ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
PyPI | PYSEC-2021-197 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) uses the same index to access two arrays in parallel. Since the user controls the shape of the input arguments, an attacker could trigger a heap OOB access when `parent_output_index` is shorter than `row_split`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-8gv3-57p6-g35r', 'CVE-2021-29560'} | 2021-08-27T03:22:32.127822Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r'} | null |
PyPI | GHSA-rmpv-rcp6-v8wc | Cross-site scripting in Plone | Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item. | {'CVE-2021-33508'} | 2022-03-03T05:13:39.390792Z | 2021-06-08T23:20:11Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33508', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname'} | null |
PyPI | GHSA-3c5c-7235-994j | Moderate severity vulnerability that affects Pillow | Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. | {'CVE-2016-2533'} | 2022-03-03T05:14:10.628337Z | 2018-07-24T20:15:13Z | MODERATE | null | {'CWE-119'} | {'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b', 'http://www.openwall.com/lists/oss-security/2016/02/22/2', 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://github.com/advisories/GHSA-3c5c-7235-994j', 'https://security.gentoo.org/glsa/201612-52', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'https://github.com/python-pillow/Pillow', 'http://www.openwall.com/lists/oss-security/2016/02/02/5', 'http://www.debian.org/security/2016/dsa-3499', 'https://github.com/python-pillow/Pillow/pull/1706', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533'} | null |
PyPI | GHSA-g4mq-6fp5-qwcf | Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible | A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'. | {'CVE-2020-1733'} | 2022-04-26T18:17:15.676462Z | 2021-04-20T16:46:12Z | MODERATE | null | {'CWE-668', 'CWE-362', 'CWE-377'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://www.debian.org/security/2021/dsa-4950', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://github.com/ansible/ansible', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://github.com/ansible/ansible/issues/67791', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1733', 'https://security.gentoo.org/glsa/202006-11'} | null |
PyPI | PYSEC-2022-171 | null | An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion’s public key, which can result in attackers substituting arbitrary pillar data. | {'CVE-2022-22934'} | 2022-03-29T18:37:43.897944Z | 2022-03-29T17:15:00Z | null | null | null | {'https://saltproject.io/security_announcements/salt-security-advisory-release/,', 'https://github.com/saltstack/salt/releases,', 'https://repo.saltproject.io/'} | null |
PyPI | PYSEC-2021-528 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `OneHot` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72). An attacker can craft a model such that at least one of the dimensions of `indices` would be 0. In turn, the `prefix_dim_size` value would become 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-j8qh-3xrq-c825', 'CVE-2021-29600'} | 2021-12-09T06:34:58.930299Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'} | null |
PyPI | PYSEC-2014-29 | null | The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing. | {'CVE-2012-5487'} | 2021-09-01T08:44:29.087946Z | 2014-09-30T14:55:00Z | null | null | null | {'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'https://plone.org/products/plone/security/advisories/20121106/03', 'https://plone.org/products/plone-hotfix/releases/20121106', 'http://www.openwall.com/lists/oss-security/2012/11/10/1'} | null |
PyPI | PYSEC-2016-14 | null | Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission. | {'CVE-2016-2048'} | 2021-07-15T02:22:10.055528Z | 2016-02-08T19:59:00Z | null | null | null | {'http://www.securitytracker.com/id/1034894', 'http://www.securityfocus.com/bid/82329', 'https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/'} | null |
PyPI | PYSEC-2021-178 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L67-L74) does not fully validate the `data_splits` argument. This would result in `ngrams_data`(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L106-L110) to be a null pointer when the output would be computed to have 0 or negative size. Later writes to the output tensor would then cause a null pointer dereference. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29541', 'GHSA-xqfj-35wv-m3cr'} | 2021-08-27T03:22:28.768951Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr'} | null |
PyPI | PYSEC-2021-482 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kernels/count_ops.cc#L123-L127) computes a divisor value from user data but does not check that the result is 0 before doing the division. Since `data` is given by the `values` argument, `num_batch_elements` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, and TensorFlow 2.3.3, as these are also affected. | {'GHSA-qg48-85hg-mqc5', 'CVE-2021-29554'} | 2021-12-09T06:34:51.766391Z | 2021-05-14T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5'} | null |
PyPI | PYSEC-2020-178 | null | Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0. | {'CVE-2019-16792', 'GHSA-4ppp-gpcr-7qf6'} | 2020-01-30T17:07:00Z | 2020-01-22T19:15:00Z | null | null | null | {'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6', 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'} | null |
PyPI | PYSEC-2017-81 | null | Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attackers to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method. | {'GHSA-p5wr-vp8g-q5p4', 'CVE-2017-5524'} | 2021-08-25T04:30:17.184045Z | 2017-03-23T16:59:00Z | null | null | null | {'http://www.securityfocus.com/bid/95679', 'https://plone.org/security/hotfix/20170117/sandbox-escape', 'http://www.openwall.com/lists/oss-security/2017/01/18/6', 'https://github.com/advisories/GHSA-p5wr-vp8g-q5p4'} | null |
PyPI | PYSEC-2020-206 | null | A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues. | {'GHSA-frxj-5j27-f8rf', 'CVE-2019-14905'} | 2021-07-02T02:41:34.645049Z | 2020-03-31T17:15:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://github.com/advisories/GHSA-frxj-5j27-f8rf', 'https://access.redhat.com/errata/RHSA-2020:0218', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html', 'https://access.redhat.com/errata/RHSA-2020:0216', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905'} | null |
PyPI | PYSEC-2021-19 | null | An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3. | {'CVE-2021-28957', 'GHSA-jq4v-f5q6-mjqq'} | 2021-03-30T18:47:00Z | 2021-03-21T05:15:00Z | null | null | null | {'https://bugs.launchpad.net/lxml/+bug/1888153', 'https://www.debian.org/security/2021/dsa-4880', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html', 'https://github.com/advisories/GHSA-jq4v-f5q6-mjqq', 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270'} | null |
PyPI | PYSEC-2021-656 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments. Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since `OP_REQUIRES`(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function. Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-xcwj-wfcm-m23c', 'CVE-2021-29530'} | 2021-12-09T06:35:19.918878Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} | null |
PyPI | PYSEC-2006-1 | null | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | {'CVE-2006-0847'} | 2021-07-05T00:01:17.388273Z | 2006-02-22T02:02:00Z | null | null | null | {'http://sourceforge.net/project/shownotes.php?release_id=384316&group_id=56099', 'http://www.cherrypy.org/', 'http://www.securityfocus.com/bid/16760', 'http://groups.google.com/group/cherrypy-announce/browse_thread/thread/92b2972f774fe6df/2f63afc9433dc306#2f63afc9433dc306', 'http://www.gentoo.org/security/en/glsa/glsa-200605-16.xml', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/24809', 'http://secunia.com/advisories/18944', 'http://secunia.com/advisories/20344', 'http://www.vupen.com/english/advisories/2006/0677'} | null |
PyPI | PYSEC-2021-206 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/ac328eaa3870491ababc147822cd04e91a790643/tensorflow/core/kernels/requantization_range_op.cc#L49-L50) assumes that the `input_min` and `input_max` tensors have at least one element, as it accesses the first element in two arrays. If the tensors are empty, `.flat<T>()` is an empty object, backed by an empty array. Hence, accesing even the 0th element is a read outside the bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29569', 'GHSA-3h8m-483j-7xxm'} | 2021-08-27T03:22:33.683964Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm'} | null |
PyPI | GHSA-rmp7-f2vp-3rq4 | Cross-site scripting in SiCKRAGE | in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information. | {'CVE-2021-25925'} | 2022-03-03T05:13:35.635168Z | 2021-04-20T16:31:54Z | MODERATE | null | {'CWE-79'} | {'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925'} | null |
PyPI | PYSEC-2021-713 | null | TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step of the `SpaceToDepth` TFLite operator does not check for 0 before division(https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). An attacker can craft a model such that `params->block_size` would be zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29587', 'GHSA-j7rm-8ww4-xx2g'} | 2021-12-09T06:35:29.871064Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g'} | null |
PyPI | PYSEC-2011-10 | null | Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447. | {'GHSA-5j2h-h5hg-3wf8', 'CVE-2011-0696'} | 2021-07-15T02:22:08.278158Z | 2011-02-14T21:00:00Z | null | null | null | {'http://www.vupen.com/english/advisories/2011/0372', 'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'http://www.securityfocus.com/bid/46296', 'http://www.debian.org/security/2011/dsa-2163', 'http://www.vupen.com/english/advisories/2011/0441', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html', 'http://secunia.com/advisories/43230', 'http://secunia.com/advisories/43382', 'http://www.vupen.com/english/advisories/2011/0388', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://secunia.com/advisories/43426', 'http://secunia.com/advisories/43297', 'https://github.com/advisories/GHSA-5j2h-h5hg-3wf8', 'https://bugzilla.redhat.com/show_bug.cgi?id=676357', 'http://www.ubuntu.com/usn/USN-1066-1', 'http://www.vupen.com/english/advisories/2011/0429', 'http://www.vupen.com/english/advisories/2011/0439', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html'} | null |
PyPI | PYSEC-2021-343 | null | Cross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the 'Description' field of the component 'admin/blog/blogpost/add/'. This issue is different than CVE-2018-16632. | {'CVE-2020-19002'} | 2022-02-23T20:45:43.686053Z | 2021-08-27T19:15:00Z | null | null | null | {'https://github.com/stephenmcd/mezzanine/issues/1921'} | null |
PyPI | PYSEC-2015-5 | null | The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL. | {'CVE-2015-0220'} | 2021-07-05T00:01:19.540383Z | 2015-01-16T16:59:00Z | null | null | null | {'https://www.djangoproject.com/weblog/2015/jan/13/security/', 'http://ubuntu.com/usn/usn-2469-1', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html', 'http://advisories.mageia.org/MGASA-2015-0026.html', 'http://secunia.com/advisories/62285', 'http://secunia.com/advisories/62718', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:036', 'http://secunia.com/advisories/62309', 'http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html', 'http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:109'} | null |
PyPI | GHSA-6pc9-xqrg-wfqw | Exposure of Sensitive information in httpie | httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0. | {'CVE-2022-0430'} | 2022-04-05T19:00:40.328192Z | 2022-03-16T00:00:47Z | LOW | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0430', 'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/pypa/advisory-database/tree/main/vulns/httpie/PYSEC-2022-167.yaml', 'https://github.com/httpie/httpie', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} | null |
PyPI | PYSEC-2019-240 | null | An issue was discovered in py-lmdb 0.97. There is a divide-by-zero error in the function mdb_env_open2 if mdb_env_read_header obtains a zero value for a certain size field. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker. | {'CVE-2019-16228'} | 2021-12-14T08:17:08.476513Z | 2019-09-11T15:15:00Z | null | null | null | {'https://pypi.org/project/lmdb', 'https://github.com/TeamSeri0us/pocs/tree/master/lmdb/FPE', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16228'} | null |
PyPI | PYSEC-2014-91 | null | The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323. | {'GHSA-2jc8-4r6g-282j', 'CVE-2014-1928'} | 2021-08-27T03:22:18.180710Z | 2014-10-25T21:55:00Z | null | null | null | {'http://seclists.org/oss-sec/2014/q1/246', 'https://github.com/advisories/GHSA-2jc8-4r6g-282j', 'http://secunia.com/advisories/56616', 'https://code.google.com/p/python-gnupg/issues/detail?id=98', 'http://seclists.org/oss-sec/2014/q1/294', 'http://secunia.com/advisories/59031', 'http://www.debian.org/security/2014/dsa-2946', 'https://code.google.com/p/python-gnupg/'} | null |
PyPI | PYSEC-2021-590 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the shape inference code for `tf.raw_ops.Dequantize` has a vulnerability that could trigger a denial of service via a segfault if an attacker provides invalid arguments. The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/array_ops.cc#L2999-L3014) uses `axis` to select between two different values for `minmax_rank` which is then used to retrieve tensor dimensions. However, code assumes that `axis` can be either `-1` or a value greater than `-1`, with no validation for the other values. We have patched the issue in GitHub commit da857cfa0fde8f79ad0afdbc94e88b5d4bbec764. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37677', 'GHSA-qfpc-5pjr-mh26'} | 2021-12-09T06:35:05.572307Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26', 'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'} | null |
PyPI | PYSEC-2022-126 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-qx3f-p745-w4hr', 'CVE-2022-23562'} | 2022-03-09T00:18:25.916972Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732', 'https://github.com/tensorflow/tensorflow/pull/51733', 'https://github.com/tensorflow/tensorflow/issues/52676', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr'} | null |
PyPI | GHSA-3qxp-qjq7-w4hf | CHECK-fail in tf.raw_ops.EncodePng | ### Impact
An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data:
```python
import tensorflow as tf
image = tf.zeros([0, 0, 3])
image = tf.cast(image, dtype=tf.uint8)
tf.raw_ops.EncodePng(image=image)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L57-L60) only validates that the total number of pixels in the image does not overflow. Thus, an attacker can send an empty matrix for encoding. However, if the tensor is empty, then the associated buffer is `nullptr`. Hence, when [calling `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L79-L93), the first argument (i.e., `image.flat<T>().data()`) is `NULL`. This then triggers the `CHECK_NOTNULL` in the [first line of `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/lib/png/png_io.cc#L345-L349).
```cc
template <typename T>
bool WriteImageToBuffer(
const void* image, int width, int height, int row_bytes, int num_channels,
int channel_bits, int compression, T* png_string,
const std::vector<std::pair<std::string, std::string> >* metadata) {
CHECK_NOTNULL(image);
...
}
```
Since `image` is null, this results in `abort` being called after printing the stacktrace. Effectively, this allows an attacker to mount a denial of service attack.
### Patches
We have patched the issue in GitHub commit [26eb323554ffccd173e8a79a8c05c15b685ae4d1](https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29531'} | 2022-03-03T05:14:18.316115Z | 2021-05-21T14:22:13Z | LOW | null | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf', 'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29531'} | null |
PyPI | PYSEC-2019-169 | null | When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1. | {'CVE-2018-11760', 'GHSA-fvxv-9xxr-h7wj'} | 2021-08-25T04:30:27.510120Z | 2019-02-04T17:29:00Z | null | null | null | {'http://www.securityfocus.com/bid/106786', 'https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b@%3Cuser.spark.apache.org%3E', 'https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e@%3Ccommits.spark.apache.org%3E', 'https://github.com/advisories/GHSA-fvxv-9xxr-h7wj'} | null |
PyPI | PYSEC-2020-34 | null | An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077. | {'GHSA-fr28-569j-53c4', 'CVE-2020-24584'} | 2021-01-20T15:15:00Z | 2020-09-01T13:15:00Z | null | null | null | {'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU', 'https://usn.ubuntu.com/4479-1/', 'https://www.openwall.com/lists/oss-security/2020/09/01/2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/', 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/', 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM', 'https://github.com/advisories/GHSA-fr28-569j-53c4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200918-0004/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/'} | null |
PyPI | PYSEC-2019-186 | null | Matrix Synapse before 1.5.0 mishandles signature checking on some federation APIs. Events sent over /send_join, /send_leave, and /invite may not be correctly signed, or may not come from the expected servers. | {'CVE-2019-18835'} | 2021-08-27T03:22:06.354909Z | 2019-11-08T00:15:00Z | null | null | null | {'https://github.com/matrix-org/synapse/releases/tag/v1.5.0', 'https://github.com/matrix-org/synapse/pull/6262'} | null |
PyPI | PYSEC-2021-210 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0. The implementation(https://github.com/tensorflow/tensorflow/blob/279bab6efa22752a2827621b7edb56a730233bd8/tensorflow/core/kernels/maxpooling_op.cc#L1033-L1034) fails to validate that the batch dimension of the tensor is non-zero, before dividing by this quantity. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-9vpm-rcf4-9wqw', 'CVE-2021-29573'} | 2021-08-27T03:22:34.367051Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw', 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'} | null |
PyPI | GHSA-924m-4pmx-c67h | High severity vulnerability that affects pysaml2 | pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password. | {'CVE-2017-1000433'} | 2022-03-03T05:14:00.579404Z | 2018-07-13T16:01:17Z | HIGH | null | {'CWE-287'} | {'https://github.com/advisories/GHSA-924m-4pmx-c67h', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000433', 'https://security.gentoo.org/glsa/201801-11', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html', 'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html', 'https://github.com/rohe/pysaml2', 'https://github.com/rohe/pysaml2/issues/451'} | null |
PyPI | PYSEC-2021-640 | null | TensorFlow is an end-to-end open source platform for machine learning. If the `splits` argument of `RaggedBincount` does not specify a valid `SparseTensor`(https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow. This will cause a read from outside the bounds of the `splits` tensor buffer in the implementation of the `RaggedBincount` op(https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L446). Before the `for` loop, `batch_idx` is set to 0. The attacker sets `splits(0)` to be 7, hence the `while` loop does not execute and `batch_idx` remains 0. This then results in writing to `out(-1, bin)`, which is before the heap allocated buffer for the output tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected. | {'CVE-2021-29514', 'GHSA-8h46-5m9h-7553'} | 2021-12-09T06:35:17.368785Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553', 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'} | null |
PyPI | PYSEC-2019-5 | null | Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path. | {'CVE-2019-3828', 'GHSA-74vq-h4q8-x6jv'} | 2020-05-21T14:55:00Z | 2019-03-27T13:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-74vq-h4q8-x6jv', 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html', 'https://access.redhat.com/errata/RHSA-2019:3744', 'https://usn.ubuntu.com/4072-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828', 'https://access.redhat.com/errata/RHSA-2019:3789', 'https://github.com/ansible/ansible/pull/52133'} | null |
PyPI | GHSA-r38r-qp28-2m63 | Critical severity vulnerability that affects rope | base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load. | {'CVE-2014-3539'} | 2022-03-23T21:00:09.517202Z | 2018-07-26T16:08:49Z | CRITICAL | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1116485', 'http://www.openwall.com/lists/oss-security/2015/02/07/1', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3539', 'https://github.com/python-rope/rope', 'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'} | null |
PyPI | PYSEC-2020-210 | null | A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files. | {'GHSA-86hp-cj9j-33vv', 'CVE-2020-1753'} | 2021-07-02T02:41:35.152435Z | 2020-03-16T15:15:00Z | null | null | null | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/advisories/GHSA-86hp-cj9j-33vv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753', 'https://github.com/ansible-collections/kubernetes/pull/51', 'https://security.gentoo.org/glsa/202006-11'} | null |
PyPI | PYSEC-2017-97 | null | file_open in Tryton 3.x and 4.x through 4.2.2 allows remote authenticated users with certain permissions to read arbitrary files via a "same root name but with a suffix" attack. NOTE: This vulnerability exists because of an incomplete fix for CVE-2016-1242. | {'CVE-2017-0360'} | 2021-08-27T03:22:48.689499Z | 2017-04-04T17:59:00Z | null | null | null | {'http://hg.tryton.org/trytond?cmd=changeset;node=472510fdc6f8', 'https://lists.debian.org/debian-security-announce/2017/msg00084.html', 'http://www.securityfocus.com/bid/97489', 'http://www.debian.org/security/2017/dsa-3826'} | null |
PyPI | PYSEC-2010-6 | null | The ftp_QUIT function in ftpserver.py in pyftpdlib before 0.5.0 allows remote authenticated users to cause a denial of service (file descriptor exhaustion and daemon outage) by sending a QUIT command during a disallowed data-transfer attempt. | {'CVE-2008-7264'} | 2021-07-05T00:01:24.722786Z | 2010-10-19T20:00:00Z | null | null | null | {'http://code.google.com/p/pyftpdlib/issues/detail?id=71', 'http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY', 'http://code.google.com/p/pyftpdlib/source/detail?r=344', 'http://code.google.com/p/pyftpdlib/source/diff?spec=svn344&r=344&format=side&path=/trunk/pyftpdlib/ftpserver.py'} | null |
PyPI | GHSA-fcwc-p4fc-c5cc | Null pointer dereference in `MatrixDiagPartOp` | ### Impact
If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first:
```python
import tensorflow as tf
tf.raw_ops.MatrixDiagPartV2(
input=tf.ones(2,dtype=tf.int32),
k=tf.ones(2,dtype=tf.int32),
padding_value=[])
```
Although this example is given for `MatrixDiagPartV2`, all versions of the operation are affected.
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L89) reads the first value from a tensor buffer without first checking that the tensor has values to read from.
### Patches
We have patched the issue in GitHub commit [482da92095c4d48f8784b1f00dda4f81c28d2988](https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37643'} | 2022-03-03T05:13:40.355999Z | 2021-08-25T14:43:42Z | HIGH | null | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37643'} | null |
PyPI | PYSEC-2017-78 | null | An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability. | {'GHSA-m85c-9mf8-m2m6', 'CVE-2017-16763'} | 2021-08-25T04:29:57.582065Z | 2017-11-10T09:29:00Z | null | null | null | {'https://github.com/bbengfort/confire/issues/24', 'https://github.com/advisories/GHSA-m85c-9mf8-m2m6', 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/', 'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'} | null |
PyPI | GHSA-q6j2-g8qf-wvf7 | Verification check bypass in Gate One | An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list. | {'CVE-2020-19003'} | 2022-03-03T05:13:57.125452Z | 2021-10-12T22:34:28Z | MODERATE | null | {'CWE-287'} | {'https://github.com/liftoff/GateOne/issues/728', 'https://github.com/liftoff/GateOne', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19003'} | null |
PyPI | GHSA-962m-m8jw-8wrr | Path Traversal in Zope | Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. | {'CVE-2021-32633'} | 2022-03-03T05:13:58.513548Z | 2021-06-15T16:10:49Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32633', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91', 'https://github.com/zopefoundation/Zope', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/'} | null |
PyPI | GHSA-hm2h-f456-6j88 | Cross-site scripting in Plone | Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document. | {'CVE-2021-33512'} | 2022-03-03T05:12:39.117338Z | 2021-06-08T23:20:04Z | MODERATE | null | {'CWE-79'} | {'https://plone.org/security/hotfix/20210518/stored-xss-from-file-upload-svg-html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33512', 'http://www.openwall.com/lists/oss-security/2021/05/22/1'} | null |
PyPI | PYSEC-2021-355 | null | “Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed. | {'GHSA-663j-rjcr-789f', 'CVE-2021-25962'} | 2021-09-30T23:26:29.598032Z | 2021-09-29T14:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-663j-rjcr-789f', 'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962'} | null |
PyPI | GHSA-vq36-27g6-p492 | Out of bounds read in Tensorflow | ### Impact
TensorFlow's [type inference](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229) can cause a heap OOB read as the bounds checking is done in a `DCHECK` (which is a no-op during production):
```cc
if (node_t.type_id() != TFT_UNSET) {
int ix = input_idx[i];
DCHECK(ix < node_t.args_size())
<< "input " << i << " should have an output " << ix
<< " but instead only has " << node_t.args_size()
<< " outputs: " << node_t.DebugString();
input_types.emplace_back(node_t.args(ix));
// ...
}
```
An attacker can control `input_idx` such that `ix` would be larger than the number of values in `node_t.args`.
### Patches
We have patched the issue in GitHub commit [c99d98cd189839dcf51aee94e7437b54b31f8abd](https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd).
The fix will be included in TensorFlow 2.8.0. This is the only affected version.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23592'} | 2022-03-28T19:45:06.569091Z | 2022-02-09T23:31:48Z | HIGH | null | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23592', 'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq36-27g6-p492', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229', 'https://github.com/tensorflow/tensorflow/'} | null |
PyPI | GHSA-q2q7-5pp4-w6pg | Catastrophic backtracking in URL authority parser when passed URL containing many @ characters | ### Impact
When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
### Patches
The issue has been fixed in urllib3 v1.26.5.
### References
- [CVE-2021-33503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503)
- [JVNVU#92413403 (English)](https://jvn.jp/en/vu/JVNVU92413403/)
- [JVNVU#92413403 (Japanese)](https://jvn.jp/vu/JVNVU92413403/)
- [urllib3 v1.26.5](https://github.com/urllib3/urllib3/releases/tag/1.26.5)
### For more information
If you have any questions or comments about this advisory:
* Ask in our [community Discord](https://discord.gg/urllib3)
* Email [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
| {'CVE-2021-33503'} | 2022-03-03T05:13:06.285390Z | 2021-06-01T21:19:32Z | HIGH | null | {'CWE-400'} | {'https://security.gentoo.org/glsa/202107-36', 'https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/', 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33503', 'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec', 'https://github.com/urllib3/urllib3'} | null |
PyPI | PYSEC-2021-705 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/ab1e644b48c82cb71493f4362b4dd38f4577a1cf/tensorflow/core/kernels/maxpooling_op.cc#L194-L203) fails to validate that indices used to access elements of input/output arrays are valid. Whereas accesses to `input_backprop_flat` are guarded by `FastBoundsCheck`, the indexing in `out_backprop_flat` can result in OOB access. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-79fv-9865-4qcv', 'CVE-2021-29579'} | 2021-12-09T06:35:28.365362Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79fv-9865-4qcv', 'https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7'} | null |
PyPI | PYSEC-2020-22 | null | Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config. | {'GHSA-7mx5-x372-xh87', 'CVE-2020-17526'} | 2020-12-22T21:23:00Z | 2020-12-21T17:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-7mx5-x372-xh87', 'https://lists.apache.org/thread.html/rbeeb73a6c741f2f9200d83b9c2220610da314810c4e8c9cf881d47ef%40%3Cusers.airflow.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/21/1'} | null |
PyPI | PYSEC-2022-130 | null | Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-23566', 'GHSA-5qw5-89mw-wcg2'} | 2022-03-09T00:18:26.438942Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394', 'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2'} | null |
PyPI | PYSEC-2021-586 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L513) does not check that the `key` input is a valid non-empty tensor. We have patched the issue in GitHub commit d7de67733925de196ec8863a33445b73f9562d1d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37673', 'GHSA-278g-rq84-9hmg'} | 2021-12-09T06:35:05.237190Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg'} | null |
PyPI | PYSEC-2014-87 | null | Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. | {'CVE-2014-3007'} | 2021-08-27T03:22:10.225452Z | 2014-04-27T20:55:00Z | null | null | null | {'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059', 'http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-1932.html'} | null |
PyPI | PYSEC-2021-569 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/ragged_tensor_to_sparse_kernel.cc#L30) has an incomplete validation of the splits values: it does not check that they are in increasing order. We have patched the issue in GitHub commit 1071f554dbd09f7e101324d366eec5f4fe5a3ece. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-4xfp-4pfp-89wg', 'CVE-2021-37656'} | 2021-12-09T06:35:03.759832Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg'} | null |
PyPI | PYSEC-2014-68 | null | Products/CMFPlone/CatalogTool.py in Plone 3.3 through 4.3.2 allows remote administrators to bypass restrictions and obtain sensitive information via an unspecified search API. | {'CVE-2013-7061'} | 2021-07-25T23:34:50.085881Z | 2014-05-02T14:55:00Z | null | null | null | {'https://plone.org/security/20131210/catalogue-exposure', 'http://www.openwall.com/lists/oss-security/2013/12/10/15', 'http://www.openwall.com/lists/oss-security/2013/12/12/3'} | null |
PyPI | GHSA-3872-f48p-pxqj | Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate | ### Impact
Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way.
### Patches
The issues were fixed in the 4.11.1 release. The following commits are addressing it:
* 35d59f1f040541c358cece0a8d4a63183ca919b8
* d83672a3e7415da1490334e2c9431e5da1966842
### Workarounds
Instances in which untrusted users cannot create new components are not affected.
### References
* [SNYK-PYTHON-WEBLATE-2414088](https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088)
### For more information
If you have any questions or comments about this advisory:
* Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions)
* Email us at [care@weblate.org](mailto:care@weblate.org)
| {'CVE-2022-23915'} | 2022-03-15T21:46:49.790453Z | 2022-03-04T21:15:31Z | HIGH | null | {'CWE-77', 'CWE-88'} | {'https://github.com/WeblateOrg/weblate', 'https://github.com/WeblateOrg/weblate/pull/7338', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj', 'https://github.com/WeblateOrg/weblate/releases/tag/weblate-4.11.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23915', 'https://github.com/WeblateOrg/weblate/pull/7337', 'https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088', 'https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088'} | null |
PyPI | PYSEC-2021-139 | null | An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load. | {'GHSA-g6rj-rv7j-xwp4', 'CVE-2021-28675'} | 2021-08-27T03:22:10.501313Z | 2021-06-02T15:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-g6rj-rv7j-xwp4', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'} | null |
PyPI | GHSA-grgm-pph5-j5h7 | Exposure of Sensitive Information to an Unauthorized Actor in ansible | A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed. | {'CVE-2019-10156'} | 2022-04-20T19:30:08.511337Z | 2019-07-31T04:22:49Z | MODERATE | null | {'CWE-200'} | {'https://access.redhat.com/errata/RHSA-2019:3744', 'https://github.com/ansible/ansible/pull/57188', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10156', 'https://github.com/ansible/ansible', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156', 'https://access.redhat.com/errata/RHSA-2019:3789', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html', 'https://www.debian.org/security/2021/dsa-4950'} | null |
PyPI | GHSA-hwv5-w8gm-fq9f | Directory Traversal vulnerability in GET/PUT allows attackers to Disclose Information or Write Files via a crafted GET/PUT request | ### Impact
#### Information Disclosure
When the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic.
For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access.
If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances.
#### File Write
If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload.
### Patches
PR #12 fixes the issue. The PR has been merged into version 0.4.0 and 0.4.0 has been released and pushed to PyPI. Users are advised to upgrade immediately.
### Workarounds
- Apache can apparently be configured to filter such malicious paths when reverse-proxying.
- There are no other workarounds known.
### References
- [Pull Request #12](https://github.com/horazont/xmpp-http-upload/pull/12) | {'CVE-2020-15239'} | 2022-03-03T05:13:07.970107Z | 2020-10-06T18:21:02Z | LOW | null | {'CWE-22'} | {'https://github.com/horazont/xmpp-http-upload/pull/12', 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75', 'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15239', 'https://pypi.org/project/xmpp-http-upload/#history'} | null |
PyPI | PYSEC-2019-190 | null | An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.) | {'CVE-2019-9735'} | 2021-08-27T03:22:08.807010Z | 2019-03-13T02:29:00Z | null | null | null | {'https://seclists.org/bugtraq/2019/Mar/24', 'https://usn.ubuntu.com/4036-1/', 'http://www.openwall.com/lists/oss-security/2019/03/18/2', 'https://launchpad.net/bugs/1818385', 'https://access.redhat.com/errata/RHSA-2019:0916', 'https://www.debian.org/security/2019/dsa-4409', 'https://security.openstack.org/ossa/OSSA-2019-001.html', 'https://access.redhat.com/errata/RHSA-2019:0879', 'http://www.securityfocus.com/bid/107390', 'https://access.redhat.com/errata/RHSA-2019:0935'} | null |
PyPI | PYSEC-2012-16 | null | PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key. | {'CVE-2012-2417'} | 2021-08-27T03:22:16.601238Z | 2012-06-17T03:41:00Z | null | null | null | {'http://www.osvdb.org/82279', 'https://hermes.opensuse.org/messages/15083589', 'https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2', 'http://www.openwall.com/lists/oss-security/2012/05/25/1', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/75871', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html', 'https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog', 'http://www.securityfocus.com/bid/53687', 'http://www.debian.org/security/2012/dsa-2502', 'http://secunia.com/advisories/49263', 'https://bugs.launchpad.net/pycrypto/+bug/985164', 'http://www.mandriva.com/security/advisories?name=MDVSA-2012:117'} | null |
PyPI | PYSEC-2020-139 | null | In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is patched in eccb7ec454e6617738554a255d77f08e60ee0808 and TensorFlow 2.4.0 will be released containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. | {'GHSA-xwhf-g6j5-j5gc', 'CVE-2020-15266'} | 2021-09-01T08:19:35.637564Z | 2020-10-21T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/issues/42129', 'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc'} | null |
PyPI | GHSA-f97h-2pfx-f59f | HTTP response splitting in uvicorn | This affects all versions of package uvicorn. Uvicorn's implementation of the HTTP protocol for the httptools parser is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers. | {'CVE-2020-7695'} | 2022-03-03T05:13:15.014104Z | 2020-07-29T18:07:20Z | HIGH | null | {'CWE-74'} | {'https://github.com/encode/uvicorn', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7695', 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471'} | null |
PyPI | GHSA-24x4-6qmh-88qg | Use after free in `DecodePng` kernel | ### Impact
A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346):
```cc
if (/* ... error conditions ... */) {
png::CommonFreeDecode(&decode);
OP_REQUIRES(context, false,
errors::InvalidArgument("PNG size too large for int: ",
decode.width, " by ", decode.height));
}
```
After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state.
### Patches
We have patched the issue in GitHub commit [e746adbfcfee15e9cfdb391ff746c765b99bdf9b](https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23584'} | 2022-03-03T05:13:53.559196Z | 2022-02-09T23:57:42Z | HIGH | null | {'CWE-416'} | {'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23584', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg', 'https://github.com/tensorflow/tensorflow/'} | null |
PyPI | PYSEC-2020-247 | null | Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role). | {'CVE-2020-28735', 'GHSA-x7wf-5mjc-6x76'} | 2021-08-27T03:22:11.505885Z | 2020-12-30T19:15:00Z | null | null | null | {'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://www.misakikata.com/codes/plone/python-en.html', 'https://github.com/advisories/GHSA-x7wf-5mjc-6x76', 'https://github.com/plone/Products.CMFPlone/issues/3209'} | null |
PyPI | PYSEC-2014-1 | null | The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path." | {'CVE-2014-0472'} | 2021-07-05T00:01:18.476528Z | 2014-04-23T15:55:00Z | null | null | null | {'http://www.ubuntu.com/usn/USN-2169-1', 'https://www.djangoproject.com/weblog/2014/apr/21/security/', 'http://rhn.redhat.com/errata/RHSA-2014-0456.html', 'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html', 'http://secunia.com/advisories/61281', 'http://rhn.redhat.com/errata/RHSA-2014-0457.html', 'http://www.debian.org/security/2014/dsa-2934'} | null |
PyPI | GHSA-vvg4-vgrv-xfr7 | Incomplete validation in `tf.raw_ops.CTCLoss` | ### Impact
Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[10, 16, 0], dtype=tf.float32)
labels_indices = tf.constant([], shape=[8, 0], dtype=tf.int64)
labels_values = tf.constant([-100] * 8, shape=[8], dtype=tf.int32)
sequence_length = tf.constant([-100] * 16, shape=[16], dtype=tf.int32)
tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices,
labels_values=labels_values, sequence_length=sequence_length,
preprocess_collapse_repeated=True, ctc_merge_repeated=False,
ignore_longer_outputs_than_inputs=True)
```
An attacker can also trigger a heap buffer overflow:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[7, 2, 0], dtype=tf.float32)
labels_indices = tf.constant([-100, -100], shape=[2, 1], dtype=tf.int64)
labels_values = tf.constant([-100, -100], shape=[2], dtype=tf.int32)
sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32)
tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices,
labels_values=labels_values, sequence_length=sequence_length,
preprocess_collapse_repeated=False, ctc_merge_repeated=False,
ignore_longer_outputs_than_inputs=False)
```
Finally, an attacker can trigger a null pointer dereference:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[0, 2, 11], dtype=tf.float32)
labels_indices = tf.constant([], shape=[0, 2], dtype=tf.int64)
labels_values = tf.constant([], shape=[0], dtype=tf.int32)
sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32)
tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices,
labels_values=labels_values, sequence_length=sequence_length,
preprocess_collapse_repeated=False, ctc_merge_repeated=False,
ignore_longer_outputs_than_inputs=False)
```
### Patches
We have patched the issue in GitHub commit[14607c0707040d775e06b6817325640cb4b5864c](https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c) followed by GitHub commit [4504a081af71514bb1828048363e6540f797005b](https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29613'} | 2022-03-03T05:14:18.725259Z | 2021-05-21T14:28:39Z | MODERATE | null | {'CWE-665'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29613', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vvg4-vgrv-xfr7', 'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c'} | null |
PyPI | PYSEC-2021-58 | null | sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1. | {'CVE-2021-21431', 'GHSA-23c7-6444-399m'} | 2021-05-04T13:59:00Z | 2021-04-09T16:15:00Z | null | null | null | {'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856', 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'} | null |
PyPI | PYSEC-2021-617 | null | TensorFlow is an open source platform for machine learning. In affected versions the code for boosted trees in TensorFlow is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `nullptr`s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call. Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. We will deprecate TensorFlow's boosted trees APIs in subsequent releases. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-57wx-m983-2f88', 'CVE-2021-41208'} | 2021-12-09T06:35:08.671870Z | 2021-11-05T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88', 'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c'} | null |
PyPI | GHSA-fphq-gw9m-ghrv | CHECK-fail in `CTCGreedyDecoder` | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[18, 2, 0], dtype=tf.float32)
sequence_length = tf.constant([-100, 17], shape=[2], dtype=tf.int32)
merge_repeated = False
tf.raw_ops.CTCGreedyDecoder(inputs=inputs, sequence_length=sequence_length, merge_repeated=merge_repeated)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CHECK_LT` inserted to validate some invariants. When this condition is false, the program aborts, instead of returning a valid error to the user. This abnormal termination can be weaponized in denial of service attacks.
### Patches
We have patched the issue in GitHub commit [ea3b43e98c32c97b35d52b4c66f9107452ca8fb2](https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29543'} | 2022-03-03T05:13:59.592746Z | 2021-05-21T14:23:18Z | LOW | null | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29543', 'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'} | null |
PyPI | PYSEC-2021-247 | null | TensorFlow is an end-to-end open source platform for machine learning. The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:. The validation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74-L77) uses `||` to mix two different conditions. If `axis_ < -1` the condition in `OP_REQUIRES` will still be true, but this value of `axis_` results in heap underflow. This allows attackers to read/write to other data on the heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-mq5c-prh3-3f3h', 'CVE-2021-29610'} | 2021-08-27T03:22:41.001819Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h', 'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'} | null |
PyPI | PYSEC-2021-752 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions if the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors. We have patched the issue in GitHub commit a2b743f6017d7b97af1fe49087ae15f0ac634373. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37641', 'GHSA-9c8h-vvrj-w2p8'} | 2021-12-09T06:35:35.841569Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8'} | null |
PyPI | PYSEC-2021-302 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226). We have patched the issue in GitHub commit 718721986aa137691ee23f03638867151f74935f. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37680', 'GHSA-cfpj-3q4c-jhvr'} | 2021-08-27T03:22:46.794136Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr', 'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'} | null |
PyPI | GHSA-g86p-hgx5-2pfh | Improper Authentication in Buildbot | Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim. | {'CVE-2019-12300'} | 2022-03-07T20:48:05.535076Z | 2019-05-29T18:48:11Z | CRITICAL | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12300', 'https://github.com/buildbot/buildbot', 'https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication'} | null |
PyPI | PYSEC-2019-201 | null | Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors. | {'CVE-2019-10904', 'GHSA-926q-wxr6-3crq'} | 2021-09-02T01:11:35.189013Z | 2019-04-06T20:29:00Z | null | null | null | {'https://bugs.python.org/issue36391', 'https://github.com/python/bugs.python.org/issues/34', 'https://www.openwall.com/lists/oss-security/2019/04/05/1', 'http://www.openwall.com/lists/oss-security/2019/04/07/1', 'https://github.com/advisories/GHSA-926q-wxr6-3crq', 'https://lists.debian.org/debian-lts-announce/2019/04/msg00009.html'} | null |
PyPI | PYSEC-2015-12 | null | django-markupfield before 1.3.2 uses the default docutils RESTRUCTUREDTEXT_FILTER_SETTINGS settings, which allows remote attackers to include and read arbitrary files via unspecified vectors. | {'CVE-2015-0846'} | 2021-07-05T00:01:17.695542Z | 2015-04-24T14:59:00Z | null | null | null | {'https://github.com/jamesturk/django-markupfield/blob/master/CHANGELOG', 'http://www.debian.org/security/2015/dsa-3230'} | null |
PyPI | PYSEC-2020-302 | null | In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_index). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding DataType values and comparing these for equality. However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays. In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0. | {'CVE-2020-26271', 'GHSA-q263-fvxm-m5mw'} | 2021-12-09T06:34:45.035634Z | 2020-12-10T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw'} | null |
PyPI | PYSEC-2022-167 | null | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0. | {'GHSA-6pc9-xqrg-wfqw', 'CVE-2022-0430'} | 2022-03-23T14:28:20.245559Z | 2022-03-15T15:15:00Z | null | null | null | {'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b', 'https://github.com/advisories/GHSA-6pc9-xqrg-wfqw'} | null |
PyPI | PYSEC-2021-181 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L162-L163) does not validate the rank of the `input_*` tensors. In turn, this results in the tensors being passes as they are to `QuantizeAndDequantizePerChannelGradientImpl`(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.h#L295-L306). However, the `vec<T>` method, requires the rank to 1 and triggers a `CHECK` failure otherwise. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 as this is the only other affected version. | {'CVE-2021-29544', 'GHSA-6g85-3hm8-83f9'} | 2021-08-27T03:22:29.285990Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} | null |
PyPI | GHSA-4ph2-8337-hm62 | Key Caching behavior in the DynamoDB Encryption Client. | ### Impact
This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified.
When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider.
### Patches
Fixed as of 1.3.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`.
### Workarounds
Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider. | null | 2022-03-03T05:13:41.146598Z | 2021-02-08T17:43:49Z | LOW | null | {'CWE-862'} | {'https://github.com/aws/aws-dynamodb-encryption-python/blob/master/CHANGELOG.rst#130----2021-02-04', 'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b', 'https://pypi.org/project/dynamodb-encryption-sdk', 'https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62'} | null |
PyPI | PYSEC-2019-128 | null | In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF. | {'GHSA-6cc5-2vg4-cc7m', 'CVE-2019-12387'} | 2020-08-24T17:37:00Z | 2019-06-10T12:29:00Z | null | null | null | {'https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2', 'https://usn.ubuntu.com/4308-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html', 'https://labs.twistedmatrix.com/2019/06/twisted-1921-released.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html', 'https://twistedmatrix.com/pipermail/twisted-python/2019-June/032352.html', 'https://usn.ubuntu.com/4308-2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2G5RPDQ4BNB336HL6WW5ZJ344MAWNN7N/', 'https://github.com/advisories/GHSA-6cc5-2vg4-cc7m'} | null |
PyPI | PYSEC-2022-48 | null | Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. | {'CVE-2021-22570', 'GHSA-77rm-9x9h-xj3g'} | 2022-03-09T00:17:03.282830Z | 2022-01-26T14:15:00Z | null | null | null | {'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/', 'https://github.com/advisories/GHSA-77rm-9x9h-xj3g'} | null |
PyPI | PYSEC-2020-75 | null | petl before 1.68, in some configurations, allows resolution of entities in an XML document. | {'CVE-2020-29128', 'GHSA-69q2-p9xp-739v', 'GHSA-f5gc-p5m3-v347'} | 2020-12-03T16:48:00Z | 2020-11-26T05:15:00Z | null | null | null | {'https://github.com/petl-developers/petl/pull/527', 'https://github.com/petl-developers/petl/issues/526', 'https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md', 'https://github.com/advisories/GHSA-69q2-p9xp-739v', 'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8', 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347', 'https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8', 'https://petl.readthedocs.io/en/stable/changes.html'} | null |
PyPI | GHSA-9mqp-7v2h-2382 | Denial of Service in Tensorflow | ### Impact
The `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L235-L241
Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations.
### Patches
We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability is a variant of [GHSA-63xm-rx5p-xvqr](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr) | {'CVE-2020-15194'} | 2022-03-03T05:14:22.542012Z | 2020-09-25T18:28:19Z | MODERATE | null | {'CWE-20', 'CWE-617'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15194', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382'} | null |
PyPI | GHSA-55x5-fj6c-h6m8 | HTML Cleaner allows crafted and SVG embedded scripts to pass through | ### Impact
The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs.
Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5.
### Patches
The issue has been resolved in lxml 4.6.5.
### Workarounds
None.
### References
The issues are tracked under the report IDs GHSL-2021-1037 and GHSL-2021-1038.
| {'CVE-2021-43818'} | 2022-04-22T15:47:20.348262Z | 2021-12-13T18:14:36Z | HIGH | null | {'CWE-74', 'CWE-79'} | {'https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/', 'https://github.com/lxml/lxml', 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html', 'https://security.netapp.com/advisory/ntap-20220107-0005/', 'https://www.debian.org/security/2022/dsa-5043', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43818', 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776'} | null |
PyPI | PYSEC-2021-494 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4a63a573d/tensorflow/core/kernels/dilation_ops.cc#L321-L322) does not validate before writing to the output array. The values for `h_out` and `w_out` are guaranteed to be in range for `out_backprop` (as they are loop indices bounded by the size of the array). However, there are no similar guarantees relating `h_in_max`/`w_in_max` and `in_backprop`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-pvrc-hg3f-58r6', 'CVE-2021-29566'} | 2021-12-09T06:34:53.596467Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} | null |
PyPI | PYSEC-2021-4 | null | The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336). | {'GHSA-3xxv-p78r-4fc6', 'CVE-2021-28359'} | 2021-05-10T20:07:00Z | 2021-05-02T08:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-3xxv-p78r-4fc6', 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'} | null |
PyPI | GHSA-6hpv-v2rx-c5g6 | FPE in convolutions with zero size filters | ### Impact
The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments.
### Patches
We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41209'} | 2022-03-03T05:13:34.997508Z | 2021-11-10T19:02:17Z | MODERATE | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41209', 'https://github.com/tensorflow/tensorflow'} | null |
PyPI | PYSEC-2021-729 | null | TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of `ArgMin`/`ArgMax`(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-crch-j389-5f84', 'CVE-2021-29603'} | 2021-12-09T06:35:32.536343Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84', 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'} | null |
PyPI | GHSA-j7rm-8ww4-xx2g | Division by zero in TFLite's implementation of `SpaceToDepth` | ### Impact
The `Prepare` step of the `SpaceToDepth` TFLite operator [does not check for 0 before division](https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67).
```cc
const int block_size = params->block_size;
const int input_height = input->dims->data[1];
const int input_width = input->dims->data[2];
int output_height = input_height / block_size;
int output_width = input_width / block_size;
```
An attacker can craft a model such that `params->block_size` would be zero.
### Patches
We have patched the issue in GitHub commit [0d45ea1ca641b21b73bcf9c00e0179cda284e7e7](https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29587'} | 2022-03-03T05:13:23.496562Z | 2021-05-21T14:26:45Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29587'} | null |
PyPI | PYSEC-2013-17 | null | The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter. | {'CVE-2013-0306'} | 2021-07-15T02:22:08.748982Z | 2013-05-02T14:55:00Z | null | null | null | {'https://www.djangoproject.com/weblog/2013/feb/19/security/', 'http://ubuntu.com/usn/usn-1757-1', 'http://rhn.redhat.com/errata/RHSA-2013-0670.html', 'http://www.debian.org/security/2013/dsa-2634'} | null |
PyPI | PYSEC-2021-379 | null | OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading. | {'CVE-2021-41132', 'GHSA-g67g-hvc3-xmvf'} | 2021-10-24T23:24:38.547709Z | 2021-10-14T16:15:00Z | null | null | null | {'https://www.openmicroscopy.org/security/advisories/2021-SV3/', 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424', 'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf'} | null |
PyPI | PYSEC-2021-683 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`. The division by 0 occurs deep in Eigen code because the `b` tensor is empty. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-xw93-v57j-fcgh', 'CVE-2021-29557'} | 2021-12-09T06:35:24.626277Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh'} | null |
PyPI | PYSEC-2017-54 | null | Plone 3.3.0 through 3.3.6 allows remote attackers to inject headers into HTTP responses. | {'CVE-2015-7318'} | 2021-07-25T23:34:48.507474Z | 2017-09-25T17:29:00Z | null | null | null | {'https://plone.org/security/hotfix/20150910/header-injection', 'https://plone.org/security/hotfix/20150910', 'https://bugzilla.redhat.com/show_bug.cgi?id=1264796', 'http://www.openwall.com/lists/oss-security/2015/09/22/16'} | null |
PyPI | GHSA-hm3x-jwwf-jpr9 | Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates | An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. A patch is available on the `master` branch and anticipated to be part of version 11.6.1. | {'CVE-2021-4180'} | 2022-03-31T20:48:39.881307Z | 2022-03-24T00:00:17Z | MODERATE | null | {'CWE-200'} | {'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea', 'https://github.com/openstack/tripleo-heat-templates', 'https://bugzilla.redhat.com/show_bug.cgi?id=2035793', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180', 'https://bugs.launchpad.net/tripleo/+bug/1955397', 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515'} | null |
PyPI | GHSA-wgpj-7c2j-vfjm | Tampering with links (e.g. password reset) in emails sent by Indico | ### Impact
An external audit of the Indico codebase has discovered a vulnerability in Indico's URL generation logic which could have allowed an attacker to make Indico send a password reset link with a valid token pointing to an attacker-controlled domain by sending that domain in the `Host` header. Had a user clicked such a link without realizing it does not point to Indico (and that they never requested it), it would have revealed their password reset token to the attacker, allowing them to reset the password for that user and thus take over their Indico account.
- If the web server already enforces a canonical host name, this cannot be exploited (this was not part of the default config from the Indico setup guide)
- If only SSO is used ([`LOCAL_IDENTITIES`](https://docs.getindico.io/en/stable/config/settings/#LOCAL_IDENTITIES) set to `False`), the vulnerability cannot be exploited for password reset links, but other links in emails set by Indico could be tampered with in the same way (with less problematic impact though)
### Patches
You need to update to [Indico 2.3.4](https://github.com/indico/indico/releases/tag/v2.3.4) as soon as possible.
See [the docs](https://docs.getindico.io/en/stable/installation/upgrade/) for instructions on how to update.
### Workarounds
You can configure the web server to canonicalize the URL to the hostname used for Indico. See [this commit](https://github.com/indico/indico/pull/4815/commits/b6bff6d004abcf07db1891e26a0eb4aa0edb7c21) for the changes in our setup docs; they can be easily applied to your existing web server config.
### For more information
If you have any questions or comments about this advisory:
- Open a thread in [our forum](https://talk.getindico.io/)
- Email us privately at indico-team@cern.ch | {'CVE-2021-30185'} | 2022-03-03T05:13:39.322351Z | 2021-04-08T16:33:38Z | HIGH | null | {'CWE-640'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-30185', 'https://www.shorebreaksecurity.com/blog/', 'https://github.com/indico/indico/releases/tag/v2.3.4', 'https://github.com/indico/indico/security/advisories/GHSA-wgpj-7c2j-vfjm'} | null |
PyPI | PYSEC-2021-23 | null | Sydent is a reference matrix identity server. A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example. This issue has been fixed in 4469d1d. | {'CVE-2021-29432', 'GHSA-mh74-4m5g-fcjx'} | 2021-04-22T15:25:00Z | 2021-04-15T21:15:00Z | null | null | null | {'https://github.com/matrix-org/sydent/security/advisories/GHSA-mh74-4m5g-fcjx', 'https://pypi.org/project/matrix-sydent/', 'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'} | null |
PyPI | PYSEC-2021-396 | null | TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. This is because the checkpoints loading infrastructure is missing validation for invalid file formats. The fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'CVE-2021-41203', 'GHSA-7pxj-m4jf-r6h2'} | 2021-11-13T06:52:42.793363Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad', 'https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2', 'https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578', 'https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2'} | null |
PyPI | GHSA-x3rm-644h-67m8 | Out-of-bounds Read in OpenCV | OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp. | {'CVE-2019-16249'} | 2022-03-03T05:12:33.067879Z | 2021-10-12T22:22:05Z | MODERATE | null | {'CWE-125'} | {'https://github.com/opencv/opencv/issues/15481', 'https://github.com/opencv/opencv-python/releases/tag/30', 'https://bugzilla.redhat.com/show_bug.cgi?id=1752702', 'https://github.com/opencv/opencv/pull/15531', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16249', 'https://github.com/opencv/opencv-python'} | null |
PyPI | GHSA-m539-j985-hcr8 | Crash in `max_pool3d` when size argument is 0 or negative | ### Impact
The Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative:
```python
import tensorflow as tf
pool_size = [2, 2, 0]
layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size)
input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32)
res = layer(input_tensor)
```
This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive.
### Patches
We have patched the issue in GitHub commit [12b1ff82b3f26ff8de17e58703231d5a02ef1b8b](https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b) (merging [#51975](https://github.com/tensorflow/tensorflow/pull/51975)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51936).
| {'CVE-2021-41196'} | 2022-03-03T05:13:52.073527Z | 2021-11-10T19:36:21Z | MODERATE | null | {'CWE-191'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41196', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8', 'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b'} | null |
PyPI | GHSA-cg75-6938-wx58 | python-docutils allows insecure usage of temporary files | python-docutils allows insecure usage of temporary files | {'CVE-2009-5042'} | 2022-03-21T22:00:11.664910Z | 2020-03-13T20:04:51Z | CRITICAL | null | {'CWE-668'} | {'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560755', 'https://nvd.nist.gov/vuln/detail/CVE-2009-5042', 'https://security-tracker.debian.org/tracker/CVE-2009-5042'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.