub/oauthenticator/blob/8499dc2/CHANGELOG.md#073---2018-02-16', 'https://blog.jupyter.org/security-fix-for-jupyterhub-gitlab-oauthenticator-7b14571d1f76', 'https://github.com/jupyterhub/oauthenticator/commit/1845c0e4b1bff3462c91c3108c85205acd3c75a2'}
null
PyPI
PYSEC-2021-819
null
TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `tf.ragged.cross` can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-fr77-rrx3-cp7g', 'CVE-2021-41212'}
2021-12-09T06:35:42.944198Z
2021-11-05T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g'}
null
PyPI
GHSA-3hq4-f2v6-q338
Kotti has demonstrated permission change via document view
Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request.
{'CVE-2018-9856'}
2022-04-26T18:16:58.659818Z
2018-07-12T20:30:30Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-9856', 'https://github.com/advisories/GHSA-3hq4-f2v6-q338', 'https://github.com/Kotti/Kotti/issues/551'}
null
PyPI
PYSEC-2020-233
null
In freewvs before 0.1.1, a directory structure of more than 1000 nested directories can interrupt a freewvs scan due to Python's recursion limit and os.walk(). This can be problematic in a case where an administrator scans the dirs of potentially untrusted users. This has been patched in 0.1.1.
{'GHSA-7pmh-vrww-25xx', 'CVE-2020-15101'}
2021-08-27T03:22:04.227798Z
2020-07-14T22:15:00Z
null
null
null
{'https://github.com/schokokeksorg/freewvs/security/advisories/GHSA-7pmh-vrww-25xx', 'https://github.com/schokokeksorg/freewvs/commit/83a6b55c0435c69f447488b791555e6078803143'}
null
PyPI
PYSEC-2021-233
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `EmbeddingLookup` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74). An attacker can craft a model such that the first dimension of the `value` input is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-4vrf-ff7v-hpgr', 'CVE-2021-29596'}
2021-08-27T03:22:38.479573Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'}
null
PyPI
GHSA-5xc6-fpc7-4qvg
High severity vulnerability that affects CoAPthon
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
{'CVE-2018-12680'}
2022-03-03T05:12:43.141511Z
2019-04-08T15:19:01Z
HIGH
null
{'CWE-502'}
{'https://github.com/Tanganelli/CoAPthon/issues/135', 'https://github.com/Tanganelli/CoAPthon', 'https://github.com/advisories/GHSA-5xc6-fpc7-4qvg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12680'}
null
PyPI
PYSEC-2021-663
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedResizeBilinear` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/50711818d2e61ccce012591eeb4fdf93a8496726/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L705-L706) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-8c89-2vwr-chcq', 'CVE-2021-29537'}
2021-12-09T06:35:21.193841Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq'}
null
PyPI
PYSEC-2021-399
null
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `ParallelConcat` misses some input validation and can produce a division by 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-7v94-64hj-m82h', 'CVE-2021-41207'}
2021-11-13T06:52:43.264871Z
2021-11-05T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}
null
PyPI
GHSA-h4hv-m4h4-mhwg
Moderate severity vulnerability that affects django
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
{'CVE-2017-7234'}
2022-03-03T05:12:57.897728Z
2019-01-04T17:50:17Z
MODERATE
null
{'CWE-601'}
{'http://www.securitytracker.com/id/1038177', 'https://github.com/django/django', 'http://www.debian.org/security/2017/dsa-3835', 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg', 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/', 'http://www.securityfocus.com/bid/97401', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7234'}
null
PyPI
PYSEC-2021-376
null
python-tuf is a Python reference implementation of The Update Framework (TUF). In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`). The impact is mitigated by a few facts: It only affects implementations that allow arbitrary rolename selection for delegated targets metadata, The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata, The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json. A fix is available in version 0.19 or newer. There are no workarounds that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf.
{'CVE-2021-41131', 'GHSA-wjw6-2cqr-j4qr'}
2021-10-22T22:29:45.339771Z
2021-10-19T18:15:00Z
null
null
null
{'https://github.com/theupdateframework/python-tuf/issues/1527', 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr', 'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102'}
null
PyPI
PYSEC-2013-18
null
The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.
{'CVE-2013-1443'}
2021-07-15T02:22:08.840916Z
2013-09-23T20:55:00Z
null
null
null
{'http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html', 'https://www.djangoproject.com/weblog/2013/sep/15/security/', 'http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html', 'http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html', 'http://www.debian.org/security/2013/dsa-2758'}
null
PyPI
GHSA-fvxv-9xxr-h7wj
Moderate severity vulnerability that affects pyspark
When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.
{'CVE-2018-11760'}
2022-03-03T05:12:10.475321Z
2019-02-07T18:02:21Z
MODERATE
null
null
{'http://www.securityfocus.com/bid/106786', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11760', 'https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b@%3Cuser.spark.apache.org%3E', 'https://github.com/advisories/GHSA-fvxv-9xxr-h7wj'}
null
PyPI
PYSEC-2021-726
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `OneHot` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72). An attacker can craft a model such that at least one of the dimensions of `indices` would be 0. In turn, the `prefix_dim_size` value would become 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-j8qh-3xrq-c825', 'CVE-2021-29600'}
2021-12-09T06:35:32.041975Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'}
null
PyPI
PYSEC-2020-56
null
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
{'CVE-2020-12692'}
2020-09-02T16:15:00Z
2020-05-07T00:15:00Z
null
null
null
{'https://www.openwall.com/lists/oss-security/2020/05/06/4', 'https://bugs.launchpad.net/keystone/+bug/1872737', 'https://usn.ubuntu.com/4480-1/', 'http://www.openwall.com/lists/oss-security/2020/05/07/1', 'https://security.openstack.org/ossa/OSSA-2020-003.html'}
null
PyPI
GHSA-4rcq-jv2f-898j
Incorrect Provision of Specified Functionality in qutebrowser
# Description After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has seen a certificate error prompt at this point (or set `content.ssl_strict` to `false` which is not recommended), this could still provide a false sense of security. # Affected versions and patches All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested. The issue is fixed in qutebrowser v1.11.1 (pending release) and v1.12.0 (unreleased). Backported patches for older versions are available, but no further releases are planned. # Mitigation If you are unable to upgrade: - Treat any host with a certificate exception as insecure, ignoring the URL color - Or set `content.ssl_strict` to `True` (instead of `'ask'`), preventing certificate exceptions # References - qutebrowser issue: https://github.com/qutebrowser/qutebrowser/issues/5403 - Fix (master branch): https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975 - Related issue for KDE Falkon: https://bugs.kde.org/show_bug.cgi?id=420902 - Related issue for eric6 Web Browser: https://tracker.die-offenbachs.homelinux.org/eric/issue328 (fixed in eric6 20.6)
{'CVE-2020-11054'}
2022-03-03T05:13:10.491189Z
2020-05-08T19:05:05Z
LOW
null
{'CWE-684'}
{'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755', 'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948', 'https://github.com/qutebrowser/qutebrowser/issues/5403', 'https://tracker.die-offenbachs.homelinux.org/eric/issue328', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11054', 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKAZOOTJ2MBHTYVYQQ52NL53F5CB2XAP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YWJ5QNHXKTGG5NLV7EGEOKPBVZBA5GS/', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327', 'https://bugs.kde.org/show_bug.cgi?id=420902'}
null
PyPI
PYSEC-2022-144
null
Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector based on a value from a tensor controlled by the user. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-23580', 'GHSA-627q-g293-49q7'}
2022-03-09T00:18:28.435695Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-627q-g293-49q7', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790', 'https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7'}
null
PyPI
PYSEC-2021-458
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments. Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since `OP_REQUIRES`(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function. Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-xcwj-wfcm-m23c', 'CVE-2021-29530'}
2021-12-09T06:34:48.047849Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
null
PyPI
GHSA-3pqx-4fqf-j49f
Deserialization of Untrusted Data in PyYAML
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
{'CVE-2019-20477'}
2022-03-03T05:13:18.732369Z
2021-04-20T16:40:42Z
HIGH
null
{'CWE-502'}
{'https://www.exploit-db.com/download/47655', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/', 'https://github.com/yaml/pyyaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20477', 'https://github.com/yaml/pyyaml/blob/master/CHANGES'}
null
PyPI
GHSA-337x-4q8g-prc5
Low severity vulnerability that affects django
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
{'CVE-2019-3498'}
2022-03-03T05:14:13.089850Z
2019-01-14T16:20:05Z
MODERATE
null
{'CWE-20'}
{'https://www.debian.org/security/2019/dsa-4363', 'http://www.securityfocus.com/bid/106453', 'https://github.com/advisories/GHSA-337x-4q8g-prc5', 'https://usn.ubuntu.com/3851-1/', 'https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ', 'https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html', 'https://www.djangoproject.com/weblog/2019/jan/04/security-releases/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3498', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/'}
null
PyPI
PYSEC-2016-21
null
python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted document.
{'CVE-2016-5851'}
2021-07-25T23:34:51.683518Z
2016-12-21T22:59:00Z
null
null
null
{'http://www.securityfocus.com/bid/91485', 'https://github.com/python-openxml/python-docx/blob/v0.8.6/HISTORY.rst', 'http://www.openwall.com/lists/oss-security/2016/06/28/8', 'http://www.openwall.com/lists/oss-security/2016/06/28/7'}
null
PyPI
GHSA-mp9m-g7qj-6vqr
Unauthorized privilege escalation in Mod module
### Impact An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possible to perform destructive actions within the guild the user has high privileges in. ### Patches This exploit has been fixed on version & ``3.4.1``. ### Workarounds Unloading the Mod module with ``unload mod`` __or__, disabling the ``massban`` command with ``command disable global massban`` can render this exploit not accessible. We still highly recommend updating to ``3.4.1`` to completely patch this issue. ### References * https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)
null
2022-03-03T05:14:17.655531Z
2020-10-27T20:30:48Z
MODERATE
null
{'CWE-285'}
{'https://github.com/Cog-Creators/Red-DiscordBot/', 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b', 'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr', 'https://pypi.org/project/Red-DiscordBot/'}
null
PyPI
PYSEC-2022-84
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateTensorSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-23575', 'GHSA-c94w-c95p-phf8'}
2022-03-09T00:17:34.290009Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8', 'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558'}
null
PyPI
GHSA-4q96-6xhq-ff43
malicious SVG attachment causing stored XSS vulnerability
### Impact An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. ### Patches Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. ### Workarounds It is not advised to work around this, but to upgrade MoinMoin to a patched version. That said, a work around via a Content Security Policy in the web server might be possible. Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users. ### For more information If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de). ### Credits This vulnerability was discovered by: Catarina Leite from the Checkmarx SCA AppSec team
{'CVE-2020-15275'}
2022-03-03T05:12:43.570455Z
2020-11-11T15:54:41Z
LOW
null
{'CWE-79'}
{'https://pypi.org/project/moin/', 'https://github.com/moinwiki/moin-1.9/releases/tag/1.9.11', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43', 'https://advisory.checkmarx.net/advisory/CX-2020-4285', 'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15275'}
null
PyPI
PYSEC-2021-634
null
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's Grappler optimizer has a use of unitialized variable. If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41225', 'GHSA-7r94-xv9v-63jw'}
2021-12-09T06:35:11.117498Z
2021-11-05T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw'}
null
PyPI
PYSEC-2021-264
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/resource_variable_ops.cc#L865) uses a common class for all binary operations but fails to treat the division by 0 case separately. We have patched the issue in GitHub commit 4aacb30888638da75023e6601149415b39763d76. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37642', 'GHSA-ch4f-829c-v5pw'}
2021-08-27T03:22:43.277267Z
2021-08-12T18:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw', 'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76'}
null
PyPI
PYSEC-2020-264
null
In "I hate money" before version 4.1.5, an authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. This is fixed in version 4.1.5.
{'CVE-2020-15120', 'GHSA-67j9-c52g-w2q9'}
2021-11-16T03:58:44.236145Z
2020-07-27T18:15:00Z
null
null
null
{'https://github.com/spiral-project/ihatemoney/commit/8d77cf5d5646e1d2d8ded13f0660638f57e98471', 'https://github.com/spiral-project/ihatemoney/security/advisories/GHSA-67j9-c52g-w2q9'}
null
PyPI
GHSA-jqwc-jm56-wcwj
Cross-site scripting in Jupyter Notebook
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
{'CVE-2018-21030'}
2022-03-03T05:14:01.909978Z
2019-11-08T17:07:42Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jupyter/notebook/pull/3341', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21030', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://github.com/jupyter/notebook/releases/tag/5.5.0'}
null
PyPI
GHSA-rwr3-c2q8-gm56
Moderate severity vulnerability that affects Pillow
Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component.
{'CVE-2016-9189'}
2022-03-03T05:13:34.860527Z
2018-07-24T20:08:27Z
MODERATE
null
{'CWE-190'}
{'https://github.com/python-pillow/Pillow/', 'https://github.com/python-pillow/Pillow/issues/2105', 'http://www.securityfocus.com/bid/94234', 'https://github.com/advisories/GHSA-rwr3-c2q8-gm56', 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'https://security.gentoo.org/glsa/201612-52', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189', 'http://www.debian.org/security/2016/dsa-3710', 'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'}
null
PyPI
PYSEC-2019-222
null
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.
{'CVE-2018-10055'}
2021-08-27T03:22:22.150023Z
2019-04-24T17:29:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-006.md'}
null
PyPI
PYSEC-2020-321
null
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were added in commits f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode. The issue is patched in commit adf095206f25471e864a8e63a0f1caef53a0e3a6, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
{'CVE-2020-15206', 'GHSA-w5gh-2wr2-pm6g'}
2021-12-09T06:35:14.366685Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w5gh-2wr2-pm6g', 'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}
null
PyPI
PYSEC-2015-31
null
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
{'CVE-2015-1852'}
2021-07-25T23:34:52.173858Z
2015-04-17T17:59:00Z
null
null
null
{'http://www.securityfocus.com/bid/74187', 'http://lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html', 'https://bugs.launchpad.net/keystonemiddleware/+bug/1411063', 'http://www.ubuntu.com/usn/USN-2705-1', 'http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html', 'http://rhn.redhat.com/errata/RHSA-2015-1685.html', 'http://rhn.redhat.com/errata/RHSA-2015-1677.html'}
null
PyPI
PYSEC-2021-771
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`. We have patched the issue in GitHub commit e86605c0a336c088b638da02135ea6f9f6753618. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-cm5x-837x-jf3c', 'CVE-2021-37660'}
2021-12-09T06:35:37.526889Z
2021-08-12T18:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c'}
null
PyPI
PYSEC-2021-94
null
An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.
{'GHSA-hjfx-8p6c-g7gx', 'CVE-2021-28678'}
2021-06-09T05:01:24.292350Z
2021-06-02T16:15:00Z
null
null
null
{'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://github.com/advisories/GHSA-hjfx-8p6c-g7gx', 'https://github.com/python-pillow/Pillow/pull/5377'}
null
PyPI
PYSEC-2019-12
null
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
{'GHSA-h5jv-4p7w-64jg', 'CVE-2019-14233'}
2020-08-24T17:37:00Z
2019-08-02T15:15:00Z
null
null
null
{'https://seclists.org/bugtraq/2019/Aug/15', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://www.debian.org/security/2019/dsa-4498', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://security.gentoo.org/glsa/202004-17', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://github.com/advisories/GHSA-h5jv-4p7w-64jg', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}
null
PyPI
PYSEC-2021-321
null
Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint where there are no live references at this safepoint, and there is a safepoint with live references earlier in this frame's function. Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `<ExternRef as Drop>::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes. Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug. We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare. This bug has been patched and users should upgrade to Wasmtime version 0.30.0. If you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to `wasmtime::Config::wasm_reference_types`.
{'GHSA-4873-36h9-wv49', 'CVE-2021-39218'}
2021-09-17T22:30:49.898970Z
2021-09-17T21:15:00Z
null
null
null
{'https://crates.io/crates/wasmtime', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4873-36h9-wv49', 'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'}
null
PyPI
PYSEC-2022-152
null
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are not allowed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-fx5c-h9f6-rv7c', 'CVE-2022-23588'}
2022-03-09T00:18:29.595866Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402', 'https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6'}
null
PyPI
PYSEC-2012-8
null
Python Keyring 0.9.1 does not securely initialize the cipher when encrypting passwords for CryptedFileKeyring files, which makes it easier for local users to obtain passwords via a brute-force attack.
{'CVE-2012-4571'}
2021-07-15T02:22:15.253541Z
2012-11-30T22:55:00Z
null
null
null
{'https://bugs.launchpad.net/ubuntu/+source/python-keyring/+bug/1004845', 'http://www.ubuntu.com/usn/USN-1634-1', 'http://www.openwall.com/lists/oss-security/2012/10/31/8', 'http://pypi.python.org/pypi/keyring'}
null
PyPI
GHSA-gjqc-q9g6-q2j3
`CHECK`-failures in binary ops in Tensorflow
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [any binary op](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137) would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved: ```cc functor::BinaryFunctor<Device, Functor, 1>()( eigen_device, out->template flat<Tout>(), input_0.template flat<Tin>(), input_1.template flat<Tin>(), error_ptr); ``` If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service. ### Patches We have patched the issue in GitHub commit [a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9](https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23583'}
2022-03-03T05:13:44.768574Z
2022-02-10T00:34:13Z
MODERATE
null
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23583', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137', 'https://github.com/tensorflow/tensorflow/'}
null
PyPI
GHSA-mq5p-2mcr-m52j
Code injection in nbgitpuller
### Impact Due to an unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. ### Patches 0.10.2 ### Workarounds None, other than upgrade to 0.10.2 or downgrade to 0.8.x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [nbgitpuller](https://github.com/jupyterhub/nbgitpuller/issues) * Email our security team at [security@ipython.org](mailto:security@ipython.org)
{'CVE-2021-39160'}
2022-03-22T21:32:03.613306Z
2021-08-30T16:17:06Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39160', 'https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j', 'https://github.com/jupyterhub/nbgitpuller', 'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481', 'https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25'}
null
PyPI
PYSEC-2020-40
null
An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained.
{'CVE-2020-10594', 'GHSA-fpjm-rp2g-3r4c'}
2020-03-19T17:38:00Z
2020-03-15T22:15:00Z
null
null
null
{'https://github.com/jpadilla/django-rest-framework-jwt/issues/484', 'https://github.com/advisories/GHSA-fpjm-rp2g-3r4c', 'https://pypi.org/project/drf-jwt/1.15.1/#history', 'https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36'}
null
PyPI
GHSA-rg3m-hqc5-344v
`SparseFillEmptyRows` heap OOB
### Impact The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L194-L241) of `SparseFillEmptyRows` can be made to trigger a heap OOB access: ```python import tensorflow as tf data=tf.raw_ops.SparseFillEmptyRows( indices=[[0,0],[0,0],[0,0]], values=['sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss'], dense_shape=[5,3], default_value='o') ``` This occurs whenever the size of `indices` does not match the size of `values`. ### Patches We have patched the issue in GitHub commit [67bfd9feeecfb3c61d80f0e46d89c170fbee682b](https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41224'}
2022-03-03T05:12:57.990913Z
2021-11-10T18:45:55Z
HIGH
null
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41224', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v', 'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'}
null
PyPI
PYSEC-2022-92
null
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-23583', 'GHSA-gjqc-q9g6-q2j3'}
2022-03-09T00:17:35.311751Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137', 'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'}
null
PyPI
PYSEC-2018-29
null
Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
{'CVE-2018-15750'}
2021-06-16T00:03:24.871222Z
2018-10-24T22:29:00Z
null
null
null
{'https://lists.debian.org/debian-lts-announce/2020/07/msg00024.html', 'https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html', 'https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html', 'https://groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ', 'https://groups.google.com/d/msg/salt-users/L9xqcJ0UXxs/qgDj42obBQAJ', 'https://usn.ubuntu.com/4459-1/', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html'}
null
PyPI
PYSEC-2021-858
null
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.
{'GHSA-q4xr-rc97-m4xx', 'SNYK-PYTHON-CELERY-2314953', 'CVE-2021-23727'}
2021-12-29T19:23:51.138646Z
2021-12-29T17:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-q4xr-rc97-m4xx', 'https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953', 'https://github.com/celery/celery/blob/master/Changelog.rst%23522'}
null
PyPI
GHSA-hggv-mcp4-vxc5
Improper Authentication in FreeTAKServer
FreeTAKServer is an open source, lightweight Server for connect TAK clients. An access control issue in the component /ManageRoute/postRoute of FreeTAKServer version 1.9.8 allows unauthenticated attackers to cause a Denial of Service (DoS) via an unusually large amount of created routes, or create unsafe or false routes for legitimate users. There is currently no known workaround. This issue was fixed in version 1.9.8.5.
{'CVE-2022-25508'}
2022-03-25T00:04:22.281015Z
2022-03-12T00:00:37Z
HIGH
null
{'CWE-400', 'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25508', 'https://github.com/FreeTAKTeam/FreeTakServer/issues/291', 'https://github.com/FreeTAKTeam/FreeTakServer'}
null