ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
PyPI | PYSEC-2021-600 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation. Hence, an attacker can read arbitrary data from the heap by carefully crafting a model with negative values in `indices`. Similar issue exists in [`Gather` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather.cc). We have patched the issue in GitHub commits bb6a0383ed553c286f87ca88c207f6774d5c4a8f and eb921122119a6b6e470ee98b89e65d721663179d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-jwf9-w5xm-f437', 'CVE-2021-37687'} | 2021-12-09T06:35:06.437026Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d', 'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f'} | null |
PyPI | PYSEC-2020-250 | null | Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved. | {'CVE-2020-14019'} | 2021-08-27T03:22:19.931800Z | 2020-06-19T11:15:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/', 'https://github.com/open-iscsi/rtslib-fb/pull/162'} | null |
PyPI | GHSA-375m-5fvv-xq23 | VVE-2021-0002: Incorrect `returndatasize` when using simple forwarder proxies deployed prior to EIP-1167 adoption | ## Background
@tjayrush reported a data handling issue with certain Web3 libraries using Vyper-deploy forwarder proxy contracts using our Vyper's built-in `create_forwarder_to` function prior to our change to support EIP-1167 style forwarder proxies.
### Impact
If you are an end user of a forwarder-style proxy deployed using Vyper's built-in `create_forwarder_to` function AND you have a function that returns >4096 bytes AND you do no return data sanitation on the value returned, you could potentially see a data corruption issue.
Otherwise, if you are handling the result of a return call AND you expect a specific `RETURNDATASIZE` that is less than 4096 (such as `SafeERC20.safeTransfer`) then the call will fail that check.
### Patches
The issue was patched when we upgraded to EIP-1167 style forwarder proxies in #2281.
### Workarounds
If you are making a call to a contract method that is expected to return <= 4096 bytes, there is no issue as the ABI decoders in both Solidity and Vyper will truncate the data properly. Web3 libraries will also do this, unless you are doing `eth_call` or `eth_sendTransaction` directly.
If you are using a Solidity library that checks `RETURNDATASIZE` of an external call to a forwarder proxy deployed prior to this patch, it will fail on that assertion (such as `SafeERC20.safeTransfer`). The workaround is to always do a greater than or equal to check, rather than a strict equals to check. | null | 2022-03-03T05:12:42.615898Z | 2021-04-19T15:11:54Z | LOW | null | {'CWE-20'} | {'https://github.com/vyperlang/vyper/security/advisories/GHSA-375m-5fvv-xq23', 'https://github.com/vyperlang/vyper/pull/2281', 'https://pypi.org/project/vyper/'} | null |
PyPI | PYSEC-2020-315 | null | In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Thus, the code sets up conditions to cause a heap buffer overflow. A `BatchedMap` is equivalent to a vector where each element is a hashmap. However, if the first element of `splits_values` is not 0, `batch_idx` will never be 1, hence there will be no hashmap at index 0 in `per_batch_counts`. Trying to access that in the user code results in a segmentation fault. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1. | {'CVE-2020-15200', 'GHSA-x7rp-74x2-mjf3'} | 2021-12-09T06:35:13.201827Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x7rp-74x2-mjf3'} | null |
PyPI | PYSEC-2017-38 | null | When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed. | {'CVE-2017-5192'} | 2021-07-05T00:01:26.736529Z | 2017-09-26T14:29:00Z | null | null | null | {'https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html', 'https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html', 'https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html'} | null |
PyPI | PYSEC-2019-216 | null | A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. This also presented a Local File Disclosure vulnerability to any file readable by the webserver process. | {'CVE-2019-12417', 'GHSA-q3p4-gw7r-wqjc'} | 2021-11-16T03:58:43.222984Z | 2019-10-30T22:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-q3p4-gw7r-wqjc', 'https://lists.apache.org/thread.html/f3aa5ff9c7cdb5424b6463c9013f6cf5db83d26c66ea77130cbbe1bc@%3Cusers.airflow.apache.org%3E'} | null |
PyPI | PYSEC-2011-3 | null | The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header. | {'CVE-2011-4138'} | 2021-07-05T00:01:17.957407Z | 2011-10-19T10:55:00Z | null | null | null | {'https://www.djangoproject.com/weblog/2011/sep/09/', 'http://openwall.com/lists/oss-security/2011/09/13/2', 'http://www.debian.org/security/2011/dsa-2332', 'https://hermes.opensuse.org/messages/14700881', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'http://secunia.com/advisories/46614', 'https://www.djangoproject.com/weblog/2011/sep/10/127/'} | null |
PyPI | PYSEC-2021-315 | null | nbgitpuller is a Jupyter server extension to sync a git repository one-way to a local path. Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. This has been resolved in version 0.10.2 and all users are advised to upgrade. No work around exist for users who can not upgrade. | {'CVE-2021-39160', 'GHSA-mq5p-2mcr-m52j'} | 2021-08-30T18:40:30.558311Z | 2021-08-25T18:15:00Z | null | null | null | {'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481', 'https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j', 'https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25'} | null |
PyPI | PYSEC-2019-26 | null | invenio-previewer before 1.0.0a12 allows XSS. | {'CVE-2019-1020019', 'GHSA-j9m2-6hq2-4r3c'} | 2019-07-31T19:44:00Z | 2019-07-29T14:15:00Z | null | null | null | {'https://github.com/inveniosoftware/invenio-previewer/security/advisories/GHSA-j9m2-6hq2-4r3c'} | null |
PyPI | PYSEC-2021-745 | null | TensorFlow is an end-to-end open source platform for machine learning. Passing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29619', 'GHSA-wvjw-p9f5-vq28'} | 2021-12-09T06:35:35.220537Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wvjw-p9f5-vq28'} | null |
PyPI | PYSEC-2021-732 | null | TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of `Split_V`(https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the `SizeOfDimension` function(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/kernel_util.h#L148-L150) will access data outside the bounds of the tensor shape array. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29606', 'GHSA-h4pc-gx2w-f2xv'} | 2021-12-09T06:35:33.046688Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h4pc-gx2w-f2xv'} | null |
PyPI | PYSEC-2021-698 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer. The implementation(https://github.com/tensorflow/tensorflow/blob/60a45c8b6192a4699f2e2709a2645a751d435cc3/tensorflow/core/kernels/sdca_internal.cc) does not validate that the user supplied arguments satisfy all constraints expected by the op(https://www.tensorflow.org/api_docs/python/tf/raw_ops/SdcaOptimizer). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-5gqf-456p-4836', 'CVE-2021-29572'} | 2021-12-09T06:35:27.168452Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836', 'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb'} | null |
PyPI | GHSA-ggmr-44cv-24pm | Code injection via unsafe YAML loading | ### Impact
Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files.
An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally.
### Patches
The issue is fixed in version 2.3.24 and above by #964.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [awslabs/sockeye](https://github.com/awslabs/sockeye)
* Email us at [sockeye-dev](mailto:sockeye-dev@amazon.com)
### Attribution
This vulnerability was reported by Masatoshi Yoshizawa of yamory Security Team. | {'CVE-2021-43811'} | 2022-03-03T05:13:36.152134Z | 2021-12-09T18:35:22Z | MODERATE | null | {'CWE-94'} | {'https://github.com/awslabs/sockeye', 'https://github.com/awslabs/sockeye/releases/tag/2.3.24', 'https://github.com/awslabs/sockeye/security/advisories/GHSA-ggmr-44cv-24pm', 'https://github.com/awslabs/sockeye/pull/964', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43811'} | null |
PyPI | GHSA-35rg-466w-77h3 | Cross-site scripting in Products.CMFCore, Products.PluggableAuthService, Plone | Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS. | {'CVE-2021-33507'} | 2022-03-03T05:13:59.586788Z | 2021-06-18T18:44:50Z | MODERATE | null | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33507', 'https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots'} | null |
PyPI | GHSA-743r-5g92-5vgf | Improper certificate management in AWS IoT Device SDK v2 | Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS. | {'CVE-2021-40829'} | 2022-03-03T05:13:12.773300Z | 2021-11-24T21:11:16Z | MODERATE | null | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/awslabs/aws-c-io/'} | null |
PyPI | GHSA-rf4j-j272-fj86 | Django allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive | django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive. | {'CVE-2018-6188'} | 2022-04-26T18:47:55.028895Z | 2018-10-03T21:13:54Z | HIGH | null | {'CWE-200'} | {'https://github.com/django/django', 'https://usn.ubuntu.com/3559-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6188', 'https://www.djangoproject.com/weblog/2018/feb/01/security-releases/', 'http://www.securitytracker.com/id/1040422', 'https://github.com/advisories/GHSA-rf4j-j272-fj86'} | null |
PyPI | GHSA-6528-wvf6-f6qg | Pycrypto generates weak key parameters | lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation. | {'CVE-2018-6594'} | 2022-04-26T18:17:17.628147Z | 2018-07-12T20:29:26Z | HIGH | null | {'CWE-326'} | {'https://github.com/dlitz/pycrypto/issues/253', 'https://github.com/TElgamal/attack-on-pycrypto-elgamal', 'https://security.gentoo.org/glsa/202007-62', 'https://github.com/advisories/GHSA-6528-wvf6-f6qg', 'https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html', 'https://usn.ubuntu.com/3616-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6594', 'https://usn.ubuntu.com/3616-2/', 'https://github.com/dlitz/pycrypto'} | null |
PyPI | PYSEC-2020-227 | null | All versions of package cabot are vulnerable to Cross-site Scripting (XSS) via the Endpoint column. | {'CVE-2020-7734', 'SNYK-PYTHON-CABOT-609862'} | 2021-08-27T03:21:56.574917Z | 2020-09-22T08:15:00Z | null | null | null | {'https://snyk.io/vuln/SNYK-PYTHON-CABOT-609862', 'https://github.com/arachnys/cabot/pull/694', 'https://www.exploit-db.com/exploits/48791', 'https://itsmeanonartist.tech/blogs/blog2.html'} | null |
PyPI | PYSEC-2021-38 | null | An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex. | {'CVE-2021-25292', 'GHSA-9hx2-hgq2-2g4f'} | 2021-03-22T14:03:00Z | 2021-03-19T04:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-9hx2-hgq2-2g4f', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'} | null |
PyPI | PYSEC-2021-677 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `MatrixTriangularSolve`(https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29551', 'GHSA-vqw6-72r7-fgw7'} | 2021-12-09T06:35:23.626707Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7'} | null |
PyPI | GHSA-52q8-877j-gghq | remote code execution via cache action in MoinMoin | ### Impact
The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to
the wiki can use this to achieve remote code execution.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
### Workarounds
It is not advised to work around this, but to upgrade MoinMoin to a patched version.
That said, a work around via disabling the `cache` or the `AttachFile` action might be possible.
Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users.
### Credits
This vulnerability was discovered by Michael Chapman.
### For more information
If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de). | {'CVE-2020-25074'} | 2022-03-22T21:01:58.312411Z | 2020-11-11T15:54:51Z | CRITICAL | null | {'CWE-22'} | {'https://pypi.org/project/moin/', 'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7', 'http://moinmo.in/SecurityFixes', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25074', 'https://www.debian.org/security/2020/dsa-4787', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-52q8-877j-gghq', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00020.html'} | null |
PyPI | PYSEC-2021-227 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because the broadcasting implementation(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/maximum_minimum.h#L52-L56) indexes in both tensors with the same index but does not validate that the index is within bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-24x6-8c7m-hv3f', 'CVE-2021-29590'} | 2021-08-27T03:22:37.400702Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x6-8c7m-hv3f', 'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578'} | null |
PyPI | GHSA-cjc7-49v2-jp64 | Incomplete validation in `SparseAdd` | ### Impact
Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data:
```python
import tensorflow as tf
a_indices = tf.zeros([10, 97], dtype=tf.int64)
a_values = tf.zeros([10], dtype=tf.int64)
a_shape = tf.zeros([0], dtype=tf.int64)
b_indices = tf.zeros([0, 0], dtype=tf.int64)
b_values = tf.zeros([0], dtype=tf.int64)
b_shape = tf.zeros([0], dtype=tf.int64)
thresh = 0
tf.raw_ops.SparseAdd(a_indices=a_indices,
a_values=a_values,
a_shape=a_shape,
b_indices=b_indices,
b_values=b_values,
b_shape=b_shape,
thresh=thresh)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_add_op.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation.
### Patches
We have patched the issue in GitHub commit [6fd02f44810754ae7481838b6a67c5df7f909ca3](https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3) followed by GitHub commit [41727ff06111117bdf86b37db198217fd7a143cc](https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29609'} | 2022-03-03T05:14:06.533877Z | 2021-05-21T14:28:29Z | MODERATE | null | {'CWE-787', 'CWE-665'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29609', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3', 'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64'} | null |
PyPI | PYSEC-2022-107 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then the implementation of `Dim` would access elements before the start of an array. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-6gmv-pjp9-p8w8', 'CVE-2022-21728'} | 2022-03-09T00:18:23.406972Z | 2022-02-03T11:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gmv-pjp9-p8w8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.h#L415-L428', 'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995'} | null |
PyPI | GHSA-63xm-rx5p-xvqr | Heap buffer overflow in Tensorflow | ### Impact
The implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L263-L269
It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow.
### Patches
We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15195'} | 2022-03-03T05:13:19.626280Z | 2020-09-25T18:28:29Z | HIGH | null | {'CWE-787', 'CWE-119', 'CWE-122'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15195', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'} | null |
PyPI | GHSA-hpv4-7p9c-mvfr | Heap buffer overflow in `FractionalAvgPoolGrad` | ### Impact
The implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers:
```python
import tensorflow as tf
tf.raw_ops.FractionalAvgPoolGrad(
orig_input_tensor_shape=[0,1,2,3],
out_backprop = np.array([[[[541],[541]],[[541],[541]]]]),
row_pooling_sequence=[0, 0, 0, 0, 0],
col_pooling_sequence=[-2, 0, 0, 2, 0],
overlapping=True)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area.
### Patches
We have patched the issue in GitHub commit [0f931751fb20f565c4e94aa6df58d54a003cdb30](https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37651'} | 2022-03-03T05:13:17.766274Z | 2021-08-25T14:43:21Z | HIGH | null | {'CWE-787', 'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr', 'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37651'} | null |
PyPI | PYSEC-2019-148 | null | In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow. | {'GHSA-68wv-rjrm-576p', 'CVE-2017-17835'} | 2021-07-05T00:01:17.030004Z | 2019-01-23T17:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-68wv-rjrm-576p', 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'} | null |
PyPI | PYSEC-2020-15 | null | An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands. | {'CVE-2020-11981', 'GHSA-976r-qfjj-c24w'} | 2020-07-24T18:19:00Z | 2020-07-17T00:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-976r-qfjj-c24w', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'} | null |
PyPI | PYSEC-2022-28 | null | Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1. | {'CVE-2022-0736', 'GHSA-vqj2-4v8m-8vrq'} | 2022-03-02T06:39:30.836439Z | 2022-02-23T09:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-vqj2-4v8m-8vrq', 'https://huntr.dev/bounties/e5384764-c583-4dec-a1d8-4697f4e12f75', 'https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711'} | null |
PyPI | PYSEC-2018-93 | null | When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable. | {'CVE-2018-14635'} | 2021-08-27T03:22:08.555558Z | 2018-09-10T19:29:00Z | null | null | null | {'https://access.redhat.com/errata/RHSA-2018:2721', 'https://access.redhat.com/errata/RHSA-2018:3792', 'https://bugs.launchpad.net/neutron/+bug/1757482', 'https://access.redhat.com/errata/RHSA-2018:2710', 'https://access.redhat.com/errata/RHSA-2018:2715', 'https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635'} | null |
PyPI | GHSA-vg27-hr3v-3cqv | open redirect in pollbot | (From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838)
Summary:
There was an open redirection vulnerability in the path of:
https://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/
Description:
An attacker can redirect anyone to malicious sites.
Steps To Reproduce:
Type in this URL:
https://pollbot.services.mozilla.com/%0a/evil.com/
It redirects to that website
evil.com
evil.com was used as an example but this could be any website. Note, the /%0a/ and trailing / are required.
Supporting Material/References:
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
Impact
Attackers can serve malicious websites that steal passwords or download ransomware to their victims machine due to a redirect and there are a heap of other attack vectors. | {'CVE-2022-0637'} | 2022-03-03T05:11:54.917475Z | 2022-02-16T23:02:09Z | HIGH | null | {'CWE-601'} | {'https://github.com/mozilla/PollBot/security/advisories/GHSA-vg27-hr3v-3cqv', 'https://github.com/mozilla/PollBot'} | null |
PyPI | PYSEC-2020-335 | null | In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPaths but are not verified by the PRs introducing it (#40861 and #44310). Thus, we are completely rewriting the implementation to fully specify and validate these. This is patched in version 2.4.0. This issue only impacts master branch and the release candidates for TF version 2.4. The final release of the 2.4 release will be patched. | {'GHSA-9jjw-hf72-3mxw', 'CVE-2020-26269'} | 2020-12-14T17:42:00Z | 2020-12-10T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9jjw-hf72-3mxw', 'https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c'} | null |
PyPI | PYSEC-2015-25 | null | The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types. | {'CVE-2015-7337'} | 2021-07-15T02:22:14.948088Z | 2015-09-29T19:59:00Z | null | null | null | {'http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html', 'http://seclists.org/oss-sec/2015/q3/558', 'https://bugzilla.redhat.com/show_bug.cgi?id=1264067', 'https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5', 'http://seclists.org/oss-sec/2015/q3/634', 'https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967', 'https://security.gentoo.org/glsa/201512-02'} | null |
PyPI | PYSEC-2017-18 | null | Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument. | {'CVE-2017-16876', 'GHSA-98gj-wwxm-cj3h'} | 2021-07-05T00:01:22.732782Z | 2017-12-29T15:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-98gj-wwxm-cj3h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NUR3GMHQBMA3UC4PFMCK6GCLOQC4LQQC/', 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98', 'https://bugzilla.redhat.com/show_bug.cgi?id=1524596', 'https://github.com/lepture/mistune/blob/master/CHANGES.rst'} | null |
PyPI | PYSEC-2019-236 | null | An issue was discovered in py-lmdb 0.97. For certain values of md_flags, mdb_node_add does not properly set up a memcpy destination, leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker. | {'CVE-2019-16224'} | 2021-12-14T08:17:08.199974Z | 2019-09-11T15:15:00Z | null | null | null | {'https://pypi.org/project/lmdb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16224', 'https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20initialization%20vuln'} | null |
PyPI | PYSEC-2021-80 | null | Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item. | {'CVE-2021-33508', 'GHSA-rmpv-rcp6-v8wc'} | 2021-06-09T05:01:40.464417Z | 2021-05-21T22:15:00Z | null | null | null | {'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname', 'https://github.com/advisories/GHSA-rmpv-rcp6-v8wc'} | null |
PyPI | PYSEC-2021-335 | null | The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution. By default, you need to have the admin-level Zope "Manager" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. The problem has been fixed in AccessControl 4.3 and 5.2. Only AccessControl versions 4 and 5 are vulnerable, and only on Python 3, not Python 2.7. As a workaround, a site administrator can restrict adding/editing `Script (Python)` objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope. | {'CVE-2021-32807', 'GHSA-qcx9-j53g-ccgf'} | 2021-09-26T23:32:08.989778Z | 2021-07-30T22:15:00Z | null | null | null | {'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c', 'https://github.com/zopefoundation/AccessControl/blob/master/CHANGES.rst#51-2021-07-30', 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf'} | null |
PyPI | PYSEC-2021-765 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a crash via a `CHECK`-fail in debug builds of TensorFlow using `tf.raw_ops.ResourceGather` or a read from outside the bounds of heap allocated data in the same API in a release build. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L660-L668) does not check that the `batch_dims` value that the user supplies is less than the rank of the input tensor. Since the implementation uses several for loops over the dimensions of `tensor`, this results in reading data from outside the bounds of heap allocated buffer backing the tensor. We have patched the issue in GitHub commit bc9c546ce7015c57c2f15c168b3d9201de679a1d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37654', 'GHSA-2r8p-fg3c-wcj4'} | 2021-12-09T06:35:36.998638Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4', 'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d'} | null |
PyPI | GHSA-vqcj-wrf2-7v73 | Out-of-bounds Write | In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. | {'CVE-2020-35654'} | 2022-03-03T05:11:29.440494Z | 2021-03-18T19:55:27Z | HIGH | null | {'CWE-787'} | {'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35654', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/'} | null |
PyPI | PYSEC-2021-270 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/save_restore_v2_ops.cc) uses `ValidateInputs` to check that the input arguments are valid. This validation would have caught the illegal state represented by the reproducer above. However, the validation uses `OP_REQUIRES` which translates to setting the `Status` object of the current `OpKernelContext` to an error status, followed by an empty `return` statement which just terminates the execution of the function it is present in. However, this does not mean that the kernel execution is finalized: instead, execution continues from the next line in `Compute` that follows the call to `ValidateInputs`. This is equivalent to lacking the validation. We have patched the issue in GitHub commit 9728c60e136912a12d99ca56e106b7cce7af5986. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37648', 'GHSA-wp77-4gmm-7cq8'} | 2021-08-27T03:22:43.792593Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8', 'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'} | null |
PyPI | PYSEC-2021-620 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `QuantizeV2` can trigger a read outside of bounds of heap allocated array. This occurs whenever `axis` is a negative value less than `-1`. In this case, we are accessing data before the start of a heap buffer. The code allows `axis` to be an optional argument (`s` would contain an `error::NOT_FOUND` error code). Otherwise, it assumes that `axis` is a valid index into the dimensions of the `input` tensor. If `axis` is less than `-1` then this results in a heap OOB read. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected. | {'CVE-2021-41211', 'GHSA-cvgx-3v3q-m36c'} | 2021-12-09T06:35:09.057312Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvgx-3v3q-m36c', 'https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244'} | null |
PyPI | PYSEC-2020-270 | null | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `tf.raw_ops.Switch` operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output. Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault The issue is patched in commit da8558533d925694483d2c136a9220d6d49d843c, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'CVE-2020-15190', 'GHSA-4g9f-63rx-5cw4'} | 2021-12-09T06:34:40.732914Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4'} | null |
PyPI | PYSEC-2021-509 | null | TensorFlow is an end-to-end open source platform for machine learning. Due to lack of validation in `tf.raw_ops.CTCBeamSearchDecoder`, an attacker can trigger denial of service via segmentation faults. The implementation(https://github.com/tensorflow/tensorflow/blob/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7/tensorflow/core/kernels/ctc_decoder_ops.cc#L68-L79) fails to detect cases when the input tensor is empty and proceeds to read data from a null buffer. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29581', 'GHSA-vq2r-5xvm-3hc3'} | 2021-12-09T06:34:55.926686Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq2r-5xvm-3hc3'} | null |
PyPI | PYSEC-2016-35 | null | The TripleO Heat templates (tripleo-heat-templates), when deployed via the commandline interface, allow remote attackers to spoof OpenStack Networking metadata requests by leveraging knowledge of the default value of the NeutronMetadataProxySharedSecret parameter. | {'CVE-2015-5303'} | 2021-08-27T03:22:48.456695Z | 2016-04-11T21:59:00Z | null | null | null | {'https://bugs.launchpad.net/tripleo/+bug/1516027', 'https://access.redhat.com/errata/RHSA-2015:2650'} | null |
PyPI | PYSEC-2021-159 | null | TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Conv3DBackprop*` operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a91bb59769f19146d5a0c20060244378e878f140/tensorflow/core/kernels/conv_grad_ops_3d.cc#L430-L450) does not check that the divisor used in computing the shard size is not zero. Thus, if attacker controls the input sizes, they can trigger a denial of service via a division by zero error. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29522', 'GHSA-c968-pq7h-7fxv'} | 2021-08-27T03:22:25.206676Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c968-pq7h-7fxv'} | null |
PyPI | GHSA-wf5p-c75w-w3wh | Null pointer dereference in TFLite MLIR optimizations | ### Impact
An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service:
This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/compiler/mlir/lite/transforms/optimize.cc#L67-L70) unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements:
```cc
bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) {
if (sq_op.getType().cast<ShapedType>().getRank() - 1 ==
*axis.getValues<int>().begin() ||
*axis.getValues<int>().begin() == -1) {
// ...
}
// ...
}
```
### Patches
We have patched the issue in GitHub commit [d6b57f461b39fd1aa8c1b870f1b974aac3554955](https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security. | {'CVE-2021-37689'} | 2021-08-24T17:58:35Z | 2021-08-25T14:39:36Z | HIGH | null | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37689', 'https://github.com/tensorflow/tensorflow'} | null |
PyPI | GHSA-c2vx-49jm-h3f6 | Pysaml2 does not sanitize XML responses | XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier allows remote attackers to read arbitrary files via a crafted SAML XML request or response. | {'CVE-2016-10149'} | 2022-04-26T18:32:58.537426Z | 2018-07-16T16:50:12Z | HIGH | null | {'CWE-611'} | {'http://www.securityfocus.com/bid/97692', 'http://www.debian.org/security/2017/dsa-3759', 'https://access.redhat.com/errata/RHSA-2017:0937', 'https://github.com/rohe/pysaml2/issues/366', 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10149', 'http://www.openwall.com/lists/oss-security/2017/01/19/5', 'https://github.com/advisories/GHSA-c2vx-49jm-h3f6', 'https://github.com/rohe/pysaml2/pull/379', 'https://access.redhat.com/errata/RHSA-2017:0938', 'https://github.com/rohe/pysaml2', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716', 'https://access.redhat.com/errata/RHSA-2017:0936'} | null |
PyPI | PYSEC-2022-90 | null | Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-23581', 'GHSA-fq86-3f29-px2c'} | 2022-03-09T00:17:35.012769Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6', 'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c', 'https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742'} | null |
PyPI | GHSA-p49h-hjvm-jg3h | PCX P mode buffer overflow in Pillow | libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. | {'CVE-2020-5312'} | 2022-03-03T05:13:31.313661Z | 2021-11-03T18:05:04Z | HIGH | null | {'CWE-120'} | {'https://access.redhat.com/errata/RHSA-2020:0681', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://usn.ubuntu.com/4272-1/', 'https://access.redhat.com/errata/RHSA-2020:0683', 'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd', 'https://access.redhat.com/errata/RHSA-2020:0578', 'https://access.redhat.com/errata/RHSA-2020:0580', 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5312', 'https://access.redhat.com/errata/RHSA-2020:0694', 'https://access.redhat.com/errata/RHSA-2020:0566', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://github.com/python-pillow/Pillow', 'https://www.debian.org/security/2020/dsa-4631'} | null |
PyPI | PYSEC-2020-159 | null | In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients. | {'CVE-2020-26214', 'GHSA-5hmm-x8q8-w5jh'} | 2020-11-17T21:08:00Z | 2020-11-06T18:15:00Z | null | null | null | {'https://github.com/alerta/alerta/pull/1345', 'https://pypi.org/project/alerta-server/8.1.0/', 'https://tools.ietf.org/html/rfc4513#section-5.1.2', 'https://github.com/alerta/alerta/security/advisories/GHSA-5hmm-x8q8-w5jh', 'https://github.com/alerta/alerta/issues/1277', 'https://github.com/alerta/alerta/commit/2bfa31779a4c9df2fa68fa4d0c5c909698c5ef65'} | null |
PyPI | PYSEC-2020-42 | null | An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail. | {'CVE-2020-12607', 'GHSA-56wv-2wr9-3h9r'} | 2020-06-03T13:47:00Z | 2020-06-02T21:15:00Z | null | null | null | {'https://github.com/AntonKueltz/fastecdsa/commit/e592f106edd5acf6dacedfab2ad16fe6c735c9d1', 'https://github.com/advisories/GHSA-56wv-2wr9-3h9r', 'https://github.com/AntonKueltz/fastecdsa/commit/4a16daeaf139be20654ef58a9fe4c79dc030458c', 'https://github.com/AntonKueltz/fastecdsa/issues/52', 'https://github.com/AntonKueltz/fastecdsa/commit/7b64e3efaa806b4daaf73bb5172af3581812f8de'} | null |
PyPI | PYSEC-2022-150 | null | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-23586', 'GHSA-43jf-985q-588j'} | 2022-03-09T00:18:29.301352Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43jf-985q-588j', 'https://github.com/tensorflow/tensorflow/commit/dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/function.cc', 'https://github.com/tensorflow/tensorflow/commit/3d89911481ba6ebe8c88c1c0b595412121e6c645'} | null |
PyPI | GHSA-2828-9vh6-9m6j | Client Denial of Service on TUF | ### Impact
An attacker who can gain file access to the repository and modify metadata files may cause a denial of service to clients by creating many invalid signatures on a metadata file. Having a large number of signatures to verify will delay the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted.
The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue.
### Patches
No fix exists for this issue.
### Workarounds
No workarounds are known for this issue.
### References
* [CVE-2020-6173](https://nvd.nist.gov/vuln/detail/CVE-2020-6173)
* [Issue #973](https://github.com/theupdateframework/tuf/issues/973) | {'CVE-2020-6173'} | 2022-03-03T05:12:38.507755Z | 2020-08-21T16:25:48Z | MODERATE | null | {'CWE-400'} | {'https://github.com/theupdateframework/tuf/commits/develop', 'https://github.com/theupdateframework/tuf/issues/973', 'https://github.com/theupdateframework/tuf', 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-2828-9vh6-9m6j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6173'} | null |
PyPI | PYSEC-2021-773 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can generate undefined behavior via a reference binding to nullptr in `BoostedTreesCalculateBestGainsPerFeature` and similar attack can occur in `BoostedTreesCalculateBestFeatureSplitV2`. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/stats_ops.cc) does not validate the input values. We have patched the issue in GitHub commit 9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad and in commit 429f009d2b2c09028647dd4bb7b3f6f414bbaad7. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37662', 'GHSA-f5cx-5wr3-5qrc'} | 2021-12-09T06:35:37.708091Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f5cx-5wr3-5qrc', 'https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad'} | null |
PyPI | GHSA-3xxv-p78r-4fc6 | Cross-site Scripting in apache-airflow | The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336). | {'CVE-2021-28359'} | 2022-03-03T05:13:36.022113Z | 2021-06-18T18:43:42Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28359'} | null |
PyPI | GHSA-g57j-q48p-9vm2 | Command injection in Gerapy | This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized. | {'CVE-2020-7698'} | 2022-03-21T23:01:55.945709Z | 2021-05-06T18:52:13Z | CRITICAL | null | {'CWE-74'} | {'https://snyk.io/vuln/SNYK-PYTHON-GERAPY-572470', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7698', 'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2', 'https://github.com/Gerapy/Gerapy'} | null |
PyPI | GHSA-7h5v-85w9-pq6c | Denial of service (via resource exhaustion) due to improper input validation in third-party identifier endpoint | ### Impact
Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
### Patches
The issue is fixed by https://github.com/matrix-org/synapse/pull/9855.
### Workarounds
There are no known workarounds.
### References
n/a
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org.
| null | 2022-03-03T05:13:37.058700Z | 2021-05-19T23:01:45Z | MODERATE | null | {'CWE-400'} | {'https://github.com/matrix-org/synapse/security/advisories/GHSA-7h5v-85w9-pq6c', 'https://github.com/matrix-org/synapse/pull/9855'} | null |
PyPI | PYSEC-2021-289 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.UnicodeEncode`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unicode_ops.cc#L533-L539) reads the first dimension of the `input_splits` tensor before validating that this tensor is not empty. We have patched the issue in GitHub commit 2e0ee46f1a47675152d3d865797a18358881d7a6. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37667', 'GHSA-w74j-v8xh-3w5h'} | 2021-08-27T03:22:45.582995Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h', 'https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6'} | null |
PyPI | PYSEC-2021-323 | null | Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Products.isurlinportal prior to 1.2.0 have an Open Redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal. The url `https:example.org` without slashes is considered to be in the portal. When redirecting, some browsers go to `https://example.org`, others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. The problem has been patched in Products.isurlinportal 1.2.0. | {'GHSA-q3m9-9fj2-mfwr', 'CVE-2021-32806'} | 2021-09-20T14:26:43.785985Z | 2021-08-02T19:15:00Z | null | null | null | {'https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba', 'https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr', 'http://jvn.jp/en/jp/JVN50804280/index.html'} | null |
PyPI | PYSEC-2019-10 | null | An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP. | {'GHSA-6c7v-2f49-8h26', 'CVE-2019-12781'} | 2020-08-24T17:37:00Z | 2019-07-01T14:15:00Z | null | null | null | {'https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ', 'https://www.djangoproject.com/weblog/2019/jul/01/security-releases/', 'https://seclists.org/bugtraq/2019/Jul/10', 'http://www.openwall.com/lists/oss-security/2019/07/01/3', 'https://usn.ubuntu.com/4043-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/', 'https://github.com/advisories/GHSA-6c7v-2f49-8h26', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4476', 'https://security.netapp.com/advisory/ntap-20190705-0002/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://docs.djangoproject.com/en/dev/releases/security/', 'http://www.securityfocus.com/bid/109018'} | null |
PyPI | PYSEC-2021-96 | null | This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | {'GHSA-pjc4-3w99-j7v4', 'SNYK-PYTHON-FLASKUNCHAINED-1293189', 'CVE-2021-23393'} | 2021-06-15T05:47:49.199835Z | 2021-06-11T00:15:00Z | null | null | null | {'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40', 'https://github.com/advisories/GHSA-pjc4-3w99-j7v4', 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189'} | null |
PyPI | PYSEC-2020-289 | null | In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`. However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. The issue is patched in commit 0b5662bc, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'GHSA-qh32-6jjc-qprm', 'CVE-2020-15209'} | 2021-12-09T06:34:43.227280Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'} | null |
PyPI | PYSEC-2019-220 | null | In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. | {'CVE-2016-10745', 'GHSA-hj2j-77xm-mc5v'} | 2021-11-22T04:57:52.929678Z | 2019-04-08T13:29:00Z | null | null | null | {'https://access.redhat.com/errata/RHSA-2019:3964', 'https://access.redhat.com/errata/RHSA-2019:1022', 'https://usn.ubuntu.com/4011-2/', 'https://github.com/advisories/GHSA-hj2j-77xm-mc5v', 'https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16', 'https://access.redhat.com/errata/RHSA-2019:1237', 'https://palletsprojects.com/blog/jinja-281-released/', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html', 'https://access.redhat.com/errata/RHSA-2019:1260', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html', 'https://access.redhat.com/errata/RHSA-2019:4062', 'https://usn.ubuntu.com/4011-1/'} | null |
PyPI | PYSEC-2015-33 | null | RhodeCode before 2.2.7 allows remote authenticated users to obtain API keys and other sensitive information via the (1) update_repo, (2) get_locks, or (3) get_user_groups API method. | {'CVE-2015-1613'} | 2021-07-25T23:34:53.466212Z | 2015-02-16T15:59:00Z | null | null | null | {'https://rhodecode.com/blog/rhodecode-enterprise-security-release/'} | null |
PyPI | PYSEC-2020-323 | null | In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors. The issue is patched in commit 8ee24e7949a203d234489f9da2c5bf45a7d5157d, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'GHSA-mxjj-953w-2c2v', 'CVE-2020-15208'} | 2021-12-09T06:35:14.801373Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'} | null |
PyPI | PYSEC-2009-10 | null | Unspecified vulnerability in the Zope Enterprise Objects (ZEO) storage-server functionality in Zope Object Database (ZODB) 3.8 before 3.8.3 and 3.9.x before 3.9.0c2, when certain ZEO database sharing and blob support are enabled, allows remote authenticated users to read or delete arbitrary files via unknown vectors. | {'CVE-2009-2701'} | 2021-09-01T08:45:40.464440Z | 2009-09-08T18:30:00Z | null | null | null | {'http://pypi.python.org/pypi/ZODB3/3.8.3', 'https://mail.zope.org/pipermail/zope-announce/2009-September/002221.html', 'http://pypi.python.org/pypi/ZODB3/3.9.0c2', 'http://www.vupen.com/english/advisories/2009/2534'} | null |
PyPI | GHSA-2pfh-q76x-gwvm | Improper Input Validation and Command Injection in Ansible | A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity. | {'CVE-2021-3583'} | 2022-03-03T05:14:13.156837Z | 2021-09-23T23:16:38Z | HIGH | null | {'CWE-20', 'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3583', 'https://github.com/ansible/ansible/pull/74960', 'https://github.com/ansible/ansible', 'https://pypi.org/project/ansible/4.2.0/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1968412'} | null |
PyPI | PYSEC-2021-79 | null | Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS. | {'GHSA-35rg-466w-77h3', 'CVE-2021-33507'} | 2021-06-02T03:48:01.619218Z | 2021-05-21T22:15:00Z | null | null | null | {'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/advisories/GHSA-35rg-466w-77h3', 'https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots'} | null |
PyPI | PYSEC-2021-636 | null | TensorFlow is an open source platform for machine learning. In affected versions the `ImmutableConst` operation in TensorFlow can be tricked into reading arbitrary memory contents. This is because the `tstring` TensorFlow string class has a special case for memory mapped strings but the operation itself does not offer any support for this datatype. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'CVE-2021-41227', 'GHSA-j8c8-67vp-6mx7'} | 2021-12-09T06:35:11.413655Z | 2021-11-05T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8c8-67vp-6mx7', 'https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b'} | null |
PyPI | GHSA-rhq2-3vr9-6mcr | Files on the host computer can be accessed from the Gradio interface | ### Impact
This is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces using `gradio<2.4.8`. Because of the way that static files were being served, someone who generated a public Gradio link and shared it with others would potentially be exposing the files on the computer that generated the link, while the link was active. An attacker would be able to view the contents of a file on the computer if they knew the exact relative filepath. We do not have any evidence that this was ever exploited, but we treated the issue seriously and immediately took steps to mitigate it (see below)
### Response
1. We worked with @haby0 to immediately patch the issue and released a new version, `gradio 2.5.0`, within 24 hours of the issue being brought to our attention
2. We enabled a notification that is printed to anyone using an older version of gradio telling them to upgrade (see screenshot below)
3. We expanded our test suite to test for this vulnerability ensuring that our patch does not get reverted in future releases of `gradio`

### Patches
The problem has been patched in `gradio>=2.5.0`.
| {'CVE-2021-43831'} | 2022-03-03T05:13:32.858956Z | 2022-01-21T23:43:33Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43831', 'https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr', 'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781', 'https://github.com/gradio-app/gradio'} | null |
PyPI | PYSEC-2021-266 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/list_kernels.cc#L312) calls `std::vector.resize()` with the new size controlled by input given by the user, without checking that this input is valid. We have patched the issue in GitHub commit 8a6e874437670045e6c7dc6154c7412b4a2135e2. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-27j5-4p9v-pp67', 'CVE-2021-37644'} | 2021-08-27T03:22:43.455188Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67', 'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2'} | null |
PyPI | PYSEC-2017-9 | null | Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack. | {'GHSA-37hp-765x-j95x', 'CVE-2017-7233'} | 2021-07-05T00:01:20.658989Z | 2017-04-04T17:59:00Z | null | null | null | {'http://www.securitytracker.com/id/1038177', 'https://access.redhat.com/errata/RHSA-2017:1596', 'http://www.debian.org/security/2017/dsa-3835', 'https://github.com/advisories/GHSA-37hp-765x-j95x', 'https://access.redhat.com/errata/RHSA-2017:1470', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://access.redhat.com/errata/RHSA-2017:1451', 'http://www.securityfocus.com/bid/97406', 'https://access.redhat.com/errata/RHSA-2017:1462', 'https://access.redhat.com/errata/RHSA-2017:3093', 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/', 'https://access.redhat.com/errata/RHSA-2017:1445'} | null |
PyPI | GHSA-435p-f82x-mxwm | Command injection in Yamale | 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. | {'CVE-2021-38305'} | 2022-03-03T05:14:14.343285Z | 2021-08-11T15:19:23Z | HIGH | null | {'CWE-78', 'CWE-434'} | {'https://github.com/23andMe/Yamale', 'https://github.com/23andMe/Yamale/pull/165', 'https://github.com/23andMe/Yamale/releases/tag/3.0.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38305'} | null |
PyPI | PYSEC-2022-86 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-8cxv-76p7-jxwr', 'CVE-2022-23577'} | 2022-03-09T00:17:34.536542Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8cxv-76p7-jxwr'} | null |
PyPI | GHSA-8p7v-2jvj-v54r | Moderate severity vulnerability that affects apache-airflow | A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. | {'CVE-2019-0216'} | 2022-03-03T05:13:54.818882Z | 2019-04-12T20:42:25Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E', 'http://www.securityfocus.com/bid/107869', 'http://www.openwall.com/lists/oss-security/2019/04/10/6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0216', 'https://github.com/advisories/GHSA-8p7v-2jvj-v54r'} | null |
PyPI | PYSEC-2016-23 | null | Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream. | {'CVE-2016-1866'} | 2021-07-25T23:34:53.906248Z | 2016-04-12T14:59:00Z | null | null | null | {'https://docs.saltstack.com/en/latest/topics/releases/2015.8.4.html', 'http://lists.opensuse.org/opensuse-updates/2016-03/msg00034.html'} | null |
PyPI | PYSEC-2022-146 | null | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that `TensorByteSize` would trigger `CHECK` failures. `TensorShape` constructor throws a `CHECK`-fail if shape is partial or has a number of elements that would overflow the size of an `int`. The `PartialTensorShape` constructor instead does not cause a `CHECK`-abort if the shape is partial, which is exactly what this function needs to be able to return `-1`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-23582', 'GHSA-4j82-5ccr-4r8v'} | 2022-03-09T00:18:28.710235Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50'} | null |
PyPI | PYSEC-2018-109 | null | Ajenti version version 2 contains a Insecure Permissions vulnerability in Plugins download that can result in The download of any plugins as being a normal user. This attack appear to be exploitable via By knowing how the requisition is made, and sending it as a normal user, the server, in response, downloads the plugin. | {'CVE-2018-1000080'} | 2022-02-17T09:17:10.970141Z | 2018-03-13T15:29:00Z | null | null | null | {'https://pypi.org/project/ajenti-panel', 'https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000080'} | null |
PyPI | GHSA-m242-wc86-8768 | Moderate severity vulnerability that affects python-fedora | python-fedora 0.8.0 and lower is vulnerable to an open redirect resulting in loss of CSRF protection | {'CVE-2017-1002150'} | 2022-03-03T05:14:00.412847Z | 2018-07-13T15:17:05Z | MODERATE | null | {'CWE-601'} | {'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002150', 'https://github.com/advisories/GHSA-m242-wc86-8768', 'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929', 'https://github.com/fedora-infra/python-fedora'} | null |
PyPI | PYSEC-2019-109 | null | ** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration." | {'GHSA-22mf-97vh-x8rw', 'CVE-2019-12760'} | 2019-07-05T11:15:00Z | 2019-06-06T19:29:00Z | null | null | null | {'https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7', 'https://github.com/davidhalter/parso/issues/75', 'https://github.com/advisories/GHSA-22mf-97vh-x8rw'} | null |
PyPI | GHSA-vfq6-hq5r-27r6 | Potential account hijack via password reset form in Django | Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.) | {'CVE-2019-19844'} | 2022-03-21T21:00:59.294957Z | 2020-01-16T22:35:12Z | CRITICAL | null | {'CWE-640'} | {'https://www.debian.org/security/2020/dsa-4598', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/', 'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70', 'https://security.gentoo.org/glsa/202004-17', 'https://usn.ubuntu.com/4224-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19844', 'http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html', 'https://security.netapp.com/advisory/ntap-20200110-0003/', 'https://seclists.org/bugtraq/2020/Jan/9', 'https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0', 'https://www.djangoproject.com/weblog/2019/dec/18/security-releases/', 'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2'} | null |
PyPI | PYSEC-2022-69 | null | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in the conversion from sparse tensors to dense tensors. The fix is included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. Users are advised to upgrade as soon as possible. | {'GHSA-4hvf-hxvg-f67v', 'CVE-2022-23560'} | 2022-03-09T00:17:32.438434Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v', 'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293', 'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038'} | null |
PyPI | PYSEC-2020-54 | null | An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access. | {'GHSA-6m8p-x4qw-gh5j', 'CVE-2020-12690'} | 2020-09-02T16:15:00Z | 2020-05-07T00:15:00Z | null | null | null | {'https://lists.apache.org/thread.html/re4ffc55cd2f1b55a26e07c83b3c22c3fe4bae6054d000a57fb48d8c2@%3Ccommits.druid.apache.org%3E', 'https://www.openwall.com/lists/oss-security/2020/05/06/6', 'http://www.openwall.com/lists/oss-security/2020/05/07/3', 'https://github.com/advisories/GHSA-6m8p-x4qw-gh5j', 'https://usn.ubuntu.com/4480-1/', 'https://bugs.launchpad.net/keystone/+bug/1873290', 'https://security.openstack.org/ossa/OSSA-2020-005.html'} | null |
PyPI | GHSA-4mrx-6fxm-8jpg | Buffer Overflow in vyper | ### Impact
Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun.
### Patches
0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b)
### Workarounds
Use .vy interfaces. | {'CVE-2022-24788'} | 2022-04-22T20:00:10.011649Z | 2022-04-20T20:31:44Z | HIGH | null | {'CWE-120', 'CWE-119'} | {'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg', 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24788', 'https://github.com/vyperlang/vyper'} | null |
PyPI | GHSA-fwr5-q9rx-294f | Moderate severity vulnerability that affects django | The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter. | {'CVE-2010-4534'} | 2022-03-03T05:13:39.150778Z | 2018-07-23T19:51:40Z | MODERATE | null | null | {'http://www.vupen.com/english/advisories/2011/0098', 'http://secunia.com/advisories/42827', 'https://nvd.nist.gov/vuln/detail/CVE-2010-4534', 'http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=665373', 'http://www.ubuntu.com/usn/USN-1040-1', 'http://www.openwall.com/lists/oss-security/2010/12/23/4', 'https://github.com/django/django', 'http://www.openwall.com/lists/oss-security/2011/01/03/5', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html', 'http://secunia.com/advisories/42715', 'http://secunia.com/advisories/42913', 'http://www.securityfocus.com/bid/45562', 'https://github.com/advisories/GHSA-fwr5-q9rx-294f', 'http://www.vupen.com/english/advisories/2011/0048', 'http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/', 'http://code.djangoproject.com/changeset/15031', 'http://www.djangoproject.com/weblog/2010/dec/22/security/', 'http://www.securityfocus.com/archive/1/515446', 'http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/'} | null |
PyPI | PYSEC-2017-59 | null | z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request. | {'CVE-2016-7136'} | 2021-07-25T23:34:48.847213Z | 2017-03-07T16:59:00Z | null | null | null | {'https://plone.org/security/hotfix/20160830/non-persistent-xss-in-plone-forms', 'http://seclists.org/fulldisclosure/2016/Oct/80', 'http://www.securityfocus.com/archive/1/539572/100/0/threaded', 'http://www.securityfocus.com/bid/92752', 'http://www.openwall.com/lists/oss-security/2016/09/05/5', 'http://www.openwall.com/lists/oss-security/2016/09/05/4', 'http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html'} | null |
PyPI | GHSA-7cr9-rmqr-fpqp | Path traversal in FreeTAKServer-UI | An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system. | {'CVE-2022-25511'} | 2022-03-28T22:46:57.897007Z | 2022-03-12T00:00:37Z | MODERATE | null | {'CWE-22'} | {'https://github.com/FreeTAKTeam/UI', 'https://github.com/FreeTAKTeam/UI/issues/29', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25511'} | null |
PyPI | PYSEC-2021-374 | null | Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. | {'GHSA-4cfr-gjfx-fj3x', 'CVE-2021-40324'} | 2021-10-19T21:47:31.730339Z | 2021-10-04T06:15:00Z | null | null | null | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0', 'https://github.com/advisories/GHSA-4cfr-gjfx-fj3x'} | null |
PyPI | GHSA-www2-v7xj-xrc6 | High severity vulnerability that affects urllib3 | urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. | {'CVE-2018-20060'} | 2022-03-24T16:46:58.282040Z | 2018-12-12T15:52:07Z | CRITICAL | null | {'CWE-200'} | {'https://access.redhat.com/errata/RHSA-2019:2272', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWP36YW3KSVLXDBY3QJKDYEPCIMN3VQZ/', 'https://github.com/urllib3/urllib3/issues/1316', 'https://github.com/urllib3/urllib3/pull/1346', 'https://bugzilla.redhat.com/show_bug.cgi?id=1649153', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html', 'https://github.com/advisories/GHSA-www2-v7xj-xrc6', 'https://usn.ubuntu.com/3990-1/', 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXLAXHM3Z6DUCXZ7ZXZ2EAYJXWDCZFCT/', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SJERZEJDSUYQP7BNBXMBHRHGY26HRZD/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20060'} | null |
PyPI | PYSEC-2021-724 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `SVDF` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/7f283ff806b2031f407db64c4d3edcda8fb9f9f5/tensorflow/lite/kernels/svdf.cc#L99-L102). An attacker can craft a model such that `params->rank` would be 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29598', 'GHSA-pmpr-55fj-r229'} | 2021-12-09T06:35:31.724950Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pmpr-55fj-r229', 'https://github.com/tensorflow/tensorflow/commit/6841e522a3e7d48706a02e8819836e809f738682'} | null |
PyPI | PYSEC-2021-231 | null | TensorFlow is an end-to-end open source platform for machine learning. TFLite's convolution code(https://github.com/tensorflow/tensorflow/blob/09c73bca7d648e961dd05898292d91a8322a9d45/tensorflow/lite/kernels/conv.cc) has multiple division where the divisor is controlled by the user and not checked to be non-zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29594', 'GHSA-3qgw-p4fm-x7gf'} | 2021-08-27T03:22:38.125295Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qgw-p4fm-x7gf', 'https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552'} | null |
PyPI | GHSA-98vv-pw6r-q6q4 | Uncontrolled Resource Consumption in pillow | The package pillow from 0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function. | {'CVE-2021-23437'} | 2022-03-03T05:14:09.055722Z | 2021-09-07T23:08:10Z | HIGH | null | {'CWE-125', 'CWE-400'} | {'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443', 'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html', 'https://github.com/python-pillow/Pillow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23437', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/'} | null |
PyPI | PYSEC-2021-661 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedMul` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/87cf4d3ea9949051e50ca3f071fc909538a51cd0/tensorflow/core/kernels/quantized_mul_op.cc#L287-L290) assumes that the 4 arguments are always valid scalars and tries to access the numeric value directly. However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29535', 'GHSA-m3f9-w3p3-p669'} | 2021-12-09T06:35:20.792Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m3f9-w3p3-p669', 'https://github.com/tensorflow/tensorflow/commit/efea03b38fb8d3b81762237dc85e579cc5fc6e87'} | null |
PyPI | PYSEC-2020-231 | null | Feedgen (python feedgen) before 0.9.0 is susceptible to XML Denial of Service attacks. The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to XML Denial of Service Attacks (e.g. XML Bomb). This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only. This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources. | {'GHSA-g8q7-xv52-hf9f', 'CVE-2020-5227'} | 2021-08-27T03:22:03.690780Z | 2020-01-28T23:15:00Z | null | null | null | {'https://github.com/lkiesow/python-feedgen/security/advisories/GHSA-g8q7-xv52-hf9f', 'https://github.com/lkiesow/python-feedgen/commit/f57a01b20fa4aaaeccfa417f28e66b4084b9d0cf', 'https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6I5ENUYGFNMIH6ZQ62FZ6VU2WD3SIOI/'} | null |
PyPI | PYSEC-2021-548 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor. We have patched the issue in GitHub commit 87158f43f05f2720a374f3e6d22a7aaa3a33f750. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-cgfm-62j4-v4rf', 'CVE-2021-37635'} | 2021-12-09T06:35:01.967587Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf', 'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750'} | null |
PyPI | GHSA-jg4f-jqm5-4mgq | Ansible fails to properly sanitize fact variables sent from the Ansible controller | Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as. | {'CVE-2016-8628'} | 2022-04-26T18:48:01.177597Z | 2018-10-10T17:23:14Z | CRITICAL | null | {'CWE-77'} | {'https://github.com/ansible/ansible/commit/35938b907dfcd1106ca40b794f0db446bdb8cf09', 'https://access.redhat.com/errata/RHSA-2016:2778', 'https://github.com/ansible/ansible', 'https://github.com/advisories/GHSA-jg4f-jqm5-4mgq', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8628', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8628', 'http://www.securityfocus.com/bid/94109'} | null |
PyPI | PYSEC-2014-49 | null | AccessControl/AuthEncoding.py in Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain passwords via vectors involving timing discrepancies in password validation. | {'CVE-2012-5507', 'GHSA-3qpr-7rmg-73v8'} | 2021-09-01T08:44:31.212307Z | 2014-09-30T14:55:00Z | null | null | null | {'https://plone.org/products/plone-hotfix/releases/20121106', 'https://plone.org/products/plone/security/advisories/20121106/23', 'https://bugs.launchpad.net/zope2/+bug/1071067', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://github.com/advisories/GHSA-3qpr-7rmg-73v8'} | null |
PyPI | GHSA-f2vv-v9cg-qhh7 | Assertion failure based denial of service in Tensorflow | ### Impact
The [implementation of `*Bincount` operations](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc) allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail:
```python
import tensorflow as tf
tf.raw_ops.DenseBincount(
input=[[0], [1], [2]],
size=[1],
weights=[3,2,1],
binary_output=False)
```
There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocated.
### Patches
We have patched the issue in GitHub commit [7019ce4f68925fd01cdafde26f8d8c938f47e6f9](https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia. | {'CVE-2022-21737'} | 2022-03-03T05:13:47.124429Z | 2022-02-09T23:43:48Z | MODERATE | null | {'CWE-617', 'CWE-754'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21737', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc', 'https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7'} | null |
PyPI | PYSEC-2021-118 | null | The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs. | {'CVE-2021-32798', 'GHSA-hwvq-6gjx-j797'} | 2021-08-17T18:40:19.674164Z | 2021-08-09T21:15:00Z | null | null | null | {'https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797', 'https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5'} | null |
PyPI | GHSA-9c8h-2mv3-49ww | Division by 0 in most convolution operators | ### Impact
Most implementations of convolution operators in TensorFlow are affected by a division by 0 vulnerability where an attacker can trigger a denial of service via a crash:
```python
import tensorflow as tf
tf.compat.v1.disable_v2_behavior()
tf.raw_ops.Conv2D(
input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32),
filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32),
strides = [1, 1, 1, 1],
padding = "SAME")
```
The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/framework/common_shape_fns.cc#L577) is missing several validations before doing divisions and modulo operations.
### Patches
We have patched the issue in GitHub commit [8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4](https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security. | {'CVE-2021-37675'} | 2022-03-03T05:12:49.576138Z | 2021-08-25T14:41:29Z | MODERATE | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37675', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.