3 results (0.004 seconds)

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy. Las versiones del paquete onnx anteriores a la 1.15.0 inclusive son vulnerables a la lectura fuera de los límites, ya que las funciones ONNX_ASSERT y ONNX_ASSERTM tienen una copia desactivada por una cadena. • https://github.com/onnx/onnx/commit/08a399ba75a805b7813ab8936b91d0e274b08287 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882. Las versiones del paquete onnx anteriores a la 1.15.0 inclusive son vulnerables a Directory Traversal ya que el campo external_data del tensor proto puede tener una ruta al archivo que está fuera del directorio actual del modelo o del directorio proporcionado por el usuario. La vulnerabilidad se produce como una omisión del parche agregado para CVE-2022-25882. • https://github.com/onnx/onnx/commit/66b7fb630903fdcf3e83b6b6d56d82e904264a20 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd" Las versiones del paquete onnx anteriores a la 1.13.0 son vulnerables a Directory Traversal ya que el campo external_data del tensor proto puede tener una ruta al archivo que está fuera del directorio actual del modelo o del directorio proporcionado por el usuario, por ejemplo "../.. /../etc/contraseña" • https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856 https://github.com/onnx/onnx/blob/96516aecd4c110b0ac57eba08ac236ebf7205728/onnx/checker.cc%23L129 https://github.com/onnx/onnx/commit/f369b0e859024095d721f1d1612da5a8fa38988d https://github.com/onnx/onnx/issues/3991 https://github.com/onnx/onnx/pull/4400 https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •