ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
PyPI
PYSEC-2021-539
null
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. The implementation(https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.cc#L40) has no validation that the input arguments specify a valid sparse tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are the only affected versions.
{'GHSA-9rpc-5v9q-5r7f', 'CVE-2021-29611'}
2021-12-09T06:35:00.643127Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9rpc-5v9q-5r7f'}
null
PyPI
PYSEC-2014-38
null
kupu_spellcheck.py in Kupu in Plone before 4.0 allows remote attackers to cause a denial of service (ZServer thread lock) via a crafted URL.
{'CVE-2012-5496'}
2021-07-25T23:34:44.340105Z
2014-09-30T14:55:00Z
null
null
null
{'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://plone.org/products/plone/security/advisories/20121106/12', 'http://www.openwall.com/lists/oss-security/2012/11/10/1'}
null
PyPI
GHSA-vg35-vc9f-q7x2
Improper Restriction of XML External Entity Reference in ladon
Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.
{'CVE-2019-1010268'}
2022-03-22T18:31:59.688683Z
2019-07-26T16:09:54Z
CRITICAL
null
{'CWE-611'}
{'https://bitbucket.org/jakobsg/ladon/pull-requests/9', 'https://www.exploit-db.com/exploits/43113', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010268', 'https://bitbucket.org/jakobsg/ladon', 'https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688'}
null
PyPI
PYSEC-2021-610
null
TensorFlow is an open source platform for machine learning. In affected versions if `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-gh8h-7j2j-qv4f', 'CVE-2021-41200'}
2021-12-09T06:35:07.608577Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f', 'https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e', 'https://github.com/tensorflow/tensorflow/issues/46909'}
null
PyPI
PYSEC-2021-240
null
TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of `ArgMin`/`ArgMax`(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-crch-j389-5f84', 'CVE-2021-29603'}
2021-08-27T03:22:39.733041Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84', 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'}
null
PyPI
PYSEC-2014-6
null
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.
{'CVE-2014-0482'}
2021-07-05T00:01:19.085708Z
2014-08-26T14:55:00Z
null
null
null
{'http://www.debian.org/security/2014/dsa-3010', 'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html', 'http://secunia.com/advisories/59782', 'http://secunia.com/advisories/61281', 'https://www.djangoproject.com/weblog/2014/aug/20/security/', 'http://secunia.com/advisories/61276'}
null
PyPI
PYSEC-2020-240
null
A Denial of Service (DoS) condition is possible in OpenStack Mistral in versions up to and including 7.0.3. Submitting a specially crafted workflow definition YAML file containing nested anchors can lead to resource exhaustion culminating in a denial of service.
{'CVE-2018-16848'}
2021-08-27T03:22:07.520532Z
2020-06-15T15:15:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1645332', 'https://bugs.launchpad.net/mistral/+bug/1785657'}
null
PyPI
GHSA-823f-cwm9-4g74
Splash authentication credentials potentially leaked to target websites
### Impact If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. ### Patches Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. ### Workarounds If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots). ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy-plugins/scrapy-splash/issues) * [Email us](mailto:opensource@zyte.com)
{'CVE-2021-41124'}
2022-03-03T05:13:59.948687Z
2021-10-06T17:49:23Z
HIGH
null
{'CWE-200'}
{'https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41124', 'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31', 'https://github.com/scrapy-plugins/scrapy-splash', 'https://github.com/scrapy-plugins/scrapy-splash/releases/tag/0.8.0'}
null
PyPI
GHSA-fq6p-6334-8gr4
Memory leak in decoding PNG images
### Impact When [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416) TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the function, without allowing for the memory free to occur. ### Patches We have patched the issue in GitHub commit [ab51e5b813573dc9f51efa335aebcf2994125ee9](https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23585'}
2022-03-03T05:12:54.849263Z
2022-02-09T23:26:08Z
MODERATE
null
{'CWE-401'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4', 'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9', 'https://github.com/tensorflow/tensorflow/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23585'}
null
PyPI
PYSEC-2017-28
null
python-jose before 1.3.2 allows attackers to have unspecified impact by leveraging failure to use a constant time comparison for HMAC keys.
{'CVE-2016-7036'}
2021-07-05T00:01:25.423622Z
2017-01-23T21:59:00Z
null
null
null
{'https://github.com/mpdavis/python-jose/releases/tag/1.3.2', 'https://github.com/mpdavis/python-jose/pull/35/commits/89b46353b9f611e9da38de3d2fedf52331167b93', 'http://www.securityfocus.com/bid/95845'}
null
PyPI
PYSEC-2015-15
null
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.
{'CVE-2014-3598'}
2021-07-05T00:01:23.790243Z
2015-05-01T15:59:00Z
null
null
null
{'http://lists.opensuse.org/opensuse-updates/2015-04/msg00056.html', 'https://pypi.python.org/pypi/Pillow/2.5.3'}
null
PyPI
PYSEC-2020-305
null
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `tf.raw_ops.Switch` operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output. Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault The issue is patched in commit da8558533d925694483d2c136a9220d6d49d843c, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
{'CVE-2020-15190', 'GHSA-4g9f-63rx-5cw4'}
2021-12-09T06:35:12.169887Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4'}
null
PyPI
PYSEC-2019-206
null
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent.
{'CVE-2018-7576', 'GHSA-jfq2-rj7f-9gvf'}
2021-08-27T03:22:22.321158Z
2019-04-23T21:29:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-002.md', 'https://github.com/advisories/GHSA-jfq2-rj7f-9gvf'}
null
PyPI
PYSEC-2007-2
null
Cross-site scripting (XSS) vulnerability in the "download wiki page as text" feature in Trac before 0.10.3.1, when Microsoft Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
{'CVE-2007-1405'}
2021-07-16T01:31:34.136788Z
2007-03-10T22:19:00Z
null
null
null
{'http://secunia.com/advisories/24470', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/32897', 'http://www.vupen.com/english/advisories/2007/0900', 'http://www.securityfocus.com/bid/22888', 'http://trac.edgewall.org/wiki/ChangeLog'}
null
PyPI
PYSEC-2021-755
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/list_kernels.cc#L312) calls `std::vector.resize()` with the new size controlled by input given by the user, without checking that this input is valid. We have patched the issue in GitHub commit 8a6e874437670045e6c7dc6154c7412b4a2135e2. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-27j5-4p9v-pp67', 'CVE-2021-37644'}
2021-12-09T06:35:36.131748Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67', 'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2'}
null
PyPI
GHSA-32pc-xphx-q4f6
Gunicorn contains Improper Neutralization of CRLF sequences in HTTP headers
gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
{'CVE-2018-1000164'}
2022-04-26T18:17:01.509303Z
2018-07-12T20:30:49Z
HIGH
null
{'CWE-93'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000164', 'https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html', 'https://github.com/benoitc/gunicorn/issues/1227', 'https://github.com/benoitc/gunicorn', 'https://www.debian.org/security/2018/dsa-4186', 'https://github.com/advisories/GHSA-32pc-xphx-q4f6', 'https://usn.ubuntu.com/4022-1/', 'https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5'}
null
PyPI
GHSA-jmhj-vh4q-hhmq
tkvideo has a memory issue in playing videos
Huge memory consumption even when playing small files. This issue has been patched in 2.0.0. Please upgrade to version 2.0.0 or above.
{'CVE-2022-24902'}
2022-05-03T04:47:51.195149Z
2022-05-03T03:47:34Z
HIGH
null
null
{'https://github.com/PaulleDemon/tkVideoPlayer/security/advisories/GHSA-jmhj-vh4q-hhmq', 'https://github.com/PaulleDemon/tkVideoPlayer/issues', 'https://github.com/PaulleDemon/tkVideoPlayer/issues/3'}
null
PyPI
PYSEC-2021-305
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc). There is no check that the divisor tensor does not contain zero elements. We have patched the issue in GitHub commit 1e206baedf8bef0334cca3eb92bab134ef525a28. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37683', 'GHSA-rhrq-64mq-hf9h'}
2021-08-27T03:22:47.052583Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h', 'https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28'}
null
PyPI
GHSA-8m3r-rv5g-fcpq
Moderate severity vulnerability that affects django
Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.
{'CVE-2011-0697'}
2022-03-03T05:13:42.967296Z
2018-07-23T21:01:00Z
MODERATE
null
{'CWE-79'}
{'http://www.vupen.com/english/advisories/2011/0372', 'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'https://bugzilla.redhat.com/show_bug.cgi?id=676359', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'http://www.securityfocus.com/bid/46296', 'https://github.com/django/django', 'http://www.debian.org/security/2011/dsa-2163', 'http://www.vupen.com/english/advisories/2011/0441', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0697', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html', 'http://secunia.com/advisories/43230', 'http://secunia.com/advisories/43382', 'http://www.vupen.com/english/advisories/2011/0388', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://secunia.com/advisories/43426', 'http://secunia.com/advisories/43297', 'https://github.com/advisories/GHSA-8m3r-rv5g-fcpq', 'http://www.ubuntu.com/usn/USN-1066-1', 'http://www.vupen.com/english/advisories/2011/0429', 'http://www.vupen.com/english/advisories/2011/0439', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html'}
null
PyPI
GHSA-hpr6-f4vq-mxch
Command injection in LocalStack
The dashboard component of StackLift LocalStack allows attackers to inject arbitrary shell commands via the functionName parameter.
{'CVE-2021-32090'}
2022-03-03T05:13:09.684659Z
2021-06-18T18:38:00Z
MODERATE
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32090', 'https://blog.sonarsource.com/hack-the-stack-with-localstack', 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances'}
null
PyPI
PYSEC-2014-80
null
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
{'CVE-2014-5277'}
2021-08-27T03:22:03.349219Z
2014-11-17T16:59:00Z
null
null
null
{'https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html'}
null
PyPI
PYSEC-2022-137
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but does not check that the right hand side is also initialized. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-23573', 'GHSA-q85f-69q7-55h2'}
2022-03-09T00:18:27.416732Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143', 'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b'}
null
PyPI
PYSEC-2021-581
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause denial of service in applications serving models using `tf.raw_ops.UnravelIndex` by triggering a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unravel_index_op.cc#L36) does not check that the tensor subsumed by `dims` is not empty. Hence, if one element of `dims` is 0, the implementation does a division by 0. We have patched the issue in GitHub commit a776040a5e7ebf76eeb7eb923bf1ae417dd4d233. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37668', 'GHSA-2wmv-37vq-52g5'}
2021-12-09T06:35:04.799643Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5', 'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233'}
null
PyPI
PYSEC-2019-178
null
When the Elastic APM agent for Python versions before 5.1.0 is run as a CGI script, there is a variable name clash flaw if a remote attacker can control the proxy header. This could result in an attacker redirecting collected APM data to a proxy of their choosing.
{'CVE-2019-7617'}
2021-08-27T03:22:03.550445Z
2019-08-22T17:15:00Z
null
null
null
{'https://www.elastic.co/community/security/', 'https://discuss.elastic.co/t/elastic-apm-agent-for-python-5-1-0-security-update/196145'}
null
PyPI
PYSEC-2022-18
null
Cross-site Scripting (XSS) - Reflected in Pypi calibreweb prior to 0.6.16.
{'CVE-2022-0352', 'GHSA-h56g-v4vp-q9q6'}
2022-02-03T02:16:29.312073Z
2022-01-28T22:15:00Z
null
null
null
{'https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717', 'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1', 'https://github.com/advisories/GHSA-h56g-v4vp-q9q6'}
null
PyPI
PYSEC-2020-25
null
Autobahn|Python before 20.12.3 allows redirect header injection.
{'CVE-2020-35678', 'GHSA-gwp7-vqr5-h33h'}
2020-12-30T15:37:00Z
2020-12-27T00:15:00Z
null
null
null
{'https://github.com/crossbario/autobahn-python/compare/v20.12.2...v20.12.3', 'https://autobahn.readthedocs.io/en/latest/changelog.html', 'https://github.com/crossbario/autobahn-python/pull/1439', 'https://github.com/advisories/GHSA-gwp7-vqr5-h33h', 'https://github.com/crossbario/autobahn-python', 'https://pypi.org/project/autobahn/20.12.3/'}
null
PyPI
PYSEC-2019-197
null
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass
{'CVE-2013-2166', 'GHSA-c3xq-cj8f-7829'}
2021-08-27T03:22:18.277308Z
2019-12-10T15:15:00Z
null
null
null
{'http://www.openwall.com/lists/oss-security/2013/06/19/5', 'https://github.com/advisories/GHSA-c3xq-cj8f-7829', 'http://rhn.redhat.com/errata/RHSA-2013-0992.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html', 'http://www.securityfocus.com/bid/60684', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166', 'https://access.redhat.com/security/cve/cve-2013-2166', 'https://security-tracker.debian.org/tracker/CVE-2013-2166', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2166'}
null
PyPI
PYSEC-2012-11
null
Buffer overflow in the fribidi_utf8_to_unicode function in PyFriBidi before 0.11.0 allows remote attackers to cause a denial of service (application crash) via a 4-byte utf-8 sequence.
{'CVE-2012-1176'}
2021-07-25T23:34:50.398385Z
2012-08-26T20:55:00Z
null
null
null
{'http://www.openwall.com/lists/oss-security/2012/03/14/4', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075293.html', 'https://github.com/pediapress/pyfribidi/commit/d2860c655357975e7b32d84e6b45e98f0dcecd7a', 'http://groups.google.com/group/linux.debian.bugs.dist/browse_thread/thread/aacd036037217998/8d095f85f3665bff?lnk=raot', 'http://www.openwall.com/lists/oss-security/2012/03/14/9', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076053.html', 'http://www.securityfocus.com/bid/52451', 'https://github.com/pediapress/pyfribidi/issues/2%29:', 'https://bugzilla.wikimedia.org/show_bug.cgi?id=35055', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663189', 'https://bugzilla.redhat.com/show_bug.cgi?id=801896', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076038.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74001'}
null
PyPI
GHSA-p99v-5w3c-jqq9
Bypass of access control in Django
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
{'CVE-2021-33571'}
2022-03-03T05:13:00.919731Z
2021-06-10T17:21:12Z
HIGH
null
{'CWE-918'}
{'https://github.com/django/django', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33571', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo', 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/', 'https://security.netapp.com/advisory/ntap-20210727-0004/'}
null
PyPI
GHSA-9gqg-3fxr-9hv7
Cross site scripting in apache-airflow
In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system.
{'CVE-2017-17836'}
2022-03-21T19:01:48.634944Z
2019-01-25T16:19:09Z
CRITICAL
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-17836', 'https://github.com/advisories/GHSA-9gqg-3fxr-9hv7', 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}
null
PyPI
PYSEC-2020-217
null
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.
{'CVE-2014-9390'}
2021-07-25T23:34:39.934367Z
2020-02-12T02:15:00Z
null
null
null
{'http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html', 'https://news.ycombinator.com/item?id=8769667', 'http://article.gmane.org/gmane.linux.kernel/1853266', 'https://github.com/blog/1938-git-client-vulnerability-announced', 'http://securitytracker.com/id?1031404', 'http://support.apple.com/kb/HT204147', 'http://mercurial.selenic.com/wiki/WhatsNew', 'https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915', 'https://libgit2.org/security/'}
null
PyPI
PYSEC-2010-1
null
Mako before 0.3.4 relies on the cgi.escape function in the Python standard library for cross-site scripting (XSS) protection, which makes it easier for remote attackers to conduct XSS attacks via vectors involving single-quote characters and a JavaScript onLoad event handler for a BODY element.
{'CVE-2010-2480'}
2021-07-05T00:01:22.516270Z
2010-07-02T19:00:00Z
null
null
null
{'http://www.makotemplates.org/CHANGES', 'http://bugs.python.org/issue9061', 'http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html', 'http://secunia.com/advisories/39935'}
null
PyPI
GHSA-gp6m-vqhm-5cm5
XML Entity Expansion
XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service. The parse function does not properly restrict recursive entity references.
{'CVE-2021-25951'}
2022-03-03T05:14:11.808791Z
2021-07-02T18:37:31Z
HIGH
null
{'CWE-611', 'CWE-776'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25951', 'https://pypi.org/project/XML2Dict/', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951', 'https://github.com/mcspring/XML2Dict/tree/master'}
null
PyPI
PYSEC-2017-90
null
In Mercurial before 4.4.1, it is possible that a specially malformed repository can cause Git subrepositories to run arbitrary code in the form of a .git/hooks/post-update script checked into the repository. Typical use of Mercurial prevents construction of such repositories, but they can be created programmatically.
{'CVE-2017-17458'}
2021-08-27T03:22:07.106645Z
2017-12-07T18:29:00Z
null
null
null
{'http://www.securityfocus.com/bid/102926', 'https://bz.mercurial-scm.org/show_bug.cgi?id=5730', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00041.html', 'https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html', 'https://lists.debian.org/debian-lts-announce/2017/12/msg00027.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html', 'https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html', 'https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00032.html'}
null
PyPI
PYSEC-2021-217
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty. The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process. The implementation(https://github.com/tensorflow/tensorflow/blob/169054888d50ce488dfde9ca55d91d6325efbd5b/tensorflow/core/kernels/fractional_max_pool_op.cc#L215) fails to validate that input and output tensors are not empty and are of the same rank. Each of these unchecked assumptions is responsible for the above issues. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29580', 'GHSA-x8h6-xgqx-jqgp'}
2021-08-27T03:22:35.567916Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x8h6-xgqx-jqgp'}
null
PyPI
GHSA-3hfw-x7gx-437c
Path traversal in Matrix Synapse
### Impact Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory, potentially outside the media store directory. The last two directories and file name of the path are chosen randomly by Synapse and cannot be controlled by an attacker, which limits the impact. Homeservers with the media repository disabled are unaffected. Homeservers configured with a federation whitelist are also unaffected. ### Patches Server administrators should upgrade to 1.47.1 or later. ### Workarounds Server administrators using a reverse proxy could, at the expense of losing media functionality, block the following endpoints: * `/_matrix/media/r0/download/{serverName}/{mediaId}` * `/_matrix/media/r0/download/{serverName}/{mediaId}/{fileName}` * `/_matrix/media/r0/thumbnail/{serverName}/{mediaId}` Alternatively, non-containerized deployments can be adapted to use the hardened systemd config, located at `contrib/systemd/override-hardened.conf`. ### References n/a ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
{'CVE-2021-41281'}
2022-03-03T05:13:03.790930Z
2021-11-23T21:58:56Z
HIGH
null
{'CWE-22'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EU7QRE55U4IUEDLKT5IYPWL3UXMELFAS/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N3WY56LCEZ4ZECLWV5KMAXF2PSMUB4F2/', 'https://github.com/matrix-org/synapse/commit/91f2bd090', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c', 'https://github.com/matrix-org/synapse/releases/tag/v1.47.1', 'https://github.com/matrix-org/synapse', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41281'}
null
PyPI
PYSEC-2021-647
null
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/8f7b60ee8c0206a2c99802e3a4d1bb55d2bc0624/tensorflow/core/kernels/count_ops.cc#L199-L213) assumes the first element of the dense shape is always positive and uses it to initialize a `BatchedMap<T>` (i.e., `std::vector<absl::flat_hash_map<int64,T>>`(https://github.com/tensorflow/tensorflow/blob/8f7b60ee8c0206a2c99802e3a4d1bb55d2bc0624/tensorflow/core/kernels/count_ops.cc#L27)) data structure. If the `shape` tensor has more than one element, `num_batches` is the first value in `shape`. Ensuring that the `dense_shape` argument is a valid tensor shape (that is, all elements are non-negative) solves this issue. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3.
{'CVE-2021-29521', 'GHSA-hr84-fqvp-48mm'}
2021-12-09T06:35:18.423070Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hr84-fqvp-48mm', 'https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5'}
null
PyPI
PYSEC-2019-2
null
A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.
{'GHSA-grgm-pph5-j5h7', 'CVE-2019-10156'}
2021-01-28T16:39:00Z
2019-07-30T23:15:00Z
null
null
null
{'https://access.redhat.com/errata/RHSA-2019:3744', 'https://github.com/ansible/ansible/pull/57188', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156', 'https://access.redhat.com/errata/RHSA-2019:3789', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html', 'https://github.com/advisories/GHSA-grgm-pph5-j5h7', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html'}
null
PyPI
PYSEC-2021-352
null
furlongm openvpn-monitor through 1.1.3 allows CSRF to disconnect an arbitrary client.
{'CVE-2021-31604'}
2021-09-30T23:26:26.774511Z
2021-09-27T06:15:00Z
null
null
null
{'https://github.com/furlongm/openvpn-monitor/releases', 'http://packetstormsecurity.com/files/164281/OpenVPN-Monitor-1.1.3-Cross-Site-Request-Forgery.html'}
null
PyPI
PYSEC-2021-702
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPool3DGradGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/596c05a159b6fbb9e39ca10b3f7753b7244fa1e9/tensorflow/core/kernels/pooling_ops_3d.cc#L694-L696) does not check that the initialization of `Pool3dParameters` completes successfully. Since the constructor(https://github.com/tensorflow/tensorflow/blob/596c05a159b6fbb9e39ca10b3f7753b7244fa1e9/tensorflow/core/kernels/pooling_ops_3d.cc#L48-L88) uses `OP_REQUIRES` to validate conditions, the first assertion that fails interrupts the initialization of `params`, making it contain invalid data. In turn, this might cause a heap buffer overflow, depending on default initialized values. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-7cqx-92hp-x6wh', 'CVE-2021-29576'}
2021-12-09T06:35:27.875893Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7cqx-92hp-x6wh', 'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09'}
null
PyPI
PYSEC-2020-33
null
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
{'CVE-2020-24583', 'GHSA-m6gj-h9gm-gw44'}
2021-01-20T15:15:00Z
2020-09-01T13:15:00Z
null
null
null
{'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU', 'https://usn.ubuntu.com/4479-1/', 'https://www.openwall.com/lists/oss-security/2020/09/01/2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/', 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/', 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/', 'https://github.com/advisories/GHSA-m6gj-h9gm-gw44', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200918-0004/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/'}
null
PyPI
GHSA-m38j-pmg3-v5x5
Timing attack on django-basic-auth-ip-whitelist
### Impact Potential timing attack exists on websites where the basic authentication is used or configured, i.e. `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` is set. Currently the string comparison between configured credentials and the ones provided by users is performed through a character-by-character string comparison. This enables a possibility that attacker may time the time it takes the server to validate different usernames and password, and use this knowledge to work out the valid credentials. This attack is understood not to be realistic over the Internet. However, it may be achieved from within local networks where the website is hosted, e.g. from inside a data centre where a website's server is located. Sites protected by IP address whitelisting only are unaffected by this vulnerability. ### Patches This vulnerability has been fixed on version 0.3.4 of django-basic-auth-ip-whitelist. Update to version 0.3.4 as soon as possible and change basic authentication username and password configured on a Django project using this package. ### Workarounds Stop using basic authentication and use the IP whitelisting component only. It can be achieved by not setting `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` in Django project settings. ### References - [Django mailing list discussion](https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ) ### For more information If you have any questions or comments about this advisory: * Open an issue at https://github.com/tm-kn/django-basic-auth-ip-whitelist/issues * Email us at the email specified on the [security policy](https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/policy). ### Acknowledgements Thanks to Thibaud Colas for reporting this.
{'CVE-2020-4071'}
2022-03-03T05:13:38.865573Z
2020-06-23T19:58:27Z
LOW
null
{'CWE-208'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4071', 'https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/advisories/GHSA-m38j-pmg3-v5x5', 'https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ', 'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6'}
null
PyPI
PYSEC-2021-597
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementations of pooling in TFLite are vulnerable to division by 0 errors as there are no checks for divisors not being 0. We have patched the issue in GitHub commit [dfa22b348b70bb89d6d6ec0ff53973bacb4f4695](https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-q7f7-544h-67h9', 'CVE-2021-37684'}
2021-12-09T06:35:06.188810Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q7f7-544h-67h9'}
null
PyPI
PYSEC-2022-121
null
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would trigger a division by zero in `BiasAndClamp` implementation. There is no check that the `bias_size` is non zero. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-gf2j-f278-xh4v', 'CVE-2022-23557'}
2022-03-09T00:18:25.246505Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75', 'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v'}
null
PyPI
PYSEC-2020-7
null
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
{'CVE-2020-1735', 'GHSA-gfr2-qpxh-qj9m'}
2020-06-13T04:15:00Z
2020-03-16T16:15:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/advisories/GHSA-gfr2-qpxh-qj9m', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://github.com/ansible/ansible/issues/67793', 'https://security.gentoo.org/glsa/202006-11'}
null
PyPI
GHSA-cvcq-gmc3-q6m8
Plain text storage of passwords in Apache Airflow
In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.
{'CVE-2020-17511'}
2022-03-03T05:13:05.111214Z
2020-12-17T21:00:56Z
MODERATE
null
{'CWE-312'}
{'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17511', 'https://lists.apache.org/thread.html/ree782a29d927b96bf0b39fb92e2f1f09ea3112a985f7a08ce93765ac%40%3Cusers.airflow.apache.org%3E'}
null
PyPI
PYSEC-2014-96
null
Cross-site scripting (XSS) vulnerability in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the otk parameter.
{'CVE-2012-6132'}
2021-08-27T03:22:19.707650Z
2014-04-10T20:29:00Z
null
null
null
{'http://www.openwall.com/lists/oss-security/2013/02/13/8', 'https://bugzilla.redhat.com/show_bug.cgi?id=722672', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84191', 'http://www.openwall.com/lists/oss-security/2012/11/10/2'}
null
PyPI
PYSEC-2021-128
null
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.
{'CVE-2021-28125'}
2021-08-27T03:21:55.733407Z
2021-04-27T10:15:00Z
null
null
null
{'http://www.openwall.com/lists/oss-security/2021/04/27/2', 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434@%3Cdev.superset.apache.org%3E', 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E'}
null
PyPI
PYSEC-2021-578
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/mkl/mkl_requantization_range_per_channel_op.cc) does not validate the dimensions of the `input` tensor. A similar issue occurs in `MklRequantizePerChannelOp`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/mkl/mkl_requantize_per_channel_op.cc) does not perform full validation for all the input arguments. We have patched the issue in GitHub commit 9e62869465573cb2d9b5053f1fa02a81fce21d69 and in the Github commit 203214568f5bc237603dbab6e1fd389f1572f5c9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37665', 'GHSA-v82p-hv3v-p6qp'}
2021-12-09T06:35:04.523711Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp', 'https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69', 'https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9'}
null
PyPI
PYSEC-2014-79
null
Cross-site scripting (XSS) vulnerability in gravatars/templatetags/gravatars.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django allows remote attackers to inject arbitrary web script or HTML via a user display name.
{'CVE-2014-3995'}
2021-08-27T03:22:03.303468Z
2014-06-16T18:55:00Z
null
null
null
{'http://seclists.org/oss-sec/2014/q2/494', 'http://secunia.com/advisories/58691', 'https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf', 'https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd', 'http://seclists.org/oss-sec/2014/q2/498', 'https://github.com/djblets/djblets/commit/77ac64642ad530bf69e390c51fc6fdcb8914c8e7'}
null
PyPI
PYSEC-2020-128
null
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `data_splits` argument of `tf.raw_ops.StringNGrams` lacks validation. This allows a user to pass values that can cause heap overflow errors and even leak contents of memory In the linked code snippet, all the binary strings after `ee ff` are contents from the memory stack. Since these can contain return addresses, this data leak can be used to defeat ASLR. The issue is patched in commit 0462de5b544ed4731aa2fb23946ac22c01856b80, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
{'CVE-2020-15205', 'GHSA-g7p5-5759-qv46'}
2020-10-29T16:15:00Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g7p5-5759-qv46', 'https://github.com/tensorflow/tensorflow/commit/0462de5b544ed4731aa2fb23946ac22c01856b80', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}
null
PyPI
PYSEC-2019-181
null
Python keyring lib before 0.10 created keyring files with world-readable permissions.
{'GHSA-p86x-652p-6385', 'CVE-2012-5577'}
2021-08-27T03:22:05.629168Z
2019-10-28T17:15:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5577', 'https://bitbucket.org/kang/python-keyring-lib/commits/049cd181470f1ee6c540e1d64acf1def7b1de0c1', 'http://www.openwall.com/lists/oss-security/2012/11/27/3', 'https://github.com/advisories/GHSA-p86x-652p-6385', 'https://bitbucket.org/kang/python-keyring-lib/issue/67/set-go-rwx-on-keyring_passcfg', 'https://security-tracker.debian.org/tracker/CVE-2012-5577'}
null
PyPI
PYSEC-2021-651
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625-L655) does a division by a quantity that is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-xm2v-8rrw-w9pm', 'CVE-2021-29525'}
2021-12-09T06:35:19.088447Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xm2v-8rrw-w9pm', 'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'}
null
PyPI
GHSA-q5vh-6whw-x745
Improper Authorization and Origin Validation Error in OneFuzz
## Impact Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable, a OneFuzz deployment must be: * Version 2.12.0 or greater * Deployed with the non-default [`--multi_tenant_domain`](https://github.com/microsoft/onefuzz/blob/2.30.0/src/deployment/deploy.py#L1021) option This can result in read/write access to private data such as: * Software vulnerability and crash information * Security testing tools * Proprietary code and symbols Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources. ## Patches This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. ## Workarounds Users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option. ## References You can find an overview of the Microsoft Identity Platform [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-overview). This vulnerability applies to the multi-tenant application pattern, as described [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant). ## For more information If you have any questions or comments about this advisory: * Open an issue in [OneFuzz](https://github.com/microsoft/onefuzz) * Email us at [fuzzing@microsoft.com](mailto:fuzzing@microsoft.com)
{'CVE-2021-37705'}
2022-03-03T05:12:25.126928Z
2021-08-13T20:16:32Z
CRITICAL
null
{'CWE-346', 'CWE-285'}
{'https://github.com/microsoft/onefuzz/pull/1153', 'https://github.com/microsoft/onefuzz/releases/tag/2.31.0', 'https://github.com/microsoft/onefuzz/security/advisories/GHSA-q5vh-6whw-x745', 'https://github.com/microsoft/onefuzz/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37705', 'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1', 'https://pypi.org/project/onefuzz/'}
null
PyPI
PYSEC-2021-201
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.EditDistance`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/79865b542f9ffdc9caeb255631f7c56f1d4b6517/tensorflow/core/kernels/edit_distance_op.cc#L103-L159) has incomplete validation of the input parameters. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29564', 'GHSA-75f6-78jr-4656'}
2021-08-27T03:22:32.823380Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-75f6-78jr-4656'}
null
PyPI
PYSEC-2017-86
null
There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field.
{'CVE-2017-6591', 'GHSA-xp5m-4c9f-498q'}
2021-08-27T03:21:57.430234Z
2017-03-09T20:59:00Z
null
null
null
{'http://www.securityfocus.com/bid/96946', 'https://github.com/advisories/GHSA-xp5m-4c9f-498q', 'http://morningchen.com/2017/03/09/Cross-site-scripting-vulnerability-in-django-epiceditor/'}
null
PyPI
GHSA-wcv5-vrvr-3rx2
Integer Overflow or Wraparound in TensorFlow
### Impact The Grappler component of TensorFlow is vulnerable to a denial of service via `CHECK`-failure (assertion failure) in [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L963-L1035): ```cc for (const auto& output_prop : output_props) { const PartialTensorShape output_shape(output_prop.shape()); // ... } ``` The `output_prop` tensor has a shape that is controlled by user input and this can result in triggering one of the `CHECK`s in the `PartialTensorShape` constructor. This is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197). ### Patches We have patched the issue in GitHub commit [be7b286d40bc68cb0b56f702186cc4837d508058](https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
null
2022-03-03T05:13:17.731658Z
2022-02-09T23:34:06Z
MODERATE
null
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p'}
null
PyPI
GHSA-48vv-2pmq-9fvv
Moderate severity vulnerability that affects Plone and Zope2
Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).
{'CVE-2012-6661'}
2022-03-03T05:13:44.527554Z
2018-07-23T19:51:14Z
MODERATE
null
{'CWE-336'}
{'https://github.com/plone/Products.CMFPlone', 'https://bugs.launchpad.net/zope2/+bug/1071067', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6661', 'https://plone.org/products/plone/security/advisories/20121106/24', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://github.com/advisories/GHSA-48vv-2pmq-9fvv', 'https://plone.org/products/plone-hotfix/releases/20121124'}
null
PyPI
PYSEC-2020-201
null
Ansible before 1.5.5 sets 0644 permissions for sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by reading a file that uses the "deb http://user:pass@server:port/" format.
{'CVE-2014-4659'}
2021-07-02T02:41:33.195519Z
2020-02-20T15:15:00Z
null
null
null
{'https://www.securityfocus.com/bid/68234', 'https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md'}
null
PyPI
GHSA-h39q-95q5-9jfp
OS Command Injection in ansible
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
{'CVE-2020-1734'}
2022-03-03T05:13:53.030695Z
2022-02-09T00:11:19Z
MODERATE
null
{'CWE-78'}
{'https://github.com/ansible/ansible/issues/67792', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1734', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1734'}
null
PyPI
OSV-2021-449
UNKNOWN READ in std::pair<absl::lts_NUMBER_02_25::container_internal::raw_hash_set<absl::lts_NUM
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31393 ``` Crash type: UNKNOWN READ Crash state: std::pair<absl::lts_NUMBER_02_25::container_internal::raw_hash_set<absl::lts_NUM tensorflow::SparseCount<long, long>::Compute tensorflow::KernelAndDeviceOp::Run ```
null
2022-04-13T03:04:32.371909Z
2021-02-27T00:00:29.109256Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31393', 'https://github.com/tensorflow/tensorflow/commit/7677422a56f18c10e3827e29dc8da8a7b23fbede'}
{'https://github.com/tensorflow/tensorflow/commit/0834086910de00f55876040943975e388b645e7a'}
PyPI
GHSA-p6rw-44q7-3fw4
Stored XSS in Jupyter nbdime
### Impact Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected. ### Patches Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package. #### Python - nbdime 1.x: Patched in v. 1.1.1 - nbdime 2.x: Patched in v. 2.1.1 - nbdime 3.x: Patched in v. 3.1.1 #### npm - nbdime 6.x version: Patched in 6.1.2 - nbdime 5.x version: Patched in 5.0.2 - nbdime-jupyterlab 1.x version: Patched in 1.0.1 - nbdime-jupyterlab 2.x version: Patched in 2.1.1 ### For more information If you have any questions or comments about this advisory email us at [security@ipython.org](mailto:security@ipython.org).
{'CVE-2021-41134'}
2022-03-03T05:14:20.151154Z
2021-11-08T18:09:27Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41134', 'https://github.com/jupyter/nbdime', 'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4', 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}
null
PyPI
PYSEC-2017-69
null
Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument.
{'CVE-2015-2674'}
2021-07-25T23:34:53.240479Z
2017-08-09T18:29:00Z
null
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1202837', 'http://www.openwall.com/lists/oss-security/2015/03/23/7', 'https://github.com/benoitc/restkit/issues/140'}
null
PyPI
PYSEC-2015-2
null
ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.
{'CVE-2015-3010'}
2021-07-05T00:01:17.275200Z
2015-06-16T16:59:00Z
null
null
null
{'http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155631.html', 'http://www.openwall.com/lists/oss-security/2015/04/09/9', 'http://www.securityfocus.com/bid/74043', 'https://bugzilla.suse.com/show_bug.cgi?id=920926', 'https://github.com/ceph/ceph-deploy/pull/272', 'http://www.openwall.com/lists/oss-security/2015/04/09/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155576.html', 'http://rhn.redhat.com/errata/RHSA-2015-1092.html', 'https://github.com/ceph/ceph-deploy/commit/eee56770393bf19ed2dd5389226c6190c08dee3f'}
null
PyPI
PYSEC-2011-17
null
Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.
{'CVE-2011-4356'}
2021-08-27T03:21:56.662825Z
2011-12-05T11:55:00Z
null
null
null
{'https://github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txt', 'http://www.securityfocus.com/bid/50825', 'https://github.com/ask/celery/pull/544', 'http://secunia.com/advisories/46973'}
null
PyPI
PYSEC-2021-714
null
TensorFlow is an end-to-end open source platform for machine learning. The optimized implementation of the `TransposeConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L5221-L5222). An attacker can craft a model such that `stride_{h,w}` values are 0. Code calling this function must validate these arguments. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-vfr4-x8j2-3rf9', 'CVE-2021-29588'}
2021-12-09T06:35:30.034082Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vfr4-x8j2-3rf9', 'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d'}
null
PyPI
PYSEC-2021-344
null
OneFuzz is an open source self-hosted Fuzzing-As-A-Service platform. Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable, a OneFuzz deployment must be both version 2.12.0 or greater and deployed with the non-default --multi_tenant_domain option. This can result in read/write access to private data such as software vulnerability and crash information, security testing tools and proprietary code and symbols. Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option.
{'GHSA-q5vh-6whw-x745', 'CVE-2021-37705'}
2021-09-26T23:32:40.198740Z
2021-08-13T21:15:00Z
null
null
null
{'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1', 'https://github.com/microsoft/onefuzz/pull/1153', 'https://github.com/microsoft/onefuzz/security/advisories/GHSA-q5vh-6whw-x745', 'https://github.com/microsoft/onefuzz/releases/tag/2.31.0', 'https://pypi.org/project/onefuzz/'}
null
PyPI
PYSEC-2021-190
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can read data outside of bounds of heap allocated buffer in `tf.raw_ops.QuantizeAndDequantizeV3`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/11ff7f80667e6490d7b5174aa6bf5e01886e770f/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L237) does not validate the value of user supplied `axis` attribute before using it to index in the array backing the `input` argument. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29553', 'GHSA-h9px-9vqg-222h'}
2021-08-27T03:22:30.834118Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h9px-9vqg-222h', 'https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387'}
null
PyPI
GHSA-h6jh-7gv5-28vg
Bad alloc in `StringNGrams` caused by integer conversion
### Impact The implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. ```python import tensorflow as tf tf.raw_ops.StringNGrams( data=['',''], data_splits=[0,2], separator=' '*100, ngram_widths=[-80,0,0,-60], left_pad=' ', right_pad=' ', pad_width=100, preserve_short_sequences=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/string_ngrams_op.cc#L184) calls `reserve` on a `tstring` with a value that sometimes can be negative if user supplies negative `ngram_widths`. The `reserve` method calls `TF_TString_Reserve` which has an `unsigned long` argument for the size of the buffer. Hence, the implicit conversion transforms the negative value to a large integer. ### Patches We have patched the issue in GitHub commit [c283e542a3f422420cfdb332414543b62fc4e4a5](https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37646'}
2022-03-03T05:12:51.681527Z
2021-08-25T14:43:34Z
MODERATE
null
{'CWE-681'}
{'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37646'}
null
PyPI
PYSEC-2019-139
null
An issue was discovered in webargs before 5.1.3, as used with marshmallow and other products. JSON parsing uses a short-lived cache to store the parsed JSON body. This cache is not thread-safe, meaning that incorrect JSON payloads could have been parsed for concurrent requests.
{'GHSA-8554-jxcw-454q', 'CVE-2019-9710'}
2019-03-12T13:09:00Z
2019-03-12T02:29:00Z
null
null
null
{'https://github.com/advisories/GHSA-8554-jxcw-454q', 'https://webargs.readthedocs.io/en/latest/changelog.html', 'https://github.com/marshmallow-code/webargs/issues/371'}
null
PyPI
PYSEC-2022-59
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash a TensorFlow process via a division by 0. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-21735', 'GHSA-87v6-crgm-2gfj'}
2022-03-09T00:17:31.174803Z
2022-02-03T13:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192', 'https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-87v6-crgm-2gfj'}
null
PyPI
PYSEC-2016-13
null
file_open in Tryton before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allows remote authenticated users with certain permissions to read arbitrary files via the name parameter or unspecified other vectors.
{'CVE-2016-1242'}
2021-10-12T02:55:35.639640Z
2016-09-07T19:28:00Z
null
null
null
{'http://www.tryton.org/posts/security-release-for-issue5795-and-issue5808.html', 'http://www.debian.org/security/2016/dsa-3656', 'https://bugs.tryton.org/issue5808'}
null
PyPI
PYSEC-2021-485
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`. The division by 0 occurs deep in Eigen code because the `b` tensor is empty. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-xw93-v57j-fcgh', 'CVE-2021-29557'}
2021-12-09T06:34:52.215362Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh'}
null
PyPI
GHSA-x7jh-595q-wq82
Incorrect Permission Assignment for Critical Resource in Ansible
A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
{'CVE-2020-1736'}
2022-03-03T05:12:23.426479Z
2022-02-09T21:59:46Z
LOW
null
{'CWE-732'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736', 'https://github.com/ansible/ansible/issues/67794', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/', 'https://github.com/ansible/ansible', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1736', 'https://security.gentoo.org/glsa/202006-11'}
null
PyPI
PYSEC-2020-256
null
In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
{'CVE-2020-26270', 'GHSA-m648-33qf-v3gp'}
2021-08-27T03:22:23.120464Z
2020-12-10T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m648-33qf-v3gp'}
null
PyPI
GHSA-prcg-wp5q-rv7p
Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes
### Impact TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. For example [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408) calls should be replaced by [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440). This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs). ### Patches We have patched the issue in GitHub commits [7c1692bd417eb4f9b33ead749a41166d6080af85](https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85) (merging [#51732](https://github.com/tensorflow/tensorflow/pull/51732)), [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51717](https://github.com/tensorflow/tensorflow/pull/51717)), [a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf](https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf) (merging [#51658](https://github.com/tensorflow/tensorflow/pull/51658)), and [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51973](https://github.com/tensorflow/tensorflow/pull/51973)). It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46890), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51618) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51908).
{'CVE-2021-41197'}
2022-03-03T05:13:16.338365Z
2021-11-10T19:35:35Z
MODERATE
null
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41197', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/issues/51908', 'https://github.com/tensorflow/tensorflow/issues/46890', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p', 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15'}
null
PyPI
PYSEC-2017-101
null
Google gRPC before 2017-03-29 has an out-of-bounds write caused by a heap-based use-after-free related to the grpc_call_destroy function in core/lib/surface/call.c.
{'CVE-2017-8359'}
2021-12-14T08:16:23.996016Z
2017-04-30T17:59:00Z
null
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2017-8359', 'https://pypi.org/project/grpcio', 'https://github.com/grpc/grpc/commit/6544a2d5d9ecdb64214da1d228886a7d15bbf5c7', 'http://www.securityfocus.com/bid/98280', 'https://github.com/grpc/grpc/pull/10353', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=726'}
null
PyPI
GHSA-pjc4-3w99-j7v4
Open redirect in Flask-Unchained
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
{'CVE-2021-23393'}
2022-03-03T05:14:13.059215Z
2021-06-15T15:56:59Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23393', 'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40', 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad', 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189'}
null
PyPI
PYSEC-2021-256
null
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29619', 'GHSA-wvjw-p9f5-vq28'}
2021-08-27T03:22:42.523296Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wvjw-p9f5-vq28'}
null
PyPI
PYSEC-2021-49
null
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ensure that a signed SAML document is correctly signed. The default CryptoBackendXmlSec1 backend is using the xmlsec1 binary to verify the signature of signed SAML documents, but by default xmlsec1 accepts any type of key found within the given document. xmlsec1 needs to be configured explicitly to only use only _x509 certificates_ for the verification process of the SAML document signature. This is fixed in PySAML2 6.5.0.
{'GHSA-5p3x-r448-pc62', 'CVE-2021-21239'}
2021-03-10T21:00:00Z
2021-01-21T15:15:00Z
null
null
null
{'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0', 'https://www.aleksey.com/pipermail/xmlsec/2013/009717.html', 'https://pypi.org/project/pysaml2', 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62', 'https://github.com/IdentityPython/pysaml2/commit/46578df0695269a16f1c94171f1429873f90ed99', 'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html'}
null
PyPI
PYSEC-2021-606
null
TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-m539-j985-hcr8', 'CVE-2021-41196'}
2021-12-09T06:35:06.985505Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8'}
null
PyPI
PYSEC-2021-313
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projection.cc#L118). We have patched the issue in GitHub commit 0575b640091680cfb70f4dd93e70658de43b94f9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick thiscommit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37691', 'GHSA-27qf-jwm8-g7f3'}
2021-08-27T03:22:47.774010Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3'}
null
PyPI
PYSEC-2019-20
null
verification.py in django-rest-registration (aka Django REST Registration library) before 0.5.0 relies on a static string for signatures (i.e., the Django Signing API is misused), which allows remote attackers to spoof the verification process. This occurs because incorrect code refactoring led to calling a security-critical function with an incorrect argument.
{'GHSA-p3w6-jcg4-52xh', 'CVE-2019-13177'}
2019-07-12T13:52:00Z
2019-07-02T22:15:00Z
null
null
null
{'https://github.com/apragacz/django-rest-registration/security/advisories/GHSA-p3w6-jcg4-52xh', 'https://github.com/apragacz/django-rest-registration/releases/tag/0.5.0'}
null
PyPI
PYSEC-2021-743
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via `CHECK`-fail in `tf.strings.substr` with invalid arguments. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29617', 'GHSA-mmq6-q8r3-48fm'}
2021-12-09T06:35:34.887813Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mmq6-q8r3-48fm', 'https://github.com/tensorflow/issues/46900', 'https://github.com/tensorflow/issues/46974', 'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f'}
null
PyPI
PYSEC-2018-6
null
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
{'GHSA-2f9x-5v75-3qv4', 'CVE-2018-7537'}
2021-06-10T06:52:11.564894Z
2018-03-09T20:29:00Z
null
null
null
{'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/', 'http://www.securityfocus.com/bid/103357', 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.debian.org/security/2018/dsa-4161', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html', 'https://access.redhat.com/errata/RHSA-2019:0265', 'https://usn.ubuntu.com/3591-1/'}
null
PyPI
GHSA-4r65-35qq-ch8j
Ansible discloses sensitive information in traceback error message
Ansible is an IT automation system that handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. A flaw was found in Ansible Engine's ansible-connection module where sensitive information, such as the Ansible user credentials, is disclosed by default in the traceback error message when Ansible receives an unexpected response from `set_options`. The highest threat from this vulnerability is confidentiality.
{'CVE-2021-3620'}
2022-04-05T20:05:40.783294Z
2022-03-04T00:00:17Z
MODERATE
null
{'CWE-209'}
{'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2022-164.yaml', 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes', 'https://github.com/ansible/ansible', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3620', 'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0', 'https://bugzilla.redhat.com/show_bug.cgi?id=1975767'}
null
PyPI
PYSEC-2019-210
null
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of service via an invalid GIF file.
{'CVE-2019-9635', 'GHSA-mfg7-x5m7-6p8w'}
2021-08-27T03:22:22.500832Z
2019-04-24T17:29:00Z
null
null
null
{'https://github.com/advisories/GHSA-mfg7-x5m7-6p8w', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-001.md'}
null
PyPI
PYSEC-2020-313
null
In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel. Thus, a shape mismatch can result in accesses outside the bounds of heap allocated buffers. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1.
{'CVE-2020-15198', 'GHSA-jc87-6vpp-7ff3'}
2021-12-09T06:35:13.097348Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
null
PyPI
GHSA-hxf9-7h4c-f5jv
Django-Anymail prone to a timing attack
webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events.
{'CVE-2018-6596'}
2022-04-26T18:17:09.377946Z
2018-07-12T20:30:40Z
CRITICAL
null
{'CWE-200'}
{'https://github.com/advisories/GHSA-hxf9-7h4c-f5jv', 'https://github.com/anymail/django-anymail/releases/tag/v1.2.1', 'https://www.debian.org/security/2018/dsa-4107', 'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6596', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5', 'https://bugs.debian.org/889450', 'https://github.com/anymail/django-anymail', 'https://github.com/anymail/django-anymail/releases/tag/v1.3'}
null
PyPI
PYSEC-2011-5
null
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
{'GHSA-h95j-h2rv-qrg4', 'CVE-2011-4140'}
2021-07-05T00:01:18.129041Z
2011-10-19T10:55:00Z
null
null
null
{'https://www.djangoproject.com/weblog/2011/sep/09/', 'http://openwall.com/lists/oss-security/2011/09/13/2', 'http://www.debian.org/security/2011/dsa-2332', 'https://hermes.opensuse.org/messages/14700881', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'https://github.com/advisories/GHSA-h95j-h2rv-qrg4', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'http://secunia.com/advisories/46614', 'https://www.djangoproject.com/weblog/2011/sep/10/127/'}
null
PyPI
PYSEC-2020-257
null
In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_index). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding DataType values and comparing these for equality. However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays. In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
{'CVE-2020-26271', 'GHSA-q263-fvxm-m5mw'}
2021-08-27T03:22:23.329750Z
2020-12-10T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw'}
null
PyPI
PYSEC-2017-100
null
Cross-site scripting (XSS) vulnerability in Cherry Music before 0.36.0 allows remote authenticated users to inject arbitrary web script or HTML via the playlistname field when creating a new playlist.
{'CVE-2015-8310'}
2021-11-16T21:20:28.264266Z
2017-03-27T15:59:00Z
null
null
null
{'https://github.com/devsnd/cherrymusic/issues/598', 'http://www.fomori.org/cherrymusic/Changes.html', 'https://github.com/devsnd/cherrymusic/commit/62dec34a1ea0741400dd6b6c660d303dcd651e86', 'http://www.securityfocus.com/bid/97148'}
null
PyPI
PYSEC-2021-257
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor. We have patched the issue in GitHub commit 87158f43f05f2720a374f3e6d22a7aaa3a33f750. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-cgfm-62j4-v4rf', 'CVE-2021-37635'}
2021-08-27T03:22:42.637508Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf', 'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750'}
null
PyPI
PYSEC-2021-48
null
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping because it did not validate the SAML document against an XML schema. This allowed invalid XML documents to be processed and such a document can trick pysaml2 with a wrapped signature. This is fixed in PySAML2 6.5.0.
{'CVE-2021-21238', 'GHSA-f4g9-h89h-jgv9'}
2021-01-29T17:58:00Z
2021-01-21T15:15:00Z
null
null
null
{'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0', 'https://pypi.org/project/pysaml2', 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-f4g9-h89h-jgv9', 'https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f048157cc14'}
null
PyPI
PYSEC-2021-607
null
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. This is similar to CVE-2021-29584. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-prcg-wp5q-rv7p', 'CVE-2021-41197'}
2021-12-09T06:35:07.147316Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf', 'https://github.com/tensorflow/tensorflow/issues/51908', 'https://github.com/tensorflow/tensorflow/issues/46890', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p', 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15'}
null
PyPI
PYSEC-2021-312
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions when running shape functions, some functions (such as `MutableHashTableShape`) produce extra output information in the form of a `ShapeAndType` struct. The shapes embedded in this struct are owned by an inference context that is cleaned up almost immediately; if the upstream code attempts to access this shape information, it can trigger a segfault. `ShapeRefiner` is mitigating this for normal output shapes by cloning them (and thus putting the newly created shape under ownership of an inference context that will not die), but we were not doing the same for shapes and types. This commit fixes that by doing similar logic on output shapes and types. We have patched the issue in GitHub commit ee119d4a498979525046fba1c3dd3f13a039fbb1. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37690', 'GHSA-3hxh-8cp2-g4hg'}
2021-08-27T03:22:47.685921Z
2021-08-13T00:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg', 'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1'}
null
PyPI
PYSEC-2019-21
null
An issue was discovered in Donfig 0.3.0. There is a vulnerability in the collect_yaml method in config_obj.py. It can execute arbitrary Python commands, resulting in command execution.
{'CVE-2019-7537'}
2019-03-26T14:13:00Z
2019-03-21T20:29:00Z
null
null
null
{'https://github.com/pytroll/donfig/commits/master', 'https://github.com/pytroll/donfig/issues/5'}
null
PyPI
PYSEC-2021-742
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that result in optimizing a node with no inputs. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-4hvv-7x94-7vq8', 'CVE-2021-29616'}
2021-12-09T06:35:34.728611Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8', 'https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3'}
null
PyPI
PYSEC-2018-7
null
webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events.
{'GHSA-hxf9-7h4c-f5jv', 'CVE-2018-6596'}
2021-06-16T00:03:22.915097Z
2018-02-03T21:29:00Z
null
null
null
{'https://github.com/advisories/GHSA-hxf9-7h4c-f5jv', 'https://github.com/anymail/django-anymail/releases/tag/v1.2.1', 'https://www.debian.org/security/2018/dsa-4107', 'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5', 'https://bugs.debian.org/889450', 'https://github.com/anymail/django-anymail/releases/tag/v1.3'}
null
PyPI
GHSA-wxr6-29pv-ch68
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4164'}
2022-03-03T05:13:15.355954Z
2022-01-21T23:44:17Z
HIGH
null
{'CWE-352'}
{'https://huntr.dev/bounties/2debace1-a0f3-45c1-95fa-9d0512680758', 'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30', 'https://github.com/janeczku/calibre-web', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4164'}
null