ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
PyPI
PYSEC-2021-197
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) uses the same index to access two arrays in parallel. Since the user controls the shape of the input arguments, an attacker could trigger a heap OOB access when `parent_output_index` is shorter than `row_split`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-8gv3-57p6-g35r', 'CVE-2021-29560'}
2021-08-27T03:22:32.127822Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r'}
null
PyPI
GHSA-rmpv-rcp6-v8wc
Cross-site scripting in Plone
Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item.
{'CVE-2021-33508'}
2022-03-03T05:13:39.390792Z
2021-06-08T23:20:11Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33508', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname'}
null
PyPI
GHSA-3c5c-7235-994j
Moderate severity vulnerability that affects Pillow
Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
{'CVE-2016-2533'}
2022-03-03T05:14:10.628337Z
2018-07-24T20:15:13Z
MODERATE
null
{'CWE-119'}
{'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b', 'http://www.openwall.com/lists/oss-security/2016/02/22/2', 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://github.com/advisories/GHSA-3c5c-7235-994j', 'https://security.gentoo.org/glsa/201612-52', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'https://github.com/python-pillow/Pillow', 'http://www.openwall.com/lists/oss-security/2016/02/02/5', 'http://www.debian.org/security/2016/dsa-3499', 'https://github.com/python-pillow/Pillow/pull/1706', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533'}
null
PyPI
GHSA-g4mq-6fp5-qwcf
Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
{'CVE-2020-1733'}
2022-04-26T18:17:15.676462Z
2021-04-20T16:46:12Z
MODERATE
null
{'CWE-668', 'CWE-362', 'CWE-377'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://www.debian.org/security/2021/dsa-4950', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://github.com/ansible/ansible', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://github.com/ansible/ansible/issues/67791', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1733', 'https://security.gentoo.org/glsa/202006-11'}
null
PyPI
PYSEC-2022-171
null
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion’s public key, which can result in attackers substituting arbitrary pillar data.
{'CVE-2022-22934'}
2022-03-29T18:37:43.897944Z
2022-03-29T17:15:00Z
null
null
null
{'https://saltproject.io/security_announcements/salt-security-advisory-release/,', 'https://github.com/saltstack/salt/releases,', 'https://repo.saltproject.io/'}
null
PyPI
PYSEC-2021-528
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `OneHot` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72). An attacker can craft a model such that at least one of the dimensions of `indices` would be 0. In turn, the `prefix_dim_size` value would become 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-j8qh-3xrq-c825', 'CVE-2021-29600'}
2021-12-09T06:34:58.930299Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'}
null
PyPI
PYSEC-2014-29
null
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.
{'CVE-2012-5487'}
2021-09-01T08:44:29.087946Z
2014-09-30T14:55:00Z
null
null
null
{'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'https://plone.org/products/plone/security/advisories/20121106/03', 'https://plone.org/products/plone-hotfix/releases/20121106', 'http://www.openwall.com/lists/oss-security/2012/11/10/1'}
null
PyPI
PYSEC-2016-14
null
Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission.
{'CVE-2016-2048'}
2021-07-15T02:22:10.055528Z
2016-02-08T19:59:00Z
null
null
null
{'http://www.securitytracker.com/id/1034894', 'http://www.securityfocus.com/bid/82329', 'https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/'}
null
PyPI
PYSEC-2021-178
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L67-L74) does not fully validate the `data_splits` argument. This would result in `ngrams_data`(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L106-L110) to be a null pointer when the output would be computed to have 0 or negative size. Later writes to the output tensor would then cause a null pointer dereference. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29541', 'GHSA-xqfj-35wv-m3cr'}
2021-08-27T03:22:28.768951Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr'}
null
PyPI
PYSEC-2021-482
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kernels/count_ops.cc#L123-L127) computes a divisor value from user data but does not check that the result is 0 before doing the division. Since `data` is given by the `values` argument, `num_batch_elements` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, and TensorFlow 2.3.3, as these are also affected.
{'GHSA-qg48-85hg-mqc5', 'CVE-2021-29554'}
2021-12-09T06:34:51.766391Z
2021-05-14T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5'}
null
PyPI
PYSEC-2020-178
null
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.
{'CVE-2019-16792', 'GHSA-4ppp-gpcr-7qf6'}
2020-01-30T17:07:00Z
2020-01-22T19:15:00Z
null
null
null
{'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6', 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}
null
PyPI
PYSEC-2017-81
null
Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attackers to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method.
{'GHSA-p5wr-vp8g-q5p4', 'CVE-2017-5524'}
2021-08-25T04:30:17.184045Z
2017-03-23T16:59:00Z
null
null
null
{'http://www.securityfocus.com/bid/95679', 'https://plone.org/security/hotfix/20170117/sandbox-escape', 'http://www.openwall.com/lists/oss-security/2017/01/18/6', 'https://github.com/advisories/GHSA-p5wr-vp8g-q5p4'}
null
PyPI
PYSEC-2020-206
null
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
{'GHSA-frxj-5j27-f8rf', 'CVE-2019-14905'}
2021-07-02T02:41:34.645049Z
2020-03-31T17:15:00Z
null
null
null
{'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://github.com/advisories/GHSA-frxj-5j27-f8rf', 'https://access.redhat.com/errata/RHSA-2020:0218', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html', 'https://access.redhat.com/errata/RHSA-2020:0216', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905'}
null
PyPI
PYSEC-2021-19
null
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
{'CVE-2021-28957', 'GHSA-jq4v-f5q6-mjqq'}
2021-03-30T18:47:00Z
2021-03-21T05:15:00Z
null
null
null
{'https://bugs.launchpad.net/lxml/+bug/1888153', 'https://www.debian.org/security/2021/dsa-4880', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html', 'https://github.com/advisories/GHSA-jq4v-f5q6-mjqq', 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270'}
null
PyPI
PYSEC-2021-656
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments. Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since `OP_REQUIRES`(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function. Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-xcwj-wfcm-m23c', 'CVE-2021-29530'}
2021-12-09T06:35:19.918878Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
null
PyPI
PYSEC-2006-1
null
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
{'CVE-2006-0847'}
2021-07-05T00:01:17.388273Z
2006-02-22T02:02:00Z
null
null
null
{'http://sourceforge.net/project/shownotes.php?release_id=384316&group_id=56099', 'http://www.cherrypy.org/', 'http://www.securityfocus.com/bid/16760', 'http://groups.google.com/group/cherrypy-announce/browse_thread/thread/92b2972f774fe6df/2f63afc9433dc306#2f63afc9433dc306', 'http://www.gentoo.org/security/en/glsa/glsa-200605-16.xml', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/24809', 'http://secunia.com/advisories/18944', 'http://secunia.com/advisories/20344', 'http://www.vupen.com/english/advisories/2006/0677'}
null
PyPI
PYSEC-2021-206
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/ac328eaa3870491ababc147822cd04e91a790643/tensorflow/core/kernels/requantization_range_op.cc#L49-L50) assumes that the `input_min` and `input_max` tensors have at least one element, as it accesses the first element in two arrays. If the tensors are empty, `.flat<T>()` is an empty object, backed by an empty array. Hence, accesing even the 0th element is a read outside the bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29569', 'GHSA-3h8m-483j-7xxm'}
2021-08-27T03:22:33.683964Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm'}
null
PyPI
GHSA-rmp7-f2vp-3rq4
Cross-site scripting in SiCKRAGE
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
{'CVE-2021-25925'}
2022-03-03T05:13:35.635168Z
2021-04-20T16:31:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925'}
null
PyPI
PYSEC-2021-713
null
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step of the `SpaceToDepth` TFLite operator does not check for 0 before division(https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). An attacker can craft a model such that `params->block_size` would be zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29587', 'GHSA-j7rm-8ww4-xx2g'}
2021-12-09T06:35:29.871064Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g'}
null
PyPI
PYSEC-2011-10
null
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
{'GHSA-5j2h-h5hg-3wf8', 'CVE-2011-0696'}
2021-07-15T02:22:08.278158Z
2011-02-14T21:00:00Z
null
null
null
{'http://www.vupen.com/english/advisories/2011/0372', 'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'http://www.securityfocus.com/bid/46296', 'http://www.debian.org/security/2011/dsa-2163', 'http://www.vupen.com/english/advisories/2011/0441', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html', 'http://secunia.com/advisories/43230', 'http://secunia.com/advisories/43382', 'http://www.vupen.com/english/advisories/2011/0388', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://secunia.com/advisories/43426', 'http://secunia.com/advisories/43297', 'https://github.com/advisories/GHSA-5j2h-h5hg-3wf8', 'https://bugzilla.redhat.com/show_bug.cgi?id=676357', 'http://www.ubuntu.com/usn/USN-1066-1', 'http://www.vupen.com/english/advisories/2011/0429', 'http://www.vupen.com/english/advisories/2011/0439', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html'}
null
PyPI
PYSEC-2021-343
null
Cross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the 'Description' field of the component 'admin/blog/blogpost/add/'. This issue is different than CVE-2018-16632.
{'CVE-2020-19002'}
2022-02-23T20:45:43.686053Z
2021-08-27T19:15:00Z
null
null
null
{'https://github.com/stephenmcd/mezzanine/issues/1921'}
null
PyPI
PYSEC-2015-5
null
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
{'CVE-2015-0220'}
2021-07-05T00:01:19.540383Z
2015-01-16T16:59:00Z
null
null
null
{'https://www.djangoproject.com/weblog/2015/jan/13/security/', 'http://ubuntu.com/usn/usn-2469-1', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html', 'http://advisories.mageia.org/MGASA-2015-0026.html', 'http://secunia.com/advisories/62285', 'http://secunia.com/advisories/62718', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:036', 'http://secunia.com/advisories/62309', 'http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html', 'http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:109'}
null
PyPI
GHSA-6pc9-xqrg-wfqw
Exposure of Sensitive information in httpie
httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0.
{'CVE-2022-0430'}
2022-04-05T19:00:40.328192Z
2022-03-16T00:00:47Z
LOW
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0430', 'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/pypa/advisory-database/tree/main/vulns/httpie/PYSEC-2022-167.yaml', 'https://github.com/httpie/httpie', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}
null
PyPI
PYSEC-2019-240
null
An issue was discovered in py-lmdb 0.97. There is a divide-by-zero error in the function mdb_env_open2 if mdb_env_read_header obtains a zero value for a certain size field. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
{'CVE-2019-16228'}
2021-12-14T08:17:08.476513Z
2019-09-11T15:15:00Z
null
null
null
{'https://pypi.org/project/lmdb', 'https://github.com/TeamSeri0us/pocs/tree/master/lmdb/FPE', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16228'}
null
PyPI
PYSEC-2014-91
null
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
{'GHSA-2jc8-4r6g-282j', 'CVE-2014-1928'}
2021-08-27T03:22:18.180710Z
2014-10-25T21:55:00Z
null
null
null
{'http://seclists.org/oss-sec/2014/q1/246', 'https://github.com/advisories/GHSA-2jc8-4r6g-282j', 'http://secunia.com/advisories/56616', 'https://code.google.com/p/python-gnupg/issues/detail?id=98', 'http://seclists.org/oss-sec/2014/q1/294', 'http://secunia.com/advisories/59031', 'http://www.debian.org/security/2014/dsa-2946', 'https://code.google.com/p/python-gnupg/'}
null
PyPI
PYSEC-2021-590
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the shape inference code for `tf.raw_ops.Dequantize` has a vulnerability that could trigger a denial of service via a segfault if an attacker provides invalid arguments. The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/array_ops.cc#L2999-L3014) uses `axis` to select between two different values for `minmax_rank` which is then used to retrieve tensor dimensions. However, code assumes that `axis` can be either `-1` or a value greater than `-1`, with no validation for the other values. We have patched the issue in GitHub commit da857cfa0fde8f79ad0afdbc94e88b5d4bbec764. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37677', 'GHSA-qfpc-5pjr-mh26'}
2021-12-09T06:35:05.572307Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26', 'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'}
null
PyPI
PYSEC-2022-126
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-qx3f-p745-w4hr', 'CVE-2022-23562'}
2022-03-09T00:18:25.916972Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732', 'https://github.com/tensorflow/tensorflow/pull/51733', 'https://github.com/tensorflow/tensorflow/issues/52676', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr'}
null
PyPI
GHSA-3qxp-qjq7-w4hf
CHECK-fail in tf.raw_ops.EncodePng
### Impact An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data: ```python import tensorflow as tf image = tf.zeros([0, 0, 3]) image = tf.cast(image, dtype=tf.uint8) tf.raw_ops.EncodePng(image=image) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L57-L60) only validates that the total number of pixels in the image does not overflow. Thus, an attacker can send an empty matrix for encoding. However, if the tensor is empty, then the associated buffer is `nullptr`. Hence, when [calling `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L79-L93), the first argument (i.e., `image.flat<T>().data()`) is `NULL`. This then triggers the `CHECK_NOTNULL` in the [first line of `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/lib/png/png_io.cc#L345-L349). ```cc template <typename T> bool WriteImageToBuffer( const void* image, int width, int height, int row_bytes, int num_channels, int channel_bits, int compression, T* png_string, const std::vector<std::pair<std::string, std::string> >* metadata) { CHECK_NOTNULL(image); ... } ``` Since `image` is null, this results in `abort` being called after printing the stacktrace. Effectively, this allows an attacker to mount a denial of service attack. ### Patches We have patched the issue in GitHub commit [26eb323554ffccd173e8a79a8c05c15b685ae4d1](https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29531'}
2022-03-03T05:14:18.316115Z
2021-05-21T14:22:13Z
LOW
null
{'CWE-754'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf', 'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29531'}
null
PyPI
PYSEC-2019-169
null
When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.
{'CVE-2018-11760', 'GHSA-fvxv-9xxr-h7wj'}
2021-08-25T04:30:27.510120Z
2019-02-04T17:29:00Z
null
null
null
{'http://www.securityfocus.com/bid/106786', 'https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b@%3Cuser.spark.apache.org%3E', 'https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e@%3Ccommits.spark.apache.org%3E', 'https://github.com/advisories/GHSA-fvxv-9xxr-h7wj'}
null
PyPI
PYSEC-2020-34
null
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
{'GHSA-fr28-569j-53c4', 'CVE-2020-24584'}
2021-01-20T15:15:00Z
2020-09-01T13:15:00Z
null
null
null
{'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU', 'https://usn.ubuntu.com/4479-1/', 'https://www.openwall.com/lists/oss-security/2020/09/01/2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/', 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/', 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM', 'https://github.com/advisories/GHSA-fr28-569j-53c4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200918-0004/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/'}
null
PyPI
PYSEC-2019-186
null
Matrix Synapse before 1.5.0 mishandles signature checking on some federation APIs. Events sent over /send_join, /send_leave, and /invite may not be correctly signed, or may not come from the expected servers.
{'CVE-2019-18835'}
2021-08-27T03:22:06.354909Z
2019-11-08T00:15:00Z
null
null
null
{'https://github.com/matrix-org/synapse/releases/tag/v1.5.0', 'https://github.com/matrix-org/synapse/pull/6262'}
null
PyPI
PYSEC-2021-210
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0. The implementation(https://github.com/tensorflow/tensorflow/blob/279bab6efa22752a2827621b7edb56a730233bd8/tensorflow/core/kernels/maxpooling_op.cc#L1033-L1034) fails to validate that the batch dimension of the tensor is non-zero, before dividing by this quantity. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-9vpm-rcf4-9wqw', 'CVE-2021-29573'}
2021-08-27T03:22:34.367051Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw', 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'}
null
PyPI
GHSA-924m-4pmx-c67h
High severity vulnerability that affects pysaml2
pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
{'CVE-2017-1000433'}
2022-03-03T05:14:00.579404Z
2018-07-13T16:01:17Z
HIGH
null
{'CWE-287'}
{'https://github.com/advisories/GHSA-924m-4pmx-c67h', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000433', 'https://security.gentoo.org/glsa/201801-11', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html', 'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html', 'https://github.com/rohe/pysaml2', 'https://github.com/rohe/pysaml2/issues/451'}
null
PyPI
PYSEC-2021-640
null
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` argument of `RaggedBincount` does not specify a valid `SparseTensor`(https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow. This will cause a read from outside the bounds of the `splits` tensor buffer in the implementation of the `RaggedBincount` op(https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L446). Before the `for` loop, `batch_idx` is set to 0. The attacker sets `splits(0)` to be 7, hence the `while` loop does not execute and `batch_idx` remains 0. This then results in writing to `out(-1, bin)`, which is before the heap allocated buffer for the output tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected.
{'CVE-2021-29514', 'GHSA-8h46-5m9h-7553'}
2021-12-09T06:35:17.368785Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553', 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'}
null
PyPI
PYSEC-2019-5
null
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
{'CVE-2019-3828', 'GHSA-74vq-h4q8-x6jv'}
2020-05-21T14:55:00Z
2019-03-27T13:29:00Z
null
null
null
{'https://github.com/advisories/GHSA-74vq-h4q8-x6jv', 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html', 'https://access.redhat.com/errata/RHSA-2019:3744', 'https://usn.ubuntu.com/4072-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828', 'https://access.redhat.com/errata/RHSA-2019:3789', 'https://github.com/ansible/ansible/pull/52133'}
null
PyPI
GHSA-r38r-qp28-2m63
Critical severity vulnerability that affects rope
base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load.
{'CVE-2014-3539'}
2022-03-23T21:00:09.517202Z
2018-07-26T16:08:49Z
CRITICAL
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1116485', 'http://www.openwall.com/lists/oss-security/2015/02/07/1', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3539', 'https://github.com/python-rope/rope', 'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'}
null
PyPI
PYSEC-2020-210
null
A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.
{'GHSA-86hp-cj9j-33vv', 'CVE-2020-1753'}
2021-07-02T02:41:35.152435Z
2020-03-16T15:15:00Z
null
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/advisories/GHSA-86hp-cj9j-33vv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753', 'https://github.com/ansible-collections/kubernetes/pull/51', 'https://security.gentoo.org/glsa/202006-11'}
null
PyPI
PYSEC-2017-97
null
file_open in Tryton 3.x and 4.x through 4.2.2 allows remote authenticated users with certain permissions to read arbitrary files via a "same root name but with a suffix" attack. NOTE: This vulnerability exists because of an incomplete fix for CVE-2016-1242.
{'CVE-2017-0360'}
2021-08-27T03:22:48.689499Z
2017-04-04T17:59:00Z
null
null
null
{'http://hg.tryton.org/trytond?cmd=changeset;node=472510fdc6f8', 'https://lists.debian.org/debian-security-announce/2017/msg00084.html', 'http://www.securityfocus.com/bid/97489', 'http://www.debian.org/security/2017/dsa-3826'}
null
PyPI
PYSEC-2010-6
null
The ftp_QUIT function in ftpserver.py in pyftpdlib before 0.5.0 allows remote authenticated users to cause a denial of service (file descriptor exhaustion and daemon outage) by sending a QUIT command during a disallowed data-transfer attempt.
{'CVE-2008-7264'}
2021-07-05T00:01:24.722786Z
2010-10-19T20:00:00Z
null
null
null
{'http://code.google.com/p/pyftpdlib/issues/detail?id=71', 'http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY', 'http://code.google.com/p/pyftpdlib/source/detail?r=344', 'http://code.google.com/p/pyftpdlib/source/diff?spec=svn344&r=344&format=side&path=/trunk/pyftpdlib/ftpserver.py'}
null
PyPI
GHSA-fcwc-p4fc-c5cc
Null pointer dereference in `MatrixDiagPartOp`
### Impact If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first: ```python import tensorflow as tf tf.raw_ops.MatrixDiagPartV2( input=tf.ones(2,dtype=tf.int32), k=tf.ones(2,dtype=tf.int32), padding_value=[]) ``` Although this example is given for `MatrixDiagPartV2`, all versions of the operation are affected. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L89) reads the first value from a tensor buffer without first checking that the tensor has values to read from. ### Patches We have patched the issue in GitHub commit [482da92095c4d48f8784b1f00dda4f81c28d2988](https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37643'}
2022-03-03T05:13:40.355999Z
2021-08-25T14:43:42Z
HIGH
null
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37643'}
null
PyPI
PYSEC-2017-78
null
An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
{'GHSA-m85c-9mf8-m2m6', 'CVE-2017-16763'}
2021-08-25T04:29:57.582065Z
2017-11-10T09:29:00Z
null
null
null
{'https://github.com/bbengfort/confire/issues/24', 'https://github.com/advisories/GHSA-m85c-9mf8-m2m6', 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/', 'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'}
null
PyPI
GHSA-q6j2-g8qf-wvf7
Verification check bypass in Gate One
An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.
{'CVE-2020-19003'}
2022-03-03T05:13:57.125452Z
2021-10-12T22:34:28Z
MODERATE
null
{'CWE-287'}
{'https://github.com/liftoff/GateOne/issues/728', 'https://github.com/liftoff/GateOne', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19003'}
null
PyPI
GHSA-962m-m8jw-8wrr
Path Traversal in Zope
Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
{'CVE-2021-32633'}
2022-03-03T05:13:58.513548Z
2021-06-15T16:10:49Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32633', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91', 'https://github.com/zopefoundation/Zope', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/'}
null
PyPI
GHSA-hm2h-f456-6j88
Cross-site scripting in Plone
Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document.
{'CVE-2021-33512'}
2022-03-03T05:12:39.117338Z
2021-06-08T23:20:04Z
MODERATE
null
{'CWE-79'}
{'https://plone.org/security/hotfix/20210518/stored-xss-from-file-upload-svg-html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33512', 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}
null
PyPI
PYSEC-2021-355
null
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.
{'GHSA-663j-rjcr-789f', 'CVE-2021-25962'}
2021-09-30T23:26:29.598032Z
2021-09-29T14:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-663j-rjcr-789f', 'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962'}
null
PyPI
GHSA-vq36-27g6-p492
Out of bounds read in Tensorflow
### Impact TensorFlow's [type inference](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229) can cause a heap OOB read as the bounds checking is done in a `DCHECK` (which is a no-op during production): ```cc if (node_t.type_id() != TFT_UNSET) { int ix = input_idx[i]; DCHECK(ix < node_t.args_size()) << "input " << i << " should have an output " << ix << " but instead only has " << node_t.args_size() << " outputs: " << node_t.DebugString(); input_types.emplace_back(node_t.args(ix)); // ... } ``` An attacker can control `input_idx` such that `ix` would be larger than the number of values in `node_t.args`. ### Patches We have patched the issue in GitHub commit [c99d98cd189839dcf51aee94e7437b54b31f8abd](https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd). The fix will be included in TensorFlow 2.8.0. This is the only affected version. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23592'}
2022-03-28T19:45:06.569091Z
2022-02-09T23:31:48Z
HIGH
null
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23592', 'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq36-27g6-p492', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229', 'https://github.com/tensorflow/tensorflow/'}
null
PyPI
GHSA-q2q7-5pp4-w6pg
Catastrophic backtracking in URL authority parser when passed URL containing many @ characters
### Impact When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. ### Patches The issue has been fixed in urllib3 v1.26.5. ### References - [CVE-2021-33503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503) - [JVNVU#92413403 (English)](https://jvn.jp/en/vu/JVNVU92413403/) - [JVNVU#92413403 (Japanese)](https://jvn.jp/vu/JVNVU92413403/) - [urllib3 v1.26.5](https://github.com/urllib3/urllib3/releases/tag/1.26.5) ### For more information If you have any questions or comments about this advisory: * Ask in our [community Discord](https://discord.gg/urllib3) * Email [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
{'CVE-2021-33503'}
2022-03-03T05:13:06.285390Z
2021-06-01T21:19:32Z
HIGH
null
{'CWE-400'}
{'https://security.gentoo.org/glsa/202107-36', 'https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/', 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33503', 'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec', 'https://github.com/urllib3/urllib3'}
null
PyPI
PYSEC-2021-705
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/ab1e644b48c82cb71493f4362b4dd38f4577a1cf/tensorflow/core/kernels/maxpooling_op.cc#L194-L203) fails to validate that indices used to access elements of input/output arrays are valid. Whereas accesses to `input_backprop_flat` are guarded by `FastBoundsCheck`, the indexing in `out_backprop_flat` can result in OOB access. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-79fv-9865-4qcv', 'CVE-2021-29579'}
2021-12-09T06:35:28.365362Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79fv-9865-4qcv', 'https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7'}
null
PyPI
PYSEC-2020-22
null
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.
{'GHSA-7mx5-x372-xh87', 'CVE-2020-17526'}
2020-12-22T21:23:00Z
2020-12-21T17:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-7mx5-x372-xh87', 'https://lists.apache.org/thread.html/rbeeb73a6c741f2f9200d83b9c2220610da314810c4e8c9cf881d47ef%40%3Cusers.airflow.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/21/1'}
null
PyPI
PYSEC-2022-130
null
Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-23566', 'GHSA-5qw5-89mw-wcg2'}
2022-03-09T00:18:26.438942Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394', 'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2'}
null
PyPI
PYSEC-2021-586
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L513) does not check that the `key` input is a valid non-empty tensor. We have patched the issue in GitHub commit d7de67733925de196ec8863a33445b73f9562d1d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37673', 'GHSA-278g-rq84-9hmg'}
2021-12-09T06:35:05.237190Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg'}
null
PyPI
PYSEC-2014-87
null
Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py.
{'CVE-2014-3007'}
2021-08-27T03:22:10.225452Z
2014-04-27T20:55:00Z
null
null
null
{'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059', 'http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-1932.html'}
null
PyPI
PYSEC-2021-569
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/ragged_tensor_to_sparse_kernel.cc#L30) has an incomplete validation of the splits values: it does not check that they are in increasing order. We have patched the issue in GitHub commit 1071f554dbd09f7e101324d366eec5f4fe5a3ece. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-4xfp-4pfp-89wg', 'CVE-2021-37656'}
2021-12-09T06:35:03.759832Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg'}
null
PyPI
PYSEC-2014-68
null
Products/CMFPlone/CatalogTool.py in Plone 3.3 through 4.3.2 allows remote administrators to bypass restrictions and obtain sensitive information via an unspecified search API.
{'CVE-2013-7061'}
2021-07-25T23:34:50.085881Z
2014-05-02T14:55:00Z
null
null
null
{'https://plone.org/security/20131210/catalogue-exposure', 'http://www.openwall.com/lists/oss-security/2013/12/10/15', 'http://www.openwall.com/lists/oss-security/2013/12/12/3'}
null
PyPI
GHSA-3872-f48p-pxqj
Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate
### Impact Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way. ### Patches The issues were fixed in the 4.11.1 release. The following commits are addressing it: * 35d59f1f040541c358cece0a8d4a63183ca919b8 * d83672a3e7415da1490334e2c9431e5da1966842 ### Workarounds Instances in which untrusted users cannot create new components are not affected. ### References * [SNYK-PYTHON-WEBLATE-2414088](https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088) ### For more information If you have any questions or comments about this advisory: * Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions) * Email us at [care@weblate.org](mailto:care@weblate.org)
{'CVE-2022-23915'}
2022-03-15T21:46:49.790453Z
2022-03-04T21:15:31Z
HIGH
null
{'CWE-77', 'CWE-88'}
{'https://github.com/WeblateOrg/weblate', 'https://github.com/WeblateOrg/weblate/pull/7338', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj', 'https://github.com/WeblateOrg/weblate/releases/tag/weblate-4.11.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23915', 'https://github.com/WeblateOrg/weblate/pull/7337', 'https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088', 'https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088'}
null
PyPI
PYSEC-2021-139
null
An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load.
{'GHSA-g6rj-rv7j-xwp4', 'CVE-2021-28675'}
2021-08-27T03:22:10.501313Z
2021-06-02T15:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-g6rj-rv7j-xwp4', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}
null
PyPI
GHSA-grgm-pph5-j5h7
Exposure of Sensitive Information to an Unauthorized Actor in ansible
A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.
{'CVE-2019-10156'}
2022-04-20T19:30:08.511337Z
2019-07-31T04:22:49Z
MODERATE
null
{'CWE-200'}
{'https://access.redhat.com/errata/RHSA-2019:3744', 'https://github.com/ansible/ansible/pull/57188', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10156', 'https://github.com/ansible/ansible', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156', 'https://access.redhat.com/errata/RHSA-2019:3789', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html', 'https://www.debian.org/security/2021/dsa-4950'}
null
PyPI
GHSA-hwv5-w8gm-fq9f
Directory Traversal vulnerability in GET/PUT allows attackers to Disclose Information or Write Files via a crafted GET/PUT request
### Impact #### Information Disclosure When the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. #### File Write If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. ### Patches PR #12 fixes the issue. The PR has been merged into version 0.4.0 and 0.4.0 has been released and pushed to PyPI. Users are advised to upgrade immediately. ### Workarounds - Apache can apparently be configured to filter such malicious paths when reverse-proxying. - There are no other workarounds known. ### References - [Pull Request #12](https://github.com/horazont/xmpp-http-upload/pull/12)
{'CVE-2020-15239'}
2022-03-03T05:13:07.970107Z
2020-10-06T18:21:02Z
LOW
null
{'CWE-22'}
{'https://github.com/horazont/xmpp-http-upload/pull/12', 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75', 'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15239', 'https://pypi.org/project/xmpp-http-upload/#history'}
null
PyPI
PYSEC-2019-190
null
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
{'CVE-2019-9735'}
2021-08-27T03:22:08.807010Z
2019-03-13T02:29:00Z
null
null
null
{'https://seclists.org/bugtraq/2019/Mar/24', 'https://usn.ubuntu.com/4036-1/', 'http://www.openwall.com/lists/oss-security/2019/03/18/2', 'https://launchpad.net/bugs/1818385', 'https://access.redhat.com/errata/RHSA-2019:0916', 'https://www.debian.org/security/2019/dsa-4409', 'https://security.openstack.org/ossa/OSSA-2019-001.html', 'https://access.redhat.com/errata/RHSA-2019:0879', 'http://www.securityfocus.com/bid/107390', 'https://access.redhat.com/errata/RHSA-2019:0935'}
null
PyPI
PYSEC-2012-16
null
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
{'CVE-2012-2417'}
2021-08-27T03:22:16.601238Z
2012-06-17T03:41:00Z
null
null
null
{'http://www.osvdb.org/82279', 'https://hermes.opensuse.org/messages/15083589', 'https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2', 'http://www.openwall.com/lists/oss-security/2012/05/25/1', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/75871', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html', 'https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog', 'http://www.securityfocus.com/bid/53687', 'http://www.debian.org/security/2012/dsa-2502', 'http://secunia.com/advisories/49263', 'https://bugs.launchpad.net/pycrypto/+bug/985164', 'http://www.mandriva.com/security/advisories?name=MDVSA-2012:117'}
null
PyPI
PYSEC-2020-139
null
In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is patched in eccb7ec454e6617738554a255d77f08e60ee0808 and TensorFlow 2.4.0 will be released containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
{'GHSA-xwhf-g6j5-j5gc', 'CVE-2020-15266'}
2021-09-01T08:19:35.637564Z
2020-10-21T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/issues/42129', 'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc'}
null
PyPI
GHSA-f97h-2pfx-f59f
HTTP response splitting in uvicorn
This affects all versions of package uvicorn. Uvicorn's implementation of the HTTP protocol for the httptools parser is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
{'CVE-2020-7695'}
2022-03-03T05:13:15.014104Z
2020-07-29T18:07:20Z
HIGH
null
{'CWE-74'}
{'https://github.com/encode/uvicorn', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7695', 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471'}
null
PyPI
GHSA-24x4-6qmh-88qg
Use after free in `DecodePng` kernel
### Impact A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346): ```cc if (/* ... error conditions ... */) { png::CommonFreeDecode(&decode); OP_REQUIRES(context, false, errors::InvalidArgument("PNG size too large for int: ", decode.width, " by ", decode.height)); } ``` After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. ### Patches We have patched the issue in GitHub commit [e746adbfcfee15e9cfdb391ff746c765b99bdf9b](https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23584'}
2022-03-03T05:13:53.559196Z
2022-02-09T23:57:42Z
HIGH
null
{'CWE-416'}
{'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23584', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg', 'https://github.com/tensorflow/tensorflow/'}
null
PyPI
PYSEC-2020-247
null
Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role).
{'CVE-2020-28735', 'GHSA-x7wf-5mjc-6x76'}
2021-08-27T03:22:11.505885Z
2020-12-30T19:15:00Z
null
null
null
{'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://www.misakikata.com/codes/plone/python-en.html', 'https://github.com/advisories/GHSA-x7wf-5mjc-6x76', 'https://github.com/plone/Products.CMFPlone/issues/3209'}
null
PyPI
PYSEC-2014-1
null
The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."
{'CVE-2014-0472'}
2021-07-05T00:01:18.476528Z
2014-04-23T15:55:00Z
null
null
null
{'http://www.ubuntu.com/usn/USN-2169-1', 'https://www.djangoproject.com/weblog/2014/apr/21/security/', 'http://rhn.redhat.com/errata/RHSA-2014-0456.html', 'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html', 'http://secunia.com/advisories/61281', 'http://rhn.redhat.com/errata/RHSA-2014-0457.html', 'http://www.debian.org/security/2014/dsa-2934'}
null
PyPI
GHSA-vvg4-vgrv-xfr7
Incomplete validation in `tf.raw_ops.CTCLoss`
### Impact Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap: ```python import tensorflow as tf inputs = tf.constant([], shape=[10, 16, 0], dtype=tf.float32) labels_indices = tf.constant([], shape=[8, 0], dtype=tf.int64) labels_values = tf.constant([-100] * 8, shape=[8], dtype=tf.int32) sequence_length = tf.constant([-100] * 16, shape=[16], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=True, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=True) ``` An attacker can also trigger a heap buffer overflow: ```python import tensorflow as tf inputs = tf.constant([], shape=[7, 2, 0], dtype=tf.float32) labels_indices = tf.constant([-100, -100], shape=[2, 1], dtype=tf.int64) labels_values = tf.constant([-100, -100], shape=[2], dtype=tf.int32) sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=False, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=False) ``` Finally, an attacker can trigger a null pointer dereference: ```python import tensorflow as tf inputs = tf.constant([], shape=[0, 2, 11], dtype=tf.float32) labels_indices = tf.constant([], shape=[0, 2], dtype=tf.int64) labels_values = tf.constant([], shape=[0], dtype=tf.int32) sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=False, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=False) ``` ### Patches We have patched the issue in GitHub commit[14607c0707040d775e06b6817325640cb4b5864c](https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c) followed by GitHub commit [4504a081af71514bb1828048363e6540f797005b](https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29613'}
2022-03-03T05:14:18.725259Z
2021-05-21T14:28:39Z
MODERATE
null
{'CWE-665'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29613', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vvg4-vgrv-xfr7', 'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c'}
null
PyPI
PYSEC-2021-58
null
sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1.
{'CVE-2021-21431', 'GHSA-23c7-6444-399m'}
2021-05-04T13:59:00Z
2021-04-09T16:15:00Z
null
null
null
{'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856', 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'}
null
PyPI
PYSEC-2021-617
null
TensorFlow is an open source platform for machine learning. In affected versions the code for boosted trees in TensorFlow is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `nullptr`s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call. Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. We will deprecate TensorFlow's boosted trees APIs in subsequent releases. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-57wx-m983-2f88', 'CVE-2021-41208'}
2021-12-09T06:35:08.671870Z
2021-11-05T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88', 'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c'}
null
PyPI
GHSA-fphq-gw9m-ghrv
CHECK-fail in `CTCGreedyDecoder`
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`: ```python import tensorflow as tf inputs = tf.constant([], shape=[18, 2, 0], dtype=tf.float32) sequence_length = tf.constant([-100, 17], shape=[2], dtype=tf.int32) merge_repeated = False tf.raw_ops.CTCGreedyDecoder(inputs=inputs, sequence_length=sequence_length, merge_repeated=merge_repeated) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CHECK_LT` inserted to validate some invariants. When this condition is false, the program aborts, instead of returning a valid error to the user. This abnormal termination can be weaponized in denial of service attacks. ### Patches We have patched the issue in GitHub commit [ea3b43e98c32c97b35d52b4c66f9107452ca8fb2](https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29543'}
2022-03-03T05:13:59.592746Z
2021-05-21T14:23:18Z
LOW
null
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29543', 'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'}
null
PyPI
PYSEC-2021-247
null
TensorFlow is an end-to-end open source platform for machine learning. The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:. The validation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74-L77) uses `||` to mix two different conditions. If `axis_ < -1` the condition in `OP_REQUIRES` will still be true, but this value of `axis_` results in heap underflow. This allows attackers to read/write to other data on the heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-mq5c-prh3-3f3h', 'CVE-2021-29610'}
2021-08-27T03:22:41.001819Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h', 'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'}
null
PyPI
PYSEC-2021-752
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions if the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors. We have patched the issue in GitHub commit a2b743f6017d7b97af1fe49087ae15f0ac634373. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37641', 'GHSA-9c8h-vvrj-w2p8'}
2021-12-09T06:35:35.841569Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8'}
null
PyPI
PYSEC-2021-302
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226). We have patched the issue in GitHub commit 718721986aa137691ee23f03638867151f74935f. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37680', 'GHSA-cfpj-3q4c-jhvr'}
2021-08-27T03:22:46.794136Z
2021-08-12T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr', 'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'}
null
PyPI
GHSA-g86p-hgx5-2pfh
Improper Authentication in Buildbot
Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim.
{'CVE-2019-12300'}
2022-03-07T20:48:05.535076Z
2019-05-29T18:48:11Z
CRITICAL
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12300', 'https://github.com/buildbot/buildbot', 'https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication'}
null
PyPI
PYSEC-2019-201
null
Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors.
{'CVE-2019-10904', 'GHSA-926q-wxr6-3crq'}
2021-09-02T01:11:35.189013Z
2019-04-06T20:29:00Z
null
null
null
{'https://bugs.python.org/issue36391', 'https://github.com/python/bugs.python.org/issues/34', 'https://www.openwall.com/lists/oss-security/2019/04/05/1', 'http://www.openwall.com/lists/oss-security/2019/04/07/1', 'https://github.com/advisories/GHSA-926q-wxr6-3crq', 'https://lists.debian.org/debian-lts-announce/2019/04/msg00009.html'}
null
PyPI
PYSEC-2015-12
null
django-markupfield before 1.3.2 uses the default docutils RESTRUCTUREDTEXT_FILTER_SETTINGS settings, which allows remote attackers to include and read arbitrary files via unspecified vectors.
{'CVE-2015-0846'}
2021-07-05T00:01:17.695542Z
2015-04-24T14:59:00Z
null
null
null
{'https://github.com/jamesturk/django-markupfield/blob/master/CHANGELOG', 'http://www.debian.org/security/2015/dsa-3230'}
null
PyPI
PYSEC-2020-302
null
In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_index). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding DataType values and comparing these for equality. However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays. In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
{'CVE-2020-26271', 'GHSA-q263-fvxm-m5mw'}
2021-12-09T06:34:45.035634Z
2020-12-10T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw'}
null
PyPI
PYSEC-2022-167
null
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0.
{'GHSA-6pc9-xqrg-wfqw', 'CVE-2022-0430'}
2022-03-23T14:28:20.245559Z
2022-03-15T15:15:00Z
null
null
null
{'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b', 'https://github.com/advisories/GHSA-6pc9-xqrg-wfqw'}
null
PyPI
PYSEC-2021-181
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L162-L163) does not validate the rank of the `input_*` tensors. In turn, this results in the tensors being passes as they are to `QuantizeAndDequantizePerChannelGradientImpl`(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.h#L295-L306). However, the `vec<T>` method, requires the rank to 1 and triggers a `CHECK` failure otherwise. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 as this is the only other affected version.
{'CVE-2021-29544', 'GHSA-6g85-3hm8-83f9'}
2021-08-27T03:22:29.285990Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'}
null
PyPI
GHSA-4ph2-8337-hm62
Key Caching behavior in the DynamoDB Encryption Client.
### Impact This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified. When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. ### Patches Fixed as of 1.3.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`. ### Workarounds Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.
null
2022-03-03T05:13:41.146598Z
2021-02-08T17:43:49Z
LOW
null
{'CWE-862'}
{'https://github.com/aws/aws-dynamodb-encryption-python/blob/master/CHANGELOG.rst#130----2021-02-04', 'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b', 'https://pypi.org/project/dynamodb-encryption-sdk', 'https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62'}
null
PyPI
PYSEC-2019-128
null
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.
{'GHSA-6cc5-2vg4-cc7m', 'CVE-2019-12387'}
2020-08-24T17:37:00Z
2019-06-10T12:29:00Z
null
null
null
{'https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2', 'https://usn.ubuntu.com/4308-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html', 'https://labs.twistedmatrix.com/2019/06/twisted-1921-released.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html', 'https://twistedmatrix.com/pipermail/twisted-python/2019-June/032352.html', 'https://usn.ubuntu.com/4308-2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2G5RPDQ4BNB336HL6WW5ZJ344MAWNN7N/', 'https://github.com/advisories/GHSA-6cc5-2vg4-cc7m'}
null
PyPI
PYSEC-2022-48
null
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
{'CVE-2021-22570', 'GHSA-77rm-9x9h-xj3g'}
2022-03-09T00:17:03.282830Z
2022-01-26T14:15:00Z
null
null
null
{'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/', 'https://github.com/advisories/GHSA-77rm-9x9h-xj3g'}
null
PyPI
PYSEC-2020-75
null
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
{'CVE-2020-29128', 'GHSA-69q2-p9xp-739v', 'GHSA-f5gc-p5m3-v347'}
2020-12-03T16:48:00Z
2020-11-26T05:15:00Z
null
null
null
{'https://github.com/petl-developers/petl/pull/527', 'https://github.com/petl-developers/petl/issues/526', 'https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md', 'https://github.com/advisories/GHSA-69q2-p9xp-739v', 'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8', 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347', 'https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8', 'https://petl.readthedocs.io/en/stable/changes.html'}
null
PyPI
GHSA-9mqp-7v2h-2382
Denial of Service in Tensorflow
### Impact The `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L235-L241 Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations. ### Patches We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability is a variant of [GHSA-63xm-rx5p-xvqr](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr)
{'CVE-2020-15194'}
2022-03-03T05:14:22.542012Z
2020-09-25T18:28:19Z
MODERATE
null
{'CWE-20', 'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15194', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382'}
null
PyPI
GHSA-55x5-fj6c-h6m8
HTML Cleaner allows crafted and SVG embedded scripts to pass through
### Impact The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5. ### Patches The issue has been resolved in lxml 4.6.5. ### Workarounds None. ### References The issues are tracked under the report IDs GHSL-2021-1037 and GHSL-2021-1038.
{'CVE-2021-43818'}
2022-04-22T15:47:20.348262Z
2021-12-13T18:14:36Z
HIGH
null
{'CWE-74', 'CWE-79'}
{'https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/', 'https://github.com/lxml/lxml', 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html', 'https://security.netapp.com/advisory/ntap-20220107-0005/', 'https://www.debian.org/security/2022/dsa-5043', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43818', 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776'}
null
PyPI
PYSEC-2021-494
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4a63a573d/tensorflow/core/kernels/dilation_ops.cc#L321-L322) does not validate before writing to the output array. The values for `h_out` and `w_out` are guaranteed to be in range for `out_backprop` (as they are loop indices bounded by the size of the array). However, there are no similar guarantees relating `h_in_max`/`w_in_max` and `in_backprop`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-pvrc-hg3f-58r6', 'CVE-2021-29566'}
2021-12-09T06:34:53.596467Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'}
null
PyPI
PYSEC-2021-4
null
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336).
{'GHSA-3xxv-p78r-4fc6', 'CVE-2021-28359'}
2021-05-10T20:07:00Z
2021-05-02T08:15:00Z
null
null
null
{'https://github.com/advisories/GHSA-3xxv-p78r-4fc6', 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'}
null
PyPI
GHSA-6hpv-v2rx-c5g6
FPE in convolutions with zero size filters
### Impact The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments. ### Patches We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41209'}
2022-03-03T05:13:34.997508Z
2021-11-10T19:02:17Z
MODERATE
null
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41209', 'https://github.com/tensorflow/tensorflow'}
null
PyPI
PYSEC-2021-729
null
TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of `ArgMin`/`ArgMax`(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-crch-j389-5f84', 'CVE-2021-29603'}
2021-12-09T06:35:32.536343Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84', 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'}
null
PyPI
GHSA-j7rm-8ww4-xx2g
Division by zero in TFLite's implementation of `SpaceToDepth`
### Impact The `Prepare` step of the `SpaceToDepth` TFLite operator [does not check for 0 before division](https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). ```cc const int block_size = params->block_size; const int input_height = input->dims->data[1]; const int input_width = input->dims->data[2]; int output_height = input_height / block_size; int output_width = input_width / block_size; ``` An attacker can craft a model such that `params->block_size` would be zero. ### Patches We have patched the issue in GitHub commit [0d45ea1ca641b21b73bcf9c00e0179cda284e7e7](https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29587'}
2022-03-03T05:13:23.496562Z
2021-05-21T14:26:45Z
LOW
null
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29587'}
null
PyPI
PYSEC-2013-17
null
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
{'CVE-2013-0306'}
2021-07-15T02:22:08.748982Z
2013-05-02T14:55:00Z
null
null
null
{'https://www.djangoproject.com/weblog/2013/feb/19/security/', 'http://ubuntu.com/usn/usn-1757-1', 'http://rhn.redhat.com/errata/RHSA-2013-0670.html', 'http://www.debian.org/security/2013/dsa-2634'}
null
PyPI
PYSEC-2021-379
null
OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading.
{'CVE-2021-41132', 'GHSA-g67g-hvc3-xmvf'}
2021-10-24T23:24:38.547709Z
2021-10-14T16:15:00Z
null
null
null
{'https://www.openmicroscopy.org/security/advisories/2021-SV3/', 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424', 'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf'}
null
PyPI
PYSEC-2021-683
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`. The division by 0 occurs deep in Eigen code because the `b` tensor is empty. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-xw93-v57j-fcgh', 'CVE-2021-29557'}
2021-12-09T06:35:24.626277Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh'}
null
PyPI
PYSEC-2017-54
null
Plone 3.3.0 through 3.3.6 allows remote attackers to inject headers into HTTP responses.
{'CVE-2015-7318'}
2021-07-25T23:34:48.507474Z
2017-09-25T17:29:00Z
null
null
null
{'https://plone.org/security/hotfix/20150910/header-injection', 'https://plone.org/security/hotfix/20150910', 'https://bugzilla.redhat.com/show_bug.cgi?id=1264796', 'http://www.openwall.com/lists/oss-security/2015/09/22/16'}
null
PyPI
GHSA-hm3x-jwwf-jpr9
Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. A patch is available on the `master` branch and anticipated to be part of version 11.6.1.
{'CVE-2021-4180'}
2022-03-31T20:48:39.881307Z
2022-03-24T00:00:17Z
MODERATE
null
{'CWE-200'}
{'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea', 'https://github.com/openstack/tripleo-heat-templates', 'https://bugzilla.redhat.com/show_bug.cgi?id=2035793', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180', 'https://bugs.launchpad.net/tripleo/+bug/1955397', 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515'}
null
PyPI
GHSA-wgpj-7c2j-vfjm
Tampering with links (e.g. password reset) in emails sent by Indico
### Impact An external audit of the Indico codebase has discovered a vulnerability in Indico's URL generation logic which could have allowed an attacker to make Indico send a password reset link with a valid token pointing to an attacker-controlled domain by sending that domain in the `Host` header. Had a user clicked such a link without realizing it does not point to Indico (and that they never requested it), it would have revealed their password reset token to the attacker, allowing them to reset the password for that user and thus take over their Indico account. - If the web server already enforces a canonical host name, this cannot be exploited (this was not part of the default config from the Indico setup guide) - If only SSO is used ([`LOCAL_IDENTITIES`](https://docs.getindico.io/en/stable/config/settings/#LOCAL_IDENTITIES) set to `False`), the vulnerability cannot be exploited for password reset links, but other links in emails set by Indico could be tampered with in the same way (with less problematic impact though) ### Patches You need to update to [Indico 2.3.4](https://github.com/indico/indico/releases/tag/v2.3.4) as soon as possible. See [the docs](https://docs.getindico.io/en/stable/installation/upgrade/) for instructions on how to update. ### Workarounds You can configure the web server to canonicalize the URL to the hostname used for Indico. See [this commit](https://github.com/indico/indico/pull/4815/commits/b6bff6d004abcf07db1891e26a0eb4aa0edb7c21) for the changes in our setup docs; they can be easily applied to your existing web server config. ### For more information If you have any questions or comments about this advisory: - Open a thread in [our forum](https://talk.getindico.io/) - Email us privately at indico-team@cern.ch
{'CVE-2021-30185'}
2022-03-03T05:13:39.322351Z
2021-04-08T16:33:38Z
HIGH
null
{'CWE-640'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30185', 'https://www.shorebreaksecurity.com/blog/', 'https://github.com/indico/indico/releases/tag/v2.3.4', 'https://github.com/indico/indico/security/advisories/GHSA-wgpj-7c2j-vfjm'}
null
PyPI
PYSEC-2021-23
null
Sydent is a reference matrix identity server. A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example. This issue has been fixed in 4469d1d.
{'CVE-2021-29432', 'GHSA-mh74-4m5g-fcjx'}
2021-04-22T15:25:00Z
2021-04-15T21:15:00Z
null
null
null
{'https://github.com/matrix-org/sydent/security/advisories/GHSA-mh74-4m5g-fcjx', 'https://pypi.org/project/matrix-sydent/', 'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}
null
PyPI
PYSEC-2021-396
null
TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. This is because the checkpoints loading infrastructure is missing validation for invalid file formats. The fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41203', 'GHSA-7pxj-m4jf-r6h2'}
2021-11-13T06:52:42.793363Z
2021-11-05T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad', 'https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2', 'https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578', 'https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2'}
null
PyPI
GHSA-x3rm-644h-67m8
Out-of-bounds Read in OpenCV
OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp.
{'CVE-2019-16249'}
2022-03-03T05:12:33.067879Z
2021-10-12T22:22:05Z
MODERATE
null
{'CWE-125'}
{'https://github.com/opencv/opencv/issues/15481', 'https://github.com/opencv/opencv-python/releases/tag/30', 'https://bugzilla.redhat.com/show_bug.cgi?id=1752702', 'https://github.com/opencv/opencv/pull/15531', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16249', 'https://github.com/opencv/opencv-python'}
null
PyPI
GHSA-m539-j985-hcr8
Crash in `max_pool3d` when size argument is 0 or negative
### Impact The Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative: ```python import tensorflow as tf pool_size = [2, 2, 0] layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size) input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32) res = layer(input_tensor) ``` This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. ### Patches We have patched the issue in GitHub commit [12b1ff82b3f26ff8de17e58703231d5a02ef1b8b](https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b) (merging [#51975](https://github.com/tensorflow/tensorflow/pull/51975)). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51936).
{'CVE-2021-41196'}
2022-03-03T05:13:52.073527Z
2021-11-10T19:36:21Z
MODERATE
null
{'CWE-191'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41196', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8', 'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b'}
null
PyPI
GHSA-cg75-6938-wx58
python-docutils allows insecure usage of temporary files
python-docutils allows insecure usage of temporary files
{'CVE-2009-5042'}
2022-03-21T22:00:11.664910Z
2020-03-13T20:04:51Z
CRITICAL
null
{'CWE-668'}
{'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560755', 'https://nvd.nist.gov/vuln/detail/CVE-2009-5042', 'https://security-tracker.debian.org/tracker/CVE-2009-5042'}
null