[ { "instruction": "what vulnarability does 10cent10 version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45461 Advisory: 10Cent10 is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 10cent10 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45461 Advisory: 10Cent10 is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html" }, { "instruction": "what vulnarability does 10cent11 version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45462 Advisory: 10Cent11 is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 10cent11 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45462 Advisory: 10Cent11 is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html" }, { "instruction": "what vulnarability does 11cent version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47995 Advisory: 11Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 11cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47995 Advisory: 11Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e" }, { "instruction": "what vulnarability does 12cent version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47999 Advisory: 12Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 12cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47999 Advisory: 12Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e" }, { "instruction": "what vulnarability does 13cent version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-48000 Advisory: 13Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 13cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-48000 Advisory: 13Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e" }, { "instruction": "what vulnarability does 14cent version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-48001 Advisory: 14Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 14cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-48001 Advisory: 14Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e" }, { "instruction": "what vulnarability does 15cent version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47996 Advisory: 15Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 15cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47996 Advisory: 15Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e" }, { "instruction": "what vulnarability does 16cent version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47997 Advisory: 16Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 16cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47997 Advisory: 16Cent is a malicious package. It exfiltrates data from the host where it is installed.\r\nhttps://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e" }, { "instruction": "what vulnarability does aa-timezones version less then 1.12.0 have", "input": "", "output": "Having vulnarability PVE-2022-51033 Advisory: Aa-timezones 1.12.0 updates its NPM dependency 'moment-timezone' to include security fixes.\r\nhttps://github.com/ppfeufer/aa-timezones/pull/58/commits/8f382a1a3a3f9ddd77f10fb3b1d3380e6267eab1\r\nhttps://github.com/moment/moment-timezone/security/advisories/GHSA-56x4-j7p9-fcf9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aa-timezones version less then 1.12.0 have ### Response: Having vulnarability PVE-2022-51033 Advisory: Aa-timezones 1.12.0 updates its NPM dependency 'moment-timezone' to include security fixes.\r\nhttps://github.com/ppfeufer/aa-timezones/pull/58/commits/8f382a1a3a3f9ddd77f10fb3b1d3380e6267eab1\r\nhttps://github.com/moment/moment-timezone/security/advisories/GHSA-56x4-j7p9-fcf9" }, { "instruction": "what vulnarability does aadhaar-py version less then 2.0.1 have", "input": "", "output": "Having vulnarability PVE-2021-44525 Advisory: Aadhaar-py 2.0.1 updates its dependency 'pillow' to v9.0.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aadhaar-py version less then 2.0.1 have ### Response: Having vulnarability PVE-2021-44525 Advisory: Aadhaar-py 2.0.1 updates its dependency 'pillow' to v9.0.0 to include security fixes." }, { "instruction": "what vulnarability does aamiles version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-33001 Advisory: The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aamiles version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-33001 Advisory: The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does abe version less then 0.7.2,equal to 0.8pre have", "input": "", "output": "Having vulnarability CVE-2020-11944 Advisory: Abe (aka bitcoin-abe) through 0.7.2, and 0.8pre, allows XSS in __call__ in abe.py because the PATH_INFO environment variable is mishandled during a PageNotFound exception.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does abe version less then 0.7.2,equal to 0.8pre have ### Response: Having vulnarability CVE-2020-11944 Advisory: Abe (aka bitcoin-abe) through 0.7.2, and 0.8pre, allows XSS in __call__ in abe.py because the PATH_INFO environment variable is mishandled during a PageNotFound exception." }, { "instruction": "what vulnarability does abiflows version less then 0.6 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Abiflows 0.6 includes a security patch for the function 'test_abipy_manager_from_file' in 'abiflows/fireworks/utils/tests/test_fw_utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/abinit/abiflows/commit/479b957c3b1abe41d85aaff2d14439605ddc5d0b#diff-5a814c49249ffdc2d551933c1bec95c4b2fe64d0619470085c5fef247fea2309", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does abiflows version less then 0.6 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Abiflows 0.6 includes a security patch for the function 'test_abipy_manager_from_file' in 'abiflows/fireworks/utils/tests/test_fw_utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/abinit/abiflows/commit/479b957c3b1abe41d85aaff2d14439605ddc5d0b#diff-5a814c49249ffdc2d551933c1bec95c4b2fe64d0619470085c5fef247fea2309" }, { "instruction": "what vulnarability does abilian-devtools version less then 0.4.4 have", "input": "", "output": "Having vulnarability PVE-2023-62205 Advisory: Abilian-devtools 0.4.4 includes a fix for a command injection vulnerability.\r\nhttps://github.com/abilian/abilian-devtools/commit/9d71b0d3b6b467589d58aacc932ca3dc7e524ce2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does abilian-devtools version less then 0.4.4 have ### Response: Having vulnarability PVE-2023-62205 Advisory: Abilian-devtools 0.4.4 includes a fix for a command injection vulnerability.\r\nhttps://github.com/abilian/abilian-devtools/commit/9d71b0d3b6b467589d58aacc932ca3dc7e524ce2" }, { "instruction": "what vulnarability does abracadabra version less then 0.0.4 have", "input": "", "output": "Having vulnarability CVE-2020-26215 Advisory: Abracadabra 0.0.4 updates its dependency 'notebook' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does abracadabra version less then 0.0.4 have ### Response: Having vulnarability CVE-2020-26215 Advisory: Abracadabra 0.0.4 updates its dependency 'notebook' to include a security fix." }, { "instruction": "what vulnarability does accesscontrol version less then 4.4,greather then equal to 5.0,less then 5.8,greather then equal to 6.0,less then 6.2 have", "input": "", "output": "Having vulnarability CVE-2023-41050 Advisory: AccessControl 4.4, 5.8 and 6.2 include a fix for CVE-2023-41050: Python's \"format\" functionality allows someone controlling the format string to \"read\" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown 'getattr' and 'getitem', not the policy restricted 'AccessControl' variants '_getattr_' and '_getitem_'. This can lead to critical information disclosure. 'AccessControl' already provides a safe variant for 'str.format' and denies access to 'string.Formatter'. However, 'str.format_map' is still unsafe. Affected are all users who allow untrusted users to create 'AccessControl' controlled Python code and execute it.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does accesscontrol version less then 4.4,greather then equal to 5.0,less then 5.8,greather then equal to 6.0,less then 6.2 have ### Response: Having vulnarability CVE-2023-41050 Advisory: AccessControl 4.4, 5.8 and 6.2 include a fix for CVE-2023-41050: Python's \"format\" functionality allows someone controlling the format string to \"read\" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown 'getattr' and 'getitem', not the policy restricted 'AccessControl' variants '_getattr_' and '_getitem_'. This can lead to critical information disclosure. 'AccessControl' already provides a safe variant for 'str.format' and denies access to 'string.Formatter'. However, 'str.format_map' is still unsafe. Affected are all users who allow untrusted users to create 'AccessControl' controlled Python code and execute it." }, { "instruction": "what vulnarability does acqusition version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2021-34978 Advisory: acqusition is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does acqusition version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34978 Advisory: acqusition is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/" }, { "instruction": "what vulnarability does acryl-datahub version less then 0.8.45 have", "input": "", "output": "Having vulnarability CVE-2023-25562 Advisory: In DataHub versions prior to 0.8.45, session cookies are only cleared upon new sign-ins, not during logouts. This allows potential attackers to bypass authentication checks using the AuthUtils.hasValidSessionCookie() method by using a cookie from a logged-out session. Consequently, any logged-out session cookie might be considered valid, leading to an authentication bypass. Users are advised to upgrade to version 0.8.45 to rectify this vulnerability. Currently, there are no known workarounds. This vulnerability was identified and reported by the GitHub Security lab and is being tracked under GHSL-2022-083.\r\nhttps://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj\r\nhttps://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/datahub-frontend/app/auth/AuthUtils.java#L78", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does acryl-datahub version less then 0.8.45 have ### Response: Having vulnarability CVE-2023-25562 Advisory: In DataHub versions prior to 0.8.45, session cookies are only cleared upon new sign-ins, not during logouts. This allows potential attackers to bypass authentication checks using the AuthUtils.hasValidSessionCookie() method by using a cookie from a logged-out session. Consequently, any logged-out session cookie might be considered valid, leading to an authentication bypass. Users are advised to upgrade to version 0.8.45 to rectify this vulnerability. Currently, there are no known workarounds. This vulnerability was identified and reported by the GitHub Security lab and is being tracked under GHSL-2022-083.\r\nhttps://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj\r\nhttps://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/datahub-frontend/app/auth/AuthUtils.java#L78" }, { "instruction": "what vulnarability does actinia-core version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-50460 Advisory: Actinia-core 2.0.0 fixes an unsafe temporary files creation vulnerability.\r\nhttps://github.com/mundialis/actinia_core/pull/262\r\nhttps://github.com/mundialis/actinia_core/pull/256", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does actinia-core version less then 2.0.0 have ### Response: Having vulnarability PVE-2022-50460 Advisory: Actinia-core 2.0.0 fixes an unsafe temporary files creation vulnerability.\r\nhttps://github.com/mundialis/actinia_core/pull/262\r\nhttps://github.com/mundialis/actinia_core/pull/256" }, { "instruction": "what vulnarability does actinis-django-storages version less then 1.7 have", "input": "", "output": "Having vulnarability PVE-2022-48499 Advisory: Actinis-django-storages 1.7 fixes an insecure default ACL of 'public-read' in the 'S3BotoStorage' and 'S3Boto3Storage' backends.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does actinis-django-storages version less then 1.7 have ### Response: Having vulnarability PVE-2022-48499 Advisory: Actinis-django-storages 1.7 fixes an insecure default ACL of 'public-read' in the 'S3BotoStorage' and 'S3Boto3Storage' backends." }, { "instruction": "what vulnarability does actipy version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2021-34141 Advisory: Actipy 1.1.0 updates its dependency 'numpy' requirement to '>=1.22' to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does actipy version less then 1.1.0 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Actipy 1.1.0 updates its dependency 'numpy' requirement to '>=1.22' to include security fixes." }, { "instruction": "what vulnarability does adios2 version less then 2.9.0 have", "input": "", "output": "Having vulnarability PVE-2023-62779 Advisory: Adios2 2.9.0 fixes a race condition in OnDemand timestep and in OnDemand delivery.\r\nhttps://github.com/ornladios/ADIOS2/pull/3355/commits/9d55dad75ac09b1a6bfb3a94a054b023ced43fb9\r\nhttps://github.com/ornladios/ADIOS2/pull/3369/commits/fd8b02a72d91ac31d9beb4e68fa77a353b657bb5", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does adios2 version less then 2.9.0 have ### Response: Having vulnarability PVE-2023-62779 Advisory: Adios2 2.9.0 fixes a race condition in OnDemand timestep and in OnDemand delivery.\r\nhttps://github.com/ornladios/ADIOS2/pull/3355/commits/9d55dad75ac09b1a6bfb3a94a054b023ced43fb9\r\nhttps://github.com/ornladios/ADIOS2/pull/3369/commits/fd8b02a72d91ac31d9beb4e68fa77a353b657bb5" }, { "instruction": "what vulnarability does admesh version less then 0.98.5 have", "input": "", "output": "Having vulnarability CVE-2022-38072 Advisory: Admesh 0.98.5 fixes an improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.\r\nhttps://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does admesh version less then 0.98.5 have ### Response: Having vulnarability CVE-2022-38072 Advisory: Admesh 0.98.5 fixes an improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.\r\nhttps://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f" }, { "instruction": "what vulnarability does adversarial-robustness-toolbox version less then 1.6.1 have", "input": "", "output": "Having vulnarability CVE-2021-28675 Advisory: Adversarial-robustness-toolbox version 1.6.1 updates its dependency \"Pillow\" to a secure version. See CVE-2021-28675.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does adversarial-robustness-toolbox version less then 1.6.1 have ### Response: Having vulnarability CVE-2021-28675 Advisory: Adversarial-robustness-toolbox version 1.6.1 updates its dependency \"Pillow\" to a secure version. See CVE-2021-28675." }, { "instruction": "what vulnarability does adyen version less then 7.1.0 have", "input": "", "output": "Having vulnarability PVE-2024-66853 Advisory: Adyen version 7.1.0 addresses a security vulnerability related to a timing attack in HMAC comparisons.\r\nhttps://github.com/Adyen/adyen-python-api-library/pull/170/commits/092f2062eafff2d92adc4d9f73c684510fe090d1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does adyen version less then 7.1.0 have ### Response: Having vulnarability PVE-2024-66853 Advisory: Adyen version 7.1.0 addresses a security vulnerability related to a timing attack in HMAC comparisons.\r\nhttps://github.com/Adyen/adyen-python-api-library/pull/170/commits/092f2062eafff2d92adc4d9f73c684510fe090d1" }, { "instruction": "what vulnarability does aegea version less then 2.2.7 have", "input": "", "output": "Having vulnarability CVE-2018-1000805 Advisory: Aegea 2.2.7 updates the minimum requirement for its dependency 'paramiko' to v2.4.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aegea version less then 2.2.7 have ### Response: Having vulnarability CVE-2018-1000805 Advisory: Aegea 2.2.7 updates the minimum requirement for its dependency 'paramiko' to v2.4.2 to include a security fix." }, { "instruction": "what vulnarability does aethos version less then 0.3.0.1 have", "input": "", "output": "Having vulnarability PVE-2021-37721 Advisory: Aethos 0.3.0.1 hotfixed NLTK package in setup.py.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aethos version less then 0.3.0.1 have ### Response: Having vulnarability PVE-2021-37721 Advisory: Aethos 0.3.0.1 hotfixed NLTK package in setup.py." }, { "instruction": "what vulnarability does afdko version less then 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2023-54923 Advisory: Afdko 3.0.0 includes a fix for a code execution vulnerability.\r\nhttps://github.com/adobe-type-tools/afdko/issues/780", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does afdko version less then 3.0.0 have ### Response: Having vulnarability PVE-2023-54923 Advisory: Afdko 3.0.0 includes a fix for a code execution vulnerability.\r\nhttps://github.com/adobe-type-tools/afdko/issues/780" }, { "instruction": "what vulnarability does agixt version less then 1.2.4 have", "input": "", "output": "Having vulnarability PVE-2023-58993 Advisory: Agixt 1.2.4 includes a fix for a path traversal vulnerability. \r\nhttps://github.com/Josh-XT/AGiXT/pull/673", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does agixt version less then 1.2.4 have ### Response: Having vulnarability PVE-2023-58993 Advisory: Agixt 1.2.4 includes a fix for a path traversal vulnerability. \r\nhttps://github.com/Josh-XT/AGiXT/pull/673" }, { "instruction": "what vulnarability does agraph-python version less then 101.0.1 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Agraph-python 101.0.1 updates requests from 2.18.4 to 2.20.0 for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does agraph-python version less then 101.0.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Agraph-python 101.0.1 updates requests from 2.18.4 to 2.20.0 for security reasons." }, { "instruction": "what vulnarability does ahc-tools version less then 1.6.0 have", "input": "", "output": "Having vulnarability CVE-2014-3702 Advisory: Directory traversal vulnerability in eNovance eDeploy allows remote attackers to create arbitrary directories and files and consequently cause a denial of service (resource consumption) via a (dot dot) the session parameter.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ahc-tools version less then 1.6.0 have ### Response: Having vulnarability CVE-2014-3702 Advisory: Directory traversal vulnerability in eNovance eDeploy allows remote attackers to create arbitrary directories and files and consequently cause a denial of service (resource consumption) via a (dot dot) the session parameter." }, { "instruction": "what vulnarability does ahjo version less then 3.1.1 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Ahjo 3.1.1 updates its dependency 'setuptools' to v65.5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ahjo version less then 3.1.1 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Ahjo 3.1.1 updates its dependency 'setuptools' to v65.5.1 to include a security fix." }, { "instruction": "what vulnarability does ai-flow version less then equal to 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2024-0960 Advisory: A vulnerability was found in flink-extended ai-flow 0.3.1. It has been declared as critical. Affected by this vulnerability is the function cloudpickle.loads of the file \\ai_flow\\cli\\commands\\workflow_command.py. The manipulation leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252205 was assigned to this vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ai-flow version less then equal to 0.3.1 have ### Response: Having vulnarability CVE-2024-0960 Advisory: A vulnerability was found in flink-extended ai-flow 0.3.1. It has been declared as critical. Affected by this vulnerability is the function cloudpickle.loads of the file \\ai_flow\\cli\\commands\\workflow_command.py. The manipulation leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252205 was assigned to this vulnerability." }, { "instruction": "what vulnarability does ai-python version less then 0.8.1 have", "input": "", "output": "Having vulnarability CVE-2021-41213 Advisory: Ai-python 0.8.1 updates its dependency 'tensorflow' to v2.6.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ai-python version less then 0.8.1 have ### Response: Having vulnarability CVE-2021-41213 Advisory: Ai-python 0.8.1 updates its dependency 'tensorflow' to v2.6.1 to include security fixes." }, { "instruction": "what vulnarability does aiida version less then 0.12.3 have", "input": "", "output": "Having vulnarability PVE-2021-37054 Advisory: Aiida 0.12.3 fixes a security vulnerability by upgrading `paramiko` to `2.4.2`.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiida version less then 0.12.3 have ### Response: Having vulnarability PVE-2021-37054 Advisory: Aiida 0.12.3 fixes a security vulnerability by upgrading `paramiko` to `2.4.2`." }, { "instruction": "what vulnarability does aiida-core version less then 0.12.3 have", "input": "", "output": "Having vulnarability PVE-2021-36956 Advisory: aiida-core 0.12.3 fixes security vulnerability by upgrading `paramiko` to `2.4.2`", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiida-core version less then 0.12.3 have ### Response: Having vulnarability PVE-2021-36956 Advisory: aiida-core 0.12.3 fixes security vulnerability by upgrading `paramiko` to `2.4.2`" }, { "instruction": "what vulnarability does ail version less then 2.9 have", "input": "", "output": "Having vulnarability CVE-2020-8545 Advisory: Global.py in AIL framework 2.8 allows path traversal.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ail version less then 2.9 have ### Response: Having vulnarability CVE-2020-8545 Advisory: Global.py in AIL framework 2.8 allows path traversal." }, { "instruction": "what vulnarability does aim version less then 1.2.13 have", "input": "", "output": "Having vulnarability CVE-2020-5311 Advisory: Aim 1.2.13 updates its dependency 'pillow' to v6.2.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aim version less then 1.2.13 have ### Response: Having vulnarability CVE-2020-5311 Advisory: Aim 1.2.13 updates its dependency 'pillow' to v6.2.2 to include security fixes." }, { "instruction": "what vulnarability does aio-pika version less then 9.1.5 have", "input": "", "output": "Having vulnarability PVE-2023-59901 Advisory: Aio-pika 9.1.5 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/mosquito/aio-pika/pull/566", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aio-pika version less then 9.1.5 have ### Response: Having vulnarability PVE-2023-59901 Advisory: Aio-pika 9.1.5 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/mosquito/aio-pika/pull/566" }, { "instruction": "what vulnarability does aioapns version less then 1.10 have", "input": "", "output": "Having vulnarability PVE-2021-38620 Advisory: Certificate hostname validation in aioapns version 1.10 is enabled by default for security reasons. It can be turned off by using no_cert_validation option.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aioapns version less then 1.10 have ### Response: Having vulnarability PVE-2021-38620 Advisory: Certificate hostname validation in aioapns version 1.10 is enabled by default for security reasons. It can be turned off by using no_cert_validation option." }, { "instruction": "what vulnarability does aiob version equal to 0.0.1 have", "input": "", "output": "Having vulnarability CVE-2022-33124 Advisory: AIOHTTP 3.8.1 can report a \"ValueError: Invalid IPv6 URL\" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application.\r\nAlias: GHSA-rwqr-c348-m5wr", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiob version equal to 0.0.1 have ### Response: Having vulnarability CVE-2022-33124 Advisory: AIOHTTP 3.8.1 can report a \"ValueError: Invalid IPv6 URL\" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application.\r\nAlias: GHSA-rwqr-c348-m5wr" }, { "instruction": "what vulnarability does aiobotocore version less then 2.9.1 have", "input": "", "output": "Having vulnarability PVE-2024-64278 Advisory: Aiobotocore 2.9.1 fixes a race condition that was affecting the S3 Express identity cache. This race condition could occur when multiple threads attempted to read from or write to the cache simultaneously, leading to unpredictable behavior. The fix involves implementing synchronization mechanisms, specifically an asyncio lock, to ensure that only one thread can access the cache at a time.\r\nhttps://github.com/aio-libs/aiobotocore/pull/1073/commits/9097884cd8246460794157125ccd6378c3e901f8", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiobotocore version less then 2.9.1 have ### Response: Having vulnarability PVE-2024-64278 Advisory: Aiobotocore 2.9.1 fixes a race condition that was affecting the S3 Express identity cache. This race condition could occur when multiple threads attempted to read from or write to the cache simultaneously, leading to unpredictable behavior. The fix involves implementing synchronization mechanisms, specifically an asyncio lock, to ensure that only one thread can access the cache at a time.\r\nhttps://github.com/aio-libs/aiobotocore/pull/1073/commits/9097884cd8246460794157125ccd6378c3e901f8" }, { "instruction": "what vulnarability does aiocoap version less then 0.4a1 have", "input": "", "output": "Having vulnarability PVE-2021-37469 Advisory: The proxy in aiocoap 0.4a1 only creates log files when explicitly requested (18ddf8c). Also, support for secured protocols has been added.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiocoap version less then 0.4a1 have ### Response: Having vulnarability PVE-2021-37469 Advisory: The proxy in aiocoap 0.4a1 only creates log files when explicitly requested (18ddf8c). Also, support for secured protocols has been added." }, { "instruction": "what vulnarability does aiocouchdb version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-25612 Advisory: aiocouchdb 0.6.0 now correctly set members for database security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiocouchdb version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-25612 Advisory: aiocouchdb 0.6.0 now correctly set members for database security." }, { "instruction": "what vulnarability does aiocurrencylayer version less then 1.0.4 have", "input": "", "output": "Having vulnarability CVE-2021-41945 Advisory: Aiocurrencylayer version 1.0.4 updates its httpx dependency to version 0.23 or newer in response to CVE-2021-41945.\r\nhttps://github.com/home-assistant-ecosystem/aiocurrencylayer/commit/5768c17400f7d6222290f671ba3c8ba7b4c223ce", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiocurrencylayer version less then 1.0.4 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Aiocurrencylayer version 1.0.4 updates its httpx dependency to version 0.23 or newer in response to CVE-2021-41945.\r\nhttps://github.com/home-assistant-ecosystem/aiocurrencylayer/commit/5768c17400f7d6222290f671ba3c8ba7b4c223ce" }, { "instruction": "what vulnarability does aioftp version less then 0.15.0 have", "input": "", "output": "Having vulnarability PVE-2021-38045 Advisory: The server of aioftp 0.15.0 uses explicit mapping of available commands for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aioftp version less then 0.15.0 have ### Response: Having vulnarability PVE-2021-38045 Advisory: The server of aioftp 0.15.0 uses explicit mapping of available commands for security reasons." }, { "instruction": "what vulnarability does aiohttp version less then 0.16.3 have", "input": "", "output": "Having vulnarability PVE-2021-25613 Advisory: Aiohttp 0.16.3 fixes a directory traversal vulnerability by making changes in StaticRoute class of web_urldispatcher.py.\r\nhttps://github.com/aio-libs/aiohttp/pull/383", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp version less then 0.16.3 have ### Response: Having vulnarability PVE-2021-25613 Advisory: Aiohttp 0.16.3 fixes a directory traversal vulnerability by making changes in StaticRoute class of web_urldispatcher.py.\r\nhttps://github.com/aio-libs/aiohttp/pull/383" }, { "instruction": "what vulnarability does aiohttp-auth-autz version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-32971 Advisory: Aiohttp-auth-autz before 0.2.0 isn't correctly checking the user_id in acl middleware, leading to a possible permission escalation.\r\nhttps://github.com/ilex/aiohttp_auth_autz/commit/b8bb3178786daebc828298dc0d1988b191890495", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-auth-autz version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-32971 Advisory: Aiohttp-auth-autz before 0.2.0 isn't correctly checking the user_id in acl middleware, leading to a possible permission escalation.\r\nhttps://github.com/ilex/aiohttp_auth_autz/commit/b8bb3178786daebc828298dc0d1988b191890495" }, { "instruction": "what vulnarability does aiohttp-jinja2 version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2014-1402 Advisory: Aiohttp-jinja2 1.1.1 updates minimal supported 'Jinja2' version to 2.10.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-jinja2 version less then 1.1.1 have ### Response: Having vulnarability CVE-2014-1402 Advisory: Aiohttp-jinja2 1.1.1 updates minimal supported 'Jinja2' version to 2.10.1 to include security fixes." }, { "instruction": "what vulnarability does aiohttp-proxies version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47805 Advisory: Aiohttp-proxies is a malicious package. It contains a backdoor.\r\nhttps://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-proxies version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47805 Advisory: Aiohttp-proxies is a malicious package. It contains a backdoor.\r\nhttps://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages" }, { "instruction": "what vulnarability does aiohttp-session version greather then equal to 0,less then 2.4.0 have", "input": "", "output": "Having vulnarability CVE-2018-1000519 Advisory: aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-session version greather then equal to 0,less then 2.4.0 have ### Response: Having vulnarability CVE-2018-1000519 Advisory: aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie)." }, { "instruction": "what vulnarability does aiohttp-socks4 version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47816 Advisory: Aiohttp-socks4 is a malicious package, typosquatting. It installs a Trojan in your system.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-socks4 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47816 Advisory: Aiohttp-socks4 is a malicious package, typosquatting. It installs a Trojan in your system.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick" }, { "instruction": "what vulnarability does aiohttp-socks5 version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47822 Advisory: Aiohttp-socks5 is a malicious package, typosquatting. It installs a Trojan in your system.\r\nhttps://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-socks5 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47822 Advisory: Aiohttp-socks5 is a malicious package, typosquatting. It installs a Trojan in your system.\r\nhttps://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library" }, { "instruction": "what vulnarability does aiohttp-swagger version less then 1.0.15 have", "input": "", "output": "Having vulnarability PVE-2021-38483 Advisory: Aiohttp-swagger before 1.0.15 includes a version of js-yaml that's not secure.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-swagger version less then 1.0.15 have ### Response: Having vulnarability PVE-2021-38483 Advisory: Aiohttp-swagger before 1.0.15 includes a version of js-yaml that's not secure." }, { "instruction": "what vulnarability does aiokafka version less then 0.4.0 have", "input": "", "output": "Having vulnarability PVE-2023-62410 Advisory: Aiokafka 0.4.0 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/aio-libs/aiokafka/pull/286", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiokafka version less then 0.4.0 have ### Response: Having vulnarability PVE-2023-62410 Advisory: Aiokafka 0.4.0 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/aio-libs/aiokafka/pull/286" }, { "instruction": "what vulnarability does aiolifx-themes version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Aiolifx-themes 0.4.1 updates its dependency 'setuptools' to v65.5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiolifx-themes version less then 0.4.1 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Aiolifx-themes 0.4.1 updates its dependency 'setuptools' to v65.5.1 to include a security fix." }, { "instruction": "what vulnarability does aiootp version less then 0.11.0 have", "input": "", "output": "Having vulnarability PVE-2021-38602 Advisory: The `Opake.client` & `Opake.client_registration` methods in aiootp version 0.11.0 take an instantiated client database instead of client credentials which improves security, efficiency & usability. This change reduces the amount of exposure received by user passwords & other credentials. It also simplifies usage of the protocol by only needing to carry around a database instead of a slew of credentials, which is also faster, since the credentials are passed through the cpu & memory hard `passcrypt` function every time to open the database.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiootp version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-38602 Advisory: The `Opake.client` & `Opake.client_registration` methods in aiootp version 0.11.0 take an instantiated client database instead of client credentials which improves security, efficiency & usability. This change reduces the amount of exposure received by user passwords & other credentials. It also simplifies usage of the protocol by only needing to carry around a database instead of a slew of credentials, which is also faster, since the credentials are passed through the cpu & memory hard `passcrypt` function every time to open the database." }, { "instruction": "what vulnarability does aiopioneer version less then 0.1.5 have", "input": "", "output": "Having vulnarability PVE-2024-65890 Advisory: In version 0.1.5, aiopioneer resolves a race condition with the implementation of safe_wait_for, which enhances the handling of asynchronous tasks, especially during cancellations and event updates. \r\nhttps://github.com/crowbarz/aiopioneer/commit/f6f7ce66226825df9e039ed5f12f34812dcc4a7d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiopioneer version less then 0.1.5 have ### Response: Having vulnarability PVE-2024-65890 Advisory: In version 0.1.5, aiopioneer resolves a race condition with the implementation of safe_wait_for, which enhances the handling of asynchronous tasks, especially during cancellations and event updates. \r\nhttps://github.com/crowbarz/aiopioneer/commit/f6f7ce66226825df9e039ed5f12f34812dcc4a7d" }, { "instruction": "what vulnarability does aioradio version less then 0.17.9 have", "input": "", "output": "Having vulnarability CVE-2021-41945 Advisory: Aioradio 0.17.9 updates 'httpx' to v0.23.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aioradio version less then 0.17.9 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Aioradio 0.17.9 updates 'httpx' to v0.23.0 to include a security fix." }, { "instruction": "what vulnarability does aiosmtpd version less then 1.4.5 have", "input": "", "output": "Having vulnarability CVE-2024-27305 Advisory: aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue is also existed in other SMTP software like Postfix. With the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances. This issue has been addressed in version 1.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. See CVE-2024-27305.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiosmtpd version less then 1.4.5 have ### Response: Having vulnarability CVE-2024-27305 Advisory: aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue is also existed in other SMTP software like Postfix. With the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances. This issue has been addressed in version 1.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. See CVE-2024-27305." }, { "instruction": "what vulnarability does aiosmtplib version less then 1.1.7 have", "input": "", "output": "Having vulnarability PVE-2022-50882 Advisory: Aiosmtplib 1.1.7 fixes a possible injection vulnerability (a variant of https://consensys.net/diligence/vulnerabilities/python-smtplib-multiple-crlf-injection/).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiosmtplib version less then 1.1.7 have ### Response: Having vulnarability PVE-2022-50882 Advisory: Aiosmtplib 1.1.7 fixes a possible injection vulnerability (a variant of https://consensys.net/diligence/vulnerabilities/python-smtplib-multiple-crlf-injection/)." }, { "instruction": "what vulnarability does aiosolr version less then 3.3.2 have", "input": "", "output": "Having vulnarability CVE-2021-23980 Advisory: Aiosolr 3.3.2 updates its dependency 'bleach' to v3.3.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiosolr version less then 3.3.2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Aiosolr 3.3.2 updates its dependency 'bleach' to v3.3.0 to include a security fix." }, { "instruction": "what vulnarability does aiotoolbox version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53560 Advisory: Aiotoolbox is a malicious package. It contains a custom script in setup.py that downloads malicious and obfuscated code.\r\nhttps://inspector.pypi.io/project/aiotoolbox/1.5.2/packages/a0/9b/a3d1fdfb3036ad1bb6ee69f50eab85d042e7cd39ab24b3e8a1c0accbad1d/aiotoolbox-1.5.2.tar.gz/aiotoolbox-1.5.2/setup.py#line.60", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiotoolbox version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53560 Advisory: Aiotoolbox is a malicious package. It contains a custom script in setup.py that downloads malicious and obfuscated code.\r\nhttps://inspector.pypi.io/project/aiotoolbox/1.5.2/packages/a0/9b/a3d1fdfb3036ad1bb6ee69f50eab85d042e7cd39ab24b3e8a1c0accbad1d/aiotoolbox-1.5.2.tar.gz/aiotoolbox-1.5.2/setup.py#line.60" }, { "instruction": "what vulnarability does aioxmpp version less then equal to 0.10.2 have", "input": "", "output": "Having vulnarability CVE-2019-1000007 Advisory: aioxmpp version 0.10.2 and earlier contains a Improper Handling of Structural Elements vulnerability in Stanza Parser, rollback during error processing, aioxmpp.xso.model.guard function that can result in Denial of Service, Other. This attack appears to be exploitable via Remote. A crafted stanza can be sent to an application which uses the vulnerable components to either inject data in a different context or cause the application to reconnect (potentially losing data). This vulnerability appears to have been fixed in 0.10.3.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aioxmpp version less then equal to 0.10.2 have ### Response: Having vulnarability CVE-2019-1000007 Advisory: aioxmpp version 0.10.2 and earlier contains a Improper Handling of Structural Elements vulnerability in Stanza Parser, rollback during error processing, aioxmpp.xso.model.guard function that can result in Denial of Service, Other. This attack appears to be exploitable via Remote. A crafted stanza can be sent to an application which uses the vulnerable components to either inject data in a different context or cause the application to reconnect (potentially losing data). This vulnerability appears to have been fixed in 0.10.3." }, { "instruction": "what vulnarability does airflow version less then 1.8.0 have", "input": "", "output": "Having vulnarability PVE-2023-99973 Advisory: Apache-airflow 1.8.0 includes a fix for a code execution vulnerability in PrestoHook.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does airflow version less then 1.8.0 have ### Response: Having vulnarability PVE-2023-99973 Advisory: Apache-airflow 1.8.0 includes a fix for a code execution vulnerability in PrestoHook." }, { "instruction": "what vulnarability does airflow-duckdb version less then 0.1.1 have", "input": "", "output": "Having vulnarability CVE-2024-26130 Advisory: Airflow-duckdb version 0.1.1 updates its cryptography dependency from 42.0.2 to 42.0.4 to address the security issue CVE-2024-26130, enhancing its security features.\r\nhttps://github.com/hussein-awala/airflow-duckdb/commit/bdae387e9ee2c7045091b20632a740236405e54c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does airflow-duckdb version less then 0.1.1 have ### Response: Having vulnarability CVE-2024-26130 Advisory: Airflow-duckdb version 0.1.1 updates its cryptography dependency from 42.0.2 to 42.0.4 to address the security issue CVE-2024-26130, enhancing its security features.\r\nhttps://github.com/hussein-awala/airflow-duckdb/commit/bdae387e9ee2c7045091b20632a740236405e54c" }, { "instruction": "what vulnarability does aiutil version less then 0.71.1 have", "input": "", "output": "Having vulnarability PVE-2022-52477 Advisory: Aiutil 0.71.1 includes a fix for an injection vulnerability through password input.\r\nhttps://github.com/legendu-net/aiutil/pull/333/commits/e1d016d329b39b5e799de9c2fcacb2249582863f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiutil version less then 0.71.1 have ### Response: Having vulnarability PVE-2022-52477 Advisory: Aiutil 0.71.1 includes a fix for an injection vulnerability through password input.\r\nhttps://github.com/legendu-net/aiutil/pull/333/commits/e1d016d329b39b5e799de9c2fcacb2249582863f" }, { "instruction": "what vulnarability does ajenti version less then 2.1.37 have", "input": "", "output": "Having vulnarability CVE-2019-25066 Advisory: A vulnerability has been found in ajenti 2.1.31 and classified as critical. This vulnerability affects unknown code of the component API. The manipulation leads to privilege escalation. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.32 is able to address this issue. The name of the patch is 7aa146b724e0e20cfee2c71ca78fafbf53a8767c. It is recommended to upgrade the affected component.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ajenti version less then 2.1.37 have ### Response: Having vulnarability CVE-2019-25066 Advisory: A vulnerability has been found in ajenti 2.1.31 and classified as critical. This vulnerability affects unknown code of the component API. The manipulation leads to privilege escalation. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.32 is able to address this issue. The name of the patch is 7aa146b724e0e20cfee2c71ca78fafbf53a8767c. It is recommended to upgrade the affected component." }, { "instruction": "what vulnarability does ajenti-panel version greather then equal to 0 have", "input": "", "output": "Having vulnarability CVE-2018-1000083 Advisory: Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds with a traceback error that leaks a path of the server.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ajenti-panel version greather then equal to 0 have ### Response: Having vulnarability CVE-2018-1000083 Advisory: Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds with a traceback error that leaks a path of the server." }, { "instruction": "what vulnarability does ajsonrpc version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-39665 Advisory: Ajsonrpc 1.1.0 ensures server security by having the response manager return a generic ServerError without error details in case of an application exception.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ajsonrpc version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-39665 Advisory: Ajsonrpc 1.1.0 ensures server security by having the response manager return a generic ServerError without error details in case of an application exception." }, { "instruction": "what vulnarability does aldryn-django version less then 1.8.10.1 have", "input": "", "output": "Having vulnarability CVE-2016-2512 Advisory: Aldryn-django 1.8.10.1 updates its dependency 'Django' to v1.8.10 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aldryn-django version less then 1.8.10.1 have ### Response: Having vulnarability CVE-2016-2512 Advisory: Aldryn-django 1.8.10.1 updates its dependency 'Django' to v1.8.10 to include security fixes." }, { "instruction": "what vulnarability does aleksis-core version greather then equal to 0,less then 2.9 have", "input": "", "output": "Having vulnarability CVE-2022-29773 Advisory: An access control issue in aleksis/core/util/auth_helpers.py: ClientProtectedResourceMixin of AlekSIS-Core v2.8.1 and below allows attackers to access arbitrary scopes if no allowed scopes are specifically set.\r\nhttps://edugit.org/AlekSIS/official/AlekSIS-Core/-/issues/688", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aleksis-core version greather then equal to 0,less then 2.9 have ### Response: Having vulnarability CVE-2022-29773 Advisory: An access control issue in aleksis/core/util/auth_helpers.py: ClientProtectedResourceMixin of AlekSIS-Core v2.8.1 and below allows attackers to access arbitrary scopes if no allowed scopes are specifically set.\r\nhttps://edugit.org/AlekSIS/official/AlekSIS-Core/-/issues/688" }, { "instruction": "what vulnarability does aleph-message version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2020-10735 Advisory: Aleph-message 0.3.1 updates its dependency ''pydantic' requirement to versions '~=1.10.5' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aleph-message version less then 0.3.1 have ### Response: Having vulnarability CVE-2020-10735 Advisory: Aleph-message 0.3.1 updates its dependency ''pydantic' requirement to versions '~=1.10.5' to include a security fix." }, { "instruction": "what vulnarability does alerta-server version less then 7.5.7,greather then equal to 8.0.0,less then 8.1.0 have", "input": "", "output": "Having vulnarability CVE-2020-26214 Advisory: In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alerta-server version less then 7.5.7,greather then equal to 8.0.0,less then 8.1.0 have ### Response: Having vulnarability CVE-2020-26214 Advisory: In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients." }, { "instruction": "what vulnarability does alex-ber-utils version less then 0.6.3 have", "input": "", "output": "Having vulnarability PVE-2021-39148 Advisory: Alex-ber-utils 0.6.3 changes the base docker image version to 0.1.0, because it has a fix for a potential security risk: Git changed to not store credentials as plain text but to keep them in memory for 1 hour.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alex-ber-utils version less then 0.6.3 have ### Response: Having vulnarability PVE-2021-39148 Advisory: Alex-ber-utils 0.6.3 changes the base docker image version to 0.1.0, because it has a fix for a potential security risk: Git changed to not store credentials as plain text but to keep them in memory for 1 hour." }, { "instruction": "what vulnarability does alexandra version less then 0.4.0 have", "input": "", "output": "Having vulnarability CVE-2018-1000807 Advisory: Alexandra 0.4.0 updates its dependency 'pyOpenSSL' to v17.5.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alexandra version less then 0.4.0 have ### Response: Having vulnarability CVE-2018-1000807 Advisory: Alexandra 0.4.0 updates its dependency 'pyOpenSSL' to v17.5.0 to include security fixes." }, { "instruction": "what vulnarability does alfred3-interact version less then 0.2.4 have", "input": "", "output": "Having vulnarability PVE-2023-62763 Advisory: Alfred3-interact 0.2.4 fixes a race condition in `MatchMaker._init_member()` which apparently creates a member before its session ID is available in the database.\r\nhttps://github.com/jobrachem/alfred3-interact/commit/0e3c7e964338af72f50066475382c35778888701", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alfred3-interact version less then 0.2.4 have ### Response: Having vulnarability PVE-2023-62763 Advisory: Alfred3-interact 0.2.4 fixes a race condition in `MatchMaker._init_member()` which apparently creates a member before its session ID is available in the database.\r\nhttps://github.com/jobrachem/alfred3-interact/commit/0e3c7e964338af72f50066475382c35778888701" }, { "instruction": "what vulnarability does algokit version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2022-24439 Advisory: Algokit 0.3.0 updates its dependency 'GitPython' to v3.1.30 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does algokit version less then 0.3.0 have ### Response: Having vulnarability CVE-2022-24439 Advisory: Algokit 0.3.0 updates its dependency 'GitPython' to v3.1.30 to include a security fix." }, { "instruction": "what vulnarability does algorithm-toolkit version less then 0.1.3beta have", "input": "", "output": "Having vulnarability PVE-2021-39381 Advisory: Algorithm-toolkit 0.1.3beta resolves security issues with internal dependencies Pillow and marked.js.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does algorithm-toolkit version less then 0.1.3beta have ### Response: Having vulnarability PVE-2021-39381 Advisory: Algorithm-toolkit 0.1.3beta resolves security issues with internal dependencies Pillow and marked.js." }, { "instruction": "what vulnarability does algorithmic version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51694 Advisory: Algorithmic is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does algorithmic version greather then 0 have ### Response: Having vulnarability PVE-2022-51694 Advisory: Algorithmic is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does algoseek-connector version less then 2.1.3 have", "input": "", "output": "Having vulnarability PVE-2024-67887 Advisory: Algoseek-connector version 2.1.3 addresses a security vulnerability in the sqlparse library by updating from version \"^0.4.4\" to \"^0.5.0\", in response to the security advisory GHSA-2m57-hf25-phgg.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does algoseek-connector version less then 2.1.3 have ### Response: Having vulnarability PVE-2024-67887 Advisory: Algoseek-connector version 2.1.3 addresses a security vulnerability in the sqlparse library by updating from version \"^0.4.4\" to \"^0.5.0\", in response to the security advisory GHSA-2m57-hf25-phgg." }, { "instruction": "what vulnarability does allennlp version less then 0.6.1 have", "input": "", "output": "Having vulnarability PVE-2021-36530 Advisory: allennlp 0.6.1 upgrades flask to avoid security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does allennlp version less then 0.6.1 have ### Response: Having vulnarability PVE-2021-36530 Advisory: allennlp 0.6.1 upgrades flask to avoid security vulnerability." }, { "instruction": "what vulnarability does allmydata-tahoe version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-34432 Advisory: Allmydata-tahoe 1.1.0 removes 'localdir=/localfile=' and 't=download' operations to avoid security issues.\r\nhttps://github.com/tahoe-lafs/tahoe-lafs/commit/151f69d9b59ee76522c5ae3dad259ded752e8ad4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does allmydata-tahoe version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-34432 Advisory: Allmydata-tahoe 1.1.0 removes 'localdir=/localfile=' and 't=download' operations to avoid security issues.\r\nhttps://github.com/tahoe-lafs/tahoe-lafs/commit/151f69d9b59ee76522c5ae3dad259ded752e8ad4" }, { "instruction": "what vulnarability does alt-model-checkpoint version less then 1.0.1 have", "input": "", "output": "Having vulnarability PVE-2021-36628 Advisory: alt-model-checkpoint 1.0.1 upgrades dependencies, esp. for requests==2.20.0 security patch", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alt-model-checkpoint version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-36628 Advisory: alt-model-checkpoint 1.0.1 upgrades dependencies, esp. for requests==2.20.0 security patch" }, { "instruction": "what vulnarability does altair-recipes version less then 0.9.2 have", "input": "", "output": "Having vulnarability CVE-2022-21699 Advisory: Altair-recipes 0.9.2 updates its dependency 'ipython' to v7.31.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does altair-recipes version less then 0.9.2 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Altair-recipes 0.9.2 updates its dependency 'ipython' to v7.31.1 to include a security fix." }, { "instruction": "what vulnarability does altvmasterlist version less then 3.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-45061 Advisory: Altvmasterlist version 3.1.0 updates its IDNA dependency from version 3.6 to 3.7 to fix a denial of service vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does altvmasterlist version less then 3.1.0 have ### Response: Having vulnarability CVE-2022-45061 Advisory: Altvmasterlist version 3.1.0 updates its IDNA dependency from version 3.6 to 3.7 to fix a denial of service vulnerability." }, { "instruction": "what vulnarability does alvaro version less then 1.1.1 have", "input": "", "output": "Having vulnarability PVE-2022-50145 Advisory: Alvaro 1.1.1 replaced Pickle with JSON to prevent code injection vulnerabilities.\r\nhttps://github.com/edgecase963/Alvaro/commit/d87c53359e7edde827add46a7870d4192eef0451", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alvaro version less then 1.1.1 have ### Response: Having vulnarability PVE-2022-50145 Advisory: Alvaro 1.1.1 replaced Pickle with JSON to prevent code injection vulnerabilities.\r\nhttps://github.com/edgecase963/Alvaro/commit/d87c53359e7edde827add46a7870d4192eef0451" }, { "instruction": "what vulnarability does amazon-product-details-scraper version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2024-66905 Advisory: Amazon-product-details-scraper version 1.0.4 introduces a security update to enhance the validation process for host URLs, mitigating potential vulnerabilities associated with improper URL verification.\r\nhttps://github.com/ranjan-mohanty/amazon-product-details-scraper/pull/10/commits/e8491b1e13b4b9a35f6009d65b7c33d16e3cff10", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amazon-product-details-scraper version less then 1.0.4 have ### Response: Having vulnarability PVE-2024-66905 Advisory: Amazon-product-details-scraper version 1.0.4 introduces a security update to enhance the validation process for host URLs, mitigating potential vulnerabilities associated with improper URL verification.\r\nhttps://github.com/ranjan-mohanty/amazon-product-details-scraper/pull/10/commits/e8491b1e13b4b9a35f6009d65b7c33d16e3cff10" }, { "instruction": "what vulnarability does ambient-api version less then 1.5.2 have", "input": "", "output": "Having vulnarability CVE-2018-20060 Advisory: Ambient-api 1.5.2 updates requirements.txt to use urllib3>=1.23 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ambient-api version less then 1.5.2 have ### Response: Having vulnarability CVE-2018-20060 Advisory: Ambient-api 1.5.2 updates requirements.txt to use urllib3>=1.23 to include a security fix." }, { "instruction": "what vulnarability does aml-ds-pipeline-contrib version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47809 Advisory: Aml-ds-pipeline-contrib is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aml-ds-pipeline-contrib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47809 Advisory: Aml-ds-pipeline-contrib is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick" }, { "instruction": "what vulnarability does amqp version greather then equal to 0.8,less then equal to 0.9.1 have", "input": "", "output": "Having vulnarability PVE-2023-99972 Advisory: AMQP versions 0.8 to 0.9.1 (Python client) do not carry out hostname verification during tls connections, paving the way for potential Man-in-the-Middle attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amqp version greather then equal to 0.8,less then equal to 0.9.1 have ### Response: Having vulnarability PVE-2023-99972 Advisory: AMQP versions 0.8 to 0.9.1 (Python client) do not carry out hostname verification during tls connections, paving the way for potential Man-in-the-Middle attacks." }, { "instruction": "what vulnarability does amqplib version greather then equal to 0.8,less then equal to 0.9.1 have", "input": "", "output": "Having vulnarability PVE-2023-99972 Advisory: AMQPlib versions 0.8 to 0.9.1 (Python client) do not carry out hostname verification during tls connections, paving the way for potential Man-in-the-Middle attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amqplib version greather then equal to 0.8,less then equal to 0.9.1 have ### Response: Having vulnarability PVE-2023-99972 Advisory: AMQPlib versions 0.8 to 0.9.1 (Python client) do not carry out hostname verification during tls connections, paving the way for potential Man-in-the-Middle attacks." }, { "instruction": "what vulnarability does amqtt version less then 0.10.0 have", "input": "", "output": "Having vulnarability PVE-2023-53085 Advisory: Amqtt 0.10.0 includes a security fix: If an attacker could produce a KeyError inside an authentication plugin, the authentication was accepted instead of rejected.\r\nhttps://github.com/Yakifo/amqtt/pull/68", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amqtt version less then 0.10.0 have ### Response: Having vulnarability PVE-2023-53085 Advisory: Amqtt 0.10.0 includes a security fix: If an attacker could produce a KeyError inside an authentication plugin, the authentication was accepted instead of rejected.\r\nhttps://github.com/Yakifo/amqtt/pull/68" }, { "instruction": "what vulnarability does amsterdam version less then 1.1 have", "input": "", "output": "Having vulnarability PVE-2017-47647 Advisory: Amsterdam 1.1 runs the suricata container with lower permissions to increase security.\r\nhttps://github.com/StamusNetworks/Amsterdam/commit/cadf11008a148919cd77da57e1d77c5a2e1092e9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amsterdam version less then 1.1 have ### Response: Having vulnarability PVE-2017-47647 Advisory: Amsterdam 1.1 runs the suricata container with lower permissions to increase security.\r\nhttps://github.com/StamusNetworks/Amsterdam/commit/cadf11008a148919cd77da57e1d77c5a2e1092e9" }, { "instruction": "what vulnarability does amundsen-frontend version less then 3.0.0 have", "input": "", "output": "Having vulnarability CVE-2020-7660 Advisory: Amundsen-frontend 3.0.0 updates its dependency 'serialize-javascript' to v3.1.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amundsen-frontend version less then 3.0.0 have ### Response: Having vulnarability CVE-2020-7660 Advisory: Amundsen-frontend 3.0.0 updates its dependency 'serialize-javascript' to v3.1.0 to include a security fix." }, { "instruction": "what vulnarability does analytics-zoo version less then 0.11.1 have", "input": "", "output": "Having vulnarability CVE-2021-45105 Advisory: Analytics-zoo 0.11.1 updates its dependency 'log4j' to v2.17.0 to fix critical and severe vulnerabilities.\r\nhttps://github.com/intel-analytics/analytics-zoo/commit/be893d0c173563df923b54578774bd4226d0bbd9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does analytics-zoo version less then 0.11.1 have ### Response: Having vulnarability CVE-2021-45105 Advisory: Analytics-zoo 0.11.1 updates its dependency 'log4j' to v2.17.0 to fix critical and severe vulnerabilities.\r\nhttps://github.com/intel-analytics/analytics-zoo/commit/be893d0c173563df923b54578774bd4226d0bbd9" }, { "instruction": "what vulnarability does anchore version equal to 0.7.0 have", "input": "", "output": "Having vulnarability CVE-2020-11075 Advisory: In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anchore version equal to 0.7.0 have ### Response: Having vulnarability CVE-2020-11075 Advisory: In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1." }, { "instruction": "what vulnarability does anchorecli version equal to 0.7.0 have", "input": "", "output": "Having vulnarability CVE-2020-11075 Advisory: In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anchorecli version equal to 0.7.0 have ### Response: Having vulnarability CVE-2020-11075 Advisory: In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1." }, { "instruction": "what vulnarability does anchorpy version less then 0.6.4 have", "input": "", "output": "Having vulnarability CVE-2022-21699 Advisory: Anchorpy 0.6.4 updates its dependency 'ipython' to v8.0.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anchorpy version less then 0.6.4 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Anchorpy 0.6.4 updates its dependency 'ipython' to v8.0.1 to include a security fix." }, { "instruction": "what vulnarability does annotator version less then 0.11.2 have", "input": "", "output": "Having vulnarability PVE-2021-25615 Advisory: Annotator 0.11.2 fixes a bug that allowed authenticated users to overwrite annotations on which they did not have permissions.\r\nhttps://github.com/openannotation/annotator-store/issues/82", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does annotator version less then 0.11.2 have ### Response: Having vulnarability PVE-2021-25615 Advisory: Annotator 0.11.2 fixes a bug that allowed authenticated users to overwrite annotations on which they did not have permissions.\r\nhttps://github.com/openannotation/annotator-store/issues/82" }, { "instruction": "what vulnarability does anomalib version less then 0.5.0 have", "input": "", "output": "Having vulnarability CVE-2007-4559 Advisory: Anomalib 0.5.0 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anomalib version less then 0.5.0 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Anomalib 0.5.0 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267." }, { "instruction": "what vulnarability does ansible version less then 1.2.1 have", "input": "", "output": "Having vulnarability CVE-2013-2233 Advisory: Ansible 1.2.1 includes a fix for CVE-2013-2233: Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=980821", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansible version less then 1.2.1 have ### Response: Having vulnarability CVE-2013-2233 Advisory: Ansible 1.2.1 includes a fix for CVE-2013-2233: Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=980821" }, { "instruction": "what vulnarability does ansible-core version less then 1.9.5,equal to 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2023-99974 Advisory: Ansible 1.9.5 and 2.0.0.0 include a security fix: Information disclosure of sensitive data in log files.\r\nhttps://github.com/ansible/ansible/commit/a65543bbafbd328e7848a99d2a570f71c43a53a0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansible-core version less then 1.9.5,equal to 2.0.0 have ### Response: Having vulnarability PVE-2023-99974 Advisory: Ansible 1.9.5 and 2.0.0.0 include a security fix: Information disclosure of sensitive data in log files.\r\nhttps://github.com/ansible/ansible/commit/a65543bbafbd328e7848a99d2a570f71c43a53a0" }, { "instruction": "what vulnarability does ansible-doctor version less then 4.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-5764 Advisory: Ansible-doctor version 4.0.0 upgrades its dependency on ansible-core from version 2.13.13 to 2.14.12, in response to the identified vulnerabilities outlined in CVE-2023-5764. \r\nhttps://github.com/thegeeklab/ansible-doctor/pull/633", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansible-doctor version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-5764 Advisory: Ansible-doctor version 4.0.0 upgrades its dependency on ansible-core from version 2.13.13 to 2.14.12, in response to the identified vulnerabilities outlined in CVE-2023-5764. \r\nhttps://github.com/thegeeklab/ansible-doctor/pull/633" }, { "instruction": "what vulnarability does ansible-runner version less then 1.3.1 have", "input": "", "output": "Having vulnarability PVE-2021-36995 Advisory: Ansible-runner 1.3.1 sets safer default permissions when writing job events.\r\nhttps://github.com/ansible/ansible-runner/commit/dd2e549c6aadca4fb4f2cde11f1d4dca4b98964f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansible-runner version less then 1.3.1 have ### Response: Having vulnarability PVE-2021-36995 Advisory: Ansible-runner 1.3.1 sets safer default permissions when writing job events.\r\nhttps://github.com/ansible/ansible-runner/commit/dd2e549c6aadca4fb4f2cde11f1d4dca4b98964f" }, { "instruction": "what vulnarability does ansible-tower-cli version less then 3.2.0 have", "input": "", "output": "Having vulnarability CVE-2020-10684 Advisory: Ansible-tower-cli versions 2.7.17, 2.8.9 and 2.9.6 include a fix for CVE-2020-10684: A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansible-tower-cli version less then 3.2.0 have ### Response: Having vulnarability CVE-2020-10684 Advisory: Ansible-tower-cli versions 2.7.17, 2.8.9 and 2.9.6 include a fix for CVE-2020-10684: A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684" }, { "instruction": "what vulnarability does ansible-vault version less then 1.0.5 have", "input": "", "output": "Having vulnarability CVE-2017-2809 Advisory: An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.\r\nhttps://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansible-vault version less then 1.0.5 have ### Response: Having vulnarability CVE-2017-2809 Advisory: An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.\r\nhttps://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04" }, { "instruction": "what vulnarability does ansigenome version less then 0.6.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Ansigenome before 0.6.0 uses yaml.load() instead of yaml.safe_load(), allowing a code execution vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansigenome version less then 0.6.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Ansigenome before 0.6.0 uses yaml.load() instead of yaml.safe_load(), allowing a code execution vulnerability." }, { "instruction": "what vulnarability does ansitoimg version less then 2021.0.1 have", "input": "", "output": "Having vulnarability CVE-2020-35654 Advisory: Ansitoimg 2021.0.1 updates its dependency 'pillow' to a version >= 8.1.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansitoimg version less then 2021.0.1 have ### Response: Having vulnarability CVE-2020-35654 Advisory: Ansitoimg 2021.0.1 updates its dependency 'pillow' to a version >= 8.1.1 to include security fixes." }, { "instruction": "what vulnarability does ansys-geometry-core version greather then equal to 0.3.0,less then 0.3.3,greather then equal to 0.4.0,less then 0.4.12 have", "input": "", "output": "Having vulnarability CVE-2024-29189 Advisory: PyAnsys Geometry is a Python client library for the Ansys Geometry service and other CAD Ansys products. On file src/ansys/geometry/core/connection/product_instance.py, upon calling this method _start_program directly, users could exploit its usage to perform malicious operations on the current machine where the script is ran. This vulnerability is fixed in 0.3.3 and 0.4.12. See CVE-2024-29189.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansys-geometry-core version greather then equal to 0.3.0,less then 0.3.3,greather then equal to 0.4.0,less then 0.4.12 have ### Response: Having vulnarability CVE-2024-29189 Advisory: PyAnsys Geometry is a Python client library for the Ansys Geometry service and other CAD Ansys products. On file src/ansys/geometry/core/connection/product_instance.py, upon calling this method _start_program directly, users could exploit its usage to perform malicious operations on the current machine where the script is ran. This vulnerability is fixed in 0.3.3 and 0.4.12. See CVE-2024-29189." }, { "instruction": "what vulnarability does ansys-tools-repo-sync version less then 0.1.17 have", "input": "", "output": "Having vulnarability CVE-2020-26137 Advisory: Ansys-tools-repo-sync 0.1.17 updates its dependency 'urllib3' to v1.26.9 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ansys-tools-repo-sync version less then 0.1.17 have ### Response: Having vulnarability CVE-2020-26137 Advisory: Ansys-tools-repo-sync 0.1.17 updates its dependency 'urllib3' to v1.26.9 to include security fixes." }, { "instruction": "what vulnarability does anthropic version less then 0.3.2 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Anthropic 0.3.2 updates its dependency 'certifi' to version '2023.5.7' to include a security fix.\r\nhttps://github.com/anthropics/anthropic-sdk-python/pull/51", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anthropic version less then 0.3.2 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Anthropic 0.3.2 updates its dependency 'certifi' to version '2023.5.7' to include a security fix.\r\nhttps://github.com/anthropics/anthropic-sdk-python/pull/51" }, { "instruction": "what vulnarability does antilles-tools version greather then equal to 0,less then 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2021-3840 Advisory: A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does antilles-tools version greather then equal to 0,less then 1.0.1 have ### Response: Having vulnarability CVE-2021-3840 Advisory: A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi." }, { "instruction": "what vulnarability does anymotion-sdk version less then 1.2.5 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Anymotion-sdk 1.2.5 updates its dependency 'urllib3' to v1.26.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anymotion-sdk version less then 1.2.5 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Anymotion-sdk 1.2.5 updates its dependency 'urllib3' to v1.26.5 to include a security fix." }, { "instruction": "what vulnarability does ao3-poster version less then 0.0.7 have", "input": "", "output": "Having vulnarability CVE-2021-21240 Advisory: Ao3-poster version 0.0.7 updates its dependency 'httplib2' to v0.19.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ao3-poster version less then 0.0.7 have ### Response: Having vulnarability CVE-2021-21240 Advisory: Ao3-poster version 0.0.7 updates its dependency 'httplib2' to v0.19.0 to include security fixes." }, { "instruction": "what vulnarability does apache-age-python version greather then 0 have", "input": "", "output": "Having vulnarability CVE-2022-45786 Advisory: Apache-age-python is affected by CVE-2022-45786: There are issues with the AGE drivers for Golang and Python that enable SQL injections to occur. This impacts AGE for PostgreSQL 11 & AGE for PostgreSQL 12, all versions up-to-and-including 1.1.0, when using those drivers. The fix is to update to the latest Golang and Python drivers in addition to the latest version of AGE that is used for PostgreSQL 11 or PostgreSQL 12. The update of AGE will add a new function to enable parameterization of the cypher() function, which, in conjunction with the driver updates, will resolve this issue. Background (for those who want more information): After thoroughly researching this issue, we found that due to the nature of the cypher() function, it was not easy to parameterize the values passed into it. This enabled SQL injections, if the developer of the driver wasn't careful. The developer of the Golang and Pyton drivers didn't fully utilize parameterization, likely because of this, thus enabling SQL injections. The obvious fix to this issue is to use parameterization in the drivers for all PG SQL queries. However, parameterizing all PG queries is complicated by the fact that the cypher() function call itself cannot be parameterized directly, as it isn't a real function. At least, not the parameters that would take the graph name and cypher query. The reason the cypher() function cannot have those values parameterized is because the function is a placeholder and never actually runs. The cypher() function node, created by PG in the query tree, is transformed and replaced with a query tree for the actual cypher query during the analyze phase. The problem is that parameters - that would be passed in and that the cypher() function transform needs to be resolved - are only resolved in the execution phase, which is much later. Since the transform of the cypher() function needs to know the graph name and cypher query prior to execution, they can't be passed as parameters. The fix that we are testing right now, and are proposing to use, is to create a function that will be called prior to the execution of the cypher() function transform. This new function will allow values to be passed as parameters for the graph name and cypher query. As this command will be executed prior to the cypher() function transform, its values will be resolved. These values can then be cached for the immediately following cypher() function transform to use. As added features, the cached values will store the calling session's pid, for validation. And, the cypher() function transform will clear this cached information after function invocation, regardless of whether it was used. This method will allow the parameterizing of the cypher() function indirectly and provide a way to lock out SQL injection attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-age-python version greather then 0 have ### Response: Having vulnarability CVE-2022-45786 Advisory: Apache-age-python is affected by CVE-2022-45786: There are issues with the AGE drivers for Golang and Python that enable SQL injections to occur. This impacts AGE for PostgreSQL 11 & AGE for PostgreSQL 12, all versions up-to-and-including 1.1.0, when using those drivers. The fix is to update to the latest Golang and Python drivers in addition to the latest version of AGE that is used for PostgreSQL 11 or PostgreSQL 12. The update of AGE will add a new function to enable parameterization of the cypher() function, which, in conjunction with the driver updates, will resolve this issue. Background (for those who want more information): After thoroughly researching this issue, we found that due to the nature of the cypher() function, it was not easy to parameterize the values passed into it. This enabled SQL injections, if the developer of the driver wasn't careful. The developer of the Golang and Pyton drivers didn't fully utilize parameterization, likely because of this, thus enabling SQL injections. The obvious fix to this issue is to use parameterization in the drivers for all PG SQL queries. However, parameterizing all PG queries is complicated by the fact that the cypher() function call itself cannot be parameterized directly, as it isn't a real function. At least, not the parameters that would take the graph name and cypher query. The reason the cypher() function cannot have those values parameterized is because the function is a placeholder and never actually runs. The cypher() function node, created by PG in the query tree, is transformed and replaced with a query tree for the actual cypher query during the analyze phase. The problem is that parameters - that would be passed in and that the cypher() function transform needs to be resolved - are only resolved in the execution phase, which is much later. Since the transform of the cypher() function needs to know the graph name and cypher query prior to execution, they can't be passed as parameters. The fix that we are testing right now, and are proposing to use, is to create a function that will be called prior to the execution of the cypher() function transform. This new function will allow values to be passed as parameters for the graph name and cypher query. As this command will be executed prior to the cypher() function transform, its values will be resolved. These values can then be cached for the immediately following cypher() function transform to use. As added features, the cached values will store the calling session's pid, for validation. And, the cypher() function transform will clear this cached information after function invocation, regardless of whether it was used. This method will allow the parameterizing of the cypher() function indirectly and provide a way to lock out SQL injection attacks." }, { "instruction": "what vulnarability does apache-airflow version less then 1.10.0 have", "input": "", "output": "Having vulnarability PVE-2021-36832 Advisory: Apache-airflow 1.10.0 fixes XSS vulnerability in Variable endpoint.\r\nhttps://github.com/apache/airflow/commit/8f9bf94d82abc59336e642db64e575cee0cc5df0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-36832 Advisory: Apache-airflow 1.10.0 fixes XSS vulnerability in Variable endpoint.\r\nhttps://github.com/apache/airflow/commit/8f9bf94d82abc59336e642db64e575cee0cc5df0" }, { "instruction": "what vulnarability does apache-airflow-backport-providers-amazon version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2020-7753 Advisory: Apache-airflow-backport-providers-amazon 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-amazon version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2020-7753 Advisory: Apache-airflow-backport-providers-amazon 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-apache-beam version less then equal to 2021.3.13 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-apache-beam 2021.3.13 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-apache-beam version less then equal to 2021.3.13 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-apache-beam 2021.3.13 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-apache-hive version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-28706 Advisory: Apache-airflow-backport-providers-apache-hive is affected by CVE-2023-28706.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-apache-hive version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-28706 Advisory: Apache-airflow-backport-providers-apache-hive is affected by CVE-2023-28706." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-apache-pinot version less then equal to 2020.11.23 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-apache-pinot 2020.11.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-apache-pinot version less then equal to 2020.11.23 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-apache-pinot 2020.11.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-apache-spark version less then 4.1.3 have", "input": "", "output": "Having vulnarability CVE-2023-40272 Advisory: Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection allowing reading files on the Airflow server.\r\nIt is recommended to upgrade to a version that is not affected.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-apache-spark version less then 4.1.3 have ### Response: Having vulnarability CVE-2023-40272 Advisory: Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection allowing reading files on the Airflow server.\r\nIt is recommended to upgrade to a version that is not affected." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-cncf-kubernetes version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2021-41265 Advisory: Apache-airflow-backport-providers-cncf-kubernetes 2021.3.3 and prior versions ship with vulnerable dependencies (flask-appbuilder == 2.3.4).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-cncf-kubernetes version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2021-41265 Advisory: Apache-airflow-backport-providers-cncf-kubernetes 2021.3.3 and prior versions ship with vulnerable dependencies (flask-appbuilder == 2.3.4)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-databricks version less then equal to 2020.11.23 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-databricks 2020.11.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-databricks version less then equal to 2020.11.23 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-databricks 2020.11.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-datadog version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-datadog 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-datadog version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-datadog 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-dingding version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-dingding 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-dingding version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-dingding 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-discord version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-discord 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-discord version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-discord 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-docker version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-docker 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-docker version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-docker 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-elasticsearch version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-elasticsearch 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-elasticsearch version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-elasticsearch 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-email version less then equal to 2020.6.24 have", "input": "", "output": "Having vulnarability CVE-2021-29621 Advisory: Apache-airflow-backport-providers-email 2020.6.24 and prior versions ship with vulnerable dependencies (flask-appbuilder == 2.3.4).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-email version less then equal to 2020.6.24 have ### Response: Having vulnarability CVE-2021-29621 Advisory: Apache-airflow-backport-providers-email 2020.6.24 and prior versions ship with vulnerable dependencies (flask-appbuilder == 2.3.4)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-exasol version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-exasol 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-exasol version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-exasol 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-facebook version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-facebook 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-facebook version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-facebook 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-google version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-google 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-google version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-google 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-grpc version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-grpc 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-grpc version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-grpc 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-hashicorp version less then equal to 2021.3.23 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-hashicorp 2021.3.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-hashicorp version less then equal to 2021.3.23 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-hashicorp 2021.3.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-jdbc version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-jdbc 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-jdbc version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-jdbc 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-jenkins version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-jenkins 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-jenkins version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-jenkins 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-jira version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-jira 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-jira version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-jira 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-microsoft-azure version less then equal to 2021.3.13 have", "input": "", "output": "Having vulnarability CVE-2021-33026 Advisory: Apache-airflow-backport-providers-microsoft-azure 2021.3.13 and prior versions ship with vulnerable dependencies (flask-caching == 1.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-microsoft-azure version less then equal to 2021.3.13 have ### Response: Having vulnarability CVE-2021-33026 Advisory: Apache-airflow-backport-providers-microsoft-azure 2021.3.13 and prior versions ship with vulnerable dependencies (flask-caching == 1.3.3)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-microsoft-mssql version less then equal to 2021.3.23 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-microsoft-mssql 2021.3.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-microsoft-mssql version less then equal to 2021.3.23 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-microsoft-mssql 2021.3.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-microsoft-winrm version less then equal to 2021.3.23 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-microsoft-winrm 2021.3.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-microsoft-winrm version less then equal to 2021.3.23 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-microsoft-winrm 2021.3.23 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-mongo version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-mongo 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-mongo version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-mongo 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-mysql version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-mysql 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-mysql version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-mysql 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-neo4j version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-neo4j 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-neo4j version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-neo4j 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-odbc version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-odbc 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-odbc version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-odbc 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-openfaas version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-openfaas 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-openfaas version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-openfaas 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-opsgenie version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-opsgenie 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-opsgenie version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-opsgenie 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-oracle version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-oracle 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-oracle version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-oracle 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-pagerduty version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-pagerduty 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-pagerduty version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-pagerduty 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-papermill version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-papermill 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-papermill version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-papermill 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-plexus version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-plexus 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-plexus version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-plexus 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-postgres version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-postgres 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-postgres version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-postgres 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-presto version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-presto 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-presto version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-presto 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-qubole version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-qubole 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-qubole version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-qubole 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-redis version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-redis 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-redis version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-redis 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-salesforce version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-salesforce 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-salesforce version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-salesforce 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-segment version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-segment 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-segment version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-segment 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-sendgrid version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-sendgrid 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-sendgrid version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-sendgrid 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-sftp version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-sftp 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-sftp version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-sftp 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-singularity version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-singularity 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-singularity version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-singularity 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-slack version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2021-41265 Advisory: Apache-airflow-backport-providers-slack 2021.3.3 and prior versions ship with vulnerable dependencies (flask-appbuilder == 2.3.4).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-slack version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2021-41265 Advisory: Apache-airflow-backport-providers-slack 2021.3.3 and prior versions ship with vulnerable dependencies (flask-appbuilder == 2.3.4)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-smtp version less then equal to 2021.6.24 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-smtp 2021.6.24 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-smtp version less then equal to 2021.6.24 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-smtp 2021.6.24 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-snowflake version less then equal to 2021.3.13 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-snowflake 2021.3.13 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-snowflake version less then equal to 2021.3.13 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-snowflake 2021.3.13 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-ssh version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2021-37701 Advisory: Apache-airflow-backport-providers-ssh 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-ssh version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2021-37701 Advisory: Apache-airflow-backport-providers-ssh 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-tableau version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-tableau 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-tableau version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-tableau 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-telegram version less then equal to 2021.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-telegram 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-telegram version less then equal to 2021.3.3 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-telegram 2021.3.3 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-vertica version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-vertica 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-vertica version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-vertica 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-yandex version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-yandex 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-yandex version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-yandex 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-backport-providers-zendesk version less then equal to 2021.3.17 have", "input": "", "output": "Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-zendesk 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-backport-providers-zendesk version less then equal to 2021.3.17 have ### Response: Having vulnarability CVE-2023-25754 Advisory: apache-airflow-backport-providers-zendesk 2021.3.17 and prior versions ship with vulnerable dependencies (apache-airflow == 1.10.15)." }, { "instruction": "what vulnarability does apache-airflow-providers-airbyte version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-airbyte 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-airbyte version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-airbyte 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-amazon version less then equal to 4.0.0 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Apache-airflow-providers-amazon 4.0.0 and prior versions ship with vulnerable dependencies (pyjwt == 1.7.1).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-amazon version less then equal to 4.0.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Apache-airflow-providers-amazon 4.0.0 and prior versions ship with vulnerable dependencies (pyjwt == 1.7.1)." }, { "instruction": "what vulnarability does apache-airflow-providers-apache-drill version less then 2.3.2 have", "input": "", "output": "Having vulnarability CVE-2023-28707 Advisory: Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider. This issue affects Apache Airflow Drill Provider before 2.3.2.\r\nhttps://github.com/apache/airflow/pull/30215", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-apache-drill version less then 2.3.2 have ### Response: Having vulnarability CVE-2023-28707 Advisory: Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider. This issue affects Apache Airflow Drill Provider before 2.3.2.\r\nhttps://github.com/apache/airflow/pull/30215" }, { "instruction": "what vulnarability does apache-airflow-providers-apache-hdfs version less then 4.1.1 have", "input": "", "output": "Having vulnarability CVE-2023-41267 Advisory: In the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-apache-hdfs version less then 4.1.1 have ### Response: Having vulnarability CVE-2023-41267 Advisory: In the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1" }, { "instruction": "what vulnarability does apache-airflow-providers-apache-hive version less then 6.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-28706 Advisory: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Hive Provider before 6.0.0.\r\nhttps://github.com/apache/airflow/pull/30212", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-apache-hive version less then 6.0.0 have ### Response: Having vulnarability CVE-2023-28706 Advisory: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Hive Provider before 6.0.0.\r\nhttps://github.com/apache/airflow/pull/30212" }, { "instruction": "what vulnarability does apache-airflow-providers-apache-livy version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-apache-livy 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-apache-livy version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-apache-livy 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-apache-spark version less then 4.0.1 have", "input": "", "output": "Having vulnarability CVE-2023-28710 Advisory: Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Spark Provider. This issue affects Apache Airflow Spark Provider: before 4.0.1.\r\nhttps://github.com/apache/airflow/pull/30223", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-apache-spark version less then 4.0.1 have ### Response: Having vulnarability CVE-2023-28710 Advisory: Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Spark Provider. This issue affects Apache Airflow Spark Provider: before 4.0.1.\r\nhttps://github.com/apache/airflow/pull/30223" }, { "instruction": "what vulnarability does apache-airflow-providers-apache-sqoop version less then 4.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-27604 Advisory: Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections.\r\n\r\n It is recommended to upgrade to a version that is not affected.\r\nThis issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-apache-sqoop version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-27604 Advisory: Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections.\r\n\r\n It is recommended to upgrade to a version that is not affected.\r\nThis issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it." }, { "instruction": "what vulnarability does apache-airflow-providers-celery version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-celery 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-celery version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-celery 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-cloudant version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-cloudant 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-cloudant version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-cloudant 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-cncf-kubernetes version greather then equal to 5.0.0,less then 7.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-33234 Advisory: Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection.\r\n\r\nIn order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner.  Operators should upgrade to provider version 7.0.0 which has removed the vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-cncf-kubernetes version greather then equal to 5.0.0,less then 7.0.0 have ### Response: Having vulnarability CVE-2023-33234 Advisory: Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection.\r\n\r\nIn order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner.  Operators should upgrade to provider version 7.0.0 which has removed the vulnerability." }, { "instruction": "what vulnarability does apache-airflow-providers-databricks version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-databricks 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-databricks version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-databricks 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-datadog version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-datadog 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-datadog version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-datadog 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-docker version less then 3.0.0 have", "input": "", "output": "Having vulnarability CVE-2022-38362 Advisory: Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\r\nhttps://hackerone.com/reports/1671140", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-docker version less then 3.0.0 have ### Response: Having vulnarability CVE-2022-38362 Advisory: Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\r\nhttps://hackerone.com/reports/1671140" }, { "instruction": "what vulnarability does apache-airflow-providers-google version less then equal to 8.1.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: apache-airflow-providers-google 8.1.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-google version less then equal to 8.1.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: apache-airflow-providers-google 8.1.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-jdbc version less then 4.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-22886 Advisory: Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider. Airflow JDBC Provider Connection’s [Connection URL] parameters had no restrictions, which made it possible to implement RCE attacks via different type JDBC drivers, obtain airflow server permission. This issue affects Apache Airflow JDBC Provider: before 4.0.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-jdbc version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-22886 Advisory: Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider. Airflow JDBC Provider Connection’s [Connection URL] parameters had no restrictions, which made it possible to implement RCE attacks via different type JDBC drivers, obtain airflow server permission. This issue affects Apache Airflow JDBC Provider: before 4.0.0." }, { "instruction": "what vulnarability does apache-airflow-providers-jenkins version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Apache-airflow-providers-jenkins 3.0.0 and prior versions ship with vulnerable dependencies (pyjwt == 1.7.1).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-jenkins version less then equal to 3.0.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Apache-airflow-providers-jenkins 3.0.0 and prior versions ship with vulnerable dependencies (pyjwt == 1.7.1)." }, { "instruction": "what vulnarability does apache-airflow-providers-jira version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-jira 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-jira version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-jira 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-microsoft-azure version less then equal to 4.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-microsoft-azure 4.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-microsoft-azure version less then equal to 4.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-microsoft-azure 4.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-microsoft-mssql version less then 3.4.1 have", "input": "", "output": "Having vulnarability CVE-2023-35798 Advisory: Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.This vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specifically updating the connection to exploit it.\r\n\r\nThis issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1.\r\n\r\nIt is recommended to upgrade to a version that is not affected", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-microsoft-mssql version less then 3.4.1 have ### Response: Having vulnarability CVE-2023-35798 Advisory: Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.This vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specifically updating the connection to exploit it.\r\n\r\nThis issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1.\r\n\r\nIt is recommended to upgrade to a version that is not affected" }, { "instruction": "what vulnarability does apache-airflow-providers-mongo version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-mongo 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-mongo version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-mongo 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-mysql version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-mysql 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-mysql version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-mysql 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-odbc version less then 4.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-34395 Advisory: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider. In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution. Starting version 4.0.0 driver can be set only from the hook constructor. This issue affects Apache Airflow ODBC Provider: before 4.0.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-odbc version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-34395 Advisory: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider. In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution. Starting version 4.0.0 driver can be set only from the hook constructor. This issue affects Apache Airflow ODBC Provider: before 4.0.0." }, { "instruction": "what vulnarability does apache-airflow-providers-oracle version less then equal to 3.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Apache-airflow-providers-oracle 3.1.0 and prior versions ship with vulnerable dependencies (pyjwt == 1.7.1).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-oracle version less then equal to 3.1.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Apache-airflow-providers-oracle 3.1.0 and prior versions ship with vulnerable dependencies (pyjwt == 1.7.1)." }, { "instruction": "what vulnarability does apache-airflow-providers-pagerduty version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-pagerduty 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-pagerduty version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-pagerduty 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-plexus version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-plexus 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-plexus version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-plexus 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-postgres version less then equal to 5.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-postgres 5.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-postgres version less then equal to 5.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-postgres 5.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-presto version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-presto 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-presto version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-presto 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-redis version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-redis 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-redis version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-redis 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-sendgrid version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-sendgrid 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-sendgrid version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-sendgrid 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-sftp version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-sftp 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-sftp version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-sftp 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-slack version less then equal to 5.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-slack 5.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-slack version less then equal to 5.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-slack 5.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-snowflake version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-snowflake 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-snowflake version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Apache-airflow-providers-snowflake 3.0.0 and prior versions ship with vulnerable dependencies (wtforms == 2.3.3)." }, { "instruction": "what vulnarability does apache-airflow-providers-ssh version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Apache-airflow-providers-ssh 3.0.0 and prior versions ship with vulnerable dependencies (pyjwt == 1.7.1).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-ssh version less then equal to 3.0.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Apache-airflow-providers-ssh 3.0.0 and prior versions ship with vulnerable dependencies (pyjwt == 1.7.1)." }, { "instruction": "what vulnarability does apache-airflow-providers-tableau version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-tableau 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-tableau version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-tableau 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-airflow-providers-telegram version less then equal to 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-telegram 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-airflow-providers-telegram version less then equal to 3.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Apache-airflow-providers-telegram 3.0.0 and prior versions ship with vulnerable dependencies (click == 7.1.2)." }, { "instruction": "what vulnarability does apache-beam version less then 2.54.0 have", "input": "", "output": "Having vulnarability PVE-2023-63060 Advisory: Apache-beam 2.54.0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-beam version less then 2.54.0 have ### Response: Having vulnarability PVE-2023-63060 Advisory: Apache-beam 2.54.0" }, { "instruction": "what vulnarability does apache-dolphinscheduler version less then 1.3.6 have", "input": "", "output": "Having vulnarability CVE-2021-27644 Advisory: Prior to version 1.3.6, Apache DolphinScheduler had an issue where authorized users could exploit SQL injections in the data source center. However, this is only the case for MySQL data sources that use an internal login account password. The Python library PyDolphinScheduler generally follows the same versioning as its Java counterpart. This remains the case until November 7, 2022, or until PyDolphinScheduler reached version 4.0.0.\r\n\r\nhttps://dolphinscheduler.apache.org/python/main/index.html#version", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-dolphinscheduler version less then 1.3.6 have ### Response: Having vulnarability CVE-2021-27644 Advisory: Prior to version 1.3.6, Apache DolphinScheduler had an issue where authorized users could exploit SQL injections in the data source center. However, this is only the case for MySQL data sources that use an internal login account password. The Python library PyDolphinScheduler generally follows the same versioning as its Java counterpart. This remains the case until November 7, 2022, or until PyDolphinScheduler reached version 4.0.0.\r\n\r\nhttps://dolphinscheduler.apache.org/python/main/index.html#version" }, { "instruction": "what vulnarability does apache-flink version less then 1.14.2 have", "input": "", "output": "Having vulnarability CVE-2021-44228 Advisory: Apache-flink 1.14.2 updates its dependency 'log4j' to v2.16.0 to include security fixes.\r\nhttps://github.com/apache/flink/commit/361ce6591069b2f7317f1c181cdaf7965615415c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-flink version less then 1.14.2 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Apache-flink 1.14.2 updates its dependency 'log4j' to v2.16.0 to include security fixes.\r\nhttps://github.com/apache/flink/commit/361ce6591069b2f7317f1c181cdaf7965615415c" }, { "instruction": "what vulnarability does apache-iotdb version less then 0.13.1 have", "input": "", "output": "Having vulnarability CVE-2022-38369 Advisory: Apache IoTDB version 0.13.0 is vulnerable by session id attack. Users should upgrade to version 0.13.1 which addresses this issue.\r\nAlias:\r\nGHSA-g6vm-3ch8-c6jq", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-iotdb version less then 0.13.1 have ### Response: Having vulnarability CVE-2022-38369 Advisory: Apache IoTDB version 0.13.0 is vulnerable by session id attack. Users should upgrade to version 0.13.1 which addresses this issue.\r\nAlias:\r\nGHSA-g6vm-3ch8-c6jq" }, { "instruction": "what vulnarability does apache-libcloud version less then 0.11.1 have", "input": "", "output": "Having vulnarability CVE-2012-3446 Advisory: Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-libcloud version less then 0.11.1 have ### Response: Having vulnarability CVE-2012-3446 Advisory: Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate." }, { "instruction": "what vulnarability does apache-skywalking version greather then equal to 0,less then 8.1.0 have", "input": "", "output": "Having vulnarability CVE-2020-13921 Advisory: This vulnerability in Apache SkyWalking affects versions before 8.1.0 with H2, MySQL, or TiDB storage and involves SQL injection risks in wildcard query cases.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-skywalking version greather then equal to 0,less then 8.1.0 have ### Response: Having vulnarability CVE-2020-13921 Advisory: This vulnerability in Apache SkyWalking affects versions before 8.1.0 with H2, MySQL, or TiDB storage and involves SQL injection risks in wildcard query cases." }, { "instruction": "what vulnarability does apache-superset version less then 0.14.0 have", "input": "", "output": "Having vulnarability PVE-2021-39494 Advisory: Apache-superset 0.14.0 improves the security scheme (#1587).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-superset version less then 0.14.0 have ### Response: Having vulnarability PVE-2021-39494 Advisory: Apache-superset 0.14.0 improves the security scheme (#1587)." }, { "instruction": "what vulnarability does apache-trafficcontrol version less then 3.1.0 have", "input": "", "output": "Having vulnarability PVE-2022-51294 Advisory: Apache Traffic Control 3.1.0 (Python client) supports Apache-trafficcontrol 6.1.0, that sets files with potential sensitive data with 0600 permissions, to avoid users other than ats or root can read them.\r\nhttps://github.com/apache/trafficcontrol/issues/6032", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-trafficcontrol version less then 3.1.0 have ### Response: Having vulnarability PVE-2022-51294 Advisory: Apache Traffic Control 3.1.0 (Python client) supports Apache-trafficcontrol 6.1.0, that sets files with potential sensitive data with 0600 permissions, to avoid users other than ats or root can read them.\r\nhttps://github.com/apache/trafficcontrol/issues/6032" }, { "instruction": "what vulnarability does apache-tvm version less then 0.6 have", "input": "", "output": "Having vulnarability CVE-2019-9658 Advisory: Apache-tvm 0.6 updates its Maven dependency 'checkstyle' requirements to versions [8.18,) to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apache-tvm version less then 0.6 have ### Response: Having vulnarability CVE-2019-9658 Advisory: Apache-tvm 0.6 updates its Maven dependency 'checkstyle' requirements to versions [8.18,) to include a security fix." }, { "instruction": "what vulnarability does api-client-pydantic version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2021-28363 Advisory: Api-client-pydantic 1.1.0 updates its dependency 'urllib3' to v1.26.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does api-client-pydantic version less then 1.1.0 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Api-client-pydantic 1.1.0 updates its dependency 'urllib3' to v1.26.4 to include a security fix." }, { "instruction": "what vulnarability does api-res-py version equal to 0.1 have", "input": "", "output": "Having vulnarability CVE-2022-31313 Advisory: Api-res-py 0.1 contains a backdoor due to the presence of the malicious 'request' dependency.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does api-res-py version equal to 0.1 have ### Response: Having vulnarability CVE-2022-31313 Advisory: Api-res-py 0.1 contains a backdoor due to the presence of the malicious 'request' dependency.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer/" }, { "instruction": "what vulnarability does apicolor version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53271 Advisory: Apicolor is a malicious package. It uses steganography to hide and install a backdoor in your system.\r\nhttps://www.darkreading.com/threat-intelligence/malicious-pypi-package-steganography-download-malware", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apicolor version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53271 Advisory: Apicolor is a malicious package. It uses steganography to hide and install a backdoor in your system.\r\nhttps://www.darkreading.com/threat-intelligence/malicious-pypi-package-steganography-download-malware" }, { "instruction": "what vulnarability does apidev-coop version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2021-34979 Advisory: apidev-coop is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apidev-coop version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34979 Advisory: apidev-coop is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/" }, { "instruction": "what vulnarability does apify version less then 2.1.4 have", "input": "", "output": "Having vulnarability PVE-2024-63511 Advisory: Apify 2.1.4 addresses a critical bug related to WebGL injection. It was causing the system to be detected and blocked by certain fingerprinting systems with Kasada protection. This fix improves the system's compatibility with such systems, enhancing overall performance and reliability.\r\nhttps://github.com/apify/fingerprint-suite/pull/100\r\nhttps://github.com/apify/fingerprint-suite/commit/0c4d05ae0c6badc441a53578a0ecdecd933294cb", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apify version less then 2.1.4 have ### Response: Having vulnarability PVE-2024-63511 Advisory: Apify 2.1.4 addresses a critical bug related to WebGL injection. It was causing the system to be detected and blocked by certain fingerprinting systems with Kasada protection. This fix improves the system's compatibility with such systems, enhancing overall performance and reliability.\r\nhttps://github.com/apify/fingerprint-suite/pull/100\r\nhttps://github.com/apify/fingerprint-suite/commit/0c4d05ae0c6badc441a53578a0ecdecd933294cb" }, { "instruction": "what vulnarability does apimatic-core version less then 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Apimatic-core 0.2.0 updates its dependency 'setuptools' to v65.5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apimatic-core version less then 0.2.0 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Apimatic-core 0.2.0 updates its dependency 'setuptools' to v65.5.1 to include a security fix." }, { "instruction": "what vulnarability does apimatic-requests-client-adapter version less then 0.1.4 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Apimatic-requests-client-adapter 0.1.4 includes its dependency 'requests' to version '2.31.0' to include a fix for an Information Exposure vulnerability.\r\nhttps://github.com/apimatic/requests-client-adapter/pull/23\r\nhttps://github.com/apimatic/requests-client-adapter/commit/c8f0b7b71e1c3826492ce3aead3b81ed097eedf4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apimatic-requests-client-adapter version less then 0.1.4 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Apimatic-requests-client-adapter 0.1.4 includes its dependency 'requests' to version '2.31.0' to include a fix for an Information Exposure vulnerability.\r\nhttps://github.com/apimatic/requests-client-adapter/pull/23\r\nhttps://github.com/apimatic/requests-client-adapter/commit/c8f0b7b71e1c3826492ce3aead3b81ed097eedf4" }, { "instruction": "what vulnarability does apischema version less then 0.17.0 have", "input": "", "output": "Having vulnarability PVE-2021-43741 Advisory: Apischema 0.17.0 deprecates arbitrary exceptions in deserialization to avoid leaking implementation details if unwanted exceptions are not properly catched.\r\nhttps://github.com/wyfo/apischema/issues/233", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apischema version less then 0.17.0 have ### Response: Having vulnarability PVE-2021-43741 Advisory: Apischema 0.17.0 deprecates arbitrary exceptions in deserialization to avoid leaking implementation details if unwanted exceptions are not properly catched.\r\nhttps://github.com/wyfo/apischema/issues/233" }, { "instruction": "what vulnarability does apispec version less then 1.0.0b2 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apispec version less then 1.0.0b2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function." }, { "instruction": "what vulnarability does apkleaks version less then 2.0.6 have", "input": "", "output": "Having vulnarability CVE-2021-21386 Advisory: APKLeaks is an open-source project for scanning APK file for URIs, endpoints & secrets. APKLeaks prior to v2.0.3 allows remote attackers to execute arbitrary OS commands via package name inside application manifest. An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended behavior through malicious package name. The problem is fixed in version v2.0.6-dev and above.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apkleaks version less then 2.0.6 have ### Response: Having vulnarability CVE-2021-21386 Advisory: APKLeaks is an open-source project for scanning APK file for URIs, endpoints & secrets. APKLeaks prior to v2.0.3 allows remote attackers to execute arbitrary OS commands via package name inside application manifest. An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended behavior through malicious package name. The problem is fixed in version v2.0.6-dev and above." }, { "instruction": "what vulnarability does appdaemon version less then 3.0.4 have", "input": "", "output": "Having vulnarability PVE-2021-37096 Advisory: Appdaemon 3.0.4 uses yaml.Safeloader to work around a known security issue with PyYaml.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does appdaemon version less then 3.0.4 have ### Response: Having vulnarability PVE-2021-37096 Advisory: Appdaemon 3.0.4 uses yaml.Safeloader to work around a known security issue with PyYaml." }, { "instruction": "what vulnarability does appdaemontestframework version less then 2.0.1 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Appdaemontestframework 2.0.1 updates the minimum requirement for its dependency 'requests' to >=2.20.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does appdaemontestframework version less then 2.0.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Appdaemontestframework 2.0.1 updates the minimum requirement for its dependency 'requests' to >=2.20.0 to include a security fix." }, { "instruction": "what vulnarability does appfl version less then 0.4.0 have", "input": "", "output": "Having vulnarability PVE-2024-63217 Advisory: Appfl 0.4.0 mitigates race condition vulnerabilities in its Globus Communication file system. The previous version allowed concurrent attempts by multiple clients to download the MNIST dataset and the global model to the same directories, leading to potential data corruption. This version introduces a pre-download script for the MNIST dataset and assigns unique output directories for each client, preventing simultaneous write operations to the same file and enhancing overall application robustness.\r\nhttps://github.com/APPFL/APPFL/pull/158", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does appfl version less then 0.4.0 have ### Response: Having vulnarability PVE-2024-63217 Advisory: Appfl 0.4.0 mitigates race condition vulnerabilities in its Globus Communication file system. The previous version allowed concurrent attempts by multiple clients to download the MNIST dataset and the global model to the same directories, leading to potential data corruption. This version introduces a pre-download script for the MNIST dataset and assigns unique output directories for each client, preventing simultaneous write operations to the same file and enhancing overall application robustness.\r\nhttps://github.com/APPFL/APPFL/pull/158" }, { "instruction": "what vulnarability does apphelpers version less then 0.9.2 have", "input": "", "output": "Having vulnarability PVE-2021-37151 Advisory: To secure the API access, apphelpers 0.9.2 adds the new options `groups_forbidden` and `groups_required`.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apphelpers version less then 0.9.2 have ### Response: Having vulnarability PVE-2021-37151 Advisory: To secure the API access, apphelpers 0.9.2 adds the new options `groups_forbidden` and `groups_required`." }, { "instruction": "what vulnarability does appia version less then 5.3 have", "input": "", "output": "Having vulnarability PVE-2022-52425 Advisory: Appia 5.3 removes the usage of hardcoded credentials in docker-compose.\r\nhttps://github.com/PlethoraChutney/Appia/commit/82c65d7dcfe1cc064abcb29980ed49e92488174a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does appia version less then 5.3 have ### Response: Having vulnarability PVE-2022-52425 Advisory: Appia 5.3 removes the usage of hardcoded credentials in docker-compose.\r\nhttps://github.com/PlethoraChutney/Appia/commit/82c65d7dcfe1cc064abcb29980ed49e92488174a" }, { "instruction": "what vulnarability does apprise version greather then equal to 0,less then 0.9.5.1 have", "input": "", "output": "Having vulnarability CVE-2021-39229 Advisory: Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack on an inefficient regular expression. The vulnerable regular expression is [here](https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359). The problem has been patched in release version 0.9.5.1. Users who are unable to upgrade are advised to remove `apprise/plugins/NotifyIFTTT.py` to eliminate the service.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does apprise version greather then equal to 0,less then 0.9.5.1 have ### Response: Having vulnarability CVE-2021-39229 Advisory: Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack on an inefficient regular expression. The vulnerable regular expression is [here](https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359). The problem has been patched in release version 0.9.5.1. Users who are unable to upgrade are advised to remove `apprise/plugins/NotifyIFTTT.py` to eliminate the service." }, { "instruction": "what vulnarability does appwrite version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-40600 Advisory: Appwrite (SDK for Python) version 0.2.0 adds support for appwrite 0.8.0. Appwrite 0.7.1 fixed an XSS vulnerability in the appwrite console.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does appwrite version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-40600 Advisory: Appwrite (SDK for Python) version 0.2.0 adds support for appwrite 0.8.0. Appwrite 0.7.1 fixed an XSS vulnerability in the appwrite console." }, { "instruction": "what vulnarability does aptdaemon version less then equal to 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2020-15703 Advisory: There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aptdaemon version less then equal to 1.1.1 have ### Response: Having vulnarability CVE-2020-15703 Advisory: There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root." }, { "instruction": "what vulnarability does aqtinstall version less then 2.1.0 have", "input": "", "output": "Having vulnarability PVE-2022-48137 Advisory: Aqtinstall 2.1.0 uses SHA-256 checksums from trusted mirrors only.\r\nhttps://github.com/miurahr/aqtinstall/pull/493", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aqtinstall version less then 2.1.0 have ### Response: Having vulnarability PVE-2022-48137 Advisory: Aqtinstall 2.1.0 uses SHA-256 checksums from trusted mirrors only.\r\nhttps://github.com/miurahr/aqtinstall/pull/493" }, { "instruction": "what vulnarability does aquilify version less then 1.12.0 have", "input": "", "output": "Having vulnarability PVE-2024-65762 Advisory: Aquilify version 1.12.0 has enhanced its CSRF middleware protection, strengthening defenses against potential security vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aquilify version less then 1.12.0 have ### Response: Having vulnarability PVE-2024-65762 Advisory: Aquilify version 1.12.0 has enhanced its CSRF middleware protection, strengthening defenses against potential security vulnerabilities." }, { "instruction": "what vulnarability does arches version greather then equal to 0,less then 6.1.2,greather then equal to 6.2.0,less then 6.2.1,greather then equal to 7.0.0,less then 7.2.0 have", "input": "", "output": "Having vulnarability CVE-2022-41892 Advisory: ### Impact\nWith a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database. \nAnyone running the impacted versions (<=6.1.1, 6.2.0, >=7.0.0, <=7.1.1) should upgrade as soon as possible.\n\n### Patches\nThe problem has been patched in the following versions: [6.1.2](https://pypi.org/project/arches/6.1.2/), [6.2.1](https://pypi.org/project/arches/6.2.1/), and [7.2.0](https://pypi.org/project/arches/7.2.0/)\nUsers are strongly urged to upgrade to the most recent relevant patch.\n\n### Workarounds\nThere are no workarounds.\n\n### General References \nhttps://www.w3schools.com/sql/sql_injection.asp\nhttps://en.wikipedia.org/wiki/SQL_injection\n\n### For more information\nPost any questions to the [Arches project forum](https://community.archesproject.org/).\n", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does arches version greather then equal to 0,less then 6.1.2,greather then equal to 6.2.0,less then 6.2.1,greather then equal to 7.0.0,less then 7.2.0 have ### Response: Having vulnarability CVE-2022-41892 Advisory: ### Impact\nWith a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database. \nAnyone running the impacted versions (<=6.1.1, 6.2.0, >=7.0.0, <=7.1.1) should upgrade as soon as possible.\n\n### Patches\nThe problem has been patched in the following versions: [6.1.2](https://pypi.org/project/arches/6.1.2/), [6.2.1](https://pypi.org/project/arches/6.2.1/), and [7.2.0](https://pypi.org/project/arches/7.2.0/)\nUsers are strongly urged to upgrade to the most recent relevant patch.\n\n### Workarounds\nThere are no workarounds.\n\n### General References \nhttps://www.w3schools.com/sql/sql_injection.asp\nhttps://en.wikipedia.org/wiki/SQL_injection\n\n### For more information\nPost any questions to the [Arches project forum](https://community.archesproject.org/).\n" }, { "instruction": "what vulnarability does archi version less then equal to 0.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-37702 Advisory: Archi 0.2.2 is bundled with libarchive 3.4.2. However, libarchive before version 3.4.3 is known to not be secure. See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does archi version less then equal to 0.2.2 have ### Response: Having vulnarability PVE-2021-37702 Advisory: Archi 0.2.2 is bundled with libarchive 3.4.2. However, libarchive before version 3.4.3 is known to not be secure. See: ." }, { "instruction": "what vulnarability does archinstall version less then 2.4.0.rc1 have", "input": "", "output": "Having vulnarability PVE-2022-47799 Advisory: Archinstall 2.4.0.rc1 splits 'disk_layouts', 'creds' and 'conf' data into separate files to comply with security concerns when sharing user configurations publicly.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does archinstall version less then 2.4.0.rc1 have ### Response: Having vulnarability PVE-2022-47799 Advisory: Archinstall 2.4.0.rc1 splits 'disk_layouts', 'creds' and 'conf' data into separate files to comply with security concerns when sharing user configurations publicly." }, { "instruction": "what vulnarability does archivebox version greather then equal to 0 have", "input": "", "output": "Having vulnarability CVE-2023-45815 Advisory: ArchiveBox is an open source self-hosted web archiving system. Any users who are using the `wget` extractor and view the content it outputs. The impact is potentially severe if you are logged in to the ArchiveBox admin site in the same browser session and view an archived malicious page designed to target your ArchiveBox instance. Malicious Javascript could potentially act using your logged-in admin credentials and add/remove/modify snapshots, add/remove/modify ArchiveBox users, and generally do anything an admin user could do. The impact is less severe for non-logged-in users, as malicious Javascript cannot *modify* any archives, but it can still *read* all the other archived content by fetching the snapshot index and iterating through it. Because all of ArchiveBox's archived content is served from the same host and port as the admin panel, when archived pages are viewed the JS executes in the same context as all the other archived pages (and the admin panel), defeating most of the browser's usual CORS/CSRF security protections and leading to this issue. A patch is being developed in https://github.com/ArchiveBox/ArchiveBox/issues/239. As a mitigation for this issue would be to disable the wget extractor by setting `archivebox config --set SAVE_WGET=False`, ensure you are always logged out, or serve only a [static HTML version](https://github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#2-export-and-host-it-as-static-html) of your archive.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does archivebox version greather then equal to 0 have ### Response: Having vulnarability CVE-2023-45815 Advisory: ArchiveBox is an open source self-hosted web archiving system. Any users who are using the `wget` extractor and view the content it outputs. The impact is potentially severe if you are logged in to the ArchiveBox admin site in the same browser session and view an archived malicious page designed to target your ArchiveBox instance. Malicious Javascript could potentially act using your logged-in admin credentials and add/remove/modify snapshots, add/remove/modify ArchiveBox users, and generally do anything an admin user could do. The impact is less severe for non-logged-in users, as malicious Javascript cannot *modify* any archives, but it can still *read* all the other archived content by fetching the snapshot index and iterating through it. Because all of ArchiveBox's archived content is served from the same host and port as the admin panel, when archived pages are viewed the JS executes in the same context as all the other archived pages (and the admin panel), defeating most of the browser's usual CORS/CSRF security protections and leading to this issue. A patch is being developed in https://github.com/ArchiveBox/ArchiveBox/issues/239. As a mitigation for this issue would be to disable the wget extractor by setting `archivebox config --set SAVE_WGET=False`, ensure you are always logged out, or serve only a [static HTML version](https://github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#2-export-and-host-it-as-static-html) of your archive." }, { "instruction": "what vulnarability does archivy version less then 1.0.1 have", "input": "", "output": "Having vulnarability PVE-2023-59112 Advisory: Archivy 1.0.1 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/archivy/archivy/pull/201", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does archivy version less then 1.0.1 have ### Response: Having vulnarability PVE-2023-59112 Advisory: Archivy 1.0.1 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/archivy/archivy/pull/201" }, { "instruction": "what vulnarability does archmage version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2015-1589 Advisory: Directory traversal vulnerability in arCHMage 0.2.4 allows remote attackers to write to arbitrary files via a .. (dot dot) in a CHM file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does archmage version less then 0.3.1 have ### Response: Having vulnarability CVE-2015-1589 Advisory: Directory traversal vulnerability in arCHMage 0.2.4 allows remote attackers to write to arbitrary files via a .. (dot dot) in a CHM file." }, { "instruction": "what vulnarability does arcticdb version less then 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2023-61148 Advisory: Arcticdb 3.0.0 includes a fix for an information disclosure vulnerability: Azure and S3 write credentials are stored in plaintext.\r\nhttps://github.com/man-group/ArcticDB/issues/802", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does arcticdb version less then 3.0.0 have ### Response: Having vulnarability PVE-2023-61148 Advisory: Arcticdb 3.0.0 includes a fix for an information disclosure vulnerability: Azure and S3 write credentials are stored in plaintext.\r\nhttps://github.com/man-group/ArcticDB/issues/802" }, { "instruction": "what vulnarability does argilla version less then 0.13.0 have", "input": "", "output": "Having vulnarability CVE-2020-24025 Advisory: Argilla 0.13.0 stops requiring its NPM dependency 'node-sass' to avoid security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does argilla version less then 0.13.0 have ### Response: Having vulnarability CVE-2020-24025 Advisory: Argilla 0.13.0 stops requiring its NPM dependency 'node-sass' to avoid security issues." }, { "instruction": "what vulnarability does argo-workflows version less then 5.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-46473 Advisory: Argo-workflows 5.0.0 (Python SDK) is compatible with Argo-workflows core v3.0.0, which fixes a XSS vulnerability.\r\nhttps://github.com/argoproj/argo-workflows/pull/3975", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does argo-workflows version less then 5.0.0 have ### Response: Having vulnarability PVE-2022-46473 Advisory: Argo-workflows 5.0.0 (Python SDK) is compatible with Argo-workflows core v3.0.0, which fixes a XSS vulnerability.\r\nhttps://github.com/argoproj/argo-workflows/pull/3975" }, { "instruction": "what vulnarability does aries-cloudagent version less then 0.12.0 have", "input": "", "output": "Having vulnarability PVE-2024-67615 Advisory: Aries-cloudagent 0.12.0 upgrades its readthedocs-sphinx-search from 0.1.1 to 1.3.2 in response to GHSA-xgfm-fjx6-62mj: This vulnerability could have let attackers insert arbitrary HTML into search results via a crafted search query, due to inadequate escaping of user content.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aries-cloudagent version less then 0.12.0 have ### Response: Having vulnarability PVE-2024-67615 Advisory: Aries-cloudagent 0.12.0 upgrades its readthedocs-sphinx-search from 0.1.1 to 1.3.2 in response to GHSA-xgfm-fjx6-62mj: This vulnerability could have let attackers insert arbitrary HTML into search results via a crafted search query, due to inadequate escaping of user content." }, { "instruction": "what vulnarability does arjun version less then 2.1.5 have", "input": "", "output": "Having vulnarability PVE-2023-62351 Advisory: Arjun 2.1.5 includes fixes for catastrophic backtracking vulnerabilities.\r\nhttps://github.com/s0md3v/Arjun/commit/0f5be57c3f82e6004f1224f9c797f2fca838493c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does arjun version less then 2.1.5 have ### Response: Having vulnarability PVE-2023-62351 Advisory: Arjun 2.1.5 includes fixes for catastrophic backtracking vulnerabilities.\r\nhttps://github.com/s0md3v/Arjun/commit/0f5be57c3f82e6004f1224f9c797f2fca838493c" }, { "instruction": "what vulnarability does arrayfire version greather then equal to 0,less then 3.6.0 have", "input": "", "output": "Having vulnarability CVE-2018-20998 Advisory: An issue was discovered in the arrayfire crate before 3.6.0 for Rust. Addition of the repr() attribute to an enum is mishandled, leading to memory corruption.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does arrayfire version greather then equal to 0,less then 3.6.0 have ### Response: Having vulnarability CVE-2018-20998 Advisory: An issue was discovered in the arrayfire crate before 3.6.0 for Rust. Addition of the repr() attribute to an enum is mishandled, leading to memory corruption." }, { "instruction": "what vulnarability does arrendatools.plantillas version less then 0.4.3 have", "input": "", "output": "Having vulnarability PVE-2024-66926 Advisory: Arrendatools.plantillas version 0.4.3 updates the plantilla to automatically escape content, setting autoscape to True.\r\nhttps://github.com/hokus15/ArrendaToolsPlantillas/commit/75878a8a5a2e505f8aaa7b86e2b764a42034d940", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does arrendatools.plantillas version less then 0.4.3 have ### Response: Having vulnarability PVE-2024-66926 Advisory: Arrendatools.plantillas version 0.4.3 updates the plantilla to automatically escape content, setting autoscape to True.\r\nhttps://github.com/hokus15/ArrendaToolsPlantillas/commit/75878a8a5a2e505f8aaa7b86e2b764a42034d940" }, { "instruction": "what vulnarability does arrnounced version less then 0.4 have", "input": "", "output": "Having vulnarability CVE-2013-1665 Advisory: Arrnounced 0.4 replaces XML parser with defusedxml to prevent XML attacks.\r\nhttps://github.com/weannounce/arrnounced/commit/5a1d186b32162b317b1762b8602342b0b3050bda", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does arrnounced version less then 0.4 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Arrnounced 0.4 replaces XML parser with defusedxml to prevent XML attacks.\r\nhttps://github.com/weannounce/arrnounced/commit/5a1d186b32162b317b1762b8602342b0b3050bda" }, { "instruction": "what vulnarability does arrow-pd-parser version less then 1.3.0 have", "input": "", "output": "Having vulnarability CVE-2021-41496 Advisory: Arrow-pd-parser 1.3.0 updates its dependency 'numpy' to v1.23.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does arrow-pd-parser version less then 1.3.0 have ### Response: Having vulnarability CVE-2021-41496 Advisory: Arrow-pd-parser 1.3.0 updates its dependency 'numpy' to v1.23.1 to include security fixes." }, { "instruction": "what vulnarability does aryi version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45478 Advisory: Aryi is a malicious package. It steals users' credit card numbers and Discord tokens.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-packages-caught-stealing-credit-card-numbers-discord-tokens/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aryi version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45478 Advisory: Aryi is a malicious package. It steals users' credit card numbers and Discord tokens.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-packages-caught-stealing-credit-card-numbers-discord-tokens/" }, { "instruction": "what vulnarability does asciidoc version less then 8.6.6 have", "input": "", "output": "Having vulnarability PVE-2021-39514 Advisory: Asciidoc 8.6.6 removes the use of 'eval()' on untrusted input to disallow malicious code execution.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does asciidoc version less then 8.6.6 have ### Response: Having vulnarability PVE-2021-39514 Advisory: Asciidoc 8.6.6 removes the use of 'eval()' on untrusted input to disallow malicious code execution." }, { "instruction": "what vulnarability does asgi-csrf version less then 0.3 have", "input": "", "output": "Having vulnarability PVE-2021-38376 Advisory: Cookie values in asgi-csrf 0.3 are now signed to prevent subdomain attacks. See also: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does asgi-csrf version less then 0.3 have ### Response: Having vulnarability PVE-2021-38376 Advisory: Cookie values in asgi-csrf 0.3 are now signed to prevent subdomain attacks. See also: ." }, { "instruction": "what vulnarability does askbot version less then 0.7.49 have", "input": "", "output": "Having vulnarability CVE-2014-2236 Advisory: Multiple cross-site scripting (XSS) vulnerabilities in Askbot before 0.7.49 allow remote attackers to inject arbitrary web script or HTML via vectors related to the (1) tag or (2) user search forms.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does askbot version less then 0.7.49 have ### Response: Having vulnarability CVE-2014-2236 Advisory: Multiple cross-site scripting (XSS) vulnerabilities in Askbot before 0.7.49 allow remote attackers to inject arbitrary web script or HTML via vectors related to the (1) tag or (2) user search forms." }, { "instruction": "what vulnarability does aspeak version less then 6.0.0 have", "input": "", "output": "Having vulnarability PVE-2023-59242 Advisory: Aspeak 6.0.0 updates its dependency 'openssl' to version '0.10.55' to include a security fix.\r\nhttps://github.com/kxxt/aspeak/pull/76\r\nhttps://github.com/kxxt/aspeak/commit/17cbe32ed4c17bc57683688390691686946a4cbc\r\nhttps://github.com/advisories/GHSA-xcf7-rvmh-g6q4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aspeak version less then 6.0.0 have ### Response: Having vulnarability PVE-2023-59242 Advisory: Aspeak 6.0.0 updates its dependency 'openssl' to version '0.10.55' to include a security fix.\r\nhttps://github.com/kxxt/aspeak/pull/76\r\nhttps://github.com/kxxt/aspeak/commit/17cbe32ed4c17bc57683688390691686946a4cbc\r\nhttps://github.com/advisories/GHSA-xcf7-rvmh-g6q4" }, { "instruction": "what vulnarability does aspen version less then 0.39 have", "input": "", "output": "Having vulnarability PVE-2021-36873 Advisory: Aspen 0.39 fixes two security bugs related to CRLF injection - https://github.com/gratipay/security-qf35us/issues/1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aspen version less then 0.39 have ### Response: Having vulnarability PVE-2021-36873 Advisory: Aspen 0.39 fixes two security bugs related to CRLF injection - https://github.com/gratipay/security-qf35us/issues/1" }, { "instruction": "what vulnarability does asterix-decoder version greather then equal to 0,less then 0.7.2 have", "input": "", "output": "Having vulnarability CVE-2021-44144 Advisory: Croatia Control Asterix 2.8.1 (python_v0.7.2) has a heap-based buffer over-read, with additional details to be disclosed at a later date.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does asterix-decoder version greather then equal to 0,less then 0.7.2 have ### Response: Having vulnarability CVE-2021-44144 Advisory: Croatia Control Asterix 2.8.1 (python_v0.7.2) has a heap-based buffer over-read, with additional details to be disclosed at a later date." }, { "instruction": "what vulnarability does astrometry-net-client version less then 0.2.9 have", "input": "", "output": "Having vulnarability CVE-2022-3786 Advisory: Astrometry-net-client 0.2.9 updates its dependency 'cryptography' to v38.0.3 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does astrometry-net-client version less then 0.2.9 have ### Response: Having vulnarability CVE-2022-3786 Advisory: Astrometry-net-client 0.2.9 updates its dependency 'cryptography' to v38.0.3 to include security fixes." }, { "instruction": "what vulnarability does astropy version less then 3.0.1 have", "input": "", "output": "Having vulnarability CVE-2019-1010060 Advisory: Astropy 3.0.1 updates cfitsio to v3.43: NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43. NOTE: this CVE refers to the issues not covered by CVE-2018-3846, CVE-2018-3847, CVE-2018-3848, and CVE-2018-3849. One example is ftp_status in drvrnet.c mishandling a long string beginning with a '4' character.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does astropy version less then 3.0.1 have ### Response: Having vulnarability CVE-2019-1010060 Advisory: Astropy 3.0.1 updates cfitsio to v3.43: NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43. NOTE: this CVE refers to the issues not covered by CVE-2018-3846, CVE-2018-3847, CVE-2018-3848, and CVE-2018-3849. One example is ftp_status in drvrnet.c mishandling a long string beginning with a '4' character." }, { "instruction": "what vulnarability does async-firebase version less then 3.6.2 have", "input": "", "output": "Having vulnarability CVE-2023-4807 Advisory: Async-firebase version 3.6.2 has updated its cryptography dependency to version 42.0.4 in response to the security vulnerability identified as CVE-2023-4807.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does async-firebase version less then 3.6.2 have ### Response: Having vulnarability CVE-2023-4807 Advisory: Async-firebase version 3.6.2 has updated its cryptography dependency to version 42.0.4 in response to the security vulnerability identified as CVE-2023-4807." }, { "instruction": "what vulnarability does async-search-client version less then 0.5.1 have", "input": "", "output": "Having vulnarability CVE-2021-29510 Advisory: Async-search-client 0.5.1 updates the 'pydantic' dependency from 1.8.1 to 1.8.2 to fix a security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does async-search-client version less then 0.5.1 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Async-search-client 0.5.1 updates the 'pydantic' dependency from 1.8.1 to 1.8.2 to fix a security vulnerability." }, { "instruction": "what vulnarability does async-tkinter-loop version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2022-22816 Advisory: Async-tkinter-loop 0.3.0 updates its dependency 'pillow' requirement to '^9.0.1' to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does async-tkinter-loop version less then 0.3.0 have ### Response: Having vulnarability CVE-2022-22816 Advisory: Async-tkinter-loop 0.3.0 updates its dependency 'pillow' requirement to '^9.0.1' to include security fixes." }, { "instruction": "what vulnarability does asyncio-proxy version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53560 Advisory: Asyncio-proxy is a malicious package. It requires 'aiotoolbox', that contains a custom script in setup.py that downloads malicious and obfuscated code.\r\nhttps://inspector.pypi.io/project/asyncio-proxy/1.2.2/packages/65/31/70c74eca514cbcce0cde8f2b42c7b534e42bad946cd9c0aa28774f982f47/asyncio-proxy-1.2.2.tar.gz/asyncio-proxy-1.2.2/asyncio_proxy.egg-info/requires.txt#line.1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does asyncio-proxy version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53560 Advisory: Asyncio-proxy is a malicious package. It requires 'aiotoolbox', that contains a custom script in setup.py that downloads malicious and obfuscated code.\r\nhttps://inspector.pypi.io/project/asyncio-proxy/1.2.2/packages/65/31/70c74eca514cbcce0cde8f2b42c7b534e42bad946cd9c0aa28774f982f47/asyncio-proxy-1.2.2.tar.gz/asyncio-proxy-1.2.2/asyncio_proxy.egg-info/requires.txt#line.1" }, { "instruction": "what vulnarability does asyncpg version less then 0.21.0 have", "input": "", "output": "Having vulnarability CVE-2020-17446 Advisory: Asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does asyncpg version less then 0.21.0 have ### Response: Having vulnarability CVE-2020-17446 Advisory: Asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder." }, { "instruction": "what vulnarability does asyncssh version less then 2.14.1 have", "input": "", "output": "Having vulnarability CVE-2023-46445 Advisory: An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does asyncssh version less then 2.14.1 have ### Response: Having vulnarability CVE-2023-46445 Advisory: An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack." }, { "instruction": "what vulnarability does asyncua version less then 0.9.96 have", "input": "", "output": "Having vulnarability CVE-2022-25304 Advisory: Asyncua 0.9.96 includes a fix for CVE-2022-25304: Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.\r\nhttps://github.com/FreeOpcUa/opcua-asyncio/commit/01c7acf047887b62d979cd4373d370e72a4b9057", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does asyncua version less then 0.9.96 have ### Response: Having vulnarability CVE-2022-25304 Advisory: Asyncua 0.9.96 includes a fix for CVE-2022-25304: Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.\r\nhttps://github.com/FreeOpcUa/opcua-asyncio/commit/01c7acf047887b62d979cd4373d370e72a4b9057" }, { "instruction": "what vulnarability does atlasapi version less then 2.0.5 have", "input": "", "output": "Having vulnarability CVE-2021-20270 Advisory: Atlasapi 2.0.5 updates its dependency 'pygments' to v2.7.4 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does atlasapi version less then 2.0.5 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Atlasapi 2.0.5 updates its dependency 'pygments' to v2.7.4 to include security fixes." }, { "instruction": "what vulnarability does atproto version less then 0.0.30 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Atproto 0.0.30 downgrades 'sphinxext-opengraph' to avoid including vulnerable dependencies, like pillow 9.5.0.\r\nhttps://github.com/MarshalX/atproto/pull/179", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does atproto version less then 0.0.30 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Atproto 0.0.30 downgrades 'sphinxext-opengraph' to avoid including vulnerable dependencies, like pillow 9.5.0.\r\nhttps://github.com/MarshalX/atproto/pull/179" }, { "instruction": "what vulnarability does att-iot-gateway version less then 0.4.0 have", "input": "", "output": "Having vulnarability PVE-2021-34257 Advisory: Att-iot-gateway before 0.4.0 uses a insecure HTTP connection.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does att-iot-gateway version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-34257 Advisory: Att-iot-gateway before 0.4.0 uses a insecure HTTP connection." }, { "instruction": "what vulnarability does attic version greather then equal to 0,less then 0.15 have", "input": "", "output": "Having vulnarability CVE-2015-4082 Advisory: attic before 0.15 does not confirm unencrypted backups with the user, which allows remote attackers with read and write privileges for the encrypted repository to obtain potentially sensitive information by changing the manifest type byte of the repository to \"unencrypted / without key file\".", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does attic version greather then equal to 0,less then 0.15 have ### Response: Having vulnarability CVE-2015-4082 Advisory: attic before 0.15 does not confirm unencrypted backups with the user, which allows remote attackers with read and write privileges for the encrypted repository to obtain potentially sensitive information by changing the manifest type byte of the repository to \"unencrypted / without key file\"." }, { "instruction": "what vulnarability does aubio version greather then equal to 0,less then 0.4.7 have", "input": "", "output": "Having vulnarability CVE-2017-17054 Advisory: In aubio 0.4.6, a divide-by-zero error exists in the function new_aubio_source_wavread() in source_wavread.c, which may lead to DoS when playing a crafted audio file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aubio version greather then equal to 0,less then 0.4.7 have ### Response: Having vulnarability CVE-2017-17054 Advisory: In aubio 0.4.6, a divide-by-zero error exists in the function new_aubio_source_wavread() in source_wavread.c, which may lead to DoS when playing a crafted audio file." }, { "instruction": "what vulnarability does aucmedi version less then 0.7.2 have", "input": "", "output": "Having vulnarability CVE-2022-1941 Advisory: Aucmedi 0.7.2 updates its dependency 'protobuf' to v3.20.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aucmedi version less then 0.7.2 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Aucmedi 0.7.2 updates its dependency 'protobuf' to v3.20.2 to include a security fix." }, { "instruction": "what vulnarability does audaugio version less then 0.0.2a0 have", "input": "", "output": "Having vulnarability CVE-2022-31651 Advisory: Audagio and prior versions ship with vulnerable dependencies (SoX == 1.3.3).\r\nIn SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.\r\nhttps://github.com/BrianMargolis/AudAugio/blob/master/requirements.txt", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does audaugio version less then 0.0.2a0 have ### Response: Having vulnarability CVE-2022-31651 Advisory: Audagio and prior versions ship with vulnerable dependencies (SoX == 1.3.3).\r\nIn SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.\r\nhttps://github.com/BrianMargolis/AudAugio/blob/master/requirements.txt" }, { "instruction": "what vulnarability does auditree-framework version less then 1.19.0 have", "input": "", "output": "Having vulnarability PVE-2021-40445 Advisory: Auditree-framework 1.19.0 fixes minor security issues found by the 'bandit'.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does auditree-framework version less then 1.19.0 have ### Response: Having vulnarability PVE-2021-40445 Advisory: Auditree-framework 1.19.0 fixes minor security issues found by the 'bandit'." }, { "instruction": "what vulnarability does augmenty version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2023-62782 Advisory: Augmenty 1.0.0 upgrades the dependency pydantic version from >=1.7.4,!=1.8,!=1.8.1,<1.9.0 to >=1.8.2,<1.9.0. \r\nhttps://data.safetycli.com/packages/pypi/pydantic/versions\r\nhttps://github.com/KennethEnevoldsen/augmenty/commit/34821e38d3004919922a56c04ad43450550c2591", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does augmenty version less then 1.0.0 have ### Response: Having vulnarability PVE-2023-62782 Advisory: Augmenty 1.0.0 upgrades the dependency pydantic version from >=1.7.4,!=1.8,!=1.8.1,<1.9.0 to >=1.8.2,<1.9.0. \r\nhttps://data.safetycli.com/packages/pypi/pydantic/versions\r\nhttps://github.com/KennethEnevoldsen/augmenty/commit/34821e38d3004919922a56c04ad43450550c2591" }, { "instruction": "what vulnarability does aumbry version less then 0.10.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Aumbry 0.10.0 includes a security patch for the function 'parse' in 'aumbry/formats/yml.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/pyarmory/aumbry/commit/5b1cd2e4296d3cfb10a6d1bd02cd5b4ecb0f0bcd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aumbry version less then 0.10.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Aumbry 0.10.0 includes a security patch for the function 'parse' in 'aumbry/formats/yml.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/pyarmory/aumbry/commit/5b1cd2e4296d3cfb10a6d1bd02cd5b4ecb0f0bcd" }, { "instruction": "what vulnarability does austin-tui version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2021-43818 Advisory: Austin-tui 1.1.1 updates its dependency 'lxml' to v4.6.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does austin-tui version less then 1.1.1 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Austin-tui 1.1.1 updates its dependency 'lxml' to v4.6.5 to include a security fix." }, { "instruction": "what vulnarability does authbwc version less then 0.1.4 have", "input": "", "output": "Having vulnarability PVE-2021-25631 Advisory: Authbwc 0.1.4 fixes an issue with the way the HTTP session user permissions were loaded. This vulnerability made it possible for a user to gain the permissions of the user logged in previously. The user would have had to be sharing the same http session for this access to have been gained.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does authbwc version less then 0.1.4 have ### Response: Having vulnarability PVE-2021-25631 Advisory: Authbwc 0.1.4 fixes an issue with the way the HTTP session user permissions were loaded. This vulnerability made it possible for a user to gain the permissions of the user logged in previously. The user would have had to be sharing the same http session for this access to have been gained." }, { "instruction": "what vulnarability does authlib version less then 0.15.4 have", "input": "", "output": "Having vulnarability PVE-2022-51634 Advisory: Authlib 0.15.4 includes a security fix when jwt claims is None.\r\nhttps://github.com/lepture/authlib/commit/262c37268c77a5da8fae80710a93d2d65a373ab7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does authlib version less then 0.15.4 have ### Response: Having vulnarability PVE-2022-51634 Advisory: Authlib 0.15.4 includes a security fix when jwt claims is None.\r\nhttps://github.com/lepture/authlib/commit/262c37268c77a5da8fae80710a93d2d65a373ab7" }, { "instruction": "what vulnarability does auto-optional version less then 0.3.2 have", "input": "", "output": "Having vulnarability CVE-2021-40978 Advisory: Auto-optional 0.3.2 updates its dependency 'mkdocs' to v1.2.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does auto-optional version less then 0.3.2 have ### Response: Having vulnarability CVE-2021-40978 Advisory: Auto-optional 0.3.2 updates its dependency 'mkdocs' to v1.2.3 to include a security fix." }, { "instruction": "what vulnarability does auto-surprise version less then 0.1.7 have", "input": "", "output": "Having vulnarability CVE-2021-20270 Advisory: Auto-surprise 0.1.7 updates its dependency 'pygments' to v2.7.4 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does auto-surprise version less then 0.1.7 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Auto-surprise 0.1.7 updates its dependency 'pygments' to v2.7.4 to include security fixes." }, { "instruction": "what vulnarability does autobahn version less then 0.15.0 have", "input": "", "output": "Having vulnarability PVE-2021-25632 Advisory: In autobahn before 0.15.0 if the `allowedOrigins` websocket option was set, the resulting matching was insufficient and would allow more origins than intended.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does autobahn version less then 0.15.0 have ### Response: Having vulnarability PVE-2021-25632 Advisory: In autobahn before 0.15.0 if the `allowedOrigins` websocket option was set, the resulting matching was insufficient and would allow more origins than intended." }, { "instruction": "what vulnarability does autocrop version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2020-5313 Advisory: Autocrop 1.1.1 updates the minimum requirement of its dependency 'pillow' to v8.1.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does autocrop version less then 1.1.1 have ### Response: Having vulnarability CVE-2020-5313 Advisory: Autocrop 1.1.1 updates the minimum requirement of its dependency 'pillow' to v8.1.0 to include security fixes." }, { "instruction": "what vulnarability does autogluon version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2022-24303 Advisory: Autogluon 0.4.1 updates its dependency 'pillow' minimum requirement to v9.0.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does autogluon version less then 0.4.1 have ### Response: Having vulnarability CVE-2022-24303 Advisory: Autogluon 0.4.1 updates its dependency 'pillow' minimum requirement to v9.0.1 to include security fixes." }, { "instruction": "what vulnarability does autogluon-multimodal version greather then equal to 0.4.0,less then 0.4.3,greather then equal to 0.5.0,less then 0.5.2 have", "input": "", "output": "Having vulnarability PVE-2023-99930 Advisory: The autogluon.multimodal module has a vulnerability due to the incorrect neutralization of special elements utilized in an operating system command. This issue is identified as an 'OS Command Injection'.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does autogluon-multimodal version greather then equal to 0.4.0,less then 0.4.3,greather then equal to 0.5.0,less then 0.5.2 have ### Response: Having vulnarability PVE-2023-99930 Advisory: The autogluon.multimodal module has a vulnerability due to the incorrect neutralization of special elements utilized in an operating system command. This issue is identified as an 'OS Command Injection'." }, { "instruction": "what vulnarability does autogluon.multimodal version greather then equal to 0.4.0,less then 0.4.3,greather then equal to 0.5.0,less then 0.5.2 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Autogluon.multimodal 0.4.3 and 0.5.2 include a security fix: Unsafe yaml deserialization in autogluon.multimodal.\r\nhttps://github.com/autogluon/autogluon/security/advisories/GHSA-6h2x-4gjf-jc5w", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does autogluon.multimodal version greather then equal to 0.4.0,less then 0.4.3,greather then equal to 0.5.0,less then 0.5.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Autogluon.multimodal 0.4.3 and 0.5.2 include a security fix: Unsafe yaml deserialization in autogluon.multimodal.\r\nhttps://github.com/autogluon/autogluon/security/advisories/GHSA-6h2x-4gjf-jc5w" }, { "instruction": "what vulnarability does automationhat version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2024-70556 Advisory: Automationhat version 0.2.0 improves thread safety by making ads1015.read() function thread-safe, particularly when \"auto_lights\" is activated. Previously, asynchronous reads from the \"update_lights\" thread interfered with main thread ADC reads, leading to random erroneous readings.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does automationhat version less then 0.2.0 have ### Response: Having vulnarability PVE-2024-70556 Advisory: Automationhat version 0.2.0 improves thread safety by making ads1015.read() function thread-safe, particularly when \"auto_lights\" is activated. Previously, asynchronous reads from the \"update_lights\" thread interfered with main thread ADC reads, leading to random erroneous readings." }, { "instruction": "what vulnarability does automatoes version less then 0.9.7 have", "input": "", "output": "Having vulnarability CVE-2020-36242 Advisory: Automatoes 0.9.7 updates its dependency 'cryptography' to v3.4.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does automatoes version less then 0.9.7 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Automatoes 0.9.7 updates its dependency 'cryptography' to v3.4.4 to include a security fix." }, { "instruction": "what vulnarability does autonicer version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2022-42969 Advisory: Autonicer 1.2.0 removes its dependency 'py' to avoid a potential vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does autonicer version less then 1.2.0 have ### Response: Having vulnarability CVE-2022-42969 Advisory: Autonicer 1.2.0 removes its dependency 'py' to avoid a potential vulnerability." }, { "instruction": "what vulnarability does av version less then 9.0.1 have", "input": "", "output": "Having vulnarability CVE-2020-27841 Advisory: Av 9.0.1 updates wheel components to include security fixes [openjpeg].\r\nhttps://github.com/PyAV-Org/PyAV/issues/901", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does av version less then 9.0.1 have ### Response: Having vulnarability CVE-2020-27841 Advisory: Av 9.0.1 updates wheel components to include security fixes [openjpeg].\r\nhttps://github.com/PyAV-Org/PyAV/issues/901" }, { "instruction": "what vulnarability does avocado-framework version less then 0.17.0 have", "input": "", "output": "Having vulnarability PVE-2021-34679 Advisory: avocado-framework 0.17.0 fixes a temporary dir issue, that had potential security implications.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does avocado-framework version less then 0.17.0 have ### Response: Having vulnarability PVE-2021-34679 Advisory: avocado-framework 0.17.0 fixes a temporary dir issue, that had potential security implications." }, { "instruction": "what vulnarability does avogadro version less then 1.97 have", "input": "", "output": "Having vulnarability PVE-2022-50249 Advisory: Avogadro 1.97 switches to a new clang-tidy script for secure pull-request comments.\r\nhttps://github.com/OpenChemistry/avogadrolibs/pull/988", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does avogadro version less then 1.97 have ### Response: Having vulnarability PVE-2022-50249 Advisory: Avogadro 1.97 switches to a new clang-tidy script for secure pull-request comments.\r\nhttps://github.com/OpenChemistry/avogadrolibs/pull/988" }, { "instruction": "what vulnarability does awkward version less then 0.10.1 have", "input": "", "output": "Having vulnarability PVE-2021-37154 Advisory: Awkward 0.10.1 closes a security hole and backward incompatibility in `awkward.persist.whitelist` handling.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awkward version less then 0.10.1 have ### Response: Having vulnarability PVE-2021-37154 Advisory: Awkward 0.10.1 closes a security hole and backward incompatibility in `awkward.persist.whitelist` handling." }, { "instruction": "what vulnarability does aws-analytics-reference-architecture version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2021-32796 Advisory: Aws-analytics-reference-architecture 1.1.1 updates its dependency 'xmldom' to v0.7.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-analytics-reference-architecture version less then 1.1.1 have ### Response: Having vulnarability CVE-2021-32796 Advisory: Aws-analytics-reference-architecture 1.1.1 updates its dependency 'xmldom' to v0.7.0 to include a security fix." }, { "instruction": "what vulnarability does aws-encryption-sdk version less then 1.9.0,greather then equal to 2.0.0,less then 2.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-41848 Advisory: Aws-encryption-sdk versions 1.9.0 and 2.2.0 improve the decryption process to handle signature and message validation vulnerabilities.\r\nhttps://github.com/aws/aws-encryption-sdk-python/security/advisories/GHSA-x5h4-9gqw-942j", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-encryption-sdk version less then 1.9.0,greather then equal to 2.0.0,less then 2.2.0 have ### Response: Having vulnarability PVE-2021-41848 Advisory: Aws-encryption-sdk versions 1.9.0 and 2.2.0 improve the decryption process to handle signature and message validation vulnerabilities.\r\nhttps://github.com/aws/aws-encryption-sdk-python/security/advisories/GHSA-x5h4-9gqw-942j" }, { "instruction": "what vulnarability does aws-encryption-sdk-cli version less then 1.8.0,greather then equal to 2.0.0,less then 2.1.0 have", "input": "", "output": "Having vulnarability PVE-2023-55097 Advisory: Aws-encryption-sdk-cli 1.8.0 and 2.1.0 include a security fix: CLI does not correctly implement strict mode.\r\nhttps://github.com/advisories/GHSA-2xwp-m7mq-7q3r", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-encryption-sdk-cli version less then 1.8.0,greather then equal to 2.0.0,less then 2.1.0 have ### Response: Having vulnarability PVE-2023-55097 Advisory: Aws-encryption-sdk-cli 1.8.0 and 2.1.0 include a security fix: CLI does not correctly implement strict mode.\r\nhttps://github.com/advisories/GHSA-2xwp-m7mq-7q3r" }, { "instruction": "what vulnarability does aws-kinesis-consumer version less then 1.4.0 have", "input": "", "output": "Having vulnarability CVE-2021-28363 Advisory: Aws-kinesis-consumer 1.4.0 updates its dependency 'urllib3' to v1.26.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-kinesis-consumer version less then 1.4.0 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Aws-kinesis-consumer 1.4.0 updates its dependency 'urllib3' to v1.26.4 to include a security fix." }, { "instruction": "what vulnarability does aws-login0tool version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45441 Advisory: Aws-login0tool is a typosquatting package. It installs a trojan in your system that leaks your data.\r\nhttps://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-login0tool version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45441 Advisory: Aws-login0tool is a typosquatting package. It installs a trojan in your system that leaks your data.\r\nhttps://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2" }, { "instruction": "what vulnarability does aws-parallelcluster version less then 2.4.0 have", "input": "", "output": "Having vulnarability PVE-2021-37211 Advisory: Aws-parallelcluster 2.4.0 removes AWS credentials from the ``parallelcluster`` config file for a better security posture. Credentials can now be set up following the canonical procedure used for the aws cli.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-parallelcluster version less then 2.4.0 have ### Response: Having vulnarability PVE-2021-37211 Advisory: Aws-parallelcluster 2.4.0 removes AWS credentials from the ``parallelcluster`` config file for a better security posture. Credentials can now be set up following the canonical procedure used for the aws cli." }, { "instruction": "what vulnarability does aws-parallelcluster-node version less then 3.5.0 have", "input": "", "output": "Having vulnarability PVE-2023-53391 Advisory: Aws-parallelcluster-node 3.5.0 adds validators to prevent malicious string injection.\r\nhttps://github.com/aws/aws-parallelcluster-node/commit/47012a17bd053211841e5fc37922164434623689", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-parallelcluster-node version less then 3.5.0 have ### Response: Having vulnarability PVE-2023-53391 Advisory: Aws-parallelcluster-node 3.5.0 adds validators to prevent malicious string injection.\r\nhttps://github.com/aws/aws-parallelcluster-node/commit/47012a17bd053211841e5fc37922164434623689" }, { "instruction": "what vulnarability does aws-s3-tools version less then equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2021-45958 Advisory: Aws-s3-tools 0.1.0 and prior use 'ujson==5.1.0', that has an unfixed vulnerability fully affecting availability.\r\nhttps://github.com/ultrajson/ultrajson/pull/504", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-s3-tools version less then equal to 0.1.0 have ### Response: Having vulnarability CVE-2021-45958 Advisory: Aws-s3-tools 0.1.0 and prior use 'ujson==5.1.0', that has an unfixed vulnerability fully affecting availability.\r\nhttps://github.com/ultrajson/ultrajson/pull/504" }, { "instruction": "what vulnarability does aws-sam-cli version less then 1.51.0 have", "input": "", "output": "Having vulnarability PVE-2023-59624 Advisory: Aws-sam-cli 1.51.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/aws/aws-sam-cli/pull/3905", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-sam-cli version less then 1.51.0 have ### Response: Having vulnarability PVE-2023-59624 Advisory: Aws-sam-cli 1.51.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/aws/aws-sam-cli/pull/3905" }, { "instruction": "what vulnarability does aws-v4signer version less then 0.6 have", "input": "", "output": "Having vulnarability CVE-2020-14343 Advisory: Aws-v4signer version 0.6 updates its dependency 'pyyaml' to v5.4 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aws-v4signer version less then 0.6 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Aws-v4signer version 0.6 updates its dependency 'pyyaml' to v5.4 to include security fixes." }, { "instruction": "what vulnarability does awsapilib version less then 0.5.1 have", "input": "", "output": "Having vulnarability PVE-2022-48281 Advisory: Awsapilib 0.5.1 checks if the CSRF token retrieved has no value.\r\nhttps://github.com/schubergphilis/awsapilib/commit/73008b21d6995da2bd5e533fb0ed4216ca9d505b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awsapilib version less then 0.5.1 have ### Response: Having vulnarability PVE-2022-48281 Advisory: Awsapilib 0.5.1 checks if the CSRF token retrieved has no value.\r\nhttps://github.com/schubergphilis/awsapilib/commit/73008b21d6995da2bd5e533fb0ed4216ca9d505b" }, { "instruction": "what vulnarability does awscl version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53219 Advisory: Awscl is a malicious package, pytosquatting the popular package 'awscli'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awscl version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53219 Advisory: Awscl is a malicious package, pytosquatting the popular package 'awscli'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does awscli version less then 1.11.83 have", "input": "", "output": "Having vulnarability PVE-2021-34627 Advisory: awscli 1.11.83 fixes a possible security issue where files could be downloaded to a directory outside the destination directory if the key contained relative paths when downloading files recursively.\r\nhttps://github.com/aws/aws-cli/commit/6080bb0b302b59149a305bfa0a6a7c92a07d1ea5", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awscli version less then 1.11.83 have ### Response: Having vulnarability PVE-2021-34627 Advisory: awscli 1.11.83 fixes a possible security issue where files could be downloaded to a directory outside the destination directory if the key contained relative paths when downloading files recursively.\r\nhttps://github.com/aws/aws-cli/commit/6080bb0b302b59149a305bfa0a6a7c92a07d1ea5" }, { "instruction": "what vulnarability does awsclie version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53253 Advisory: Awsclie is a malicious package, pytosquatting the popular package 'awscli'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awsclie version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53253 Advisory: Awsclie is a malicious package, pytosquatting the popular package 'awscli'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does awsclii version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53252 Advisory: Awsclii is a malicious package, pytosquatting the popular package 'awscli'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awsclii version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53252 Advisory: Awsclii is a malicious package, pytosquatting the popular package 'awscli'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does awscrt version less then 0.13.5 have", "input": "", "output": "Having vulnarability CVE-2022-0778 Advisory: Awscrt 0.13.5 updates modules to fix a DoS vulnerability related to OpenSSL.\r\nhttps://github.com/awslabs/aws-crt-python/commit/35650740c87eed174a2e0d7f98b8f5b8fd23848f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awscrt version less then 0.13.5 have ### Response: Having vulnarability CVE-2022-0778 Advisory: Awscrt 0.13.5 updates modules to fix a DoS vulnerability related to OpenSSL.\r\nhttps://github.com/awslabs/aws-crt-python/commit/35650740c87eed174a2e0d7f98b8f5b8fd23848f" }, { "instruction": "what vulnarability does awsiotsdk version less then 1.5.18 have", "input": "", "output": "Having vulnarability CVE-2021-40828 Advisory: Awsiotsdk 1.5.18 includes a fix for CVE-2021-40828: Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awsiotsdk version less then 1.5.18 have ### Response: Having vulnarability CVE-2021-40828 Advisory: Awsiotsdk 1.5.18 includes a fix for CVE-2021-40828: Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows." }, { "instruction": "what vulnarability does awsipranges version less then 0.3.3 have", "input": "", "output": "Having vulnarability CVE-2021-21330 Advisory: Awsipranges 0.3.3 updates its dependency 'aiohttp' to v3.7.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awsipranges version less then 0.3.3 have ### Response: Having vulnarability CVE-2021-21330 Advisory: Awsipranges 0.3.3 updates its dependency 'aiohttp' to v3.7.4 to include a security fix." }, { "instruction": "what vulnarability does awxkit version less then 4.0.0 have", "input": "", "output": "Having vulnarability CVE-2019-3869 Advisory: Awkit 4.0.0 includes a fix for CVE-2019-3869: When running Tower before 3.4.3 on OpenShift or Kubernetes, application credentials are exposed to playbook job runs via environment variables. A malicious user with the ability to write playbooks could use this to gain administrative privileges.\r\nhttps://github.com/ansible/awx/commit/2129f1208597d5c84478df48e0770e7b81b658ec", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does awxkit version less then 4.0.0 have ### Response: Having vulnarability CVE-2019-3869 Advisory: Awkit 4.0.0 includes a fix for CVE-2019-3869: When running Tower before 3.4.3 on OpenShift or Kubernetes, application credentials are exposed to playbook job runs via environment variables. A malicious user with the ability to write playbooks could use this to gain administrative privileges.\r\nhttps://github.com/ansible/awx/commit/2129f1208597d5c84478df48e0770e7b81b658ec" }, { "instruction": "what vulnarability does azure-cli version greather then equal to 0,less then 2.40.0 have", "input": "", "output": "Having vulnarability CVE-2022-39327 Advisory: Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40.0, Azure CLI contains a vulnerability for potential code injection. Critical scenarios are where a hosting machine runs an Azure CLI command where parameter values have been provided by an external source. The vulnerability is only applicable when the Azure CLI command is run on a Windows machine and with any version of PowerShell and when the parameter value contains the '&' or '|' symbols. If any of these prerequisites are not met, this vulnerability is not applicable. Users should upgrade to version 2.40.0 or greater to receive a a mitigation for the vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does azure-cli version greather then equal to 0,less then 2.40.0 have ### Response: Having vulnarability CVE-2022-39327 Advisory: Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40.0, Azure CLI contains a vulnerability for potential code injection. Critical scenarios are where a hosting machine runs an Azure CLI command where parameter values have been provided by an external source. The vulnerability is only applicable when the Azure CLI command is run on a Windows machine and with any version of PowerShell and when the parameter value contains the '&' or '|' symbols. If any of these prerequisites are not met, this vulnerability is not applicable. Users should upgrade to version 2.40.0 or greater to receive a a mitigation for the vulnerability." }, { "instruction": "what vulnarability does azure-cli-ml-preview version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47808 Advisory: Azure-cli-ml-preview is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does azure-cli-ml-preview version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47808 Advisory: Azure-cli-ml-preview is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick" }, { "instruction": "what vulnarability does azure-cli-ml-private-preview version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47810 Advisory: Azure-cli-ml-private-preview is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does azure-cli-ml-private-preview version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47810 Advisory: Azure-cli-ml-private-preview is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick" }, { "instruction": "what vulnarability does azure-functions version less then 1.0.11184 have", "input": "", "output": "Having vulnarability PVE-2024-63814 Advisory: Version 1.0.11184 of Azure Functions resolves a race condition in logging operations. This update ensures consistent and reliable log entries, even when multiple functions write simultaneously.\r\nhttps://github.com/Azure/azure-webjobs-sdk/pull/1319/commits/b6893d484fc77c893458ce3201a042ce7ae3d456", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does azure-functions version less then 1.0.11184 have ### Response: Having vulnarability PVE-2024-63814 Advisory: Version 1.0.11184 of Azure Functions resolves a race condition in logging operations. This update ensures consistent and reliable log entries, even when multiple functions write simultaneously.\r\nhttps://github.com/Azure/azure-webjobs-sdk/pull/1319/commits/b6893d484fc77c893458ce3201a042ce7ae3d456" }, { "instruction": "what vulnarability does azure-smtp-relay version less then 1.0.6 have", "input": "", "output": "Having vulnarability CVE-2024-27305 Advisory: Azure-smtp-relay version 1.0.6 has updated its aiosmtpd dependency to version 1.4.5 to address the security vulnerability identified in CVE-2024-27305.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does azure-smtp-relay version less then 1.0.6 have ### Response: Having vulnarability CVE-2024-27305 Advisory: Azure-smtp-relay version 1.0.6 has updated its aiosmtpd dependency to version 1.4.5 to address the security vulnerability identified in CVE-2024-27305." }, { "instruction": "what vulnarability does azureml-contrib-jupyterrun version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47806 Advisory: Azureml-contrib-jupyterrun is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does azureml-contrib-jupyterrun version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47806 Advisory: Azureml-contrib-jupyterrun is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick" }, { "instruction": "what vulnarability does azureml-contrib-optimization version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47811 Advisory: Azureml-contrib-optimization is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does azureml-contrib-optimization version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47811 Advisory: Azureml-contrib-optimization is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick" }, { "instruction": "what vulnarability does azureml-contrib-reports version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47807 Advisory: Azureml-contrib-reports is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does azureml-contrib-reports version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47807 Advisory: Azureml-contrib-reports is a malicious package, typosquatting. It aims at targeting Azure environments.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick" }, { "instruction": "what vulnarability does b-cfn-custom-api-key-authorizer version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-48259 Advisory: B-cfn-custom-api-key-authorizer 2.0.0 hashes api secrets to avoid leaks if the database is breached.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does b-cfn-custom-api-key-authorizer version less then 2.0.0 have ### Response: Having vulnarability PVE-2022-48259 Advisory: B-cfn-custom-api-key-authorizer 2.0.0 hashes api secrets to avoid leaks if the database is breached." }, { "instruction": "what vulnarability does b2 version greather then equal to 0,less then 3.2.1 have", "input": "", "output": "Having vulnarability CVE-2022-23653 Advisory: B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it. Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file. Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated. If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does b2 version greather then equal to 0,less then 3.2.1 have ### Response: Having vulnarability CVE-2022-23653 Advisory: B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it. Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file. Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated. If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file." }, { "instruction": "what vulnarability does b2sdk version less then equal to 1.14.0 have", "input": "", "output": "Having vulnarability CVE-2022-23651 Advisory: B2sdk 1.14.1 includes a fix for CVE-2022-23651: Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API keys (and bucket name-to-id mapping) in a local database file ($XDG_CONFIG_HOME/b2/account_info, ~/.b2_account_info or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Consumers of this SDK who rely on it to save data using SqliteAccountInfo class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys.\r\nhttps://github.com/Backblaze/b2-sdk-python/security/advisories/GHSA-p867-fxfr-ph2w", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does b2sdk version less then equal to 1.14.0 have ### Response: Having vulnarability CVE-2022-23651 Advisory: B2sdk 1.14.1 includes a fix for CVE-2022-23651: Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API keys (and bucket name-to-id mapping) in a local database file ($XDG_CONFIG_HOME/b2/account_info, ~/.b2_account_info or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Consumers of this SDK who rely on it to save data using SqliteAccountInfo class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys.\r\nhttps://github.com/Backblaze/b2-sdk-python/security/advisories/GHSA-p867-fxfr-ph2w" }, { "instruction": "what vulnarability does babel version less then 2.9.1 have", "input": "", "output": "Having vulnarability CVE-2021-42771 Advisory: Babel 2.9.1 includes a fix for CVE-2021-42771: Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.\r\nhttps://github.com/python-babel/babel/pull/782", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does babel version less then 2.9.1 have ### Response: Having vulnarability CVE-2021-42771 Advisory: Babel 2.9.1 includes a fix for CVE-2021-42771: Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.\r\nhttps://github.com/python-babel/babel/pull/782" }, { "instruction": "what vulnarability does backend-ai version less then 19.03.0b1 have", "input": "", "output": "Having vulnarability PVE-2021-39087 Advisory: Backend.ai 19.03.0b1 supports running multiple managers on the same host by randomizing internal IPC socket addresses. This also improves the security a little.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does backend-ai version less then 19.03.0b1 have ### Response: Having vulnarability PVE-2021-39087 Advisory: Backend.ai 19.03.0b1 supports running multiple managers on the same host by randomizing internal IPC socket addresses. This also improves the security a little." }, { "instruction": "what vulnarability does backend-ai-client version less then 21.09.0a1 have", "input": "", "output": "Having vulnarability CVE-2020-14343 Advisory: Backend.ai-client version 21.09.0a1 updates its dependency 'PyYaml' to v5.4.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does backend-ai-client version less then 21.09.0a1 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Backend.ai-client version 21.09.0a1 updates its dependency 'PyYaml' to v5.4.1 to include a security fix." }, { "instruction": "what vulnarability does backend-ai-manager version less then 19.09.0rc4 have", "input": "", "output": "Having vulnarability PVE-2021-37531 Advisory: Backend.ai-manager 19.09.0rc4 fixes privilege escalation because domain-admins could run sessions on behalf of super-admins in the same domain. It also introduces Image import (171) - currently this is limited to import Python-based kernels only. This is implemented on top of batch tasks, with some specialization to prevent security issues due to direct access to agent host's Docker daemon. Importing as service-port only image support will be added in future releases.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does backend-ai-manager version less then 19.09.0rc4 have ### Response: Having vulnarability PVE-2021-37531 Advisory: Backend.ai-manager 19.09.0rc4 fixes privilege escalation because domain-admins could run sessions on behalf of super-admins in the same domain. It also introduces Image import (171) - currently this is limited to import Python-based kernels only. This is implemented on top of batch tasks, with some specialization to prevent security issues due to direct access to agent host's Docker daemon. Importing as service-port only image support will be added in future releases." }, { "instruction": "what vulnarability does backend-ai-webserver version less then 22.03.0a1 have", "input": "", "output": "Having vulnarability PVE-2022-46407 Advisory: Backend.ai-webserver 22.03.0a1 prevents too many login attempts.\r\nhttps://github.com/lablup/backend.ai-webserver/pull/29", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does backend-ai-webserver version less then 22.03.0a1 have ### Response: Having vulnarability PVE-2022-46407 Advisory: Backend.ai-webserver 22.03.0a1 prevents too many login attempts.\r\nhttps://github.com/lablup/backend.ai-webserver/pull/29" }, { "instruction": "what vulnarability does backend.ai-manager version less then 21.03.0 have", "input": "", "output": "Having vulnarability PVE-2024-64058 Advisory: Backend.ai-manager 21.03.0 fixes a potential vulnerability: a remote code execution risk associated with the YAML file loading process. This update introduces `yaml.safe_load()` for all YAML loader invocations.\r\nhttps://github.com/lablup/backend.ai-manager/pull/395/commits/844ef52aa6f9fa4e7aac231eedabb7fd7425f967", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does backend.ai-manager version less then 21.03.0 have ### Response: Having vulnarability PVE-2024-64058 Advisory: Backend.ai-manager 21.03.0 fixes a potential vulnerability: a remote code execution risk associated with the YAML file loading process. This update introduces `yaml.safe_load()` for all YAML loader invocations.\r\nhttps://github.com/lablup/backend.ai-manager/pull/395/commits/844ef52aa6f9fa4e7aac231eedabb7fd7425f967" }, { "instruction": "what vulnarability does baeutifulsoup4 version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51735 Advisory: Baeutifulsoup4 is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does baeutifulsoup4 version greather then 0 have ### Response: Having vulnarability PVE-2022-51735 Advisory: Baeutifulsoup4 is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does bakercm version less then 0.4.4 have", "input": "", "output": "Having vulnarability CVE-2018-15560 Advisory: Bakercm 0.4.4 updates its dependency 'pycryptodome' to v3.6.6 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bakercm version less then 0.4.4 have ### Response: Having vulnarability CVE-2018-15560 Advisory: Bakercm 0.4.4 updates its dependency 'pycryptodome' to v3.6.6 to include a security fix." }, { "instruction": "what vulnarability does bandersnatch version less then 1.6 have", "input": "", "output": "Having vulnarability PVE-2023-61428 Advisory: Bandersnatch 1.6 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/pypa/bandersnatch/commit/59ceeeef16da461861b8b4b8b6910c9c2434558e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bandersnatch version less then 1.6 have ### Response: Having vulnarability PVE-2023-61428 Advisory: Bandersnatch 1.6 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/pypa/bandersnatch/commit/59ceeeef16da461861b8b4b8b6910c9c2434558e" }, { "instruction": "what vulnarability does bandit version less then 1.6.3 have", "input": "", "output": "Having vulnarability CVE-2020-1747 Advisory: Bandit 1.6.3 updates its dependency 'pyyaml' to v5.3.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bandit version less then 1.6.3 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Bandit 1.6.3 updates its dependency 'pyyaml' to v5.3.1 to include security fixes." }, { "instruction": "what vulnarability does barbican version less then 12.0.2,greather then equal to 13.0.0.0rc1,less then 13.0.1,greather then equal to 14.0.0.0rc1,less then 14.0.1 have", "input": "", "output": "Having vulnarability CVE-2022-3100 Advisory: Barbican 12.0.2, 13.0.1 and 14.0.1 include a fix for CVE-2022-3100: This issue allows an access policy bypass via a query string when accessing the API.\r\nhttps://github.com/openstack/barbican/commit/6112c302375bf3d4c27303d12beec52ce2a82a2b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does barbican version less then 12.0.2,greather then equal to 13.0.0.0rc1,less then 13.0.1,greather then equal to 14.0.0.0rc1,less then 14.0.1 have ### Response: Having vulnarability CVE-2022-3100 Advisory: Barbican 12.0.2, 13.0.1 and 14.0.1 include a fix for CVE-2022-3100: This issue allows an access policy bypass via a query string when accessing the API.\r\nhttps://github.com/openstack/barbican/commit/6112c302375bf3d4c27303d12beec52ce2a82a2b" }, { "instruction": "what vulnarability does barman version less then 2.11 have", "input": "", "output": "Having vulnarability PVE-2021-38502 Advisory: Barman 2.11 removes the strict superuser requirement for PG 10+. As of PostgreSQL 10 it is possible to execute \r\nbackups without superuser privileges, which is actually the recommended method for security reasons. Non-superuser backups need to grant some privileges to the user used by Barman to connect to PostgreSQL, as documented in the 21-preliminary_steps.en.md section.\r\n\r\nIt also ensures each postgres connection has an empty search_path. This is the only safe option when there is no information about how secure the search path is on the target database. This is done by appending \"options=-csearch_path=\" to any conninfo string.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does barman version less then 2.11 have ### Response: Having vulnarability PVE-2021-38502 Advisory: Barman 2.11 removes the strict superuser requirement for PG 10+. As of PostgreSQL 10 it is possible to execute \r\nbackups without superuser privileges, which is actually the recommended method for security reasons. Non-superuser backups need to grant some privileges to the user used by Barman to connect to PostgreSQL, as documented in the 21-preliminary_steps.en.md section.\r\n\r\nIt also ensures each postgres connection has an empty search_path. This is the only safe option when there is no information about how secure the search path is on the target database. This is done by appending \"options=-csearch_path=\" to any conninfo string." }, { "instruction": "what vulnarability does bas-air-unit-network-dataset version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2023-37920 Advisory: Bas-air-unit-network-dataset 0.3.0 updates its dependency 'certifi' to v2023.11.17 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bas-air-unit-network-dataset version less then 0.3.0 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Bas-air-unit-network-dataset 0.3.0 updates its dependency 'certifi' to v2023.11.17 to include a security fix." }, { "instruction": "what vulnarability does baseplate version less then 0.19.0 have", "input": "", "output": "Having vulnarability PVE-2021-38349 Advisory: Baseplate 0.19.0 includes support for fetching secrets in a secure, auditable, manner from Hashicorp Vault. A sidecar daemon manages the infrastructure-level authentication with Vault and fetches secrets to a file on disk. Helpers in Baseplate then allow your application to fetch these secrets efficiently from the sidecar daemon with some helpful conventions for versioning/key rotation. This is now the right way to get secret tokens into your application going forward. See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does baseplate version less then 0.19.0 have ### Response: Having vulnarability PVE-2021-38349 Advisory: Baseplate 0.19.0 includes support for fetching secrets in a secure, auditable, manner from Hashicorp Vault. A sidecar daemon manages the infrastructure-level authentication with Vault and fetches secrets to a file on disk. Helpers in Baseplate then allow your application to fetch these secrets efficiently from the sidecar daemon with some helpful conventions for versioning/key rotation. This is now the right way to get secret tokens into your application going forward. See: ." }, { "instruction": "what vulnarability does basketball-reference-web-scraper version less then 4.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-37123 Advisory: Basketball-reference-web-scraper 4.2.2 includes upgrades the `urllib3` library to `1.25.2` due to a security vulnerability with versions less than `1.24.2`.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does basketball-reference-web-scraper version less then 4.2.2 have ### Response: Having vulnarability PVE-2021-37123 Advisory: Basketball-reference-web-scraper 4.2.2 includes upgrades the `urllib3` library to `1.25.2` due to a security vulnerability with versions less than `1.24.2`." }, { "instruction": "what vulnarability does basxconnect version less then 0.3.54 have", "input": "", "output": "Having vulnarability PVE-2021-42928 Advisory: Basxconnect 0.3.54 fixes a missing CSRF token issue.\r\nhttps://github.com/basxsoftwareassociation/basxconnect/commit/6d5809b78dcf033e4f0ca30e305dd3a382f56709", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does basxconnect version less then 0.3.54 have ### Response: Having vulnarability PVE-2021-42928 Advisory: Basxconnect 0.3.54 fixes a missing CSRF token issue.\r\nhttps://github.com/basxsoftwareassociation/basxconnect/commit/6d5809b78dcf033e4f0ca30e305dd3a382f56709" }, { "instruction": "what vulnarability does bauh version less then 0.10.3 have", "input": "", "output": "Having vulnarability PVE-2022-49145 Advisory: Bauh 0.10.3 prevents command injection through the search mechanism.\r\nhttps://github.com/vinifmor/bauh/issues/266", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bauh version less then 0.10.3 have ### Response: Having vulnarability PVE-2022-49145 Advisory: Bauh 0.10.3 prevents command injection through the search mechanism.\r\nhttps://github.com/vinifmor/bauh/issues/266" }, { "instruction": "what vulnarability does baybe version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2023-25399 Advisory: Baybe 0.4.1 updates its dependency 'scipy' to v1.10.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does baybe version less then 0.4.1 have ### Response: Having vulnarability CVE-2023-25399 Advisory: Baybe 0.4.1 updates its dependency 'scipy' to v1.10.1 to include a security fix." }, { "instruction": "what vulnarability does bayesian-testing version less then 0.2.2 have", "input": "", "output": "Having vulnarability CVE-2022-24757 Advisory: Bayesian-testing 0.2.2 updates its dependency 'jupyter-server' to v1.16.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bayesian-testing version less then 0.2.2 have ### Response: Having vulnarability CVE-2022-24757 Advisory: Bayesian-testing 0.2.2 updates its dependency 'jupyter-server' to v1.16.0 to include a security fix." }, { "instruction": "what vulnarability does bbcode version less then 1.0.18 have", "input": "", "output": "Having vulnarability PVE-2021-25634 Advisory: Bbcode 1.0.18 escapes quotes to prevent XSS.\r\nhttps://github.com/dcwatson/bbcode/issues/4\r\nhttps://github.com/dcwatson/bbcode/commit/e23f5ae9f9e42a9988a52b8b39815593c264f3ce", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bbcode version less then 1.0.18 have ### Response: Having vulnarability PVE-2021-25634 Advisory: Bbcode 1.0.18 escapes quotes to prevent XSS.\r\nhttps://github.com/dcwatson/bbcode/issues/4\r\nhttps://github.com/dcwatson/bbcode/commit/e23f5ae9f9e42a9988a52b8b39815593c264f3ce" }, { "instruction": "what vulnarability does bcfg2 version less then equal to 1.1.2,equal to 1.2.0pre1,equal to 1.2.0pre2,equal to 1.2.0pre3 have", "input": "", "output": "Having vulnarability CVE-2011-3211 Advisory: The server in Bcfg2 1.1.2 and earlier, and 1.2 prerelease, allows remote attackers to execute arbitrary commands via shell metacharacters in data received from a client.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bcfg2 version less then equal to 1.1.2,equal to 1.2.0pre1,equal to 1.2.0pre2,equal to 1.2.0pre3 have ### Response: Having vulnarability CVE-2011-3211 Advisory: The server in Bcfg2 1.1.2 and earlier, and 1.2 prerelease, allows remote attackers to execute arbitrary commands via shell metacharacters in data received from a client." }, { "instruction": "what vulnarability does beaker version less then 0.9.4 have", "input": "", "output": "Having vulnarability PVE-2021-25635 Advisory: Beaker 0.9.4 removes directory escaping characters properly from the session ID when un-signed sessions are used.\r\nhttps://github.com/bbangert/beaker/commit/ad45a77d199c46ddedf5d1aa54780b95d4bd3279", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does beaker version less then 0.9.4 have ### Response: Having vulnarability PVE-2021-25635 Advisory: Beaker 0.9.4 removes directory escaping characters properly from the session ID when un-signed sessions are used.\r\nhttps://github.com/bbangert/beaker/commit/ad45a77d199c46ddedf5d1aa54780b95d4bd3279" }, { "instruction": "what vulnarability does beancount-import version less then 1.4.0 have", "input": "", "output": "Having vulnarability CVE-2023-45133 Advisory: Beancount-import version 1.4.0 has upgraded `@babel/traverse` from 7.13.0 to 7.23.3 in the frontend to address the security issue detailed in CVE-2023-45133.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does beancount-import version less then 1.4.0 have ### Response: Having vulnarability CVE-2023-45133 Advisory: Beancount-import version 1.4.0 has upgraded `@babel/traverse` from 7.13.0 to 7.23.3 in the frontend to address the security issue detailed in CVE-2023-45133." }, { "instruction": "what vulnarability does beautifulsup4 version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51736 Advisory: Beautifulsup4 is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does beautifulsup4 version greather then 0 have ### Response: Having vulnarability PVE-2022-51736 Advisory: Beautifulsup4 is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does beets version less then 1.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-42892 Advisory: Beets 1.6.0 sanitize filenames in image IDs in the Aura plugin.\r\nhttps://github.com/beetbox/beets/pull/4160/commits/1fad3d01aea4627af42a9b7190d6869d2b007cc4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does beets version less then 1.6.0 have ### Response: Having vulnarability PVE-2021-42892 Advisory: Beets 1.6.0 sanitize filenames in image IDs in the Aura plugin.\r\nhttps://github.com/beetbox/beets/pull/4160/commits/1fad3d01aea4627af42a9b7190d6869d2b007cc4" }, { "instruction": "what vulnarability does before-commit version less then 1.10.4 have", "input": "", "output": "Having vulnarability PVE-2022-48117 Advisory: Before-commit 1.10.4 replaces 'yaml.load' with a safe alternative.\r\nhttps://github.com/before-commit/before-commit/commit/6853f4aa4c8d7e411839bacc66876baea443186a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does before-commit version less then 1.10.4 have ### Response: Having vulnarability PVE-2022-48117 Advisory: Before-commit 1.10.4 replaces 'yaml.load' with a safe alternative.\r\nhttps://github.com/before-commit/before-commit/commit/6853f4aa4c8d7e411839bacc66876baea443186a" }, { "instruction": "what vulnarability does beginner version greather then equal to 0.0.2,less then 0.0.5 have", "input": "", "output": "Having vulnarability CVE-2022-33004 Advisory: The Beginner package in PyPI v0.0.2 to v0.0.4 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does beginner version greather then equal to 0.0.2,less then 0.0.5 have ### Response: Having vulnarability CVE-2022-33004 Advisory: The Beginner package in PyPI v0.0.2 to v0.0.4 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does belvo-python version less then 0.39.1 have", "input": "", "output": "Having vulnarability PVE-2023-60581 Advisory: Belvo-python 0.39.1 updates its dependency 'requests' to version '2.31.0' to include a fix for an Information Exposure vulnerability.\r\nhttps://github.com/belvo-finance/belvo-python/pull/177", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does belvo-python version less then 0.39.1 have ### Response: Having vulnarability PVE-2023-60581 Advisory: Belvo-python 0.39.1 updates its dependency 'requests' to version '2.31.0' to include a fix for an Information Exposure vulnerability.\r\nhttps://github.com/belvo-finance/belvo-python/pull/177" }, { "instruction": "what vulnarability does benchexec version less then 2.2 have", "input": "", "output": "Having vulnarability PVE-2021-42546 Advisory: Benchexec 2.2 fixes a security issue. The kernel offers a keyring feature for storage of keys related to features like Kerberos and ecryptfs. Before Linux 5.2, there existed one keyring per user, and BenchExec did not prevent access from the tool inside the container to the kernel keyring of the user who started BenchExec. Now such accesses are forbidden (on all kernel versions) using seccomp (http://man7.org/linux/man-pages/man2/seccomp.2.html) if libseccomp2 (https://github.com/seccomp/libseccomp) is installed, which should be the case on any standard distribution. Note that seccomp filters do have a slight performance impact and could prevent some binaries on exotic architectures from working. In such a case please file a bug report.\r\nhttps://github.com/sosy-lab/benchexec/commit/5f043cd2d2484a75bee48efb924700c0b1ce32b4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does benchexec version less then 2.2 have ### Response: Having vulnarability PVE-2021-42546 Advisory: Benchexec 2.2 fixes a security issue. The kernel offers a keyring feature for storage of keys related to features like Kerberos and ecryptfs. Before Linux 5.2, there existed one keyring per user, and BenchExec did not prevent access from the tool inside the container to the kernel keyring of the user who started BenchExec. Now such accesses are forbidden (on all kernel versions) using seccomp (http://man7.org/linux/man-pages/man2/seccomp.2.html) if libseccomp2 (https://github.com/seccomp/libseccomp) is installed, which should be the case on any standard distribution. Note that seccomp filters do have a slight performance impact and could prevent some binaries on exotic architectures from working. In such a case please file a bug report.\r\nhttps://github.com/sosy-lab/benchexec/commit/5f043cd2d2484a75bee48efb924700c0b1ce32b4" }, { "instruction": "what vulnarability does bento-lib version less then 3.0.1 have", "input": "", "output": "Having vulnarability PVE-2021-41035 Advisory: Bento-lib 3.0.1 includes security fix to prevent data leak in error messages from data structure queries by default and adds 'secure_errors' param for data structure querying methods.\r\nhttps://github.com/bento-platform/bento_lib/commit/991ee4fd406e3397435d1c8c02f1d0c48b9ec594\r\nhttps://github.com/bento-platform/bento_lib/commit/046a023abe8de0c3e13963a0c236df4f34ade244", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bento-lib version less then 3.0.1 have ### Response: Having vulnarability PVE-2021-41035 Advisory: Bento-lib 3.0.1 includes security fix to prevent data leak in error messages from data structure queries by default and adds 'secure_errors' param for data structure querying methods.\r\nhttps://github.com/bento-platform/bento_lib/commit/991ee4fd406e3397435d1c8c02f1d0c48b9ec594\r\nhttps://github.com/bento-platform/bento_lib/commit/046a023abe8de0c3e13963a0c236df4f34ade244" }, { "instruction": "what vulnarability does bepasty version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2022-48339 Advisory: Bepasty 0.3.0 prevents the disclosure of locked item's metadata.\r\nhttps://github.com/bepasty/bepasty-server/commit/95e49be1b4ecbf800bd81805f37d4e42699f3d45", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bepasty version less then 0.3.0 have ### Response: Having vulnarability PVE-2022-48339 Advisory: Bepasty 0.3.0 prevents the disclosure of locked item's metadata.\r\nhttps://github.com/bepasty/bepasty-server/commit/95e49be1b4ecbf800bd81805f37d4e42699f3d45" }, { "instruction": "what vulnarability does berglas version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-37340 Advisory: Berglas 0.2.0 no longer trusts the environment variables.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does berglas version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-37340 Advisory: Berglas 0.2.0 no longer trusts the environment variables." }, { "instruction": "what vulnarability does betty version less then 0.3.0a1 have", "input": "", "output": "Having vulnarability PVE-2023-63062 Advisory: Betty 0.3.0a1 addresses a race condition that can occur during the CPU-intensive site generation process. This update introduces safeguards to prevent the copying or serialization of App instances, which could potentially lead to data inconsistencies or other unexpected behavior.\r\nhttps://github.com/bartfeenstra/betty/pull/798/commits/660d4ecdd97f2e5c00cb18945f38cf1c871bdc1e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does betty version less then 0.3.0a1 have ### Response: Having vulnarability PVE-2023-63062 Advisory: Betty 0.3.0a1 addresses a race condition that can occur during the CPU-intensive site generation process. This update introduces safeguards to prevent the copying or serialization of App instances, which could potentially lead to data inconsistencies or other unexpected behavior.\r\nhttps://github.com/bartfeenstra/betty/pull/798/commits/660d4ecdd97f2e5c00cb18945f38cf1c871bdc1e" }, { "instruction": "what vulnarability does bgcflow-wrapper version less then 0.2.5 have", "input": "", "output": "Having vulnarability PVE-2024-64545 Advisory: Bgcflow-wrapper 0.2.5 updates its dependency on the Tox library from version \"^3.24.5\" to version \"^4.6.4\" as a part of a security update.\r\nhttps://github.com/NBChub/bgcflow_wrapper/pull/21/commits/319c772de5b1a572605a641acf6ecd8cced2deca", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bgcflow-wrapper version less then 0.2.5 have ### Response: Having vulnarability PVE-2024-64545 Advisory: Bgcflow-wrapper 0.2.5 updates its dependency on the Tox library from version \"^3.24.5\" to version \"^4.6.4\" as a part of a security update.\r\nhttps://github.com/NBChub/bgcflow_wrapper/pull/21/commits/319c772de5b1a572605a641acf6ecd8cced2deca" }, { "instruction": "what vulnarability does bids-validator version less then 0.24.0 have", "input": "", "output": "Having vulnarability PVE-2023-59251 Advisory: Bids-validator 0.24.0 includes a fix for a directory traversal vulnerability.\r\nhttps://github.com/bids-standard/bids-validator/pull/368", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bids-validator version less then 0.24.0 have ### Response: Having vulnarability PVE-2023-59251 Advisory: Bids-validator 0.24.0 includes a fix for a directory traversal vulnerability.\r\nhttps://github.com/bids-standard/bids-validator/pull/368" }, { "instruction": "what vulnarability does bigchaindb version less then 2.2.2 have", "input": "", "output": "Having vulnarability CVE-2018-1000164 Advisory: Bigchaindb 2.2.2 updates its dependency 'gunicorn' to v20.0.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bigchaindb version less then 2.2.2 have ### Response: Having vulnarability CVE-2018-1000164 Advisory: Bigchaindb 2.2.2 updates its dependency 'gunicorn' to v20.0.4 to include a security fix." }, { "instruction": "what vulnarability does bigchaindb-driver version less then 0.5.2 have", "input": "", "output": "Having vulnarability CVE-2018-10903 Advisory: Bigchaindb-driver 0.5.2 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bigchaindb-driver version less then 0.5.2 have ### Response: Having vulnarability CVE-2018-10903 Advisory: Bigchaindb-driver 0.5.2 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage." }, { "instruction": "what vulnarability does bigdl version less then 0.5.0 have", "input": "", "output": "Having vulnarability PVE-2023-59598 Advisory: Bigdl 0.5.0 includes a fix for a Race Condition vulnerability in Spark 1.6.\r\nhttps://github.com/intel-analytics/BigDL/pull/2363", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bigdl version less then 0.5.0 have ### Response: Having vulnarability PVE-2023-59598 Advisory: Bigdl 0.5.0 includes a fix for a Race Condition vulnerability in Spark 1.6.\r\nhttps://github.com/intel-analytics/BigDL/pull/2363" }, { "instruction": "what vulnarability does bigflow version less then 1.6.0 have", "input": "", "output": "Having vulnarability PVE-2023-53443 Advisory: Bigflow 1.6.0 enables vault endpoint TLS certificate verification by default to avoid MITM attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bigflow version less then 1.6.0 have ### Response: Having vulnarability PVE-2023-53443 Advisory: Bigflow 1.6.0 enables vault endpoint TLS certificate verification by default to avoid MITM attacks." }, { "instruction": "what vulnarability does bikeshed version less then 3.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-23423 Advisory: Bikeshed version 3.0.0 includes a fix for CVE-2021-23423:\r\nWhen an untrusted source file containing include, include-code or include-raw block is processed, the contents of arbitrary files could be disclosed in the HTML output.\r\nhttps://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bikeshed version less then 3.0.0 have ### Response: Having vulnarability CVE-2021-23423 Advisory: Bikeshed version 3.0.0 includes a fix for CVE-2021-23423:\r\nWhen an untrusted source file containing include, include-code or include-raw block is processed, the contents of arbitrary files could be disclosed in the HTML output.\r\nhttps://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd" }, { "instruction": "what vulnarability does bincrafters-envy version less then 0.1.3 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Bincrafters-envy 0.1.3 updates its dependency 'requests' to v2.20.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bincrafters-envy version less then 0.1.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Bincrafters-envy 0.1.3 updates its dependency 'requests' to v2.20.0 to include a security fix." }, { "instruction": "what vulnarability does binderhub version greather then equal to 0,less then 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2021-39159 Advisory: ### Impact\n\nA remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration.\n\n### Patches\n\nPatch below, or [on GitHub](https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch)\n\n```diff\nFrom 9f4043d9dddc1174920e687773f27b7933f48ab6 Mon Sep 17 00:00:00 2001\nFrom: Riccardo Castellotti \nDate: Thu, 19 Aug 2021 15:49:43 +0200\nSubject: [PATCH] Explicitly separate git-ls-remote options from positional\n arguments\n\n---\n binderhub/repoproviders.py | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)\n\ndiff --git a/binderhub/repoproviders.py b/binderhub/repoproviders.py\nindex f33347b..5d4b87c 100755\n--- a/binderhub/repoproviders.py\n+++ b/binderhub/repoproviders.py\n@@ -484,7 +484,7 @@ class GitRepoProvider(RepoProvider):\n self.sha1_validate(self.unresolved_ref)\n except ValueError:\n # The ref is a head/tag and we resolve it using `git ls-remote`\n- command = [\"git\", \"ls-remote\", self.repo, self.unresolved_ref]\n+ command = [\"git\", \"ls-remote\", \"--\", self.repo, self.unresolved_ref]\n result = subprocess.run(command, universal_newlines=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)\n if result.returncode:\n raise RuntimeError(\"Unable to run git ls-remote to get the `resolved_ref`: {}\".format(result.stderr))\n-- \n2.25.1\n\n```\n\n### Workarounds\n\nDisable the git repo provider by specifying the `BinderHub.repo_providers` config, e.g.:\n\n```python\nfrom binderhub.repoproviders import (GitHubRepoProvider,\n GitLabRepoProvider, GistRepoProvider,\n ZenodoProvider, FigshareProvider, HydroshareProvider,\n DataverseProvider)\n\nc.BinderHub.repo_providers = {\n 'gh': GitHubRepoProvider,\n 'gist': GistRepoProvider,\n 'gl': GitLabRepoProvider,\n 'zenodo': ZenodoProvider,\n 'figshare': FigshareProvider,\n 'hydroshare': HydroshareProvider,\n 'dataverse': DataverseProvider,\n }\n```\n\n### References\n\nCredit: Jose Carlos Luna Duran (CERN) and Riccardo Castellotti (CERN).\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Email us at [security@ipython.org](mailto:security@ipython.org)\n\n\nAffected functions:\nbinderhub.repoproviders.GitRepoProvider.get_resolved_ref", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does binderhub version greather then equal to 0,less then 0.2.0 have ### Response: Having vulnarability CVE-2021-39159 Advisory: ### Impact\n\nA remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration.\n\n### Patches\n\nPatch below, or [on GitHub](https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch)\n\n```diff\nFrom 9f4043d9dddc1174920e687773f27b7933f48ab6 Mon Sep 17 00:00:00 2001\nFrom: Riccardo Castellotti \nDate: Thu, 19 Aug 2021 15:49:43 +0200\nSubject: [PATCH] Explicitly separate git-ls-remote options from positional\n arguments\n\n---\n binderhub/repoproviders.py | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)\n\ndiff --git a/binderhub/repoproviders.py b/binderhub/repoproviders.py\nindex f33347b..5d4b87c 100755\n--- a/binderhub/repoproviders.py\n+++ b/binderhub/repoproviders.py\n@@ -484,7 +484,7 @@ class GitRepoProvider(RepoProvider):\n self.sha1_validate(self.unresolved_ref)\n except ValueError:\n # The ref is a head/tag and we resolve it using `git ls-remote`\n- command = [\"git\", \"ls-remote\", self.repo, self.unresolved_ref]\n+ command = [\"git\", \"ls-remote\", \"--\", self.repo, self.unresolved_ref]\n result = subprocess.run(command, universal_newlines=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)\n if result.returncode:\n raise RuntimeError(\"Unable to run git ls-remote to get the `resolved_ref`: {}\".format(result.stderr))\n-- \n2.25.1\n\n```\n\n### Workarounds\n\nDisable the git repo provider by specifying the `BinderHub.repo_providers` config, e.g.:\n\n```python\nfrom binderhub.repoproviders import (GitHubRepoProvider,\n GitLabRepoProvider, GistRepoProvider,\n ZenodoProvider, FigshareProvider, HydroshareProvider,\n DataverseProvider)\n\nc.BinderHub.repo_providers = {\n 'gh': GitHubRepoProvider,\n 'gist': GistRepoProvider,\n 'gl': GitLabRepoProvider,\n 'zenodo': ZenodoProvider,\n 'figshare': FigshareProvider,\n 'hydroshare': HydroshareProvider,\n 'dataverse': DataverseProvider,\n }\n```\n\n### References\n\nCredit: Jose Carlos Luna Duran (CERN) and Riccardo Castellotti (CERN).\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Email us at [security@ipython.org](mailto:security@ipython.org)\n\n\nAffected functions:\nbinderhub.repoproviders.GitRepoProvider.get_resolved_ref" }, { "instruction": "what vulnarability does binpacking version less then 1.5.2 have", "input": "", "output": "Having vulnarability PVE-2021-43313 Advisory: Binpacking 1.5.2 removes 'pytest-runner' dependency as it poses a security risk.\r\nhttps://github.com/benmaier/binpacking/pull/27", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does binpacking version less then 1.5.2 have ### Response: Having vulnarability PVE-2021-43313 Advisory: Binpacking 1.5.2 removes 'pytest-runner' dependency as it poses a security risk.\r\nhttps://github.com/benmaier/binpacking/pull/27" }, { "instruction": "what vulnarability does binwalk version greather then equal to 0,less then 2.3.3 have", "input": "", "output": "Having vulnarability CVE-2021-4287 Advisory: A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 can address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does binwalk version greather then equal to 0,less then 2.3.3 have ### Response: Having vulnarability CVE-2021-4287 Advisory: A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 can address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876." }, { "instruction": "what vulnarability does biolink-model version less then 2.2.12 have", "input": "", "output": "Having vulnarability CVE-2021-43818 Advisory: Biolink-model 2.2.12 updates its dependency 'lxml' to v4.7.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does biolink-model version less then 2.2.12 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Biolink-model 2.2.12 updates its dependency 'lxml' to v4.7.1 to include a security fix." }, { "instruction": "what vulnarability does biothings version less then 0.12.3 have", "input": "", "output": "Having vulnarability PVE-2023-62122 Advisory: Biothings 0.12.3 includes a fix for a shell injection vulnerability.\r\nhttps://github.com/biothings/biothings.api/pull/301", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does biothings version less then 0.12.3 have ### Response: Having vulnarability PVE-2023-62122 Advisory: Biothings 0.12.3 includes a fix for a shell injection vulnerability.\r\nhttps://github.com/biothings/biothings.api/pull/301" }, { "instruction": "what vulnarability does birdhousebuilder-recipe-nginx version less then 0.1.5 have", "input": "", "output": "Having vulnarability CVE-2014-3566 Advisory: Birdhousebuilder-recipe-nginx 0.1.5 disables SSLv3 protocol to avoid known vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does birdhousebuilder-recipe-nginx version less then 0.1.5 have ### Response: Having vulnarability CVE-2014-3566 Advisory: Birdhousebuilder-recipe-nginx 0.1.5 disables SSLv3 protocol to avoid known vulnerabilities." }, { "instruction": "what vulnarability does bise-theme version less then 2.4 have", "input": "", "output": "Having vulnarability PVE-2021-25639 Advisory: bise.theme 2.4 fixes a potential XSS issue with catalogue search.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bise-theme version less then 2.4 have ### Response: Having vulnarability PVE-2021-25639 Advisory: bise.theme 2.4 fixes a potential XSS issue with catalogue search." }, { "instruction": "what vulnarability does bitbot version less then 1.12.0 have", "input": "", "output": "Having vulnarability PVE-2021-37551 Advisory: For security reasons, REST API only listens on localhost in Bitbot 1.12.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bitbot version less then 1.12.0 have ### Response: Having vulnarability PVE-2021-37551 Advisory: For security reasons, REST API only listens on localhost in Bitbot 1.12.0." }, { "instruction": "what vulnarability does bitlyshortener version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2024-69617 Advisory: A recent update has significantly reduced the quota for free token-generated links in a specific service, dropping from 1000 to 50 links per month. This reduction severely limits the utility of the service for users who rely on the free token. Consequently, maintenance for the associated package is being discontinued, even though the package will still function with the new restricted quota.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bitlyshortener version less then 0.7.0 have ### Response: Having vulnarability PVE-2024-69617 Advisory: A recent update has significantly reduced the quota for free token-generated links in a specific service, dropping from 1000 to 50 links per month. This reduction severely limits the utility of the service for users who rely on the free token. Consequently, maintenance for the associated package is being discontinued, even though the package will still function with the new restricted quota." }, { "instruction": "what vulnarability does bittensor version less then 3.4.3 have", "input": "", "output": "Having vulnarability PVE-2022-52000 Advisory: Bittensor 3.4.3 catches precision errors in synapse forward responses that may cause probability sums to exceed permissible boundaries.\r\nhttps://github.com/opentensor/bittensor/pull/991", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bittensor version less then 3.4.3 have ### Response: Having vulnarability PVE-2022-52000 Advisory: Bittensor 3.4.3 catches precision errors in synapse forward responses that may cause probability sums to exceed permissible boundaries.\r\nhttps://github.com/opentensor/bittensor/pull/991" }, { "instruction": "what vulnarability does biweeklybudget version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2019-7548 Advisory: Biweeklybudget 1.1.0 updates its dependency 'SQLAlchemy' to v1.3.13 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does biweeklybudget version less then 1.1.0 have ### Response: Having vulnarability CVE-2019-7548 Advisory: Biweeklybudget 1.1.0 updates its dependency 'SQLAlchemy' to v1.3.13 to include a security fix." }, { "instruction": "what vulnarability does bjoern version less then 1.4.2 have", "input": "", "output": "Having vulnarability CVE-2015-0219 Advisory: bjoern before 1.4.2 uses a insecure Django release which is vulnerable to CVE-2015-0219, see https://www.djangoproject.com/weblog/2015/jan/13/security/.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bjoern version less then 1.4.2 have ### Response: Having vulnarability CVE-2015-0219 Advisory: bjoern before 1.4.2 uses a insecure Django release which is vulnerable to CVE-2015-0219, see https://www.djangoproject.com/weblog/2015/jan/13/security/." }, { "instruction": "what vulnarability does black version less then 24.3.0 have", "input": "", "output": "Having vulnarability CVE-2024-21503 Advisory: Black before 24.3.0 have a security vulnerability where specific code formatting patterns could lead to arbitrary code execution. This issue arises from the unsafe handling of AST nodes, potentially allowing an attacker to execute code when Black formats a maliciously crafted Python file.\t\r\nhttps://github.com/psf/black/commit/f00093672628d212b8965a8993cee8bedf5fe9b8", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does black version less then 24.3.0 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Black before 24.3.0 have a security vulnerability where specific code formatting patterns could lead to arbitrary code execution. This issue arises from the unsafe handling of AST nodes, potentially allowing an attacker to execute code when Black formats a maliciously crafted Python file.\t\r\nhttps://github.com/psf/black/commit/f00093672628d212b8965a8993cee8bedf5fe9b8" }, { "instruction": "what vulnarability does blackboardsync version less then 0.11.1rc.1 have", "input": "", "output": "Having vulnarability PVE-2024-67002 Advisory: Blackboardsync 0.11.1rc.1 sets the pyqt5-qt5 version in the Pipfile and updates PyQt5 due to a security release addressing a recent cURL vulnerability. This update, specific to macOS, resolves an issue where the Pipfile.lock was not valid on other platforms, ensuring compatibility across different operating systems. The PyQt5 version is also updated in the pyproject.toml to maintain security and functionality.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blackboardsync version less then 0.11.1rc.1 have ### Response: Having vulnarability PVE-2024-67002 Advisory: Blackboardsync 0.11.1rc.1 sets the pyqt5-qt5 version in the Pipfile and updates PyQt5 due to a security release addressing a recent cURL vulnerability. This update, specific to macOS, resolves an issue where the Pipfile.lock was not valid on other platforms, ensuring compatibility across different operating systems. The PyQt5 version is also updated in the pyproject.toml to maintain security and functionality." }, { "instruction": "what vulnarability does blackduck version greather then equal to 0.0.25,less then equal to 0.0.52 have", "input": "", "output": "Having vulnarability CVE-2020-27589 Advisory: Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases. See CVE-2020-27589.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blackduck version greather then equal to 0.0.25,less then equal to 0.0.52 have ### Response: Having vulnarability CVE-2020-27589 Advisory: Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases. See CVE-2020-27589." }, { "instruction": "what vulnarability does blackjack21 version less then 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-52382 Advisory: Blackjack21 3.0.0 fixes several vulnerabilities related to data validation.\r\nhttps://github.com/rahul-nanwani/blackjack21/compare/2.0.1...v3.0.0#diff-312bb1d80aad60b8051333de1b78b15004177c233da9712b4fd1799b78bdc1c3R1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blackjack21 version less then 3.0.0 have ### Response: Having vulnarability PVE-2022-52382 Advisory: Blackjack21 3.0.0 fixes several vulnerabilities related to data validation.\r\nhttps://github.com/rahul-nanwani/blackjack21/compare/2.0.1...v3.0.0#diff-312bb1d80aad60b8051333de1b78b15004177c233da9712b4fd1799b78bdc1c3R1" }, { "instruction": "what vulnarability does blacksheep version less then 1.2.5 have", "input": "", "output": "Having vulnarability PVE-2022-46072 Advisory: Blacksheep 1.2.5 adds built-in support for anti-forgery validation to protect against Cross-Site Request Forgery (XSRF/CSRF) attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blacksheep version less then 1.2.5 have ### Response: Having vulnarability PVE-2022-46072 Advisory: Blacksheep 1.2.5 adds built-in support for anti-forgery validation to protect against Cross-Site Request Forgery (XSRF/CSRF) attacks." }, { "instruction": "what vulnarability does blask version less then 0.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-39028 Advisory: Blask 0.2.2 fixes some vulnerabilities. See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blask version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-39028 Advisory: Blask 0.2.2 fixes some vulnerabilities. See: ." }, { "instruction": "what vulnarability does blazar version less then 1.3.1 have", "input": "", "output": "Having vulnarability CVE-2020-26943 Advisory: An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected. See: CVE-2020-26943.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blazar version less then 1.3.1 have ### Response: Having vulnarability CVE-2020-26943 Advisory: An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected. See: CVE-2020-26943." }, { "instruction": "what vulnarability does bleach version less then 2.1 have", "input": "", "output": "Having vulnarability PVE-2021-34965 Advisory: bleach 2.1 converts control characters (backspace particularly) to \"?\" preventing malicious copy-and-paste situations.\r\nhttps://github.com/mozilla/bleach/commit/5490eb633def7983c3062b5657193e4210af4a49", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bleach version less then 2.1 have ### Response: Having vulnarability PVE-2021-34965 Advisory: bleach 2.1 converts control characters (backspace particularly) to \"?\" preventing malicious copy-and-paste situations.\r\nhttps://github.com/mozilla/bleach/commit/5490eb633def7983c3062b5657193e4210af4a49" }, { "instruction": "what vulnarability does bleach-extras version less then 0.0.4 have", "input": "", "output": "Having vulnarability CVE-2018-7753 Advisory: Bleach-extras 0.0.4 requires bleach version >=3.2.1 to deal with security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bleach-extras version less then 0.0.4 have ### Response: Having vulnarability CVE-2018-7753 Advisory: Bleach-extras 0.0.4 requires bleach version >=3.2.1 to deal with security issues." }, { "instruction": "what vulnarability does blendernc version less then 0.6.0 have", "input": "", "output": "Having vulnarability CVE-2022-22816 Advisory: Blendernc 0.6.0 updates its dependency 'pillow' to v9.0.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blendernc version less then 0.6.0 have ### Response: Having vulnarability CVE-2022-22816 Advisory: Blendernc 0.6.0 updates its dependency 'pillow' to v9.0.0 to include security fixes." }, { "instruction": "what vulnarability does blickfeld-qb2 version less then 1.7 have", "input": "", "output": "Having vulnarability PVE-2023-62984 Advisory: Blickfeld-qb2 1.7 patches CVE Security.\r\nhttps://github.com/Blickfeld/blickfeld-qb2/commit/27424bcd7c69c06e7cdfa60a37c7d8534eb0dfb0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blickfeld-qb2 version less then 1.7 have ### Response: Having vulnarability PVE-2023-62984 Advisory: Blickfeld-qb2 1.7 patches CVE Security.\r\nhttps://github.com/Blickfeld/blickfeld-qb2/commit/27424bcd7c69c06e7cdfa60a37c7d8534eb0dfb0" }, { "instruction": "what vulnarability does blinkpy version less then 0.10.2 have", "input": "", "output": "Having vulnarability PVE-2021-36596 Advisory: blinkpy 0.10.2 sets minimum required version of the requests library to 2.20.0 due to vulnerability in earlier releases.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blinkpy version less then 0.10.2 have ### Response: Having vulnarability PVE-2021-36596 Advisory: blinkpy 0.10.2 sets minimum required version of the requests library to 2.20.0 due to vulnerability in earlier releases." }, { "instruction": "what vulnarability does blint version less then equal to 1.0.35 have", "input": "", "output": "Having vulnarability CVE-2022-38496 Advisory: BLint is powered by LIEF. BLint 1.0.35 and versions below uses LIEF as dependency, which has a CVE on its versions below 0.13.0. \r\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-38496\r\nhttps://deps.dev/pypi/blint/1.0.35/dependencies", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blint version less then equal to 1.0.35 have ### Response: Having vulnarability CVE-2022-38496 Advisory: BLint is powered by LIEF. BLint 1.0.35 and versions below uses LIEF as dependency, which has a CVE on its versions below 0.13.0. \r\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-38496\r\nhttps://deps.dev/pypi/blint/1.0.35/dependencies" }, { "instruction": "what vulnarability does block-io version less then 1.1.7 have", "input": "", "output": "Having vulnarability CVE-2013-7459 Advisory: block-io 1.1.7 includes a fix for CVE-2013-7459 - https://security-tracker.debian.org/tracker/CVE-2013-7459", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does block-io version less then 1.1.7 have ### Response: Having vulnarability CVE-2013-7459 Advisory: block-io 1.1.7 includes a fix for CVE-2013-7459 - https://security-tracker.debian.org/tracker/CVE-2013-7459" }, { "instruction": "what vulnarability does blueice version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2024-64087 Advisory: Blueice 1.1.0 fixes a race condition that arose when parallel jobs attempted to write to the same cache file simultaneously. This update introduces the use of the atomicwrites package, ensuring atomic file writing operations. It prevents data corruption and ensures the integrity of cache files.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does blueice version less then 1.1.0 have ### Response: Having vulnarability PVE-2024-64087 Advisory: Blueice 1.1.0 fixes a race condition that arose when parallel jobs attempted to write to the same cache file simultaneously. This update introduces the use of the atomicwrites package, ensuring atomic file writing operations. It prevents data corruption and ensures the integrity of cache files." }, { "instruction": "what vulnarability does boatswain version less then 1.0.4 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Boatswain 1.0.4 includes a security patch for the function 'main' in 'boatswain/cli.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/NLeSC/boatswain/commit/1fc3f79b8f1f2affb407c7a147cca71c11f26d3c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does boatswain version less then 1.0.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Boatswain 1.0.4 includes a security patch for the function 'main' in 'boatswain/cli.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/NLeSC/boatswain/commit/1fc3f79b8f1f2affb407c7a147cca71c11f26d3c" }, { "instruction": "what vulnarability does bobtemplates-cs version less then 1.6 have", "input": "", "output": "Having vulnarability PVE-2022-51164 Advisory: Bobtemplates.cs 1.6 improves default security policies for Nginx.\r\nhttps://github.com/codesyntax/bobtemplates.cs/commit/c3b00adfc1210c46c49f269a7dbd85a91435463f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bobtemplates-cs version less then 1.6 have ### Response: Having vulnarability PVE-2022-51164 Advisory: Bobtemplates.cs 1.6 improves default security policies for Nginx.\r\nhttps://github.com/codesyntax/bobtemplates.cs/commit/c3b00adfc1210c46c49f269a7dbd85a91435463f" }, { "instruction": "what vulnarability does bodhi version less then 2.2.0 have", "input": "", "output": "Having vulnarability CVE-2016-1000008 Advisory: Bodhi 2.2.0 addresses CVE-2016-1000008 by disallowing the re-use of solved captchas. Additionally, the captcha is\r\nwarped to make it more difficult to solve through automation.\r\nhttps://github.com/fedora-infra/bodhi/pull/857\r\nhttps://github.com/fedora-infra/bodhi/commit/f0122855", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bodhi version less then 2.2.0 have ### Response: Having vulnarability CVE-2016-1000008 Advisory: Bodhi 2.2.0 addresses CVE-2016-1000008 by disallowing the re-use of solved captchas. Additionally, the captcha is\r\nwarped to make it more difficult to solve through automation.\r\nhttps://github.com/fedora-infra/bodhi/pull/857\r\nhttps://github.com/fedora-infra/bodhi/commit/f0122855" }, { "instruction": "what vulnarability does bodhi-server version less then 2.2.0 have", "input": "", "output": "Having vulnarability CVE-2016-1000008 Advisory: Bodhi-server 2.2.0 addresses CVE-2016-1000008 by disallowing the re-use of solved captchas. Additionally, the captcha is warped to make it more difficult to solve through automation.\r\nSee: https://github.com/fedora-infra/bodhi/pull/857\r\nAnd: https://github.com/fedora-infra/bodhi/commit/f0122855", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bodhi-server version less then 2.2.0 have ### Response: Having vulnarability CVE-2016-1000008 Advisory: Bodhi-server 2.2.0 addresses CVE-2016-1000008 by disallowing the re-use of solved captchas. Additionally, the captcha is warped to make it more difficult to solve through automation.\r\nSee: https://github.com/fedora-infra/bodhi/pull/857\r\nAnd: https://github.com/fedora-infra/bodhi/commit/f0122855" }, { "instruction": "what vulnarability does bokeh version less then 1.0.4 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Bokeh before 1.0.4 used a Pyyaml version that was vulnerable to CVE-2017-18342.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bokeh version less then 1.0.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Bokeh before 1.0.4 used a Pyyaml version that was vulnerable to CVE-2017-18342." }, { "instruction": "what vulnarability does bookops-worldcat version less then 0.3.5 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Bookops-worldcat version 0.3.5 updates its urllib3 dependency to 1.26.5, addressing security vulnerability CVE-2021-33503.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bookops-worldcat version less then 0.3.5 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Bookops-worldcat version 0.3.5 updates its urllib3 dependency to 1.26.5, addressing security vulnerability CVE-2021-33503." }, { "instruction": "what vulnarability does borgbackup version less then 1.0.7 have", "input": "", "output": "Having vulnarability PVE-2024-64382 Advisory: Borgbackup is vulnerable to an unauthorized remote repository access vulnerability. If you used e.g. --restrict-to-path /path/client1/ (with or without trailing slash does not make a difference), it acted like a path prefix match using /path/client1 (note the missing trailing slash) - the code then also allowed working in e.g. /path/client13 or /path/client1000.\r\nhttps://github.com/borgbackup/borg/issues/1428", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does borgbackup version less then 1.0.7 have ### Response: Having vulnarability PVE-2024-64382 Advisory: Borgbackup is vulnerable to an unauthorized remote repository access vulnerability. If you used e.g. --restrict-to-path /path/client1/ (with or without trailing slash does not make a difference), it acted like a path prefix match using /path/client1 (note the missing trailing slash) - the code then also allowed working in e.g. /path/client13 or /path/client1000.\r\nhttps://github.com/borgbackup/borg/issues/1428" }, { "instruction": "what vulnarability does borgmatic version less then 1.8.7 have", "input": "", "output": "Having vulnarability PVE-2024-64394 Advisory: Borgmatic is vulnerable to shell injection within the \"borgmatic borg\" action.\r\nhttps://github.com/borgmatic-collective/borgmatic/commit/3c22a8ec164087beb1d292dc114f78f8b6382ae2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does borgmatic version less then 1.8.7 have ### Response: Having vulnarability PVE-2024-64394 Advisory: Borgmatic is vulnerable to shell injection within the \"borgmatic borg\" action.\r\nhttps://github.com/borgmatic-collective/borgmatic/commit/3c22a8ec164087beb1d292dc114f78f8b6382ae2" }, { "instruction": "what vulnarability does boss-cli version less then 1.0.0a20 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Boss-cli 1.0.0a20 updates its dependency 'requests' to v2.20.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does boss-cli version less then 1.0.0a20 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Boss-cli 1.0.0a20 updates its dependency 'requests' to v2.20.0 to include a security fix." }, { "instruction": "what vulnarability does botaa3 version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45424 Advisory: Botaa3 is a malicious package, typosquatting. It creates a backdoor in your system.\r\nhttps://blog.sonatype.com/another-day-of-malware-malicious-botaa3-pypi-package", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does botaa3 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45424 Advisory: Botaa3 is a malicious package, typosquatting. It creates a backdoor in your system.\r\nhttps://blog.sonatype.com/another-day-of-malware-malicious-botaa3-pypi-package" }, { "instruction": "what vulnarability does botframework-connector version greather then equal to 4.7.0,less then 4.7.2,greather then equal to 4.8.0,less then 4.8.1,greather then equal to 4.9.0,less then 4.9.3,greather then equal to 4.10.0,less then 4.10.1 have", "input": "", "output": "Having vulnarability CVE-2021-1725 Advisory: Bot Framework SDK Information Disclosure Vulnerability.\r\nhttps://github.com/microsoft/botbuilder-python/security/advisories/GHSA-cqff-fx2x-p86v", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does botframework-connector version greather then equal to 4.7.0,less then 4.7.2,greather then equal to 4.8.0,less then 4.8.1,greather then equal to 4.9.0,less then 4.9.3,greather then equal to 4.10.0,less then 4.10.1 have ### Response: Having vulnarability CVE-2021-1725 Advisory: Bot Framework SDK Information Disclosure Vulnerability.\r\nhttps://github.com/microsoft/botbuilder-python/security/advisories/GHSA-cqff-fx2x-p86v" }, { "instruction": "what vulnarability does boto version less then 2.39.0 have", "input": "", "output": "Having vulnarability PVE-2017-47528 Advisory: Boto 2.39.0 replaces yaml.load() with yaml.safe_load() to avoid a Code Execution vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does boto version less then 2.39.0 have ### Response: Having vulnarability PVE-2017-47528 Advisory: Boto 2.39.0 replaces yaml.load() with yaml.safe_load() to avoid a Code Execution vulnerability." }, { "instruction": "what vulnarability does boto3 version less then 1.4.5 have", "input": "", "output": "Having vulnarability PVE-2021-41708 Advisory: Boto3 version 1.4.5 fixes an information exposure vulnerability: The boto logger boto3.resources.action, which propagates to root logger, logs the entire uploaded bytes at INFO level.\r\nhttps://github.com/boto/boto3/issues/1017", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does boto3 version less then 1.4.5 have ### Response: Having vulnarability PVE-2021-41708 Advisory: Boto3 version 1.4.5 fixes an information exposure vulnerability: The boto logger boto3.resources.action, which propagates to root logger, logs the entire uploaded bytes at INFO level.\r\nhttps://github.com/boto/boto3/issues/1017" }, { "instruction": "what vulnarability does boto33 version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53254 Advisory: Boto33 is a malicious package, pytosquatting the popular package 'boto3'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does boto33 version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53254 Advisory: Boto33 is a malicious package, pytosquatting the popular package 'boto3'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does botoa version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53255 Advisory: Botoa is a malicious package, pytosquatting the popular package 'boto3'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does botoa version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53255 Advisory: Botoa is a malicious package, pytosquatting the popular package 'boto3'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does botoa3 version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53256 Advisory: Botoa3 is a malicious package, pytosquatting the popular package 'boto3'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does botoa3 version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53256 Advisory: Botoa3 is a malicious package, pytosquatting the popular package 'boto3'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does botocore version less then 1.9.12 have", "input": "", "output": "Having vulnarability PVE-2023-59547 Advisory: Botocore 1.9.12 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/boto/botocore/pull/1405", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does botocore version less then 1.9.12 have ### Response: Having vulnarability PVE-2023-59547 Advisory: Botocore 1.9.12 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/boto/botocore/pull/1405" }, { "instruction": "what vulnarability does botoo version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53257 Advisory: Botoo is a malicious package, pytosquatting the popular package 'boto3'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does botoo version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53257 Advisory: Botoo is a malicious package, pytosquatting the popular package 'boto3'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does bottle version less then 0.12.10 have", "input": "", "output": "Having vulnarability CVE-2016-9964 Advisory: redirect() in bottle.py in bottle 0.12.10 doesn't filter a \"\\r\\n\" sequence, which leads to a CRLF attack, as demonstrated by a redirect(\"233\\r\\nSet-Cookie: name=salt\") call.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bottle version less then 0.12.10 have ### Response: Having vulnarability CVE-2016-9964 Advisory: redirect() in bottle.py in bottle 0.12.10 doesn't filter a \"\\r\\n\" sequence, which leads to a CRLF attack, as demonstrated by a redirect(\"233\\r\\nSet-Cookie: name=salt\") call." }, { "instruction": "what vulnarability does bounter version equal to 1.01,equal to 1.10 have", "input": "", "output": "Having vulnarability CVE-2021-41497 Advisory: A null pointer reference is found within the CMS_Conservative_increment_obj function in bounter version 1.01 and 1.10, developed by RaRe-Technologies. This vulnerability allows potential attackers to initiate Denial of Service attacks through the submission of extremely large hash bucket widths.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bounter version equal to 1.01,equal to 1.10 have ### Response: Having vulnarability CVE-2021-41497 Advisory: A null pointer reference is found within the CMS_Conservative_increment_obj function in bounter version 1.01 and 1.10, developed by RaRe-Technologies. This vulnerability allows potential attackers to initiate Denial of Service attacks through the submission of extremely large hash bucket widths." }, { "instruction": "what vulnarability does boussole version less then 1.5.0 have", "input": "", "output": "Having vulnarability PVE-2021-37147 Advisory: Boussole 1.5.0 fixes the PyYAML 'load()' deprecation warning. For a recent security issue, PyYAML has introduced a change to its ``load()`` method to be more safe. Boussole now uses the full loader mode so it does not trigger a warning anymore.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does boussole version less then 1.5.0 have ### Response: Having vulnarability PVE-2021-37147 Advisory: Boussole 1.5.0 fixes the PyYAML 'load()' deprecation warning. For a recent security issue, PyYAML has introduced a change to its ``load()`` method to be more safe. Boussole now uses the full loader mode so it does not trigger a warning anymore." }, { "instruction": "what vulnarability does brasil-gov-portal version less then 1.5.1 have", "input": "", "output": "Having vulnarability CVE-2017-1000484 Advisory: Brasil.gov.portal before 1.5.1 uses Plone <4.3.15 which is vulnerable to several XSS and redirect flaws, and a sandbox escape.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does brasil-gov-portal version less then 1.5.1 have ### Response: Having vulnarability CVE-2017-1000484 Advisory: Brasil.gov.portal before 1.5.1 uses Plone <4.3.15 which is vulnerable to several XSS and redirect flaws, and a sandbox escape." }, { "instruction": "what vulnarability does brds version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2023-55038 Advisory: Brds 0.3.0 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/brahle/brds/commit/65a470df27a35d03ca4349707baa0fb0c8c6da43", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does brds version less then 0.3.0 have ### Response: Having vulnarability PVE-2023-55038 Advisory: Brds 0.3.0 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/brahle/brds/commit/65a470df27a35d03ca4349707baa0fb0c8c6da43" }, { "instruction": "what vulnarability does bridgecrew version less then 2.0.1029 have", "input": "", "output": "Having vulnarability PVE-2024-63921 Advisory: Checkov 2.0.1029 introduces a fix for a vulnerability that previously allowed security group rules in Terraform configurations to permit unrestricted ingress access from 0.0.0.0:0 to port 22, commonly used for SSH.\r\nhttps://github.com/bridgecrewio/checkov/issues/1973\r\nhttps://github.com/bridgecrewio/checkov/pull/2749", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bridgecrew version less then 2.0.1029 have ### Response: Having vulnarability PVE-2024-63921 Advisory: Checkov 2.0.1029 introduces a fix for a vulnerability that previously allowed security group rules in Terraform configurations to permit unrestricted ingress access from 0.0.0.0:0 to port 22, commonly used for SSH.\r\nhttps://github.com/bridgecrewio/checkov/issues/1973\r\nhttps://github.com/bridgecrewio/checkov/pull/2749" }, { "instruction": "what vulnarability does brotli version less then 1.0.8 have", "input": "", "output": "Having vulnarability CVE-2020-8927 Advisory: A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update Brotli library to 1.0.8 or later. If one cannot update, it is recommended to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does brotli version less then 1.0.8 have ### Response: Having vulnarability CVE-2020-8927 Advisory: A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update Brotli library to 1.0.8 or later. If one cannot update, it is recommended to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits." }, { "instruction": "what vulnarability does brotli-asgi version less then 1.4.0 have", "input": "", "output": "Having vulnarability CVE-2023-30798 Advisory: Brotli-asgi 1.4.0 updates its dependency 'starlette' to v0.25.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does brotli-asgi version less then 1.4.0 have ### Response: Having vulnarability CVE-2023-30798 Advisory: Brotli-asgi 1.4.0 updates its dependency 'starlette' to v0.25.0 to include a security fix." }, { "instruction": "what vulnarability does brume version less then 2.0.2 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Brume 2.0.2 includes a security patch for the function 'load' in 'brume/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/flou/brume/commit/9407537a4f24521b6d009a52a77b4f6deabb0b71#diff-db395031eb85fc2c76864f9a9e13ed341de029a79e0fc76a798090f50504fb6a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does brume version less then 2.0.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Brume 2.0.2 includes a security patch for the function 'load' in 'brume/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/flou/brume/commit/9407537a4f24521b6d009a52a77b4f6deabb0b71#diff-db395031eb85fc2c76864f9a9e13ed341de029a79e0fc76a798090f50504fb6a" }, { "instruction": "what vulnarability does bsblan version less then 0.27 have", "input": "", "output": "Having vulnarability PVE-2021-37697 Advisory: Bsblan 0.27 sets the DEFAULT_FLAG in config to read-only for added level of security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bsblan version less then 0.27 have ### Response: Having vulnarability PVE-2021-37697 Advisory: Bsblan 0.27 sets the DEFAULT_FLAG in config to read-only for added level of security." }, { "instruction": "what vulnarability does bsdiff4 version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2020-15904 Advisory: Bsdiff4 1.2.0 includes a fix for CVE-2020-15904: A buffer overflow in the patching routine of bsdiff4 before 1.2.0 allows an attacker to write to heap memory (beyond allocated bounds) via a crafted patch file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bsdiff4 version less then 1.2.0 have ### Response: Having vulnarability CVE-2020-15904 Advisory: Bsdiff4 1.2.0 includes a fix for CVE-2020-15904: A buffer overflow in the patching routine of bsdiff4 before 1.2.0 allows an attacker to write to heap memory (beyond allocated bounds) via a crafted patch file." }, { "instruction": "what vulnarability does buildbot version less then 1.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-36320 Advisory: Buildbot before 1.3.0 did not use ``hmac.compare_digest()`` in GitHub hooks.\r\nhttps://github.com/buildbot/buildbot/commit/e159e4ed0a2fee9c7e41e81ae81333b0c9557256", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does buildbot version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-36320 Advisory: Buildbot before 1.3.0 did not use ``hmac.compare_digest()`` in GitHub hooks.\r\nhttps://github.com/buildbot/buildbot/commit/e159e4ed0a2fee9c7e41e81ae81333b0c9557256" }, { "instruction": "what vulnarability does bullmq version less then 1.14.1 have", "input": "", "output": "Having vulnarability PVE-2024-63935 Advisory: Bullmq 1.14.1 addresses a race condition identified in job finish queue events. It previously led to potential data inconsistencies within the queue management system, especially under heavy load with concurrent job processing. \r\nhttps://github.com/taskforcesh/bullmq/commit/355bca5ee128bf4ff37608746f9c6f7cca580eb0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bullmq version less then 1.14.1 have ### Response: Having vulnarability PVE-2024-63935 Advisory: Bullmq 1.14.1 addresses a race condition identified in job finish queue events. It previously led to potential data inconsistencies within the queue management system, especially under heavy load with concurrent job processing. \r\nhttps://github.com/taskforcesh/bullmq/commit/355bca5ee128bf4ff37608746f9c6f7cca580eb0" }, { "instruction": "what vulnarability does bumblebee-status version less then 2.1.6 have", "input": "", "output": "Having vulnarability PVE-2022-51108 Advisory: Bumblebee-status 2.1.6 fixes insecure use of tempfile in modules/rss.\r\nhttps://github.com/tobi-wan-kenobi/bumblebee-status/commit/4f9553f7ea4ca9d9166980384669c451b74cd019", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bumblebee-status version less then 2.1.6 have ### Response: Having vulnarability PVE-2022-51108 Advisory: Bumblebee-status 2.1.6 fixes insecure use of tempfile in modules/rss.\r\nhttps://github.com/tobi-wan-kenobi/bumblebee-status/commit/4f9553f7ea4ca9d9166980384669c451b74cd019" }, { "instruction": "what vulnarability does burl version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-46419 Advisory: Burl 2.0.0 workswith JWT tokens more securely.\r\nhttps://github.com/wryfi/burl/commit/664878ce9a31695456be89c8e10e8bb612074ef6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does burl version less then 2.0.0 have ### Response: Having vulnarability PVE-2022-46419 Advisory: Burl 2.0.0 workswith JWT tokens more securely.\r\nhttps://github.com/wryfi/burl/commit/664878ce9a31695456be89c8e10e8bb612074ef6" }, { "instruction": "what vulnarability does buttplug version less then 0.2.1 have", "input": "", "output": "Having vulnarability PVE-2022-50473 Advisory: Buttplug 0.2.1 updates its dependency 'websockets' to v10.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does buttplug version less then 0.2.1 have ### Response: Having vulnarability PVE-2022-50473 Advisory: Buttplug 0.2.1 updates its dependency 'websockets' to v10.1 to include a security fix." }, { "instruction": "what vulnarability does byarse version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-38754 Advisory: Byarse 1.1.0 introduces 'Safe mode', which can be enabled to prevent unpickling Pickle type during deserialization. This prevents a big security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does byarse version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-38754 Advisory: Byarse 1.1.0 introduces 'Safe mode', which can be enabled to prevent unpickling Pickle type during deserialization. This prevents a big security vulnerability." }, { "instruction": "what vulnarability does bzip version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2021-34980 Advisory: bzip is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bzip version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34980 Advisory: bzip is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/" }, { "instruction": "what vulnarability does bzip3 version less then 0.1.2 have", "input": "", "output": "Having vulnarability PVE-2023-58746 Advisory: Bzip3 (python client) 0.1.2 includes bzip3 core version 1.3.0, that fixes a buffer overflow vulnerability in libsais.\r\nhttps://github.com/kspalaiologos/bzip3/commit/bfa5bf82b53715dfedf048e5859a46cf248668ff", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bzip3 version less then 0.1.2 have ### Response: Having vulnarability PVE-2023-58746 Advisory: Bzip3 (python client) 0.1.2 includes bzip3 core version 1.3.0, that fixes a buffer overflow vulnerability in libsais.\r\nhttps://github.com/kspalaiologos/bzip3/commit/bfa5bf82b53715dfedf048e5859a46cf248668ff" }, { "instruction": "what vulnarability does bzt version less then 1.16.2 have", "input": "", "output": "Having vulnarability CVE-2021-45046 Advisory: Bzt 1.16.2 updates its dependency 'jmeter' to v5.4.2 to include security fixes.\r\nhttps://github.com/Blazemeter/taurus/commit/f7fb13fed9ca4f871a3426c3c26fb3e86beb329a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does bzt version less then 1.16.2 have ### Response: Having vulnarability CVE-2021-45046 Advisory: Bzt 1.16.2 updates its dependency 'jmeter' to v5.4.2 to include security fixes.\r\nhttps://github.com/Blazemeter/taurus/commit/f7fb13fed9ca4f871a3426c3c26fb3e86beb329a" }, { "instruction": "what vulnarability does c2cciutils version less then 1.6.0 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: C2cciutils 1.6.0 updates its 'requests' dependency to v2.31.0 to address CVE-2023-32681.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does c2cciutils version less then 1.6.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: C2cciutils 1.6.0 updates its 'requests' dependency to v2.31.0 to address CVE-2023-32681." }, { "instruction": "what vulnarability does c2cgeoform version less then 2.1.26 have", "input": "", "output": "Having vulnarability PVE-2024-63692 Advisory: C2cgeoform 2.1.26 fixes a security issue where attachments could be directly opened in the browser, posing a risk of script execution from malicious files. This update forces attachments to be downloaded, preventing automatic execution and enhancing security. \r\nhttps://github.com/camptocamp/c2cgeoform/pull/236/commits/b4452ff1dadd2f3d45bec8bff6dbe34094ecdb93", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does c2cgeoform version less then 2.1.26 have ### Response: Having vulnarability PVE-2024-63692 Advisory: C2cgeoform 2.1.26 fixes a security issue where attachments could be directly opened in the browser, posing a risk of script execution from malicious files. This update forces attachments to be downloaded, preventing automatic execution and enhancing security. \r\nhttps://github.com/camptocamp/c2cgeoform/pull/236/commits/b4452ff1dadd2f3d45bec8bff6dbe34094ecdb93" }, { "instruction": "what vulnarability does c2cwsgiutils version less then 4.0.0 have", "input": "", "output": "Having vulnarability CVE-2020-26137 Advisory: C2cwsgiutils 4.0.0 updates its dependency 'pipenv' to v2020.5.28 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does c2cwsgiutils version less then 4.0.0 have ### Response: Having vulnarability CVE-2020-26137 Advisory: C2cwsgiutils 4.0.0 updates its dependency 'pipenv' to v2020.5.28 to include security fixes." }, { "instruction": "what vulnarability does cabot version less then equal to 0.11.7 have", "input": "", "output": "Having vulnarability CVE-2020-7734 Advisory: In September 2020 it was reported that all versions of the cabot package are vulnerable to Cross-site Scripting (XSS) via the Endpoint column. The latest release of cabot at that date was version 0.11.7.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cabot version less then equal to 0.11.7 have ### Response: Having vulnarability CVE-2020-7734 Advisory: In September 2020 it was reported that all versions of the cabot package are vulnerable to Cross-site Scripting (XSS) via the Endpoint column. The latest release of cabot at that date was version 0.11.7." }, { "instruction": "what vulnarability does caikit version less then 0.20.4 have", "input": "", "output": "Having vulnarability CVE-2021-41495 Advisory: Caikit 0.20.4 updates its numpy dependency to versions between 1.22.2 and 2. This change is made in response to the CVE-2021-41495 security issue, where the previous version of numpy had vulnerabilities. \r\nhttps://github.com/caikit/caikit/pull/492/commits/ef2412e6e05fc646500fc8cd0a39250748872372", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does caikit version less then 0.20.4 have ### Response: Having vulnarability CVE-2021-41495 Advisory: Caikit 0.20.4 updates its numpy dependency to versions between 1.22.2 and 2. This change is made in response to the CVE-2021-41495 security issue, where the previous version of numpy had vulnerabilities. \r\nhttps://github.com/caikit/caikit/pull/492/commits/ef2412e6e05fc646500fc8cd0a39250748872372" }, { "instruction": "what vulnarability does cairo-lang version less then 0.10.0 have", "input": "", "output": "Having vulnarability PVE-2022-50897 Advisory: Cairo-lang 0.10.0 fixes a bug in 'uint256_unsigned_div_rem' which allowed a malicious prover to return a wrong result. Contracts using this function or any other function which uses it ('uint256_signed_div_rem' or 'uint256_shr' for the standard library) should be recompiled & redeployed with version >= 0.10.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cairo-lang version less then 0.10.0 have ### Response: Having vulnarability PVE-2022-50897 Advisory: Cairo-lang 0.10.0 fixes a bug in 'uint256_unsigned_div_rem' which allowed a malicious prover to return a wrong result. Contracts using this function or any other function which uses it ('uint256_signed_div_rem' or 'uint256_shr' for the standard library) should be recompiled & redeployed with version >= 0.10.0." }, { "instruction": "what vulnarability does cairo-rs-py version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2023-54904 Advisory: Cairo-rs-py 0.2.0 includes a fix for a potential DoS vulnerability.\r\nhttps://github.com/lambdaclass/cairo-rs-py/issues/216", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cairo-rs-py version less then 0.2.0 have ### Response: Having vulnarability PVE-2023-54904 Advisory: Cairo-rs-py 0.2.0 includes a fix for a potential DoS vulnerability.\r\nhttps://github.com/lambdaclass/cairo-rs-py/issues/216" }, { "instruction": "what vulnarability does cairosvg version less then 1.0.21 have", "input": "", "output": "Having vulnarability PVE-2021-25643 Advisory: cairosvg 1.0.21 is a security update. CairoSVG was vulnerable to XML eXternal Entity (XXE) attacks, this release fixes this vulnerability by not resolving the XML entities anymore. The ``--unsafe`` option has been added to force the resolution of XML entities. Obviously, this option is not safe and should only be used with trusted SVG files.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cairosvg version less then 1.0.21 have ### Response: Having vulnarability PVE-2021-25643 Advisory: cairosvg 1.0.21 is a security update. CairoSVG was vulnerable to XML eXternal Entity (XXE) attacks, this release fixes this vulnerability by not resolving the XML entities anymore. The ``--unsafe`` option has been added to force the resolution of XML entities. Obviously, this option is not safe and should only be used with trusted SVG files." }, { "instruction": "what vulnarability does calcwave version less then 1.2.6 have", "input": "", "output": "Having vulnarability PVE-2021-40507 Advisory: Calcwave 1.2.6 updates limits for modules and functions available to 'eval()' in the interpreter. This greatly improves the security and reduces the risk of accidentally calling the 'Python' function that damages your computer.\r\nhttps://github.com/zenarcher007/calcwave/commit/1d95d1861a0bf9954e95f82469f279bb3ba12d9a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does calcwave version less then 1.2.6 have ### Response: Having vulnarability PVE-2021-40507 Advisory: Calcwave 1.2.6 updates limits for modules and functions available to 'eval()' in the interpreter. This greatly improves the security and reduces the risk of accidentally calling the 'Python' function that damages your computer.\r\nhttps://github.com/zenarcher007/calcwave/commit/1d95d1861a0bf9954e95f82469f279bb3ba12d9a" }, { "instruction": "what vulnarability does calendar-view version less then 2.4.0 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Calendar-view 2.4.0 updates its dependency 'pillow' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does calendar-view version less then 2.4.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Calendar-view 2.4.0 updates its dependency 'pillow' to include a security fix." }, { "instruction": "what vulnarability does calibreweb version less then 0.6.16 have", "input": "", "output": "Having vulnarability CVE-2022-0406 Advisory: Improper Authorization in GitHub repository janeczku/calibre-web prior to 0.6.16.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does calibreweb version less then 0.6.16 have ### Response: Having vulnarability CVE-2022-0406 Advisory: Improper Authorization in GitHub repository janeczku/calibre-web prior to 0.6.16." }, { "instruction": "what vulnarability does callisto-core version less then 0.19.0 have", "input": "", "output": "Having vulnarability PVE-2019-45606 Advisory: Callisto-core 0.19.0 stops showing locals on travis.\r\nhttps://github.com/project-callisto/callisto-core/commit/0791639280dfbe742536bf9f29d3eb888d6951e9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does callisto-core version less then 0.19.0 have ### Response: Having vulnarability PVE-2019-45606 Advisory: Callisto-core 0.19.0 stops showing locals on travis.\r\nhttps://github.com/project-callisto/callisto-core/commit/0791639280dfbe742536bf9f29d3eb888d6951e9" }, { "instruction": "what vulnarability does callosum version less then 0.9.4 have", "input": "", "output": "Having vulnarability PVE-2023-61189 Advisory: Callosum 0.9.4 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/lablup/callosum/pull/12", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does callosum version less then 0.9.4 have ### Response: Having vulnarability PVE-2023-61189 Advisory: Callosum 0.9.4 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/lablup/callosum/pull/12" }, { "instruction": "what vulnarability does camply version less then 0.24.1 have", "input": "", "output": "Having vulnarability CVE-2023-32309 Advisory: Camply 0.24.1 updates its dependency 'pymdown-extensions' to v10.0.1 to include a security fix.\r\nhttps://github.com/juftin/camply/commit/4c6d371", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does camply version less then 0.24.1 have ### Response: Having vulnarability CVE-2023-32309 Advisory: Camply 0.24.1 updates its dependency 'pymdown-extensions' to v10.0.1 to include a security fix.\r\nhttps://github.com/juftin/camply/commit/4c6d371" }, { "instruction": "what vulnarability does canada-holiday version less then 1.1.4 have", "input": "", "output": "Having vulnarability CVE-2024-21503 Advisory: Canada-holiday 1.1.4 upgrades its black dependency to version 24.3.0, addressing the ReDoS vulnerability identified in CVE-2024-21503.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does canada-holiday version less then 1.1.4 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Canada-holiday 1.1.4 upgrades its black dependency to version 24.3.0, addressing the ReDoS vulnerability identified in CVE-2024-21503." }, { "instruction": "what vulnarability does cancat version less then equal to 2.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-45105 Advisory: Cancat 2.0.0 and prior uses a version of Arduino IDE that depends on a version of 'log4j' containing severe and critical vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cancat version less then equal to 2.0.0 have ### Response: Having vulnarability CVE-2021-45105 Advisory: Cancat 2.0.0 and prior uses a version of Arduino IDE that depends on a version of 'log4j' containing severe and critical vulnerabilities." }, { "instruction": "what vulnarability does candig-server version less then 0.9.0 have", "input": "", "output": "Having vulnarability PVE-2021-37219 Advisory: Candig-server 0.9.0 has enhanced security through a refined data access control mechanism.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does candig-server version less then 0.9.0 have ### Response: Having vulnarability PVE-2021-37219 Advisory: Candig-server 0.9.0 has enhanced security through a refined data access control mechanism." }, { "instruction": "what vulnarability does canto-curses version less then 0.9.0 have", "input": "", "output": "Having vulnarability CVE-2013-7416 Advisory: canto_curses/guibase.py in Canto Curses before 0.9.0 allows remote feed servers to execute arbitrary commands via shell metacharacters in a URL in a feed.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does canto-curses version less then 0.9.0 have ### Response: Having vulnarability CVE-2013-7416 Advisory: canto_curses/guibase.py in Canto Curses before 0.9.0 allows remote feed servers to execute arbitrary commands via shell metacharacters in a URL in a feed." }, { "instruction": "what vulnarability does canvaslms version less then 2.18 have", "input": "", "output": "Having vulnarability CVE-2022-40896 Advisory: Canvaslms 2.18 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/dbosk/canvaslms/pull/100", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does canvaslms version less then 2.18 have ### Response: Having vulnarability CVE-2022-40896 Advisory: Canvaslms 2.18 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/dbosk/canvaslms/pull/100" }, { "instruction": "what vulnarability does capice version less then 3.1.2 have", "input": "", "output": "Having vulnarability CVE-2021-34141 Advisory: Capice 3.1.2 updates its dependency 'numpy' to v1.22.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does capice version less then 3.1.2 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Capice 3.1.2 updates its dependency 'numpy' to v1.22.0 to include security fixes." }, { "instruction": "what vulnarability does capirca version less then 2.0.9 have", "input": "", "output": "Having vulnarability PVE-2023-53374 Advisory: Capirca 2.0.9 fixes an arbitrary file read vulnerability.\r\nhttps://github.com/google/capirca/commit/78f8e7cf7e4c515fb1696621bf6c6e95faa85d5b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does capirca version less then 2.0.9 have ### Response: Having vulnarability PVE-2023-53374 Advisory: Capirca 2.0.9 fixes an arbitrary file read vulnerability.\r\nhttps://github.com/google/capirca/commit/78f8e7cf7e4c515fb1696621bf6c6e95faa85d5b" }, { "instruction": "what vulnarability does captchaboy version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52921 Advisory: Captchaboy is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does captchaboy version greather then 0 have ### Response: Having vulnarability PVE-2023-52921 Advisory: Captchaboy is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html" }, { "instruction": "what vulnarability does capycli version less then 2.4.0 have", "input": "", "output": "Having vulnarability CVE-2024-3651 Advisory: Capycli 2.4.0 updates its dependency 'idna' to v3.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does capycli version less then 2.4.0 have ### Response: Having vulnarability CVE-2024-3651 Advisory: Capycli 2.4.0 updates its dependency 'idna' to v3.7 to include a security fix." }, { "instruction": "what vulnarability does carla version less then 0.9.11 have", "input": "", "output": "Having vulnarability PVE-2023-62323 Advisory: Carla 0.9.11 includes a fix for a potential race condition vulnerability: Sorts vehicles by ID to avoid race condition in Traffic Manager.\r\nhttps://github.com/carla-simulator/carla/pull/3438", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does carla version less then 0.9.11 have ### Response: Having vulnarability PVE-2023-62323 Advisory: Carla 0.9.11 includes a fix for a potential race condition vulnerability: Sorts vehicles by ID to avoid race condition in Traffic Manager.\r\nhttps://github.com/carla-simulator/carla/pull/3438" }, { "instruction": "what vulnarability does cartridge version less then 0.1.1 have", "input": "", "output": "Having vulnarability PVE-2022-47758 Advisory: Cartridge 0.1.1 adds 'csrf_token' to forms.\r\nhttps://github.com/stephenmcd/cartridge/commit/c8211d7a0696ccb6637dbde64375a58ed7d81e16", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cartridge version less then 0.1.1 have ### Response: Having vulnarability PVE-2022-47758 Advisory: Cartridge 0.1.1 adds 'csrf_token' to forms.\r\nhttps://github.com/stephenmcd/cartridge/commit/c8211d7a0696ccb6637dbde64375a58ed7d81e16" }, { "instruction": "what vulnarability does cartridge-braintree version less then 1.2.2 have", "input": "", "output": "Having vulnarability CVE-2020-9402 Advisory: Cartridge-braintree 1.2.2 updates its dependency 'Django' to v1.11.29 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cartridge-braintree version less then 1.2.2 have ### Response: Having vulnarability CVE-2020-9402 Advisory: Cartridge-braintree 1.2.2 updates its dependency 'Django' to v1.11.29 to include security fixes." }, { "instruction": "what vulnarability does case-utils version equal to 0.5.0,equal to 0.6.0,equal to 0.7.0,equal to 0.8.0,equal to 0.9.0,equal to 0.10.0,equal to 0.11.0,equal to 0.12.0,equal to 0.13.0,equal to 0.14.0 have", "input": "", "output": "Having vulnarability CVE-2024-22194 Advisory: Case-utils is affected by an information leakage vulnerability. The vulnerability stems from a Python function, 'cdo_local_uuid.local_uuid()', and its original implementation 'case_utils.local_uuid()'.\r\nhttps://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/security/advisories/GHSA-rgrf-6mf5-m882", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does case-utils version equal to 0.5.0,equal to 0.6.0,equal to 0.7.0,equal to 0.8.0,equal to 0.9.0,equal to 0.10.0,equal to 0.11.0,equal to 0.12.0,equal to 0.13.0,equal to 0.14.0 have ### Response: Having vulnarability CVE-2024-22194 Advisory: Case-utils is affected by an information leakage vulnerability. The vulnerability stems from a Python function, 'cdo_local_uuid.local_uuid()', and its original implementation 'case_utils.local_uuid()'.\r\nhttps://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/security/advisories/GHSA-rgrf-6mf5-m882" }, { "instruction": "what vulnarability does cashocs version less then 2.0.0 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Cashocs version 2.0.0 updates its setuptools dependency to version 65.5.1 from the previous 39.0.1, addressing the vulnerability identified as CVE-2022-40897.\r\nhttps://github.com/sblauth/cashocs/pull/137/commits/eb3fdc2bc65c87fb27d3622ada71c4d841a856a2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cashocs version less then 2.0.0 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Cashocs version 2.0.0 updates its setuptools dependency to version 65.5.1 from the previous 39.0.1, addressing the vulnerability identified as CVE-2022-40897.\r\nhttps://github.com/sblauth/cashocs/pull/137/commits/eb3fdc2bc65c87fb27d3622ada71c4d841a856a2" }, { "instruction": "what vulnarability does cassandra-medusa version less then 0.20.0 have", "input": "", "output": "Having vulnarability CVE-2023-52323 Advisory: Cassandra-medusa version 0.20.0 upgrades its Pycryptodome dependency to 3.19.1 from the previous version 3.19.0, aiming to address the security concerns outlined in CVE-2023-52323.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cassandra-medusa version less then 0.20.0 have ### Response: Having vulnarability CVE-2023-52323 Advisory: Cassandra-medusa version 0.20.0 upgrades its Pycryptodome dependency to 3.19.1 from the previous version 3.19.0, aiming to address the security concerns outlined in CVE-2023-52323." }, { "instruction": "what vulnarability does castle-cms version less then 2.6.1 have", "input": "", "output": "Having vulnarability PVE-2021-41903 Advisory: Castle-cms version 2.6.1 includes fixes for secure-login.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does castle-cms version less then 2.6.1 have ### Response: Having vulnarability PVE-2021-41903 Advisory: Castle-cms version 2.6.1 includes fixes for secure-login." }, { "instruction": "what vulnarability does catboost version less then 0.26 have", "input": "", "output": "Having vulnarability CVE-2017-15288 Advisory: Catboost 0.26 updates version of 'scala' to v2.11.12 for security reasons.\r\nhttps://github.com/catboost/catboost/issues/1632", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does catboost version less then 0.26 have ### Response: Having vulnarability CVE-2017-15288 Advisory: Catboost 0.26 updates version of 'scala' to v2.11.12 for security reasons.\r\nhttps://github.com/catboost/catboost/issues/1632" }, { "instruction": "what vulnarability does catly-translate version greather then equal to 0.0.3,less then 0.0.6 have", "input": "", "output": "Having vulnarability CVE-2022-34061 Advisory: The Catly-Translate package in PyPI v0.0.3 to v0.0.5 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does catly-translate version greather then equal to 0.0.3,less then 0.0.6 have ### Response: Having vulnarability CVE-2022-34061 Advisory: The Catly-Translate package in PyPI v0.0.3 to v0.0.5 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does cbapi version greather then equal to 1.3.3,less then 1.3.4 have", "input": "", "output": "Having vulnarability PVE-2021-34933 Advisory: The underlying CbAPI connection class erroneously disabled hostname validation by default. This does *not* affect code that uses CbAPI through the public interfaces documented here; it only affects code that accesses the new ``CbAPISessionAdapter`` class directly. This class was introduced in version 1.3.3. Regardless, it is strongly recommended that all users currently using 1.3.3 upgrade to 1.3.4.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cbapi version greather then equal to 1.3.3,less then 1.3.4 have ### Response: Having vulnarability PVE-2021-34933 Advisory: The underlying CbAPI connection class erroneously disabled hostname validation by default. This does *not* affect code that uses CbAPI through the public interfaces documented here; it only affects code that accesses the new ``CbAPISessionAdapter`` class directly. This class was introduced in version 1.3.3. Regardless, it is strongly recommended that all users currently using 1.3.3 upgrade to 1.3.4." }, { "instruction": "what vulnarability does cbor2 version less then 5.4.0 have", "input": "", "output": "Having vulnarability PVE-2023-61961 Advisory: Cbor2 5.4.0 fixes bounds checks in C decoder.\r\nhttps://github.com/agronholm/cbor2/pull/113", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cbor2 version less then 5.4.0 have ### Response: Having vulnarability PVE-2023-61961 Advisory: Cbor2 5.4.0 fixes bounds checks in C decoder.\r\nhttps://github.com/agronholm/cbor2/pull/113" }, { "instruction": "what vulnarability does ccf version less then 0.7 have", "input": "", "output": "Having vulnarability PVE-2021-38641 Advisory: Ccf 0.7 fixes a vulnerability to a possible replay attack.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ccf version less then 0.7 have ### Response: Having vulnarability PVE-2021-38641 Advisory: Ccf 0.7 fixes a vulnerability to a possible replay attack." }, { "instruction": "what vulnarability does cdk-ecr-deployment version less then 0.0.34 have", "input": "", "output": "Having vulnarability CVE-2021-33623 Advisory: Cdk-ecr-deployment 0.0.34 updates its dependency 'trim-newlines' to version '3.0.1' to include a security fix.\r\nhttps://github.com/wchaws/cdk-ecr-deployment/commit/22267948c545579788d1ed065ff2fb3b05adc863\r\nhttps://github.com/wchaws/cdk-ecr-deployment/commit/8cf3f5069e2ec1e22afe17c4025e752172be88bd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cdk-ecr-deployment version less then 0.0.34 have ### Response: Having vulnarability CVE-2021-33623 Advisory: Cdk-ecr-deployment 0.0.34 updates its dependency 'trim-newlines' to version '3.0.1' to include a security fix.\r\nhttps://github.com/wchaws/cdk-ecr-deployment/commit/22267948c545579788d1ed065ff2fb3b05adc863\r\nhttps://github.com/wchaws/cdk-ecr-deployment/commit/8cf3f5069e2ec1e22afe17c4025e752172be88bd" }, { "instruction": "what vulnarability does cdk-keycloak version less then 0.2.45 have", "input": "", "output": "Having vulnarability CVE-2022-33987 Advisory: Cdk-keycloak 0.2.45 updates its NPM dependency 'got' to v12.5.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cdk-keycloak version less then 0.2.45 have ### Response: Having vulnarability CVE-2022-33987 Advisory: Cdk-keycloak 0.2.45 updates its NPM dependency 'got' to v12.5.2 to include a security fix." }, { "instruction": "what vulnarability does cdo-local-uuid version equal to 0.4.0 have", "input": "", "output": "Having vulnarability CVE-2024-22194 Advisory: Cdo-local-uuid is affected by an information leakage vulnerability. The vulnerability stems from a Python function, 'cdo_local_uuid.local_uuid()', and its original implementation 'case_utils.local_uuid()'.\r\nhttps://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/security/advisories/GHSA-rgrf-6mf5-m882", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cdo-local-uuid version equal to 0.4.0 have ### Response: Having vulnarability CVE-2024-22194 Advisory: Cdo-local-uuid is affected by an information leakage vulnerability. The vulnerability stems from a Python function, 'cdo_local_uuid.local_uuid()', and its original implementation 'case_utils.local_uuid()'.\r\nhttps://github.com/Cyber-Domain-Ontology/CDO-Utility-Local-UUID/security/advisories/GHSA-rgrf-6mf5-m882" }, { "instruction": "what vulnarability does cedar-backup3 version less then 1.10 have", "input": "", "output": "Having vulnarability PVE-2021-42010 Advisory: Cedar-backup3 version 1.10 fixes a shell-interpolation bug.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cedar-backup3 version less then 1.10 have ### Response: Having vulnarability PVE-2021-42010 Advisory: Cedar-backup3 version 1.10 fixes a shell-interpolation bug." }, { "instruction": "what vulnarability does ceilometer version less then 2013.2.1 have", "input": "", "output": "Having vulnarability CVE-2013-6384 Advisory: (1) impl_db2.py and (2) impl_mongodb.py in OpenStack Ceilometer 2013.2 and earlier, when the logging level is set to INFO, logs the connection string from ceilometer.conf, which allows local users to obtain sensitive information (the DB2 or MongoDB password) by reading the log file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ceilometer version less then 2013.2.1 have ### Response: Having vulnarability CVE-2013-6384 Advisory: (1) impl_db2.py and (2) impl_mongodb.py in OpenStack Ceilometer 2013.2 and earlier, when the logging level is set to INFO, logs the connection string from ceilometer.conf, which allows local users to obtain sensitive information (the DB2 or MongoDB password) by reading the log file." }, { "instruction": "what vulnarability does celery version less then 4.4.0rc5 have", "input": "", "output": "Having vulnarability PVE-2024-64270 Advisory: Celery 4.4.0rc5 addresses a race condition that occurred during the publishing of very large chord headers. This fix ensures that the operation is completed successfully even when dealing with such large data sets.\r\nhttps://github.com/celery/celery/pull/5850/files#diff-3a80ff45da16a11b96e26a63973d7d490187a68ddc1949e2dfd7fd090b208841", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does celery version less then 4.4.0rc5 have ### Response: Having vulnarability PVE-2024-64270 Advisory: Celery 4.4.0rc5 addresses a race condition that occurred during the publishing of very large chord headers. This fix ensures that the operation is completed successfully even when dealing with such large data sets.\r\nhttps://github.com/celery/celery/pull/5850/files#diff-3a80ff45da16a11b96e26a63973d7d490187a68ddc1949e2dfd7fd090b208841" }, { "instruction": "what vulnarability does celery-director version less then 0.9.0 have", "input": "", "output": "Having vulnarability CVE-2023-28858 Advisory: Celery-director 0.9.0 updates its dependency 'redis' to v4.4.4 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does celery-director version less then 0.9.0 have ### Response: Having vulnarability CVE-2023-28858 Advisory: Celery-director 0.9.0 updates its dependency 'redis' to v4.4.4 to include security fixes." }, { "instruction": "what vulnarability does cellxgene version less then 0.12.0 have", "input": "", "output": "Having vulnarability CVE-2021-23440 Advisory: Cellxgene 0.12.0 updates its NPM dependency 'set-value' to v2.0.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cellxgene version less then 0.12.0 have ### Response: Having vulnarability CVE-2021-23440 Advisory: Cellxgene 0.12.0 updates its NPM dependency 'set-value' to v2.0.1 to include a security fix." }, { "instruction": "what vulnarability does centrifuge version less then 0.3.8 have", "input": "", "output": "Having vulnarability PVE-2021-25647 Advisory: centrifuge 0.3.8 includes a security fix! Please, upgrade to this version or disable access to `/dumps` location.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does centrifuge version less then 0.3.8 have ### Response: Having vulnarability PVE-2021-25647 Advisory: centrifuge 0.3.8 includes a security fix! Please, upgrade to this version or disable access to `/dumps` location." }, { "instruction": "what vulnarability does ceph-deploy version less then 1.5.23 have", "input": "", "output": "Having vulnarability CVE-2015-3010 Advisory: ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ceph-deploy version less then 1.5.23 have ### Response: Having vulnarability CVE-2015-3010 Advisory: ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file." }, { "instruction": "what vulnarability does certbot version less then equal to 0.34.0 have", "input": "", "output": "Having vulnarability PVE-2021-37112 Advisory: Certbot through 0.34.0 does not configure the web server so that all requests redirect to secure HTTPS access.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does certbot version less then equal to 0.34.0 have ### Response: Having vulnarability PVE-2021-37112 Advisory: Certbot through 0.34.0 does not configure the web server so that all requests redirect to secure HTTPS access." }, { "instruction": "what vulnarability does certbot-dns-duckdns version less then 1.3 have", "input": "", "output": "Having vulnarability CVE-2023-0216 Advisory: Certbot-dns-duckdns 1.3 updates its dependency 'cryptography' to latest version in the docker image, to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does certbot-dns-duckdns version less then 1.3 have ### Response: Having vulnarability CVE-2023-0216 Advisory: Certbot-dns-duckdns 1.3 updates its dependency 'cryptography' to latest version in the docker image, to include security fixes." }, { "instruction": "what vulnarability does certbot-dns-porkbun version less then 0.8 have", "input": "", "output": "Having vulnarability CVE-2023-0215 Advisory: Certbot-dns-porkbun 0.8 updates 'cryptography' to v39.0.1 in Docker image to include security fixes.\r\nhttps://github.com/infinityofspace/certbot_dns_porkbun/commit/789959d75ef65b9e6e7fdf0651254bf18378b0a9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does certbot-dns-porkbun version less then 0.8 have ### Response: Having vulnarability CVE-2023-0215 Advisory: Certbot-dns-porkbun 0.8 updates 'cryptography' to v39.0.1 in Docker image to include security fixes.\r\nhttps://github.com/infinityofspace/certbot_dns_porkbun/commit/789959d75ef65b9e6e7fdf0651254bf18378b0a9" }, { "instruction": "what vulnarability does certif version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53258 Advisory: Certif is a malicious package, pytosquatting the popular package 'certifi'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does certif version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53258 Advisory: Certif is a malicious package, pytosquatting the popular package 'certifi'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does certife version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53259 Advisory: Certife is a malicious package, pytosquatting the popular package 'certifi'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does certife version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53259 Advisory: Certife is a malicious package, pytosquatting the popular package 'certifi'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does certifi version less then 2022.12.07 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Certifi 2022.12.07 includes a fix for CVE-2022-23491: Certifi 2022.12.07 removes root certificates from \"TrustCor\" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.\r\nhttps://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8\r\nhttps://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does certifi version less then 2022.12.07 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Certifi 2022.12.07 includes a fix for CVE-2022-23491: Certifi 2022.12.07 removes root certificates from \"TrustCor\" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.\r\nhttps://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8\r\nhttps://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ" }, { "instruction": "what vulnarability does certifie version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53260 Advisory: Certifie is a malicious package, pytosquatting the popular package 'certifi'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does certifie version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53260 Advisory: Certifie is a malicious package, pytosquatting the popular package 'certifi'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does certifiee version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-53261 Advisory: Certifiee is a malicious package, pytosquatting the popular package 'certifi'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does certifiee version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53261 Advisory: Certifiee is a malicious package, pytosquatting the popular package 'certifi'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information." }, { "instruction": "what vulnarability does cerulean version less then 0.3.4 have", "input": "", "output": "Having vulnarability PVE-2021-36796 Advisory: Cerulean 0.3.4 adds proper directory permissions when using mkdir().\r\nhttps://github.com/MD-Studio/cerulean/commit/388b171477f909972d5dc9043ed5fcae4369e3b7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cerulean version less then 0.3.4 have ### Response: Having vulnarability PVE-2021-36796 Advisory: Cerulean 0.3.4 adds proper directory permissions when using mkdir().\r\nhttps://github.com/MD-Studio/cerulean/commit/388b171477f909972d5dc9043ed5fcae4369e3b7" }, { "instruction": "what vulnarability does cffconvert version less then 1.0.3 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Cffconvert 1.0.3 updates requests from v2.18.4 to v2.20.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cffconvert version less then 1.0.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Cffconvert 1.0.3 updates requests from v2.18.4 to v2.20.0 to include a security fix." }, { "instruction": "what vulnarability does cfripper version less then 1.14.0 have", "input": "", "output": "Having vulnarability CVE-2023-26145 Advisory: Cfripper 1.14.0 updates its dependency 'pydash' to v6.0.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cfripper version less then 1.14.0 have ### Response: Having vulnarability CVE-2023-26145 Advisory: Cfripper 1.14.0 updates its dependency 'pydash' to v6.0.0 to include a security fix." }, { "instruction": "what vulnarability does cfscrape version greather then equal to 1.6.6,less then 1.8.0 have", "input": "", "output": "Having vulnarability CVE-2017-7235 Advisory: Cfscrape 1.8.0 includes a fix for CVE-2017-7235: An issue was discovered in cloudflare-scrape 1.6.6 through 1.7.1. A malicious website owner could craft a page that executes arbitrary Python code against any cfscrape user who scrapes that website. This is fixed in 1.8.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cfscrape version greather then equal to 1.6.6,less then 1.8.0 have ### Response: Having vulnarability CVE-2017-7235 Advisory: Cfscrape 1.8.0 includes a fix for CVE-2017-7235: An issue was discovered in cloudflare-scrape 1.6.6 through 1.7.1. A malicious website owner could craft a page that executes arbitrary Python code against any cfscrape user who scrapes that website. This is fixed in 1.8.0." }, { "instruction": "what vulnarability does cfstacks version less then 0.4.4 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Cfstacks 0.4.4 upgrades PyAML to 4.2b1 (or later) to fix a security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cfstacks version less then 0.4.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Cfstacks 0.4.4 upgrades PyAML to 4.2b1 (or later) to fix a security vulnerability." }, { "instruction": "what vulnarability does cg version less then 18.11.3 have", "input": "", "output": "Having vulnarability CVE-2020-36242 Advisory: Cg 18.11.3 updates its dependency 'cryptography' to v3.3.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cg version less then 18.11.3 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Cg 18.11.3 updates its dependency 'cryptography' to v3.3.2 to include a security fix." }, { "instruction": "what vulnarability does cg-django-uaa version less then 2.1.4 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Cg-django-uaa 2.1.4 updates its dependency 'pyjwt' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cg-django-uaa version less then 2.1.4 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Cg-django-uaa 2.1.4 updates its dependency 'pyjwt' to include a security fix." }, { "instruction": "what vulnarability does cgbeacon2 version less then 4.3 have", "input": "", "output": "Having vulnarability PVE-2022-51437 Advisory: Cgbeacon2 4.3 prevents unsafe 'HTTP' connections.\r\nhttps://github.com/Clinical-Genomics/cgbeacon2/commit/614bdd7e01b19ce297b0e612e4821ed661c8f658", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cgbeacon2 version less then 4.3 have ### Response: Having vulnarability PVE-2022-51437 Advisory: Cgbeacon2 4.3 prevents unsafe 'HTTP' connections.\r\nhttps://github.com/Clinical-Genomics/cgbeacon2/commit/614bdd7e01b19ce297b0e612e4821ed661c8f658" }, { "instruction": "what vulnarability does cgcloud-lib version less then equal to 1.6.0 have", "input": "", "output": "Having vulnarability CVE-2018-7750 Advisory: Cgcloud-lib 1.6.0 and prior include a version of 'paramiko' (1.16.0) affected by known vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cgcloud-lib version less then equal to 1.6.0 have ### Response: Having vulnarability CVE-2018-7750 Advisory: Cgcloud-lib 1.6.0 and prior include a version of 'paramiko' (1.16.0) affected by known vulnerabilities." }, { "instruction": "what vulnarability does cgroups-exporter version less then 0.8.0 have", "input": "", "output": "Having vulnarability PVE-2023-59074 Advisory: Cgroups-exporter 0.8.0 includes a fix for a denial of service vulnerability. \r\nhttps://github.com/mosquito/cgroups-exporter/commit/611ac2618e834135a86b1871231680759e4c37ff", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cgroups-exporter version less then 0.8.0 have ### Response: Having vulnarability PVE-2023-59074 Advisory: Cgroups-exporter 0.8.0 includes a fix for a denial of service vulnerability. \r\nhttps://github.com/mosquito/cgroups-exporter/commit/611ac2618e834135a86b1871231680759e4c37ff" }, { "instruction": "what vulnarability does chafa.py version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-20610 Advisory: Chafa.py serves as a Python wrapper for the Chafa library. The GitHub repository hpjansson/chafa, prior to version 1.12.0, contains a heap-based Buffer Overflow vulnerability. This issue has been addressed in the Chapa.py update, specifically version 1.1.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chafa.py version less then 1.1.0 have ### Response: Having vulnarability CVE-2022-20610 Advisory: Chafa.py serves as a Python wrapper for the Chafa library. The GitHub repository hpjansson/chafa, prior to version 1.12.0, contains a heap-based Buffer Overflow vulnerability. This issue has been addressed in the Chapa.py update, specifically version 1.1.0." }, { "instruction": "what vulnarability does chainerrl-visualizer version less then equal to 0.1.1 have", "input": "", "output": "Having vulnarability CVE-2022-31573 Advisory: Chainerrl-visualizer throughout 0.1.1 allows absolute path traversal because the Flask send_file function is used unsafely. See CVE-2022-31573.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chainerrl-visualizer version less then equal to 0.1.1 have ### Response: Having vulnarability CVE-2022-31573 Advisory: Chainerrl-visualizer throughout 0.1.1 allows absolute path traversal because the Flask send_file function is used unsafely. See CVE-2022-31573." }, { "instruction": "what vulnarability does chainlit version less then 0.2.108 have", "input": "", "output": "Having vulnarability PVE-2023-58839 Advisory: Chainlit 0.2.108 includes a fix for an improper authorization vulnerability.\r\nhttps://github.com/Chainlit/chainlit/commit/ae3fe1c3b21e3d2a7b297f6985b56a2ab0e5f784", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chainlit version less then 0.2.108 have ### Response: Having vulnarability PVE-2023-58839 Advisory: Chainlit 0.2.108 includes a fix for an improper authorization vulnerability.\r\nhttps://github.com/Chainlit/chainlit/commit/ae3fe1c3b21e3d2a7b297f6985b56a2ab0e5f784" }, { "instruction": "what vulnarability does changedetection-io version less then 0.40.1.1 have", "input": "", "output": "Having vulnarability CVE-2023-24769 Advisory: Changedetection.io before v0.40.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the main page. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter under the \"Add a new change detection watch\" function.\r\n\r\nAlias(es):\r\nGHSA-68wj-c2jw-5pp9\r\nPYSEC-2023-10", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does changedetection-io version less then 0.40.1.1 have ### Response: Having vulnarability CVE-2023-24769 Advisory: Changedetection.io before v0.40.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the main page. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter under the \"Add a new change detection watch\" function.\r\n\r\nAlias(es):\r\nGHSA-68wj-c2jw-5pp9\r\nPYSEC-2023-10" }, { "instruction": "what vulnarability does changedetection.io version less then 0.45.21 have", "input": "", "output": "Having vulnarability CVE-2024-32651 Advisory: Changedetection.io version 0.45.21 includes a security update to fix a server-side template injection vulnerability in Jinja2 that could allow remote command execution, identified as CVE-2024-32651. Additionally, it implements the use of `ImmutableSandboxedEnvironment` for validation to enhance security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does changedetection.io version less then 0.45.21 have ### Response: Having vulnarability CVE-2024-32651 Advisory: Changedetection.io version 0.45.21 includes a security update to fix a server-side template injection vulnerability in Jinja2 that could allow remote command execution, identified as CVE-2024-32651. Additionally, it implements the use of `ImmutableSandboxedEnvironment` for validation to enhance security." }, { "instruction": "what vulnarability does chanjo-report version less then 2.4.0 have", "input": "", "output": "Having vulnarability PVE-2022-45287 Advisory: Chanjo-report 2.4.0 uses sudo insecurely, potentially allowing a local attacker to escalate privileges.\r\nhttps://github.com/robinandeer/chanjo-report/commit/bbb6ba9855b08c563764639d55bbcc0915c1dc55", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chanjo-report version less then 2.4.0 have ### Response: Having vulnarability PVE-2022-45287 Advisory: Chanjo-report 2.4.0 uses sudo insecurely, potentially allowing a local attacker to escalate privileges.\r\nhttps://github.com/robinandeer/chanjo-report/commit/bbb6ba9855b08c563764639d55bbcc0915c1dc55" }, { "instruction": "what vulnarability does channels version greather then equal to 0,less then 2.1.7 have", "input": "", "output": "Having vulnarability PVE-2024-99807 Advisory: Django channels package before 2.1.7 is vulnerable to a Denial of Service (DoS) attack due to not limiting the size of request bodies. This vulnerability specifically involves Regular Expression Denial of Service (ReDoS) attacks, whereby crafted inputs utilizing regular expressions can cause excessive backtracking by the regex engine. This process can significantly slow down the system, consuming disproportionate CPU resources to process these crafted requests, potentially making the system inaccessible to legitimate users. This issue arises from the way certain strings, when matched against specific regular expressions, can force the regex engine into a large number of computational steps, drastically increasing for strings with specific patterns, thereby enabling attackers to exploit this behavior for a DoS attack.\r\nhttps://github.com/django/channels/commit/a1ecd5ee72a538f19bdd9e8f6bb91bb8aabba5d9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does channels version greather then equal to 0,less then 2.1.7 have ### Response: Having vulnarability PVE-2024-99807 Advisory: Django channels package before 2.1.7 is vulnerable to a Denial of Service (DoS) attack due to not limiting the size of request bodies. This vulnerability specifically involves Regular Expression Denial of Service (ReDoS) attacks, whereby crafted inputs utilizing regular expressions can cause excessive backtracking by the regex engine. This process can significantly slow down the system, consuming disproportionate CPU resources to process these crafted requests, potentially making the system inaccessible to legitimate users. This issue arises from the way certain strings, when matched against specific regular expressions, can force the regex engine into a large number of computational steps, drastically increasing for strings with specific patterns, thereby enabling attackers to exploit this behavior for a DoS attack.\r\nhttps://github.com/django/channels/commit/a1ecd5ee72a538f19bdd9e8f6bb91bb8aabba5d9" }, { "instruction": "what vulnarability does chaosloader version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-37048 Advisory: Chaosloader 1.0.0 adds secure encrypted password to travis.yml.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chaosloader version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-37048 Advisory: Chaosloader 1.0.0 adds secure encrypted password to travis.yml." }, { "instruction": "what vulnarability does chaostoolkit version less then 1.14.0 have", "input": "", "output": "Having vulnarability CVE-2022-29458 Advisory: Chaostoolkit 1.14.0 updates container image to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chaostoolkit version less then 1.14.0 have ### Response: Having vulnarability CVE-2022-29458 Advisory: Chaostoolkit 1.14.0 updates container image to include security fixes." }, { "instruction": "what vulnarability does charm-crypto version equal to 0.43 have", "input": "", "output": "Having vulnarability CVE-2021-37588 Advisory: In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does charm-crypto version equal to 0.43 have ### Response: Having vulnarability CVE-2021-37588 Advisory: In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data." }, { "instruction": "what vulnarability does charm-tools version less then 2.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-37201 Advisory: Charm-tools 2.6.0 addresses security alerts from GitHub (#484).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does charm-tools version less then 2.6.0 have ### Response: Having vulnarability PVE-2021-37201 Advisory: Charm-tools 2.6.0 addresses security alerts from GitHub (#484)." }, { "instruction": "what vulnarability does charmhelpers version less then 0.19.13 have", "input": "", "output": "Having vulnarability PVE-2021-37032 Advisory: Charmhelpers 0.19.13 updates Keystone's config files permissions to meet security guide.\r\nhttps://github.com/juju/charm-helpers/pull/299", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does charmhelpers version less then 0.19.13 have ### Response: Having vulnarability PVE-2021-37032 Advisory: Charmhelpers 0.19.13 updates Keystone's config files permissions to meet security guide.\r\nhttps://github.com/juju/charm-helpers/pull/299" }, { "instruction": "what vulnarability does chartify version less then 3.0.3 have", "input": "", "output": "Having vulnarability CVE-2020-14343 Advisory: Chartify version 3.0.3 includes a security patch for the function '_from_yaml' in 'chartify/_core/colors.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects.\r\nhttps://github.com/spotify/chartify/commit/e9d34194b19f973b934497a1013c918bc8a98fee#diff-8238e9741da72d8460f3b7e87879bad2821fe5cfbadb42112a6a7373ee5c494a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chartify version less then 3.0.3 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Chartify version 3.0.3 includes a security patch for the function '_from_yaml' in 'chartify/_core/colors.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects.\r\nhttps://github.com/spotify/chartify/commit/e9d34194b19f973b934497a1013c918bc8a98fee#diff-8238e9741da72d8460f3b7e87879bad2821fe5cfbadb42112a6a7373ee5c494a" }, { "instruction": "what vulnarability does chatbot-ner version less then 0.5.8 have", "input": "", "output": "Having vulnarability CVE-2019-14235 Advisory: Chatbot-ner 0.5.8 updates its dependency 'django' to v1.11.26 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chatbot-ner version less then 0.5.8 have ### Response: Having vulnarability CVE-2019-14235 Advisory: Chatbot-ner 0.5.8 updates its dependency 'django' to v1.11.26 to include security fixes." }, { "instruction": "what vulnarability does chazz version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52909 Advisory: Chazz is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chazz version greather then 0 have ### Response: Having vulnarability PVE-2023-52909 Advisory: Chazz is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html" }, { "instruction": "what vulnarability does checkmk version less then 1.2.8p26 have", "input": "", "output": "Having vulnarability CVE-2017-14955 Advisory: Check_MK before 1.2.8p26 mishandles certain errors within the failed-login save feature because of a race condition, which allows remote attackers to obtain sensitive user information by reading a GUI crash report.\r\nNote: Checkmk on PyPI is a placeholder. You may download the real package from its official website (https://checkmk.com/download).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does checkmk version less then 1.2.8p26 have ### Response: Having vulnarability CVE-2017-14955 Advisory: Check_MK before 1.2.8p26 mishandles certain errors within the failed-login save feature because of a race condition, which allows remote attackers to obtain sensitive user information by reading a GUI crash report.\r\nNote: Checkmk on PyPI is a placeholder. You may download the real package from its official website (https://checkmk.com/download)." }, { "instruction": "what vulnarability does checkov version less then 2.0.1029 have", "input": "", "output": "Having vulnarability PVE-2024-63646 Advisory: Bridgecrew 2.0.1029 introduces a fix for a vulnerability that previously allowed security group rules in Terraform configurations to permit unrestricted ingress access from 0.0.0.0:0 to port 22, commonly used for SSH.\r\nhttps://github.com/bridgecrewio/checkov/issues/1973\r\nhttps://github.com/bridgecrewio/checkov/pull/2749", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does checkov version less then 2.0.1029 have ### Response: Having vulnarability PVE-2024-63646 Advisory: Bridgecrew 2.0.1029 introduces a fix for a vulnerability that previously allowed security group rules in Terraform configurations to permit unrestricted ingress access from 0.0.0.0:0 to port 22, commonly used for SSH.\r\nhttps://github.com/bridgecrewio/checkov/issues/1973\r\nhttps://github.com/bridgecrewio/checkov/pull/2749" }, { "instruction": "what vulnarability does checksec-py version less then equal to 0.6.2 have", "input": "", "output": "Having vulnarability CVE-2022-38496 Advisory: Checksec-py is powered by LIEF. Cchecksec-py 0.6.2 and versions below uses LIEF as dependency, which has a CVE on its versions below 0.13.0. \r\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-38496\r\nhttps://deps.dev/pypi/checksec-py/0.6.2/dependencies", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does checksec-py version less then equal to 0.6.2 have ### Response: Having vulnarability CVE-2022-38496 Advisory: Checksec-py is powered by LIEF. Cchecksec-py 0.6.2 and versions below uses LIEF as dependency, which has a CVE on its versions below 0.13.0. \r\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-38496\r\nhttps://deps.dev/pypi/checksec-py/0.6.2/dependencies" }, { "instruction": "what vulnarability does cheetah version less then 0.9.17rc1 have", "input": "", "output": "Having vulnarability PVE-2021-25649 Advisory: cheetah 0.9.17rc1 removeS the use of temp files for handling imports with dynamic compilation. This removes a whole slew of issues, including a temp file security issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cheetah version less then 0.9.17rc1 have ### Response: Having vulnarability PVE-2021-25649 Advisory: cheetah 0.9.17rc1 removeS the use of temp files for handling imports with dynamic compilation. This removes a whole slew of issues, including a temp file security issue." }, { "instruction": "what vulnarability does cheetah3 version less then 3.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-37134 Advisory: Cheetah3 version 3.2.2 replaces the outdated and insecure ``mktemp`` with ``mkstemp``.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cheetah3 version less then 3.2.2 have ### Response: Having vulnarability PVE-2021-37134 Advisory: Cheetah3 version 3.2.2 replaces the outdated and insecure ``mktemp`` with ``mkstemp``." }, { "instruction": "what vulnarability does cheroot version less then 6.3.2 have", "input": "", "output": "Having vulnarability PVE-2021-39125 Advisory: Cheroot 6.3.2 introduces a HTTP 400 response to a malicious 'Content-Length' in the request headers.\r\nhttps://github.com/cherrypy/cheroot/commit/040f7bf687fb2c2ae5b98d0c15de65fdb7682a30", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cheroot version less then 6.3.2 have ### Response: Having vulnarability PVE-2021-39125 Advisory: Cheroot 6.3.2 introduces a HTTP 400 response to a malicious 'Content-Length' in the request headers.\r\nhttps://github.com/cherrypy/cheroot/commit/040f7bf687fb2c2ae5b98d0c15de65fdb7682a30" }, { "instruction": "what vulnarability does cherrymusic version less then 0.36.0 have", "input": "", "output": "Having vulnarability CVE-2015-8310 Advisory: Cross-site scripting (XSS) vulnerability in Cherry Music before 0.36.0 allows remote authenticated users to inject arbitrary web script or HTML via the playlistname field when creating a new playlist.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cherrymusic version less then 0.36.0 have ### Response: Having vulnarability CVE-2015-8310 Advisory: Cross-site scripting (XSS) vulnerability in Cherry Music before 0.36.0 allows remote authenticated users to inject arbitrary web script or HTML via the playlistname field when creating a new playlist." }, { "instruction": "what vulnarability does cherrypy version less then 2.1.1 have", "input": "", "output": "Having vulnarability CVE-2006-0847 Advisory: Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via \"..\" sequences in unspecified vectors.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cherrypy version less then 2.1.1 have ### Response: Having vulnarability CVE-2006-0847 Advisory: Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via \"..\" sequences in unspecified vectors." }, { "instruction": "what vulnarability does chia version less then 2.4.0 have", "input": "", "output": "Having vulnarability CVE-2021-29590 Advisory: Chia 2.4.0 updates Tensorflow to v2.4.3 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chia version less then 2.4.0 have ### Response: Having vulnarability CVE-2021-29590 Advisory: Chia 2.4.0 updates Tensorflow to v2.4.3 to include security fixes." }, { "instruction": "what vulnarability does chia-blockchain version less then 1.0b19 have", "input": "", "output": "Having vulnarability PVE-2021-39444 Advisory: Consideration of the new consensus algorithm in chia-blockchain version 1.0beta19 resulted in a much higher security level against all attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chia-blockchain version less then 1.0b19 have ### Response: Having vulnarability PVE-2021-39444 Advisory: Consideration of the new consensus algorithm in chia-blockchain version 1.0beta19 resulted in a much higher security level against all attacks." }, { "instruction": "what vulnarability does chiapos version less then 1.0.12b3 have", "input": "", "output": "Having vulnarability PVE-2023-59535 Advisory: Chiapos 1.0.12b3 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/Chia-Network/chiapos/pull/349", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chiapos version less then 1.0.12b3 have ### Response: Having vulnarability PVE-2023-59535 Advisory: Chiapos 1.0.12b3 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/Chia-Network/chiapos/pull/349" }, { "instruction": "what vulnarability does chiavdf version less then 1.0 have", "input": "", "output": "Having vulnarability PVE-2021-39691 Advisory: Chiavdf 1.0 includes a fix to prevent potential grinding attacks.\r\nhttps://github.com/Chia-Network/chiavdf/commit/2f2dc55b8c11597d0674a1f347bfbefd0efcafa3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chiavdf version less then 1.0 have ### Response: Having vulnarability PVE-2021-39691 Advisory: Chiavdf 1.0 includes a fix to prevent potential grinding attacks.\r\nhttps://github.com/Chia-Network/chiavdf/commit/2f2dc55b8c11597d0674a1f347bfbefd0efcafa3" }, { "instruction": "what vulnarability does chinaski version less then 0.0.2 have", "input": "", "output": "Having vulnarability PVE-2023-53495 Advisory: Chinaski 0.0.2 includes a fix for a REDoS vulnerability.\r\nhttps://github.com/w0rmr1d3r/chinaski/pull/5", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chinaski version less then 0.0.2 have ### Response: Having vulnarability PVE-2023-53495 Advisory: Chinaski 0.0.2 includes a fix for a REDoS vulnerability.\r\nhttps://github.com/w0rmr1d3r/chinaski/pull/5" }, { "instruction": "what vulnarability does chinilla-blockchain version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2022-36447 Advisory: Chinilla-blockchain 1.2.0 includes a fix for CVE-2022-36447, where in tokens previously minted on the Chinilla blockchain using the CAT1 standard can be inflated in arbitrary amounts by any holder of the token. Total amount of the token can be increased as high as the malicious actor pleases. This is true for every CAT1 on the Chinilla blockchain, regardless of issuance rules. This attack is auditable on-chain, so maliciously altered coins can potentially be \"marked\" by off-chain observers as malicious.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chinilla-blockchain version less then 1.2.0 have ### Response: Having vulnarability CVE-2022-36447 Advisory: Chinilla-blockchain 1.2.0 includes a fix for CVE-2022-36447, where in tokens previously minted on the Chinilla blockchain using the CAT1 standard can be inflated in arbitrary amounts by any holder of the token. Total amount of the token can be increased as high as the malicious actor pleases. This is true for every CAT1 on the Chinilla blockchain, regardless of issuance rules. This attack is auditable on-chain, so maliciously altered coins can potentially be \"marked\" by off-chain observers as malicious." }, { "instruction": "what vulnarability does chipsec version less then 1.11.0 have", "input": "", "output": "Having vulnarability CVE-2023-30861 Advisory: Chipsec 1.11.0 updates its dependency 'flask' to versions '>=2.2.5' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does chipsec version less then 1.11.0 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Chipsec 1.11.0 updates its dependency 'flask' to versions '>=2.2.5' to include a security fix." }, { "instruction": "what vulnarability does choochoo version less then 0.40.0 have", "input": "", "output": "Having vulnarability CVE-2021-23337 Advisory: Choochoo 0.40.0 updates its NPM dependency 'lodash' to 4.17.21 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does choochoo version less then 0.40.0 have ### Response: Having vulnarability CVE-2021-23337 Advisory: Choochoo 0.40.0 updates its NPM dependency 'lodash' to 4.17.21 to include security fixes." }, { "instruction": "what vulnarability does cif2cell version less then 1.0.12 have", "input": "", "output": "Having vulnarability PVE-2023-61608 Advisory: Cif2cell 1.0.12 includes a fix for a code injection vulnerability related to vectors/matrices input from the command line.\r\nhttps://github.com/torbjornbjorkman/cif2cell/commit/53341d96b7967358799f6955643bd3683dbbad9e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cif2cell version less then 1.0.12 have ### Response: Having vulnarability PVE-2023-61608 Advisory: Cif2cell 1.0.12 includes a fix for a code injection vulnerability related to vectors/matrices input from the command line.\r\nhttps://github.com/torbjornbjorkman/cif2cell/commit/53341d96b7967358799f6955643bd3683dbbad9e" }, { "instruction": "what vulnarability does ciftify version less then 2.3.3 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Ciftify 2.3.3 includes a security patch for the function '__read_settings' in 'ciftify/utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/edickie/ciftify/commit/7ac66dc2efc78bae272a0e1e713c81756f780969#diff-d55ace9e33dabdeba89768d93ae8fe97cf6d2ba4936fc5ab472b7bf749270b63", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ciftify version less then 2.3.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Ciftify 2.3.3 includes a security patch for the function '__read_settings' in 'ciftify/utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/edickie/ciftify/commit/7ac66dc2efc78bae272a0e1e713c81756f780969#diff-d55ace9e33dabdeba89768d93ae8fe97cf6d2ba4936fc5ab472b7bf749270b63" }, { "instruction": "what vulnarability does cinder version less then 14.1.0,greather then equal to 15.0.0.0rc1,less then 15.2.0,greather then equal to 16.0.0.0b1,less then 16.1.0 have", "input": "", "output": "Having vulnarability CVE-2020-10755 Advisory: Cinder versions 14.1.0, 15.2.0 and 16.1.0 include a fix for CVE-2020-10755: An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the 'connection_info' element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API.\r\nhttps://wiki.openstack.org/wiki/OSSN/OSSN-0086", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cinder version less then 14.1.0,greather then equal to 15.0.0.0rc1,less then 15.2.0,greather then equal to 16.0.0.0b1,less then 16.1.0 have ### Response: Having vulnarability CVE-2020-10755 Advisory: Cinder versions 14.1.0, 15.2.0 and 16.1.0 include a fix for CVE-2020-10755: An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the 'connection_info' element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API.\r\nhttps://wiki.openstack.org/wiki/OSSN/OSSN-0086" }, { "instruction": "what vulnarability does cipher-googlepam version less then 1.5.1 have", "input": "", "output": "Having vulnarability PVE-2021-25652 Advisory: Cipher.googlepam 1.5.1 does not use the same cache key for all users. Previously, when one user logged in successfully, others could not log in using their own passwords -- but the first user could use its password to log in as anyone else.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cipher-googlepam version less then 1.5.1 have ### Response: Having vulnarability PVE-2021-25652 Advisory: Cipher.googlepam 1.5.1 does not use the same cache key for all users. Previously, when one user logged in successfully, others could not log in using their own passwords -- but the first user could use its password to log in as anyone else." }, { "instruction": "what vulnarability does circuit-maintenance-parser version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2021-29510 Advisory: Circuit-maintenance-parser 1.1.0 updates the 'Pydantic' dependency version to v1.8.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does circuit-maintenance-parser version less then 1.1.0 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Circuit-maintenance-parser 1.1.0 updates the 'Pydantic' dependency version to v1.8.2 to include a security fix." }, { "instruction": "what vulnarability does circuitbreaker version less then 1.4.0 have", "input": "", "output": "Having vulnarability PVE-2022-50117 Advisory: Circuitbreaker 1.4.0 starts using a monotonic clock source. Using the wall clock to measure duration is vulnerable to changes in the system clock causing misbehavior - a clock accidentally set far in the future and later reset could result in the circuit breaker remaining open for a great deal longer than expected.\r\nhttps://github.com/fabfuel/circuitbreaker/commit/094946f2b1232ec2dcf1685fd84f87927791fa4a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does circuitbreaker version less then 1.4.0 have ### Response: Having vulnarability PVE-2022-50117 Advisory: Circuitbreaker 1.4.0 starts using a monotonic clock source. Using the wall clock to measure duration is vulnerable to changes in the system clock causing misbehavior - a clock accidentally set far in the future and later reset could result in the circuit breaker remaining open for a great deal longer than expected.\r\nhttps://github.com/fabfuel/circuitbreaker/commit/094946f2b1232ec2dcf1685fd84f87927791fa4a" }, { "instruction": "what vulnarability does circup version less then 0.0.6 have", "input": "", "output": "Having vulnarability PVE-2021-37936 Advisory: Circup 0.0.6 includes an unspecified security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does circup version less then 0.0.6 have ### Response: Having vulnarability PVE-2021-37936 Advisory: Circup 0.0.6 includes an unspecified security fix." }, { "instruction": "what vulnarability does cisco-sdwan version less then 20.9.1 have", "input": "", "output": "Having vulnarability CVE-2023-20098 Advisory: A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files. This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cisco-sdwan version less then 20.9.1 have ### Response: Having vulnarability CVE-2023-20098 Advisory: A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files. This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root." }, { "instruction": "what vulnarability does ciscosupportsdk version less then 0.2.1 have", "input": "", "output": "Having vulnarability CVE-2022-39174 Advisory: Ciscosupportsdk 0.2.1 updates its dependency 'authlib' to versions \"^1.2.1\" to include a security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ciscosupportsdk version less then 0.2.1 have ### Response: Having vulnarability CVE-2022-39174 Advisory: Ciscosupportsdk 0.2.1 updates its dependency 'authlib' to versions \"^1.2.1\" to include a security fixes." }, { "instruction": "what vulnarability does citation-graph version less then 1.2.5 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Citation-graph 1.2.5 removes its dependency 'setuptools' to avoid a vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does citation-graph version less then 1.2.5 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Citation-graph 1.2.5 removes its dependency 'setuptools' to avoid a vulnerability." }, { "instruction": "what vulnarability does citrine version less then 0.115.0 have", "input": "", "output": "Having vulnarability PVE-2023-59618 Advisory: Citrine 0.115.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/CitrineInformatics/citrine-python/pull/571", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does citrine version less then 0.115.0 have ### Response: Having vulnarability PVE-2023-59618 Advisory: Citrine 0.115.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/CitrineInformatics/citrine-python/pull/571" }, { "instruction": "what vulnarability does ck version less then 1.7.1 have", "input": "", "output": "Having vulnarability PVE-2021-40221 Advisory: Ck 1.7.1 fixes a server vulnerability (action with ; can run various CMD commands).\r\nhttps://github.com/mlcommons/ck/commit/ac16bf54a03c1d13832f9bbef9c3cf1039583f28", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ck version less then 1.7.1 have ### Response: Having vulnarability PVE-2021-40221 Advisory: Ck 1.7.1 fixes a server vulnerability (action with ; can run various CMD commands).\r\nhttps://github.com/mlcommons/ck/commit/ac16bf54a03c1d13832f9bbef9c3cf1039583f28" }, { "instruction": "what vulnarability does ckan version less then 1.5.1 have", "input": "", "output": "Having vulnarability PVE-2021-34556 Advisory: ckan 1.5.1 fixes a security issue affecting CKAN v1.5 and before.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ckan version less then 1.5.1 have ### Response: Having vulnarability PVE-2021-34556 Advisory: ckan 1.5.1 fixes a security issue affecting CKAN v1.5 and before." }, { "instruction": "what vulnarability does ckanext-dataset-reference version less then 2.0.2 have", "input": "", "output": "Having vulnarability PVE-2022-49237 Advisory: Ckanext-dataset-reference 2.0.2 protects against XSS attacks.\r\nhttps://github.com/TIBHannover/ckanext-Dataset-Reference/commit/ea7abc28f90991cc73becd8e67d0621f62979d6a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ckanext-dataset-reference version less then 2.0.2 have ### Response: Having vulnarability PVE-2022-49237 Advisory: Ckanext-dataset-reference 2.0.2 protects against XSS attacks.\r\nhttps://github.com/TIBHannover/ckanext-Dataset-Reference/commit/ea7abc28f90991cc73becd8e67d0621f62979d6a" }, { "instruction": "what vulnarability does ckuehl-celery version equal to 4.0.2.post1 have", "input": "", "output": "Having vulnarability CVE-2021-23727 Advisory: Ckuehl-celery 4.0.2.post1 (fork of Celery) is affected by CVE-2021-23727.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ckuehl-celery version equal to 4.0.2.post1 have ### Response: Having vulnarability CVE-2021-23727 Advisory: Ckuehl-celery 4.0.2.post1 (fork of Celery) is affected by CVE-2021-23727." }, { "instruction": "what vulnarability does clam version less then 0.9.10 have", "input": "", "output": "Having vulnarability PVE-2021-25653 Advisory: Clam 0.9.10 protects against a code injection vulnerability.\r\nhttps://github.com/proycon/clam/commit/f89ba22a3b74f0b86ce9d8190ce28b6da7331813", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clam version less then 0.9.10 have ### Response: Having vulnarability PVE-2021-25653 Advisory: Clam 0.9.10 protects against a code injection vulnerability.\r\nhttps://github.com/proycon/clam/commit/f89ba22a3b74f0b86ce9d8190ce28b6da7331813" }, { "instruction": "what vulnarability does clara-viz version less then 0.1.4 have", "input": "", "output": "Having vulnarability PVE-2022-45107 Advisory: Clara-viz 0.1.4 updates Jupyter widget Java code packages to fix vulnerabilities. This is stated by its changelog, but no changes in code were found.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clara-viz version less then 0.1.4 have ### Response: Having vulnarability PVE-2022-45107 Advisory: Clara-viz 0.1.4 updates Jupyter widget Java code packages to fix vulnerabilities. This is stated by its changelog, but no changes in code were found." }, { "instruction": "what vulnarability does clearml version less then 0.17.5rc3 have", "input": "", "output": "Having vulnarability PVE-2022-49701 Advisory: Clearml 0.17.5rc3 fixes unsafe call to set_active().\r\nhttps://github.com/allegroai/clearml/commit/b0000df575e830a81674f4e5cf3d89cf6d6441b4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clearml version less then 0.17.5rc3 have ### Response: Having vulnarability PVE-2022-49701 Advisory: Clearml 0.17.5rc3 fixes unsafe call to set_active().\r\nhttps://github.com/allegroai/clearml/commit/b0000df575e830a81674f4e5cf3d89cf6d6441b4" }, { "instruction": "what vulnarability does clearml-agent version less then 1.3.0 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Clearml-agent 1.3.0 updates its dependency 'pyjwt' requirement to '>=2.4.0,<2.5.0' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clearml-agent version less then 1.3.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Clearml-agent 1.3.0 updates its dependency 'pyjwt' requirement to '>=2.4.0,<2.5.0' to include a security fix." }, { "instruction": "what vulnarability does clearml-session version less then 0.10.0 have", "input": "", "output": "Having vulnarability PVE-2023-62736 Advisory: Clearml-session 0.10.0 upgrades the Pillow dependency to versions >=10.0.1 due to vulnerabilities present in earlier versions.\r\nhttps://github.com/allegroai/clearml-session/commit/e6dbd13ca38c58ce2b4057ef8ad2c35cc313eeea", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clearml-session version less then 0.10.0 have ### Response: Having vulnarability PVE-2023-62736 Advisory: Clearml-session 0.10.0 upgrades the Pillow dependency to versions >=10.0.1 due to vulnerabilities present in earlier versions.\r\nhttps://github.com/allegroai/clearml-session/commit/e6dbd13ca38c58ce2b4057ef8ad2c35cc313eeea" }, { "instruction": "what vulnarability does clearsilver version less then 0.10.5 have", "input": "", "output": "Having vulnarability CVE-2011-4357 Advisory: Format string vulnerability in the p_cgi_error function in python/neo_cgi.c in the Python CGI Kit (neo_cgi) module for Clearsilver 0.10.5 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers that are not properly handled when creating CGI error messages using the cgi_error API function.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clearsilver version less then 0.10.5 have ### Response: Having vulnarability CVE-2011-4357 Advisory: Format string vulnerability in the p_cgi_error function in python/neo_cgi.c in the Python CGI Kit (neo_cgi) module for Clearsilver 0.10.5 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers that are not properly handled when creating CGI error messages using the cgi_error API function." }, { "instruction": "what vulnarability does cleo version greather then equal to 0,less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2022-42966 Advisory: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI package, when an attacker is able to supply arbitrary input to the Table.set_rows method\r\nhttps://github.com/python-poetry/cleo/pull/285", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cleo version greather then equal to 0,less then 1.0.0 have ### Response: Having vulnarability CVE-2022-42966 Advisory: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI package, when an attacker is able to supply arbitrary input to the Table.set_rows method\r\nhttps://github.com/python-poetry/cleo/pull/285" }, { "instruction": "what vulnarability does clevercsv version less then 0.6.2 have", "input": "", "output": "Having vulnarability PVE-2023-61023 Advisory: Clevercsv 0.6.2 includes a fix for a potential ReDOS vulnerability.\r\nhttps://github.com/alan-turing-institute/CleverCSV/issues/13", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clevercsv version less then 0.6.2 have ### Response: Having vulnarability PVE-2023-61023 Advisory: Clevercsv 0.6.2 includes a fix for a potential ReDOS vulnerability.\r\nhttps://github.com/alan-turing-institute/CleverCSV/issues/13" }, { "instruction": "what vulnarability does cliboa version less then 2.0.0b0 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Cliboa 2.0.0b0 updates its dependency 'urllib3' to v1.26.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cliboa version less then 2.0.0b0 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Cliboa 2.0.0b0 updates its dependency 'urllib3' to v1.26.5 to include a security fix." }, { "instruction": "what vulnarability does click version less then 8.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'.\r\nhttps://github.com/pallets/click/issues/1752", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does click version less then 8.0.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'.\r\nhttps://github.com/pallets/click/issues/1752" }, { "instruction": "what vulnarability does clickhouse-driver version less then 0.1.5 have", "input": "", "output": "Having vulnarability CVE-2020-26759 Advisory: clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clickhouse-driver version less then 0.1.5 have ### Response: Having vulnarability CVE-2020-26759 Advisory: clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow." }, { "instruction": "what vulnarability does clip-retrieval version less then 2.23.1 have", "input": "", "output": "Having vulnarability PVE-2024-63278 Advisory: Clip-retrieval 2.23.1 addresses a race condition that could lead to data corruption and inconsistent states. Previously, multiple instances of the writer function could attempt to create directories simultaneously, potentially causing conflicts and errors. This version resolves this by replacing 'mkdir' with 'makedirs', which ensures all intermediate directories are created. It also introduces a check to verify the existence of a 'work in progress' file before creation, thereby preventing race conditions.\r\nhttps://github.com/rom1504/clip-retrieval/pull/112", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clip-retrieval version less then 2.23.1 have ### Response: Having vulnarability PVE-2024-63278 Advisory: Clip-retrieval 2.23.1 addresses a race condition that could lead to data corruption and inconsistent states. Previously, multiple instances of the writer function could attempt to create directories simultaneously, potentially causing conflicts and errors. This version resolves this by replacing 'mkdir' with 'makedirs', which ensures all intermediate directories are created. It also introduces a check to verify the existence of a 'work in progress' file before creation, thereby preventing race conditions.\r\nhttps://github.com/rom1504/clip-retrieval/pull/112" }, { "instruction": "what vulnarability does clipster-desktop version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-39388 Advisory: Clipster-desktop 0.3.0 includes various improvements to make the host more secure:\r\n* All clips are encrypted locally in the client before transmission to the server. \r\n* Server host can't decrypt clips: it never learns the users' password.\r\n* Password is not stored in cleartext anymore. Instead password hash is used.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does clipster-desktop version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-39388 Advisory: Clipster-desktop 0.3.0 includes various improvements to make the host more secure:\r\n* All clips are encrypted locally in the client before transmission to the server. \r\n* Server host can't decrypt clips: it never learns the users' password.\r\n* Password is not stored in cleartext anymore. Instead password hash is used." }, { "instruction": "what vulnarability does cliquery version less then 1.10.0 have", "input": "", "output": "Having vulnarability CVE-2021-28957 Advisory: Cliquery 1.10.0 updates the 'lxml' dependency from 4.6.2 to 4.6.3 to fix a security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cliquery version less then 1.10.0 have ### Response: Having vulnarability CVE-2021-28957 Advisory: Cliquery 1.10.0 updates the 'lxml' dependency from 4.6.2 to 4.6.3 to fix a security vulnerability." }, { "instruction": "what vulnarability does cloorama version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51737 Advisory: Cloorama is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cloorama version greather then 0 have ### Response: Having vulnarability PVE-2022-51737 Advisory: Cloorama is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does cloudlabeling version equal to 0.0.1 have", "input": "", "output": "Having vulnarability CVE-2022-32999 Advisory: The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cloudlabeling version equal to 0.0.1 have ### Response: Having vulnarability CVE-2022-32999 Advisory: The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does cloudtoken version greather then equal to 0.1.1,less then 0.1.24 have", "input": "", "output": "Having vulnarability CVE-2018-13390 Advisory: Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cloudtoken version greather then equal to 0.1.1,less then 0.1.24 have ### Response: Having vulnarability CVE-2018-13390 Advisory: Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles." }, { "instruction": "what vulnarability does cloudvision version less then 1.13.0 have", "input": "", "output": "Having vulnarability CVE-2023-2975 Advisory: Cloudvision 1.13.0 updates 'cryptography' minimum version to v41.0.3 to include security fixes in bundled OpenSSL.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cloudvision version less then 1.13.0 have ### Response: Having vulnarability CVE-2023-2975 Advisory: Cloudvision 1.13.0 updates 'cryptography' minimum version to v41.0.3 to include security fixes in bundled OpenSSL." }, { "instruction": "what vulnarability does cloudwatch-to-graphite version less then 0.11.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Cloudwatch-To-Graphite 0.11.0 includes a security patch for the function 'get_config' in 'leadbutt.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/crccheck/cloudwatch-to-graphite/commit/5875100c54a54a9c90cf2fe782cc3df147d32053#diff-ddb0922eafb2fa54199e50bb13de6178b1755e780387144df032f9e26512f15e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cloudwatch-to-graphite version less then 0.11.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Cloudwatch-To-Graphite 0.11.0 includes a security patch for the function 'get_config' in 'leadbutt.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/crccheck/cloudwatch-to-graphite/commit/5875100c54a54a9c90cf2fe782cc3df147d32053#diff-ddb0922eafb2fa54199e50bb13de6178b1755e780387144df032f9e26512f15e" }, { "instruction": "what vulnarability does cloudy-with-a-chance-of-meatballs.cdk-lambda-token-authorizer-jwt version less then 0.1.11 have", "input": "", "output": "Having vulnarability PVE-2023-53078 Advisory: Cloudy-with-a-chance-of-meatballs.cdk-lambda-token-authorizer-jwt 0.1.11 updates NPM dependencies to include security fixes.\r\nhttps://github.com/cloudy-with-a-chance-of-meatballs/cdk-lambda-token-authorizer-jwt/pull/154", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cloudy-with-a-chance-of-meatballs.cdk-lambda-token-authorizer-jwt version less then 0.1.11 have ### Response: Having vulnarability PVE-2023-53078 Advisory: Cloudy-with-a-chance-of-meatballs.cdk-lambda-token-authorizer-jwt 0.1.11 updates NPM dependencies to include security fixes.\r\nhttps://github.com/cloudy-with-a-chance-of-meatballs/cdk-lambda-token-authorizer-jwt/pull/154" }, { "instruction": "what vulnarability does cloverly-python-module version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-41085 Advisory: Cloverly-python-module 0.2.0 adds a clear session function for security purposes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cloverly-python-module version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-41085 Advisory: Cloverly-python-module 0.2.0 adds a clear session function for security purposes." }, { "instruction": "what vulnarability does cls-python version less then 0.1.4 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Cls-python 0.1.4 updates its dependency 'wheel' to v0.38.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cls-python version less then 0.1.4 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Cls-python 0.1.4 updates its dependency 'wheel' to v0.38.1 to include a security fix." }, { "instruction": "what vulnarability does cmdlr version less then 4.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-36854 Advisory: cmdlr 4.1.0 resists malicious js attack in `run_in_nodejs`", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cmdlr version less then 4.1.0 have ### Response: Having vulnarability PVE-2021-36854 Advisory: cmdlr 4.1.0 resists malicious js attack in `run_in_nodejs`" }, { "instruction": "what vulnarability does cmsis-pack-manager version less then 0.5.1 have", "input": "", "output": "Having vulnarability CVE-2020-26235 Advisory: Cmsis-pack-manager 0.5.1 updates its RUST dependency 'time' to v0.3.17 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cmsis-pack-manager version less then 0.5.1 have ### Response: Having vulnarability CVE-2020-26235 Advisory: Cmsis-pack-manager 0.5.1 updates its RUST dependency 'time' to v0.3.17 to include a security fix." }, { "instruction": "what vulnarability does cmsplugin-filer version less then 0.10.2 have", "input": "", "output": "Having vulnarability PVE-2021-25656 Advisory: Cmsplugin-filer 0.10.2 includes a fix for a XSS vulnerability in 'firstof' in folder template. Users with Django>1.7 aren't affected.\r\nhttps://github.com/divio/cmsplugin-filer/pull/185", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cmsplugin-filer version less then 0.10.2 have ### Response: Having vulnarability PVE-2021-25656 Advisory: Cmsplugin-filer 0.10.2 includes a fix for a XSS vulnerability in 'firstof' in folder template. Users with Django>1.7 aren't affected.\r\nhttps://github.com/divio/cmsplugin-filer/pull/185" }, { "instruction": "what vulnarability does cnx-publishing version less then 0.17.6 have", "input": "", "output": "Having vulnarability CVE-2020-7212 Advisory: Cnx-publishing 0.17.6 updates its dependency 'urllib3' to v1.25.8 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cnx-publishing version less then 0.17.6 have ### Response: Having vulnarability CVE-2020-7212 Advisory: Cnx-publishing 0.17.6 updates its dependency 'urllib3' to v1.25.8 to include a security fix." }, { "instruction": "what vulnarability does coapthon version equal to 3.1,equal to 4.0.0,equal to 4.0.1,equal to 4.0.2 have", "input": "", "output": "Having vulnarability CVE-2018-12680 Advisory: The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does coapthon version equal to 3.1,equal to 4.0.0,equal to 4.0.1,equal to 4.0.2 have ### Response: Having vulnarability CVE-2018-12680 Advisory: The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages." }, { "instruction": "what vulnarability does coapthon3 version greather then equal to 0,less then equal to 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2018-12679 Advisory: The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does coapthon3 version greather then equal to 0,less then equal to 1.0.1 have ### Response: Having vulnarability CVE-2018-12679 Advisory: The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages." }, { "instruction": "what vulnarability does cobbler version less then 1.2.9 have", "input": "", "output": "Having vulnarability CVE-2008-6954 Advisory: The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cobbler version less then 1.2.9 have ### Response: Having vulnarability CVE-2008-6954 Advisory: The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules." }, { "instruction": "what vulnarability does cockroachdb version less then 0.3.2 have", "input": "", "output": "Having vulnarability CVE-2019-11324 Advisory: Cockroachdb 0.3.2 updates 'urllib3' to v1.25.3 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cockroachdb version less then 0.3.2 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Cockroachdb 0.3.2 updates 'urllib3' to v1.25.3 to include security fixes." }, { "instruction": "what vulnarability does codalab version less then 0.2.33 have", "input": "", "output": "Having vulnarability PVE-2021-36386 Advisory: codalab before 0.2.33 was using a version of gunicorn that had security vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does codalab version less then 0.2.33 have ### Response: Having vulnarability PVE-2021-36386 Advisory: codalab before 0.2.33 was using a version of gunicorn that had security vulnerabilities." }, { "instruction": "what vulnarability does code-snapshot version less then 0.2.4 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Code-snapshot 0.2.4 updates its dependency 'requests' minimum requirement to v2.31.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does code-snapshot version less then 0.2.4 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Code-snapshot 0.2.4 updates its dependency 'requests' minimum requirement to v2.31.0 to include a security fix." }, { "instruction": "what vulnarability does codechecker version less then 6.18.2 have", "input": "", "output": "Having vulnarability PVE-2023-59888 Advisory: Codechecker 6.18.2 includes a fix for a XSS vulnerability. To solve this problem the server will always return the escaped version of these values which can be safely rendered on the UI.\r\nhttps://github.com/Ericsson/codechecker/pull/3549", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does codechecker version less then 6.18.2 have ### Response: Having vulnarability PVE-2023-59888 Advisory: Codechecker 6.18.2 includes a fix for a XSS vulnerability. To solve this problem the server will always return the escaped version of these values which can be safely rendered on the UI.\r\nhttps://github.com/Ericsson/codechecker/pull/3549" }, { "instruction": "what vulnarability does codecov version less then 2.0.16 have", "input": "", "output": "Having vulnarability CVE-2019-10800 Advisory: Codecov 2.0.16 includes a fix for CVE-2019-10800: Remote code execution. The vulnerability exists due to improper sanitization of \"gcov\" arguments before being provided to the \"popen\" method. A remote authenticated attacker can execute arbitrary OS commands on the target system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does codecov version less then 2.0.16 have ### Response: Having vulnarability CVE-2019-10800 Advisory: Codecov 2.0.16 includes a fix for CVE-2019-10800: Remote code execution. The vulnerability exists due to improper sanitization of \"gcov\" arguments before being provided to the \"popen\" method. A remote authenticated attacker can execute arbitrary OS commands on the target system." }, { "instruction": "what vulnarability does codeforcesapipy version less then 2.0.8 have", "input": "", "output": "Having vulnarability CVE-2021-28957 Advisory: Codeforcesapipy 2.0.8 updates the 'lxml' dependency to 4.6.3 to resolve security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does codeforcesapipy version less then 2.0.8 have ### Response: Having vulnarability CVE-2021-28957 Advisory: Codeforcesapipy 2.0.8 updates the 'lxml' dependency to 4.6.3 to resolve security issues." }, { "instruction": "what vulnarability does codeinterpreterapi version less then 0.0.14 have", "input": "", "output": "Having vulnarability PVE-2023-61536 Advisory: Codeinterpreterapi 0.0.14 updates its dependency 'langchain' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does codeinterpreterapi version less then 0.0.14 have ### Response: Having vulnarability PVE-2023-61536 Advisory: Codeinterpreterapi 0.0.14 updates its dependency 'langchain' to include a security fix." }, { "instruction": "what vulnarability does coderedcms version less then 0.22.3 have", "input": "", "output": "Having vulnarability CVE-2021-46897 Advisory: views.py in Wagtail CRX CodeRed Extensions (formerly CodeRed CMS or coderedcms) before 0.22.3 allows upward protected/..%2f..%2f path traversal when serving protected media.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does coderedcms version less then 0.22.3 have ### Response: Having vulnarability CVE-2021-46897 Advisory: views.py in Wagtail CRX CodeRed Extensions (formerly CodeRed CMS or coderedcms) before 0.22.3 allows upward protected/..%2f..%2f path traversal when serving protected media." }, { "instruction": "what vulnarability does cognitojwt version less then 1.5.0 have", "input": "", "output": "Having vulnarability CVE-2024-23342 Advisory: Cognitojwt version 1.5.0 transitions from the outdated python-jose library, which relied on the ecdsa package containing unresolved vulnerabilities, to the more frequently updated joserfc library.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cognitojwt version less then 1.5.0 have ### Response: Having vulnarability CVE-2024-23342 Advisory: Cognitojwt version 1.5.0 transitions from the outdated python-jose library, which relied on the ecdsa package containing unresolved vulnerabilities, to the more frequently updated joserfc library." }, { "instruction": "what vulnarability does cohen3 version less then 0.8.3 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Cohen3 version 0.8.3 updates its dependency \"requests\" to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cohen3 version less then 0.8.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Cohen3 version 0.8.3 updates its dependency \"requests\" to include a security fix." }, { "instruction": "what vulnarability does coinbasepro version less then 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Coinbasepro 0.1.0 updates requests version to >=2.20.0 to address a security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does coinbasepro version less then 0.1.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Coinbasepro 0.1.0 updates requests version to >=2.20.0 to address a security vulnerability." }, { "instruction": "what vulnarability does coincurve version less then 8.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-36299 Advisory: coincurve before 8.0.0 does not support the new GitHub and PyPI security requirements. \r\nBinary wheels on macOS for Python 3.5 now uses Homebrew Python for compilation due to new security requirements.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does coincurve version less then 8.0.0 have ### Response: Having vulnarability PVE-2021-36299 Advisory: coincurve before 8.0.0 does not support the new GitHub and PyPI security requirements. \r\nBinary wheels on macOS for Python 3.5 now uses Homebrew Python for compilation due to new security requirements." }, { "instruction": "what vulnarability does colander version less then equal to 1.6 have", "input": "", "output": "Having vulnarability CVE-2017-18361 Advisory: In Pylons Colander through 1.6, the URL validator allows an attacker to potentially cause an infinite loop thereby causing a denial of service via an unclosed parenthesis. See CVE-2017-18361.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does colander version less then equal to 1.6 have ### Response: Having vulnarability CVE-2017-18361 Advisory: In Pylons Colander through 1.6, the URL validator allows an attacker to potentially cause an infinite loop thereby causing a denial of service via an unclosed parenthesis. See CVE-2017-18361." }, { "instruction": "what vulnarability does coldsweat version less then 0.10.0 have", "input": "", "output": "Having vulnarability CVE-2014-1830 Advisory: Coldsweat 0.10.0 updates its dependency 'requests' to version '2.20.1' to include a security fix.\r\nhttps://github.com/passiomatic/coldsweat/commit/646edf0ef75cf62c7ba009a7ce62b4b8ffae26c3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does coldsweat version less then 0.10.0 have ### Response: Having vulnarability CVE-2014-1830 Advisory: Coldsweat 0.10.0 updates its dependency 'requests' to version '2.20.1' to include a security fix.\r\nhttps://github.com/passiomatic/coldsweat/commit/646edf0ef75cf62c7ba009a7ce62b4b8ffae26c3" }, { "instruction": "what vulnarability does collective-contact-core version less then 1.10 have", "input": "", "output": "Having vulnarability CVE-2016-7138 Advisory: Collective.contact.core 1.10 fixes a security issue related to AddContact. The vulnerability was found in its dependency Plone CMS. See CVE-2016-7138.\r\nhttps://github.com/collective/collective.contact.core/pull/25", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-contact-core version less then 1.10 have ### Response: Having vulnarability CVE-2016-7138 Advisory: Collective.contact.core 1.10 fixes a security issue related to AddContact. The vulnerability was found in its dependency Plone CMS. See CVE-2016-7138.\r\nhttps://github.com/collective/collective.contact.core/pull/25" }, { "instruction": "what vulnarability does collective-contact-widget version greather then equal to 0,less then 1.13 have", "input": "", "output": "Having vulnarability CVE-2022-4638 Advisory: collective.contact.widget is an add-on is part of the collective.contact.* suite. A vulnerability classified as problematic was found in collective.contact.widget up to 1.12. This vulnerability affects the function title of the file src/collective/contact/widget/widgets.py. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 5da36305ca7ed433782be8901c47387406fcda12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216496.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-contact-widget version greather then equal to 0,less then 1.13 have ### Response: Having vulnarability CVE-2022-4638 Advisory: collective.contact.widget is an add-on is part of the collective.contact.* suite. A vulnerability classified as problematic was found in collective.contact.widget up to 1.12. This vulnerability affects the function title of the file src/collective/contact/widget/widgets.py. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 5da36305ca7ed433782be8901c47387406fcda12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216496." }, { "instruction": "what vulnarability does collective-dms-basecontent version greather then equal to 0,less then 1.7 have", "input": "", "output": "Having vulnarability CVE-2022-4495 Advisory: A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 or later will address this issue. The patch is at commit 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-dms-basecontent version greather then equal to 0,less then 1.7 have ### Response: Having vulnarability CVE-2022-4495 Advisory: A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 or later will address this issue. The patch is at commit 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability." }, { "instruction": "what vulnarability does collective-documentviewer version less then 1.5.1 have", "input": "", "output": "Having vulnarability PVE-2021-25658 Advisory: Collective.documentviewer 1.5.1 fixes a security issue on file resources permissions.\r\nhttps://github.com/collective/collective.documentviewer/commit/7222b0d30b1976d3f6773553bd6948c39efcbc20", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-documentviewer version less then 1.5.1 have ### Response: Having vulnarability PVE-2021-25658 Advisory: Collective.documentviewer 1.5.1 fixes a security issue on file resources permissions.\r\nhttps://github.com/collective/collective.documentviewer/commit/7222b0d30b1976d3f6773553bd6948c39efcbc20" }, { "instruction": "what vulnarability does collective-easyform version less then 3.0.5 have", "input": "", "output": "Having vulnarability PVE-2021-41911 Advisory: Collective-easyform version 3.0.5 doesn't resolves entities in the modeleditor and removes processing instructions (commit #254).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-easyform version less then 3.0.5 have ### Response: Having vulnarability PVE-2021-41911 Advisory: Collective-easyform version 3.0.5 doesn't resolves entities in the modeleditor and removes processing instructions (commit #254)." }, { "instruction": "what vulnarability does collective-js-datatables version less then 4.1.1 have", "input": "", "output": "Having vulnarability CVE-2015-6384 Advisory: Collective.js.datatables 4.1.1 updates Datatables to 1.10.11, due to a XSS vulnerability in 1.10.4.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-js-datatables version less then 4.1.1 have ### Response: Having vulnarability CVE-2015-6384 Advisory: Collective.js.datatables 4.1.1 updates Datatables to 1.10.11, due to a XSS vulnerability in 1.10.4." }, { "instruction": "what vulnarability does collective-noticeboard version less then 0.7.1 have", "input": "", "output": "Having vulnarability PVE-2021-35879 Advisory: collective-noticeboard before 0.7.1 has a security issue, anonymous users could modify notes positions.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-noticeboard version less then 0.7.1 have ### Response: Having vulnarability PVE-2021-35879 Advisory: collective-noticeboard before 0.7.1 has a security issue, anonymous users could modify notes positions." }, { "instruction": "what vulnarability does collective-portlet-twitter version less then 1.0b3 have", "input": "", "output": "Having vulnarability PVE-2021-25661 Advisory: Collective.portlet.twitter 1.0b3 fixes a potential XSS (arbitrary injection) issue by escaping and quoting all attributes being set on the rendered portlet.\r\nhttps://github.com/collective/collective.portlet.twitter/pull/2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-portlet-twitter version less then 1.0b3 have ### Response: Having vulnarability PVE-2021-25661 Advisory: Collective.portlet.twitter 1.0b3 fixes a potential XSS (arbitrary injection) issue by escaping and quoting all attributes being set on the rendered portlet.\r\nhttps://github.com/collective/collective.portlet.twitter/pull/2" }, { "instruction": "what vulnarability does collective-tablepage version less then 0.3 have", "input": "", "output": "Having vulnarability PVE-2021-25664 Advisory: collective.tablepage 0.3 fixes a security problem: data inside text cells were transformed to HTML without any check.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-tablepage version less then 0.3 have ### Response: Having vulnarability PVE-2021-25664 Advisory: collective.tablepage 0.3 fixes a security problem: data inside text cells were transformed to HTML without any check." }, { "instruction": "what vulnarability does collective-task version less then 3.0.9 have", "input": "", "output": "Having vulnarability PVE-2022-50678 Advisory: Collective-task 3.0.9 includes escaping to fix a XSS vulnerability.\r\nhttps://github.com/collective/collective.task/commit/1aac7f83fa2c2b41d59ba02748912953461f3fac", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-task version less then 3.0.9 have ### Response: Having vulnarability PVE-2022-50678 Advisory: Collective-task 3.0.9 includes escaping to fix a XSS vulnerability.\r\nhttps://github.com/collective/collective.task/commit/1aac7f83fa2c2b41d59ba02748912953461f3fac" }, { "instruction": "what vulnarability does collective-xmpp-chat version less then 0.3.1 have", "input": "", "output": "Having vulnarability PVE-2021-25666 Advisory: Collective.xmpp.chat 0.3.1 includes an update in 'converse.js' that fixes a security issue.\r\nhttps://github.com/collective/collective.xmpp.chat/commit/4b6cb3a43158f866d84c4ce803b9016aef81adfe", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective-xmpp-chat version less then 0.3.1 have ### Response: Having vulnarability PVE-2021-25666 Advisory: Collective.xmpp.chat 0.3.1 includes an update in 'converse.js' that fixes a security issue.\r\nhttps://github.com/collective/collective.xmpp.chat/commit/4b6cb3a43158f866d84c4ce803b9016aef81adfe" }, { "instruction": "what vulnarability does collective.contact.widget version less then 1.13 have", "input": "", "output": "Having vulnarability PVE-2022-49566 Advisory: Collective.contact.widget 1.13 escapes contact title special characters in 'term-contact' viewlet to prevent XSS vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective.contact.widget version less then 1.13 have ### Response: Having vulnarability PVE-2022-49566 Advisory: Collective.contact.widget 1.13 escapes contact title special characters in 'term-contact' viewlet to prevent XSS vulnerabilities." }, { "instruction": "what vulnarability does collective.dms.basecontent version less then 1.7 have", "input": "", "output": "Having vulnarability PVE-2022-49567 Advisory: Collective.dms.basecontent 1.7 escapes special characters when rendering to avoid potential XSS vulnerabilities.\r\nhttps://github.com/collective/collective.dms.basecontent/commit/6c4d616fcc771822a14ebae5e23f3f6d96d134bd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective.dms.basecontent version less then 1.7 have ### Response: Having vulnarability PVE-2022-49567 Advisory: Collective.dms.basecontent 1.7 escapes special characters when rendering to avoid potential XSS vulnerabilities.\r\nhttps://github.com/collective/collective.dms.basecontent/commit/6c4d616fcc771822a14ebae5e23f3f6d96d134bd" }, { "instruction": "what vulnarability does collective.documentgenerator version less then 3.33 have", "input": "", "output": "Having vulnarability PVE-2022-49408 Advisory: Collective.documentgenerator 3.33 adds character escaping to avoid XSS attacks via 'TemplatesTable'.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective.documentgenerator version less then 3.33 have ### Response: Having vulnarability PVE-2022-49408 Advisory: Collective.documentgenerator 3.33 adds character escaping to avoid XSS attacks via 'TemplatesTable'." }, { "instruction": "what vulnarability does collective.iconifiedcategory version less then 0.54 have", "input": "", "output": "Having vulnarability PVE-2022-49411 Advisory: Collective.iconifiedcategory 0.54 applies escaping to avoid code injection vulnerabilities.\r\nhttps://github.com/collective/collective.iconifiedcategory/commit/7bcd148d7649be0e1df82ec75bbc46e2925eba2d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collective.iconifiedcategory version less then 0.54 have ### Response: Having vulnarability PVE-2022-49411 Advisory: Collective.iconifiedcategory 0.54 applies escaping to avoid code injection vulnerabilities.\r\nhttps://github.com/collective/collective.iconifiedcategory/commit/7bcd148d7649be0e1df82ec75bbc46e2925eba2d" }, { "instruction": "what vulnarability does collored version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47815 Advisory: Collored is a malicious package, typosquatting. It installs Malware in your system.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does collored version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47815 Advisory: Collored is a malicious package, typosquatting. It installs Malware in your system.\r\nhttps://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick" }, { "instruction": "what vulnarability does colorsama version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51685 Advisory: Colorsama is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does colorsama version greather then 0 have ### Response: Having vulnarability PVE-2022-51685 Advisory: Colorsama is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does colorslib version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52924 Advisory: Colorslib is a malicious package. It installs info-stealing Malware.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does colorslib version greather then 0 have ### Response: Having vulnarability PVE-2023-52924 Advisory: Colorslib is a malicious package. It installs info-stealing Malware.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware" }, { "instruction": "what vulnarability does colorwin version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51683 Advisory: Colorwin is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does colorwin version greather then 0 have ### Response: Having vulnarability PVE-2022-51683 Advisory: Colorwin is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does colossalai version less then 0.1.11rc1 have", "input": "", "output": "Having vulnarability PVE-2024-65063 Advisory: Colossalai 0.1.11rc1 addresses security concerns related to subprocess handling. It specifically rectifies insecure subprocess usage by modifying the way subprocesses are invoked, enhancing the security and reliability of the code. This change is crucial for preventing potential vulnerabilities in the application's execution environment.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does colossalai version less then 0.1.11rc1 have ### Response: Having vulnarability PVE-2024-65063 Advisory: Colossalai 0.1.11rc1 addresses security concerns related to subprocess handling. It specifically rectifies insecure subprocess usage by modifying the way subprocesses are invoked, enhancing the security and reliability of the code. This change is crucial for preventing potential vulnerabilities in the application's execution environment." }, { "instruction": "what vulnarability does colourama version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45412 Advisory: Colourama is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does colourama version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45412 Advisory: Colourama is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/" }, { "instruction": "what vulnarability does commondatamodel-objectmodel version greather then equal to 0,less then 1.7.4 have", "input": "", "output": "Having vulnarability CVE-2023-36566 Advisory: Microsoft Common Data Model SDK Denial of Service Vulnerability", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does commondatamodel-objectmodel version greather then equal to 0,less then 1.7.4 have ### Response: Having vulnarability CVE-2023-36566 Advisory: Microsoft Common Data Model SDK Denial of Service Vulnerability" }, { "instruction": "what vulnarability does commonground-api-common version less then equal to 1.12.1 have", "input": "", "output": "Having vulnarability PVE-2024-68497 Advisory: Versions of software utilizing the PyJWT library are susceptible to a theoretical privilege escalation due to a non-exploitable weakness in client-supplied JWT verification. Despite using an explicit allow-list of algorithms preventing the use of invalid ones, a hypothetical scenario was identified where, without such a mechanism, tampered client JWTs could lead to an attacker impersonating any client without detection. The JWT verification issue stems from the handling of the algorithm specified in the JWT header, specifically the use of a string for algorithm names rather than a strict list, potentially allowing any substring matching to pass verification checks. However, this vulnerability is considered non-exploitable since PyJWT does not support algorithm substrings that would exploit this issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does commonground-api-common version less then equal to 1.12.1 have ### Response: Having vulnarability PVE-2024-68497 Advisory: Versions of software utilizing the PyJWT library are susceptible to a theoretical privilege escalation due to a non-exploitable weakness in client-supplied JWT verification. Despite using an explicit allow-list of algorithms preventing the use of invalid ones, a hypothetical scenario was identified where, without such a mechanism, tampered client JWTs could lead to an attacker impersonating any client without detection. The JWT verification issue stems from the handling of the algorithm specified in the JWT header, specifically the use of a string for algorithm names rather than a strict list, potentially allowing any substring matching to pass verification checks. However, this vulnerability is considered non-exploitable since PyJWT does not support algorithm substrings that would exploit this issue." }, { "instruction": "what vulnarability does compas version less then 1.17.5 have", "input": "", "output": "Having vulnarability CVE-2007-4559 Advisory: Compas 1.17.5 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\r\nhttps://github.com/compas-dev/compas/commit/0d0f9bec24511fe5dbc77ef73ee617dc83b4420e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does compas version less then 1.17.5 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Compas 1.17.5 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\r\nhttps://github.com/compas-dev/compas/commit/0d0f9bec24511fe5dbc77ef73ee617dc83b4420e" }, { "instruction": "what vulnarability does compliance-trestle version less then 0.15.0 have", "input": "", "output": "Having vulnarability CVE-2021-29510 Advisory: Compliance-trestle 0.15.0 updates its dependency 'pydantic' to 1.8.2 for an security issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does compliance-trestle version less then 0.15.0 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Compliance-trestle 0.15.0 updates its dependency 'pydantic' to 1.8.2 for an security issue." }, { "instruction": "what vulnarability does composer version less then 0.13.0 have", "input": "", "output": "Having vulnarability CVE-2023-24816 Advisory: Composer 0.13.0 updates its dependency 'ipython' to v8.11.0 in Dockerfile to include a security fix.\r\nhttps://github.com/mosaicml/composer/pull/2007", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does composer version less then 0.13.0 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Composer 0.13.0 updates its dependency 'ipython' to v8.11.0 in Dockerfile to include a security fix.\r\nhttps://github.com/mosaicml/composer/pull/2007" }, { "instruction": "what vulnarability does conan version less then 1.49.0 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Conan 1.49.0 updates its dependency 'pyjwt' requirement to \">=2.4.0, <3.0.0\" to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does conan version less then 1.49.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Conan 1.49.0 updates its dependency 'pyjwt' requirement to \">=2.4.0, <3.0.0\" to include a security fix." }, { "instruction": "what vulnarability does concrete-datastore version less then 1.22.0 have", "input": "", "output": "Having vulnarability PVE-2021-39449 Advisory: Concrete-datastore 1.22.0 adds checks to prevent unauthorized queries.\r\nhttps://github.com/Netsach/concrete-datastore/pull/69", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does concrete-datastore version less then 1.22.0 have ### Response: Having vulnarability PVE-2021-39449 Advisory: Concrete-datastore 1.22.0 adds checks to prevent unauthorized queries.\r\nhttps://github.com/Netsach/concrete-datastore/pull/69" }, { "instruction": "what vulnarability does conference-scheduler-cli version less then equal to 0.10.1 have", "input": "", "output": "Having vulnarability CVE-2018-14572 Advisory: In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does conference-scheduler-cli version less then equal to 0.10.1 have ### Response: Having vulnarability CVE-2018-14572 Advisory: In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call." }, { "instruction": "what vulnarability does confidant version less then 1.1.13 have", "input": "", "output": "Having vulnarability PVE-2021-26670 Advisory: Confidant 1.1.13 includes a security fix. It was discovered when adding tests after a refactor of some of the KMS authentication code that confidant wasn't properly checking the expiration of KMS auth tokens. If tokens were able to be exfiltrated from a service, they could be used indefinitely. Also, any tokens that are expired will now correctly fail to authenticate.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does confidant version less then 1.1.13 have ### Response: Having vulnarability PVE-2021-26670 Advisory: Confidant 1.1.13 includes a security fix. It was discovered when adding tests after a refactor of some of the KMS authentication code that confidant wasn't properly checking the expiration of KMS auth tokens. If tokens were able to be exfiltrated from a service, they could be used indefinitely. Also, any tokens that are expired will now correctly fail to authenticate." }, { "instruction": "what vulnarability does confidence version less then 0.4 have", "input": "", "output": "Having vulnarability PVE-2021-36308 Advisory: Confidence before 0.4 uses unsafe 'yaml.load()' which may lead to code execution.\r\nhttps://github.com/NetherlandsForensicInstitute/confidence/commit/c94f3510aabf1d8f67e58ae0d3350c98821d296b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does confidence version less then 0.4 have ### Response: Having vulnarability PVE-2021-36308 Advisory: Confidence before 0.4 uses unsafe 'yaml.load()' which may lead to code execution.\r\nhttps://github.com/NetherlandsForensicInstitute/confidence/commit/c94f3510aabf1d8f67e58ae0d3350c98821d296b" }, { "instruction": "what vulnarability does configframework version less then 4.0.1 have", "input": "", "output": "Having vulnarability CVE-2022-40896 Advisory: Configframework 4.0.1 updates its dependency 'pygments' to version '2.15.0' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/Rud356/ConfigFramework/commit/3eb83b9099fff6bf2d80bf2cd79fb3e62933fde6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does configframework version less then 4.0.1 have ### Response: Having vulnarability CVE-2022-40896 Advisory: Configframework 4.0.1 updates its dependency 'pygments' to version '2.15.0' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/Rud356/ConfigFramework/commit/3eb83b9099fff6bf2d80bf2cd79fb3e62933fde6" }, { "instruction": "what vulnarability does configobj version greather then equal to 0 have", "input": "", "output": "Having vulnarability CVE-2023-26112 Advisory: All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\\((.*)\\). **Note:** This is only exploitable in the case of a developer putting the offending value in a server side configuration file.\r\nhttps://github.com/DiffSK/configobj/issues/232", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does configobj version greather then equal to 0 have ### Response: Having vulnarability CVE-2023-26112 Advisory: All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\\((.*)\\). **Note:** This is only exploitable in the case of a developer putting the offending value in a server side configuration file.\r\nhttps://github.com/DiffSK/configobj/issues/232" }, { "instruction": "what vulnarability does confire version less then equal to 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2017-16763 Advisory: An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from \"~/.confire.yaml\" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does confire version less then equal to 0.2.0 have ### Response: Having vulnarability CVE-2017-16763 Advisory: An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from \"~/.confire.yaml\" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability." }, { "instruction": "what vulnarability does confluent-kafka version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-37508 Advisory: Confluent-kafka 1.1.0 securely clears the private key data from memory after last use.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does confluent-kafka version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-37508 Advisory: Confluent-kafka 1.1.0 securely clears the private key data from memory after last use." }, { "instruction": "what vulnarability does conn-check version less then 1.0.18 have", "input": "", "output": "Having vulnarability PVE-2021-25669 Advisory: conn-check 1.0.18 ensures pyOpenSSL is always used instead of the ssl modules, see https://urllib3.readthedocs.org/en/latest/security.htmlpyopenssl.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does conn-check version less then 1.0.18 have ### Response: Having vulnarability PVE-2021-25669 Advisory: conn-check 1.0.18 ensures pyOpenSSL is always used instead of the ssl modules, see https://urllib3.readthedocs.org/en/latest/security.htmlpyopenssl." }, { "instruction": "what vulnarability does connect-openapi-client version less then 25.4 have", "input": "", "output": "Having vulnarability CVE-2021-41945 Advisory: Connect-openapi-client 25.4 updates its dependency 'httpx' to version '0.23.0' to include a security fix.\r\nhttps://github.com/cloudblue/connect-python-openapi-client/commit/42595a51a66f1c4832d8f38fbcdca201a0bfded2\r\nhttps://github.com/advisories/==GHSA==-h8pj-cxx2-jfg2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does connect-openapi-client version less then 25.4 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Connect-openapi-client 25.4 updates its dependency 'httpx' to version '0.23.0' to include a security fix.\r\nhttps://github.com/cloudblue/connect-python-openapi-client/commit/42595a51a66f1c4832d8f38fbcdca201a0bfded2\r\nhttps://github.com/advisories/==GHSA==-h8pj-cxx2-jfg2" }, { "instruction": "what vulnarability does connect-sdk-python2 version less then 3.33.0 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Connect-sdk-python2 3.33.0 updates the minimum 'requests' version from 2.20.0 to 2.25.0, as earlier versions depend on a vulnerable 'urllib3' version.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does connect-sdk-python2 version less then 3.33.0 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Connect-sdk-python2 3.33.0 updates the minimum 'requests' version from 2.20.0 to 2.25.0, as earlier versions depend on a vulnerable 'urllib3' version." }, { "instruction": "what vulnarability does connect-sdk-python3 version less then 3.33.0 have", "input": "", "output": "Having vulnarability CVE-2019-11324 Advisory: Connect-sdk-python3 3.33.0 updates the minimum 'requests' version from 2.20.0 to 2.25.0, as earlier versions depend on a vulnerable 'urllib3' version.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does connect-sdk-python3 version less then 3.33.0 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Connect-sdk-python3 3.33.0 updates the minimum 'requests' version from 2.20.0 to 2.25.0, as earlier versions depend on a vulnerable 'urllib3' version." }, { "instruction": "what vulnarability does connexion version less then 3.0 have", "input": "", "output": "Having vulnarability CVE-2021-41945 Advisory: Connexion 3.0 updates its dependency 'httpx' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does connexion version less then 3.0 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Connexion 3.0 updates its dependency 'httpx' to include a security fix." }, { "instruction": "what vulnarability does consoleme version less then 1.2.2 have", "input": "", "output": "Having vulnarability CVE-2022-27177 Advisory: Consoleme 1.2.2 includes a fix for CVE-2022-27177: A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2.\r\nhttps://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2022-001.md", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does consoleme version less then 1.2.2 have ### Response: Having vulnarability CVE-2022-27177 Advisory: Consoleme 1.2.2 includes a fix for CVE-2022-27177: A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2.\r\nhttps://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2022-001.md" }, { "instruction": "what vulnarability does container-service-extension version less then 1.2.5 have", "input": "", "output": "Having vulnarability CVE-2018-1002105 Advisory: Container-service-extension 1.2.5 updates kubernetes packages and docker images for both Ubuntu and Photon OS templates to include a security fix.\r\nhttps://github.com/vmware/container-service-extension/commit/d4e6bf2d546a622d9fc20deb919b20a29264e071", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does container-service-extension version less then 1.2.5 have ### Response: Having vulnarability CVE-2018-1002105 Advisory: Container-service-extension 1.2.5 updates kubernetes packages and docker images for both Ubuntu and Photon OS templates to include a security fix.\r\nhttps://github.com/vmware/container-service-extension/commit/d4e6bf2d546a622d9fc20deb919b20a29264e071" }, { "instruction": "what vulnarability does contentful version less then 1.11.3 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Contentful 1.11.3 updates 'requests' version due to a vulnerability found in versions '2.19' and below.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does contentful version less then 1.11.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Contentful 1.11.3 updates 'requests' version due to a vulnerability found in versions '2.19' and below." }, { "instruction": "what vulnarability does contentful-management version less then 2.5.0 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Contentful-management 2.5.0 updates 'requests' version due to a vulnerability found in previous versions.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does contentful-management version less then 2.5.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Contentful-management 2.5.0 updates 'requests' version due to a vulnerability found in previous versions." }, { "instruction": "what vulnarability does contestms version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-34249 Advisory: contestms 1.2.0 fixes several security bugs around an unsafe use of isolate. These won't be backported to 1.1, so make sure you update.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does contestms version less then 1.2.0 have ### Response: Having vulnarability PVE-2021-34249 Advisory: contestms 1.2.0 fixes several security bugs around an unsafe use of isolate. These won't be backported to 1.1, so make sure you update." }, { "instruction": "what vulnarability does cookie-manager version less then 1.0.3 have", "input": "", "output": "Having vulnarability CVE-2020-6816 Advisory: Cookie-manager 1.0.3 updates its dependency 'bleach' to v3.1.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cookie-manager version less then 1.0.3 have ### Response: Having vulnarability CVE-2020-6816 Advisory: Cookie-manager 1.0.3 updates its dependency 'bleach' to v3.1.2 to include a security fix." }, { "instruction": "what vulnarability does cookiecutter version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-37672 Advisory: Cookiecutter 1.1.0 sets explicitly the list of allowed hosts for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cookiecutter version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-37672 Advisory: Cookiecutter 1.1.0 sets explicitly the list of allowed hosts for security reasons." }, { "instruction": "what vulnarability does coordination-network-toolkit version less then 1.0.2 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Coordination-network-toolkit 1.0.2 updates its dependency 'urllib3' to v1.26.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does coordination-network-toolkit version less then 1.0.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Coordination-network-toolkit 1.0.2 updates its dependency 'urllib3' to v1.26.5 to include a security fix." }, { "instruction": "what vulnarability does copy-spotter version less then 0.0.1 have", "input": "", "output": "Having vulnarability CVE-2024-21503 Advisory: Copy-spotter version 0.0.1 updates the Black library from version 23.11.0 to 24.3.0 to address the security vulnerabilities identified in CVE-2024-21503.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does copy-spotter version less then 0.0.1 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Copy-spotter version 0.0.1 updates the Black library from version 23.11.0 to 24.3.0 to address the security vulnerabilities identified in CVE-2024-21503." }, { "instruction": "what vulnarability does copyparty version less then 0.11.31 have", "input": "", "output": "Having vulnarability PVE-2023-59586 Advisory: Copyparty 0.11.31 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/9001/copyparty/commit/a5120d4f6fe4afe91eb0e091063de6b9ba9e81e1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does copyparty version less then 0.11.31 have ### Response: Having vulnarability PVE-2023-59586 Advisory: Copyparty 0.11.31 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/9001/copyparty/commit/a5120d4f6fe4afe91eb0e091063de6b9ba9e81e1" }, { "instruction": "what vulnarability does cornflow version less then 1.0.5 have", "input": "", "output": "Having vulnarability CVE-2023-30861 Advisory: Cornflow 1.0.5 updates its dependency 'flask' to v2.3.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cornflow version less then 1.0.5 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Cornflow 1.0.5 updates its dependency 'flask' to v2.3.2 to include a security fix." }, { "instruction": "what vulnarability does cortex version less then 0.32.0 have", "input": "", "output": "Having vulnarability PVE-2021-40128 Advisory: cortex before 0.32.0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cortex version less then 0.32.0 have ### Response: Having vulnarability PVE-2021-40128 Advisory: cortex before 0.32.0" }, { "instruction": "what vulnarability does cos-alerter version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2023-62563 Advisory: Cos-alerter 0.6.0 includes a fix for a potential cross-site scripting vulnerability.\r\nhttps://github.com/canonical/cos-alerter/commit/63c09cf14942ea2b4275a645a2297725a1a6bddc", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cos-alerter version less then 0.6.0 have ### Response: Having vulnarability PVE-2023-62563 Advisory: Cos-alerter 0.6.0 includes a fix for a potential cross-site scripting vulnerability.\r\nhttps://github.com/canonical/cos-alerter/commit/63c09cf14942ea2b4275a645a2297725a1a6bddc" }, { "instruction": "what vulnarability does cosmos-wfm version less then 2.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-34181 Advisory: cosmos-wfm before 2.1.1 is vulnerable to an attack where malicious hackers can run arbitrary code if they have file system (even external mounts!)+network access on the machine running luigid (executed by the user that you run luigid with).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cosmos-wfm version less then 2.1.1 have ### Response: Having vulnarability PVE-2021-34181 Advisory: cosmos-wfm before 2.1.1 is vulnerable to an attack where malicious hackers can run arbitrary code if they have file system (even external mounts!)+network access on the machine running luigid (executed by the user that you run luigid with)." }, { "instruction": "what vulnarability does cova version less then 0.7.4 have", "input": "", "output": "Having vulnarability CVE-2021-42343 Advisory: Cova 0.7.4 updates its dependency 'dask' to v2021.10.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cova version less then 0.7.4 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Cova 0.7.4 updates its dependency 'dask' to v2021.10.0 to include a security fix." }, { "instruction": "what vulnarability does covalent version less then 0.7.4 have", "input": "", "output": "Having vulnarability CVE-2021-42343 Advisory: Covalent 0.7.4 updates its dependency 'dask' to v2021.10.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does covalent version less then 0.7.4 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Covalent 0.7.4 updates its dependency 'dask' to v2021.10.0 to include a security fix." }, { "instruction": "what vulnarability does covalent-ec2-plugin version less then 0.8.1 have", "input": "", "output": "Having vulnarability PVE-2023-61341 Advisory: Covalent-ec2-plugin 0.8.1 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/AgnostiqHQ/covalent-ec2-plugin/pull/30", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does covalent-ec2-plugin version less then 0.8.1 have ### Response: Having vulnarability PVE-2023-61341 Advisory: Covalent-ec2-plugin 0.8.1 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/AgnostiqHQ/covalent-ec2-plugin/pull/30" }, { "instruction": "what vulnarability does coveralls version less then 0.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-25671 Advisory: coveralls 0.1.1 removes repo_token from verbose output for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does coveralls version less then 0.1.1 have ### Response: Having vulnarability PVE-2021-25671 Advisory: coveralls 0.1.1 removes repo_token from verbose output for security reasons." }, { "instruction": "what vulnarability does covert version less then 0.2.1 have", "input": "", "output": "Having vulnarability PVE-2021-42679 Advisory: Covert 0.2.1 ensures that all authentication tokens are unique, also for repeated public keys.\r\nhttps://github.com/covert-encryption/covert/commit/1a40aa80bb9f0401e2eb59d93df5e531c4ec1623", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does covert version less then 0.2.1 have ### Response: Having vulnarability PVE-2021-42679 Advisory: Covert 0.2.1 ensures that all authentication tokens are unique, also for repeated public keys.\r\nhttps://github.com/covert-encryption/covert/commit/1a40aa80bb9f0401e2eb59d93df5e531c4ec1623" }, { "instruction": "what vulnarability does cplay-ng version less then 1.50 have", "input": "", "output": "Having vulnarability PVE-2021-25672 Advisory: cplay-ng 1.50 fixes insecure /tmp handling.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cplay-ng version less then 1.50 have ### Response: Having vulnarability PVE-2021-25672 Advisory: cplay-ng 1.50 fixes insecure /tmp handling." }, { "instruction": "what vulnarability does crate-docs-theme version less then 0.13.0 have", "input": "", "output": "Having vulnarability CVE-2012-6708 Advisory: Crate-docs-theme 0.13.0 updates its NPM dependency 'jquery' to v3.5.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does crate-docs-theme version less then 0.13.0 have ### Response: Having vulnarability CVE-2012-6708 Advisory: Crate-docs-theme 0.13.0 updates its NPM dependency 'jquery' to v3.5.1 to include security fixes." }, { "instruction": "what vulnarability does creavel version less then 0.11.0 have", "input": "", "output": "Having vulnarability PVE-2021-25673 Advisory: Creavel 0.11.0 prevents XSS on FAB list views.\r\nhttps://github.com/apache/superset/commit/b62d7e3e8eaa80e201af3141fb4fe26c39e1ff79", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does creavel version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-25673 Advisory: Creavel 0.11.0 prevents XSS on FAB list views.\r\nhttps://github.com/apache/superset/commit/b62d7e3e8eaa80e201af3141fb4fe26c39e1ff79" }, { "instruction": "what vulnarability does credstash version less then 1.16.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Credstash 1.16.0 updates its dependency pyyaml to a version >=4.2b1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does credstash version less then 1.16.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Credstash 1.16.0 updates its dependency pyyaml to a version >=4.2b1 to include a security fix." }, { "instruction": "what vulnarability does creopyson version less then 0.4.2 have", "input": "", "output": "Having vulnarability PVE-2021-37964 Advisory: Creopyson 0.4.2 modifies the pipenv config for the bleach security alert.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does creopyson version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-37964 Advisory: Creopyson 0.4.2 modifies the pipenv config for the bleach security alert." }, { "instruction": "what vulnarability does crmsh version less then equal to 4.2.1 have", "input": "", "output": "Having vulnarability CVE-2020-35459 Advisory: An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call \"crm history\" (when \"crm\" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does crmsh version less then equal to 4.2.1 have ### Response: Having vulnarability CVE-2020-35459 Advisory: An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call \"crm history\" (when \"crm\" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges." }, { "instruction": "what vulnarability does cromwell-tools version less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Cromwell-tools 1.0.0 updates requests to v2.20.0 to avoid security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cromwell-tools version less then 1.0.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Cromwell-tools 1.0.0 updates requests to v2.20.0 to avoid security issues." }, { "instruction": "what vulnarability does crossbar version less then 0.15.0 have", "input": "", "output": "Having vulnarability PVE-2021-25675 Advisory: In crossbar before 0.15.0 if the `allowedOrigins` websocket option was set, the resulting matching was insufficient and would allow more origins than intended.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does crossbar version less then 0.15.0 have ### Response: Having vulnarability PVE-2021-25675 Advisory: In crossbar before 0.15.0 if the `allowedOrigins` websocket option was set, the resulting matching was insufficient and would allow more origins than intended." }, { "instruction": "what vulnarability does croud version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Croud 0.3.0 includes a fix for CVE-2017-18342, an arbitrary code execution vulnerability in yaml.load().\r\nhttps://github.com/crate/croud/commit/821f2ba47285f5b5ad3e2e2782c44f867da931ee", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does croud version less then 0.3.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Croud 0.3.0 includes a fix for CVE-2017-18342, an arbitrary code execution vulnerability in yaml.load().\r\nhttps://github.com/crate/croud/commit/821f2ba47285f5b5ad3e2e2782c44f867da931ee" }, { "instruction": "what vulnarability does crpytography version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51739 Advisory: Crpytography is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does crpytography version greather then 0 have ### Response: Having vulnarability PVE-2022-51739 Advisory: Crpytography is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does crypt version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2021-34981 Advisory: crypt is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does crypt version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34981 Advisory: crypt is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/" }, { "instruction": "what vulnarability does cryptacular version less then 1.2 have", "input": "", "output": "Having vulnarability CVE-2011-2483 Advisory: crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cryptacular version less then 1.2 have ### Response: Having vulnarability CVE-2011-2483 Advisory: crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash." }, { "instruction": "what vulnarability does cryptice version less then 2.0 have", "input": "", "output": "Having vulnarability PVE-2022-43753 Advisory: Cryptice 2.0 improves user data validation to avoid security issues.\r\nhttps://github.com/RenardDev/CryptICE/commit/2a8627747ab1a180e1466a21cf2fb6a9f665489a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cryptice version less then 2.0 have ### Response: Having vulnarability PVE-2022-43753 Advisory: Cryptice 2.0 improves user data validation to avoid security issues.\r\nhttps://github.com/RenardDev/CryptICE/commit/2a8627747ab1a180e1466a21cf2fb6a9f665489a" }, { "instruction": "what vulnarability does crypto-candlesticks version less then 0.1.5 have", "input": "", "output": "Having vulnarability CVE-2020-28493 Advisory: Crypto-candlesticks 0.1.5 updates its dependency 'jinja2' to v2.11.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does crypto-candlesticks version less then 0.1.5 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Crypto-candlesticks 0.1.5 updates its dependency 'jinja2' to v2.11.3 to include a security fix." }, { "instruction": "what vulnarability does cryptoadvance.specter version less then 0.5.0 have", "input": "", "output": "Having vulnarability CVE-2020-14199 Advisory: Cryptoadvance.specter 0.5.0 updates its dependency 'hwi' to v1.1.2 to include a security fix.\r\nhttps://github.com/cryptoadvance/specter-desktop/pull/178\r\nhttps://github.com/cryptoadvance/specter-desktop/issues/150", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cryptoadvance.specter version less then 0.5.0 have ### Response: Having vulnarability CVE-2020-14199 Advisory: Cryptoadvance.specter 0.5.0 updates its dependency 'hwi' to v1.1.2 to include a security fix.\r\nhttps://github.com/cryptoadvance/specter-desktop/pull/178\r\nhttps://github.com/cryptoadvance/specter-desktop/issues/150" }, { "instruction": "what vulnarability does cryptoasset-data-downloader version greather then equal to 1.0.0,less then 1.0.2 have", "input": "", "output": "Having vulnarability CVE-2022-32998 Advisory: The cryptoasset-data-downloader package in PyPI v1.0.0 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cryptoasset-data-downloader version greather then equal to 1.0.0,less then 1.0.2 have ### Response: Having vulnarability CVE-2022-32998 Advisory: The cryptoasset-data-downloader package in PyPI v1.0.0 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does cryptoauthlib version greather then equal to 0,less then 20200728 have", "input": "", "output": "Having vulnarability PVE-2024-99808 Advisory: cryptoauthlib before 3.2.3 (20200912) is susceptible to a Denial of Service (DoS) attack due to buffer and stack overflow vulnerabilities. These vulnerabilities originate from the deprecated USB kit enumeration feature, where an attacker can impersonate a device and send malformed packets of arbitrary length, leading the protocol stack to write these packets to the stack, potentially causing a system crash or service disruption. DoS attacks, including this, aim to make the system unavailable to legitimate users, without necessarily breaching security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cryptoauthlib version greather then equal to 0,less then 20200728 have ### Response: Having vulnarability PVE-2024-99808 Advisory: cryptoauthlib before 3.2.3 (20200912) is susceptible to a Denial of Service (DoS) attack due to buffer and stack overflow vulnerabilities. These vulnerabilities originate from the deprecated USB kit enumeration feature, where an attacker can impersonate a device and send malformed packets of arbitrary length, leading the protocol stack to write these packets to the stack, potentially causing a system crash or service disruption. DoS attacks, including this, aim to make the system unavailable to legitimate users, without necessarily breaching security." }, { "instruction": "what vulnarability does cryptofeed version less then 2.2.3 have", "input": "", "output": "Having vulnarability PVE-2024-63280 Advisory: Cryptofeed 2.2.3 mitigates a race condition that had the potential to introduce security vulnerabilities. Specifically, this issue arose during the resetting of feeds with multiple connections, leading to potential unauthorized access or data corruption.\r\nhttps://github.com/bmoscon/cryptofeed/pull/851\r\nhttps://github.com/bmoscon/cryptofeed/commit/d6ce63b9a392b42e4ea936007e82da94f7566401", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cryptofeed version less then 2.2.3 have ### Response: Having vulnarability PVE-2024-63280 Advisory: Cryptofeed 2.2.3 mitigates a race condition that had the potential to introduce security vulnerabilities. Specifically, this issue arose during the resetting of feeds with multiple connections, leading to potential unauthorized access or data corruption.\r\nhttps://github.com/bmoscon/cryptofeed/pull/851\r\nhttps://github.com/bmoscon/cryptofeed/commit/d6ce63b9a392b42e4ea936007e82da94f7566401" }, { "instruction": "what vulnarability does cryptography version less then 0.9.1 have", "input": "", "output": "Having vulnarability PVE-2021-25678 Advisory: Cryptography 0.9.1 fixes a double free in the OpenSSL backend when using DSA to verify signatures.\r\nhttps://github.com/pyca/cryptography/pull/2013", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cryptography version less then 0.9.1 have ### Response: Having vulnarability PVE-2021-25678 Advisory: Cryptography 0.9.1 fixes a double free in the OpenSSL backend when using DSA to verify signatures.\r\nhttps://github.com/pyca/cryptography/pull/2013" }, { "instruction": "what vulnarability does cryptograpyh version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51738 Advisory: Cryptograpyh is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cryptograpyh version greather then 0 have ### Response: Having vulnarability PVE-2022-51738 Advisory: Cryptograpyh is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does crytic-compile version less then 0.3.2 have", "input": "", "output": "Having vulnarability PVE-2023-59180 Advisory: Crytic-compile 0.3.2 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/crytic/crytic-compile/pull/425", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does crytic-compile version less then 0.3.2 have ### Response: Having vulnarability PVE-2023-59180 Advisory: Crytic-compile 0.3.2 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/crytic/crytic-compile/pull/425" }, { "instruction": "what vulnarability does cslbot version less then 0.18 have", "input": "", "output": "Having vulnarability PVE-2021-34354 Advisory: Cslbot 0.18 fixes a possible path traversal vulnerability if logs were generated for a channel name such as foo../../../bar.\r\nhttps://github.com/tjcsl/cslbot/commit/408be8bca294e2949cc4e39c549081044904f34a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cslbot version less then 0.18 have ### Response: Having vulnarability PVE-2021-34354 Advisory: Cslbot 0.18 fixes a possible path traversal vulnerability if logs were generated for a channel name such as foo../../../bar.\r\nhttps://github.com/tjcsl/cslbot/commit/408be8bca294e2949cc4e39c549081044904f34a" }, { "instruction": "what vulnarability does cssutils version less then 0.9.6a2 have", "input": "", "output": "Having vulnarability PVE-2021-25684 Advisory: Cssutils 0.9.6a2 uses only the import rules' href and not the absolute href of the referenced sheets for comments added by 'cssutils.resolveImports'. Prior behavior may have been a security hole when showing a full local path to a sheet in a combined but not minified sheet.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cssutils version less then 0.9.6a2 have ### Response: Having vulnarability PVE-2021-25684 Advisory: Cssutils 0.9.6a2 uses only the import rules' href and not the absolute href of the referenced sheets for comments added by 'cssutils.resolveImports'. Prior behavior may have been a security hole when showing a full local path to a sheet in a combined but not minified sheet." }, { "instruction": "what vulnarability does cstar version less then 0.5.0 have", "input": "", "output": "Having vulnarability PVE-2021-39224 Advisory: Cstar 0.5.0 fixes a security problem in a dependency (spotify). See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cstar version less then 0.5.0 have ### Response: Having vulnarability PVE-2021-39224 Advisory: Cstar 0.5.0 fixes a security problem in a dependency (spotify). See: ." }, { "instruction": "what vulnarability does csv-parakeet version less then 1.0.1 have", "input": "", "output": "Having vulnarability PVE-2023-58772 Advisory: Csv-parakeet 1.0.1 updates its dependency 'requests' to v2.31.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does csv-parakeet version less then 1.0.1 have ### Response: Having vulnarability PVE-2023-58772 Advisory: Csv-parakeet 1.0.1 updates its dependency 'requests' to v2.31.0 to include a security fix." }, { "instruction": "what vulnarability does ctx version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-48996 Advisory: Ctx has been hijacked and replaced with malicious code that sends all your environment variables to a URL.\r\nhttps://www.reddit.com/r/Python/comments/uwhzkj/i_think_the_ctx_package_on_pypi_has_been_hacked\r\nhttps://github.com/advisories/GHSA-4g82-3jcr-q52w", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ctx version greather then 0 have ### Response: Having vulnarability PVE-2022-48996 Advisory: Ctx has been hijacked and replaced with malicious code that sends all your environment variables to a URL.\r\nhttps://www.reddit.com/r/Python/comments/uwhzkj/i_think_the_ctx_package_on_pypi_has_been_hacked\r\nhttps://github.com/advisories/GHSA-4g82-3jcr-q52w" }, { "instruction": "what vulnarability does cumulusci version less then 3.67.0 have", "input": "", "output": "Having vulnarability PVE-2022-52125 Advisory: Cumulusci 3.67.0 uses 'defusedxml' to prevent XXE vulnerabilities.\r\nhttps://github.com/SFDO-Tooling/CumulusCI/pull/3375", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cumulusci version less then 3.67.0 have ### Response: Having vulnarability PVE-2022-52125 Advisory: Cumulusci 3.67.0 uses 'defusedxml' to prevent XXE vulnerabilities.\r\nhttps://github.com/SFDO-Tooling/CumulusCI/pull/3375" }, { "instruction": "what vulnarability does cupy version less then 12.3.0 have", "input": "", "output": "Having vulnarability PVE-2024-64284 Advisory: Cupy 12.3.0 fixes a race condition in the function csr2dense. It occurred during the conversion of Compressed Sparse Row (CSR) matrices to dense matrices in multithreaded environments.\r\nhttps://github.com/cupy/cupy/pull/7724/commits/734dc0e1a3e9af928f622b80f16148f8c47393ea", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cupy version less then 12.3.0 have ### Response: Having vulnarability PVE-2024-64284 Advisory: Cupy 12.3.0 fixes a race condition in the function csr2dense. It occurred during the conversion of Compressed Sparse Row (CSR) matrices to dense matrices in multithreaded environments.\r\nhttps://github.com/cupy/cupy/pull/7724/commits/734dc0e1a3e9af928f622b80f16148f8c47393ea" }, { "instruction": "what vulnarability does curl-cffi version less then equal to 0.5.10b4 have", "input": "", "output": "Having vulnarability CVE-2023-38545 Advisory: Curl-cffi 0.5.10b4 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does curl-cffi version less then equal to 0.5.10b4 have ### Response: Having vulnarability CVE-2023-38545 Advisory: Curl-cffi 0.5.10b4 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability." }, { "instruction": "what vulnarability does curlapi version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51697 Advisory: Curlapi is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does curlapi version greather then 0 have ### Response: Having vulnarability PVE-2022-51697 Advisory: Curlapi is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does curses-menu version less then 0.6.8 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Curses-menu 0.6.8 updates its dependency 'certifi' to v2022.12.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does curses-menu version less then 0.6.8 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Curses-menu 0.6.8 updates its dependency 'certifi' to v2022.12.7 to include a security fix." }, { "instruction": "what vulnarability does curved version less then 0.1.2 have", "input": "", "output": "Having vulnarability CVE-2022-23639 Advisory: Curved 0.1.2 updates its Rust dependency 'crossbeam-utils' to v0.8.11 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does curved version less then 0.1.2 have ### Response: Having vulnarability CVE-2022-23639 Advisory: Curved 0.1.2 updates its Rust dependency 'crossbeam-utils' to v0.8.11 to include a security fix." }, { "instruction": "what vulnarability does custom-e-celery version equal to 4.0.2 have", "input": "", "output": "Having vulnarability CVE-2021-23727 Advisory: Custom-e-celery 4.0.2 (fork of Celery) is affected by CVE-2021-23727.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does custom-e-celery version equal to 4.0.2 have ### Response: Having vulnarability CVE-2021-23727 Advisory: Custom-e-celery 4.0.2 (fork of Celery) is affected by CVE-2021-23727." }, { "instruction": "what vulnarability does cutty version less then 0.14.0 have", "input": "", "output": "Having vulnarability CVE-2021-42771 Advisory: Cutty 0.14.0 updates its dependency 'babel' to v2.9.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cutty version less then 0.14.0 have ### Response: Having vulnarability CVE-2021-42771 Advisory: Cutty 0.14.0 updates its dependency 'babel' to v2.9.1 to include a security fix." }, { "instruction": "what vulnarability does cve-bin-tool version less then 3.3rc3 have", "input": "", "output": "Having vulnarability CVE-2023-44271 Advisory: Cve-bin-tool version 3.3rc3 updates its Pillow dependency to version 10.0.1 from 9.5.0 to address the security vulnerability outlined in CVE-2023-44271.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cve-bin-tool version less then 3.3rc3 have ### Response: Having vulnarability CVE-2023-44271 Advisory: Cve-bin-tool version 3.3rc3 updates its Pillow dependency to version 10.0.1 from 9.5.0 to address the security vulnerability outlined in CVE-2023-44271." }, { "instruction": "what vulnarability does cve-py version less then 1.2.1 have", "input": "", "output": "Having vulnarability PVE-2023-58811 Advisory: Cve-py 1.2.1 includes a fix for a XXE vulnerability.\r\nhttps://github.com/Pavel-Sushko/cve-py/pull/13", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cve-py version less then 1.2.1 have ### Response: Having vulnarability PVE-2023-58811 Advisory: Cve-py 1.2.1 includes a fix for a XXE vulnerability.\r\nhttps://github.com/Pavel-Sushko/cve-py/pull/13" }, { "instruction": "what vulnarability does cvrf2csaf version greather then equal to 0,less then 1.0.0rc2 have", "input": "", "output": "Having vulnarability CVE-2022-27193 Advisory: CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cvrf2csaf version greather then equal to 0,less then 1.0.0rc2 have ### Response: Having vulnarability CVE-2022-27193 Advisory: CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter." }, { "instruction": "what vulnarability does cvxopt version greather then equal to 0,less then 1.2.7 have", "input": "", "output": "Having vulnarability CVE-2021-41500 Advisory: Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cvxopt version greather then equal to 0,less then 1.2.7 have ### Response: Having vulnarability CVE-2021-41500 Advisory: Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects." }, { "instruction": "what vulnarability does cwltool version less then 3.1.20230906142556 have", "input": "", "output": "Having vulnarability PVE-2023-61006 Advisory: Cwltool 3.1.20230906142556 includes a fix for a race condition.\r\nhttps://github.com/common-workflow-language/cwltool/pull/1890", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cwltool version less then 3.1.20230906142556 have ### Response: Having vulnarability PVE-2023-61006 Advisory: Cwltool 3.1.20230906142556 includes a fix for a race condition.\r\nhttps://github.com/common-workflow-language/cwltool/pull/1890" }, { "instruction": "what vulnarability does cycode version less then 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2022-24439 Advisory: Cycode 0.2.0 updates its dependency 'gitpython' to v3.1.30 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cycode version less then 0.2.0 have ### Response: Having vulnarability CVE-2022-24439 Advisory: Cycode 0.2.0 updates its dependency 'gitpython' to v3.1.30 to include a security fix." }, { "instruction": "what vulnarability does cylc-uiserver version less then 1.4.0 have", "input": "", "output": "Having vulnarability CVE-2023-39968 Advisory: The Cylc-UIServer version 1.4.0 has implemented an upgrade to its dependency, Jupyter-Server, in response to the identification of vulnerability CVE-2023-39968.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cylc-uiserver version less then 1.4.0 have ### Response: Having vulnarability CVE-2023-39968 Advisory: The Cylc-UIServer version 1.4.0 has implemented an upgrade to its dependency, Jupyter-Server, in response to the identification of vulnerability CVE-2023-39968." }, { "instruction": "what vulnarability does cypress version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51689 Advisory: Cypress is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cypress version greather then 0 have ### Response: Having vulnarability PVE-2022-51689 Advisory: Cypress is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does cytools version less then 0.1.0 have", "input": "", "output": "Having vulnarability PVE-2022-51565 Advisory: Cytools 0.1.0 changes permissions of Docker image for better security.\r\nhttps://github.com/LiamMcAllisterGroup/cytools/commit/12262a4f43cb8e35a7265597a8757e96443d5631", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cytools version less then 0.1.0 have ### Response: Having vulnarability PVE-2022-51565 Advisory: Cytools 0.1.0 changes permissions of Docker image for better security.\r\nhttps://github.com/LiamMcAllisterGroup/cytools/commit/12262a4f43cb8e35a7265597a8757e96443d5631" }, { "instruction": "what vulnarability does cyvcf2 version less then equal to 0.30.22 have", "input": "", "output": "Having vulnarability CVE-2023-38545 Advisory: Cyvcf2 0.30.22 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does cyvcf2 version less then equal to 0.30.22 have ### Response: Having vulnarability CVE-2023-38545 Advisory: Cyvcf2 0.30.22 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability." }, { "instruction": "what vulnarability does d8s-algorithms version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-42040 Advisory: D8s-algorithms 0.1.0 is vulnerable to CVE-2022-42040: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-dicts package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-algorithms version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-42040 Advisory: D8s-algorithms 0.1.0 is vulnerable to CVE-2022-42040: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-dicts package." }, { "instruction": "what vulnarability does d8s-archives version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-38881 Advisory: D8s-archives 0.1.0 is vulnerable to CVE-2022-38881: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-archives version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-38881 Advisory: D8s-archives 0.1.0 is vulnerable to CVE-2022-38881: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package." }, { "instruction": "what vulnarability does d8s-asns version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40426 Advisory: D8s-asns 0.1.0 is vulnerable to CVE-2022-40426: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-asns version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40426 Advisory: D8s-asns 0.1.0 is vulnerable to CVE-2022-40426: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package." }, { "instruction": "what vulnarability does d8s-dates version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40808 Advisory: D8s-dates 0.1.0 is vulnerable to CVE-2022-40808: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-dates version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40808 Advisory: D8s-dates 0.1.0 is vulnerable to CVE-2022-40808: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package." }, { "instruction": "what vulnarability does d8s-dicts version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40809 Advisory: D8s-dicts 0.1.0 is vulnerable to CVE-2022-40809: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-dicts version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40809 Advisory: D8s-dicts 0.1.0 is vulnerable to CVE-2022-40809: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package." }, { "instruction": "what vulnarability does d8s-domains version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40427 Advisory: D8s-domains 0.1.0 is vulnerable to CVE-2022-40427: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-domains version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40427 Advisory: D8s-domains 0.1.0 is vulnerable to CVE-2022-40427: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package." }, { "instruction": "what vulnarability does d8s-file-system version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-42041 Advisory: D8s-file-system 0.1.0 is vulnerable to CVE-2022-42041: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hashes package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-file-system version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-42041 Advisory: D8s-file-system 0.1.0 is vulnerable to CVE-2022-42041: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hashes package." }, { "instruction": "what vulnarability does d8s-grammars version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-38884 Advisory: D8s-grammars 0.1.0 is vulnerable to CVE-2022-38884: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-grammars version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-38884 Advisory: D8s-grammars 0.1.0 is vulnerable to CVE-2022-38884: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package." }, { "instruction": "what vulnarability does d8s-html version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40425 Advisory: D8s-html 0.1.0 is vulnerable to CVE-2022-40425: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-html version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40425 Advisory: D8s-html 0.1.0 is vulnerable to CVE-2022-40425: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package." }, { "instruction": "what vulnarability does d8s-ip-addresses version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40429 Advisory: D8s-ip-addresses 0.1.0 is vulnerable to CVE-2022-40429: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-ip-addresses version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40429 Advisory: D8s-ip-addresses 0.1.0 is vulnerable to CVE-2022-40429: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package." }, { "instruction": "what vulnarability does d8s-json version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-38882 Advisory: D8s-json 0.1.0 is vulnerable to CVE-2022-38882: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-json version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-38882 Advisory: D8s-json 0.1.0 is vulnerable to CVE-2022-38882: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package." }, { "instruction": "what vulnarability does d8s-lists version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-42039 Advisory: D8s-lists 0.1.0 is vulnerable to CVE-2022-42039: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-dicts package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-lists version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-42039 Advisory: D8s-lists 0.1.0 is vulnerable to CVE-2022-42039: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-dicts package." }, { "instruction": "what vulnarability does d8s-math version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-38883 Advisory: D8s-math 0.1.0 is vulnerable to CVE-2022-38883: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-math version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-38883 Advisory: D8s-math 0.1.0 is vulnerable to CVE-2022-38883: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package." }, { "instruction": "what vulnarability does d8s-mpeg version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40428 Advisory: D8s-mpeg 0.1.0 is vulnerable to CVE-2022-40428: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-mpeg version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40428 Advisory: D8s-mpeg 0.1.0 is vulnerable to CVE-2022-40428: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package." }, { "instruction": "what vulnarability does d8s-netstrings version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-38885 Advisory: D8s-netstrings 0.1.0 is vulnerable to CVE-2022-38885: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-netstrings version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-38885 Advisory: D8s-netstrings 0.1.0 is vulnerable to CVE-2022-38885: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package." }, { "instruction": "what vulnarability does d8s-networking version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-44050 Advisory: D8s-networking 0.1.0 includes a potential code-execution backdoor inserted by a third party: the democritus-json package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-networking version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-44050 Advisory: D8s-networking 0.1.0 includes a potential code-execution backdoor inserted by a third party: the democritus-json package." }, { "instruction": "what vulnarability does d8s-pdfs version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40431 Advisory: D8s-pdfs 0.1.0 is vulnerable to CVE-2022-40431: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-pdfs version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40431 Advisory: D8s-pdfs 0.1.0 is vulnerable to CVE-2022-40431: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package." }, { "instruction": "what vulnarability does d8s-python version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-38887 Advisory: D8s-python 0.1.0 is vulnerable to CVE-2022-38887: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-python version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-38887 Advisory: D8s-python 0.1.0 is vulnerable to CVE-2022-38887: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package." }, { "instruction": "what vulnarability does d8s-stats version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-44051 Advisory: D8s-stats 0.1.0 includes a potential code-execution backdoor inserted by a third party: the democritus-math package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-stats version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-44051 Advisory: D8s-stats 0.1.0 includes a potential code-execution backdoor inserted by a third party: the democritus-math package." }, { "instruction": "what vulnarability does d8s-strings version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40432 Advisory: D8s-strings 0.1.0 is vulnerable to CVE-2022-40432: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-strings version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40432 Advisory: D8s-strings 0.1.0 is vulnerable to CVE-2022-40432: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package." }, { "instruction": "what vulnarability does d8s-timer version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-43304 Advisory: D8s-timer 0.1.0 includes a potential code-execution backdoor inserted by a third party: the democritus-uuids package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-timer version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-43304 Advisory: D8s-timer 0.1.0 includes a potential code-execution backdoor inserted by a third party: the democritus-uuids package." }, { "instruction": "what vulnarability does d8s-urls version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40811 Advisory: D8s-urls 0.1.0 is vulnerable to CVE-2022-40811: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-urls version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40811 Advisory: D8s-urls 0.1.0 is vulnerable to CVE-2022-40811: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package." }, { "instruction": "what vulnarability does d8s-utility version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-41386 Advisory: D8s-utility 0.1.0 is vulnerable to CVE-2022-41386: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-utility version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-41386 Advisory: D8s-utility 0.1.0 is vulnerable to CVE-2022-41386: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package." }, { "instruction": "what vulnarability does d8s-uuids version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-40806 Advisory: D8s-uuids 0.1.0 is vulnerable to CVE-2022-40806: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-uuids version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-40806 Advisory: D8s-uuids 0.1.0 is vulnerable to CVE-2022-40806: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package." }, { "instruction": "what vulnarability does d8s-xml version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-38886 Advisory: D8s-xml 0.1.0 is vulnerable to CVE-2022-38886: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-xml version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-38886 Advisory: D8s-xml 0.1.0 is vulnerable to CVE-2022-38886: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package." }, { "instruction": "what vulnarability does d8s-yaml version equal to 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-41380 Advisory: D8s-yaml 0.1.0 is vulnerable to CVE-2022-41380: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does d8s-yaml version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-41380 Advisory: D8s-yaml 0.1.0 is vulnerable to CVE-2022-41380: It included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package." }, { "instruction": "what vulnarability does dact version less then 1.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-39403 Advisory: Dact 1.1.1 includes a few security patches.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dact version less then 1.1.1 have ### Response: Having vulnarability PVE-2021-39403 Advisory: Dact 1.1.1 includes a few security patches." }, { "instruction": "what vulnarability does dagster version less then 0.14.15 have", "input": "", "output": "Having vulnarability PVE-2022-48543 Advisory: Dagster 0.14.15 defaults to use more security headers that prevent XSS, sniffing and other attack vectors.\r\nhttps://github.com/dagster-io/dagster/pull/7764", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dagster version less then 0.14.15 have ### Response: Having vulnarability PVE-2022-48543 Advisory: Dagster 0.14.15 defaults to use more security headers that prevent XSS, sniffing and other attack vectors.\r\nhttps://github.com/dagster-io/dagster/pull/7764" }, { "instruction": "what vulnarability does dagster-cloud version less then 1.1.4 have", "input": "", "output": "Having vulnarability CVE-2022-2068 Advisory: Dagster-cloud 1.1.4 updates 'dagster/dagster-cloud-agent' Docker image’s base to 'python:3.8.15-slim' to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dagster-cloud version less then 1.1.4 have ### Response: Having vulnarability CVE-2022-2068 Advisory: Dagster-cloud 1.1.4 updates 'dagster/dagster-cloud-agent' Docker image’s base to 'python:3.8.15-slim' to include security fixes." }, { "instruction": "what vulnarability does dajngo version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45422 Advisory: Dajngo is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dajngo version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45422 Advisory: Dajngo is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/" }, { "instruction": "what vulnarability does daphne version less then 4.0.0 have", "input": "", "output": "Having vulnarability CVE-2020-10108 Advisory: Daphne 4.0.0 updates its dependency 'twisted' to versions '>=22.4' to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does daphne version less then 4.0.0 have ### Response: Having vulnarability CVE-2020-10108 Advisory: Daphne 4.0.0 updates its dependency 'twisted' to versions '>=22.4' to include security fixes." }, { "instruction": "what vulnarability does dapla-toolbelt-pseudo version less then 0.2.1 have", "input": "", "output": "Having vulnarability CVE-2022-4304 Advisory: Dapla-toolbelt-pseudo 0.2.1 updates its dependency 'cryptography' to v39.0.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dapla-toolbelt-pseudo version less then 0.2.1 have ### Response: Having vulnarability CVE-2022-4304 Advisory: Dapla-toolbelt-pseudo 0.2.1 updates its dependency 'cryptography' to v39.0.1 to include security fixes." }, { "instruction": "what vulnarability does dark-matter version less then 4.0.42 have", "input": "", "output": "Having vulnarability CVE-2019-2435 Advisory: Dark-matter 4.0.42 updates its dependency 'mysql-connector-python' to v8.0.19 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dark-matter version less then 4.0.42 have ### Response: Having vulnarability CVE-2019-2435 Advisory: Dark-matter 4.0.42 updates its dependency 'mysql-connector-python' to v8.0.19 to include a security fix." }, { "instruction": "what vulnarability does dash version less then 1.20.0 have", "input": "", "output": "Having vulnarability PVE-2021-40183 Advisory: Dash 1.20.0 fixes a potential XSS vulnerability by starting to validate callback request fields.\r\nhttps://github.com/plotly/dash/pull/1546", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dash version less then 1.20.0 have ### Response: Having vulnarability PVE-2021-40183 Advisory: Dash 1.20.0 fixes a potential XSS vulnerability by starting to validate callback request fields.\r\nhttps://github.com/plotly/dash/pull/1546" }, { "instruction": "what vulnarability does dash-ag-grid version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2023-58907 Advisory: Dash-ag-grid 2.0.0 adds 'dangerously_allow_html' to grid props only provided at render, to prevent 'columnDefs' from showing unsafe html.\r\nhttps://github.com/plotly/dash-ag-grid/commit/b888d6ab4fcb4afac187492e8b6c9cf0d0f8842b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dash-ag-grid version less then 2.0.0 have ### Response: Having vulnarability PVE-2023-58907 Advisory: Dash-ag-grid 2.0.0 adds 'dangerously_allow_html' to grid props only provided at render, to prevent 'columnDefs' from showing unsafe html.\r\nhttps://github.com/plotly/dash-ag-grid/commit/b888d6ab4fcb4afac187492e8b6c9cf0d0f8842b" }, { "instruction": "what vulnarability does dash-bio version less then 0.5.1 have", "input": "", "output": "Having vulnarability PVE-2021-39411 Advisory: Dash-bio 0.5.1 fixes an abandoned resource vulnerability with CircosJS fork.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dash-bio version less then 0.5.1 have ### Response: Having vulnarability PVE-2021-39411 Advisory: Dash-bio 0.5.1 fixes an abandoned resource vulnerability with CircosJS fork." }, { "instruction": "what vulnarability does dash-extensions version less then 0.1.1 have", "input": "", "output": "Having vulnarability CVE-2021-43861 Advisory: Dash-extensions 0.1.1 updates its NPM dependency 'mermaid' to v9.0.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dash-extensions version less then 0.1.1 have ### Response: Having vulnarability CVE-2021-43861 Advisory: Dash-extensions 0.1.1 updates its NPM dependency 'mermaid' to v9.0.1 to include a security fix." }, { "instruction": "what vulnarability does dash-io version less then 0.0.1 have", "input": "", "output": "Having vulnarability PVE-2021-40961 Advisory: Dash-io 0.0.1.post1 removes the 'Pickle' library for security reasons.\r\nhttps://github.com/plotly/dash-io/commit/848565e688595c6d106663f41a6a7113b4c6fa67", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dash-io version less then 0.0.1 have ### Response: Having vulnarability PVE-2021-40961 Advisory: Dash-io 0.0.1.post1 removes the 'Pickle' library for security reasons.\r\nhttps://github.com/plotly/dash-io/commit/848565e688595c6d106663f41a6a7113b4c6fa67" }, { "instruction": "what vulnarability does dash-jbrowse version less then 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2021-23434 Advisory: Dash-jbrowse 1.0.1 updates its NPM dependency 'object-path' to v0.11.8 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dash-jbrowse version less then 1.0.1 have ### Response: Having vulnarability CVE-2021-23434 Advisory: Dash-jbrowse 1.0.1 updates its NPM dependency 'object-path' to v0.11.8 to include security fixes." }, { "instruction": "what vulnarability does dash-table version less then 4.7.0 have", "input": "", "output": "Having vulnarability PVE-2021-41222 Advisory: Dash-table 4.7.0 sanitizes table \"id\" to prevent stylesheet injection.\r\nhttps://github.com/plotly/dash-table/pull/766", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dash-table version less then 4.7.0 have ### Response: Having vulnarability PVE-2021-41222 Advisory: Dash-table 4.7.0 sanitizes table \"id\" to prevent stylesheet injection.\r\nhttps://github.com/plotly/dash-table/pull/766" }, { "instruction": "what vulnarability does dash-tools version less then 1.10.7 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Dash-tools 1.10.7 pins its dependency 'setuptools' to versions '>=65.5.1' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dash-tools version less then 1.10.7 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Dash-tools 1.10.7 pins its dependency 'setuptools' to versions '>=65.5.1' to include a security fix." }, { "instruction": "what vulnarability does dask version less then 2021.10.0 have", "input": "", "output": "Having vulnarability CVE-2021-42343 Advisory: Dask 2021.10.0 includes a fix for CVE-2021-42343: An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters starting with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dask version less then 2021.10.0 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Dask 2021.10.0 includes a fix for CVE-2021-42343: An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters starting with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution." }, { "instruction": "what vulnarability does dask-image version less then 2023.3.0 have", "input": "", "output": "Having vulnarability CVE-2021-42343 Advisory: Dask-image 2023.03.0 updates its dependency 'dask' to v2021.10.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dask-image version less then 2023.3.0 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Dask-image 2023.03.0 updates its dependency 'dask' to v2021.10.0 to include a security fix." }, { "instruction": "what vulnarability does database-sanitizer version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Database-Sanitizer 1.1.0 includes a security patch for the function 'from_file' in 'database_sanitizer/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/andersinno/python-database-sanitizer/commit/ace4e0823d7b81c6f3bf683eb97193b36cc6c040#diff-6090be0559642595d2ff5ff2e9d265c6d152a75ef98845380436d0f06e0b3c19", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does database-sanitizer version less then 1.1.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Database-Sanitizer 1.1.0 includes a security patch for the function 'from_file' in 'database_sanitizer/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/andersinno/python-database-sanitizer/commit/ace4e0823d7b81c6f3bf683eb97193b36cc6c040#diff-6090be0559642595d2ff5ff2e9d265c6d152a75ef98845380436d0f06e0b3c19" }, { "instruction": "what vulnarability does datacube version less then 1.6.2 have", "input": "", "output": "Having vulnarability PVE-2021-36835 Advisory: datacube 1.6.2 is a Patch release to build a new Docker container, to resolve an upstream security bug.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datacube version less then 1.6.2 have ### Response: Having vulnarability PVE-2021-36835 Advisory: datacube 1.6.2 is a Patch release to build a new Docker container, to resolve an upstream security bug." }, { "instruction": "what vulnarability does datacube-ows version less then 1.8.37 have", "input": "", "output": "Having vulnarability CVE-2023-27476 Advisory: Datacube-ows version 1.8.37 has upgraded its owslib dependency to versions greater than 0.29.2, moving from previous versions below 0.28.1\r\nhttps://github.com/opendatacube/datacube-ows/pull/973/commits/e7403ce5cccdbcc2d7b231679bb9b98bfbaa7ceb", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datacube-ows version less then 1.8.37 have ### Response: Having vulnarability CVE-2023-27476 Advisory: Datacube-ows version 1.8.37 has upgraded its owslib dependency to versions greater than 0.29.2, moving from previous versions below 0.28.1\r\nhttps://github.com/opendatacube/datacube-ows/pull/973/commits/e7403ce5cccdbcc2d7b231679bb9b98bfbaa7ceb" }, { "instruction": "what vulnarability does datagristle version less then 0.1.7 have", "input": "", "output": "Having vulnarability CVE-2016-10745 Advisory: Datagristle 0.1.7 updates its dependency 'jinja2' to v2.11 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datagristle version less then 0.1.7 have ### Response: Having vulnarability CVE-2016-10745 Advisory: Datagristle 0.1.7 updates its dependency 'jinja2' to v2.11 to include security fixes." }, { "instruction": "what vulnarability does datahub version less then 0.8.45 have", "input": "", "output": "Having vulnarability CVE-2023-25560 Advisory: DataHub's AuthServiceClient, specifically versions prior to 0.8.45, creates JSON strings using format strings containing user-controlled data. This method enables potential attackers to manipulate these JSON strings and forward them to the backend, leading to potential misuse and authentication bypasses. Such misuse could result in the generation of system accounts, potentially leading to full system compromise. This vulnerability was identified and reported by the GitHub Security lab and is being tracked under GHSL-2022-080.\r\nhttps://github.com/datahub-project/datahub/security/advisories/GHSA-6rpf-5cfg-h8f3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datahub version less then 0.8.45 have ### Response: Having vulnarability CVE-2023-25560 Advisory: DataHub's AuthServiceClient, specifically versions prior to 0.8.45, creates JSON strings using format strings containing user-controlled data. This method enables potential attackers to manipulate these JSON strings and forward them to the backend, leading to potential misuse and authentication bypasses. Such misuse could result in the generation of system accounts, potentially leading to full system compromise. This vulnerability was identified and reported by the GitHub Security lab and is being tracked under GHSL-2022-080.\r\nhttps://github.com/datahub-project/datahub/security/advisories/GHSA-6rpf-5cfg-h8f3" }, { "instruction": "what vulnarability does dataiku-api-client version less then equal to 11.1.0 have", "input": "", "output": "Having vulnarability CVE-2023-24045 Advisory: Dataiku-api-client 11.1.0 and before interact with Dataiku DSS 11.2.1 or prior versions, which are vulnerable to CVE-2023-24045.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dataiku-api-client version less then equal to 11.1.0 have ### Response: Having vulnarability CVE-2023-24045 Advisory: Dataiku-api-client 11.1.0 and before interact with Dataiku DSS 11.2.1 or prior versions, which are vulnerable to CVE-2023-24045." }, { "instruction": "what vulnarability does dataiku-scoring version less then equal to 11.1.0 have", "input": "", "output": "Having vulnarability CVE-2023-24045 Advisory: Dataiku-scoring 11.1.0 and before interact with Dataiku DSS 11.2.1 or prior versions, which are vulnerable to CVE-2023-24045.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dataiku-scoring version less then equal to 11.1.0 have ### Response: Having vulnarability CVE-2023-24045 Advisory: Dataiku-scoring 11.1.0 and before interact with Dataiku DSS 11.2.1 or prior versions, which are vulnerable to CVE-2023-24045." }, { "instruction": "what vulnarability does datajob version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-40144 Advisory: Datajob 0.6.0 includes a patch to shell out commands more securely.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datajob version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-40144 Advisory: Datajob 0.6.0 includes a patch to shell out commands more securely." }, { "instruction": "what vulnarability does datalad version less then 0.16.0 have", "input": "", "output": "Having vulnarability PVE-2022-48027 Advisory: Datalad 0.16.0 removes deprecated and unsafe mktemp from add-archive-content.\r\nhttps://github.com/datalad/datalad/pull/6428/commits/157db552b386f1719cc2efc3c3cb52e1e9c84f3e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datalad version less then 0.16.0 have ### Response: Having vulnarability PVE-2022-48027 Advisory: Datalad 0.16.0 removes deprecated and unsafe mktemp from add-archive-content.\r\nhttps://github.com/datalad/datalad/pull/6428/commits/157db552b386f1719cc2efc3c3cb52e1e9c84f3e" }, { "instruction": "what vulnarability does datalite version less then 0.7.2 have", "input": "", "output": "Having vulnarability PVE-2022-49140 Advisory: Datalite 0.7.2 adds some protection against SQL injections in field values. Maintainers highlight that this does not apply to class names, which should be under the programmer's control.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datalite version less then 0.7.2 have ### Response: Having vulnarability PVE-2022-49140 Advisory: Datalite 0.7.2 adds some protection against SQL injections in field values. Maintainers highlight that this does not apply to class names, which should be under the programmer's control." }, { "instruction": "what vulnarability does datasets version less then 2.14.7 have", "input": "", "output": "Having vulnarability CVE-2023-47248 Advisory: Datasets version 2.14.7 updates its dependency to include pyarrow version 14.0.1. This update addresses the security vulnerability CVE-2023-47248.\r\nhttps://github.com/huggingface/datasets/pull/6404/commits/04a3f006a1a88c894ea10610d66dfddd73ad1490", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasets version less then 2.14.7 have ### Response: Having vulnarability CVE-2023-47248 Advisory: Datasets version 2.14.7 updates its dependency to include pyarrow version 14.0.1. This update addresses the security vulnerability CVE-2023-47248.\r\nhttps://github.com/huggingface/datasets/pull/6404/commits/04a3f006a1a88c894ea10610d66dfddd73ad1490" }, { "instruction": "what vulnarability does datasette version less then 0.29.1 have", "input": "", "output": "Having vulnarability PVE-2021-42226 Advisory: Datasette 0.29.1 fixes a bug where static mounts used relative paths, which could lead to traversal exploits.\r\nhttps://github.com/simonw/datasette/commit/82889507cafa4b823e89af90b6674fd76653fb86", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette version less then 0.29.1 have ### Response: Having vulnarability PVE-2021-42226 Advisory: Datasette 0.29.1 fixes a bug where static mounts used relative paths, which could lead to traversal exploits.\r\nhttps://github.com/simonw/datasette/commit/82889507cafa4b823e89af90b6674fd76653fb86" }, { "instruction": "what vulnarability does datasette-auth-passwords version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2021-32670 Advisory: Datasette-auth-passwords 0.4.1 now depends on the 'datasette' >=0.56.1, to avoid a security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette-auth-passwords version less then 0.4.1 have ### Response: Having vulnarability CVE-2021-32670 Advisory: Datasette-auth-passwords 0.4.1 now depends on the 'datasette' >=0.56.1, to avoid a security vulnerability." }, { "instruction": "what vulnarability does datasette-css-properties version less then 0.2 have", "input": "", "output": "Having vulnarability PVE-2021-39422 Advisory: Datasette-css-properties 0.2 makes the '.css' pages send the 'x-content-type-options: nosniff' header to protect against browsers incorrectly rendering the CSS as HTML which could be an XSS security hole.\r\nhttps://github.com/simonw/datasette-css-properties/commit/faf181430667af0e4f4954163fefcc32e8fdbd9c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette-css-properties version less then 0.2 have ### Response: Having vulnarability PVE-2021-39422 Advisory: Datasette-css-properties 0.2 makes the '.css' pages send the 'x-content-type-options: nosniff' header to protect against browsers incorrectly rendering the CSS as HTML which could be an XSS security hole.\r\nhttps://github.com/simonw/datasette-css-properties/commit/faf181430667af0e4f4954163fefcc32e8fdbd9c" }, { "instruction": "what vulnarability does datasette-edit-templates version less then 0.2 have", "input": "", "output": "Having vulnarability PVE-2022-51931 Advisory: Datasette-edit-templates 0.2 fixes a vulnerability. Logged out users were able to edit templates.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette-edit-templates version less then 0.2 have ### Response: Having vulnarability PVE-2022-51931 Advisory: Datasette-edit-templates 0.2 fixes a vulnerability. Logged out users were able to edit templates." }, { "instruction": "what vulnarability does datasette-graphql version less then 1.2 have", "input": "", "output": "Having vulnarability PVE-2021-39174 Advisory: Datasette-graphql before 1.2 included a plugin that could expose schema details of databases that should not be visible.\r\nhttps://github.com/simonw/datasette-graphql/security/advisories/GHSA-74hv-qjjq-h7g5", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette-graphql version less then 1.2 have ### Response: Having vulnarability PVE-2021-39174 Advisory: Datasette-graphql before 1.2 included a plugin that could expose schema details of databases that should not be visible.\r\nhttps://github.com/simonw/datasette-graphql/security/advisories/GHSA-74hv-qjjq-h7g5" }, { "instruction": "what vulnarability does datasette-indieauth version less then 1.1 have", "input": "", "output": "Having vulnarability PVE-2021-39164 Advisory: Datasette-indieauth before 1.1 trusts the \"me\" field returned by the authorization server without verifying it.\r\nhttps://github.com/simonw/datasette-indieauth/security/advisories/GHSA-mjcr-rqjg-rhg3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette-indieauth version less then 1.1 have ### Response: Having vulnarability PVE-2021-39164 Advisory: Datasette-indieauth before 1.1 trusts the \"me\" field returned by the authorization server without verifying it.\r\nhttps://github.com/simonw/datasette-indieauth/security/advisories/GHSA-mjcr-rqjg-rhg3" }, { "instruction": "what vulnarability does datasette-insert version less then 0.6 have", "input": "", "output": "Having vulnarability PVE-2021-38644 Advisory: Datasette-insert 0.6 is locked down by default. This plugin no longer defaults to allowing all, reducing the risk that someone may deploy it without sufficient security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette-insert version less then 0.6 have ### Response: Having vulnarability PVE-2021-38644 Advisory: Datasette-insert 0.6 is locked down by default. This plugin no longer defaults to allowing all, reducing the risk that someone may deploy it without sufficient security." }, { "instruction": "what vulnarability does datasette-query-links version less then 0.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-41092 Advisory: Datasette-query-links 0.1.1 fixes an XSS security bug.\r\nhttps://github.com/simonw/datasette-query-links/issues/2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette-query-links version less then 0.1.1 have ### Response: Having vulnarability PVE-2021-41092 Advisory: Datasette-query-links 0.1.1 fixes an XSS security bug.\r\nhttps://github.com/simonw/datasette-query-links/issues/2" }, { "instruction": "what vulnarability does datasette-seaborn version equal to 0.1a0 have", "input": "", "output": "Having vulnarability PVE-2021-38782 Advisory: The maintainers or the datasette-seaborn package acknowledge that version 0.1a0 is buggy and probably not secure.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datasette-seaborn version equal to 0.1a0 have ### Response: Having vulnarability PVE-2021-38782 Advisory: The maintainers or the datasette-seaborn package acknowledge that version 0.1a0 is buggy and probably not secure." }, { "instruction": "what vulnarability does dateable-chronos version less then 0.8 have", "input": "", "output": "Having vulnarability PVE-2021-25685 Advisory: Dateable.chronos 0.8 includes a fix for a XSS vulnerability in the get_view_day method.\r\nhttps://github.com/collective/dateable.chronos/commit/fd91af02186e61b3e161a2f620da9422eb228c71", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dateable-chronos version less then 0.8 have ### Response: Having vulnarability PVE-2021-25685 Advisory: Dateable.chronos 0.8 includes a fix for a XSS vulnerability in the get_view_day method.\r\nhttps://github.com/collective/dateable.chronos/commit/fd91af02186e61b3e161a2f620da9422eb228c71" }, { "instruction": "what vulnarability does dateparser version less then 1.1.6 have", "input": "", "output": "Having vulnarability PVE-2023-62361 Advisory: Dateparser 1.1.6 includes a fix for a ReDoS vulnerability in Spanish sentence splitting regex.\r\nhttps://github.com/scrapinghub/dateparser/pull/1084", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dateparser version less then 1.1.6 have ### Response: Having vulnarability PVE-2023-62361 Advisory: Dateparser 1.1.6 includes a fix for a ReDoS vulnerability in Spanish sentence splitting regex.\r\nhttps://github.com/scrapinghub/dateparser/pull/1084" }, { "instruction": "what vulnarability does datera-cinder version less then 2018.10.30.0 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Datera-cinder 2018.10.30.0 updates the required 'requests' version to >=2.20.0 to include a fix for CVE-2018-18074.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datera-cinder version less then 2018.10.30.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Datera-cinder 2018.10.30.0 updates the required 'requests' version to >=2.20.0 to include a fix for CVE-2018-18074." }, { "instruction": "what vulnarability does datum version less then 1.5.0 have", "input": "", "output": "Having vulnarability CVE-2022-23587 Advisory: Datum 1.5.0 updates its dependency 'TensorFlow' to v2.8.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datum version less then 1.5.0 have ### Response: Having vulnarability CVE-2022-23587 Advisory: Datum 1.5.0 updates its dependency 'TensorFlow' to v2.8.1 to include security fixes." }, { "instruction": "what vulnarability does datumaro version less then 0.1.10 have", "input": "", "output": "Having vulnarability PVE-2021-41817 Advisory: Datumaro version 0.1.10 includes a fix for an arbitrary code execution vulnerability: Cifar implementation is based on pickle, which can run arbitrary code on unpickling.\r\nhttps://github.com/openvinotoolkit/datumaro/issues/327", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does datumaro version less then 0.1.10 have ### Response: Having vulnarability PVE-2021-41817 Advisory: Datumaro version 0.1.10 includes a fix for an arbitrary code execution vulnerability: Cifar implementation is based on pickle, which can run arbitrary code on unpickling.\r\nhttps://github.com/openvinotoolkit/datumaro/issues/327" }, { "instruction": "what vulnarability does dawgie version less then 1.2.3 have", "input": "", "output": "Having vulnarability PVE-2021-40122 Advisory: Dawgie 1.2.3 includes a vulnerability fix.\r\nhttps://github.com/al-niessner/DAWGIE/commit/137cd7933be87ce13780c07ead0263e9da29ec8e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dawgie version less then 1.2.3 have ### Response: Having vulnarability PVE-2021-40122 Advisory: Dawgie 1.2.3 includes a vulnerability fix.\r\nhttps://github.com/al-niessner/DAWGIE/commit/137cd7933be87ce13780c07ead0263e9da29ec8e" }, { "instruction": "what vulnarability does dazzler version equal to 0.10.0 have", "input": "", "output": "Having vulnarability CVE-2022-33124 Advisory: The Dazzler version 0.10.0 dependency AIOHTTP 3.8.1 might return a result indicating \"ValueError: Invalid IPv6 URL\". This situation has the potential to result in a Denial of Service (DoS). \r\nAlias: GHSA-rwqr-c348-m5wr", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dazzler version equal to 0.10.0 have ### Response: Having vulnarability CVE-2022-33124 Advisory: The Dazzler version 0.10.0 dependency AIOHTTP 3.8.1 might return a result indicating \"ValueError: Invalid IPv6 URL\". This situation has the potential to result in a Denial of Service (DoS). \r\nAlias: GHSA-rwqr-c348-m5wr" }, { "instruction": "what vulnarability does db-able version less then 2.1.4 have", "input": "", "output": "Having vulnarability CVE-2022-0144 Advisory: Db-able 2.1.4 updates its NPM dependency 'shelljs' to v0.8.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does db-able version less then 2.1.4 have ### Response: Having vulnarability CVE-2022-0144 Advisory: Db-able 2.1.4 updates its NPM dependency 'shelljs' to v0.8.5 to include a security fix." }, { "instruction": "what vulnarability does dbcat version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2020-36242 Advisory: Dbcat 0.3.1 updates its dependency 'cryptography' to v3.4.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbcat version less then 0.3.1 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Dbcat 0.3.1 updates its dependency 'cryptography' to v3.4.4 to include a security fix." }, { "instruction": "what vulnarability does dbpool version less then 1.2.1 have", "input": "", "output": "Having vulnarability CVE-2022-1941 Advisory: Dbpool 1.2.1 updates its dependency 'protobuf' to v3.19.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbpool version less then 1.2.1 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Dbpool 1.2.1 updates its dependency 'protobuf' to v3.19.5 to include a security fix." }, { "instruction": "what vulnarability does dbt-core version less then 0.20.0rc1 have", "input": "", "output": "Having vulnarability CVE-2020-28493 Advisory: Dbt-core 0.20.0rc1 updates its dependency 'jinja2' to v2.11.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbt-core version less then 0.20.0rc1 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Dbt-core 0.20.0rc1 updates its dependency 'jinja2' to v2.11.3 to include a security fix." }, { "instruction": "what vulnarability does dbt-coverage version less then 0.3.7 have", "input": "", "output": "Having vulnarability CVE-2023-37920 Advisory: Dbt-coverage version 0.3.7 has updated its certifi dependency from version 2023.7.22 to 2024.2.2 to address the security vulnerability identified in CVE-2023-37920.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbt-coverage version less then 0.3.7 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Dbt-coverage version 0.3.7 has updated its certifi dependency from version 2023.7.22 to 2024.2.2 to address the security vulnerability identified in CVE-2023-37920." }, { "instruction": "what vulnarability does dbt-databricks version less then 1.5.6 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Dbt-databricks 1.5.6 updates its dependency 'databricks-sdk' to v0.9.0 to include a secure version of 'requests'.\r\nhttps://github.com/databricks/dbt-databricks/pull/460", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbt-databricks version less then 1.5.6 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Dbt-databricks 1.5.6 updates its dependency 'databricks-sdk' to v0.9.0 to include a secure version of 'requests'.\r\nhttps://github.com/databricks/dbt-databricks/pull/460" }, { "instruction": "what vulnarability does dbt-oracle version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2024-63307 Advisory: Dbt-oracle 1.0.4includes an update to dbt-core version v1.0.8, which addresses a critical security issue. \r\nhttps://github.com/oracle/dbt-oracle/commit/d7462ccac1c6b9893f4de0510c8e6f243595cadd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbt-oracle version less then 1.0.4 have ### Response: Having vulnarability PVE-2024-63307 Advisory: Dbt-oracle 1.0.4includes an update to dbt-core version v1.0.8, which addresses a critical security issue. \r\nhttps://github.com/oracle/dbt-oracle/commit/d7462ccac1c6b9893f4de0510c8e6f243595cadd" }, { "instruction": "what vulnarability does dbt-redshift version less then 1.8.0b3 have", "input": "", "output": "Having vulnarability PVE-2024-68037 Advisory: Dbt-redshift version 1.8.0b3 has updated its sqlparse dependency to versions between \">=0.5.0\" and \"<0.6.0\". This change is made to address vulnerabilities specified in GHSA-2m57-hf25-phgg and is aligned with updates in dbt-core.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbt-redshift version less then 1.8.0b3 have ### Response: Having vulnarability PVE-2024-68037 Advisory: Dbt-redshift version 1.8.0b3 has updated its sqlparse dependency to versions between \">=0.5.0\" and \"<0.6.0\". This change is made to address vulnerabilities specified in GHSA-2m57-hf25-phgg and is aligned with updates in dbt-core." }, { "instruction": "what vulnarability does dbt-snowflake version less then 1.8.0b1 have", "input": "", "output": "Having vulnarability PVE-2024-65754 Advisory: Dbt-snowflake version 1.8.0b1 has upgraded its cryptography dependency to approximately version 41.0.7. This update addresses a security issue present in version 41.0.5, detailed in CVE-2023-5363.\r\nhttps://github.com/dbt-labs/dbt-snowflake/pull/852/commits/43ac4ddfcffe5e596b12892cafa419c0f178f987", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbt-snowflake version less then 1.8.0b1 have ### Response: Having vulnarability PVE-2024-65754 Advisory: Dbt-snowflake version 1.8.0b1 has upgraded its cryptography dependency to approximately version 41.0.7. This update addresses a security issue present in version 41.0.5, detailed in CVE-2023-5363.\r\nhttps://github.com/dbt-labs/dbt-snowflake/pull/852/commits/43ac4ddfcffe5e596b12892cafa419c0f178f987" }, { "instruction": "what vulnarability does dbt-sqlserver version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2022-51023 Advisory: Dbt-sqlserver 1.2.0 uses connection encryption by default.\r\nhttps://github.com/dbt-msft/dbt-sqlserver/commit/a2c4bf0f68d71efde3f7406843c7909d9b8fa9a0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbt-sqlserver version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-51023 Advisory: Dbt-sqlserver 1.2.0 uses connection encryption by default.\r\nhttps://github.com/dbt-msft/dbt-sqlserver/commit/a2c4bf0f68d71efde3f7406843c7909d9b8fa9a0" }, { "instruction": "what vulnarability does dbt-trino version less then 1.2.1 have", "input": "", "output": "Having vulnarability CVE-2020-1747 Advisory: Dbt-trino 1.2.1 requires 'pyyaml>=6.0' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbt-trino version less then 1.2.1 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Dbt-trino 1.2.1 requires 'pyyaml>=6.0' to include a security fix." }, { "instruction": "what vulnarability does dbterd version less then 1.2.5 have", "input": "", "output": "Having vulnarability CVE-2023-37920 Advisory: Dbterd 1.2.5 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a vulnerability.\r\nhttps://github.com/datnguye/dbterd/pull/44", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbterd version less then 1.2.5 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Dbterd 1.2.5 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a vulnerability.\r\nhttps://github.com/datnguye/dbterd/pull/44" }, { "instruction": "what vulnarability does dbx version less then 0.8.16 have", "input": "", "output": "Having vulnarability CVE-2022-24065 Advisory: Dbx 0.8.16 updates its dependency 'cookiecutter' to version '2.1.1' to include a security fix.\r\nhttps://github.com/databrickslabs/dbx/pull/798", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dbx version less then 0.8.16 have ### Response: Having vulnarability CVE-2022-24065 Advisory: Dbx 0.8.16 updates its dependency 'cookiecutter' to version '2.1.1' to include a security fix.\r\nhttps://github.com/databrickslabs/dbx/pull/798" }, { "instruction": "what vulnarability does dcnnt version less then 0.9.1 have", "input": "", "output": "Having vulnarability PVE-2023-62062 Advisory: Dcnnt version 0.9.1 addresses a security vulnerability related to command injection.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dcnnt version less then 0.9.1 have ### Response: Having vulnarability PVE-2023-62062 Advisory: Dcnnt version 0.9.1 addresses a security vulnerability related to command injection." }, { "instruction": "what vulnarability does dcspy version less then 2.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Dcspy 2.3.3 updates its dependency 'pillow' to include a security fix for CVE-2023-4863.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dcspy version less then 2.3.3 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Dcspy 2.3.3 updates its dependency 'pillow' to include a security fix for CVE-2023-4863." }, { "instruction": "what vulnarability does ddataflow version less then 1.1.8 have", "input": "", "output": "Having vulnarability CVE-2018-20060 Advisory: Ddataflow 1.1.8 updates its dependency 'urllib3' to v1.26.12 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ddataflow version less then 1.1.8 have ### Response: Having vulnarability CVE-2018-20060 Advisory: Ddataflow 1.1.8 updates its dependency 'urllib3' to v1.26.12 to include security fixes." }, { "instruction": "what vulnarability does dds-cli version less then 2.1.0 have", "input": "", "output": "Having vulnarability CVE-2022-3102 Advisory: Dds-cli 2.1.0 pins its jwcrypto dependency to version 1.4 from the earlier 1.0, in response to security concerns highlighted by CVE-2022-3102.\r\nhttps://github.com/ScilifelabDataCentre/dds_cli/pull/537/commits/aae2610d78bf2c2daec94be1172739ad80819779", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dds-cli version less then 2.1.0 have ### Response: Having vulnarability CVE-2022-3102 Advisory: Dds-cli 2.1.0 pins its jwcrypto dependency to version 1.4 from the earlier 1.0, in response to security concerns highlighted by CVE-2022-3102.\r\nhttps://github.com/ScilifelabDataCentre/dds_cli/pull/537/commits/aae2610d78bf2c2daec94be1172739ad80819779" }, { "instruction": "what vulnarability does ddtrace version less then 0.11.0 have", "input": "", "output": "Having vulnarability PVE-2021-35790 Advisory: ddtrace 0.11.0 removes the `sql.query` tag from SQL spans, so that the content is properly obfuscated in the Agent. This security fix is required to prevent wrong data collection of reported SQL queries. This issue impacts only MySQL integrations and NOT `psycopg2` or `sqlalchemy` while using the PostgreSQL driver.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ddtrace version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-35790 Advisory: ddtrace 0.11.0 removes the `sql.query` tag from SQL spans, so that the content is properly obfuscated in the Agent. This security fix is required to prevent wrong data collection of reported SQL queries. This issue impacts only MySQL integrations and NOT `psycopg2` or `sqlalchemy` while using the PostgreSQL driver." }, { "instruction": "what vulnarability does debianized-jupyterhub version less then 0.9.5.1 have", "input": "", "output": "Having vulnarability CVE-2019-10255 Advisory: Debianized-jupyterhub 0.9.5.1 updates its dependency 'notebook' to 5.7.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does debianized-jupyterhub version less then 0.9.5.1 have ### Response: Having vulnarability CVE-2019-10255 Advisory: Debianized-jupyterhub 0.9.5.1 updates its dependency 'notebook' to 5.7.7 to include a security fix." }, { "instruction": "what vulnarability does debops version less then 0.8.0 have", "input": "", "output": "Having vulnarability PVE-2021-36371 Advisory: Debops 0.8.0 installs upstream NodeSource APT packages by default. This is due to `no security support in Debian Stable`__, therefore an upstream packages should be considered more secure. The upstream NodeJS packages include a compatible NPM release, therefore it won't be separately installed from GitHub.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does debops version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-36371 Advisory: Debops 0.8.0 installs upstream NodeSource APT packages by default. This is due to `no security support in Debian Stable`__, therefore an upstream packages should be considered more secure. The upstream NodeJS packages include a compatible NPM release, therefore it won't be separately installed from GitHub." }, { "instruction": "what vulnarability does decancer-py version less then 0.2.2 have", "input": "", "output": "Having vulnarability PVE-2023-59516 Advisory: Decancer-py 0.2.2 updates its dependency 'decancer' to version '1.6.4' to include fixes for two DoS vulnerabilities.\r\nhttps://github.com/Jonxslays/decancer_py/pull/4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does decancer-py version less then 0.2.2 have ### Response: Having vulnarability PVE-2023-59516 Advisory: Decancer-py 0.2.2 updates its dependency 'decancer' to version '1.6.4' to include fixes for two DoS vulnerabilities.\r\nhttps://github.com/Jonxslays/decancer_py/pull/4" }, { "instruction": "what vulnarability does decaptcha version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-37892 Advisory: decaptcha 1.0.0 includes a patch for security vulnerability: pin pillow>=6.2.0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does decaptcha version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-37892 Advisory: decaptcha 1.0.0 includes a patch for security vulnerability: pin pillow>=6.2.0" }, { "instruction": "what vulnarability does declarai version less then 0.1.2 have", "input": "", "output": "Having vulnarability PVE-2022-47988 Advisory: Declarai 0.1.2 updates its dependency 'wandb' to version '0.15.8' to include a fix for a Race Condition vulnerability.\r\nhttps://github.com/vendi-ai/declarai/pull/53", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does declarai version less then 0.1.2 have ### Response: Having vulnarability PVE-2022-47988 Advisory: Declarai 0.1.2 updates its dependency 'wandb' to version '0.15.8' to include a fix for a Race Condition vulnerability.\r\nhttps://github.com/vendi-ai/declarai/pull/53" }, { "instruction": "what vulnarability does declarativex version less then 1.6.5 have", "input": "", "output": "Having vulnarability CVE-2024-22195 Advisory: Declarativex 1.6.5 updates its dependency 'jinja2' to v3.1.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does declarativex version less then 1.6.5 have ### Response: Having vulnarability CVE-2024-22195 Advisory: Declarativex 1.6.5 updates its dependency 'jinja2' to v3.1.3 to include a security fix." }, { "instruction": "what vulnarability does decord version greather then equal to 0.3.7,less then 0.4.0 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Decord 0.3.7 throughout 0.3.9 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.\r\nhttps://inspector.pypi.io/project/decord/0.3.9/packages/d9/b8/f90a9d579e93dd1b9a271a59fa222740ae9d9851ea27c5c6bc6550eb9480/decord-0.3.9-cp37-cp37m-macosx_10_13_x86_64.whl", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does decord version greather then equal to 0.3.7,less then 0.4.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Decord 0.3.7 throughout 0.3.9 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.\r\nhttps://inspector.pypi.io/project/decord/0.3.9/packages/d9/b8/f90a9d579e93dd1b9a271a59fa222740ae9d9851ea27c5c6bc6550eb9480/decord-0.3.9-cp37-cp37m-macosx_10_13_x86_64.whl" }, { "instruction": "what vulnarability does deduce version less then 2.0.2 have", "input": "", "output": "Having vulnarability CVE-2023-26302 Advisory: Deduce 2.0.2 updates its dependency 'markdown-it-py' to v2.2.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deduce version less then 2.0.2 have ### Response: Having vulnarability CVE-2023-26302 Advisory: Deduce 2.0.2 updates its dependency 'markdown-it-py' to v2.2.0 to include security fixes." }, { "instruction": "what vulnarability does deep-translator version less then equal to 1.8.5 have", "input": "", "output": "Having vulnarability PVE-2023-55209 Advisory: The deep-translator project on PyPI was taken over via user account compromise via a phishing attack and a new malicious release (1.8.5) made which contained code which some environment variables and downloaded and ran malware at install time.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deep-translator version less then equal to 1.8.5 have ### Response: Having vulnarability PVE-2023-55209 Advisory: The deep-translator project on PyPI was taken over via user account compromise via a phishing attack and a new malicious release (1.8.5) made which contained code which some environment variables and downloaded and ran malware at install time." }, { "instruction": "what vulnarability does deepcell version less then 0.10.0rc1 have", "input": "", "output": "Having vulnarability CVE-2021-37684 Advisory: Deepcell 0.10.0rc1 updates its dependency 'TensorFlow' to v2.5.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deepcell version less then 0.10.0rc1 have ### Response: Having vulnarability CVE-2021-37684 Advisory: Deepcell 0.10.0rc1 updates its dependency 'TensorFlow' to v2.5.1 to include security fixes." }, { "instruction": "what vulnarability does deepchecks version less then 0.18.0 have", "input": "", "output": "Having vulnarability CVE-2023-40170 Advisory: Deepchecks version 0.18.0 updates its dependency on jupyter-server to version 2.7.2 from 1.24.0, addressing security vulnerability CVE-2023-40170.\r\nhttps://github.com/deepchecks/deepchecks/pull/2683", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deepchecks version less then 0.18.0 have ### Response: Having vulnarability CVE-2023-40170 Advisory: Deepchecks version 0.18.0 updates its dependency on jupyter-server to version 2.7.2 from 1.24.0, addressing security vulnerability CVE-2023-40170.\r\nhttps://github.com/deepchecks/deepchecks/pull/2683" }, { "instruction": "what vulnarability does deepdataspace version less then 0.11.0 have", "input": "", "output": "Having vulnarability CVE-2024-26130 Advisory: Deepdataspace version 0.11.0 upgrades its cryptography library from version 42.0.2 to 42.0.5 to address the security issue detailed in CVE-2024-26130.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deepdataspace version less then 0.11.0 have ### Response: Having vulnarability CVE-2024-26130 Advisory: Deepdataspace version 0.11.0 upgrades its cryptography library from version 42.0.2 to 42.0.5 to address the security issue detailed in CVE-2024-26130." }, { "instruction": "what vulnarability does deephaven-core version less then 0.11.0 have", "input": "", "output": "Having vulnarability PVE-2024-64267 Advisory: Deephaven-core 0.11.0 fixes a race condition that could lead to session expiry discrepancies.\r\nhttps://github.com/deephaven/deephaven-core/pull/2064/commits/b86cee3c59ca3eafb397904b9ff644501f8914f7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deephaven-core version less then 0.11.0 have ### Response: Having vulnarability PVE-2024-64267 Advisory: Deephaven-core 0.11.0 fixes a race condition that could lead to session expiry discrepancies.\r\nhttps://github.com/deephaven/deephaven-core/pull/2064/commits/b86cee3c59ca3eafb397904b9ff644501f8914f7" }, { "instruction": "what vulnarability does deepl version less then 1.13.0 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Deepl 1.13.0 updates its certifi package from version 2022.9.24 to 2022.12.7 in response to the security issue CVE-2022-23491.\r\nhttps://github.com/DeepLcom/deepl-python/commit/0e5f71eb26510b2fe0baf17b3d450531918d701c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deepl version less then 1.13.0 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Deepl 1.13.0 updates its certifi package from version 2022.9.24 to 2022.12.7 in response to the security issue CVE-2022-23491.\r\nhttps://github.com/DeepLcom/deepl-python/commit/0e5f71eb26510b2fe0baf17b3d450531918d701c" }, { "instruction": "what vulnarability does deeposlandia version less then 0.6 have", "input": "", "output": "Having vulnarability PVE-2021-37524 Advisory: Deeposlandia 0.6 updates its dependency 'Tensorflow' to v1.15 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deeposlandia version less then 0.6 have ### Response: Having vulnarability PVE-2021-37524 Advisory: Deeposlandia 0.6 updates its dependency 'Tensorflow' to v1.15 to include security fixes." }, { "instruction": "what vulnarability does deepspeed version less then 0.6.2 have", "input": "", "output": "Having vulnarability CVE-2022-24724 Advisory: Deepspeed 0.6.2 updates its GEM dependency 'commonmarker' to v0.23.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deepspeed version less then 0.6.2 have ### Response: Having vulnarability CVE-2022-24724 Advisory: Deepspeed 0.6.2 updates its GEM dependency 'commonmarker' to v0.23.4 to include a security fix." }, { "instruction": "what vulnarability does definitions version less then equal to 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2018-20325 Advisory: There is a vulnerability in load() method in definitions/parser.py in the Danijar Hafner definitions package for Python. It can execute arbitrary python commands resulting in command execution.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does definitions version less then equal to 0.2.0 have ### Response: Having vulnarability CVE-2018-20325 Advisory: There is a vulnerability in load() method in definitions/parser.py in the Danijar Hafner definitions package for Python. It can execute arbitrary python commands resulting in command execution." }, { "instruction": "what vulnarability does defusedexpat version less then 0.3 have", "input": "", "output": "Having vulnarability CVE-2013-1664 Advisory: The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does defusedexpat version less then 0.3 have ### Response: Having vulnarability CVE-2013-1664 Advisory: The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack." }, { "instruction": "what vulnarability does defusedxml version less then 0.4 have", "input": "", "output": "Having vulnarability CVE-2013-1664 Advisory: The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does defusedxml version less then 0.4 have ### Response: Having vulnarability CVE-2013-1664 Advisory: The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack." }, { "instruction": "what vulnarability does deis version less then 1.4.0 have", "input": "", "output": "Having vulnarability CVE-2014-3566 Advisory: Deis 1.4.0 disables SSLv3 protocol in router code to avoid known vulnerabilities.\r\nhttps://github.com/deis/deis/commit/93bb0fd9cb33e5b8bdcfdc277d15d61b938a88d4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deis version less then 1.4.0 have ### Response: Having vulnarability CVE-2014-3566 Advisory: Deis 1.4.0 disables SSLv3 protocol in router code to avoid known vulnerabilities.\r\nhttps://github.com/deis/deis/commit/93bb0fd9cb33e5b8bdcfdc277d15d61b938a88d4" }, { "instruction": "what vulnarability does delphi-epidata version less then 0.3.12 have", "input": "", "output": "Having vulnarability CVE-2021-30560 Advisory: Delphi-epidata 0.3.12 updates its dependency 'nokogiri' to v1.13.3 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does delphi-epidata version less then 0.3.12 have ### Response: Having vulnarability CVE-2021-30560 Advisory: Delphi-epidata 0.3.12 updates its dependency 'nokogiri' to v1.13.3 to include security fixes." }, { "instruction": "what vulnarability does deltachat version less then 1.0.0b17 have", "input": "", "output": "Having vulnarability PVE-2021-40086 Advisory: Deltachat 1.0.0b17 uses a version of 'Deltachat-core' that fixes a potential SQL injection vulnerability in Chat-Group-Name breakage.\r\nhttps://github.com/deltachat/deltachat-core-rust/pull/1024/files", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deltachat version less then 1.0.0b17 have ### Response: Having vulnarability PVE-2021-40086 Advisory: Deltachat 1.0.0b17 uses a version of 'Deltachat-core' that fixes a potential SQL injection vulnerability in Chat-Group-Name breakage.\r\nhttps://github.com/deltachat/deltachat-core-rust/pull/1024/files" }, { "instruction": "what vulnarability does deluge version less then 1.3.14 have", "input": "", "output": "Having vulnarability CVE-2017-7178 Advisory: CSRF was discovered in the web UI in Deluge before 1.3.14. The exploitation methodology involves (1) hosting a crafted plugin that executes an arbitrary program from its __init__.py file and (2) causing the victim to download, install, and enable this plugin.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does deluge version less then 1.3.14 have ### Response: Having vulnarability CVE-2017-7178 Advisory: CSRF was discovered in the web UI in Deluge before 1.3.14. The exploitation methodology involves (1) hosting a crafted plugin that executes an arbitrary program from its __init__.py file and (2) causing the victim to download, install, and enable this plugin." }, { "instruction": "what vulnarability does dendromatics version less then 0.4.2 have", "input": "", "output": "Having vulnarability PVE-2024-66664 Advisory: Dendromatics 0.4.2 upgrades its csf_3dfin dependency from 1.1.5 to 1.3.0, bringing along numerous bug fixes and performance enhancements. A key improvement includes resolving a race condition that previously led to unpredictable execution outcomes.\r\nhttps://github.com/3DFin/dendromatics/commit/fe5144764264fec818344903e2f4c83f90c0978c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dendromatics version less then 0.4.2 have ### Response: Having vulnarability PVE-2024-66664 Advisory: Dendromatics 0.4.2 upgrades its csf_3dfin dependency from 1.1.5 to 1.3.0, bringing along numerous bug fixes and performance enhancements. A key improvement includes resolving a race condition that previously led to unpredictable execution outcomes.\r\nhttps://github.com/3DFin/dendromatics/commit/fe5144764264fec818344903e2f4c83f90c0978c" }, { "instruction": "what vulnarability does denyhosts version less then 2.7 have", "input": "", "output": "Having vulnarability CVE-2013-6890 Advisory: denyhosts 2.6 uses an incorrect regular expression when analyzing authentication logs, which allows remote attackers to cause a denial of service (incorrect block of IP addresses) via crafted login names.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does denyhosts version less then 2.7 have ### Response: Having vulnarability CVE-2013-6890 Advisory: denyhosts 2.6 uses an incorrect regular expression when analyzing authentication logs, which allows remote attackers to cause a denial of service (incorrect block of IP addresses) via crafted login names." }, { "instruction": "what vulnarability does dequests version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52886 Advisory: Dequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.\r\nhttps://thehackernews.com/2022/12/malware-strains-targeting-python-and.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dequests version greather then 0 have ### Response: Having vulnarability PVE-2023-52886 Advisory: Dequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.\r\nhttps://thehackernews.com/2022/12/malware-strains-targeting-python-and.html" }, { "instruction": "what vulnarability does descarteslabs version less then 0.4.7 have", "input": "", "output": "Having vulnarability PVE-2023-61599 Advisory: Descarteslabs 0.4.7 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/descarteslabs/descarteslabs-python/pull/181", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does descarteslabs version less then 0.4.7 have ### Response: Having vulnarability PVE-2023-61599 Advisory: Descarteslabs 0.4.7 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/descarteslabs/descarteslabs-python/pull/181" }, { "instruction": "what vulnarability does descope version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2022-3602 Advisory: Descope 0.3.0 updates its dependency 'cryptography' to v38.0.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does descope version less then 0.3.0 have ### Response: Having vulnarability CVE-2022-3602 Advisory: Descope 0.3.0 updates its dependency 'cryptography' to v38.0.3 to include a security fix." }, { "instruction": "what vulnarability does designate version less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2015-5694 Advisory: Designate does not enforce the DNS protocol limit concerning record set sizes", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does designate version less then 1.0.0 have ### Response: Having vulnarability CVE-2015-5694 Advisory: Designate does not enforce the DNS protocol limit concerning record set sizes" }, { "instruction": "what vulnarability does destringcare version less then 0.0.4 have", "input": "", "output": "Having vulnarability CVE-2018-6594 Advisory: Destringcare 0.0.4 removes its dependency 'pycrypto' to fix security vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does destringcare version less then 0.0.4 have ### Response: Having vulnarability CVE-2018-6594 Advisory: Destringcare 0.0.4 removes its dependency 'pycrypto' to fix security vulnerabilities." }, { "instruction": "what vulnarability does determined version less then 0.12.12rc0 have", "input": "", "output": "Having vulnarability CVE-2020-8203 Advisory: Determined 0.12.12rc0 updates its NPM dependency 'lodash' to v4.17.19 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does determined version less then 0.12.12rc0 have ### Response: Having vulnarability CVE-2020-8203 Advisory: Determined 0.12.12rc0 updates its NPM dependency 'lodash' to v4.17.19 to include a security fix." }, { "instruction": "what vulnarability does devpi-ldap version less then 2.0.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Devpi-Ldap 2.0.0 includes a security patch for the function 'init' in 'devpi_ldap/main.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/devpi/devpi-ldap/commit/8da2b3c1ed44e8223ce006a3737dc6a8446e945d#diff-ecbfd22333fa5942c9fe7a999189222d1ca71d72a1a89d7a1f55d559671eb200", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does devpi-ldap version less then 2.0.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Devpi-Ldap 2.0.0 includes a security patch for the function 'init' in 'devpi_ldap/main.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/devpi/devpi-ldap/commit/8da2b3c1ed44e8223ce006a3737dc6a8446e945d#diff-ecbfd22333fa5942c9fe7a999189222d1ca71d72a1a89d7a1f55d559671eb200" }, { "instruction": "what vulnarability does dfetch version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2023-63112 Advisory: Dfetch 0.6.0 introduces security enhancements to prevent path traversal attacks for dst path. The tool now checks if the destination path is within the directory tree, ensures uniqueness of destinations, and verifies casing consistency with the system.\r\nhttps://github.com/dfetch-org/dfetch/commit/02a4f2500821e980a1605effed219cc7952a37a6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dfetch version less then 0.6.0 have ### Response: Having vulnarability PVE-2023-63112 Advisory: Dfetch 0.6.0 introduces security enhancements to prevent path traversal attacks for dst path. The tool now checks if the destination path is within the directory tree, ensures uniqueness of destinations, and verifies casing consistency with the system.\r\nhttps://github.com/dfetch-org/dfetch/commit/02a4f2500821e980a1605effed219cc7952a37a6" }, { "instruction": "what vulnarability does dgl version less then 0.8.2 have", "input": "", "output": "Having vulnarability PVE-2024-64038 Advisory: DGL 0.8.2 introduces a fix for a race condition encountered in its distributed machine learning algorithms, specifically SparseAdam and SparseAdagrad. It was causing inconsistent parameter updates during concurrent operations, impacted the accuracy and reliability of the learning models. This fix is crucial for applications using DGL for complex graph data processing, as it guarantees more accurate and dependable outcomes in training and inference phases. \r\nhttps://github.com/dmlc/dgl/pull/3971/files", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dgl version less then 0.8.2 have ### Response: Having vulnarability PVE-2024-64038 Advisory: DGL 0.8.2 introduces a fix for a race condition encountered in its distributed machine learning algorithms, specifically SparseAdam and SparseAdagrad. It was causing inconsistent parameter updates during concurrent operations, impacted the accuracy and reliability of the learning models. This fix is crucial for applications using DGL for complex graph data processing, as it guarantees more accurate and dependable outcomes in training and inference phases. \r\nhttps://github.com/dmlc/dgl/pull/3971/files" }, { "instruction": "what vulnarability does diamondback version less then 5.0.1 have", "input": "", "output": "Having vulnarability CVE-2023-50447 Advisory: Diamondback version 5.0.1 updates its dependency to include Pillow version 10.2.0, specifically to address vulnerabilities that could potentially lead to arbitrary code execution associated with earlier versions of Pillow.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diamondback version less then 5.0.1 have ### Response: Having vulnarability CVE-2023-50447 Advisory: Diamondback version 5.0.1 updates its dependency to include Pillow version 10.2.0, specifically to address vulnerabilities that could potentially lead to arbitrary code execution associated with earlier versions of Pillow." }, { "instruction": "what vulnarability does diango version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45420 Advisory: Diango is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diango version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45420 Advisory: Diango is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/" }, { "instruction": "what vulnarability does didjvu version less then 0.4 have", "input": "", "output": "Having vulnarability PVE-2023-53578 Advisory: Didjvu 0.4 includes a security fix: Insecure use of /tmp when executing c44.\r\nhttps://github.com/jwilk/didjvu/issues/8", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does didjvu version less then 0.4 have ### Response: Having vulnarability PVE-2023-53578 Advisory: Didjvu 0.4 includes a security fix: Insecure use of /tmp when executing c44.\r\nhttps://github.com/jwilk/didjvu/issues/8" }, { "instruction": "what vulnarability does diffoscope version less then 256 have", "input": "", "output": "Having vulnarability CVE-2024-25711 Advisory: diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffoscope version less then 256 have ### Response: Having vulnarability CVE-2024-25711 Advisory: diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted." }, { "instruction": "what vulnarability does diffpriv version less then 1.0.0rc1 have", "input": "", "output": "Having vulnarability PVE-2021-40539 Advisory: Diffpriv 1.0.0rc1 includes a security fix: with the 'diff' and 'enc' modules, parameters were stored in Python memory, and never removed. This commit deletes these parameters and helps prevent attackers from gaining access to these parameters, which can help them gain access to the original text and/or data.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffpriv version less then 1.0.0rc1 have ### Response: Having vulnarability PVE-2021-40539 Advisory: Diffpriv 1.0.0rc1 includes a security fix: with the 'diff' and 'enc' modules, parameters were stored in Python memory, and never removed. This commit deletes these parameters and helps prevent attackers from gaining access to these parameters, which can help them gain access to the original text and/or data." }, { "instruction": "what vulnarability does diffsync version less then 1.4.0 have", "input": "", "output": "Having vulnarability CVE-2021-29510 Advisory: Diffsync 1.4.0 updates its dependency 'pydantic' minimum version to v1.7.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffsync version less then 1.4.0 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Diffsync 1.4.0 updates its dependency 'pydantic' minimum version to v1.7.4 to include a security fix." }, { "instruction": "what vulnarability does digger version less then 6697d1269d981e35e11f240725b16401b5ce3db5 have", "input": "", "output": "Having vulnarability CVE-2021-44556 Advisory: National Library of the Netherlands digger < 6697d1269d981e35e11f240725b16401b5ce3db5 is affected by a XML External Entity (XXE) vulnerability. Since XML parsing resolves external entities, a malicious XML stream could leak internal files and/or cause a DoS.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does digger version less then 6697d1269d981e35e11f240725b16401b5ce3db5 have ### Response: Having vulnarability CVE-2021-44556 Advisory: National Library of the Netherlands digger < 6697d1269d981e35e11f240725b16401b5ce3db5 is affected by a XML External Entity (XXE) vulnerability. Since XML parsing resolves external entities, a malicious XML stream could leak internal files and/or cause a DoS." }, { "instruction": "what vulnarability does digitalmarketplace-utils version less then 22.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-39653 Advisory: Digitalmarketplace-utils versions before v22.0.0 included vulnerabilities where untrusted input might result in susceptibility to a cross-site scripting (XSS) exploit.\r\nhttps://github.com/Crown-Commercial-Service/digitalmarketplace-utils/pull/286", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does digitalmarketplace-utils version less then 22.0.0 have ### Response: Having vulnarability PVE-2021-39653 Advisory: Digitalmarketplace-utils versions before v22.0.0 included vulnerabilities where untrusted input might result in susceptibility to a cross-site scripting (XSS) exploit.\r\nhttps://github.com/Crown-Commercial-Service/digitalmarketplace-utils/pull/286" }, { "instruction": "what vulnarability does dipdup version less then 3.0.2 have", "input": "", "output": "Having vulnarability PVE-2024-64481 Advisory: Dipdup 3.0.2 fixes a race condition caused by event emitter concurrency.\r\nhttps://github.com/dipdup-io/dipdup/commit/03ea5e666fc06d447a8ad29033405a082a66e9fd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dipdup version less then 3.0.2 have ### Response: Having vulnarability PVE-2024-64481 Advisory: Dipdup 3.0.2 fixes a race condition caused by event emitter concurrency.\r\nhttps://github.com/dipdup-io/dipdup/commit/03ea5e666fc06d447a8ad29033405a082a66e9fd" }, { "instruction": "what vulnarability does dirac version less then 8.0.0a13 have", "input": "", "output": "Having vulnarability PVE-2022-44691 Advisory: Dirac 8.0.0a13 fixes an arbitrary code execution vulnerability in JEncode.\r\nhttps://github.com/DIRACGrid/DIRAC/pull/5810", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dirac version less then 8.0.0a13 have ### Response: Having vulnarability PVE-2022-44691 Advisory: Dirac 8.0.0a13 fixes an arbitrary code execution vulnerability in JEncode.\r\nhttps://github.com/DIRACGrid/DIRAC/pull/5810" }, { "instruction": "what vulnarability does directory-client-core version less then 5.1.1 have", "input": "", "output": "Having vulnarability CVE-2019-12781 Advisory: Directory-client-core 5.1.1 updates its dependency 'Django' to v1.11.22 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-client-core version less then 5.1.1 have ### Response: Having vulnarability CVE-2019-12781 Advisory: Directory-client-core 5.1.1 updates its dependency 'Django' to v1.11.22 to include security fixes." }, { "instruction": "what vulnarability does directory-components version less then 25.0.1 have", "input": "", "output": "Having vulnarability CVE-2018-3721 Advisory: Directory-components 25.0.1 updates its NPM dependency 'lodash.mergewith' to v4.6.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-components version less then 25.0.1 have ### Response: Having vulnarability CVE-2018-3721 Advisory: Directory-components 25.0.1 updates its NPM dependency 'lodash.mergewith' to v4.6.2 to include security fixes." }, { "instruction": "what vulnarability does directory-constants version less then 21.0.3 have", "input": "", "output": "Having vulnarability CVE-2021-35042 Advisory: Directory-constants 21.0.3 updates 'Django' to v3.2.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-constants version less then 21.0.3 have ### Response: Having vulnarability CVE-2021-35042 Advisory: Directory-constants 21.0.3 updates 'Django' to v3.2.5 to include a security fix." }, { "instruction": "what vulnarability does directory-healthcheck version less then 1.1.2 have", "input": "", "output": "Having vulnarability CVE-2018-7536 Advisory: Directory-healthcheck 1.1.2 updates its dependency 'Django' to v1.11.22 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-healthcheck version less then 1.1.2 have ### Response: Having vulnarability CVE-2018-7536 Advisory: Directory-healthcheck 1.1.2 updates its dependency 'Django' to v1.11.22 to include security fixes." }, { "instruction": "what vulnarability does dirsearch version less then 0.4.2 have", "input": "", "output": "Having vulnarability PVE-2021-40799 Advisory: Dirsearch 0.4.2 fixes a CSV Injection vulnerability. See also: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dirsearch version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-40799 Advisory: Dirsearch 0.4.2 fixes a CSV Injection vulnerability. See also: ." }, { "instruction": "what vulnarability does discogs-client version less then 2.2.2 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Discogs-client 2.2.2 updates dependency 'requests' to v2.20.0 to resolve security vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discogs-client version less then 2.2.2 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Discogs-client 2.2.2 updates dependency 'requests' to v2.20.0 to resolve security vulnerabilities." }, { "instruction": "what vulnarability does discord-dev version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-52937 Advisory: Discord-dev is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discord-dev version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52937 Advisory: Discord-dev is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls" }, { "instruction": "what vulnarability does discord-ext-slash version less then 0.2.3 have", "input": "", "output": "Having vulnarability PVE-2021-39641 Advisory: For some extra security, Discord-ext-slash 0.2.3 looks up commands by both their name and guild ID if their command ID fails to return any results (it returns a warning with 'SlashWarning' both times, and returns an error if still no command is found.)", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discord-ext-slash version less then 0.2.3 have ### Response: Having vulnarability PVE-2021-39641 Advisory: For some extra security, Discord-ext-slash 0.2.3 looks up commands by both their name and guild ID if their command ID fails to return any results (it returns a warning with 'SlashWarning' both times, and returns an error if still no command is found.)" }, { "instruction": "what vulnarability does discorder version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-52936 Advisory: Discorder is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discorder version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52936 Advisory: Discorder is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls" }, { "instruction": "what vulnarability does discordpie version less then 0.5.1 have", "input": "", "output": "Having vulnarability PVE-2021-38343 Advisory: Discordpie 0.5.1 includes a security patch. No details are given.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discordpie version less then 0.5.1 have ### Response: Having vulnarability PVE-2021-38343 Advisory: Discordpie 0.5.1 includes a security patch. No details are given." }, { "instruction": "what vulnarability does discordsafety version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45459 Advisory: DiscordSafety is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discordsafety version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45459 Advisory: DiscordSafety is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html" }, { "instruction": "what vulnarability does dispatch version less then 1.3.16 have", "input": "", "output": "Having vulnarability CVE-2021-28658 Advisory: Dispatch 1.3.16 updates its dependency 'Django' to v3.1.8 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dispatch version less then 1.3.16 have ### Response: Having vulnarability CVE-2021-28658 Advisory: Dispatch 1.3.16 updates its dependency 'Django' to v3.1.8 to include security fixes." }, { "instruction": "what vulnarability does distrib version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45425 Advisory: Distrib is a typosquatting package. It installs malware in your system that leaks your data.\r\nhttps://github.com/rsc-dev/pypi_malware", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does distrib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45425 Advisory: Distrib is a typosquatting package. It installs malware in your system that leaks your data.\r\nhttps://github.com/rsc-dev/pypi_malware" }, { "instruction": "what vulnarability does distributed version greather then equal to 0,less then 2021.10.0 have", "input": "", "output": "Having vulnarability CVE-2021-42343 Advisory: Distributed 2021.10.0 includes a fix for CVE-2021-42343: Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhst. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does distributed version greather then equal to 0,less then 2021.10.0 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Distributed 2021.10.0 includes a fix for CVE-2021-42343: Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhst. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution." }, { "instruction": "what vulnarability does divina version less then 0.1 have", "input": "", "output": "Having vulnarability PVE-2021-41294 Advisory: Divina 0.1 adds a security group with ssh access enabled on partitioning EC2.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does divina version less then 0.1 have ### Response: Having vulnarability PVE-2021-41294 Advisory: Divina 0.1 adds a security group with ssh access enabled on partitioning EC2." }, { "instruction": "what vulnarability does diycrate version less then 0.2.11.0 have", "input": "", "output": "Having vulnarability PVE-2021-41317 Advisory: Diycrate version 0.2.11.0 includes a security patch for the function 'oauth_dance' in 'diycrate/oauth_utils.py'. It contained requests calls with verify=False, disabling SSL certificate checks.\r\nhttps://github.com/jheld/diycrate/commit/40e51a586f16da215a3ff8096cfa64e23b0fa5cb#diff-7772b99d74abcfaa2bf013c9a4647b2b42cec23f84a79a5d4de0ef6973720971", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diycrate version less then 0.2.11.0 have ### Response: Having vulnarability PVE-2021-41317 Advisory: Diycrate version 0.2.11.0 includes a security patch for the function 'oauth_dance' in 'diycrate/oauth_utils.py'. It contained requests calls with verify=False, disabling SSL certificate checks.\r\nhttps://github.com/jheld/diycrate/commit/40e51a586f16da215a3ff8096cfa64e23b0fa5cb#diff-7772b99d74abcfaa2bf013c9a4647b2b42cec23f84a79a5d4de0ef6973720971" }, { "instruction": "what vulnarability does djago version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45421 Advisory: Djago is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djago version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45421 Advisory: Djago is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/" }, { "instruction": "what vulnarability does djanga version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45413 Advisory: Djanga is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djanga version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45413 Advisory: Djanga is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/" }, { "instruction": "what vulnarability does djangae version less then 0.9.4 have", "input": "", "output": "Having vulnarability CVE-2016-2513 Advisory: Djangae before 0.9.4 uses Django 1.7, which has known vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangae version less then 0.9.4 have ### Response: Having vulnarability CVE-2016-2513 Advisory: Djangae before 0.9.4 uses Django 1.7, which has known vulnerabilities." }, { "instruction": "what vulnarability does django version less then 0.91.1,greather then equal to 0.95a1,less then 0.95.2,greather then equal to 0.96a1,less then 0.96.1 have", "input": "", "output": "Having vulnarability CVE-2007-5712 Advisory: The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.\r\nhttps://www.djangoproject.com/weblog/2007/oct/26/security-fix", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django version less then 0.91.1,greather then equal to 0.95a1,less then 0.95.2,greather then equal to 0.96a1,less then 0.96.1 have ### Response: Having vulnarability CVE-2007-5712 Advisory: The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.\r\nhttps://www.djangoproject.com/weblog/2007/oct/26/security-fix" }, { "instruction": "what vulnarability does django-access-tokens version less then 0.9.2 have", "input": "", "output": "Having vulnarability PVE-2021-25736 Advisory: Django-access-tokens 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site.\r\nhttps://github.com/mohawkhq/django-access-tokens/compare/0.9.1...0.9.2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-access-tokens version less then 0.9.2 have ### Response: Having vulnarability PVE-2021-25736 Advisory: Django-access-tokens 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site.\r\nhttps://github.com/mohawkhq/django-access-tokens/compare/0.9.1...0.9.2" }, { "instruction": "what vulnarability does django-access-tokens-py3 version less then 0.9.2 have", "input": "", "output": "Having vulnarability PVE-2021-34892 Advisory: Django-access-tokens-py3 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site.\r\nhttps://github.com/ducminhgd/django-access-tokens-py3/compare/0.9.1...0.9.2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-access-tokens-py3 version less then 0.9.2 have ### Response: Having vulnarability PVE-2021-34892 Advisory: Django-access-tokens-py3 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site.\r\nhttps://github.com/ducminhgd/django-access-tokens-py3/compare/0.9.1...0.9.2" }, { "instruction": "what vulnarability does django-addon version less then 1.11.5.1 have", "input": "", "output": "Having vulnarability CVE-2017-12794 Advisory: Django-addon 1.11.5.1 updates its dependency 'django' to v1.11.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-addon version less then 1.11.5.1 have ### Response: Having vulnarability CVE-2017-12794 Advisory: Django-addon 1.11.5.1 updates its dependency 'django' to v1.11.5 to include a security fix." }, { "instruction": "what vulnarability does django-afip version greather then equal to 7.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-38705 Advisory: Django-afip 7.1.1 reduces TLS security for AFIP's servers. Sadly, AFIP only has insecure endpoints, so maintainers were forced to reduce security to talk to them.\r\nhttps://github.com/WhyNotHugo/django-afip/commit/51abdd1d83d81e979dcfba9eee23d9a33ae318c3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-afip version greather then equal to 7.1.1 have ### Response: Having vulnarability PVE-2021-38705 Advisory: Django-afip 7.1.1 reduces TLS security for AFIP's servers. Sadly, AFIP only has insecure endpoints, so maintainers were forced to reduce security to talk to them.\r\nhttps://github.com/WhyNotHugo/django-afip/commit/51abdd1d83d81e979dcfba9eee23d9a33ae318c3" }, { "instruction": "what vulnarability does django-airplane version less then equal to 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2020-13254 Advisory: Django-airplane 1.1.0 and prior depends on an insecure Django version (2.2.10).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-airplane version less then equal to 1.1.0 have ### Response: Having vulnarability CVE-2020-13254 Advisory: Django-airplane 1.1.0 and prior depends on an insecure Django version (2.2.10)." }, { "instruction": "what vulnarability does django-ajax-datatable version less then 4.1.4 have", "input": "", "output": "Having vulnarability PVE-2021-41834 Advisory: Django-ajax-datatable version 4.1.4 adds missing CSRF token header in the first POST call (initialize_table()).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ajax-datatable version less then 4.1.4 have ### Response: Having vulnarability PVE-2021-41834 Advisory: Django-ajax-datatable version 4.1.4 adds missing CSRF token header in the first POST call (initialize_table())." }, { "instruction": "what vulnarability does django-ajax-utilities version less then 1.2.9 have", "input": "", "output": "Having vulnarability CVE-2017-20182 Advisory: Django-ajax-utilities 1.2.9 includes a fix for CVE-2017-20182: This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument URL leads to cross-site scripting. The attack may be initiated remotely. \r\n#NOTE: The data we include in this advisory differs from the publicly available on nvd.nist.gov. The patch commit was issued for version 1.2.9.\r\nhttps://github.com/vikingco/django-ajax-utilities/pull/29/commits/329eb1dd1580ca1f9d4f95bc69939833226515c9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ajax-utilities version less then 1.2.9 have ### Response: Having vulnarability CVE-2017-20182 Advisory: Django-ajax-utilities 1.2.9 includes a fix for CVE-2017-20182: This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument URL leads to cross-site scripting. The attack may be initiated remotely. \r\n#NOTE: The data we include in this advisory differs from the publicly available on nvd.nist.gov. The patch commit was issued for version 1.2.9.\r\nhttps://github.com/vikingco/django-ajax-utilities/pull/29/commits/329eb1dd1580ca1f9d4f95bc69939833226515c9" }, { "instruction": "what vulnarability does django-allauth version less then 0.28.0 have", "input": "", "output": "Having vulnarability PVE-2021-25737 Advisory: Django-allauth before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.\r\nhttps://github.com/pennersr/django-allauth/commit/492ba9739b323cb66ef4020259c1db2d49cb6526", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allauth version less then 0.28.0 have ### Response: Having vulnarability PVE-2021-25737 Advisory: Django-allauth before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.\r\nhttps://github.com/pennersr/django-allauth/commit/492ba9739b323cb66ef4020259c1db2d49cb6526" }, { "instruction": "what vulnarability does django-allauth-underground version less then 0.28.0 have", "input": "", "output": "Having vulnarability PVE-2021-36394 Advisory: Django-allauth-underground before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.\r\nhttps://github.com/biwin/django-allauth-underground/commit/492ba9739b323cb66ef4020259c1db2d49cb6526", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allauth-underground version less then 0.28.0 have ### Response: Having vulnarability PVE-2021-36394 Advisory: Django-allauth-underground before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.\r\nhttps://github.com/biwin/django-allauth-underground/commit/492ba9739b323cb66ef4020259c1db2d49cb6526" }, { "instruction": "what vulnarability does django-allianceutils version less then 2.1.0 have", "input": "", "output": "Having vulnarability CVE-2021-44420 Advisory: Django-allianceutils 2.1.0 uses a new URL pattern adopted by Django core to include a security fix.\r\nhttps://github.com/AllianceSoftware/django-allianceutils/commit/eb4b60c463d6da860591b0335506e88b69b366af", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allianceutils version less then 2.1.0 have ### Response: Having vulnarability CVE-2021-44420 Advisory: Django-allianceutils 2.1.0 uses a new URL pattern adopted by Django core to include a security fix.\r\nhttps://github.com/AllianceSoftware/django-allianceutils/commit/eb4b60c463d6da860591b0335506e88b69b366af" }, { "instruction": "what vulnarability does django-anonymizer version less then 0.4 have", "input": "", "output": "Having vulnarability PVE-2021-25738 Advisory: Django-anonymizer 0.4 changes 'Anonymizer.attributes' to require every field to be listed. This deals with the common security problem when a model is updated, but the Anonymizer is not updated.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-anonymizer version less then 0.4 have ### Response: Having vulnarability PVE-2021-25738 Advisory: Django-anonymizer 0.4 changes 'Anonymizer.attributes' to require every field to be listed. This deals with the common security problem when a model is updated, but the Anonymizer is not updated." }, { "instruction": "what vulnarability does django-anymail version less then 1.4 have", "input": "", "output": "Having vulnarability CVE-2018-6596 Advisory: In django-anymail before 1.4 the webhook validation was vulnerable to a timing attack. An attacker could have used this to obtain the WEBHOOK_AUTHORIZATION shared secret, potentially allowing them to post fabricated or malicious email tracking events to the app.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-anymail version less then 1.4 have ### Response: Having vulnarability CVE-2018-6596 Advisory: In django-anymail before 1.4 the webhook validation was vulnerable to a timing attack. An attacker could have used this to obtain the WEBHOOK_AUTHORIZATION shared secret, potentially allowing them to post fabricated or malicious email tracking events to the app." }, { "instruction": "what vulnarability does django-appwrite version less then 1.3.0 have", "input": "", "output": "Having vulnarability PVE-2023-53266 Advisory: Django-appwrite 1.3.0 replaces the user ID with JSON Web Tokens (JWT) in communication with the Appwrite server. This change prevents potential risk of attempting to login by generating random IDs.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-appwrite version less then 1.3.0 have ### Response: Having vulnarability PVE-2023-53266 Advisory: Django-appwrite 1.3.0 replaces the user ID with JSON Web Tokens (JWT) in communication with the Appwrite server. This change prevents potential risk of attempting to login by generating random IDs." }, { "instruction": "what vulnarability does django-autocomplete-light version less then 2.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-25740 Advisory: Django-autocomplete-light before 2.3.0 when updating the queryset from outside the autocomplete class may lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly.\r\nhttps://github.com/yourlabs/django-autocomplete-light/pull/494", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-autocomplete-light version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-25740 Advisory: Django-autocomplete-light before 2.3.0 when updating the queryset from outside the autocomplete class may lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly.\r\nhttps://github.com/yourlabs/django-autocomplete-light/pull/494" }, { "instruction": "what vulnarability does django-autocomplete-light-bsc version less then 2.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-34497 Advisory: Django-autocomplete-light-bsc 2.3.0 watches changes to 'queryset'. Before, updating the queryset from outside the autocomplete class could lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly.\r\nhttps://github.com/yourlabs/django-autocomplete-light/commit/3cbc4dc92d3bc902d11e3b29a7f9ea9cc3f8dcb7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-autocomplete-light-bsc version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-34497 Advisory: Django-autocomplete-light-bsc 2.3.0 watches changes to 'queryset'. Before, updating the queryset from outside the autocomplete class could lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly.\r\nhttps://github.com/yourlabs/django-autocomplete-light/commit/3cbc4dc92d3bc902d11e3b29a7f9ea9cc3f8dcb7" }, { "instruction": "what vulnarability does django-awl version less then 0.23.1 have", "input": "", "output": "Having vulnarability CVE-2018-16984 Advisory: Django-awl 0.23.1 updates minimum requirements for Django to v2.1.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-awl version less then 0.23.1 have ### Response: Having vulnarability CVE-2018-16984 Advisory: Django-awl 0.23.1 updates minimum requirements for Django to v2.1.2 to include a security fix." }, { "instruction": "what vulnarability does django-axes version less then 5.20.0 have", "input": "", "output": "Having vulnarability PVE-2023-60088 Advisory: Django-axes 5.20.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/jazzband/django-axes/commit/93341a4d04dbb1772e5f9508789f2816e08db789", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-axes version less then 5.20.0 have ### Response: Having vulnarability PVE-2023-60088 Advisory: Django-axes 5.20.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/jazzband/django-axes/commit/93341a4d04dbb1772e5f9508789f2816e08db789" }, { "instruction": "what vulnarability does django-basic-auth-ip-whitelist version less then 0.3.4 have", "input": "", "output": "Having vulnarability CVE-2020-4071 Advisory: Django-basic-auth-ip-whitelist 0.3.4 fixes a potential timing attack if basic authentication is enabled.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-basic-auth-ip-whitelist version less then 0.3.4 have ### Response: Having vulnarability CVE-2020-4071 Advisory: Django-basic-auth-ip-whitelist 0.3.4 fixes a potential timing attack if basic authentication is enabled." }, { "instruction": "what vulnarability does django-basicauth version less then 0.4.2 have", "input": "", "output": "Having vulnarability PVE-2021-35076 Advisory: Django-basicauth before 0.4.2 is vulnerable to timing attacks.\r\nhttps://github.com/hirokiky/django-basicauth/commit/94ba948c5f6b8b2543570bda4c8f73737f249971", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-basicauth version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-35076 Advisory: Django-basicauth before 0.4.2 is vulnerable to timing attacks.\r\nhttps://github.com/hirokiky/django-basicauth/commit/94ba948c5f6b8b2543570bda4c8f73737f249971" }, { "instruction": "what vulnarability does django-bootstrap-icons version less then 0.8.6,greather then equal to 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2023-62660 Advisory: Django-bootstrap-icons 0.8.6 includes a fix for a XXE vulnerability.\r\nhttps://github.com/christianwgd/django-bootstrap-icons/commit/82c613ddc5b86c09265941198a04c17fab2aa82f\r\nhttps://github.com/christianwgd/django-bootstrap-icons/commit/fe697fee238271cf2bbae0da3842235ca8fb9271#diff-876bde05b2ccdc8dfd807690f323652f60ac2f737bf19babdc00f78ea7d9c0e4R4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-bootstrap-icons version less then 0.8.6,greather then equal to 0.6.0 have ### Response: Having vulnarability PVE-2023-62660 Advisory: Django-bootstrap-icons 0.8.6 includes a fix for a XXE vulnerability.\r\nhttps://github.com/christianwgd/django-bootstrap-icons/commit/82c613ddc5b86c09265941198a04c17fab2aa82f\r\nhttps://github.com/christianwgd/django-bootstrap-icons/commit/fe697fee238271cf2bbae0da3842235ca8fb9271#diff-876bde05b2ccdc8dfd807690f323652f60ac2f737bf19babdc00f78ea7d9c0e4R4" }, { "instruction": "what vulnarability does django-bootstrap4 version less then 2.3.0 have", "input": "", "output": "Having vulnarability CVE-2020-24583 Advisory: Django-bootstrap4 2.3.0 updates its dependency 'Django' to v3.1.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-bootstrap4 version less then 2.3.0 have ### Response: Having vulnarability CVE-2020-24583 Advisory: Django-bootstrap4 2.3.0 updates its dependency 'Django' to v3.1.2 to include security fixes." }, { "instruction": "what vulnarability does django-buckets version less then 0.1.20 have", "input": "", "output": "Having vulnarability CVE-2017-7234 Advisory: Django-buckets 0.1.20 updates its dependency 'Django' to v1.10.7 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-buckets version less then 0.1.20 have ### Response: Having vulnarability CVE-2017-7234 Advisory: Django-buckets 0.1.20 updates its dependency 'Django' to v1.10.7 to include security fixes." }, { "instruction": "what vulnarability does django-ca version less then 1.10.0 have", "input": "", "output": "Having vulnarability PVE-2021-37015 Advisory: django-ca 1.10.0 stores CA private keys in the more secure PKCS8 format.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ca version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-37015 Advisory: django-ca 1.10.0 stores CA private keys in the more secure PKCS8 format." }, { "instruction": "what vulnarability does django-cacheops version less then 4.0.6 have", "input": "", "output": "Having vulnarability PVE-2023-61998 Advisory: Django-cacheops 4.0.6 includes a security fix: Catastrophic backtracking in template extensions.\r\nhttps://github.com/Suor/django-cacheops/commit/adba2dc9908c50157d417fd7564669c11ed23b2a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cacheops version less then 4.0.6 have ### Response: Having vulnarability PVE-2023-61998 Advisory: Django-cacheops 4.0.6 includes a security fix: Catastrophic backtracking in template extensions.\r\nhttps://github.com/Suor/django-cacheops/commit/adba2dc9908c50157d417fd7564669c11ed23b2a" }, { "instruction": "what vulnarability does django-cas-server version less then 0.9.0 have", "input": "", "output": "Having vulnarability PVE-2022-51465 Advisory: Django-cas-server 0.9.0 fixes a XSS vulnerability.\r\nhttps://github.com/nitmir/django-cas-server/commit/971cde093ce5af5aac9ced93c85b92c40e6e5665", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cas-server version less then 0.9.0 have ### Response: Having vulnarability PVE-2022-51465 Advisory: Django-cas-server 0.9.0 fixes a XSS vulnerability.\r\nhttps://github.com/nitmir/django-cas-server/commit/971cde093ce5af5aac9ced93c85b92c40e6e5665" }, { "instruction": "what vulnarability does django-celery-results version less then equal to 1.2.1 have", "input": "", "output": "Having vulnarability CVE-2020-17495 Advisory: Django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. See CVE-2020-17495.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-celery-results version less then equal to 1.2.1 have ### Response: Having vulnarability CVE-2020-17495 Advisory: Django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. See CVE-2020-17495." }, { "instruction": "what vulnarability does django-cms version less then 2.1.3 have", "input": "", "output": "Having vulnarability PVE-2021-25741 Advisory: Django-cms 2.1.3 fixes a serious security issue in PlaceholderAdmin that allowed any active staff user to add, edit and delete any plugin.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cms version less then 2.1.3 have ### Response: Having vulnarability PVE-2021-25741 Advisory: Django-cms 2.1.3 fixes a serious security issue in PlaceholderAdmin that allowed any active staff user to add, edit and delete any plugin." }, { "instruction": "what vulnarability does django-cms-patched version less then 3.0.17 have", "input": "", "output": "Having vulnarability CVE-2021-44649 Advisory: Django-cms-patched 2.3.5 is vulnerable to CVE-2021-44649.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cms-patched version less then 3.0.17 have ### Response: Having vulnarability CVE-2021-44649 Advisory: Django-cms-patched 2.3.5 is vulnerable to CVE-2021-44649." }, { "instruction": "what vulnarability does django-codenerix version less then 4.0.10 have", "input": "", "output": "Having vulnarability CVE-2022-34265 Advisory: Django-codenerix 4.0.10 updates its 'Django' requirement to '>=4.0.6' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-codenerix version less then 4.0.10 have ### Response: Having vulnarability CVE-2022-34265 Advisory: Django-codenerix 4.0.10 updates its 'Django' requirement to '>=4.0.6' to include a security fix." }, { "instruction": "what vulnarability does django-cors-headers version less then 3.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-37132 Advisory: Django-cors-headers version 3.0.0 fixes a security issue where the CORS middleware would allow requests between schemes, for example from insecure 'http://' origins to a secure 'https://' site. Now you will need to update your whitelist to include schemes, for example from this:\r\nCORS_ORIGIN_WHITELIST = ['example.com']\r\nto this:\r\nCORS_ORIGIN_WHITELIST = ['https://example.com']\r\nhttps://github.com/adamchainz/django-cors-headers/issues/259", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cors-headers version less then 3.0.0 have ### Response: Having vulnarability PVE-2021-37132 Advisory: Django-cors-headers version 3.0.0 fixes a security issue where the CORS middleware would allow requests between schemes, for example from insecure 'http://' origins to a secure 'https://' site. Now you will need to update your whitelist to include schemes, for example from this:\r\nCORS_ORIGIN_WHITELIST = ['example.com']\r\nto this:\r\nCORS_ORIGIN_WHITELIST = ['https://example.com']\r\nhttps://github.com/adamchainz/django-cors-headers/issues/259" }, { "instruction": "what vulnarability does django-councilmatic version less then 2.5.9 have", "input": "", "output": "Having vulnarability PVE-2021-38708 Advisory: Django-councilmatic 2.5.9 patches a XSS vulnerability when using filter options. \r\nhttps://github.com/datamade/django-councilmatic/issues/270\r\nhttps://github.com/datamade/django-councilmatic/pull/271", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-councilmatic version less then 2.5.9 have ### Response: Having vulnarability PVE-2021-38708 Advisory: Django-councilmatic 2.5.9 patches a XSS vulnerability when using filter options. \r\nhttps://github.com/datamade/django-councilmatic/issues/270\r\nhttps://github.com/datamade/django-councilmatic/pull/271" }, { "instruction": "what vulnarability does django-countries version less then 3.4 have", "input": "", "output": "Having vulnarability PVE-2021-25747 Advisory: Django-countries 3.4 fixes a escaping issue in CountrySelectWidget that could lead to XSS.\r\nhttps://github.com/SmileyChris/django-countries/commit/1ed7c6763d890d00f32242202b424709e8668d5a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-countries version less then 3.4 have ### Response: Having vulnarability PVE-2021-25747 Advisory: Django-countries 3.4 fixes a escaping issue in CountrySelectWidget that could lead to XSS.\r\nhttps://github.com/SmileyChris/django-countries/commit/1ed7c6763d890d00f32242202b424709e8668d5a" }, { "instruction": "what vulnarability does django-crispy-forms version less then 1.1.4 have", "input": "", "output": "Having vulnarability PVE-2021-25751 Advisory: Django-crispy-forms 1.1.4 fixes a thread safety issue with 'CrispyFieldNode'. This avoids leaking information between requests in multithreaded WSGI servers.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-crispy-forms version less then 1.1.4 have ### Response: Having vulnarability PVE-2021-25751 Advisory: Django-crispy-forms 1.1.4 fixes a thread safety issue with 'CrispyFieldNode'. This avoids leaking information between requests in multithreaded WSGI servers." }, { "instruction": "what vulnarability does django-crm version less then equal to 0.2 have", "input": "", "output": "Having vulnarability CVE-2018-16552 Advisory: MicroPyramid Django-CRM 0.2 does not use CSRF token for /users/create/, /users/##/edit/, and /accounts/##/delete/ URIs.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-crm version less then equal to 0.2 have ### Response: Having vulnarability CVE-2018-16552 Advisory: MicroPyramid Django-CRM 0.2 does not use CSRF token for /users/create/, /users/##/edit/, and /accounts/##/delete/ URIs." }, { "instruction": "what vulnarability does django-dajaxice-ng version less then 0.1.7 have", "input": "", "output": "Having vulnarability PVE-2021-25753 Advisory: Django-dajaxice-ng 0.1.7 fixes the dajaxice callback model to improve security against XSS attacks.\r\nhttps://github.com/ifanrx/django-dajaxice/commit/cd56cde9d9f4f0bea56e97fe86513553669ad187", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dajaxice-ng version less then 0.1.7 have ### Response: Having vulnarability PVE-2021-25753 Advisory: Django-dajaxice-ng 0.1.7 fixes the dajaxice callback model to improve security against XSS attacks.\r\nhttps://github.com/ifanrx/django-dajaxice/commit/cd56cde9d9f4f0bea56e97fe86513553669ad187" }, { "instruction": "what vulnarability does django-debug-toolbar version less then 1.11.1,greather then 2,less then 2.2.1,greather then 3,less then 3.2.1 have", "input": "", "output": "Having vulnarability CVE-2021-30459 Advisory: A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form. See CVE-2021-30459.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-debug-toolbar version less then 1.11.1,greather then 2,less then 2.2.1,greather then 3,less then 3.2.1 have ### Response: Having vulnarability CVE-2021-30459 Advisory: A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form. See CVE-2021-30459." }, { "instruction": "what vulnarability does django-descope version less then 1.3.0 have", "input": "", "output": "Having vulnarability CVE-2023-36053 Advisory: Django-descope 1.3.0 updates its dependency 'django' to v4.2.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-descope version less then 1.3.0 have ### Response: Having vulnarability CVE-2023-36053 Advisory: Django-descope 1.3.0 updates its dependency 'django' to v4.2.3 to include a security fix." }, { "instruction": "what vulnarability does django-discord-bind version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-25754 Advisory: django-discord-bind 0.2.0 added state validation to prevent CSRF attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-discord-bind version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-25754 Advisory: django-discord-bind 0.2.0 added state validation to prevent CSRF attacks." }, { "instruction": "what vulnarability does django-djet2 version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2022-51366 Advisory: Django-djet2 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.\r\nhttps://github.com/djungle-io/django-djet2/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-djet2 version less then 1.0.4 have ### Response: Having vulnarability PVE-2022-51366 Advisory: Django-djet2 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.\r\nhttps://github.com/djungle-io/django-djet2/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9" }, { "instruction": "what vulnarability does django-dsfr version less then 0.6.2 have", "input": "", "output": "Having vulnarability CVE-2021-45116 Advisory: Django-dsfr 0.6.2 updates its dependency 'Django' to v3.2.12 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dsfr version less then 0.6.2 have ### Response: Having vulnarability CVE-2021-45116 Advisory: Django-dsfr 0.6.2 updates its dependency 'Django' to v3.2.12 to include security fixes." }, { "instruction": "what vulnarability does django-dynamic-breadcrumbs version less then 0.4.3 have", "input": "", "output": "Having vulnarability PVE-2023-61314 Advisory: Django-dynamic-breadcrumbs 0.4.3 includes a fix for a potential XSS vulnerability.\r\nhttps://github.com/marcanuy/django-dynamic-breadcrumbs/pull/6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dynamic-breadcrumbs version less then 0.4.3 have ### Response: Having vulnarability PVE-2023-61314 Advisory: Django-dynamic-breadcrumbs 0.4.3 includes a fix for a potential XSS vulnerability.\r\nhttps://github.com/marcanuy/django-dynamic-breadcrumbs/pull/6" }, { "instruction": "what vulnarability does django-embed-video version less then 0.3 have", "input": "", "output": "Having vulnarability PVE-2021-25755 Advisory: Django-embed-video 0.3 treats faked urls as invalid.\r\nhttps://github.com/jazzband/django-embed-video/commit/d0d357b767e324a7cc21b5035357fdfbc7c8ce8e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-embed-video version less then 0.3 have ### Response: Having vulnarability PVE-2021-25755 Advisory: Django-embed-video 0.3 treats faked urls as invalid.\r\nhttps://github.com/jazzband/django-embed-video/commit/d0d357b767e324a7cc21b5035357fdfbc7c8ce8e" }, { "instruction": "what vulnarability does django-envelope version less then 0.4.1 have", "input": "", "output": "Having vulnarability PVE-2021-25756 Advisory: Django-envelope 0.4.1 fixes an information disclosure vulnerability. If django-envelope prefilled forms, all non-logged in users could see pre-filled data.\r\nhttps://github.com/zsiciarz/django-envelope/pull/7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-envelope version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-25756 Advisory: Django-envelope 0.4.1 fixes an information disclosure vulnerability. If django-envelope prefilled forms, all non-logged in users could see pre-filled data.\r\nhttps://github.com/zsiciarz/django-envelope/pull/7" }, { "instruction": "what vulnarability does django-epiced version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-34269 Advisory: django-epiced before 0.3.0 does not escape HTML output by default.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-epiced version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-34269 Advisory: django-epiced before 0.3.0 does not escape HTML output by default." }, { "instruction": "what vulnarability does django-epiceditor version less then equal to 0.2.3 have", "input": "", "output": "Having vulnarability CVE-2017-6591 Advisory: There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-epiceditor version less then equal to 0.2.3 have ### Response: Having vulnarability CVE-2017-6591 Advisory: There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field." }, { "instruction": "what vulnarability does django-error-report-2 version less then 0.4.2 have", "input": "", "output": "Having vulnarability PVE-2023-60231 Advisory: Django-error-report-2 0.4.2 includes a fix for a CSRF vulnerability.\r\nhttps://github.com/matmair/django-error-report-2/pull/6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-error-report-2 version less then 0.4.2 have ### Response: Having vulnarability PVE-2023-60231 Advisory: Django-error-report-2 0.4.2 includes a fix for a CSRF vulnerability.\r\nhttps://github.com/matmair/django-error-report-2/pull/6" }, { "instruction": "what vulnarability does django-fernet-fields version less then 0.3 have", "input": "", "output": "Having vulnarability PVE-2021-25757 Advisory: Django-fernet-fields 0.3 removes DualField and HashField. The only cases where they are useful, they aren't secure.\r\nhttps://github.com/orcasgit/django-fernet-fields/commit/b2c5fbf3eff53b2f19f116d626bc2496922882c2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-fernet-fields version less then 0.3 have ### Response: Having vulnarability PVE-2021-25757 Advisory: Django-fernet-fields 0.3 removes DualField and HashField. The only cases where they are useful, they aren't secure.\r\nhttps://github.com/orcasgit/django-fernet-fields/commit/b2c5fbf3eff53b2f19f116d626bc2496922882c2" }, { "instruction": "what vulnarability does django-fiber version less then 0.9.9.1 have", "input": "", "output": "Having vulnarability PVE-2021-25758 Advisory: Django-fiber 0.9.9.1 changes permission check in API from IsAuthenticated to IsAdminUser.\r\nhttps://github.com/django-fiber/django-fiber/commit/3c362920e5624fc457b5c74fd51d459340a74dd0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-fiber version less then 0.9.9.1 have ### Response: Having vulnarability PVE-2021-25758 Advisory: Django-fiber 0.9.9.1 changes permission check in API from IsAuthenticated to IsAdminUser.\r\nhttps://github.com/django-fiber/django-fiber/commit/3c362920e5624fc457b5c74fd51d459340a74dd0" }, { "instruction": "what vulnarability does django-file-form version less then 3.1.1 have", "input": "", "output": "Having vulnarability PVE-2022-49240 Advisory: Django-file-form 3.1.1 adds cross-site request forgery protection to tus uploads using the standard Django CSRF token.\r\nhttps://github.com/mbraak/django-file-form/commit/de5180dbc12daec70e24a70054ed6334656b3ea6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-file-form version less then 3.1.1 have ### Response: Having vulnarability PVE-2022-49240 Advisory: Django-file-form 3.1.1 adds cross-site request forgery protection to tus uploads using the standard Django CSRF token.\r\nhttps://github.com/mbraak/django-file-form/commit/de5180dbc12daec70e24a70054ed6334656b3ea6" }, { "instruction": "what vulnarability does django-filer version less then 3.0.0rc1 have", "input": "", "output": "Having vulnarability PVE-2023-59208 Advisory: Django-filer 3.0.0rc1 includes a fix for a XSS vulnerability.\r\nhttps://github.com/django-cms/django-filer/pull/1364", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-filer version less then 3.0.0rc1 have ### Response: Having vulnarability PVE-2023-59208 Advisory: Django-filer 3.0.0rc1 includes a fix for a XSS vulnerability.\r\nhttps://github.com/django-cms/django-filer/pull/1364" }, { "instruction": "what vulnarability does django-filter version less then 2.4.0 have", "input": "", "output": "Having vulnarability CVE-2020-15225 Advisory: Django-filter 2.4.0 includes a fix for CVE-2020-15225: In django-filter before version 2.4.0, automatically generated 'NumberFilter' instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a 'MaxValueValidator' with a a default 'limit_value' of 1e50 to the form field used by 'NumberFilter' instances. In addition, 'NumberFilter' implements the new 'get_max_validator()' which should return a configured validator instance to customise the limit, or else 'None' to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.\r\nhttps://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-filter version less then 2.4.0 have ### Response: Having vulnarability CVE-2020-15225 Advisory: Django-filter 2.4.0 includes a fix for CVE-2020-15225: In django-filter before version 2.4.0, automatically generated 'NumberFilter' instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a 'MaxValueValidator' with a a default 'limit_value' of 1e50 to the form field used by 'NumberFilter' instances. In addition, 'NumberFilter' implements the new 'get_max_validator()' which should return a configured validator instance to customise the limit, or else 'None' to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.\r\nhttps://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973" }, { "instruction": "what vulnarability does django-formidable version less then 4.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-37875 Advisory: Django-formidable 4.0.0 adds an XSS prevention mechanism.\r\nhttps://github.com/peopledoc/django-formidable/pull/378/commits/e6e5392823e78bb17259b1d4ed45182e34c13dd7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-formidable version less then 4.0.0 have ### Response: Having vulnarability PVE-2021-37875 Advisory: Django-formidable 4.0.0 adds an XSS prevention mechanism.\r\nhttps://github.com/peopledoc/django-formidable/pull/378/commits/e6e5392823e78bb17259b1d4ed45182e34c13dd7" }, { "instruction": "what vulnarability does django-friendship version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-25762 Advisory: django-friendship 1.2.0 fixes a security issue where the library was not checking the owner of a FriendRequest during accept and cancelation.\r\nhttps://github.com/revsys/django-friendship/commit/b522463cb5a04240b1aeb1b7c06559fa1450ab4a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-friendship version less then 1.2.0 have ### Response: Having vulnarability PVE-2021-25762 Advisory: django-friendship 1.2.0 fixes a security issue where the library was not checking the owner of a FriendRequest during accept and cancelation.\r\nhttps://github.com/revsys/django-friendship/commit/b522463cb5a04240b1aeb1b7c06559fa1450ab4a" }, { "instruction": "what vulnarability does django-froala-editor version less then 4.0.11 have", "input": "", "output": "Having vulnarability PVE-2022-48522 Advisory: Django-froala-editor 4.0.11 fixes XSS vulnerability in [insert video].", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-froala-editor version less then 4.0.11 have ### Response: Having vulnarability PVE-2022-48522 Advisory: Django-froala-editor 4.0.11 fixes XSS vulnerability in [insert video]." }, { "instruction": "what vulnarability does django-grappelli version less then 2.15.2 have", "input": "", "output": "Having vulnarability CVE-2021-46898 Advisory: Django-grappelli 2.15.2 includes a fix for CVE-2021-46898: views/switch.py in django-grappelli before 2.15.2 attempts to prevent external redirection with startswith(\"/\") but this does not consider a protocol-relative URL (e.g., //example.com) attack.\r\nhttps://github.com/sehmaschine/django-grappelli/issues/975", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-grappelli version less then 2.15.2 have ### Response: Having vulnarability CVE-2021-46898 Advisory: Django-grappelli 2.15.2 includes a fix for CVE-2021-46898: views/switch.py in django-grappelli before 2.15.2 attempts to prevent external redirection with startswith(\"/\") but this does not consider a protocol-relative URL (e.g., //example.com) attack.\r\nhttps://github.com/sehmaschine/django-grappelli/issues/975" }, { "instruction": "what vulnarability does django-guts version less then 0.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-25763 Advisory: Django-guts 0.1.1 fixes a security issue that allowed anyone to read any file.\r\nhttps://github.com/svetlyak40wt/django-guts/commit/2ee837eda79aaa7f957482f6cfd485863179fd8b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-guts version less then 0.1.1 have ### Response: Having vulnarability PVE-2021-25763 Advisory: Django-guts 0.1.1 fixes a security issue that allowed anyone to read any file.\r\nhttps://github.com/svetlyak40wt/django-guts/commit/2ee837eda79aaa7f957482f6cfd485863179fd8b" }, { "instruction": "what vulnarability does django-hashedfilenamestorage version less then 2.4 have", "input": "", "output": "Having vulnarability CVE-2018-14574 Advisory: Django-hashedfilenamestorage 2.4 updates Django dependency requirement to >=2.0.8 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hashedfilenamestorage version less then 2.4 have ### Response: Having vulnarability CVE-2018-14574 Advisory: Django-hashedfilenamestorage 2.4 updates Django dependency requirement to >=2.0.8 to include security fixes." }, { "instruction": "what vulnarability does django-hashid-field version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-38508 Advisory: Django-hashid-field 1.0.0 fixes a security issue. It has been pointed out that it's possible to discover the salt used when encoding Hashids. Thereby, it is very dangerous to use settings.SECRET_KEY, as an attacker may be able to get SECRET_KEY from HashidFields.\r\nhttps://github.com/nshafer/django-hashid-field/commit/3e3017367d569c08de49f7b0c9fe1e06e9cb7114", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hashid-field version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-38508 Advisory: Django-hashid-field 1.0.0 fixes a security issue. It has been pointed out that it's possible to discover the salt used when encoding Hashids. Thereby, it is very dangerous to use settings.SECRET_KEY, as an attacker may be able to get SECRET_KEY from HashidFields.\r\nhttps://github.com/nshafer/django-hashid-field/commit/3e3017367d569c08de49f7b0c9fe1e06e9cb7114" }, { "instruction": "what vulnarability does django-haystack version less then 1.1 have", "input": "", "output": "Having vulnarability PVE-2021-25764 Advisory: Django-haystack 1.1 removes insecure use of 'eval' from the Whoosh backend.\r\nhttps://github.com/django-haystack/django-haystack/commit/e0dc369cc12621df51bc8f807ff5ef728131e6ea", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-haystack version less then 1.1 have ### Response: Having vulnarability PVE-2021-25764 Advisory: Django-haystack 1.1 removes insecure use of 'eval' from the Whoosh backend.\r\nhttps://github.com/django-haystack/django-haystack/commit/e0dc369cc12621df51bc8f807ff5ef728131e6ea" }, { "instruction": "what vulnarability does django-heartbeat version less then 2.0.3 have", "input": "", "output": "Having vulnarability CVE-2019-18874 Advisory: Django-heartbeat 2.0.3 updates its dependency 'psutil' to v5.7.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-heartbeat version less then 2.0.3 have ### Response: Having vulnarability CVE-2019-18874 Advisory: Django-heartbeat 2.0.3 updates its dependency 'psutil' to v5.7.0 to include a security fix." }, { "instruction": "what vulnarability does django-helpdesk version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2021-3950 Advisory: Django-helpdesk 0.3.1 includes a fix for CVE-2021-3950: Django-helpdesk is vulnerable to improper neutralization of input during web page generation ('Cross-site Scripting').\r\nhttps://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e\r\nhttps://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-helpdesk version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-3950 Advisory: Django-helpdesk 0.3.1 includes a fix for CVE-2021-3950: Django-helpdesk is vulnerable to improper neutralization of input during web page generation ('Cross-site Scripting').\r\nhttps://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e\r\nhttps://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60" }, { "instruction": "what vulnarability does django-hijack version less then 1.0.7 have", "input": "", "output": "Having vulnarability PVE-2021-25765 Advisory: Django-hijack before 1.0.7 fixes a HTML injection vulnerability in admin.\r\nhttps://github.com/django-hijack/django-hijack/commit/4ad17c88629fed8bfad93e3c0a59ee3792c61ca4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hijack version less then 1.0.7 have ### Response: Having vulnarability PVE-2021-25765 Advisory: Django-hijack before 1.0.7 fixes a HTML injection vulnerability in admin.\r\nhttps://github.com/django-hijack/django-hijack/commit/4ad17c88629fed8bfad93e3c0a59ee3792c61ca4" }, { "instruction": "what vulnarability does django-howl version less then 1.0.4 have", "input": "", "output": "Having vulnarability CVE-2019-12308 Advisory: Django-howl 1.0.4 updates Django to v2.2.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-howl version less then 1.0.4 have ### Response: Having vulnarability CVE-2019-12308 Advisory: Django-howl 1.0.4 updates Django to v2.2.2 to include a security fix." }, { "instruction": "what vulnarability does django-html5-appcache version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-25766 Advisory: django-html5-appcache 0.3.0 added a security check for sensitive views.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-html5-appcache version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-25766 Advisory: django-html5-appcache 0.3.0 added a security check for sensitive views." }, { "instruction": "what vulnarability does django-idempotency-key version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2020-6817 Advisory: Django-idempotency-key 1.1.0 updates the minimum version of its dependency 'bleach' to v3.1.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-idempotency-key version less then 1.1.0 have ### Response: Having vulnarability CVE-2020-6817 Advisory: Django-idempotency-key 1.1.0 updates the minimum version of its dependency 'bleach' to v3.1.4 to include a security fix." }, { "instruction": "what vulnarability does django-idom version less then 0.0.2 have", "input": "", "output": "Having vulnarability PVE-2023-54819 Advisory: Django-idom 0.0.2 includes a fix for a potential directory traversal vulnerability.\r\nhttps://github.com/reactive-python/reactpy-django/pull/45", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-idom version less then 0.0.2 have ### Response: Having vulnarability PVE-2023-54819 Advisory: Django-idom 0.0.2 includes a fix for a potential directory traversal vulnerability.\r\nhttps://github.com/reactive-python/reactpy-django/pull/45" }, { "instruction": "what vulnarability does django-initial-avatars version less then 0.5.0 have", "input": "", "output": "Having vulnarability PVE-2021-25768 Advisory: Django-initial-avatars 0.5.0 uses user_id instead of user_username for the url to prevent information exposure.\r\nhttps://github.com/axiome-oss/django-initial-avatars/commit/c8741d902ed8596e07966ad358d20f1339a2e35d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-initial-avatars version less then 0.5.0 have ### Response: Having vulnarability PVE-2021-25768 Advisory: Django-initial-avatars 0.5.0 uses user_id instead of user_username for the url to prevent information exposure.\r\nhttps://github.com/axiome-oss/django-initial-avatars/commit/c8741d902ed8596e07966ad358d20f1339a2e35d" }, { "instruction": "what vulnarability does django-jet version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2021-25769 Advisory: Django-jet 1.0.4 fixes a security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.\r\nhttps://github.com/geex-arts/django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-jet version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-25769 Advisory: Django-jet 1.0.4 fixes a security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.\r\nhttps://github.com/geex-arts/django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9" }, { "instruction": "what vulnarability does django-jet-reboot version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2021-39370 Advisory: Django-jet-reboot 1.0.4 fixes a security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.\r\nhttps://github.com/assem-ch/django-jet-reboot/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-jet-reboot version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-39370 Advisory: Django-jet-reboot 1.0.4 fixes a security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.\r\nhttps://github.com/assem-ch/django-jet-reboot/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9" }, { "instruction": "what vulnarability does django-jinja-knockout version less then 0.4.1 have", "input": "", "output": "Having vulnarability PVE-2022-49483 Advisory: Django-jinja-knockout 0.4.1 adds more sanity checks in queries and views modules.\r\nhttps://github.com/Dmitri-Sintsov/django-jinja-knockout/commit/0c427d13b3de32a2b69c24927b95fc2e46c9a16c\r\nhttps://github.com/Dmitri-Sintsov/django-jinja-knockout/commit/30c41225e366e0010da47aeeb1ac2e1f2c46f54d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-jinja-knockout version less then 0.4.1 have ### Response: Having vulnarability PVE-2022-49483 Advisory: Django-jinja-knockout 0.4.1 adds more sanity checks in queries and views modules.\r\nhttps://github.com/Dmitri-Sintsov/django-jinja-knockout/commit/0c427d13b3de32a2b69c24927b95fc2e46c9a16c\r\nhttps://github.com/Dmitri-Sintsov/django-jinja-knockout/commit/30c41225e366e0010da47aeeb1ac2e1f2c46f54d" }, { "instruction": "what vulnarability does django-js-error-hook version less then 0.2 have", "input": "", "output": "Having vulnarability PVE-2022-51463 Advisory: Django-js-error-hook 0.2 adds CSRF protection by default.\r\nhttps://github.com/jojax/django-js-error-hook/commit/1d524883b6bcc1e4a6a4bc580c87dfd326828dc9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-js-error-hook version less then 0.2 have ### Response: Having vulnarability PVE-2022-51463 Advisory: Django-js-error-hook 0.2 adds CSRF protection by default.\r\nhttps://github.com/jojax/django-js-error-hook/commit/1d524883b6bcc1e4a6a4bc580c87dfd326828dc9" }, { "instruction": "what vulnarability does django-js-reverse version less then 0.9.1 have", "input": "", "output": "Having vulnarability CVE-2019-15486 Advisory: django-js-reverse (aka Django JS Reverse) before 0.9.1 has XSS via js_reverse_inline. See: CVE-2019-15486.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-js-reverse version less then 0.9.1 have ### Response: Having vulnarability CVE-2019-15486 Advisory: django-js-reverse (aka Django JS Reverse) before 0.9.1 has XSS via js_reverse_inline. See: CVE-2019-15486." }, { "instruction": "what vulnarability does django-json-widget version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2024-66924 Advisory: Django-json-widget version 2.0.0 introduces measures to prevent HTML injection by ensuring JSON inputs are safely handled, thus enhancing the security against unsafe content injection vulnerabilities.\r\nhttps://github.com/jmrivas86/django-json-widget/pull/64/commits/bbe84655c3df2b32aade1997953dd06bffcb489e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-json-widget version less then 2.0.0 have ### Response: Having vulnarability PVE-2024-66924 Advisory: Django-json-widget version 2.0.0 introduces measures to prevent HTML injection by ensuring JSON inputs are safely handled, thus enhancing the security against unsafe content injection vulnerabilities.\r\nhttps://github.com/jmrivas86/django-json-widget/pull/64/commits/bbe84655c3df2b32aade1997953dd06bffcb489e" }, { "instruction": "what vulnarability does django-jsonform version less then 2.10.1 have", "input": "", "output": "Having vulnarability PVE-2022-49361 Advisory: Django-jsonform 2.10.1 includes a fix for a high severity vulnerability (XSS) in the admin form.\r\nhttps://github.com/bhch/django-jsonform/security/advisories/GHSA-x9jp-4w8m-4f3c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-jsonform version less then 2.10.1 have ### Response: Having vulnarability PVE-2022-49361 Advisory: Django-jsonform 2.10.1 includes a fix for a high severity vulnerability (XSS) in the admin form.\r\nhttps://github.com/bhch/django-jsonform/security/advisories/GHSA-x9jp-4w8m-4f3c" }, { "instruction": "what vulnarability does django-kaio version less then 0.15.0 have", "input": "", "output": "Having vulnarability CVE-2021-20270 Advisory: Django-kaio 0.15.0 updates its dependency 'pygments' to v2.7.4 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-kaio version less then 0.15.0 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Django-kaio 0.15.0 updates its dependency 'pygments' to v2.7.4 to include security fixes." }, { "instruction": "what vulnarability does django-lazysignup version less then 0.4.0 have", "input": "", "output": "Having vulnarability PVE-2021-25770 Advisory: Django-lazysignup before 0.4.0 fixes a security issue: Generated usernames are now based on the session key, rather than actually being the session key. This is to avoid a potential security issue where an app might simply display a username, giving away a significant part of the user's session key. The username is now generated from a SHA1 hash of the session key. This change means that existing generated users will become invalid.\r\nhttps://github.com/danfairs/django-lazysignup/commit/ea27d50ea222063de81f005565dfbb7f83d8759f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-lazysignup version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-25770 Advisory: Django-lazysignup before 0.4.0 fixes a security issue: Generated usernames are now based on the session key, rather than actually being the session key. This is to avoid a potential security issue where an app might simply display a username, giving away a significant part of the user's session key. The username is now generated from a SHA1 hash of the session key. This change means that existing generated users will become invalid.\r\nhttps://github.com/danfairs/django-lazysignup/commit/ea27d50ea222063de81f005565dfbb7f83d8759f" }, { "instruction": "what vulnarability does django-lfs version less then 0.6.9 have", "input": "", "output": "Having vulnarability PVE-2021-25772 Advisory: Django-lfs before 0.6.9 protects all manage methods. Before, they could be reached from outside by anonymous users.\r\nhttps://github.com/diefenbach/django-lfs/commit/5bfa41d2b27e7d23967e4cf9b25107f9da389470", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-lfs version less then 0.6.9 have ### Response: Having vulnarability PVE-2021-25772 Advisory: Django-lfs before 0.6.9 protects all manage methods. Before, they could be reached from outside by anonymous users.\r\nhttps://github.com/diefenbach/django-lfs/commit/5bfa41d2b27e7d23967e4cf9b25107f9da389470" }, { "instruction": "what vulnarability does django-loci version less then 0.4.3 have", "input": "", "output": "Having vulnarability CVE-2021-25288 Advisory: Django-loci 0.4.3 updates its dependency 'Pillow' to versions ~=8.2.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-loci version less then 0.4.3 have ### Response: Having vulnarability CVE-2021-25288 Advisory: Django-loci 0.4.3 updates its dependency 'Pillow' to versions ~=8.2.0 to include security fixes." }, { "instruction": "what vulnarability does django-magiclink version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2021-41829 Advisory: Django-magiclink 1.0.4 adds csrf_protect decorator for POST requests by default to improve security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-magiclink version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-41829 Advisory: Django-magiclink 1.0.4 adds csrf_protect decorator for POST requests by default to improve security." }, { "instruction": "what vulnarability does django-mail-auth version less then 0.1.3 have", "input": "", "output": "Having vulnarability PVE-2021-37171 Advisory: Django-mail-auth before 0.1.3 uses a session hash always identical and predictable for an attacker.\r\nhttps://github.com/codingjoe/django-mail-auth/pull/1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-mail-auth version less then 0.1.3 have ### Response: Having vulnarability PVE-2021-37171 Advisory: Django-mail-auth before 0.1.3 uses a session hash always identical and predictable for an attacker.\r\nhttps://github.com/codingjoe/django-mail-auth/pull/1" }, { "instruction": "what vulnarability does django-make-app version less then 0.1.3 have", "input": "", "output": "Having vulnarability CVE-2017-16764 Advisory: An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-make-app version less then 0.1.3 have ### Response: Having vulnarability CVE-2017-16764 Advisory: An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability." }, { "instruction": "what vulnarability does django-mapstore-adapter version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2021-38936 Advisory: Django-mapstore-adapter 1.0.4 fixes unescaped \"ms2_config\" which may cause JS injection.\r\nhttps://github.com/GeoNode/django-mapstore-adapter/commit/57e01b55567672961f8c6b7ca3b9dec18cc425b9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-mapstore-adapter version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-38936 Advisory: Django-mapstore-adapter 1.0.4 fixes unescaped \"ms2_config\" which may cause JS injection.\r\nhttps://github.com/GeoNode/django-mapstore-adapter/commit/57e01b55567672961f8c6b7ca3b9dec18cc425b9" }, { "instruction": "what vulnarability does django-markdownx version less then equal to 4.0.2 have", "input": "", "output": "Having vulnarability CVE-2024-2319 Advisory: Cross-Site Scripting (XSS) vulnerability in the Django MarkdownX project, affecting version 4.0.2. An attacker could store a specially crafted JavaScript payload in the upload functionality due to lack of proper sanitisation of JavaScript elements. See CVE-2024-2319.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-markdownx version less then equal to 4.0.2 have ### Response: Having vulnarability CVE-2024-2319 Advisory: Cross-Site Scripting (XSS) vulnerability in the Django MarkdownX project, affecting version 4.0.2. An attacker could store a specially crafted JavaScript payload in the upload functionality due to lack of proper sanitisation of JavaScript elements. See CVE-2024-2319." }, { "instruction": "what vulnarability does django-markers version less then 1.4.0 have", "input": "", "output": "Having vulnarability PVE-2022-52542 Advisory: Django-markers 1.4.0 fixes a XSS vulnerability in error messages.\r\nhttps://github.com/danielquinn/django-markers/commit/c0e27b36acb8ff3afba280556a980a7aff574263", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-markers version less then 1.4.0 have ### Response: Having vulnarability PVE-2022-52542 Advisory: Django-markers 1.4.0 fixes a XSS vulnerability in error messages.\r\nhttps://github.com/danielquinn/django-markers/commit/c0e27b36acb8ff3afba280556a980a7aff574263" }, { "instruction": "what vulnarability does django-markupfield version less then 1.3.2 have", "input": "", "output": "Having vulnarability CVE-2015-0846 Advisory: django-markupfield before 1.3.2 uses the default docutils RESTRUCTUREDTEXT_FILTER_SETTINGS settings, which allows remote attackers to include and read arbitrary files via unspecified vectors.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-markupfield version less then 1.3.2 have ### Response: Having vulnarability CVE-2015-0846 Advisory: django-markupfield before 1.3.2 uses the default docutils RESTRUCTUREDTEXT_FILTER_SETTINGS settings, which allows remote attackers to include and read arbitrary files via unspecified vectors." }, { "instruction": "what vulnarability does django-material version less then 0.9.0 have", "input": "", "output": "Having vulnarability PVE-2021-25775 Advisory: Django-material 0.9.0 fixes a XSS vulnerability in input fields.\r\nhttps://github.com/viewflow/django-material/issues/139", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-material version less then 0.9.0 have ### Response: Having vulnarability PVE-2021-25775 Advisory: Django-material 0.9.0 fixes a XSS vulnerability in input fields.\r\nhttps://github.com/viewflow/django-material/issues/139" }, { "instruction": "what vulnarability does django-mfa2 version less then 2.5.1,greather then equal to 2.6.0rc1,less then 2.6.1 have", "input": "", "output": "Having vulnarability CVE-2022-42731 Advisory: Django-mfa2 2.5.1 and 2.6.1 include a fix for CVE-2022-42731: mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-mfa2 version less then 2.5.1,greather then equal to 2.6.0rc1,less then 2.6.1 have ### Response: Having vulnarability CVE-2022-42731 Advisory: Django-mfa2 2.5.1 and 2.6.1 include a fix for CVE-2022-42731: mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage." }, { "instruction": "what vulnarability does django-mfa3 version less then 0.5.0 have", "input": "", "output": "Having vulnarability CVE-2022-24857 Advisory: Django-mfa3 0.5.0 includes a fix for CVE-2022-24857: Django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. Users are affected if they have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users from accessing the admin login view. It is possible to work around the issue by overwriting the admin login route, e.g. by adding the following URL definition before the admin routes: url('admin/login/', lambda request: redirect(settings.LOGIN_URL).\r\nhttps://github.com/xi/django-mfa3/security/advisories/GHSA-3r7g-wrpr-j5g4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-mfa3 version less then 0.5.0 have ### Response: Having vulnarability CVE-2022-24857 Advisory: Django-mfa3 0.5.0 includes a fix for CVE-2022-24857: Django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. Users are affected if they have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users from accessing the admin login view. It is possible to work around the issue by overwriting the admin login route, e.g. by adding the following URL definition before the admin routes: url('admin/login/', lambda request: redirect(settings.LOGIN_URL).\r\nhttps://github.com/xi/django-mfa3/security/advisories/GHSA-3r7g-wrpr-j5g4" }, { "instruction": "what vulnarability does django-modern-rpc version less then 0.8.1 have", "input": "", "output": "Having vulnarability PVE-2021-34991 Advisory: Django-modern-rpc before 0.8.1 isn't correctly checking the authentication backend when executing 'system.multicall()'.\r\nhttps://github.com/alorence/django-modern-rpc/commit/88fb4c40ce1a6346d7a22f9eafbdc58a4b7b3a96", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-modern-rpc version less then 0.8.1 have ### Response: Having vulnarability PVE-2021-34991 Advisory: Django-modern-rpc before 0.8.1 isn't correctly checking the authentication backend when executing 'system.multicall()'.\r\nhttps://github.com/alorence/django-modern-rpc/commit/88fb4c40ce1a6346d7a22f9eafbdc58a4b7b3a96" }, { "instruction": "what vulnarability does django-mptt version less then 0.8.0 have", "input": "", "output": "Having vulnarability CVE-2015-0219 Advisory: Django-mptt 0.8.0 drops support for Django versions <1.8. They no longer receive security patches.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-mptt version less then 0.8.0 have ### Response: Having vulnarability CVE-2015-0219 Advisory: Django-mptt 0.8.0 drops support for Django versions <1.8. They no longer receive security patches." }, { "instruction": "what vulnarability does django-mssql-backend version less then 1.4.1 have", "input": "", "output": "Having vulnarability CVE-2024-26164 Advisory: Microsoft Django Backend for SQL Server Remote Code Execution Vulnerability See CVE-2024-26164.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-mssql-backend version less then 1.4.1 have ### Response: Having vulnarability CVE-2024-26164 Advisory: Microsoft Django Backend for SQL Server Remote Code Execution Vulnerability See CVE-2024-26164." }, { "instruction": "what vulnarability does django-music-publisher version less then 18.9.1 have", "input": "", "output": "Having vulnarability CVE-2018-16984 Advisory: Django-music-publisher 18.9.1 updates its dependency 'Django' to v2.1.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-music-publisher version less then 18.9.1 have ### Response: Having vulnarability CVE-2018-16984 Advisory: Django-music-publisher 18.9.1 updates its dependency 'Django' to v2.1.2 to include a security fix." }, { "instruction": "what vulnarability does django-nameko-standalone version less then 1.3.2 have", "input": "", "output": "Having vulnarability CVE-2019-6975 Advisory: Django-nameko-standalone 1.3.2 updates its Django version to 1.11.27 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-nameko-standalone version less then 1.3.2 have ### Response: Having vulnarability CVE-2019-6975 Advisory: Django-nameko-standalone 1.3.2 updates its Django version to 1.11.27 to include security fixes." }, { "instruction": "what vulnarability does django-navbar-client version greather then equal to 0.9.50,less then equal to 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2022-32996 Advisory: Django-navbar-client v0.9.50 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-navbar-client version greather then equal to 0.9.50,less then equal to 1.0.1 have ### Response: Having vulnarability CVE-2022-32996 Advisory: Django-navbar-client v0.9.50 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does django-newsletter version less then 0.7 have", "input": "", "output": "Having vulnarability PVE-2021-36318 Advisory: django-newsletter before 0.7 allowed a user to subscribe others to the newsletter without authorization.\r\nhttps://github.com/jazzband/django-newsletter/commit/bea5a5100cc40717995dafc65ff011bc76696ebd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-newsletter version less then 0.7 have ### Response: Having vulnarability PVE-2021-36318 Advisory: django-newsletter before 0.7 allowed a user to subscribe others to the newsletter without authorization.\r\nhttps://github.com/jazzband/django-newsletter/commit/bea5a5100cc40717995dafc65ff011bc76696ebd" }, { "instruction": "what vulnarability does django-ninecms version less then 0.4.5b have", "input": "", "output": "Having vulnarability PVE-2021-25776 Advisory: Django-ninecms before 0.4.5b has a unknown security issue in its url configuration.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ninecms version less then 0.4.5b have ### Response: Having vulnarability PVE-2021-25776 Advisory: Django-ninecms before 0.4.5b has a unknown security issue in its url configuration." }, { "instruction": "what vulnarability does django-nopassword version less then 5.0.0 have", "input": "", "output": "Having vulnarability CVE-2019-10682 Advisory: django-nopassword before 5.0.0 stores cleartext secrets in the database. See: CVE-2019-10682.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-nopassword version less then 5.0.0 have ### Response: Having vulnarability CVE-2019-10682 Advisory: django-nopassword before 5.0.0 stores cleartext secrets in the database. See: CVE-2019-10682." }, { "instruction": "what vulnarability does django-oauth-toolkit version less then 0.8.0 have", "input": "", "output": "Having vulnarability PVE-2021-39609 Advisory: Django-oauth-toolkit 0.8.0 includes fixes for various vulnerabilities on 'Basic' authentication.\r\nhttps://github.com/jazzband/django-oauth-toolkit/commit/83367ffe5ad1046f5a5338537a8655cb1c16400d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-oauth-toolkit version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-39609 Advisory: Django-oauth-toolkit 0.8.0 includes fixes for various vulnerabilities on 'Basic' authentication.\r\nhttps://github.com/jazzband/django-oauth-toolkit/commit/83367ffe5ad1046f5a5338537a8655cb1c16400d" }, { "instruction": "what vulnarability does django-orghierarchy version less then 0.1.13 have", "input": "", "output": "Having vulnarability CVE-2018-14574 Advisory: Django-orghierarchy 0.1.13 updates its dependency 'Django' to v1.11.15 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-orghierarchy version less then 0.1.13 have ### Response: Having vulnarability CVE-2018-14574 Advisory: Django-orghierarchy 0.1.13 updates its dependency 'Django' to v1.11.15 to include a security fix." }, { "instruction": "what vulnarability does django-pagetree version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2021-41899 Advisory: Django-pagetree version 1.0.4 adds csrf_tokens to several forms where it was missing.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-pagetree version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-41899 Advisory: Django-pagetree version 1.0.4 adds csrf_tokens to several forms where it was missing." }, { "instruction": "what vulnarability does django-patchwork version greather then equal to 1.1,less then 2.0.4,greather then equal to 2.1.0,less then 2.1.4,equal to 2.1.0:rc1,equal to 2.1.0:rc2 have", "input": "", "output": "Having vulnarability CVE-2019-13122 Advisory: A Cross Site Scripting (XSS) vulnerability exists in the template tag used to render message ids in Patchwork v1.1 through v2.1.x. This allows an attacker to insert JavaScript or HTML into the patch detail page via an email sent to a mailing list consumed by Patchwork. This affects the function msgid in templatetags/patch.py. Patchwork versions v2.1.4 and v2.0.4 will contain the fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-patchwork version greather then equal to 1.1,less then 2.0.4,greather then equal to 2.1.0,less then 2.1.4,equal to 2.1.0:rc1,equal to 2.1.0:rc2 have ### Response: Having vulnarability CVE-2019-13122 Advisory: A Cross Site Scripting (XSS) vulnerability exists in the template tag used to render message ids in Patchwork v1.1 through v2.1.x. This allows an attacker to insert JavaScript or HTML into the patch detail page via an email sent to a mailing list consumed by Patchwork. This affects the function msgid in templatetags/patch.py. Patchwork versions v2.1.4 and v2.0.4 will contain the fix." }, { "instruction": "what vulnarability does django-perms-provisioner version less then 0.0.4 have", "input": "", "output": "Having vulnarability CVE-2020-1747 Advisory: Django-perms-provisioner 0.0.4 updates PyYAML to v5.3.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-perms-provisioner version less then 0.0.4 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Django-perms-provisioner 0.0.4 updates PyYAML to v5.3.1 to include security fixes." }, { "instruction": "what vulnarability does django-pgbulk version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2023-61662 Advisory: Django-pgbulk 2.0.0 updates 'pgbulk.upsert' to no longer support the 'return_untouched` argument, as it had race conditions.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-pgbulk version less then 2.0.0 have ### Response: Having vulnarability PVE-2023-61662 Advisory: Django-pgbulk 2.0.0 updates 'pgbulk.upsert' to no longer support the 'return_untouched` argument, as it had race conditions." }, { "instruction": "what vulnarability does django-pghistory version less then 2.6.0 have", "input": "", "output": "Having vulnarability PVE-2023-53875 Advisory: Django-pghistory 2.6.0 escapes all context data to avoid SQL injection attacks.\r\nhttps://github.com/Opus10/django-pghistory/commit/a5380fa85745731c6bc749f0e453ab66314c0bc7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-pghistory version less then 2.6.0 have ### Response: Having vulnarability PVE-2023-53875 Advisory: Django-pghistory 2.6.0 escapes all context data to avoid SQL injection attacks.\r\nhttps://github.com/Opus10/django-pghistory/commit/a5380fa85745731c6bc749f0e453ab66314c0bc7" }, { "instruction": "what vulnarability does django-photologue version less then equal to 3.15.1 have", "input": "", "output": "Having vulnarability CVE-2022-4526 Advisory: A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic. Affected by this issue is some unknown functionality of the file photologue/templates/photologue/photo_detail.html of the component Default Template Handler. The manipulation of the argument object.caption leads to cross site scripting. The attack may be launched remotely.\r\nhttps://github.com/richardbarran/django-photologue/issues/223", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-photologue version less then equal to 3.15.1 have ### Response: Having vulnarability CVE-2022-4526 Advisory: A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic. Affected by this issue is some unknown functionality of the file photologue/templates/photologue/photo_detail.html of the component Default Template Handler. The manipulation of the argument object.caption leads to cross site scripting. The attack may be launched remotely.\r\nhttps://github.com/richardbarran/django-photologue/issues/223" }, { "instruction": "what vulnarability does django-piston version less then 0.2.3 have", "input": "", "output": "Having vulnarability CVE-2011-4103 Advisory: emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-piston version less then 0.2.3 have ### Response: Having vulnarability CVE-2011-4103 Advisory: emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method." }, { "instruction": "what vulnarability does django-pluggable-filebrowser version less then 3.4.2 have", "input": "", "output": "Having vulnarability PVE-2021-25778 Advisory: Django-pluggable-filebrowser 3.4.2 fixes a XSS vulnerability.\r\nhttps://github.com/sehmaschine/django-filebrowser/pull/88", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-pluggable-filebrowser version less then 3.4.2 have ### Response: Having vulnarability PVE-2021-25778 Advisory: Django-pluggable-filebrowser 3.4.2 fixes a XSS vulnerability.\r\nhttps://github.com/sehmaschine/django-filebrowser/pull/88" }, { "instruction": "what vulnarability does django-postman version less then 3.6.2 have", "input": "", "output": "Having vulnarability PVE-2021-36667 Advisory: Django-postman 3.6.2 fixes an open redirect vulnerability within the \"next\" parameter.\r\nhttps://bitbucket.org/psam/django-postman/issues/101/open-redirect-vulnerability-within-the", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-postman version less then 3.6.2 have ### Response: Having vulnarability PVE-2021-36667 Advisory: Django-postman 3.6.2 fixes an open redirect vulnerability within the \"next\" parameter.\r\nhttps://bitbucket.org/psam/django-postman/issues/101/open-redirect-vulnerability-within-the" }, { "instruction": "what vulnarability does django-python3-ldap version less then 0.9.5 have", "input": "", "output": "Having vulnarability PVE-2021-25779 Advisory: Django-python3-ldap 0.9.5 fixes a security vulnerability where username and password could be transmitted in plain text before starting TLS.\r\nhttps://github.com/etianen/django-python3-ldap/commit/a250194e2911e270a90b0eec2251343040a75ece", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-python3-ldap version less then 0.9.5 have ### Response: Having vulnarability PVE-2021-25779 Advisory: Django-python3-ldap 0.9.5 fixes a security vulnerability where username and password could be transmitted in plain text before starting TLS.\r\nhttps://github.com/etianen/django-python3-ldap/commit/a250194e2911e270a90b0eec2251343040a75ece" }, { "instruction": "what vulnarability does django-rated version less then 1.1.2 have", "input": "", "output": "Having vulnarability PVE-2021-25781 Advisory: Django-rated 1.1.2 sets 'X-Forwarded-For=False' by default. X-Forwarded-For HTTP header should not be used for any Access Control List (ACL) checks because it can be spoofed by attackers.\r\nhttps://github.com/funkybob/django-rated/commit/bb0766470ab0a30ab374b291dded6212fa1285e2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-rated version less then 1.1.2 have ### Response: Having vulnarability PVE-2021-25781 Advisory: Django-rated 1.1.2 sets 'X-Forwarded-For=False' by default. X-Forwarded-For HTTP header should not be used for any Access Control List (ACL) checks because it can be spoofed by attackers.\r\nhttps://github.com/funkybob/django-rated/commit/bb0766470ab0a30ab374b291dded6212fa1285e2" }, { "instruction": "what vulnarability does django-react-templatetags version less then 6.0.1 have", "input": "", "output": "Having vulnarability PVE-2023-52696 Advisory: Django-react-templatetags 6.0.1 includes a fix for a XSS vulnerability.\r\nhttps://github.com/Frojd/django-react-templatetags/commit/62933728f6fb4b3ca31cf67dc1f673ca38b25286", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-react-templatetags version less then 6.0.1 have ### Response: Having vulnarability PVE-2023-52696 Advisory: Django-react-templatetags 6.0.1 includes a fix for a XSS vulnerability.\r\nhttps://github.com/Frojd/django-react-templatetags/commit/62933728f6fb4b3ca31cf67dc1f673ca38b25286" }, { "instruction": "what vulnarability does django-registration version less then 1.7 have", "input": "", "output": "Having vulnarability PVE-2021-36431 Advisory: django-registration before 1.7 leaked password reset token through the Referer\r\nheader.\r\nhttps://github.com/macropin/django-registration/commit/3a2e0182ff92cc8ce39a932e463cbac37e485afa", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-registration version less then 1.7 have ### Response: Having vulnarability PVE-2021-36431 Advisory: django-registration before 1.7 leaked password reset token through the Referer\r\nheader.\r\nhttps://github.com/macropin/django-registration/commit/3a2e0182ff92cc8ce39a932e463cbac37e485afa" }, { "instruction": "what vulnarability does django-registration-redux version less then 1.7 have", "input": "", "output": "Having vulnarability PVE-2021-35199 Advisory: django-registration-redux before 1.7 leaks password reset tokens through the Referer header. For more info, see: https://github.com/macropin/django-registration/pull/268", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-registration-redux version less then 1.7 have ### Response: Having vulnarability PVE-2021-35199 Advisory: django-registration-redux before 1.7 leaks password reset tokens through the Referer header. For more info, see: https://github.com/macropin/django-registration/pull/268" }, { "instruction": "what vulnarability does django-relatives version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-25782 Advisory: Django-relatives before 0.3.0 is vulnerable to XSS in html tags.\r\nhttps://github.com/treyhunner/django-relatives/commit/6410ae4695389cb377ce23d35883d8b70b789deb", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-relatives version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-25782 Advisory: Django-relatives before 0.3.0 is vulnerable to XSS in html tags.\r\nhttps://github.com/treyhunner/django-relatives/commit/6410ae4695389cb377ce23d35883d8b70b789deb" }, { "instruction": "what vulnarability does django-rest-framework version less then 3.11.2 have", "input": "", "output": "Having vulnarability CVE-2020-25626 Advisory: Django-rest-framework 3.11.2 includes a fix for CVE-2020-25626: When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious \"script\" tags, leading to a cross-site-scripting (XSS) vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-rest-framework version less then 3.11.2 have ### Response: Having vulnarability CVE-2020-25626 Advisory: Django-rest-framework 3.11.2 includes a fix for CVE-2020-25626: When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious \"script\" tags, leading to a cross-site-scripting (XSS) vulnerability." }, { "instruction": "what vulnarability does django-rest-registration version less then 0.5.0 have", "input": "", "output": "Having vulnarability CVE-2019-13177 Advisory: Django-rest-registration 0.5.0 includes a fix for CVE-2019-13177: verification.py in django-rest-registration before 0.5.0 relies on a static string for signatures (i.e., the Django Signing API is misused), which allows remote attackers to spoof the verification process. This occurs because incorrect code refactoring led to calling a security-critical function with an incorrect argument.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-rest-registration version less then 0.5.0 have ### Response: Having vulnarability CVE-2019-13177 Advisory: Django-rest-registration 0.5.0 includes a fix for CVE-2019-13177: verification.py in django-rest-registration before 0.5.0 relies on a static string for signatures (i.e., the Django Signing API is misused), which allows remote attackers to spoof the verification process. This occurs because incorrect code refactoring led to calling a security-critical function with an incorrect argument." }, { "instruction": "what vulnarability does django-revproxy version less then 0.9.6 have", "input": "", "output": "Having vulnarability PVE-2021-25783 Advisory: Django-revproxy 0.9.6 fixes a security issue that allowed remote-user header injection.\r\nhttps://github.com/jazzband/django-revproxy/commit/0ce23b632fc7c1b4cb5f5e03077b45e6ece802e6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-revproxy version less then 0.9.6 have ### Response: Having vulnarability PVE-2021-25783 Advisory: Django-revproxy 0.9.6 fixes a security issue that allowed remote-user header injection.\r\nhttps://github.com/jazzband/django-revproxy/commit/0ce23b632fc7c1b4cb5f5e03077b45e6ece802e6" }, { "instruction": "what vulnarability does django-rq-scheduler version less then 2023.6.1 have", "input": "", "output": "Having vulnarability PVE-2023-58913 Advisory: Django-rq-scheduler 2023.6.1 includes a fix for a HTML injection vulnerability.\r\nhttps://github.com/dsoftwareinc/django-rq-scheduler/commit/51a47230babc583ebd8230c40bc264af215d404e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-rq-scheduler version less then 2023.6.1 have ### Response: Having vulnarability PVE-2023-58913 Advisory: Django-rq-scheduler 2023.6.1 includes a fix for a HTML injection vulnerability.\r\nhttps://github.com/dsoftwareinc/django-rq-scheduler/commit/51a47230babc583ebd8230c40bc264af215d404e" }, { "instruction": "what vulnarability does django-s3file version less then 5.5.1 have", "input": "", "output": "Having vulnarability CVE-2022-24840 Advisory: Django-s3file 5.5.1 includes a fix for CVE-2022-24840: In versions prior to 5.5.1 it was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. If the 'AWS_LOCATION' setting was set, traversal was limited to that location only. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, prior to the release of the patch.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-s3file version less then 5.5.1 have ### Response: Having vulnarability CVE-2022-24840 Advisory: Django-s3file 5.5.1 includes a fix for CVE-2022-24840: In versions prior to 5.5.1 it was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. If the 'AWS_LOCATION' setting was set, traversal was limited to that location only. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, prior to the release of the patch." }, { "instruction": "what vulnarability does django-safedelete version less then 0.3.3 have", "input": "", "output": "Having vulnarability PVE-2021-25785 Advisory: Django-safedelete 0.3.3 contains a security fix that prevents an XSS attack in the admin interface.\r\nhttps://github.com/makinacorpus/django-safedelete/commit/317c548c9d53e8983bb9a361c02f658f635ac13e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-safedelete version less then 0.3.3 have ### Response: Having vulnarability PVE-2021-25785 Advisory: Django-safedelete 0.3.3 contains a security fix that prevents an XSS attack in the admin interface.\r\nhttps://github.com/makinacorpus/django-safedelete/commit/317c548c9d53e8983bb9a361c02f658f635ac13e" }, { "instruction": "what vulnarability does django-sage-painless version less then 1.10.2 have", "input": "", "output": "Having vulnarability PVE-2021-41101 Advisory: Django-sage-painless 1.10.2 stores sensitive data as env variables to avoid information exposure.\r\nhttps://github.com/sageteam-org/django-sage-painless/commit/b901519e5e8d371ee51166fff56000c8478f7268", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-sage-painless version less then 1.10.2 have ### Response: Having vulnarability PVE-2021-41101 Advisory: Django-sage-painless 1.10.2 stores sensitive data as env variables to avoid information exposure.\r\nhttps://github.com/sageteam-org/django-sage-painless/commit/b901519e5e8d371ee51166fff56000c8478f7268" }, { "instruction": "what vulnarability does django-salesforce version less then 0.6.3 have", "input": "", "output": "Having vulnarability CVE-2014-3566 Advisory: Django-salesforce 0.6.3 defaults to use the most secure TLS version (TLSv1.1).\r\nhttps://github.com/django-salesforce/django-salesforce/commit/78cfc735195ef0cc45d0709f31abf26b5570be83", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-salesforce version less then 0.6.3 have ### Response: Having vulnarability CVE-2014-3566 Advisory: Django-salesforce 0.6.3 defaults to use the most secure TLS version (TLSv1.1).\r\nhttps://github.com/django-salesforce/django-salesforce/commit/78cfc735195ef0cc45d0709f31abf26b5570be83" }, { "instruction": "what vulnarability does django-secured-fields version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2022-23833 Advisory: Django-secured-fields 0.3.1 updates its dependency 'django' to v4.0.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-secured-fields version less then 0.3.1 have ### Response: Having vulnarability CVE-2022-23833 Advisory: Django-secured-fields 0.3.1 updates its dependency 'django' to v4.0.2 to include security fixes." }, { "instruction": "what vulnarability does django-select2 version less then 5.7.0 have", "input": "", "output": "Having vulnarability PVE-2021-25787 Advisory: Django-select2 5.7.0 contains a security fix that allows a `field_id` to only be used for the intended JSON endpoint.\r\nhttps://github.com/applegrew/django-select2/commit/4a1b83ad1e9b2523961a0f23706c70b01683494f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-select2 version less then 5.7.0 have ### Response: Having vulnarability PVE-2021-25787 Advisory: Django-select2 5.7.0 contains a security fix that allows a `field_id` to only be used for the intended JSON endpoint.\r\nhttps://github.com/applegrew/django-select2/commit/4a1b83ad1e9b2523961a0f23706c70b01683494f" }, { "instruction": "what vulnarability does django-selectable version less then 0.5.2 have", "input": "", "output": "Having vulnarability PVE-2021-25788 Advisory: Django-selectable 0.5.2 fixes a XSS flaw with lookup \"get_item_*\" methods.\r\nhttps://github.com/mlavin/django-selectable/issues/63", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-selectable version less then 0.5.2 have ### Response: Having vulnarability PVE-2021-25788 Advisory: Django-selectable 0.5.2 fixes a XSS flaw with lookup \"get_item_*\" methods.\r\nhttps://github.com/mlavin/django-selectable/issues/63" }, { "instruction": "what vulnarability does django-sendfile2 version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2023-55171 Advisory: Django-sendfile2 0.6.0 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/moggers87/django-sendfile2/security/advisories/GHSA-6r3c-8xf3-ggrr", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-sendfile2 version less then 0.6.0 have ### Response: Having vulnarability PVE-2023-55171 Advisory: Django-sendfile2 0.6.0 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/moggers87/django-sendfile2/security/advisories/GHSA-6r3c-8xf3-ggrr" }, { "instruction": "what vulnarability does django-server version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2021-34982 Advisory: django-server is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-server version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34982 Advisory: django-server is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/" }, { "instruction": "what vulnarability does django-ses version less then 3.5.0 have", "input": "", "output": "Having vulnarability CVE-2023-33185 Advisory: Django-SES 3.5.0 includes a fix for CVE-2023-33185: The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the 'SESEventWebhookView class' intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests are signed by AWS and are verified by django_ses, however the verification of this signature was found to be flawed as it allowed users to specify arbitrary public certificates.\r\nhttps://github.com/django-ses/django-ses/security/advisories/GHSA-qg36-9jxh-fj25", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ses version less then 3.5.0 have ### Response: Having vulnarability CVE-2023-33185 Advisory: Django-SES 3.5.0 includes a fix for CVE-2023-33185: The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the 'SESEventWebhookView class' intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests are signed by AWS and are verified by django_ses, however the verification of this signature was found to be flawed as it allowed users to specify arbitrary public certificates.\r\nhttps://github.com/django-ses/django-ses/security/advisories/GHSA-qg36-9jxh-fj25" }, { "instruction": "what vulnarability does django-session-security version less then 2.4.0 have", "input": "", "output": "Having vulnarability PVE-2021-25789 Advisory: Django-session-security 2.4.0 fixes a vulnerability when SESSION_EXPIRE_AT_BROWSER_CLOSE is off.\r\nhttps://github.com/yourlabs/django-session-security/commit/52d531928fd5e84a1dceaf0bc8ca47beefc52523", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-session-security version less then 2.4.0 have ### Response: Having vulnarability PVE-2021-25789 Advisory: Django-session-security 2.4.0 fixes a vulnerability when SESSION_EXPIRE_AT_BROWSER_CLOSE is off.\r\nhttps://github.com/yourlabs/django-session-security/commit/52d531928fd5e84a1dceaf0bc8ca47beefc52523" }, { "instruction": "what vulnarability does django-silk version less then 3.0.2 have", "input": "", "output": "Having vulnarability PVE-2022-49564 Advisory: Django-silk 3.2.0 masks sensitive data. Before, request bodies were stored as plain text in the database.\r\nhttps://github.com/jazzband/django-silk/commit/04d8175eb6c712f5f713ebd0c3306d5e99dc2e15", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-silk version less then 3.0.2 have ### Response: Having vulnarability PVE-2022-49564 Advisory: Django-silk 3.2.0 masks sensitive data. Before, request bodies were stored as plain text in the database.\r\nhttps://github.com/jazzband/django-silk/commit/04d8175eb6c712f5f713ebd0c3306d5e99dc2e15" }, { "instruction": "what vulnarability does django-smart-lists version less then 1.0.26 have", "input": "", "output": "Having vulnarability PVE-2021-38150 Advisory: Django-smart-lists 1.0.26 fixes a XSS vulnerability in the render_function.\r\nhttps://github.com/plecto/django-smart-lists/commit/44314e51b371e01cd9bceb2e0ed6c8d75d7f87c3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-smart-lists version less then 1.0.26 have ### Response: Having vulnarability PVE-2021-38150 Advisory: Django-smart-lists 1.0.26 fixes a XSS vulnerability in the render_function.\r\nhttps://github.com/plecto/django-smart-lists/commit/44314e51b371e01cd9bceb2e0ed6c8d75d7f87c3" }, { "instruction": "what vulnarability does django-smart-selects version less then 1.5.0 have", "input": "", "output": "Having vulnarability PVE-2021-34234 Advisory: Django-smart-selects before 1.5.0 allowed anybody to list arbitrary objects by tweaking URL parameters.\r\nhttps://github.com/jazzband/django-smart-selects/releases/tag/1.5.0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-smart-selects version less then 1.5.0 have ### Response: Having vulnarability PVE-2021-34234 Advisory: Django-smart-selects before 1.5.0 allowed anybody to list arbitrary objects by tweaking URL parameters.\r\nhttps://github.com/jazzband/django-smart-selects/releases/tag/1.5.0" }, { "instruction": "what vulnarability does django-social-auth version less then 0.7.2 have", "input": "", "output": "Having vulnarability PVE-2021-25790 Advisory: Django-social-auth 0.7.2 fixes a security hole - redirects via the next param are now properly sanitized to disallow redirecting to external hosts.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-social-auth version less then 0.7.2 have ### Response: Having vulnarability PVE-2021-25790 Advisory: Django-social-auth 0.7.2 fixes a security hole - redirects via the next param are now properly sanitized to disallow redirecting to external hosts." }, { "instruction": "what vulnarability does django-social-auth3 version less then 0.3.3 have", "input": "", "output": "Having vulnarability PVE-2021-25791 Advisory: Django-social-auth3 0.3.3 fixes a security hole: redirects via the next param are now properly sanitized to disallow redirecting to external hosts.\r\nhttps://github.com/omab/django-social-auth/commit/32a67fa2a751b59d6c775f8f201981c4a27b2610", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-social-auth3 version less then 0.3.3 have ### Response: Having vulnarability PVE-2021-25791 Advisory: Django-social-auth3 0.3.3 fixes a security hole: redirects via the next param are now properly sanitized to disallow redirecting to external hosts.\r\nhttps://github.com/omab/django-social-auth/commit/32a67fa2a751b59d6c775f8f201981c4a27b2610" }, { "instruction": "what vulnarability does django-spectator version less then 11.7.0 have", "input": "", "output": "Having vulnarability PVE-2022-47773 Advisory: Django-spectator 11.7.0 strips out EXIF data from images uploaded as thumbnails.\r\nhttps://github.com/philgyford/django-spectator/commit/370d1aa7109bddef206fe5e22aca3166a04a1d2a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-spectator version less then 11.7.0 have ### Response: Having vulnarability PVE-2022-47773 Advisory: Django-spectator 11.7.0 strips out EXIF data from images uploaded as thumbnails.\r\nhttps://github.com/philgyford/django-spectator/commit/370d1aa7109bddef206fe5e22aca3166a04a1d2a" }, { "instruction": "what vulnarability does django-spirit version greather then equal to 0,less then 0.12.3 have", "input": "", "output": "Having vulnarability CVE-2022-0869 Advisory: django-spirit prior to version 0.12.3 is vulnerable to open redirect. In the /user/login endpoint, it doesn't check the value of the next parameter when the user is logged in and passes it directly to redirect which result to open redirect. This also affects /user/logout, /user/register, /user/login, /user/resend-activation.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-spirit version greather then equal to 0,less then 0.12.3 have ### Response: Having vulnarability CVE-2022-0869 Advisory: django-spirit prior to version 0.12.3 is vulnerable to open redirect. In the /user/login endpoint, it doesn't check the value of the next parameter when the user is logged in and passes it directly to redirect which result to open redirect. This also affects /user/logout, /user/register, /user/login, /user/resend-activation." }, { "instruction": "what vulnarability does django-sql-dashboard version less then 0.14 have", "input": "", "output": "Having vulnarability PVE-2021-40482 Advisory: Django-sql-dashboard 0.14 fixes a security and permissions flaw, where users without the 'execute_sql' permission could still run custom queries by editing saved dashboards using the Django admin interface.\r\nhttps://github.com/simonw/django-sql-dashboard/issues/94", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-sql-dashboard version less then 0.14 have ### Response: Having vulnarability PVE-2021-40482 Advisory: Django-sql-dashboard 0.14 fixes a security and permissions flaw, where users without the 'execute_sql' permission could still run custom queries by editing saved dashboards using the Django admin interface.\r\nhttps://github.com/simonw/django-sql-dashboard/issues/94" }, { "instruction": "what vulnarability does django-sql-explorer version less then 0.5 have", "input": "", "output": "Having vulnarability PVE-2021-39445 Advisory: Django-sql-explorer before version 0.5 allows usage of query parameters to users with view permissions. This results in a potential for SQL injection.\r\nhttps://github.com/groveco/django-sql-explorer/commit/ed491b70a02eb626826abc1230c3001a7d5ed489", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-sql-explorer version less then 0.5 have ### Response: Having vulnarability PVE-2021-39445 Advisory: Django-sql-explorer before version 0.5 allows usage of query parameters to users with view permissions. This results in a potential for SQL injection.\r\nhttps://github.com/groveco/django-sql-explorer/commit/ed491b70a02eb626826abc1230c3001a7d5ed489" }, { "instruction": "what vulnarability does django-sticky-uploads version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-25793 Advisory: Django-sticky-uploads 0.2.0 fixes a security issue related to a client changing the upload url specified by the widget for the upload.\r\nhttps://github.com/caktus/django-sticky-uploads/commit/81f4c1bf119b46c0716b0565c216e210960fc250", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-sticky-uploads version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-25793 Advisory: Django-sticky-uploads 0.2.0 fixes a security issue related to a client changing the upload url specified by the widget for the upload.\r\nhttps://github.com/caktus/django-sticky-uploads/commit/81f4c1bf119b46c0716b0565c216e210960fc250" }, { "instruction": "what vulnarability does django-storages version less then 1.7 have", "input": "", "output": "Having vulnarability PVE-2021-36434 Advisory: Django-storages before 1.7 have an insecure default ACL of 'public-read' in the 'S3BotoStorage' and 'S3Boto3Storage' backends .\r\nhttps://github.com/jschneier/django-storages/commit/6ee6a739752923c60eaa1e82262c1d07208ec7f6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-storages version less then 1.7 have ### Response: Having vulnarability PVE-2021-36434 Advisory: Django-storages before 1.7 have an insecure default ACL of 'public-read' in the 'S3BotoStorage' and 'S3Boto3Storage' backends .\r\nhttps://github.com/jschneier/django-storages/commit/6ee6a739752923c60eaa1e82262c1d07208ec7f6" }, { "instruction": "what vulnarability does django-su version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2022-47921 Advisory: Django-su 0.6.0 makes sure all CSRF protection is enabled.\r\nhttps://github.com/adamcharnock/django-su/commit/f75ea076577a824b0f81e35fc0c568a23a16cad2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-su version less then 0.6.0 have ### Response: Having vulnarability PVE-2022-47921 Advisory: Django-su 0.6.0 makes sure all CSRF protection is enabled.\r\nhttps://github.com/adamcharnock/django-su/commit/f75ea076577a824b0f81e35fc0c568a23a16cad2" }, { "instruction": "what vulnarability does django-tastypie version less then 0.9.10 have", "input": "", "output": "Having vulnarability CVE-2011-4104 Advisory: The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-tastypie version less then 0.9.10 have ### Response: Having vulnarability CVE-2011-4104 Advisory: The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method." }, { "instruction": "what vulnarability does django-termsandconditions version less then 2.0.10 have", "input": "", "output": "Having vulnarability PVE-2022-49632 Advisory: Django-termsandconditions 2.0.10 fixes an open redirect vulnerability.\r\nhttps://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-termsandconditions version less then 2.0.10 have ### Response: Having vulnarability PVE-2022-49632 Advisory: Django-termsandconditions 2.0.10 fixes an open redirect vulnerability.\r\nhttps://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a" }, { "instruction": "what vulnarability does django-tinymce version less then 3.4.0 have", "input": "", "output": "Having vulnarability CVE-2024-21910 Advisory: Django-tinymce 3.4.0 updates its NuGet dependency 'TinyMCE' to v5.10.1 to include a fix for a cross-site scripting vulnerability: a remote and unauthenticated attacker could introduce crafted image or link URLs that would result in the execution of arbitrary JavaScript in an editing user's browser.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-tinymce version less then 3.4.0 have ### Response: Having vulnarability CVE-2024-21910 Advisory: Django-tinymce 3.4.0 updates its NuGet dependency 'TinyMCE' to v5.10.1 to include a fix for a cross-site scripting vulnerability: a remote and unauthenticated attacker could introduce crafted image or link URLs that would result in the execution of arbitrary JavaScript in an editing user's browser." }, { "instruction": "what vulnarability does django-treenode version less then 0.20.0 have", "input": "", "output": "Having vulnarability PVE-2024-64721 Advisory: Django-treenode 0.20.0 fixes an XSS vulnerability in `get_display_text` method.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-treenode version less then 0.20.0 have ### Response: Having vulnarability PVE-2024-64721 Advisory: Django-treenode 0.20.0 fixes an XSS vulnerability in `get_display_text` method." }, { "instruction": "what vulnarability does django-trench version less then 0.2.3 have", "input": "", "output": "Having vulnarability PVE-2021-42899 Advisory: Django-trench 0.2.3 updates default backup codes settings to a more secure standard.\r\nhttps://github.com/merixstudio/django-trench/pull/52", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-trench version less then 0.2.3 have ### Response: Having vulnarability PVE-2021-42899 Advisory: Django-trench 0.2.3 updates default backup codes settings to a more secure standard.\r\nhttps://github.com/merixstudio/django-trench/pull/52" }, { "instruction": "what vulnarability does django-triggers version less then 2.0.13 have", "input": "", "output": "Having vulnarability CVE-2018-14574 Advisory: Django-triggers 2.0.13 updates its dependency 'Django' to v2.1.5 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-triggers version less then 2.0.13 have ### Response: Having vulnarability CVE-2018-14574 Advisory: Django-triggers 2.0.13 updates its dependency 'Django' to v2.1.5 to include security fixes." }, { "instruction": "what vulnarability does django-two-factor-auth version less then 1.12 have", "input": "", "output": "Having vulnarability CVE-2020-15105 Advisory: Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' passwords are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' passwords are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis). This has been fixed in 1.12. After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas. In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used. As a workaround, wwitching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading. See: CVE-2020-15105.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-two-factor-auth version less then 1.12 have ### Response: Having vulnarability CVE-2020-15105 Advisory: Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' passwords are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' passwords are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis). This has been fixed in 1.12. After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas. In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used. As a workaround, wwitching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading. See: CVE-2020-15105." }, { "instruction": "what vulnarability does django-ucamlookup version less then 1.9.2 have", "input": "", "output": "Having vulnarability PVE-2021-36744 Advisory: Django-ucamlookup 1.9.2 fixes lack of escaping in select2 calls.\r\nhttps://github.com/uisautomation/django-ucamlookup/commit/5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ucamlookup version less then 1.9.2 have ### Response: Having vulnarability PVE-2021-36744 Advisory: Django-ucamlookup 1.9.2 fixes lack of escaping in select2 calls.\r\nhttps://github.com/uisautomation/django-ucamlookup/commit/5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3" }, { "instruction": "what vulnarability does django-uni-form version less then 0.9.0 have", "input": "", "output": "Having vulnarability PVE-2021-25796 Advisory: Django-uni-form 0.9.0 fixes a XSS security issue. Errors weren't rendered safe: field's input was part of the error message, unsanitized.\r\nhttps://github.com/pydanny/django-uni-form/pull/98", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-uni-form version less then 0.9.0 have ### Response: Having vulnarability PVE-2021-25796 Advisory: Django-uni-form 0.9.0 fixes a XSS security issue. Errors weren't rendered safe: field's input was part of the error message, unsanitized.\r\nhttps://github.com/pydanny/django-uni-form/pull/98" }, { "instruction": "what vulnarability does django-unicorn version less then 0.29.0 have", "input": "", "output": "Having vulnarability PVE-2021-42099 Advisory: Django-unicorn version 0.29.0 sanitizes initial JSON to prevent XSS.\r\nhttps://github.com/adamghill/django-unicorn/commit/c38e2a8bbb3ec6a8cdba30813282d9159c90f0d2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-unicorn version less then 0.29.0 have ### Response: Having vulnarability PVE-2021-42099 Advisory: Django-unicorn version 0.29.0 sanitizes initial JSON to prevent XSS.\r\nhttps://github.com/adamghill/django-unicorn/commit/c38e2a8bbb3ec6a8cdba30813282d9159c90f0d2" }, { "instruction": "what vulnarability does django-url-security version less then 0.0.2 have", "input": "", "output": "Having vulnarability PVE-2022-47794 Advisory: Django-url-security 0.0.2 updates its dependency 'mkdocs' to version '1.3.0' to include a fix for a Cross-Site Scripting vulnerability.\r\nhttps://github.com/Edrolo/django-url-security/commit/858bab7be8b5dc7e871c1177ef6a2153d5aea5a4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-url-security version less then 0.0.2 have ### Response: Having vulnarability PVE-2022-47794 Advisory: Django-url-security 0.0.2 updates its dependency 'mkdocs' to version '1.3.0' to include a fix for a Cross-Site Scripting vulnerability.\r\nhttps://github.com/Edrolo/django-url-security/commit/858bab7be8b5dc7e871c1177ef6a2153d5aea5a4" }, { "instruction": "what vulnarability does django-urlconf-export version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2020-13596 Advisory: Django-urlconf-export 1.1.1 updates Django to v3.0.7 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-urlconf-export version less then 1.1.1 have ### Response: Having vulnarability CVE-2020-13596 Advisory: Django-urlconf-export 1.1.1 updates Django to v3.0.7 to include security fixes." }, { "instruction": "what vulnarability does django-user-accounts version less then 2.0.2 have", "input": "", "output": "Having vulnarability PVE-2021-34774 Advisory: Django-user-accounts before 2.0.2 has a potential security issue with leaking password reset tokens through HTTP Referer header.\r\nhttps://github.com/pinax/django-user-accounts/issues/258", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-user-accounts version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-34774 Advisory: Django-user-accounts before 2.0.2 has a potential security issue with leaking password reset tokens through HTTP Referer header.\r\nhttps://github.com/pinax/django-user-accounts/issues/258" }, { "instruction": "what vulnarability does django-user-management version less then 18.0.0 have", "input": "", "output": "Having vulnarability CVE-2016-9190 Advisory: Django-user-management 18.0.0 updates its dependency 'pillow' to a version >3.3.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-user-management version less then 18.0.0 have ### Response: Having vulnarability CVE-2016-9190 Advisory: Django-user-management 18.0.0 updates its dependency 'pillow' to a version >3.3.2 to include security fixes." }, { "instruction": "what vulnarability does django-user-sessions version less then 1.7.1 have", "input": "", "output": "Having vulnarability CVE-2020-5224 Advisory: In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen. See: CVE-2020-5224.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-user-sessions version less then 1.7.1 have ### Response: Having vulnarability CVE-2020-5224 Advisory: In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen. See: CVE-2020-5224." }, { "instruction": "what vulnarability does django-userena-ce version less then 4.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-45296 Advisory: Django-userena-ce 4.0.0 uses class based auth views to fix leaking of password reset token.\r\nhttps://github.com/django-userena-ce/django-userena-ce/commit/210a50fd227a1ccec2c857f5b75712011656c23b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-userena-ce version less then 4.0.0 have ### Response: Having vulnarability PVE-2022-45296 Advisory: Django-userena-ce 4.0.0 uses class based auth views to fix leaking of password reset token.\r\nhttps://github.com/django-userena-ce/django-userena-ce/commit/210a50fd227a1ccec2c857f5b75712011656c23b" }, { "instruction": "what vulnarability does django-watchman version less then 0.10.0 have", "input": "", "output": "Having vulnarability PVE-2021-25797 Advisory: Django-watchman 0.10.0 improves security by keeping tokens out of logs.\r\nhttps://github.com/mwarkentin/django-watchman/issues/73", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-watchman version less then 0.10.0 have ### Response: Having vulnarability PVE-2021-25797 Advisory: Django-watchman 0.10.0 improves security by keeping tokens out of logs.\r\nhttps://github.com/mwarkentin/django-watchman/issues/73" }, { "instruction": "what vulnarability does django-webix version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2023-59135 Advisory: Django-webix 1.2.0 includes a fix for a CSRF vulnerability.\r\nhttps://github.com/MPASolutions/django-webix/commit/4190a0934e8389d6f73687331d6814ad9fdec358", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-webix version less then 1.2.0 have ### Response: Having vulnarability PVE-2023-59135 Advisory: Django-webix 1.2.0 includes a fix for a CSRF vulnerability.\r\nhttps://github.com/MPASolutions/django-webix/commit/4190a0934e8389d6f73687331d6814ad9fdec358" }, { "instruction": "what vulnarability does django-websocket version less then equal to 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2022-22818 Advisory: Django-websocket 0.3.0 and prior use a version of 'Django' (1.4.1) with known vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-websocket version less then equal to 0.3.0 have ### Response: Having vulnarability CVE-2022-22818 Advisory: Django-websocket 0.3.0 and prior use a version of 'Django' (1.4.1) with known vulnerabilities." }, { "instruction": "what vulnarability does django-widgy version equal to 0.8.4 have", "input": "", "output": "Having vulnarability CVE-2020-18704 Advisory: Unrestricted Upload of File with Dangerous Type in Django-Widgy v0.8.4 allows remote attackers to execute arbitrary code via the 'image' widget in the component 'Change Widgy Page' (https://github.com/fusionbox/django-widgy/issues/387). See CVE-2020-18704.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-widgy version equal to 0.8.4 have ### Response: Having vulnarability CVE-2020-18704 Advisory: Unrestricted Upload of File with Dangerous Type in Django-Widgy v0.8.4 allows remote attackers to execute arbitrary code via the 'image' widget in the component 'Change Widgy Page' (https://github.com/fusionbox/django-widgy/issues/387). See CVE-2020-18704." }, { "instruction": "what vulnarability does django-wiki version less then 0.10.1 have", "input": "", "output": "Having vulnarability CVE-2024-28865 Advisory: django-wiki is a wiki system for Django. Installations of django-wiki prior to version 0.10.1 are vulnerable to maliciously crafted article content that can cause severe use of server CPU through a regular expression loop. Version 0.10.1 fixes this issue. As a workaround, close off access to create and edit articles by anonymous users. See CVE-2024-28865.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-wiki version less then 0.10.1 have ### Response: Having vulnarability CVE-2024-28865 Advisory: django-wiki is a wiki system for Django. Installations of django-wiki prior to version 0.10.1 are vulnerable to maliciously crafted article content that can cause severe use of server CPU through a regular expression loop. Version 0.10.1 fixes this issue. As a workaround, close off access to create and edit articles by anonymous users. See CVE-2024-28865." }, { "instruction": "what vulnarability does django-wm version less then 2.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-23727 Advisory: Django-wm 2.0.0 updates the celery dependency to versions =< 5.2.2 due to the CVE-2021-23727.\r\nhttps://github.com/beatonma/django-wm/compare/1.3.1...2.0.0#diff-fa602a8a75dc9dcc92261bac5f533c2a85e34fcceaff63b3a3a81d9acde2fc52R28", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-wm version less then 2.0.0 have ### Response: Having vulnarability CVE-2021-23727 Advisory: Django-wm 2.0.0 updates the celery dependency to versions =< 5.2.2 due to the CVE-2021-23727.\r\nhttps://github.com/beatonma/django-wm/compare/1.3.1...2.0.0#diff-fa602a8a75dc9dcc92261bac5f533c2a85e34fcceaff63b3a3a81d9acde2fc52R28" }, { "instruction": "what vulnarability does django-x509 version less then 0.9.1 have", "input": "", "output": "Having vulnarability CVE-2020-25659 Advisory: Django-x509 0.9.1 updates the minimum version of 'cryptography' to 3.2 for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-x509 version less then 0.9.1 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Django-x509 0.9.1 updates the minimum version of 'cryptography' to 3.2 for security reasons." }, { "instruction": "what vulnarability does djangocms-admin-style version less then 1.2.5 have", "input": "", "output": "Having vulnarability PVE-2021-36834 Advisory: Djangocms-admin-style 1.2.5 fixes a potential security issue if the 'Site.name' field contains malicious code.\r\nhttps://github.com/django-cms/djangocms-admin-style/pull/375/files", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangocms-admin-style version less then 1.2.5 have ### Response: Having vulnarability PVE-2021-36834 Advisory: Djangocms-admin-style 1.2.5 fixes a potential security issue if the 'Site.name' field contains malicious code.\r\nhttps://github.com/django-cms/djangocms-admin-style/pull/375/files" }, { "instruction": "what vulnarability does djangocms-frontend version less then 1.0.1 have", "input": "", "output": "Having vulnarability PVE-2022-51669 Advisory: Djangocms-frontend 1.0.1 avoids HTML injection into carousels when ckeditor is not installed.\r\nhttps://github.com/django-cms/djangocms-frontend/commit/80972e7bf9f7a361d26ca35bcaa5b7578277b3ff", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangocms-frontend version less then 1.0.1 have ### Response: Having vulnarability PVE-2022-51669 Advisory: Djangocms-frontend 1.0.1 avoids HTML injection into carousels when ckeditor is not installed.\r\nhttps://github.com/django-cms/djangocms-frontend/commit/80972e7bf9f7a361d26ca35bcaa5b7578277b3ff" }, { "instruction": "what vulnarability does djangocms-highlightjs version less then 0.3.1 have", "input": "", "output": "Having vulnarability PVE-2021-25798 Advisory: Djangocms-highlightjs 0.3.1 escapes code in plugin template.\r\nhttps://github.com/nephila/djangocms-highlightjs/pull/1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangocms-highlightjs version less then 0.3.1 have ### Response: Having vulnarability PVE-2021-25798 Advisory: Djangocms-highlightjs 0.3.1 escapes code in plugin template.\r\nhttps://github.com/nephila/djangocms-highlightjs/pull/1" }, { "instruction": "what vulnarability does djangoo version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51740 Advisory: Djangoo is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangoo version greather then 0 have ### Response: Having vulnarability PVE-2022-51740 Advisory: Djangoo is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does djangorestframework version less then 2.2.1 have", "input": "", "output": "Having vulnarability PVE-2021-25799 Advisory: djangorestframework 2.2.1 fixes a security issue: Use `defusedxml` package to address XML parsing vulnerabilities.\r\nhttps://github.com/encode/django-rest-framework/commit/dcee027fa97f015ff3b87f0fd72b7995cdd6e155", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangorestframework version less then 2.2.1 have ### Response: Having vulnarability PVE-2021-25799 Advisory: djangorestframework 2.2.1 fixes a security issue: Use `defusedxml` package to address XML parsing vulnerabilities.\r\nhttps://github.com/encode/django-rest-framework/commit/dcee027fa97f015ff3b87f0fd72b7995cdd6e155" }, { "instruction": "what vulnarability does djangorestframework-api-key version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-36524 Advisory: Djangorestframework-api-key before 0.2.0 stores the API key in plaintext in the database.\r\nhttps://github.com/florimondmanca/djangorestframework-api-key/commit/fc51137e056ff3fa3fee7c30f46429f4ab0007c2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangorestframework-api-key version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-36524 Advisory: Djangorestframework-api-key before 0.2.0 stores the API key in plaintext in the database.\r\nhttps://github.com/florimondmanca/djangorestframework-api-key/commit/fc51137e056ff3fa3fee7c30f46429f4ab0007c2" }, { "instruction": "what vulnarability does djangorestframework-simplejwt version less then 1.5 have", "input": "", "output": "Having vulnarability PVE-2021-34792 Advisory: Djangorestframework-simplejwt before 1.5 allowed '__getattr__' access to the underlying JWT through the 'rest_framework_simplejwt.module.TokenUser' class.\r\nhttps://github.com/jazzband/djangorestframework-simplejwt/commit/af5ff91f2f7d070070967292a5289d5d9168dc99", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangorestframework-simplejwt version less then 1.5 have ### Response: Having vulnarability PVE-2021-34792 Advisory: Djangorestframework-simplejwt before 1.5 allowed '__getattr__' access to the underlying JWT through the 'rest_framework_simplejwt.module.TokenUser' class.\r\nhttps://github.com/jazzband/djangorestframework-simplejwt/commit/af5ff91f2f7d070070967292a5289d5d9168dc99" }, { "instruction": "what vulnarability does djangosaml2 version less then 0.17.2 have", "input": "", "output": "Having vulnarability CVE-2017-1000246 Advisory: Djangosaml2 0.17.2 upgrades the pysaml2 dependency to version 4.6.0 which fixes a security issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangosaml2 version less then 0.17.2 have ### Response: Having vulnarability CVE-2017-1000246 Advisory: Djangosaml2 0.17.2 upgrades the pysaml2 dependency to version 4.6.0 which fixes a security issue." }, { "instruction": "what vulnarability does djblets version less then 0.8.3 have", "input": "", "output": "Having vulnarability CVE-2014-3994 Advisory: Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djblets version less then 0.8.3 have ### Response: Having vulnarability CVE-2014-3994 Advisory: Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name." }, { "instruction": "what vulnarability does djedefre version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2021-37913 Advisory: djedefre 0.7.0 fixes a security bug in \"djoser.views.UserView\"", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djedefre version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-37913 Advisory: djedefre 0.7.0 fixes a security bug in \"djoser.views.UserView\"" }, { "instruction": "what vulnarability does djem version less then 0.6 have", "input": "", "output": "Having vulnarability PVE-2021-42044 Advisory: Djem version 0.6 adds CSRF tokens to outgoing AJAX requests.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djem version less then 0.6 have ### Response: Having vulnarability PVE-2021-42044 Advisory: Djem version 0.6 adds CSRF tokens to outgoing AJAX requests." }, { "instruction": "what vulnarability does djoser version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2021-34904 Advisory: djoser 0.7.0 fixes a security bug in djoser.views.UserView. (Missing more information)", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djoser version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-34904 Advisory: djoser 0.7.0 fixes a security bug in djoser.views.UserView. (Missing more information)" }, { "instruction": "what vulnarability does dlhub-gateway version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-37339 Advisory: Dlhub-gateway 2.0.0 fixes security requirements in the swagger spec.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dlhub-gateway version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-37339 Advisory: Dlhub-gateway 2.0.0 fixes security requirements in the swagger spec." }, { "instruction": "what vulnarability does dlib-bin version greather then equal to 19.24.0,less then equal to 19.24.1 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Dlib-bin 19.24.0 throughout 19.24.1 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.\r\nhttps://inspector.pypi.io/project/dlib-bin/19.24.1/packages/a4/f3/30ff2558cfaa7c29d9efdc59e38ae730250e379a72dbeeeb958584b29516/dlib_bin-19.24.1-cp310-cp310-macosx_10_9_x86_64.whl", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dlib-bin version greather then equal to 19.24.0,less then equal to 19.24.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Dlib-bin 19.24.0 throughout 19.24.1 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.\r\nhttps://inspector.pypi.io/project/dlib-bin/19.24.1/packages/a4/f3/30ff2558cfaa7c29d9efdc59e38ae730250e379a72dbeeeb958584b29516/dlib_bin-19.24.1-cp310-cp310-macosx_10_9_x86_64.whl" }, { "instruction": "what vulnarability does dmoj version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2022-45143 Advisory: Dmoj 1.2.0 disables Nim due to an arbitrary code execution vulnerability.\r\nhttps://github.com/DMOJ/judge-server/issues/318", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dmoj version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-45143 Advisory: Dmoj 1.2.0 disables Nim due to an arbitrary code execution vulnerability.\r\nhttps://github.com/DMOJ/judge-server/issues/318" }, { "instruction": "what vulnarability does dnsimple version less then 2.1.2 have", "input": "", "output": "Having vulnarability CVE-2021-28363 Advisory: Dnsimple 2.1.2 updates its dependency 'urllib3' to v1.26.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dnsimple version less then 2.1.2 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Dnsimple 2.1.2 updates its dependency 'urllib3' to v1.26.4 to include a security fix." }, { "instruction": "what vulnarability does dnslib version less then 0.9.17 have", "input": "", "output": "Having vulnarability CVE-2022-22846 Advisory: Dnslib 0.9.17 includes a fix for CVE-2022-22846: The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.\r\nhttps://github.com/paulc/dnslib/issues/30", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dnslib version less then 0.9.17 have ### Response: Having vulnarability CVE-2022-22846 Advisory: Dnslib 0.9.17 includes a fix for CVE-2022-22846: The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.\r\nhttps://github.com/paulc/dnslib/issues/30" }, { "instruction": "what vulnarability does dnspython version less then 2.6.0 have", "input": "", "output": "Having vulnarability PVE-2024-65401 Advisory: Dnspython 2.6.0 fixes a DoS vulnerability highlighted in the \"TuDoor\" paper (CVE-2023-29483), where spoofed DNS responses could disrupt service. The update prevents denial of service by ignoring malicious packets, allowing the resolver to wait for valid responses until a query's timeout. This mitigation ensures continued service despite attempted attacks, enhancing the resolver's reliability and security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dnspython version less then 2.6.0 have ### Response: Having vulnarability PVE-2024-65401 Advisory: Dnspython 2.6.0 fixes a DoS vulnerability highlighted in the \"TuDoor\" paper (CVE-2023-29483), where spoofed DNS responses could disrupt service. The update prevents denial of service by ignoring malicious packets, allowing the resolver to wait for valid responses until a query's timeout. This mitigation ensures continued service despite attempted attacks, enhancing the resolver's reliability and security." }, { "instruction": "what vulnarability does dnsupdate version less then 0.4 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Dnsupdate 0.4 includes a security patch for the function '_load_cache' in 'dnsupdate.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/lopsided98/dnsupdate/commit/f708d0b6c7340334199b3a91bdbb626b5da09633#diff-bbb8416d14c72839288c2df5695624f5b1810a9fb4d94ab83750725cddfda472", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dnsupdate version less then 0.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Dnsupdate 0.4 includes a security patch for the function '_load_cache' in 'dnsupdate.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/lopsided98/dnsupdate/commit/f708d0b6c7340334199b3a91bdbb626b5da09633#diff-bbb8416d14c72839288c2df5695624f5b1810a9fb4d94ab83750725cddfda472" }, { "instruction": "what vulnarability does docassemble version less then 0.3.35 have", "input": "", "output": "Having vulnarability PVE-2021-38925 Advisory: Docassemble 0.3.35 includes a more robust code injection detection mechanism.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docassemble version less then 0.3.35 have ### Response: Having vulnarability PVE-2021-38925 Advisory: Docassemble 0.3.35 includes a more robust code injection detection mechanism." }, { "instruction": "what vulnarability does docassemble-base version greather then equal to 1.4.53,less then 1.4.97 have", "input": "", "output": "Having vulnarability CVE-2023-46046 Advisory: Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docassemble-base version greather then equal to 1.4.53,less then 1.4.97 have ### Response: Having vulnarability CVE-2023-46046 Advisory: Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch." }, { "instruction": "what vulnarability does docassemble-webapp version greather then equal to 0,less then 1.4.97 have", "input": "", "output": "Having vulnarability CVE-2023-45925 Advisory: Docassemble is an expert system for guided interviews and document assembly. Prior to 1.4.97, a user could type HTML into a field, including the field for the user's name, and then that HTML could be displayed on the screen as HTML. The vulnerability has been patched in version 1.4.97 of the master branch.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docassemble-webapp version greather then equal to 0,less then 1.4.97 have ### Response: Having vulnarability CVE-2023-45925 Advisory: Docassemble is an expert system for guided interviews and document assembly. Prior to 1.4.97, a user could type HTML into a field, including the field for the user's name, and then that HTML could be displayed on the screen as HTML. The vulnerability has been patched in version 1.4.97 of the master branch." }, { "instruction": "what vulnarability does doccano version less then 1.0.1 have", "input": "", "output": "Having vulnarability PVE-2021-42228 Advisory: Doccano 1.0.1 adds X-Frame-Options header to prevent clickjacking.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does doccano version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-42228 Advisory: Doccano 1.0.1 adds X-Frame-Options header to prevent clickjacking." }, { "instruction": "what vulnarability does docdeid version less then 0.1.5 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Docdeid 0.1.5 updates its dependency 'certifi' to v2022.12.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docdeid version less then 0.1.5 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Docdeid 0.1.5 updates its dependency 'certifi' to v2022.12.7 to include a security fix." }, { "instruction": "what vulnarability does docker version less then 3.5.1 have", "input": "", "output": "Having vulnarability CVE-2018-1000808 Advisory: Docker 3.5.1 updates its dependency 'pyOpenSSL' to v18.0.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docker version less then 3.5.1 have ### Response: Having vulnarability CVE-2018-1000808 Advisory: Docker 3.5.1 updates its dependency 'pyOpenSSL' to v18.0.0 to include security fixes." }, { "instruction": "what vulnarability does docker-py version greather then equal to 0,less then 0.5.3 have", "input": "", "output": "Having vulnarability CVE-2014-5277 Advisory: Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docker-py version greather then equal to 0,less then 0.5.3 have ### Response: Having vulnarability CVE-2014-5277 Advisory: Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic." }, { "instruction": "what vulnarability does docker-registry version less then 0.8.1 have", "input": "", "output": "Having vulnarability PVE-2021-25805 Advisory: Docker-registry 0.8.1 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/docker-archive/docker-registry/compare/0.8.0...0.8.1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docker-registry version less then 0.8.1 have ### Response: Having vulnarability PVE-2021-25805 Advisory: Docker-registry 0.8.1 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/docker-archive/docker-registry/compare/0.8.0...0.8.1" }, { "instruction": "what vulnarability does docker-tidy version less then 1.1.14 have", "input": "", "output": "Having vulnarability CVE-2021-32559 Advisory: Docker-tidy 1.1.14 fixes a transitive vulnerability affecting 'pywin32' dependency.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docker-tidy version less then 1.1.14 have ### Response: Having vulnarability CVE-2021-32559 Advisory: Docker-tidy 1.1.14 fixes a transitive vulnerability affecting 'pywin32' dependency." }, { "instruction": "what vulnarability does dockerspawner version greather then equal to 0.11.0,less then 13.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-48311 Advisory: dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dockerspawner version greather then equal to 0.11.0,less then 13.0.0 have ### Response: Having vulnarability CVE-2023-48311 Advisory: dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior." }, { "instruction": "what vulnarability does docutils version greather then equal to 0.5,less then 0.6 have", "input": "", "output": "Having vulnarability CVE-2009-5042 Advisory: Docutils 0.6 includes a fix for CVE-2009-5042: Python-docutils allows insecure usage of temporary files.\r\nhttps://github.com/advisories/GHSA-cg75-6938-wx58", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docutils version greather then equal to 0.5,less then 0.6 have ### Response: Having vulnarability CVE-2009-5042 Advisory: Docutils 0.6 includes a fix for CVE-2009-5042: Python-docutils allows insecure usage of temporary files.\r\nhttps://github.com/advisories/GHSA-cg75-6938-wx58" }, { "instruction": "what vulnarability does docutils-glep version less then 1.2 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Docutils-Glep 1.2 includes a security patch for the function 'parse' in 'docutils_glep/reader.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/mgorny/docutils-glep/commit/d407ea56b1b91a0ac2450fe13306a0be8cffce41", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docutils-glep version less then 1.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Docutils-Glep 1.2 includes a security patch for the function 'parse' in 'docutils_glep/reader.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/mgorny/docutils-glep/commit/d407ea56b1b91a0ac2450fe13306a0be8cffce41" }, { "instruction": "what vulnarability does dogtag-pki version less then 10.6.4 have", "input": "", "output": "Having vulnarability CVE-2017-7537 Advisory: It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dogtag-pki version less then 10.6.4 have ### Response: Having vulnarability CVE-2017-7537 Advisory: It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates." }, { "instruction": "what vulnarability does domonic version less then 0.2.17 have", "input": "", "output": "Having vulnarability CVE-2020-7212 Advisory: Domonic 0.2.17 updates its dependency 'urllib3' to v1.25.8 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does domonic version less then 0.2.17 have ### Response: Having vulnarability CVE-2020-7212 Advisory: Domonic 0.2.17 updates its dependency 'urllib3' to v1.25.8 to include a security fix." }, { "instruction": "what vulnarability does donfig version equal to 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2019-7537 Advisory: An issue was discovered in Donfig 0.3.0. There is a vulnerability in the collect_yaml method in config_obj.py. It can execute arbitrary Python commands, resulting in command execution.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does donfig version equal to 0.3.0 have ### Response: Having vulnarability CVE-2019-7537 Advisory: An issue was discovered in Donfig 0.3.0. There is a vulnerability in the collect_yaml method in config_obj.py. It can execute arbitrary Python commands, resulting in command execution." }, { "instruction": "what vulnarability does dosma version less then 0.0.13 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Dosma 0.0.13 includes a security patch for the function 'init' in 'dosma/defaults.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ad12/DOSMA/commit/44457025faac9f09ac0bd26c93185adc612da7dc#", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dosma version less then 0.0.13 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Dosma 0.0.13 includes a security patch for the function 'init' in 'dosma/defaults.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ad12/DOSMA/commit/44457025faac9f09ac0bd26c93185adc612da7dc#" }, { "instruction": "what vulnarability does doubt version less then 4.5.1 have", "input": "", "output": "Having vulnarability CVE-2023-45803 Advisory: Doubt 4.5.1 updates its dependency 'urllib3' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does doubt version less then 4.5.1 have ### Response: Having vulnarability CVE-2023-45803 Advisory: Doubt 4.5.1 updates its dependency 'urllib3' to include a security fix." }, { "instruction": "what vulnarability does dovesnap version less then 1.0.28 have", "input": "", "output": "Having vulnarability CVE-2022-23648 Advisory: Dovesnap 1.0.28 updates its dependency on the containerd library from version to address the security vulnerability identified as CVE-2022-23648.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dovesnap version less then 1.0.28 have ### Response: Having vulnarability CVE-2022-23648 Advisory: Dovesnap 1.0.28 updates its dependency on the containerd library from version to address the security vulnerability identified as CVE-2022-23648." }, { "instruction": "what vulnarability does dparse version less then 0.5.2 have", "input": "", "output": "Having vulnarability CVE-2022-39280 Advisory: Dparse 0.5.2 includes a fix for CVE-2022-39280: Versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dparse version less then 0.5.2 have ### Response: Having vulnarability CVE-2022-39280 Advisory: Dparse 0.5.2 includes a fix for CVE-2022-39280: Versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed." }, { "instruction": "what vulnarability does dparse2 version less then 0.6.0 have", "input": "", "output": "Having vulnarability CVE-2022-39280 Advisory: Dparse2 0.6.0 fixes a security issue related to Regex parsing.\r\nhttps://github.com/pyupio/dparse/commit/3aecaac9a1bde349418810a320a7e5ec31ee276a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dparse2 version less then 0.6.0 have ### Response: Having vulnarability CVE-2022-39280 Advisory: Dparse2 0.6.0 fixes a security issue related to Regex parsing.\r\nhttps://github.com/pyupio/dparse/commit/3aecaac9a1bde349418810a320a7e5ec31ee276a" }, { "instruction": "what vulnarability does dpaste version less then 2.8 have", "input": "", "output": "Having vulnarability PVE-2021-25807 Advisory: Dpaste 2.8 fixes a XSS bug where HTML tags were not properly escaped with the simple \"code\" lexer.\r\nhttps://github.com/bartTC/dpaste/commit/497e5f0c28d575b3e92ef65b70384314a9e330da", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dpaste version less then 2.8 have ### Response: Having vulnarability PVE-2021-25807 Advisory: Dpaste 2.8 fixes a XSS bug where HTML tags were not properly escaped with the simple \"code\" lexer.\r\nhttps://github.com/bartTC/dpaste/commit/497e5f0c28d575b3e92ef65b70384314a9e330da" }, { "instruction": "what vulnarability does dplib version less then 1.4 have", "input": "", "output": "Having vulnarability PVE-2021-35851 Advisory: dplib 1.4 fixes some security issues and added support for mapchange and namechange events", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dplib version less then 1.4 have ### Response: Having vulnarability PVE-2021-35851 Advisory: dplib 1.4 fixes some security issues and added support for mapchange and namechange events" }, { "instruction": "what vulnarability does dpp-client version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45439 Advisory: Dpp-client is a typosquatting package. It installs a trojan in your system that leaks your data.\r\nhttps://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dpp-client version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45439 Advisory: Dpp-client is a typosquatting package. It installs a trojan in your system that leaks your data.\r\nhttps://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2" }, { "instruction": "what vulnarability does dpp-client1234 version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45440 Advisory: Dpp-client1234 is a typosquatting package. It installs a trojan in your system that leaks your data.\r\nhttps://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dpp-client1234 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45440 Advisory: Dpp-client1234 is a typosquatting package. It installs a trojan in your system that leaks your data.\r\nhttps://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2" }, { "instruction": "what vulnarability does dpymenus version less then 2.1.5 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Dpymenus 2.1.5 fixes a security issue in the 'urllib3' dependency for versions prior to 1.26.5.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dpymenus version less then 2.1.5 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Dpymenus 2.1.5 fixes a security issue in the 'urllib3' dependency for versions prior to 1.26.5." }, { "instruction": "what vulnarability does dr-web-engine version less then equal to 0.2.6.0b0 have", "input": "", "output": "Having vulnarability CVE-2022-34053 Advisory: The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dr-web-engine version less then equal to 0.2.6.0b0 have ### Response: Having vulnarability CVE-2022-34053 Advisory: The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does draft-kings version less then 2.0.3 have", "input": "", "output": "Having vulnarability CVE-2020-26137 Advisory: Draft-kings 2.0.3 updates its dependency 'urllib3' to v1.25.9 due to security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does draft-kings version less then 2.0.3 have ### Response: Having vulnarability CVE-2020-26137 Advisory: Draft-kings 2.0.3 updates its dependency 'urllib3' to v1.25.9 due to security issues." }, { "instruction": "what vulnarability does dragonfly-energy version less then 1.22.50 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Dragonfly-energy 1.22.50 updates its dependency 'wheel' to v0.38.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dragonfly-energy version less then 1.22.50 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Dragonfly-energy 1.22.50 updates its dependency 'wheel' to v0.38.1 to include a security fix." }, { "instruction": "what vulnarability does dragonfly-uwg version less then 0.5.294 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Dragonfly-uwg 0.5.294 updates its dependency 'wheel' to v0.38.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dragonfly-uwg version less then 0.5.294 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Dragonfly-uwg 0.5.294 updates its dependency 'wheel' to v0.38.1 to include a security fix." }, { "instruction": "what vulnarability does drf-api-logger version less then equal to 0.0.7 have", "input": "", "output": "Having vulnarability PVE-2021-39108 Advisory: Drf-api-logger 0.0.7 includes the warning that 'allowed hosts protection' is skipped when a RAW_URI value is used for DRF_API_LOGGER_PATH_TYPE. Consequently, an insecure URI may be returned.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-api-logger version less then equal to 0.0.7 have ### Response: Having vulnarability PVE-2021-39108 Advisory: Drf-api-logger 0.0.7 includes the warning that 'allowed hosts protection' is skipped when a RAW_URI value is used for DRF_API_LOGGER_PATH_TYPE. Consequently, an insecure URI may be returned." }, { "instruction": "what vulnarability does drf-excel version less then 0.4.1 have", "input": "", "output": "Having vulnarability PVE-2022-45334 Advisory: Drf-excel 0.4.1 includes proper escaping for possible malicious characters.\r\nhttps://github.com/wharton/drf-excel/pull/34", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-excel version less then 0.4.1 have ### Response: Having vulnarability PVE-2022-45334 Advisory: Drf-excel 0.4.1 includes proper escaping for possible malicious characters.\r\nhttps://github.com/wharton/drf-excel/pull/34" }, { "instruction": "what vulnarability does drf-extra-fields version less then 2.0.0 have", "input": "", "output": "Having vulnarability CVE-2019-16865 Advisory: Drf-extra-fields 2.0.0 updates Pillow to 6.2.1 to fix a security vulnerability.\r\nhttps://github.com/Hipo/drf-extra-fields/commit/dd6d19b9201477e6d93074e898e6ed0f8f350cae", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-extra-fields version less then 2.0.0 have ### Response: Having vulnarability CVE-2019-16865 Advisory: Drf-extra-fields 2.0.0 updates Pillow to 6.2.1 to fix a security vulnerability.\r\nhttps://github.com/Hipo/drf-extra-fields/commit/dd6d19b9201477e6d93074e898e6ed0f8f350cae" }, { "instruction": "what vulnarability does drf-jwt version greather then equal to 1.15.0,less then 1.15.1 have", "input": "", "output": "Having vulnarability CVE-2020-10594 Advisory: An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained. See: CVE-2020-10594.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-jwt version greather then equal to 1.15.0,less then 1.15.1 have ### Response: Having vulnarability CVE-2020-10594 Advisory: An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained. See: CVE-2020-10594." }, { "instruction": "what vulnarability does drf-renderer-xlsx version less then 0.4.1 have", "input": "", "output": "Having vulnarability PVE-2021-42526 Advisory: Drf-renderer-xlsx 0.4.1 includes proper escaping for possible malicious characters.\r\nhttps://github.com/wharton/drf-renderer-xlsx/pull/34", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-renderer-xlsx version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-42526 Advisory: Drf-renderer-xlsx 0.4.1 includes proper escaping for possible malicious characters.\r\nhttps://github.com/wharton/drf-renderer-xlsx/pull/34" }, { "instruction": "what vulnarability does drf-spectacular version less then 0.9.4 have", "input": "", "output": "Having vulnarability PVE-2023-59167 Advisory: Drf-spectacular 0.9.4 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/tfranzel/drf-spectacular/commit/7e77bb3ea852f407f1780c8ae6b5b17a9c8b8520", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-spectacular version less then 0.9.4 have ### Response: Having vulnarability PVE-2023-59167 Advisory: Drf-spectacular 0.9.4 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/tfranzel/drf-spectacular/commit/7e77bb3ea852f407f1780c8ae6b5b17a9c8b8520" }, { "instruction": "what vulnarability does drf-tracking version less then 1.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-34856 Advisory: drf-tracking before 1.3.0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-tracking version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-34856 Advisory: drf-tracking before 1.3.0" }, { "instruction": "what vulnarability does drt version less then 1.2.1 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Drt 1.2.1 includes a security patch for the function 'readConfig' in 'drt/configfile.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ccdale/drt/commit/2fffc617a9ddac040182d54a3227c87eb268b8ed", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drt version less then 1.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Drt 1.2.1 includes a security patch for the function 'readConfig' in 'drt/configfile.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ccdale/drt/commit/2fffc617a9ddac040182d54a3227c87eb268b8ed" }, { "instruction": "what vulnarability does drxhello version equal to 0.0.1 have", "input": "", "output": "Having vulnarability CVE-2022-34055 Advisory: The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drxhello version equal to 0.0.1 have ### Response: Having vulnarability CVE-2022-34055 Advisory: The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does dstack version less then 0.2.2 have", "input": "", "output": "Having vulnarability PVE-2023-54740 Advisory: Dstack 0.2.2 runs all traffic through SSH tunnel. Before, when running a remote workflow that used ports (for example, to host dev environments or applications), 'dstack' made those ports on the remote machine public, allowing anyone within the configured VPC to access them via HTTP.\r\nhttps://github.com/dstackai/dstack/pull/270", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dstack version less then 0.2.2 have ### Response: Having vulnarability PVE-2023-54740 Advisory: Dstack 0.2.2 runs all traffic through SSH tunnel. Before, when running a remote workflow that used ports (for example, to host dev environments or applications), 'dstack' made those ports on the remote machine public, allowing anyone within the configured VPC to access them via HTTP.\r\nhttps://github.com/dstackai/dstack/pull/270" }, { "instruction": "what vulnarability does dtale version less then 3.7.0 have", "input": "", "output": "Having vulnarability CVE-2023-46134 Advisory: D-Tale 3.7.0 includes a fix for CVE-2023-46134: Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off \"Custom Filter\" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.\r\nhttps://github.com/man-group/dtale/security/advisories/GHSA-jq6c-r9xf-qxjm", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dtale version less then 3.7.0 have ### Response: Having vulnarability CVE-2023-46134 Advisory: D-Tale 3.7.0 includes a fix for CVE-2023-46134: Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off \"Custom Filter\" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.\r\nhttps://github.com/man-group/dtale/security/advisories/GHSA-jq6c-r9xf-qxjm" }, { "instruction": "what vulnarability does duckdb version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2022-51884 Advisory: Duckdb 0.6.0 fixes overflow when using substrings.\r\nhttps://github.com/duckdb/duckdb/pull/5273", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does duckdb version less then 0.6.0 have ### Response: Having vulnarability PVE-2022-51884 Advisory: Duckdb 0.6.0 fixes overflow when using substrings.\r\nhttps://github.com/duckdb/duckdb/pull/5273" }, { "instruction": "what vulnarability does dulwich version less then 0.9.920150320 have", "input": "", "output": "Having vulnarability CVE-2015-0838 Advisory: Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dulwich version less then 0.9.920150320 have ### Response: Having vulnarability CVE-2015-0838 Advisory: Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file." }, { "instruction": "what vulnarability does duplicity version less then 0.4.9 have", "input": "", "output": "Having vulnarability CVE-2007-5201 Advisory: The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does duplicity version less then 0.4.9 have ### Response: Having vulnarability CVE-2007-5201 Advisory: The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments." }, { "instruction": "what vulnarability does duty-board version less then 0.0.1a2 have", "input": "", "output": "Having vulnarability CVE-2022-46175 Advisory: Duty-board 0.0.1a2 updates its NPM dependency 'json5' to v1.0.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does duty-board version less then 0.0.1a2 have ### Response: Having vulnarability CVE-2022-46175 Advisory: Duty-board 0.0.1a2 updates its NPM dependency 'json5' to v1.0.2 to include a security fix." }, { "instruction": "what vulnarability does dynamicprompts version less then 0.3.2 have", "input": "", "output": "Having vulnarability PVE-2023-53003 Advisory: Dynamicprompts 0.3.2 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/adieyal/dynamicprompts/commit/c97bef04b403dd6f77e414473c297f1abc787ea1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dynamicprompts version less then 0.3.2 have ### Response: Having vulnarability PVE-2023-53003 Advisory: Dynamicprompts 0.3.2 includes a fix for a path traversal vulnerability.\r\nhttps://github.com/adieyal/dynamicprompts/commit/c97bef04b403dd6f77e414473c297f1abc787ea1" }, { "instruction": "what vulnarability does dynamixel-sdk version less then equal to 3.7.11 have", "input": "", "output": "Having vulnarability CVE-2019-15786 Advisory: ROBOTIS Dynamixel SDK through 3.7.11 has a buffer overflow via a large rxpacket.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dynamixel-sdk version less then equal to 3.7.11 have ### Response: Having vulnarability CVE-2019-15786 Advisory: ROBOTIS Dynamixel SDK through 3.7.11 has a buffer overflow via a large rxpacket." }, { "instruction": "what vulnarability does dynamo-release version less then 0.99 have", "input": "", "output": "Having vulnarability PVE-2021-40192 Advisory: Dynamo-release 0.99 includes fixes for various vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dynamo-release version less then 0.99 have ### Response: Having vulnarability PVE-2021-40192 Advisory: Dynamo-release 0.99 includes fixes for various vulnerabilities." }, { "instruction": "what vulnarability does dynamodb-encryption-sdk version greather then equal to 0,less then 1.3.0 have", "input": "", "output": "Having vulnarability PVE-2023-55189 Advisory: Dynamodb-encryption-sdk 1.3.0 includes a security fix: When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. Users who cannot upgrade to use the 'CachingMostRecentProvider' can call 'clear()' on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.\r\nhttps://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62\r\nhttps://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dynamodb-encryption-sdk version greather then equal to 0,less then 1.3.0 have ### Response: Having vulnarability PVE-2023-55189 Advisory: Dynamodb-encryption-sdk 1.3.0 includes a security fix: When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. Users who cannot upgrade to use the 'CachingMostRecentProvider' can call 'clear()' on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.\r\nhttps://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62\r\nhttps://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b" }, { "instruction": "what vulnarability does easy-install version less then 0.7 have", "input": "", "output": "Having vulnarability PVE-2021-33124 Advisory: easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easy-install version less then 0.7 have ### Response: Having vulnarability PVE-2021-33124 Advisory: easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product." }, { "instruction": "what vulnarability does easy-parse version less then equal to 0.1.1 have", "input": "", "output": "Having vulnarability CVE-2020-26710 Advisory: easy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easy-parse version less then equal to 0.1.1 have ### Response: Having vulnarability CVE-2020-26710 Advisory: easy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file." }, { "instruction": "what vulnarability does easy-xml version equal to 0.5.0 have", "input": "", "output": "Having vulnarability CVE-2020-26705 Advisory: The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input. See CVE-2020-26705.\r\nhttps://github.com/darkfoxprime/python-easy_xml/issues/1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easy-xml version equal to 0.5.0 have ### Response: Having vulnarability CVE-2020-26705 Advisory: The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input. See CVE-2020-26705.\r\nhttps://github.com/darkfoxprime/python-easy_xml/issues/1" }, { "instruction": "what vulnarability does easybuild version less then 4.1.2 have", "input": "", "output": "Having vulnarability CVE-2020-5262 Advisory: Easybuild 4.1.2 includes a fix for CVE-2020-5262: GitHub personal access token leaking into temporary EasyBuild (debug) logs.\r\nhttps://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easybuild version less then 4.1.2 have ### Response: Having vulnarability CVE-2020-5262 Advisory: Easybuild 4.1.2 includes a fix for CVE-2020-5262: GitHub personal access token leaking into temporary EasyBuild (debug) logs.\r\nhttps://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm" }, { "instruction": "what vulnarability does easybuild-easyconfigs version less then 4.5.1 have", "input": "", "output": "Having vulnarability CVE-2021-43527 Advisory: Easybuild-easyconfigs 4.5.1 includes a fix for CVE-2021-43527: A remote code execution flaw was found in the way NSS verifies certificates.\r\nhttps://github.com/easybuilders/easybuild-easyconfigs/pull/14497", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easybuild-easyconfigs version less then 4.5.1 have ### Response: Having vulnarability CVE-2021-43527 Advisory: Easybuild-easyconfigs 4.5.1 includes a fix for CVE-2021-43527: A remote code execution flaw was found in the way NSS verifies certificates.\r\nhttps://github.com/easybuilders/easybuild-easyconfigs/pull/14497" }, { "instruction": "what vulnarability does easycordey version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52912 Advisory: Easycordey is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easycordey version greather then 0 have ### Response: Having vulnarability PVE-2023-52912 Advisory: Easycordey is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html" }, { "instruction": "what vulnarability does easycordeyy version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52913 Advisory: Easycordeyy is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easycordeyy version greather then 0 have ### Response: Having vulnarability PVE-2023-52913 Advisory: Easycordeyy is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html" }, { "instruction": "what vulnarability does easyfuncsys version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45443 Advisory: Easyfuncsys is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.\r\nhttps://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easyfuncsys version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45443 Advisory: Easyfuncsys is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.\r\nhttps://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository" }, { "instruction": "what vulnarability does easyinstall version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45414 Advisory: Easyinstall is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easyinstall version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45414 Advisory: Easyinstall is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/" }, { "instruction": "what vulnarability does easytimestamp version greather then equal to 0 have", "input": "", "output": "Having vulnarability PVE-2023-52935 Advisory: Easytimestamp is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easytimestamp version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52935 Advisory: Easytimestamp is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls" }, { "instruction": "what vulnarability does ebookmaker version less then 0.11.14 have", "input": "", "output": "Having vulnarability CVE-2021-23437 Advisory: Ebookmaker updates its dependency 'pillow' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ebookmaker version less then 0.11.14 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Ebookmaker updates its dependency 'pillow' to include a security fix." }, { "instruction": "what vulnarability does ec2-metadata version less then 2.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-38053 Advisory: Ec2-metadata 2.2.0 moves to use Instance Metadata Service version 2 to prevent SSRF attacks.\r\nhttps://github.com/adamchainz/ec2-metadata/issues/150\r\nhttps://github.com/adamchainz/ec2-metadata/pull/166", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ec2-metadata version less then 2.2.0 have ### Response: Having vulnarability PVE-2021-38053 Advisory: Ec2-metadata 2.2.0 moves to use Instance Metadata Service version 2 to prevent SSRF attacks.\r\nhttps://github.com/adamchainz/ec2-metadata/issues/150\r\nhttps://github.com/adamchainz/ec2-metadata/pull/166" }, { "instruction": "what vulnarability does ecdsa version less then 0.13.3 have", "input": "", "output": "Having vulnarability CVE-2019-14859 Advisory: A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions. See: CVE-2019-14859.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ecdsa version less then 0.13.3 have ### Response: Having vulnarability CVE-2019-14859 Advisory: A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions. See: CVE-2019-14859." }, { "instruction": "what vulnarability does ecowitt2mqtt version less then 2023.06.0 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Ecowitt2mqtt 2023.06.0 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/bachya/ecowitt2mqtt/pull/596/files", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ecowitt2mqtt version less then 2023.06.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Ecowitt2mqtt 2023.06.0 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/bachya/ecowitt2mqtt/pull/596/files" }, { "instruction": "what vulnarability does edapy version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Edapy 0.3.0 includes a security patch for the function '_read_yaml' in 'edapy/csv/init.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/MartinThoma/edapy/commit/47b958781a702e176ea72fe59ab8596ad93aabdc#diff-150063df356bdd6b5d718194a9ccb7750d86f8608959d31cef59012a8471709f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edapy version less then 0.3.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Edapy 0.3.0 includes a security patch for the function '_read_yaml' in 'edapy/csv/init.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/MartinThoma/edapy/commit/47b958781a702e176ea72fe59ab8596ad93aabdc#diff-150063df356bdd6b5d718194a9ccb7750d86f8608959d31cef59012a8471709f" }, { "instruction": "what vulnarability does edrn-sync version less then 1.0.5 have", "input": "", "output": "Having vulnarability PVE-2021-41918 Advisory: Edrn-sync version 1.0.5 addresses a vulnerability created by weak default passwords sync'd from the DMCC users list. It generates more secure random passwords for new users and also provides a utility for detecting old weak passwords and changing them to something randomized.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edrn-sync version less then 1.0.5 have ### Response: Having vulnarability PVE-2021-41918 Advisory: Edrn-sync version 1.0.5 addresses a vulnerability created by weak default passwords sync'd from the DMCC users list. It generates more secure random passwords for new users and also provides a utility for detecting old weak passwords and changing them to something randomized." }, { "instruction": "what vulnarability does edrnsite-policy version less then 1.0.5 have", "input": "", "output": "Having vulnarability CVE-2011-0720 Advisory: Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edrnsite-policy version less then 1.0.5 have ### Response: Having vulnarability CVE-2011-0720 Advisory: Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors." }, { "instruction": "what vulnarability does edumfa version less then 2.0.2 have", "input": "", "output": "Having vulnarability CVE-2024-3651 Advisory: Edumfa version 2.0.2 has updated its dependency on the idna library to version 3.7 in response to the security vulnerability detailed in CVE-2024-3651.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edumfa version less then 2.0.2 have ### Response: Having vulnarability CVE-2024-3651 Advisory: Edumfa version 2.0.2 has updated its dependency on the idna library to version 3.7 in response to the security vulnerability detailed in CVE-2024-3651." }, { "instruction": "what vulnarability does edx-celeryutils version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2024-64800 Advisory: Edx-celeryutils updates its Jinja2 dependency from version 2.9.6 to 2.10.1 to address the security vulnerability CVE-2019-10906.\r\nhttps://github.com/openedx/edx-celeryutils/commit/d38e5f5866917346a8a503b42ad1129f55ee3b4d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edx-celeryutils version less then 0.3.0 have ### Response: Having vulnarability PVE-2024-64800 Advisory: Edx-celeryutils updates its Jinja2 dependency from version 2.9.6 to 2.10.1 to address the security vulnerability CVE-2019-10906.\r\nhttps://github.com/openedx/edx-celeryutils/commit/d38e5f5866917346a8a503b42ad1129f55ee3b4d" }, { "instruction": "what vulnarability does edx-django-utils version less then 1.0.5 have", "input": "", "output": "Having vulnarability CVE-2019-10906 Advisory: Edx-django-utils 1.0.5 updates its Jinja2 dependency from version 2.10 to 2.10.1 in response to the security vulnerability CVE-2019-10906.\r\nhttps://github.com/openedx/edx-django-utils/commit/57371627ad50ccfff4e55a3af9f85c9c8f30aafd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edx-django-utils version less then 1.0.5 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Edx-django-utils 1.0.5 updates its Jinja2 dependency from version 2.10 to 2.10.1 in response to the security vulnerability CVE-2019-10906.\r\nhttps://github.com/openedx/edx-django-utils/commit/57371627ad50ccfff4e55a3af9f85c9c8f30aafd" }, { "instruction": "what vulnarability does edx-ecommerce-worker version less then 0.8.3 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Edx-ecommerce-worker 0.8.3 updates its dependency 'pyyaml' to v5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edx-ecommerce-worker version less then 0.8.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Edx-ecommerce-worker 0.8.3 updates its dependency 'pyyaml' to v5.1 to include a security fix." }, { "instruction": "what vulnarability does eedl version less then 0.2023.11.13 have", "input": "", "output": "Having vulnarability PVE-2023-62343 Advisory: Eedl 0.2023.11.13 includes a fix for CWE-377 (Insecure Temporary File) in vrt_path.\r\nhttps://github.com/water3d/eedl/pull/41/commits/da77bdf43441ae79f35cb5d7891937015958833a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eedl version less then 0.2023.11.13 have ### Response: Having vulnarability PVE-2023-62343 Advisory: Eedl 0.2023.11.13 includes a fix for CWE-377 (Insecure Temporary File) in vrt_path.\r\nhttps://github.com/water3d/eedl/pull/41/commits/da77bdf43441ae79f35cb5d7891937015958833a" }, { "instruction": "what vulnarability does egon version less then 0.4.1 have", "input": "", "output": "Having vulnarability PVE-2021-40568 Advisory: Egon 0.4.1 improves security and provides improved performance.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does egon version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-40568 Advisory: Egon 0.4.1 improves security and provides improved performance." }, { "instruction": "what vulnarability does eh version less then 0.2.8,greather then equal to 1.0.0,less then 1.3.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Eh 1.3.0 and 0.2.8 update its dependency 'pyyaml' to a version >=4.2b1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eh version less then 0.2.8,greather then equal to 1.0.0,less then 1.3.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Eh 1.3.0 and 0.2.8 update its dependency 'pyyaml' to a version >=4.2b1 to include a security fix." }, { "instruction": "what vulnarability does ekuiper version less then 1.1.2 have", "input": "", "output": "Having vulnarability PVE-2021-42963 Advisory: Ekuiper 1.1.2 runs build process/container as 'kuiper' user to avoid security risks.\r\nhttps://github.com/lf-edge/ekuiper/commit/1327eb69d0173c8d4a2070a835be6894f5a90b2b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ekuiper version less then 1.1.2 have ### Response: Having vulnarability PVE-2021-42963 Advisory: Ekuiper 1.1.2 runs build process/container as 'kuiper' user to avoid security risks.\r\nhttps://github.com/lf-edge/ekuiper/commit/1327eb69d0173c8d4a2070a835be6894f5a90b2b" }, { "instruction": "what vulnarability does elastic-apm version less then 5.1.0 have", "input": "", "output": "Having vulnarability CVE-2019-7617 Advisory: When the Elastic APM agent for Python versions before 5.1.0 is run as a CGI script, there is a variable name clash flaw if a remote attacker can control the proxy header. This could result in an attacker redirecting collected APM data to a proxy of their choosing. See: CVE-2019-7617.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elastic-apm version less then 5.1.0 have ### Response: Having vulnarability CVE-2019-7617 Advisory: When the Elastic APM agent for Python versions before 5.1.0 is run as a CGI script, there is a variable name clash flaw if a remote attacker can control the proxy header. This could result in an attacker redirecting collected APM data to a proxy of their choosing. See: CVE-2019-7617." }, { "instruction": "what vulnarability does electrum version less then 2.9.4,greather then equal to 3.0,less then 3.0.5 have", "input": "", "output": "Having vulnarability CVE-2018-6353 Advisory: The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does electrum version less then 2.9.4,greather then equal to 3.0,less then 3.0.5 have ### Response: Having vulnarability CVE-2018-6353 Advisory: The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022." }, { "instruction": "what vulnarability does electrum-python version less then 2.9.4,greather then equal to 3.0,less then 3.0.5 have", "input": "", "output": "Having vulnarability CVE-2018-6353 Advisory: The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does electrum-python version less then 2.9.4,greather then equal to 3.0,less then 3.0.5 have ### Response: Having vulnarability CVE-2018-6353 Advisory: The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022." }, { "instruction": "what vulnarability does electrumsv-secp256k1 version less then 8.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42043 Advisory: Electrumsv-secp256k1 version 8.0.0 makes build system support new GitHub & PyPI security requirements.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does electrumsv-secp256k1 version less then 8.0.0 have ### Response: Having vulnarability PVE-2021-42043 Advisory: Electrumsv-secp256k1 version 8.0.0 makes build system support new GitHub & PyPI security requirements." }, { "instruction": "what vulnarability does electrumx version less then 1.4.1 have", "input": "", "output": "Having vulnarability PVE-2021-36324 Advisory: Electrumx before 1.4.1 did not use PROTOCOL_MIN to 1.0. Earlier protocol versions are used by 2.9.x clients of Electrum and Electron Cash. They all have a local daemon vulnerability.\r\nhttps://github.com/kyuupichan/electrumx/commit/fec2ee1d8f2590a2ef5c970326e378415b4f6d6e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does electrumx version less then 1.4.1 have ### Response: Having vulnarability PVE-2021-36324 Advisory: Electrumx before 1.4.1 did not use PROTOCOL_MIN to 1.0. Earlier protocol versions are used by 2.9.x clients of Electrum and Electron Cash. They all have a local daemon vulnerability.\r\nhttps://github.com/kyuupichan/electrumx/commit/fec2ee1d8f2590a2ef5c970326e378415b4f6d6e" }, { "instruction": "what vulnarability does elemental-cms version less then 1.1.39 have", "input": "", "output": "Having vulnarability PVE-2023-61368 Advisory: Elemental-cms 1.1.39 adds secure flag to session cookie.\r\nhttps://github.com/paranoid-software/elemental-cms/pull/78", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elemental-cms version less then 1.1.39 have ### Response: Having vulnarability PVE-2023-61368 Advisory: Elemental-cms 1.1.39 adds secure flag to session cookie.\r\nhttps://github.com/paranoid-software/elemental-cms/pull/78" }, { "instruction": "what vulnarability does elixir version less then equal to 0.8.0 have", "input": "", "output": "Having vulnarability CVE-2012-2146 Advisory: Elixir as on PyPI, is vulnerable to CVE-2012-2146: Elixir uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=810013", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elixir version less then equal to 0.8.0 have ### Response: Having vulnarability CVE-2012-2146 Advisory: Elixir as on PyPI, is vulnerable to CVE-2012-2146: Elixir uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=810013" }, { "instruction": "what vulnarability does elkm1 version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-42011 Advisory: Elkm1 v1.0.0 adds support for TLS 1.2 secure connection mode.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elkm1 version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-42011 Advisory: Elkm1 v1.0.0 adds support for TLS 1.2 secure connection mode." }, { "instruction": "what vulnarability does elyra version less then 2.2.3 have", "input": "", "output": "Having vulnarability PVE-2021-40313 Advisory: Elyra 2.2.3 allows secure connections to S3 object storage.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elyra version less then 2.2.3 have ### Response: Having vulnarability PVE-2021-40313 Advisory: Elyra 2.2.3 allows secure connections to S3 object storage." }, { "instruction": "what vulnarability does ema-workbench version less then 2.2.0 have", "input": "", "output": "Having vulnarability PVE-2022-50873 Advisory: Ema-workbench 2.2.0 replaces all HTTP links with secure HTTPS URLs.\r\nhttps://github.com/quaquel/EMAworkbench/pull/134", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ema-workbench version less then 2.2.0 have ### Response: Having vulnarability PVE-2022-50873 Advisory: Ema-workbench 2.2.0 replaces all HTTP links with secure HTTPS URLs.\r\nhttps://github.com/quaquel/EMAworkbench/pull/134" }, { "instruction": "what vulnarability does emailproxy version greather then equal to 0,less then 2023.11.19 have", "input": "", "output": "Having vulnarability PVE-2024-99795 Advisory: Emailproxy vesions before 2023.11.19 are susceptible to unverified password changes because of improper validation of expired authorization tokens. An attacker can exploit this by utilizing valid account addresses and precise timing to access an account without validating the account password. This vulnerability specifically impacts instances using a proxy with the CCG flow and is especially critical in publicly accessible environments, such as those available over the internet or a network.\r\nhttps://github.com/simonrob/email-oauth2-proxy/pull/60", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emailproxy version greather then equal to 0,less then 2023.11.19 have ### Response: Having vulnarability PVE-2024-99795 Advisory: Emailproxy vesions before 2023.11.19 are susceptible to unverified password changes because of improper validation of expired authorization tokens. An attacker can exploit this by utilizing valid account addresses and precise timing to access an account without validating the account password. This vulnerability specifically impacts instances using a proxy with the CCG flow and is especially critical in publicly accessible environments, such as those available over the internet or a network.\r\nhttps://github.com/simonrob/email-oauth2-proxy/pull/60" }, { "instruction": "what vulnarability does embedchain version less then 0.1.57 have", "input": "", "output": "Having vulnarability CVE-2024-23731 Advisory: The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code, related to the openapi.py yaml.load function argument.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embedchain version less then 0.1.57 have ### Response: Having vulnarability CVE-2024-23731 Advisory: The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code, related to the openapi.py yaml.load function argument." }, { "instruction": "what vulnarability does embedded-topic-model version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2022-52255 Advisory: Embedded-topic-model 1.2.0 updates its dependency 'skicit-learn' to versions '>=1.3.*' to include a security fix.\r\nhttps://github.com/lffloyd/embedded-topic-model/commit/331fc0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embedded-topic-model version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-52255 Advisory: Embedded-topic-model 1.2.0 updates its dependency 'skicit-learn' to versions '>=1.3.*' to include a security fix.\r\nhttps://github.com/lffloyd/embedded-topic-model/commit/331fc0" }, { "instruction": "what vulnarability does embody-codec version less then 1.0.28 have", "input": "", "output": "Having vulnarability CVE-2020-8492 Advisory: Embody-codec version 1.0.28 raises its Python version requirement from at least 3.7 but less than 4.0, to now requiring a minimum of 3.9 due to security concerns outlined in CVE-2020-8492.\r\nhttps://github.com/aidee-health/embody-codec/pull/354/commits/a82092116340a5ee3d7d6fd70d11fb5bd4c2746d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embody-codec version less then 1.0.28 have ### Response: Having vulnarability CVE-2020-8492 Advisory: Embody-codec version 1.0.28 raises its Python version requirement from at least 3.7 but less than 4.0, to now requiring a minimum of 3.9 due to security concerns outlined in CVE-2020-8492.\r\nhttps://github.com/aidee-health/embody-codec/pull/354/commits/a82092116340a5ee3d7d6fd70d11fb5bd4c2746d" }, { "instruction": "what vulnarability does emesene version less then 1.6.2 have", "input": "", "output": "Having vulnarability CVE-2010-2053 Advisory: emesenelib/ProfileManager.py in emesene before 1.6.2 allows local users to overwrite arbitrary files via a symlink attack on the emsnpic temporary file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emesene version less then 1.6.2 have ### Response: Having vulnarability CVE-2010-2053 Advisory: emesenelib/ProfileManager.py in emesene before 1.6.2 allows local users to overwrite arbitrary files via a symlink attack on the emsnpic temporary file." }, { "instruction": "what vulnarability does emrt-necd-content version less then 2.0.15 have", "input": "", "output": "Having vulnarability PVE-2021-40547 Advisory: Emrt.necd.content 2.0.15 fixes a possible JavaScript injection.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emrt-necd-content version less then 2.0.15 have ### Response: Having vulnarability PVE-2021-40547 Advisory: Emrt.necd.content 2.0.15 fixes a possible JavaScript injection." }, { "instruction": "what vulnarability does encapsia-api version less then 0.2.9 have", "input": "", "output": "Having vulnarability CVE-2020-36242 Advisory: Encapsia-api 0.2.9 updates its dependency 'cryptography' to v3.4.6 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encapsia-api version less then 0.2.9 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Encapsia-api 0.2.9 updates its dependency 'cryptography' to v3.4.6 to include a security fix." }, { "instruction": "what vulnarability does encapsia-cli version less then 0.5.2 have", "input": "", "output": "Having vulnarability CVE-2007-4559 Advisory: Encapsia-cli 0.5.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encapsia-cli version less then 0.5.2 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Encapsia-cli 0.5.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267." }, { "instruction": "what vulnarability does encord-active version less then 0.1.63 have", "input": "", "output": "Having vulnarability PVE-2023-59692 Advisory: Encord-active 0.1.63 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/encord-team/encord-active/pull/508", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encord-active version less then 0.1.63 have ### Response: Having vulnarability PVE-2023-59692 Advisory: Encord-active 0.1.63 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/encord-team/encord-active/pull/508" }, { "instruction": "what vulnarability does energyquantified version less then 0.11 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Energyquantified 0.11 updates its dependency 'requests' to v2.31 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does energyquantified version less then 0.11 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Energyquantified 0.11 updates its dependency 'requests' to v2.31 to include a security fix." }, { "instruction": "what vulnarability does enrocrypt version less then 1.1.4 have", "input": "", "output": "Having vulnarability CVE-2021-39182 Advisory: Enrocrypt 1.1.4 includes a fix for CVE-2021-39182: Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. As a workaround, users can remove the 'MD5' hashing function from the file 'hashing.py'.\r\nhttps://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783\r\nhttps://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does enrocrypt version less then 1.1.4 have ### Response: Having vulnarability CVE-2021-39182 Advisory: Enrocrypt 1.1.4 includes a fix for CVE-2021-39182: Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. As a workaround, users can remove the 'MD5' hashing function from the file 'hashing.py'.\r\nhttps://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783\r\nhttps://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce" }, { "instruction": "what vulnarability does entente version less then 0.11.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Entente 0.11.0 includes a security patch for the function 'test_composite_landmarks_cli' in 'entente/test_cli.py'. it used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/lace/entente/commit/bbbf1985cbb38f749e7dd998bbf42b72c4d1d99c#diff-52de9aa5fb74fe3cdb1d128e9e6b246c69003cf86a181c79f22ec2510dc19b3e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does entente version less then 0.11.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Entente 0.11.0 includes a security patch for the function 'test_composite_landmarks_cli' in 'entente/test_cli.py'. it used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/lace/entente/commit/bbbf1985cbb38f749e7dd998bbf42b72c4d1d99c#diff-52de9aa5fb74fe3cdb1d128e9e6b246c69003cf86a181c79f22ec2510dc19b3e" }, { "instruction": "what vulnarability does entropy-pooling version less then 1.0.4 have", "input": "", "output": "Having vulnarability CVE-2024-28219 Advisory: Entropy-pooling version 1.0.4 updates its Pillow dependency from version 10.2.0 to 10.3.0 in response to the security concerns identified in CVE-2024-28219.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does entropy-pooling version less then 1.0.4 have ### Response: Having vulnarability CVE-2024-28219 Advisory: Entropy-pooling version 1.0.4 updates its Pillow dependency from version 10.2.0 to 10.3.0 in response to the security concerns identified in CVE-2024-28219." }, { "instruction": "what vulnarability does envd version less then 0.3.45 have", "input": "", "output": "Having vulnarability CVE-2023-49568 Advisory: Envd 0.3.45 updates its Go dependency 'go-git' to v5.11.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envd version less then 0.3.45 have ### Response: Having vulnarability CVE-2023-49568 Advisory: Envd 0.3.45 updates its Go dependency 'go-git' to v5.11.0 to include a security fix." }, { "instruction": "what vulnarability does envelope version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-48468 Advisory: Envelope 2.0.0 removes an insecure PRNG.\r\nhttps://github.com/CZ-NIC/envelope/commit/766eeb7eb20468b39c79ef8eba705fe171aacbbc", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envelope version less then 2.0.0 have ### Response: Having vulnarability PVE-2022-48468 Advisory: Envelope 2.0.0 removes an insecure PRNG.\r\nhttps://github.com/CZ-NIC/envelope/commit/766eeb7eb20468b39c79ef8eba705fe171aacbbc" }, { "instruction": "what vulnarability does envyconfig version less then 1.1.4 have", "input": "", "output": "Having vulnarability CVE-2021-23980 Advisory: Envyconfig 1.1.4 updates its dependency 'bleach' to v3.3.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envyconfig version less then 1.1.4 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Envyconfig 1.1.4 updates its dependency 'bleach' to v3.3.0 to include a security fix." }, { "instruction": "what vulnarability does eoreader version less then 0.9.0 have", "input": "", "output": "Having vulnarability CVE-2021-42343 Advisory: Eoreader 0.9.0 updates its dependency 'dask' to v2021.10.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eoreader version less then 0.9.0 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Eoreader 0.9.0 updates its dependency 'dask' to v2021.10.0 to include a security fix." }, { "instruction": "what vulnarability does epam-indigo version less then 1.6.1 have", "input": "", "output": "Having vulnarability CVE-2021-44832 Advisory: Epam.indigo 1.6.1 updates version of 'Elasticsearch' to v7.16.1 to remove risk of log4j issue.\r\nhttps://github.com/epam/Indigo/pull/553", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epam-indigo version less then 1.6.1 have ### Response: Having vulnarability CVE-2021-44832 Advisory: Epam.indigo 1.6.1 updates version of 'Elasticsearch' to v7.16.1 to remove risk of log4j issue.\r\nhttps://github.com/epam/Indigo/pull/553" }, { "instruction": "what vulnarability does ephios version less then 0.15.12 have", "input": "", "output": "Having vulnarability PVE-2023-60929 Advisory: Ephios 0.15.12 includes a fix for a privilege escalation vulnerability.\r\nhttps://github.com/ephios-dev/ephios/pull/1042", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ephios version less then 0.15.12 have ### Response: Having vulnarability PVE-2023-60929 Advisory: Ephios 0.15.12 includes a fix for a privilege escalation vulnerability.\r\nhttps://github.com/ephios-dev/ephios/pull/1042" }, { "instruction": "what vulnarability does epsagon version less then 1.5.0 have", "input": "", "output": "Having vulnarability PVE-2021-39030 Advisory: Epsagon 1.5.0 updates several dependencies in package.json due to vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epsagon version less then 1.5.0 have ### Response: Having vulnarability PVE-2021-39030 Advisory: Epsagon 1.5.0 updates several dependencies in package.json due to vulnerabilities." }, { "instruction": "what vulnarability does epyk version less then 1.5.6 have", "input": "", "output": "Having vulnarability PVE-2021-40189 Advisory: Epyk 1.5.6 fixes an external JavaScript text injection issue.\r\nhttps://github.com/epykure/epyk-ui/commit/8cafc5a9b4c1c487f52b98d875657551902c2e40", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epyk version less then 1.5.6 have ### Response: Having vulnarability PVE-2021-40189 Advisory: Epyk 1.5.6 fixes an external JavaScript text injection issue.\r\nhttps://github.com/epykure/epyk-ui/commit/8cafc5a9b4c1c487f52b98d875657551902c2e40" }, { "instruction": "what vulnarability does errbot version less then 1.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-25812 Advisory: Errbot 1.3.0 fixes a security issue: the plugin directory permissions were too lax.\r\nhttps://github.com/errbotio/errbot/commit/3bf9abe82eb188dd8d3a992280550a903c5d141c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does errbot version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-25812 Advisory: Errbot 1.3.0 fixes a security issue: the plugin directory permissions were too lax.\r\nhttps://github.com/errbotio/errbot/commit/3bf9abe82eb188dd8d3a992280550a903c5d141c" }, { "instruction": "what vulnarability does ert version less then 4.5.6 have", "input": "", "output": "Having vulnarability PVE-2023-59960 Advisory: Ert 4.5.6 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/equinor/ert/pull/5358", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ert version less then 4.5.6 have ### Response: Having vulnarability PVE-2023-59960 Advisory: Ert 4.5.6 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/equinor/ert/pull/5358" }, { "instruction": "what vulnarability does ert-storage version less then 0.1.8 have", "input": "", "output": "Having vulnarability PVE-2021-40562 Advisory: Ert-storage 0.1.8 enables token-based security for the 'ert-storage'.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ert-storage version less then 0.1.8 have ### Response: Having vulnarability PVE-2021-40562 Advisory: Ert-storage 0.1.8 enables token-based security for the 'ert-storage'." }, { "instruction": "what vulnarability does esmerald version less then 1.2.3 have", "input": "", "output": "Having vulnarability PVE-2023-58713 Advisory: Esmerald 1.2.3 updates its dependency 'Starlette' to versions '>=0.27.0' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esmerald version less then 1.2.3 have ### Response: Having vulnarability PVE-2023-58713 Advisory: Esmerald 1.2.3 updates its dependency 'Starlette' to versions '>=0.27.0' to include a security fix." }, { "instruction": "what vulnarability does espeakng version less then 1.49.0 have", "input": "", "output": "Having vulnarability PVE-2021-38581 Advisory: Espeakng 1.49.0 fixes many security issues. No details were given.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does espeakng version less then 1.49.0 have ### Response: Having vulnarability PVE-2021-38581 Advisory: Espeakng 1.49.0 fixes many security issues. No details were given." }, { "instruction": "what vulnarability does esphome version less then 1.15.0b1 have", "input": "", "output": "Having vulnarability PVE-2021-38623 Advisory: Esphome 1.15.0b1 includes a fix for an http_request ESP32 insecure requests that may return the address of local variable. See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esphome version less then 1.15.0b1 have ### Response: Having vulnarability PVE-2021-38623 Advisory: Esphome 1.15.0b1 includes a fix for an http_request ESP32 insecure requests that may return the address of local variable. See: ." }, { "instruction": "what vulnarability does esptool version greather then equal to 0 have", "input": "", "output": "Having vulnarability CVE-2023-46894 Advisory: Esptool is affected by CVE-2023-46894: An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.\r\nhttps://github.com/espressif/esptool/issues/926", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esptool version greather then equal to 0 have ### Response: Having vulnarability CVE-2023-46894 Advisory: Esptool is affected by CVE-2023-46894: An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.\r\nhttps://github.com/espressif/esptool/issues/926" }, { "instruction": "what vulnarability does esrapgra version less then 0.1.1 have", "input": "", "output": "Having vulnarability PVE-2023-61963 Advisory: Esrapgra 0.1.1 escapes strings using 'shlex' to prevent shell-escape attacks.\r\nhttps://github.com/audy/esrapgra/commit/6ac83acd895d864bfbcaa1f26020615c9fa9610f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esrapgra version less then 0.1.1 have ### Response: Having vulnarability PVE-2023-61963 Advisory: Esrapgra 0.1.1 escapes strings using 'shlex' to prevent shell-escape attacks.\r\nhttps://github.com/audy/esrapgra/commit/6ac83acd895d864bfbcaa1f26020615c9fa9610f" }, { "instruction": "what vulnarability does eth-abi version greather then equal to 0,less then 4.2.0 have", "input": "", "output": "Having vulnarability PVE-2024-99787 Advisory: Eth-abi versions above 4.2.0 are susceptible to a Denial of Service (DoS) attack when attempting to parse zero-sized types (ZST). Such parsing, despite being compliant with the ABI specifications, can result in excessive memory allocation if malicious ZST tuples are processed. A potential mitigation strategy involves prohibiting the parsing of ZST to prevent this vulnerability from being exploited.\r\nhttps://github.com/ethereum/eth-abi/commit/7db682955568b01faf0858ac14bc73c624e5dd10", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-abi version greather then equal to 0,less then 4.2.0 have ### Response: Having vulnarability PVE-2024-99787 Advisory: Eth-abi versions above 4.2.0 are susceptible to a Denial of Service (DoS) attack when attempting to parse zero-sized types (ZST). Such parsing, despite being compliant with the ABI specifications, can result in excessive memory allocation if malicious ZST tuples are processed. A potential mitigation strategy involves prohibiting the parsing of ZST to prevent this vulnerability from being exploited.\r\nhttps://github.com/ethereum/eth-abi/commit/7db682955568b01faf0858ac14bc73c624e5dd10" }, { "instruction": "what vulnarability does eth-account version greather then equal to 0,less then 0.5.9 have", "input": "", "output": "Having vulnarability CVE-2022-1930 Advisory: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-account version greather then equal to 0,less then 0.5.9 have ### Response: Having vulnarability CVE-2022-1930 Advisory: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method" }, { "instruction": "what vulnarability does eth-hash version less then 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2018-15560 Advisory: Eth-hash 0.2.0 updates its dependency 'pycryptodome' minimum requirement to v3.6.6 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-hash version less then 0.2.0 have ### Response: Having vulnarability CVE-2018-15560 Advisory: Eth-hash 0.2.0 updates its dependency 'pycryptodome' minimum requirement to v3.6.6 to include a security fix." }, { "instruction": "what vulnarability does eth-keyfile version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2022-44610 Advisory: Eth-keyfile 0.6.0 mitigates a timing attack vector affecting the hmac comparation when decoding keyfiles.\r\nhttps://github.com/ethereum/eth-keyfile/issues/12", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-keyfile version less then 0.6.0 have ### Response: Having vulnarability PVE-2022-44610 Advisory: Eth-keyfile 0.6.0 mitigates a timing attack vector affecting the hmac comparation when decoding keyfiles.\r\nhttps://github.com/ethereum/eth-keyfile/issues/12" }, { "instruction": "what vulnarability does etherweaver version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2018-1000805 Advisory: Etherweaver 0.3.0 updates its dependency 'paramiko' to v2.4.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etherweaver version less then 0.3.0 have ### Response: Having vulnarability CVE-2018-1000805 Advisory: Etherweaver 0.3.0 updates its dependency 'paramiko' to v2.4.2 to include a security fix." }, { "instruction": "what vulnarability does ethically version less then 0.0.3 have", "input": "", "output": "Having vulnarability PVE-2021-37042 Advisory: Ethically 0.0.3 fixes security issues with dependencies. This package is no longer in PyPI. No more information was found.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethically version less then 0.0.3 have ### Response: Having vulnarability PVE-2021-37042 Advisory: Ethically 0.0.3 fixes security issues with dependencies. This package is no longer in PyPI. No more information was found." }, { "instruction": "what vulnarability does ethsnarks version less then 0.18.10.1 have", "input": "", "output": "Having vulnarability PVE-2021-37387 Advisory: Ethsnarks 0.18.10.1 fixes security bugs in MiMC-p/p and Miximus.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethsnarks version less then 0.18.10.1 have ### Response: Having vulnarability PVE-2021-37387 Advisory: Ethsnarks 0.18.10.1 fixes security bugs in MiMC-p/p and Miximus." }, { "instruction": "what vulnarability does ethyca-fides version less then 2.1.0 have", "input": "", "output": "Having vulnarability PVE-2024-63353 Advisory: Ethyca-fides 2.1.0 addresses a race condition vulnerability that occurred during the initialization of the FidesConfig class. This vulnerability could lead to unexpected behavior or incorrect security configurations if two threads attempted to modify the security attribute simultaneously. The fix ensures that the security attribute is safely initialized as an SecuritySettings object and that the test_mode attribute is correctly set using the get_test_mode() function.\r\nhttps://github.com/ethyca/fides/pull/1718/commits/22df5c9917a8a3b43b40dfcb1a4c246f74e6d36c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethyca-fides version less then 2.1.0 have ### Response: Having vulnarability PVE-2024-63353 Advisory: Ethyca-fides 2.1.0 addresses a race condition vulnerability that occurred during the initialization of the FidesConfig class. This vulnerability could lead to unexpected behavior or incorrect security configurations if two threads attempted to modify the security attribute simultaneously. The fix ensures that the security attribute is safely initialized as an SecuritySettings object and that the test_mode attribute is correctly set using the get_test_mode() function.\r\nhttps://github.com/ethyca/fides/pull/1718/commits/22df5c9917a8a3b43b40dfcb1a4c246f74e6d36c" }, { "instruction": "what vulnarability does etlhelper version less then 0.14.0 have", "input": "", "output": "Having vulnarability PVE-2022-51664 Advisory: Etlhelper 0.14.0 performs validation on table and column names that are passed to the load function to prevent malicious code being inserted into the auto-generated SQL.\r\nhttps://github.com/BritishGeologicalSurvey/etlhelper/pull/134", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etlhelper version less then 0.14.0 have ### Response: Having vulnarability PVE-2022-51664 Advisory: Etlhelper 0.14.0 performs validation on table and column names that are passed to the load function to prevent malicious code being inserted into the auto-generated SQL.\r\nhttps://github.com/BritishGeologicalSurvey/etlhelper/pull/134" }, { "instruction": "what vulnarability does etlstat version less then 0.6.1 have", "input": "", "output": "Having vulnarability CVE-2019-7164 Advisory: Etlstat 0.6.1 updates SQLAlchemy to versions >=1.3.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etlstat version less then 0.6.1 have ### Response: Having vulnarability CVE-2019-7164 Advisory: Etlstat 0.6.1 updates SQLAlchemy to versions >=1.3.0 to include security fixes." }, { "instruction": "what vulnarability does euphorie version less then 11.1.2 have", "input": "", "output": "Having vulnarability PVE-2021-37459 Advisory: Euphorie 11.1.2 tightens the security on several client views.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does euphorie version less then 11.1.2 have ### Response: Having vulnarability PVE-2021-37459 Advisory: Euphorie 11.1.2 tightens the security on several client views." }, { "instruction": "what vulnarability does evalml version less then 0.42.0 have", "input": "", "output": "Having vulnarability CVE-2021-33430 Advisory: Evalml version 0.42.0 updates its minimum required version of numpy to >=1.21.0 from the previously specified >=1.20.0. This change addresses the security issue CVE-2021-33430.\r\nhttps://github.com/alteryx/evalml/pull/3207/commits/2e3daedb4d800952d5f8c7488450df870ed09a48", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evalml version less then 0.42.0 have ### Response: Having vulnarability CVE-2021-33430 Advisory: Evalml version 0.42.0 updates its minimum required version of numpy to >=1.21.0 from the previously specified >=1.20.0. This change addresses the security issue CVE-2021-33430.\r\nhttps://github.com/alteryx/evalml/pull/3207/commits/2e3daedb4d800952d5f8c7488450df870ed09a48" }, { "instruction": "what vulnarability does evalne version less then 0.3.3 have", "input": "", "output": "Having vulnarability PVE-2021-41325 Advisory: Evalne version 0.3.3 includes a security patch for the function '_evaluate_ee_e2e_cmd' in 'evalne/evaluation/evaluator.py'. It contained an OS injection vulnerability: subprocess call with shell=True.\r\nhttps://github.com/Dru-Mara/EvalNE/commit/7041dbb701eb622f6ce38b4ab529b14d86656a26#diff-2279cc18e0f5d8bb6d8fc4820ab5190a43df3a2b6135d860204bcb3b2bc993e0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evalne version less then 0.3.3 have ### Response: Having vulnarability PVE-2021-41325 Advisory: Evalne version 0.3.3 includes a security patch for the function '_evaluate_ee_e2e_cmd' in 'evalne/evaluation/evaluator.py'. It contained an OS injection vulnerability: subprocess call with shell=True.\r\nhttps://github.com/Dru-Mara/EvalNE/commit/7041dbb701eb622f6ce38b4ab529b14d86656a26#diff-2279cc18e0f5d8bb6d8fc4820ab5190a43df3a2b6135d860204bcb3b2bc993e0" }, { "instruction": "what vulnarability does eve version less then 0.0.7 have", "input": "", "output": "Having vulnarability PVE-2017-47652 Advisory: Eve 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve version less then 0.0.7 have ### Response: Having vulnarability PVE-2017-47652 Advisory: Eve 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks." }, { "instruction": "what vulnarability does eve-alpha version less then 0.0.7 have", "input": "", "output": "Having vulnarability PVE-2017-47652 Advisory: Eve-alpha 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks.\r\nhttps://github.com/pyeve/eve/commit/fe4efe705c320f2fe0f47ae1d59da057232afb74", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve-alpha version less then 0.0.7 have ### Response: Having vulnarability PVE-2017-47652 Advisory: Eve-alpha 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks.\r\nhttps://github.com/pyeve/eve/commit/fe4efe705c320f2fe0f47ae1d59da057232afb74" }, { "instruction": "what vulnarability does eve-srp version greather then equal to 0,less then 0.12.12 have", "input": "", "output": "Having vulnarability CVE-2020-36660 Advisory: Eve-srp 0.12.12 includes a fix for CVE-2020-36660: This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely.\r\nhttps://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240\r\nNOTE: The patched release is not on PyPI. Look for it in eve-srp GH repo.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve-srp version greather then equal to 0,less then 0.12.12 have ### Response: Having vulnarability CVE-2020-36660 Advisory: Eve-srp 0.12.12 includes a fix for CVE-2020-36660: This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely.\r\nhttps://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240\r\nNOTE: The patched release is not on PyPI. Look for it in eve-srp GH repo." }, { "instruction": "what vulnarability does evennia version less then 0.8 have", "input": "", "output": "Having vulnarability CVE-2016-3076 Advisory: Evennia 0.8 updates its dependency 'pillow' to v5.2.0 to include security fixes.\r\nhttps://github.com/evennia/evennia/commit/6b7766d2956ae7be19f2cf7be0d43056c0accbb0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evennia version less then 0.8 have ### Response: Having vulnarability CVE-2016-3076 Advisory: Evennia 0.8 updates its dependency 'pillow' to v5.2.0 to include security fixes.\r\nhttps://github.com/evennia/evennia/commit/6b7766d2956ae7be19f2cf7be0d43056c0accbb0" }, { "instruction": "what vulnarability does event-scheduler version less then 0.1.2 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Event-scheduler 0.1.2 updates its dependency 'urllib3' to v1.26.5 due to security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does event-scheduler version less then 0.1.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Event-scheduler 0.1.2 updates its dependency 'urllib3' to v1.26.5 due to security issues." }, { "instruction": "what vulnarability does event-tracking version less then 0.2.9 have", "input": "", "output": "Having vulnarability PVE-2021-37232 Advisory: event-tracking 0.2.9 changes: This upgrade will fix the security vulnerability in the old versions of jinja2.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does event-tracking version less then 0.2.9 have ### Response: Having vulnarability PVE-2021-37232 Advisory: event-tracking 0.2.9 changes: This upgrade will fix the security vulnerability in the old versions of jinja2." }, { "instruction": "what vulnarability does eventlet version less then 0.31.0 have", "input": "", "output": "Having vulnarability CVE-2021-21419 Advisory: Eventlet 0.31.0 includes a fix for CVE-2021-21419: A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eventlet version less then 0.31.0 have ### Response: Having vulnarability CVE-2021-21419 Advisory: Eventlet 0.31.0 includes a fix for CVE-2021-21419: A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process." }, { "instruction": "what vulnarability does eventmq version less then 0.3.13rc1 have", "input": "", "output": "Having vulnarability PVE-2021-38402 Advisory: Eventmq 0.3.13rc1 upgrades the psutil dependency to a more secure version.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eventmq version less then 0.3.13rc1 have ### Response: Having vulnarability PVE-2021-38402 Advisory: Eventmq 0.3.13rc1 upgrades the psutil dependency to a more secure version." }, { "instruction": "what vulnarability does evidently version less then 0.4.17 have", "input": "", "output": "Having vulnarability CVE-2021-38296 Advisory: Evidently 0.4.17 upgrades its pyspark dependency to version 3.3.2 or later in response to CVE-2021-38296.\r\nhttps://github.com/evidentlyai/evidently/pull/1013/commits/a4423bff8e8eab56306a2686d66a1a3e80d62755", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evidently version less then 0.4.17 have ### Response: Having vulnarability CVE-2021-38296 Advisory: Evidently 0.4.17 upgrades its pyspark dependency to version 3.3.2 or later in response to CVE-2021-38296.\r\nhttps://github.com/evidentlyai/evidently/pull/1013/commits/a4423bff8e8eab56306a2686d66a1a3e80d62755" }, { "instruction": "what vulnarability does exasol-bucketfs version less then 0.8.0 have", "input": "", "output": "Having vulnarability CVE-2023-23931 Advisory: Exasol-bucketfs 0.8.0 updates its dependency 'cryptography' to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exasol-bucketfs version less then 0.8.0 have ### Response: Having vulnarability CVE-2023-23931 Advisory: Exasol-bucketfs 0.8.0 updates its dependency 'cryptography' to include security fixes." }, { "instruction": "what vulnarability does exasol-integration-test-docker-environment version less then 0.9.0 have", "input": "", "output": "Having vulnarability CVE-2021-32559 Advisory: Exasol-integration-test-docker-environment 0.9.0 removes its dependency 'pywin32' to avoid a potential vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exasol-integration-test-docker-environment version less then 0.9.0 have ### Response: Having vulnarability CVE-2021-32559 Advisory: Exasol-integration-test-docker-environment 0.9.0 removes its dependency 'pywin32' to avoid a potential vulnerability." }, { "instruction": "what vulnarability does exchanges-wrapper version less then 1.3.4 have", "input": "", "output": "Having vulnarability CVE-2023-1428 Advisory: Exchanges-wrapper 1.3.4 updates its dependency 'grpcio' to version '1.56.0' to include a fix for a Reachable Assertion vulnerability.\r\nhttps://github.com/DogsTailFarmer/exchanges-wrapper/commit/f679262b648bdf08d4fa4e4f071a12562c25a54a\r\nhttps://github.com/advisories/GHSA-6628-q6j9-w8vg", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exchanges-wrapper version less then 1.3.4 have ### Response: Having vulnarability CVE-2023-1428 Advisory: Exchanges-wrapper 1.3.4 updates its dependency 'grpcio' to version '1.56.0' to include a fix for a Reachable Assertion vulnerability.\r\nhttps://github.com/DogsTailFarmer/exchanges-wrapper/commit/f679262b648bdf08d4fa4e4f071a12562c25a54a\r\nhttps://github.com/advisories/GHSA-6628-q6j9-w8vg" }, { "instruction": "what vulnarability does execnet version less then 1.0.6 have", "input": "", "output": "Having vulnarability PVE-2024-67501 Advisory: Execnet 1.0.6 resolves a race condition that occurred when multiple threads simultaneously transmitted data over channels, which previously led to crashes in the serializer and process. This fix enhances stability and concurrency handling.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does execnet version less then 1.0.6 have ### Response: Having vulnarability PVE-2024-67501 Advisory: Execnet 1.0.6 resolves a race condition that occurred when multiple threads simultaneously transmitted data over channels, which previously led to crashes in the serializer and process. This fix enhances stability and concurrency handling." }, { "instruction": "what vulnarability does exgrex-py version less then 0.3a2 have", "input": "", "output": "Having vulnarability CVE-2021-23980 Advisory: Exgrex-py 0.3a2 updates its dependency 'bleach' to v3.3.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exgrex-py version less then 0.3a2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Exgrex-py 0.3a2 updates its dependency 'bleach' to v3.3.0 to include a security fix." }, { "instruction": "what vulnarability does exgrex-pytest version less then 0.1a2 have", "input": "", "output": "Having vulnarability CVE-2021-23980 Advisory: Exgrex-pytest 0.1a2 updates underlying dependencies for security reasons: bleach -> 3.3.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exgrex-pytest version less then 0.1a2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Exgrex-pytest 0.1a2 updates underlying dependencies for security reasons: bleach -> 3.3.0." }, { "instruction": "what vulnarability does exiv2 version equal to 0.26 have", "input": "", "output": "Having vulnarability CVE-2017-1000126 Advisory: A stack out of bounds read vulnerability exists in Exiv2 library 0.26 within the webp parser.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exiv2 version equal to 0.26 have ### Response: Having vulnarability CVE-2017-1000126 Advisory: A stack out of bounds read vulnerability exists in Exiv2 library 0.26 within the webp parser." }, { "instruction": "what vulnarability does exonetapi version less then 3.0.2 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Exonetapi 3.0.2 updates its dependency 'urllib3' to v1.26.6 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exonetapi version less then 3.0.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Exonetapi 3.0.2 updates its dependency 'urllib3' to v1.26.6 to include a security fix." }, { "instruction": "what vulnarability does exoskeleton version less then 1.2.1 have", "input": "", "output": "Having vulnarability PVE-2021-39207 Advisory: Exoskeleton 1.2.1 requires lxml version >= 4.6.2 (released 2020-11-26) as it fixes a vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exoskeleton version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-39207 Advisory: Exoskeleton 1.2.1 requires lxml version >= 4.6.2 (released 2020-11-26) as it fixes a vulnerability." }, { "instruction": "what vulnarability does exotel version greather then equal to 0.1.6 have", "input": "", "output": "Having vulnarability CVE-2022-38792 Advisory: The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exotel version greather then equal to 0.1.6 have ### Response: Having vulnarability CVE-2022-38792 Advisory: The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem." }, { "instruction": "what vulnarability does experimaestro version less then 0.7.11 have", "input": "", "output": "Having vulnarability CVE-2020-28168 Advisory: Experimaestro 0.7.11 updates its NPM dependency 'axios' to v0.21.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does experimaestro version less then 0.7.11 have ### Response: Having vulnarability CVE-2020-28168 Advisory: Experimaestro 0.7.11 updates its NPM dependency 'axios' to v0.21.1 to include a security fix." }, { "instruction": "what vulnarability does extensiveautomation-server version less then 12.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-37348 Advisory: Extensiveautomation-server 12.1.0 reactivates SSLv3 cipher to support Linux client in python 2.6, fixes a security issue on folder creation in repository (no more full rights), and fixes a security issue on web services (bad handle of the level access).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extensiveautomation-server version less then 12.1.0 have ### Response: Having vulnarability PVE-2021-37348 Advisory: Extensiveautomation-server 12.1.0 reactivates SSLv3 cipher to support Linux client in python 2.6, fixes a security issue on folder creation in repository (no more full rights), and fixes a security issue on web services (bad handle of the level access)." }, { "instruction": "what vulnarability does extractor version less then 0.5.13 have", "input": "", "output": "Having vulnarability CVE-2006-2458 Advisory: Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extractor version less then 0.5.13 have ### Response: Having vulnarability CVE-2006-2458 Advisory: Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c)." }, { "instruction": "what vulnarability does extremitypathfinder version less then 2.6.0 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Extremitypathfinder 2.6.0 updates its dependency 'requests' to v2.31.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extremitypathfinder version less then 2.6.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Extremitypathfinder 2.6.0 updates its dependency 'requests' to v2.31.0 to include a security fix." }, { "instruction": "what vulnarability does eyed3 version less then 0.6.18 have", "input": "", "output": "Having vulnarability CVE-2014-1934 Advisory: tag.py in eyeD3 (aka python-eyed3) 7.0.3, 0.6.18, and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eyed3 version less then 0.6.18 have ### Response: Having vulnarability CVE-2014-1934 Advisory: tag.py in eyeD3 (aka python-eyed3) 7.0.3, 0.6.18, and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file." }, { "instruction": "what vulnarability does ezbeq version less then 1.0.0b25 have", "input": "", "output": "Having vulnarability CVE-2023-34092 Advisory: Ezbeq 1.0.0b25 updates its dependency 'vite' to v4.3.9 to include a security fix.\r\nhttps://github.com/3ll3d00d/ezbeq/commit/9a929ef090229cbec0280a695478d184d76c042e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ezbeq version less then 1.0.0b25 have ### Response: Having vulnarability CVE-2023-34092 Advisory: Ezbeq 1.0.0b25 updates its dependency 'vite' to v4.3.9 to include a security fix.\r\nhttps://github.com/3ll3d00d/ezbeq/commit/9a929ef090229cbec0280a695478d184d76c042e" }, { "instruction": "what vulnarability does eziod version greather then equal to 0,less then 0.0.2 have", "input": "", "output": "Having vulnarability CVE-2022-34982 Advisory: The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eziod version greather then equal to 0,less then 0.0.2 have ### Response: Having vulnarability CVE-2022-34982 Advisory: The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party." }, { "instruction": "what vulnarability does f-ask version greather then equal to 0,less then 0.12.3 have", "input": "", "output": "Having vulnarability None Advisory: Certain versions of Flask, part of the Pallets Project, are susceptible to an Improper Input Validation vulnerability. This issue could lead to excessive memory usage, potentially causing a denial of service if attackers supply JSON data in an incorrect encoding.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does f-ask version greather then equal to 0,less then 0.12.3 have ### Response: Having vulnarability None Advisory: Certain versions of Flask, part of the Pallets Project, are susceptible to an Improper Input Validation vulnerability. This issue could lead to excessive memory usage, potentially causing a denial of service if attackers supply JSON data in an incorrect encoding." }, { "instruction": "what vulnarability does faapi version less then 3.1.0 have", "input": "", "output": "Having vulnarability CVE-2021-43818 Advisory: Faapi 3.1.0 updates its dependency 'lxml' to v4.7.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faapi version less then 3.1.0 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Faapi 3.1.0 updates its dependency 'lxml' to v4.7.1 to include a security fix." }, { "instruction": "what vulnarability does fabric version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2011-2185 Advisory: Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fabric version less then 1.1.0 have ### Response: Having vulnarability CVE-2011-2185 Advisory: Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/." }, { "instruction": "what vulnarability does fabric2 version greather then equal to 0.9.0,less then 1.13.2 have", "input": "", "output": "Having vulnarability PVE-2023-99977 Advisory: The function upload_template() within Fabric2, specifically in versions 0.9.0 up to but not including 1.13.2, contains a vulnerability. It requires cleaning up a temporary file with sudo uploads if the destination path is found to be invalid.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fabric2 version greather then equal to 0.9.0,less then 1.13.2 have ### Response: Having vulnarability PVE-2023-99977 Advisory: The function upload_template() within Fabric2, specifically in versions 0.9.0 up to but not including 1.13.2, contains a vulnerability. It requires cleaning up a temporary file with sudo uploads if the destination path is found to be invalid." }, { "instruction": "what vulnarability does facebook-online-friend-tracker version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-34374 Advisory: Facebook-online-friend-tracker 2.0.0 makes users enter their credentials securely instead of entering them in raw text.\r\nhttps://github.com/bhamodi/facebook-online-friend-tracker/commit/979f27f8b78aa44f242ff099cbfad71bb938e4d7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-online-friend-tracker version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-34374 Advisory: Facebook-online-friend-tracker 2.0.0 makes users enter their credentials securely instead of entering them in raw text.\r\nhttps://github.com/bhamodi/facebook-online-friend-tracker/commit/979f27f8b78aa44f242ff099cbfad71bb938e4d7" }, { "instruction": "what vulnarability does facebook-py version less then equal to 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2023-99980 Advisory: Facebook-py (fork of facebook-sdk) is vulnerable to CSRF (Cross-site Request Forgery).\r\nhttps://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-py version less then equal to 0.2.0 have ### Response: Having vulnarability PVE-2023-99980 Advisory: Facebook-py (fork of facebook-sdk) is vulnerable to CSRF (Cross-site Request Forgery).\r\nhttps://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326" }, { "instruction": "what vulnarability does facebook-sdk version less then 0.3.2 have", "input": "", "output": "Having vulnarability PVE-2023-99980 Advisory: Facebook-sdk 0.3.2 adds support for 'state property' in auth urls to prevent Cross-site Request Forgery (CSRF) attacks.\r\nhttps://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-sdk version less then 0.3.2 have ### Response: Having vulnarability PVE-2023-99980 Advisory: Facebook-sdk 0.3.2 adds support for 'state property' in auth urls to prevent Cross-site Request Forgery (CSRF) attacks.\r\nhttps://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326" }, { "instruction": "what vulnarability does fafi version less then 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2020-27783 Advisory: Fafi 0.2.0 updates its dependency 'lxml' to version '4.6.2' to include a security fix.\r\nhttps://github.com/svandragt/fafi/commit/9b1826fb2bb71f3e791c6cc0c875de6b6d1a4229", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fafi version less then 0.2.0 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Fafi 0.2.0 updates its dependency 'lxml' to version '4.6.2' to include a security fix.\r\nhttps://github.com/svandragt/fafi/commit/9b1826fb2bb71f3e791c6cc0c875de6b6d1a4229" }, { "instruction": "what vulnarability does faker version less then 0.1 have", "input": "", "output": "Having vulnarability PVE-2021-37386 Advisory: Faker 0.1 includes the message: \"`bundler-audit` has identified that i18 has fix a security vulnerability, that has been fixed in the 0.8 version.\"", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faker version less then 0.1 have ### Response: Having vulnarability PVE-2021-37386 Advisory: Faker 0.1 includes the message: \"`bundler-audit` has identified that i18 has fix a security vulnerability, that has been fixed in the 0.8 version.\"" }, { "instruction": "what vulnarability does falcon-helpers version less then 0.19.0 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Falcon-helpers 0.19.0 requires 'pyjwt>=2.4' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falcon-helpers version less then 0.19.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Falcon-helpers 0.19.0 requires 'pyjwt>=2.4' to include a security fix." }, { "instruction": "what vulnarability does falcon-toolkit version less then 3.0.2 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Falcon-toolkit 3.0.2 updates its dependency 'certifi' to v2022.12.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falcon-toolkit version less then 3.0.2 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Falcon-toolkit 3.0.2 updates its dependency 'certifi' to v2022.12.7 to include a security fix." }, { "instruction": "what vulnarability does falocalrepo version less then 4.3.1 have", "input": "", "output": "Having vulnarability CVE-2022-30595 Advisory: Falocalrepo 4.3.1 updates its dependency 'falocalrepo-server' to version '3.2.2' to include a fix for a vulnerability.\r\nhttps://github.com/FurryCoders/FALocalRepo/commit/807d2e9e47dcb3ec5cf21569025b9053e2b958b3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falocalrepo version less then 4.3.1 have ### Response: Having vulnarability CVE-2022-30595 Advisory: Falocalrepo 4.3.1 updates its dependency 'falocalrepo-server' to version '3.2.2' to include a fix for a vulnerability.\r\nhttps://github.com/FurryCoders/FALocalRepo/commit/807d2e9e47dcb3ec5cf21569025b9053e2b958b3" }, { "instruction": "what vulnarability does falocalrepo-server version less then 3.2.2 have", "input": "", "output": "Having vulnarability CVE-2022-30595 Advisory: Falocalrepo-server 3.2.2 updates its dependency 'pillow' requirement to '^9.1.1' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falocalrepo-server version less then 3.2.2 have ### Response: Having vulnarability CVE-2022-30595 Advisory: Falocalrepo-server 3.2.2 updates its dependency 'pillow' requirement to '^9.1.1' to include a security fix." }, { "instruction": "what vulnarability does faq version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51682 Advisory: Faq is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faq version greather then 0 have ### Response: Having vulnarability PVE-2022-51682 Advisory: Faq is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does faraday-agent-dispatcher version less then 1.2.1 have", "input": "", "output": "Having vulnarability PVE-2021-39351 Advisory: Faraday-agent-dispatcher 1.2.1 escapes user-controlled executor parameters in order to prevent OS argument injection (not command injection).\r\nhttps://github.com/infobyte/faraday_agent_dispatcher/commit/1f268993e49f4cba1862f1113036e165d2e9695d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faraday-agent-dispatcher version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-39351 Advisory: Faraday-agent-dispatcher 1.2.1 escapes user-controlled executor parameters in order to prevent OS argument injection (not command injection).\r\nhttps://github.com/infobyte/faraday_agent_dispatcher/commit/1f268993e49f4cba1862f1113036e165d2e9695d" }, { "instruction": "what vulnarability does farm-haystack version less then equal to 1.15.0 have", "input": "", "output": "Having vulnarability CVE-2023-1712 Advisory: Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 1.15.0.\r\n\r\nAlias:\r\nGHSA-w7qg-j435-78qw", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does farm-haystack version less then equal to 1.15.0 have ### Response: Having vulnarability CVE-2023-1712 Advisory: Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 1.15.0.\r\n\r\nAlias:\r\nGHSA-w7qg-j435-78qw" }, { "instruction": "what vulnarability does fast-curator version less then 0.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-37514 Advisory: Fast-curator 0.2.2 switches to pyyaml `safe_load` for better security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fast-curator version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-37514 Advisory: Fast-curator 0.2.2 switches to pyyaml `safe_load` for better security." }, { "instruction": "what vulnarability does fastapi version less then 0.109.1 have", "input": "", "output": "Having vulnarability PVE-2024-64930 Advisory: FastAPI 0.109.1 addresses a critical security issue by upgrading its dependency python-multipart to version >=0.0.7. The upgrade mitigates a Regular Expression Denial of Service (ReDoS) vulnerability, which occurs when parsing form data. \r\nhttps://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi version less then 0.109.1 have ### Response: Having vulnarability PVE-2024-64930 Advisory: FastAPI 0.109.1 addresses a critical security issue by upgrading its dependency python-multipart to version >=0.0.7. The upgrade mitigates a Regular Expression Denial of Service (ReDoS) vulnerability, which occurs when parsing form data. \r\nhttps://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389" }, { "instruction": "what vulnarability does fastapi-login version less then 1.4.0 have", "input": "", "output": "Having vulnarability PVE-2021-38783 Advisory: Fastapi-login 1.4.0 fixes a security vulnerability found in uvicorn", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-login version less then 1.4.0 have ### Response: Having vulnarability PVE-2021-38783 Advisory: Fastapi-login 1.4.0 fixes a security vulnerability found in uvicorn" }, { "instruction": "what vulnarability does fastapi-mvc version less then 0.13.1 have", "input": "", "output": "Having vulnarability CVE-2022-24065 Advisory: Fastapi-mvc 0.13.1 updates its dependency 'cookiecutter' to v2.1.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-mvc version less then 0.13.1 have ### Response: Having vulnarability CVE-2022-24065 Advisory: Fastapi-mvc 0.13.1 updates its dependency 'cookiecutter' to v2.1.1 to include a security fix." }, { "instruction": "what vulnarability does fastapi-opa version less then 1.3.7 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Fastapi-opa 1.3.7 updates its dependency 'pyjwt' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-opa version less then 1.3.7 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Fastapi-opa 1.3.7 updates its dependency 'pyjwt' to include a security fix." }, { "instruction": "what vulnarability does fastapi-proxy-lib version greather then equal to 0,less then 0.1.0 have", "input": "", "output": "Having vulnarability PVE-2024-99794 Advisory: fastapi-proxy-lib versions before 0.1.0 are vulnerable to information exposure when processing requests through shared usage of httpx.AsyncClient. This vulnerability allows an attacker to leak cookies among users by sending a set-cookie response header. It occurs only if ForwardHttpProxy is used, or ReverseHttpProxy or ReverseWebSocketProxy are employed with servers capable of sending a set-cookie response. A mitigation strategy involves avoiding the use of ForwardHttpProxy and not employing ReverseHttpProxy or ReverseWebSocketProxy with servers that might send a set-cookie response.\r\nhttps://github.com/WSH032/fastapi-proxy-lib/pull/10/commits/056c72569bb5bc8268cadd73fa476f73b5fbc946", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-proxy-lib version greather then equal to 0,less then 0.1.0 have ### Response: Having vulnarability PVE-2024-99794 Advisory: fastapi-proxy-lib versions before 0.1.0 are vulnerable to information exposure when processing requests through shared usage of httpx.AsyncClient. This vulnerability allows an attacker to leak cookies among users by sending a set-cookie response header. It occurs only if ForwardHttpProxy is used, or ReverseHttpProxy or ReverseWebSocketProxy are employed with servers capable of sending a set-cookie response. A mitigation strategy involves avoiding the use of ForwardHttpProxy and not employing ReverseHttpProxy or ReverseWebSocketProxy with servers that might send a set-cookie response.\r\nhttps://github.com/WSH032/fastapi-proxy-lib/pull/10/commits/056c72569bb5bc8268cadd73fa476f73b5fbc946" }, { "instruction": "what vulnarability does fastapi-restful version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2021-29510 Advisory: Fastapi-restful 0.3.1 includes a fix for the 'pydantic' dependency (update is required).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-restful version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Fastapi-restful 0.3.1 includes a fix for the 'pydantic' dependency (update is required)." }, { "instruction": "what vulnarability does fastapi-toolkit version equal to 0.0.27 have", "input": "", "output": "Having vulnarability PVE-2023-52885 Advisory: Fastapi-toolkit 0.0.27 has a backdoor that adds a FastAPI route allowing a remote attacker to execute arbitrary python code and SQL queries in the context of the web application.\r\nhttps://securitylabs.datadoghq.com/articles/malicious-pypi-package-fastapi-toolkit", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-toolkit version equal to 0.0.27 have ### Response: Having vulnarability PVE-2023-52885 Advisory: Fastapi-toolkit 0.0.27 has a backdoor that adds a FastAPI route allowing a remote attacker to execute arbitrary python code and SQL queries in the context of the web application.\r\nhttps://securitylabs.datadoghq.com/articles/malicious-pypi-package-fastapi-toolkit" }, { "instruction": "what vulnarability does fastapi-users version less then 10.0.6 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Fastapi-users 10.0.6 updates its dependency 'pyjwt' to version '2.4.0' to include a security fix.\r\nhttps://github.com/fastapi-users/fastapi-users/pull/1005\r\nhttps://github.com/advisories/GHSA-ffqj-6fqr-9h24", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-users version less then 10.0.6 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Fastapi-users 10.0.6 updates its dependency 'pyjwt' to version '2.4.0' to include a security fix.\r\nhttps://github.com/fastapi-users/fastapi-users/pull/1005\r\nhttps://github.com/advisories/GHSA-ffqj-6fqr-9h24" }, { "instruction": "what vulnarability does fastbots version less then 0.1.5 have", "input": "", "output": "Having vulnarability CVE-2023-48699 Advisory: Fastbots 0.1.5 includes a fix for CVE-2023-48699: Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to RCE. The vulnerability is in the function 'def __locator__(self, locator_name: str)' in 'page.py'.\r\nhttps://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastbots version less then 0.1.5 have ### Response: Having vulnarability CVE-2023-48699 Advisory: Fastbots 0.1.5 includes a fix for CVE-2023-48699: Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to RCE. The vulnerability is in the function 'def __locator__(self, locator_name: str)' in 'page.py'.\r\nhttps://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9" }, { "instruction": "what vulnarability does fastecdsa version less then 2.1.2 have", "input": "", "output": "Having vulnarability CVE-2020-12607 Advisory: An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastecdsa version less then 2.1.2 have ### Response: Having vulnarability CVE-2020-12607 Advisory: An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail." }, { "instruction": "what vulnarability does fatnoob version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51675 Advisory: Fatnoob is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fatnoob version greather then 0 have ### Response: Having vulnarability PVE-2022-51675 Advisory: Fatnoob is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does faucet version less then 1.10.1 have", "input": "", "output": "Having vulnarability PVE-2023-62037 Advisory: Faucet 1.10.1 includes a fix for a potential path traversal vulnerability.\r\nhttps://github.com/faucetsdn/faucet/pull/3876", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faucet version less then 1.10.1 have ### Response: Having vulnarability PVE-2023-62037 Advisory: Faucet 1.10.1 includes a fix for a potential path traversal vulnerability.\r\nhttps://github.com/faucetsdn/faucet/pull/3876" }, { "instruction": "what vulnarability does fava version greather then equal to 0,less then 1.22 have", "input": "", "output": "Having vulnarability CVE-2022-2514 Advisory: The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fava version greather then equal to 0,less then 1.22 have ### Response: Having vulnarability CVE-2022-2514 Advisory: The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim." }, { "instruction": "what vulnarability does fbpcp version less then 0.2.2 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Fbpcp 0.2.2 updates its dependency 'urllib3' to v1.26.7 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fbpcp version less then 0.2.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Fbpcp 0.2.2 updates its dependency 'urllib3' to v1.26.7 to include security fixes." }, { "instruction": "what vulnarability does feast version less then 0.1.2 have", "input": "", "output": "Having vulnarability PVE-2022-48009 Advisory: Feast 0.1.2 (Python SDK) includes Feast Core and UI, which update dependencies to include security fixes.\r\nhttps://github.com/feast-dev/feast/commit/93e08927baf58e068efba186d91e8b1951ce88b0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does feast version less then 0.1.2 have ### Response: Having vulnarability PVE-2022-48009 Advisory: Feast 0.1.2 (Python SDK) includes Feast Core and UI, which update dependencies to include security fixes.\r\nhttps://github.com/feast-dev/feast/commit/93e08927baf58e068efba186d91e8b1951ce88b0" }, { "instruction": "what vulnarability does featurebyte version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2023-32309 Advisory: Featurebyte 0.3.0 updates its dependency 'pymdown-extensions' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does featurebyte version less then 0.3.0 have ### Response: Having vulnarability CVE-2023-32309 Advisory: Featurebyte 0.3.0 updates its dependency 'pymdown-extensions' to include a security fix." }, { "instruction": "what vulnarability does featureserver version less then 1.06 have", "input": "", "output": "Having vulnarability PVE-2021-25814 Advisory: featureserver before 1.06 allowed JSON callbacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does featureserver version less then 1.06 have ### Response: Having vulnarability PVE-2021-25814 Advisory: featureserver before 1.06 allowed JSON callbacks." }, { "instruction": "what vulnarability does fedcloudclient version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-40139 Advisory: Fedcloudclient 1.1.0 improves error checking and enhances security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedcloudclient version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-40139 Advisory: Fedcloudclient 1.1.0 improves error checking and enhances security." }, { "instruction": "what vulnarability does fedmsg version less then 0.18.2 have", "input": "", "output": "Having vulnarability CVE-2017-1000001 Advisory: FedMsg 0.18.1 and older is vulnerable to a message validation flaw resulting in message validation not being enabled if configured to be on.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedmsg version less then 0.18.2 have ### Response: Having vulnarability CVE-2017-1000001 Advisory: FedMsg 0.18.1 and older is vulnerable to a message validation flaw resulting in message validation not being enabled if configured to be on." }, { "instruction": "what vulnarability does fedn version less then 0.2.3 have", "input": "", "output": "Having vulnarability PVE-2021-40830 Advisory: Fedn 0.2.3 includes several bugfixes and security patches.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedn version less then 0.2.3 have ### Response: Having vulnarability PVE-2021-40830 Advisory: Fedn 0.2.3 includes several bugfixes and security patches." }, { "instruction": "what vulnarability does fedora version less then 0.3.10 have", "input": "", "output": "Having vulnarability PVE-2021-38173 Advisory: Fedora 0.3.10 has some methods to help deal with CSRF, which is a vulnerability that can allow malicious web sites to execute server methods on behalf of an authenticated user.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedora version less then 0.3.10 have ### Response: Having vulnarability PVE-2021-38173 Advisory: Fedora 0.3.10 has some methods to help deal with CSRF, which is a vulnerability that can allow malicious web sites to execute server methods on behalf of an authenticated user." }, { "instruction": "what vulnarability does fedsim version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2022-50962 Advisory: Fedsim 0.7.0 updates algorithms to prevent reading from a client's storage data from another one.\r\nhttps://github.com/varnio/fedsim/issues/18", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedsim version less then 0.7.0 have ### Response: Having vulnarability PVE-2022-50962 Advisory: Fedsim 0.7.0 updates algorithms to prevent reading from a client's storage data from another one.\r\nhttps://github.com/varnio/fedsim/issues/18" }, { "instruction": "what vulnarability does feedgen version less then 0.9.0 have", "input": "", "output": "Having vulnarability CVE-2020-5227 Advisory: Feedgen (python feedgen) before 0.9.0 is susceptible to XML Denial of Service attacks. The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to XML Denial of Service Attacks (e.g. XML Bomb). This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only. This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources. See: CVE-2020-5227.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does feedgen version less then 0.9.0 have ### Response: Having vulnarability CVE-2020-5227 Advisory: Feedgen (python feedgen) before 0.9.0 is susceptible to XML Denial of Service attacks. The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to XML Denial of Service Attacks (e.g. XML Bomb). This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only. This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources. See: CVE-2020-5227." }, { "instruction": "what vulnarability does feedparser version less then 5.0 have", "input": "", "output": "Having vulnarability CVE-2009-5065 Advisory: Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does feedparser version less then 5.0 have ### Response: Having vulnarability CVE-2009-5065 Advisory: Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas." }, { "instruction": "what vulnarability does felpesviadinho version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51688 Advisory: Felpesviadinho is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does felpesviadinho version greather then 0 have ### Response: Having vulnarability PVE-2022-51688 Advisory: Felpesviadinho is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does fequests version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52890 Advisory: Fequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.\r\nhttps://thehackernews.com/2022/12/malware-strains-targeting-python-and.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fequests version greather then 0 have ### Response: Having vulnarability PVE-2023-52890 Advisory: Fequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.\r\nhttps://thehackernews.com/2022/12/malware-strains-targeting-python-and.html" }, { "instruction": "what vulnarability does fflogsapi version less then 2.1.0 have", "input": "", "output": "Having vulnarability CVE-2024-26130 Advisory: Fflogsapi version 2.1.0 upgrades its cryptography library to version 42.0.5 from 39.0.1 to address the security issue CVE-2024-26130.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fflogsapi version less then 2.1.0 have ### Response: Having vulnarability CVE-2024-26130 Advisory: Fflogsapi version 2.1.0 upgrades its cryptography library to version 42.0.5 from 39.0.1 to address the security issue CVE-2024-26130." }, { "instruction": "what vulnarability does ffmpeg-normalize version less then 1.24.0 have", "input": "", "output": "Having vulnarability PVE-2023-59831 Advisory: Ffmpeg-normalize 1.24.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/slhck/ffmpeg-normalize/commit/daf1bf15dde81e5916b8fb4c7853c833e89328f9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ffmpeg-normalize version less then 1.24.0 have ### Response: Having vulnarability PVE-2023-59831 Advisory: Ffmpeg-normalize 1.24.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/slhck/ffmpeg-normalize/commit/daf1bf15dde81e5916b8fb4c7853c833e89328f9" }, { "instruction": "what vulnarability does ffpyplayer version greather then equal to 4.2.0,less then equal to 4.3.2 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Ffpyplayer 4.2.0 throughout 4.3.2 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.\r\nhttps://inspector.pypi.io/project/ffpyplayer/4.3.2/packages/fb/0f/444815d4aebc8c9a4a4e11298bab6a86c0d91ba29d83e853224fd61d5c66/ffpyplayer-4.3.2-cp39-cp39-macosx_10_9_x86_64.macosx_10_9_intel.macosx_10_10_intel.macosx_10_10_x86_64.whl", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ffpyplayer version greather then equal to 4.2.0,less then equal to 4.3.2 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Ffpyplayer 4.2.0 throughout 4.3.2 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.\r\nhttps://inspector.pypi.io/project/ffpyplayer/4.3.2/packages/fb/0f/444815d4aebc8c9a4a4e11298bab6a86c0d91ba29d83e853224fd61d5c66/ffpyplayer-4.3.2-cp39-cp39-macosx_10_9_x86_64.macosx_10_9_intel.macosx_10_10_intel.macosx_10_10_x86_64.whl" }, { "instruction": "what vulnarability does fhir-pyrate version less then 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2017-12852 Advisory: Fhir-pyrate 0.2.0 requires 'numpy' versions '^1.22' to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fhir-pyrate version less then 0.2.0 have ### Response: Having vulnarability CVE-2017-12852 Advisory: Fhir-pyrate 0.2.0 requires 'numpy' versions '^1.22' to include security fixes." }, { "instruction": "what vulnarability does fidesops version greather then equal to 2.11.0,less then 2.16.0 have", "input": "", "output": "Having vulnarability CVE-2023-37480 Advisory: The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack. Attackers can exploit a weakness in the connector template upload feature to upload a malicious zip bomb file, resulting in resource exhaustion and service unavailability for all users of the Fides webserver. This vulnerability affects Fides versions `2.11.0` through `2.15.1`. Exploitation is limited to users with elevated privileges with the `CONNECTOR_TEMPLATE_REGISTER` scope, which includes root users and users with the owner role. The vulnerability has been patched in Fides version `2.16.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There is no known workaround to remediate this vulnerability without upgrading. If an attack occurs, the impact can be mitigated by manually or automatically restarting the affected container.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fidesops version greather then equal to 2.11.0,less then 2.16.0 have ### Response: Having vulnarability CVE-2023-37480 Advisory: The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack. Attackers can exploit a weakness in the connector template upload feature to upload a malicious zip bomb file, resulting in resource exhaustion and service unavailability for all users of the Fides webserver. This vulnerability affects Fides versions `2.11.0` through `2.15.1`. Exploitation is limited to users with elevated privileges with the `CONNECTOR_TEMPLATE_REGISTER` scope, which includes root users and users with the owner role. The vulnerability has been patched in Fides version `2.16.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There is no known workaround to remediate this vulnerability without upgrading. If an attack occurs, the impact can be mitigated by manually or automatically restarting the affected container." }, { "instruction": "what vulnarability does fiduswriter version less then 3.9.24 have", "input": "", "output": "Having vulnarability CVE-2021-25288 Advisory: Fiduswriter 3.9.24 updates its dependency 'pillow' to v8.2.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fiduswriter version less then 3.9.24 have ### Response: Having vulnarability CVE-2021-25288 Advisory: Fiduswriter 3.9.24 updates its dependency 'pillow' to v8.2.0 to include security fixes." }, { "instruction": "what vulnarability does fief-server version less then 0.25.3 have", "input": "", "output": "Having vulnarability PVE-2023-99961 Advisory: Fief-server 0.25.3 includes a fix for a Server-Side Template Injection (SSTI) vulnerability. This could be exploited by an attacker, who could take advantage of this issue to implement code on the base system by modifying values in the embedded template. Achieving this can lead to the attacker operating commands with permissions under the manipulated process or utilizing Cross-Site Scripting (XSS) for executing code within the user's browser.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fief-server version less then 0.25.3 have ### Response: Having vulnarability PVE-2023-99961 Advisory: Fief-server 0.25.3 includes a fix for a Server-Side Template Injection (SSTI) vulnerability. This could be exploited by an attacker, who could take advantage of this issue to implement code on the base system by modifying values in the embedded template. Achieving this can lead to the attacker operating commands with permissions under the manipulated process or utilizing Cross-Site Scripting (XSS) for executing code within the user's browser." }, { "instruction": "what vulnarability does fin-maestro-kin version less then 0.2.2 have", "input": "", "output": "Having vulnarability CVE-2024-28219 Advisory: Fin-maestro-kin 0.2.2 updates its dependency 'pillow' to version 10.3.0 to include a fix for a Buffer Overflow vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fin-maestro-kin version less then 0.2.2 have ### Response: Having vulnarability CVE-2024-28219 Advisory: Fin-maestro-kin 0.2.2 updates its dependency 'pillow' to version 10.3.0 to include a fix for a Buffer Overflow vulnerability." }, { "instruction": "what vulnarability does fincity-django-allauth version less then 0.18.0 have", "input": "", "output": "Having vulnarability PVE-2021-37466 Advisory: Fincity-django-allauth 0.18.0 requires the 'AUDIENCE' parameter to be explicitly configured, as required by the Persona specification for security reasons.\r\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1051025", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fincity-django-allauth version less then 0.18.0 have ### Response: Having vulnarability PVE-2021-37466 Advisory: Fincity-django-allauth 0.18.0 requires the 'AUDIENCE' parameter to be explicitly configured, as required by the Persona specification for security reasons.\r\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1051025" }, { "instruction": "what vulnarability does fiona version less then equal to 1.9.4.post1 have", "input": "", "output": "Having vulnarability CVE-2023-38545 Advisory: Fiona 1.9.4.post1 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fiona version less then equal to 1.9.4.post1 have ### Response: Having vulnarability CVE-2023-38545 Advisory: Fiona 1.9.4.post1 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability." }, { "instruction": "what vulnarability does firefly-cli version less then 0.0.10 have", "input": "", "output": "Having vulnarability CVE-2021-28363 Advisory: Firefly-cli 0.0.10 updates its urllib3 dependency to version 1.26.4 from the earlier 1.26.2, in response to a security vulnerability.\r\nhttps://github.com/afonsoc12/firefly-cli/commit/bcf967ccfe63e0e8f2750b2d534af5d5969a8ec7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does firefly-cli version less then 0.0.10 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Firefly-cli 0.0.10 updates its urllib3 dependency to version 1.26.4 from the earlier 1.26.2, in response to a security vulnerability.\r\nhttps://github.com/afonsoc12/firefly-cli/commit/bcf967ccfe63e0e8f2750b2d534af5d5969a8ec7" }, { "instruction": "what vulnarability does firepit version less then 1.3.0 have", "input": "", "output": "Having vulnarability PVE-2022-48146 Advisory: Firepit 1.3.0 adds SQL injection protection in query classes.\r\nhttps://github.com/opencybersecurityalliance/firepit/commit/20e4debe54c9999e9b96eb923c1b0f0f878491c9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does firepit version less then 1.3.0 have ### Response: Having vulnarability PVE-2022-48146 Advisory: Firepit 1.3.0 adds SQL injection protection in query classes.\r\nhttps://github.com/opencybersecurityalliance/firepit/commit/20e4debe54c9999e9b96eb923c1b0f0f878491c9" }, { "instruction": "what vulnarability does firepyer version less then 0.0.2 have", "input": "", "output": "Having vulnarability PVE-2021-39442 Advisory: Firepyer 0.0.2 adds system, security policy and ICMP methods.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does firepyer version less then 0.0.2 have ### Response: Having vulnarability PVE-2021-39442 Advisory: Firepyer 0.0.2 adds system, security policy and ICMP methods." }, { "instruction": "what vulnarability does firetail version less then 1.0.10 have", "input": "", "output": "Having vulnarability CVE-2023-30861 Advisory: Firetail 1.0.10 updates its dependency 'flask' to v2.2.5 to include a security fix.\r\nhttps://github.com/FireTail-io/firetail-py-lib/pull/28", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does firetail version less then 1.0.10 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Firetail 1.0.10 updates its dependency 'flask' to v2.2.5 to include a security fix.\r\nhttps://github.com/FireTail-io/firetail-py-lib/pull/28" }, { "instruction": "what vulnarability does fitsblender version less then 0.4.2 have", "input": "", "output": "Having vulnarability CVE-2018-3847 Advisory: Fitsblender 0.4.2 updates its dependency 'astropy' requirement to versions >=5.0.4 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fitsblender version less then 0.4.2 have ### Response: Having vulnarability CVE-2018-3847 Advisory: Fitsblender 0.4.2 updates its dependency 'astropy' requirement to versions >=5.0.4 to include security fixes." }, { "instruction": "what vulnarability does fittrackee version less then 0.5.7 have", "input": "", "output": "Having vulnarability PVE-2022-44973 Advisory: Fittrackee 0.5.7 sets autoescape on jinja templates.\r\nhttps://github.com/SamR1/FitTrackee/pull/152", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fittrackee version less then 0.5.7 have ### Response: Having vulnarability PVE-2022-44973 Advisory: Fittrackee 0.5.7 sets autoescape on jinja templates.\r\nhttps://github.com/SamR1/FitTrackee/pull/152" }, { "instruction": "what vulnarability does fl4health version less then 0.1.11 have", "input": "", "output": "Having vulnarability PVE-2024-65087 Advisory: Fl4health version 0.1.11 upgrades its Jinja2 dependency to version 3.1.3 as a corrective measure for the security vulnerability identified as CVE-2024-22195.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fl4health version less then 0.1.11 have ### Response: Having vulnarability PVE-2024-65087 Advisory: Fl4health version 0.1.11 upgrades its Jinja2 dependency to version 3.1.3 as a corrective measure for the security vulnerability identified as CVE-2024-22195." }, { "instruction": "what vulnarability does flafl version less then 0.0.5 have", "input": "", "output": "Having vulnarability CVE-2020-28493 Advisory: Flafl 0.0.5 updates its dependency 'jinja2' to v2.11.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flafl version less then 0.0.5 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Flafl 0.0.5 updates its dependency 'jinja2' to v2.11.3 to include a security fix." }, { "instruction": "what vulnarability does flambe version less then 0.4.16 have", "input": "", "output": "Having vulnarability PVE-2021-38138 Advisory: Flambe 0.4.16 fixes a vulnerability with PyYAML < 5.3.1.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flambe version less then 0.4.16 have ### Response: Having vulnarability PVE-2021-38138 Advisory: Flambe 0.4.16 fixes a vulnerability with PyYAML < 5.3.1." }, { "instruction": "what vulnarability does flashfocus version less then 1.2.1 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Flashfocus 1.2.1 updates pyyaml version to >=4.2b1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flashfocus version less then 1.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Flashfocus 1.2.1 updates pyyaml version to >=4.2b1 to include a security fix." }, { "instruction": "what vulnarability does flashgeotext version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2021-28363 Advisory: Flashgeotext version 0.3.1 updates its urllib3 dependency to 1.26.4 from 1.26.3, addressing the security vulnerability CVE-2021-28363.\r\nhttps://github.com/iwpnd/flashgeotext/commit/e2f9f303fbd99a92a053228f6e8a18d9ae4fdc22", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flashgeotext version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Flashgeotext version 0.3.1 updates its urllib3 dependency to 1.26.4 from 1.26.3, addressing the security vulnerability CVE-2021-28363.\r\nhttps://github.com/iwpnd/flashgeotext/commit/e2f9f303fbd99a92a053228f6e8a18d9ae4fdc22" }, { "instruction": "what vulnarability does flask version less then 0.12.3 have", "input": "", "output": "Having vulnarability CVE-2018-1000656 Advisory: flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask version less then 0.12.3 have ### Response: Having vulnarability CVE-2018-1000656 Advisory: flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3." }, { "instruction": "what vulnarability does flask-admin version less then 1.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-25821 Advisory: Flask-admin 1.3.0 fixes an XSS vulnerability escaping html in column_editable_list values in the WTForms widget.\r\nhttps://github.com/flask-admin/flask-admin/commit/f447db0c78c03235d0dd6bdce0c5365fc6a7c321\r\nhttps://github.com/flask-admin/flask-admin/pull/1002\r\nhttps://github.com/flask-admin/flask-admin/issues/1000", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-admin version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-25821 Advisory: Flask-admin 1.3.0 fixes an XSS vulnerability escaping html in column_editable_list values in the WTForms widget.\r\nhttps://github.com/flask-admin/flask-admin/commit/f447db0c78c03235d0dd6bdce0c5365fc6a7c321\r\nhttps://github.com/flask-admin/flask-admin/pull/1002\r\nhttps://github.com/flask-admin/flask-admin/issues/1000" }, { "instruction": "what vulnarability does flask-api-tools version less then 1.6.2 have", "input": "", "output": "Having vulnarability CVE-2021-23980 Advisory: Flask-api-tools 1.6.2 updates its dependency 'bleach' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-api-tools version less then 1.6.2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Flask-api-tools 1.6.2 updates its dependency 'bleach' to include a security fix." }, { "instruction": "what vulnarability does flask-appbuilder version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-37060 Advisory: Flask-appbuilder 0.2.0 includes reset password corrections.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-appbuilder version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-37060 Advisory: Flask-appbuilder 0.2.0 includes reset password corrections." }, { "instruction": "what vulnarability does flask-async version less then 0.6.1 have", "input": "", "output": "Having vulnarability PVE-2021-25822 Advisory: Flask-async 0.6.1 fixes a security problem that allowed clients to download arbitrary files if the host server was a windows based operating system and the client used backslashes to escape the directory the files where exposed from.\r\nhttps://github.com/mrdon/flask/commit/aeed530e3221c1b445c13269dcd2fb67548bcefc", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-async version less then 0.6.1 have ### Response: Having vulnarability PVE-2021-25822 Advisory: Flask-async 0.6.1 fixes a security problem that allowed clients to download arbitrary files if the host server was a windows based operating system and the client used backslashes to escape the directory the files where exposed from.\r\nhttps://github.com/mrdon/flask/commit/aeed530e3221c1b445c13269dcd2fb67548bcefc" }, { "instruction": "what vulnarability does flask-caching version less then equal to 1.10.1 have", "input": "", "output": "Having vulnarability CVE-2021-33026 Advisory: Flask-caching is vulnerable to CVE-2021-33026: Flask-Caching extension for Flask relies on Pickle for deserialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. \r\nNOTE: Project maintainers indicate that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision.\r\nhttps://github.com/pallets-eco/flask-caching/pull/209", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-caching version less then equal to 1.10.1 have ### Response: Having vulnarability CVE-2021-33026 Advisory: Flask-caching is vulnerable to CVE-2021-33026: Flask-Caching extension for Flask relies on Pickle for deserialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. \r\nNOTE: Project maintainers indicate that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision.\r\nhttps://github.com/pallets-eco/flask-caching/pull/209" }, { "instruction": "what vulnarability does flask-cors version less then 3.0.9 have", "input": "", "output": "Having vulnarability CVE-2020-25032 Advisory: Flask-CORS before 3.0.9 allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. See CVE-2020-25032.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-cors version less then 3.0.9 have ### Response: Having vulnarability CVE-2020-25032 Advisory: Flask-CORS before 3.0.9 allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. See CVE-2020-25032." }, { "instruction": "what vulnarability does flask-exceptions version less then 1.2.2 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Flask-exceptions 1.2.2 updates its dependency 'pyyaml' minimum version to v4.2b1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-exceptions version less then 1.2.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Flask-exceptions 1.2.2 updates its dependency 'pyyaml' minimum version to v4.2b1 to include a security fix." }, { "instruction": "what vulnarability does flask-flatpages version less then 0.7.1 have", "input": "", "output": "Having vulnarability CVE-2019-10906 Advisory: Flask-flatpages 0.7.1 updates its dependency 'jinja2' to v2.10.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-flatpages version less then 0.7.1 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Flask-flatpages 0.7.1 updates its dependency 'jinja2' to v2.10.1 to include a security fix." }, { "instruction": "what vulnarability does flask-hashids version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-52571 Advisory: Flask-hashids 1.0.0 stop using SECRET_KEY as a salt, which made it recoverable.\r\nhttps://github.com/Pevtrick/Flask-Hashids/pull/6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-hashids version less then 1.0.0 have ### Response: Having vulnarability PVE-2022-52571 Advisory: Flask-hashids 1.0.0 stop using SECRET_KEY as a salt, which made it recoverable.\r\nhttps://github.com/Pevtrick/Flask-Hashids/pull/6" }, { "instruction": "what vulnarability does flask-i18n version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Flask-i18n 1.1.1 updates its dependency 'requests' to v2.21.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-i18n version less then 1.1.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Flask-i18n 1.1.1 updates its dependency 'requests' to v2.21.0 to include a security fix." }, { "instruction": "what vulnarability does flask-images version less then 1.1.3 have", "input": "", "output": "Having vulnarability PVE-2021-25823 Advisory: flask-images 1.1.3 fixes 3 security bugs, each of which would allow for reading any image on disk.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-images version less then 1.1.3 have ### Response: Having vulnarability PVE-2021-25823 Advisory: flask-images 1.1.3 fixes 3 security bugs, each of which would allow for reading any image on disk." }, { "instruction": "what vulnarability does flask-ipban version less then 0.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-36997 Advisory: flask-ipban 0.2.2 fixes a yaml loading vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-ipban version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-36997 Advisory: flask-ipban 0.2.2 fixes a yaml loading vulnerability." }, { "instruction": "what vulnarability does flask-micropub version less then 0.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-25824 Advisory: flask-micropub 0.2.2 fixes a vulnerability; re-discover the authorization_endpoint and token_endpoint at each stage in the flow. Prevents a buggy or malicious authorization_endpoint from giving you credentials for another user's domain name.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-micropub version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-25824 Advisory: flask-micropub 0.2.2 fixes a vulnerability; re-discover the authorization_endpoint and token_endpoint at each stage in the flow. Prevents a buggy or malicious authorization_endpoint from giving you credentials for another user's domain name." }, { "instruction": "what vulnarability does flask-monitoring version less then 1.10.0 have", "input": "", "output": "Having vulnarability PVE-2021-37847 Advisory: flask-monitoring 1.10.0 adds security for automatic endpoint-data retrieval", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-monitoring version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-37847 Advisory: flask-monitoring 1.10.0 adds security for automatic endpoint-data retrieval" }, { "instruction": "what vulnarability does flask-oauthlib version less then 0.9.1 have", "input": "", "output": "Having vulnarability PVE-2021-25825 Advisory: Flask-oauthlib before 0.9.1 didn't verify client_secret when authenticating non-confidential clients.\r\nhttps://github.com/lepture/flask-oauthlib/commit/829fdea095d2dac9cc03eb41b2e9946225c995fb", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-oauthlib version less then 0.9.1 have ### Response: Having vulnarability PVE-2021-25825 Advisory: Flask-oauthlib before 0.9.1 didn't verify client_secret when authenticating non-confidential clients.\r\nhttps://github.com/lepture/flask-oauthlib/commit/829fdea095d2dac9cc03eb41b2e9946225c995fb" }, { "instruction": "what vulnarability does flask-oidc version less then 0.1.2 have", "input": "", "output": "Having vulnarability CVE-2016-1000001 Advisory: flask-oidc version 0.1.2 and earlier is vulnerable to an open redirect", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-oidc version less then 0.1.2 have ### Response: Having vulnarability CVE-2016-1000001 Advisory: flask-oidc version 0.1.2 and earlier is vulnerable to an open redirect" }, { "instruction": "what vulnarability does flask-pagedown version less then 0.1.4 have", "input": "", "output": "Having vulnarability PVE-2021-41280 Advisory: Flask-pagedown 0.1.4 uses secure URLs when request is secure.\r\nhttps://github.com/miguelgrinberg/flask-pagedown/issues/3\r\nhttps://github.com/miguelgrinberg/flask-pagedown/commit/50ba142994e47d584f5bdf083e0c47f4a9209aa4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-pagedown version less then 0.1.4 have ### Response: Having vulnarability PVE-2021-41280 Advisory: Flask-pagedown 0.1.4 uses secure URLs when request is secure.\r\nhttps://github.com/miguelgrinberg/flask-pagedown/issues/3\r\nhttps://github.com/miguelgrinberg/flask-pagedown/commit/50ba142994e47d584f5bdf083e0c47f4a9209aa4" }, { "instruction": "what vulnarability does flask-pyoidc version less then 3.7.0 have", "input": "", "output": "Having vulnarability PVE-2021-39225 Advisory: Flask-pyoidc before 3.7.0 did not properly validate the ID token according to the OIDC specification. It also still depended on a pyoidc version that is now known to not be secure.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-pyoidc version less then 3.7.0 have ### Response: Having vulnarability PVE-2021-39225 Advisory: Flask-pyoidc before 3.7.0 did not properly validate the ID token according to the OIDC specification. It also still depended on a pyoidc version that is now known to not be secure." }, { "instruction": "what vulnarability does flask-restless-ng version less then 2.2.6 have", "input": "", "output": "Having vulnarability PVE-2021-41218 Advisory: Flask-restless-ng 2.2.6 escapes user input in error messages to prevent potential server-side cross-site scripting.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-restless-ng version less then 2.2.6 have ### Response: Having vulnarability PVE-2021-41218 Advisory: Flask-restless-ng 2.2.6 escapes user input in error messages to prevent potential server-side cross-site scripting." }, { "instruction": "what vulnarability does flask-restx version less then 0.5.1 have", "input": "", "output": "Having vulnarability CVE-2021-32838 Advisory: Flask-restx version 0.5.1 includes a fix for CVE-2021-32838: Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex.\r\nhttps://github.com/advisories/GHSA-3q6g-vf58-7m4g\r\nhttps://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51\r\nhttps://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da\r\nhttps://github.com/python-restx/flask-restx/issues/372\r\nhttps://pypi.org/project/flask-restx/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-restx version less then 0.5.1 have ### Response: Having vulnarability CVE-2021-32838 Advisory: Flask-restx version 0.5.1 includes a fix for CVE-2021-32838: Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex.\r\nhttps://github.com/advisories/GHSA-3q6g-vf58-7m4g\r\nhttps://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51\r\nhttps://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da\r\nhttps://github.com/python-restx/flask-restx/issues/372\r\nhttps://pypi.org/project/flask-restx/" }, { "instruction": "what vulnarability does flask-security version less then 1.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-27545 Advisory: Flask-security 1.6.0 makes AJAX requests now send a CSRF token for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-security version less then 1.6.0 have ### Response: Having vulnarability PVE-2021-27545 Advisory: Flask-security 1.6.0 makes AJAX requests now send a CSRF token for security reasons." }, { "instruction": "what vulnarability does flask-security-fork version less then 1.8.1 have", "input": "", "output": "Having vulnarability PVE-2021-25827 Advisory: flask-security-fork before 1.8.1 fixes a security bug when validating a confirmation token, also checks if the email that the token was created with matches the user's current email.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-security-fork version less then 1.8.1 have ### Response: Having vulnarability PVE-2021-25827 Advisory: flask-security-fork before 1.8.1 fixes a security bug when validating a confirmation token, also checks if the email that the token was created with matches the user's current email." }, { "instruction": "what vulnarability does flask-security-invenio version less then 1.6.0 have", "input": "", "output": "Having vulnarability PVE-2022-44913 Advisory: Flask-security-invenio 1.6.0 makes AJAX requests now send a CSRF token for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-security-invenio version less then 1.6.0 have ### Response: Having vulnarability PVE-2022-44913 Advisory: Flask-security-invenio 1.6.0 makes AJAX requests now send a CSRF token for security reasons." }, { "instruction": "what vulnarability does flask-security-too version less then 4.1.0 have", "input": "", "output": "Having vulnarability CVE-2021-32618 Advisory: Flask-security-too 4.1.0 includes a fix for CVE-2021-32618: Flask-Security-Too allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\\\\github.com will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want. This is considered a low severity due to the fact that if Werkzeug is used (which is very common with Flask applications) as the WSGI layer, it by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False'.\r\nhttps://github.com/Flask-Middleware/flask-security/commit/e39bb04615050448c1b8ba4caa7dacc0edd3e405", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-security-too version less then 4.1.0 have ### Response: Having vulnarability CVE-2021-32618 Advisory: Flask-security-too 4.1.0 includes a fix for CVE-2021-32618: Flask-Security-Too allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\\\\github.com will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want. This is considered a low severity due to the fact that if Werkzeug is used (which is very common with Flask applications) as the WSGI layer, it by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False'.\r\nhttps://github.com/Flask-Middleware/flask-security/commit/e39bb04615050448c1b8ba4caa7dacc0edd3e405" }, { "instruction": "what vulnarability does flask-session-captcha version less then 1.2.1 have", "input": "", "output": "Having vulnarability CVE-2022-24880 Advisory: Flask-session-captcha 1.2.1 includes a fix for CVE-2022-24880: In versions prior to 1.2.1, the 'captcha.validate()' function would return 'None' if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.\r\nhttps://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-session-captcha version less then 1.2.1 have ### Response: Having vulnarability CVE-2022-24880 Advisory: Flask-session-captcha 1.2.1 includes a fix for CVE-2022-24880: In versions prior to 1.2.1, the 'captcha.validate()' function would return 'None' if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.\r\nhttps://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45" }, { "instruction": "what vulnarability does flask-sieve version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2021-39139 Advisory: Flask-sieve 1.0.4 fixes some vulnerabilities by updating the werkzeug package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-sieve version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-39139 Advisory: Flask-sieve 1.0.4 fixes some vulnerabilities by updating the werkzeug package." }, { "instruction": "what vulnarability does flask-socketio version less then 4.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-37309 Advisory: Flask-socketio 4.2.0 addresses potential websocket cross-origin attacks. See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-socketio version less then 4.2.0 have ### Response: Having vulnarability PVE-2021-37309 Advisory: Flask-socketio 4.2.0 addresses potential websocket cross-origin attacks. See: ." }, { "instruction": "what vulnarability does flask-squeeze version less then 2.0.3 have", "input": "", "output": "Having vulnarability PVE-2023-53599 Advisory: Flask-squeeze 2.0.3 add BREACH exploit protection for dynamic resources.\r\nhttps://github.com/mkrd/Flask-Squeeze/commit/3a20ec78a5c3f1db054bac06ab22ecfa25ae6482", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-squeeze version less then 2.0.3 have ### Response: Having vulnarability PVE-2023-53599 Advisory: Flask-squeeze 2.0.3 add BREACH exploit protection for dynamic resources.\r\nhttps://github.com/mkrd/Flask-Squeeze/commit/3a20ec78a5c3f1db054bac06ab22ecfa25ae6482" }, { "instruction": "what vulnarability does flask-statsdclient version less then 2.0.2 have", "input": "", "output": "Having vulnarability PVE-2021-36813 Advisory: flask-statsdclient 2.0.2 is for security vulnerabilities", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-statsdclient version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-36813 Advisory: flask-statsdclient 2.0.2 is for security vulnerabilities" }, { "instruction": "what vulnarability does flask-unchained version less then 0.9.0 have", "input": "", "output": "Having vulnarability CVE-2021-23393 Advisory: This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\\\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-unchained version less then 0.9.0 have ### Response: Having vulnarability CVE-2021-23393 Advisory: This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\\\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False." }, { "instruction": "what vulnarability does flask-user version less then equal to 1.0.2.2 have", "input": "", "output": "Having vulnarability CVE-2021-23401 Advisory: This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\\\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-user version less then equal to 1.0.2.2 have ### Response: Having vulnarability CVE-2021-23401 Advisory: This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\\\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False." }, { "instruction": "what vulnarability does flask-wtf version less then 0.9.3 have", "input": "", "output": "Having vulnarability PVE-2021-42493 Advisory: Flask-wtf 0.9.3 fixes how CSRF tokens are verified.\r\nhttps://github.com/wtforms/flask-wtf/pull/91/commits/91f70259660a106a49cd8cc2ccd137d47c9c393d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-wtf version less then 0.9.3 have ### Response: Having vulnarability PVE-2021-42493 Advisory: Flask-wtf 0.9.3 fixes how CSRF tokens are verified.\r\nhttps://github.com/wtforms/flask-wtf/pull/91/commits/91f70259660a106a49cd8cc2ccd137d47c9c393d" }, { "instruction": "what vulnarability does flaskcode version less then equal to 0.0.8 have", "input": "", "output": "Having vulnarability CVE-2023-52289 Advisory: Flaskcode is affected by a path traversal vulnerability. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/ URI (from views.py), allows attackers to write to arbitrary files.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flaskcode version less then equal to 0.0.8 have ### Response: Having vulnarability CVE-2023-52289 Advisory: Flaskcode is affected by a path traversal vulnerability. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/ URI (from views.py), allows attackers to write to arbitrary files." }, { "instruction": "what vulnarability does flatplan version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2021-23980 Advisory: Flatplan 1.2.0 updates its dependency 'bleach' to v3.3.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flatplan version less then 1.2.0 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Flatplan 1.2.0 updates its dependency 'bleach' to v3.3.0 to include a security fix." }, { "instruction": "what vulnarability does flex version less then 6.12.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Flex 6.12.0 uses 'yaml.safe_load' to prevent a remote code execution vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flex version less then 6.12.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Flex 6.12.0 uses 'yaml.safe_load' to prevent a remote code execution vulnerability." }, { "instruction": "what vulnarability does flexmeasures version less then 0.17 have", "input": "", "output": "Having vulnarability PVE-2023-62735 Advisory: Flexmeasures 0.17 upgrades the Pillow dependency to versions >=10.0.1 due to vulnerabilities present in earlier versions.\r\nhttps://github.com/FlexMeasures/flexmeasures/pull/872/commits/843b9f1f385b016323242bbea3f464c86525c975", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flexmeasures version less then 0.17 have ### Response: Having vulnarability PVE-2023-62735 Advisory: Flexmeasures 0.17 upgrades the Pillow dependency to versions >=10.0.1 due to vulnerabilities present in earlier versions.\r\nhttps://github.com/FlexMeasures/flexmeasures/pull/872/commits/843b9f1f385b016323242bbea3f464c86525c975" }, { "instruction": "what vulnarability does flowchem version less then 1.0.0a1 have", "input": "", "output": "Having vulnarability CVE-2022-34749 Advisory: Flowchem 1.0.0a1 updates its dependency 'mistune' to v2.0.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flowchem version less then 1.0.0a1 have ### Response: Having vulnarability CVE-2022-34749 Advisory: Flowchem 1.0.0a1 updates its dependency 'mistune' to v2.0.3 to include a security fix." }, { "instruction": "what vulnarability does flower version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2022-30034 Advisory: Flower 1.1.0 and prior are vulnerable to CVE-2022-30034: All versions as of 05-02-2022 are vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.\r\nhttps://tprynn.github.io/2022/05/26/flower-vulns.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flower version less then 1.2.0 have ### Response: Having vulnarability CVE-2022-30034 Advisory: Flower 1.1.0 and prior are vulnerable to CVE-2022-30034: All versions as of 05-02-2022 are vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.\r\nhttps://tprynn.github.io/2022/05/26/flower-vulns.html" }, { "instruction": "what vulnarability does flytekit version less then 0.30.0 have", "input": "", "output": "Having vulnarability PVE-2022-44776 Advisory: Flytekit 0.30.0 stops using unauthenticated git.\r\nhttps://github.com/flyteorg/flytekit/pull/810", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flytekit version less then 0.30.0 have ### Response: Having vulnarability PVE-2022-44776 Advisory: Flytekit 0.30.0 stops using unauthenticated git.\r\nhttps://github.com/flyteorg/flytekit/pull/810" }, { "instruction": "what vulnarability does fmeval version less then 0.4.0 have", "input": "", "output": "Having vulnarability CVE-2024-23334 Advisory: fmeval version 0.4.0 upgrades its aiohttp dependency to 3.9.3 from the earlier 3.9.1 in response to addressing the security vulnerability CVE-2024-23334.\r\nhttps://github.com/aws/fmeval/pull/194/commits/b5a89e3912db8232670a44a908343038bb1fb5a4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fmeval version less then 0.4.0 have ### Response: Having vulnarability CVE-2024-23334 Advisory: fmeval version 0.4.0 upgrades its aiohttp dependency to 3.9.3 from the earlier 3.9.1 in response to addressing the security vulnerability CVE-2024-23334.\r\nhttps://github.com/aws/fmeval/pull/194/commits/b5a89e3912db8232670a44a908343038bb1fb5a4" }, { "instruction": "what vulnarability does fnapy version less then 1.1.7 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Fnapy 1.1.7 updates its dependency 'requests' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fnapy version less then 1.1.7 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Fnapy 1.1.7 updates its dependency 'requests' to include a security fix." }, { "instruction": "what vulnarability does fondant version less then 0.6.1 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Fondant 0.6.1 updates its dependency 'Pillow' to v10.0.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fondant version less then 0.6.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Fondant 0.6.1 updates its dependency 'Pillow' to v10.0.1 to include a security fix." }, { "instruction": "what vulnarability does fonttools version greather then equal to 0,less then 4.43.0 have", "input": "", "output": "Having vulnarability CVE-2023-45139 Advisory: fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fonttools version greather then equal to 0,less then 4.43.0 have ### Response: Having vulnarability CVE-2023-45139 Advisory: fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0." }, { "instruction": "what vulnarability does foolscap version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2021-25828 Advisory: In foolscap before 0.7.0 the \"flappserver\" feature was found to have a vulnerability in the service-lookup code which, when combined with an attacker who has the ability to write files to a location where the flappserver process could read them, would allow that attacker to obtain control of the flappserver process.\r\nhttps://github.com/warner/foolscap/commit/e35ce531a8d7763f7c37e7229dec4f1021d7ecc1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does foolscap version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-25828 Advisory: In foolscap before 0.7.0 the \"flappserver\" feature was found to have a vulnerability in the service-lookup code which, when combined with an attacker who has the ability to write files to a location where the flappserver process could read them, would allow that attacker to obtain control of the flappserver process.\r\nhttps://github.com/warner/foolscap/commit/e35ce531a8d7763f7c37e7229dec4f1021d7ecc1" }, { "instruction": "what vulnarability does forcebalance version less then 1.9.5 have", "input": "", "output": "Having vulnarability CVE-2007-4559 Advisory: Forcebalance 1.9.5 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does forcebalance version less then 1.9.5 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Forcebalance 1.9.5 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267." }, { "instruction": "what vulnarability does form-designer version less then 0.8 have", "input": "", "output": "Having vulnarability PVE-2021-34711 Advisory: Form-designer 0.8 fixes an XSS vulnerability in the administration panel.\r\nhttps://github.com/feincms/form_designer/pull/18/commits/bc252a4bf3d610c9beaf83ffa39d66f2cbbcc5cd\r\nhttps://github.com/feincms/form_designer/commit/0e93601195f4c22c84ee1704de34e5331816188b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does form-designer version less then 0.8 have ### Response: Having vulnarability PVE-2021-34711 Advisory: Form-designer 0.8 fixes an XSS vulnerability in the administration panel.\r\nhttps://github.com/feincms/form_designer/pull/18/commits/bc252a4bf3d610c9beaf83ffa39d66f2cbbcc5cd\r\nhttps://github.com/feincms/form_designer/commit/0e93601195f4c22c84ee1704de34e5331816188b" }, { "instruction": "what vulnarability does formbar version less then 0.9 have", "input": "", "output": "Having vulnarability PVE-2021-25829 Advisory: Formbar 0.9 fixes a potential code injection issue by removing the rule parsing out of formbar and by using brabbel library for rule parsing and evaluation.\r\nhttps://github.com/ringo-framework/formbar/commit/bcbcf67fc68c37dd12528e3ddcacd712e4e0e64d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does formbar version less then 0.9 have ### Response: Having vulnarability PVE-2021-25829 Advisory: Formbar 0.9 fixes a potential code injection issue by removing the rule parsing out of formbar and by using brabbel library for rule parsing and evaluation.\r\nhttps://github.com/ringo-framework/formbar/commit/bcbcf67fc68c37dd12528e3ddcacd712e4e0e64d" }, { "instruction": "what vulnarability does formencode version less then 1.0 have", "input": "", "output": "Having vulnarability CVE-2008-6547 Advisory: schema.py in FormEncode for Python (python-formencode) 1.0 does not apply the chained_validators feature, which allows attackers to bypass intended access restrictions via unknown vectors.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does formencode version less then 1.0 have ### Response: Having vulnarability CVE-2008-6547 Advisory: schema.py in FormEncode for Python (python-formencode) 1.0 does not apply the chained_validators feature, which allows attackers to bypass intended access restrictions via unknown vectors." }, { "instruction": "what vulnarability does fortitudo-tech version less then 1.0.6 have", "input": "", "output": "Having vulnarability CVE-2024-3651 Advisory: Fortitudo-tech version 1.0.6 updates its idna library from version 3.6 to 3.7 to address the vulnerability described in CVE-2024-3651.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fortitudo-tech version less then 1.0.6 have ### Response: Having vulnarability CVE-2024-3651 Advisory: Fortitudo-tech version 1.0.6 updates its idna library from version 3.6 to 3.7 to address the vulnerability described in CVE-2024-3651." }, { "instruction": "what vulnarability does fosslight-android version less then 4.1.15 have", "input": "", "output": "Having vulnarability PVE-2023-62077 Advisory: A vulnerability patch has been integrated into Fosslight-android version 4.1.15. Earlier versions may have hard-coded sensitive credentials and lacked measures to counter potential SQL injection vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-android version less then 4.1.15 have ### Response: Having vulnarability PVE-2023-62077 Advisory: A vulnerability patch has been integrated into Fosslight-android version 4.1.15. Earlier versions may have hard-coded sensitive credentials and lacked measures to counter potential SQL injection vulnerabilities." }, { "instruction": "what vulnarability does fosslight-dependency version less then 3.13.5 have", "input": "", "output": "Having vulnarability PVE-2023-61797 Advisory: Fosslight-dependency 3.13.5 includes a fix for a XXE vulnerability.\r\nhttps://github.com/fosslight/fosslight_dependency_scanner/pull/171", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-dependency version less then 3.13.5 have ### Response: Having vulnarability PVE-2023-61797 Advisory: Fosslight-dependency 3.13.5 includes a fix for a XXE vulnerability.\r\nhttps://github.com/fosslight/fosslight_dependency_scanner/pull/171" }, { "instruction": "what vulnarability does fosslight-scanner version less then 1.7.16 have", "input": "", "output": "Having vulnarability PVE-2023-60863 Advisory: Fosslight-scanner 1.7.16 includes a fix for a Command Injection vulnerability.\r\nhttps://github.com/fosslight/fosslight_scanner/pull/69", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-scanner version less then 1.7.16 have ### Response: Having vulnarability PVE-2023-60863 Advisory: Fosslight-scanner 1.7.16 includes a fix for a Command Injection vulnerability.\r\nhttps://github.com/fosslight/fosslight_scanner/pull/69" }, { "instruction": "what vulnarability does fosslight-source version less then 1.7.2 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Fosslight-source 1.7.2 updates its dependency 'wheel' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/fosslight/fosslight_source_scanner/pull/138", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-source version less then 1.7.2 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Fosslight-source 1.7.2 updates its dependency 'wheel' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/fosslight/fosslight_source_scanner/pull/138" }, { "instruction": "what vulnarability does fosslight-util version less then 1.4.30 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Fosslight-util 1.4.30 pins its dependency 'setuptools' to versions >=65.5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-util version less then 1.4.30 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Fosslight-util 1.4.30 pins its dependency 'setuptools' to versions >=65.5.1 to include a security fix." }, { "instruction": "what vulnarability does fosslight-yocto version less then 3.1.23 have", "input": "", "output": "Having vulnarability PVE-2023-61100 Advisory: Fosslight-yocto 3.1.23 includes a fix for a potential SQL injection vulnerability.\r\nhttps://github.com/fosslight/fosslight_yocto_scanner/pull/14", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-yocto version less then 3.1.23 have ### Response: Having vulnarability PVE-2023-61100 Advisory: Fosslight-yocto 3.1.23 includes a fix for a potential SQL injection vulnerability.\r\nhttps://github.com/fosslight/fosslight_yocto_scanner/pull/14" }, { "instruction": "what vulnarability does fotoobo version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2023-45803 Advisory: Fotoobo 1.1.0 updates its dependency 'urlllib3' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fotoobo version less then 1.1.0 have ### Response: Having vulnarability CVE-2023-45803 Advisory: Fotoobo 1.1.0 updates its dependency 'urlllib3' to include a security fix." }, { "instruction": "what vulnarability does fpdf2 version less then 2.5.1 have", "input": "", "output": "Having vulnarability PVE-2022-45581 Advisory: Fpdf2 2.5.1 deprecates its font caching mechanism that used the 'pickle' module for security reasons.\r\nhttps://github.com/PyFPDF/fpdf2/issues/345", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fpdf2 version less then 2.5.1 have ### Response: Having vulnarability PVE-2022-45581 Advisory: Fpdf2 2.5.1 deprecates its font caching mechanism that used the 'pickle' module for security reasons.\r\nhttps://github.com/PyFPDF/fpdf2/issues/345" }, { "instruction": "what vulnarability does fractal-server version less then 1.3.0a3 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Fractal-server 1.3.0a3 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/fractal-analytics-platform/fractal-server/pull/723", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fractal-server version less then 1.3.0a3 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Fractal-server 1.3.0a3 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/fractal-analytics-platform/fractal-server/pull/723" }, { "instruction": "what vulnarability does frapp version less then 12.0.9 have", "input": "", "output": "Having vulnarability CVE-2019-15700 Advisory: public/js/frappe/form/footer/timeline.js in Frappe Framework 12 through 12.0.8 does not escape HTML in the timeline and thus is affected by crafted \"changed value of\" text.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does frapp version less then 12.0.9 have ### Response: Having vulnarability CVE-2019-15700 Advisory: public/js/frappe/form/footer/timeline.js in Frappe Framework 12 through 12.0.8 does not escape HTML in the timeline and thus is affected by crafted \"changed value of\" text." }, { "instruction": "what vulnarability does frappe version less then 11.1.46 have", "input": "", "output": "Having vulnarability CVE-2019-14967 Advisory: An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does frappe version less then 11.1.46 have ### Response: Having vulnarability CVE-2019-14967 Advisory: An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability." }, { "instruction": "what vulnarability does freeipa version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2008-3274 Advisory: The default configuration of Red Hat Enterprise IPA 1.0.0 and FreeIPA before 1.1.1 places ldap:///anyone on the read ACL for the krbMKey attribute, which allows remote attackers to obtain the Kerberos master key via an anonymous LDAP query.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does freeipa version less then 1.1.1 have ### Response: Having vulnarability CVE-2008-3274 Advisory: The default configuration of Red Hat Enterprise IPA 1.0.0 and FreeIPA before 1.1.1 places ldap:///anyone on the read ACL for the krbMKey attribute, which allows remote attackers to obtain the Kerberos master key via an anonymous LDAP query." }, { "instruction": "what vulnarability does freetakserver version less then 2.0.11a0 have", "input": "", "output": "Having vulnarability PVE-2023-53008 Advisory: Freetakserver 2.0.11a0 includes several fixes for XSS vulnerabilities.\r\nhttps://github.com/FreeTAKTeam/FreeTakServer/pull/513", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does freetakserver version less then 2.0.11a0 have ### Response: Having vulnarability PVE-2023-53008 Advisory: Freetakserver 2.0.11a0 includes several fixes for XSS vulnerabilities.\r\nhttps://github.com/FreeTAKTeam/FreeTakServer/pull/513" }, { "instruction": "what vulnarability does freetakserver-ui version greather then equal to 0,less then equal to 1.9.8 have", "input": "", "output": "Having vulnarability CVE-2022-25512 Advisory: FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does freetakserver-ui version greather then equal to 0,less then equal to 1.9.8 have ### Response: Having vulnarability CVE-2022-25512 Advisory: FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys." }, { "instruction": "what vulnarability does freewvs version less then 0.1.1 have", "input": "", "output": "Having vulnarability CVE-2020-15101 Advisory: In freewvs before 0.1.1, a directory structure of more than 1000 nested directories can interrupt a freewvs scan due to Python's recursion limit and os.walk(). This can be problematic in a case where an administrator scans the dirs of potentially untrusted users.\r\nhttps://github.com/schokokeksorg/freewvs/security/advisories/GHSA-7pmh-vrww-25xx\r\nhttps://github.com/schokokeksorg/freewvs/commit/83a6b55c0435c69f447488b791555e6078803143", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does freewvs version less then 0.1.1 have ### Response: Having vulnarability CVE-2020-15101 Advisory: In freewvs before 0.1.1, a directory structure of more than 1000 nested directories can interrupt a freewvs scan due to Python's recursion limit and os.walk(). This can be problematic in a case where an administrator scans the dirs of potentially untrusted users.\r\nhttps://github.com/schokokeksorg/freewvs/security/advisories/GHSA-7pmh-vrww-25xx\r\nhttps://github.com/schokokeksorg/freewvs/commit/83a6b55c0435c69f447488b791555e6078803143" }, { "instruction": "what vulnarability does fresco version greather then equal to 0.5.0,less then 0.5.5 have", "input": "", "output": "Having vulnarability PVE-2021-35028 Advisory: In fresco after 0.5.5 user supplied data is no longer reflected in error messages raised from \"fresco.routeargs.RequestArg\". This fixes a potential XSS vulnerability affecting versions starting from 0.5.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fresco version greather then equal to 0.5.0,less then 0.5.5 have ### Response: Having vulnarability PVE-2021-35028 Advisory: In fresco after 0.5.5 user supplied data is no longer reflected in error messages raised from \"fresco.routeargs.RequestArg\". This fixes a potential XSS vulnerability affecting versions starting from 0.5.0." }, { "instruction": "what vulnarability does friendlyshell version less then 1.0.3 have", "input": "", "output": "Having vulnarability PVE-2021-36642 Advisory: friendlyshell 1.0.3 fixes security warnings, and bugs with parsing quoted command parameters.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does friendlyshell version less then 1.0.3 have ### Response: Having vulnarability PVE-2021-36642 Advisory: friendlyshell 1.0.3 fixes security warnings, and bugs with parsing quoted command parameters." }, { "instruction": "what vulnarability does ftp-cloudfs version greather then equal to 0.24,less then 0.26.1 have", "input": "", "output": "Having vulnarability PVE-2023-54977 Advisory: Ftp-cloudfs 0.26.1 fixes a bug in token cache code with auth 2.0 (keystone) when used with memcache. The same username in different tenants could get the same auth token.\r\nhttps://github.com/reidrac/ftp-cloudfs/compare/0.26...0.26.1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftp-cloudfs version greather then equal to 0.24,less then 0.26.1 have ### Response: Having vulnarability PVE-2023-54977 Advisory: Ftp-cloudfs 0.26.1 fixes a bug in token cache code with auth 2.0 (keystone) when used with memcache. The same username in different tenants could get the same auth token.\r\nhttps://github.com/reidrac/ftp-cloudfs/compare/0.26...0.26.1" }, { "instruction": "what vulnarability does ftw-dashboard-dragndrop version less then 1.5.1 have", "input": "", "output": "Having vulnarability PVE-2021-25831 Advisory: ftw.dashboard.dragndrop 1.5.1 includes several undisclosed security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-dashboard-dragndrop version less then 1.5.1 have ### Response: Having vulnarability PVE-2021-25831 Advisory: ftw.dashboard.dragndrop 1.5.1 includes several undisclosed security fixes." }, { "instruction": "what vulnarability does ftw-dashboard-portlets-postit version less then 1.3.4 have", "input": "", "output": "Having vulnarability PVE-2021-25832 Advisory: ftw.dashboard.portlets.postit 1.3.4 fixes a security error, it was possible to add postit comment on a foreign dashboard if the userid an portlet id was known.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-dashboard-portlets-postit version less then 1.3.4 have ### Response: Having vulnarability PVE-2021-25832 Advisory: ftw.dashboard.portlets.postit 1.3.4 fixes a security error, it was possible to add postit comment on a foreign dashboard if the userid an portlet id was known." }, { "instruction": "what vulnarability does ftw-lawgiver version less then 1.16.1 have", "input": "", "output": "Having vulnarability PVE-2021-37470 Advisory: Ftw.lawgiver 1.16.1 fixes the Plone workflow security.\r\nhttps://github.com/4teamwork/ftw.lawgiver/pull/87", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-lawgiver version less then 1.16.1 have ### Response: Having vulnarability PVE-2021-37470 Advisory: Ftw.lawgiver 1.16.1 fixes the Plone workflow security.\r\nhttps://github.com/4teamwork/ftw.lawgiver/pull/87" }, { "instruction": "what vulnarability does ftw-mail version less then 2.2.3 have", "input": "", "output": "Having vulnarability PVE-2021-25833 Advisory: Ftw.mail 2.2.3 makes mail view XSS-save using the safe-html transform for the mail-body display.\r\nhttps://github.com/4teamwork/ftw.mail/pull/25", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-mail version less then 2.2.3 have ### Response: Having vulnarability PVE-2021-25833 Advisory: Ftw.mail 2.2.3 makes mail view XSS-save using the safe-html transform for the mail-body display.\r\nhttps://github.com/4teamwork/ftw.mail/pull/25" }, { "instruction": "what vulnarability does ftw-meeting version less then 1.4.1 have", "input": "", "output": "Having vulnarability PVE-2021-25834 Advisory: ftw.meeting before 1.4.1 isn't using safe-html-transform for textfields.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-meeting version less then 1.4.1 have ### Response: Having vulnarability PVE-2021-25834 Advisory: ftw.meeting before 1.4.1 isn't using safe-html-transform for textfields." }, { "instruction": "what vulnarability does ftw-permissionmanager version less then 2.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-25835 Advisory: Ftw.permissionmanager before 2.2.2 allowed users with view permission to access the advanced security features. Since it's possible to search for all users, it exposed all usernames and email addresses to anyone with view permission.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-permissionmanager version less then 2.2.2 have ### Response: Having vulnarability PVE-2021-25835 Advisory: Ftw.permissionmanager before 2.2.2 allowed users with view permission to access the advanced security features. Since it's possible to search for all users, it exposed all usernames and email addresses to anyone with view permission." }, { "instruction": "what vulnarability does ftw-recipe-solr version less then 1.3.5 have", "input": "", "output": "Having vulnarability CVE-2021-44228 Advisory: Ftw.recipe.solr 1.3.5 disables message lookups in log4j dependency to fix a critical vulnerability.\r\nhttps://github.com/4teamwork/ftw.recipe.solr/commit/5d5ede2d8e0119c74ad6fa51cd2bee434109810f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-recipe-solr version less then 1.3.5 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Ftw.recipe.solr 1.3.5 disables message lookups in log4j dependency to fix a critical vulnerability.\r\nhttps://github.com/4teamwork/ftw.recipe.solr/commit/5d5ede2d8e0119c74ad6fa51cd2bee434109810f" }, { "instruction": "what vulnarability does funcx version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-40175 Advisory: Funcx 0.2.0 overhauls the security architecture.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does funcx version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-40175 Advisory: Funcx 0.2.0 overhauls the security architecture." }, { "instruction": "what vulnarability does fundaml version less then 0.1.32 have", "input": "", "output": "Having vulnarability CVE-2023-24816 Advisory: Fundaml 0.1.32 updates its dependency 'ipython' to version '8.10.0' to include a fix for a Remote Code Execution vulnerability.\r\nhttps://github.com/tzoght/fundaml/commit/02e60c4d8474aa673f02a65556fef2382fe4cf16", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fundaml version less then 0.1.32 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Fundaml 0.1.32 updates its dependency 'ipython' to version '8.10.0' to include a fix for a Remote Code Execution vulnerability.\r\nhttps://github.com/tzoght/fundaml/commit/02e60c4d8474aa673f02a65556fef2382fe4cf16" }, { "instruction": "what vulnarability does fundnsf version less then 0.0.32 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Fundnsf 0.0.32 updates requests to v2.20.0 for including a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fundnsf version less then 0.0.32 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Fundnsf 0.0.32 updates requests to v2.20.0 for including a security fix." }, { "instruction": "what vulnarability does funix version less then 0.4.1 have", "input": "", "output": "Having vulnarability PVE-2023-60177 Advisory: Funix 0.4.1 includes a fix for a Missing Authentication for Critical Function vulnerability. The vulnerable funix version uses the wrong variables for the judgment, which makes it possible to run the function directly without the secret.\r\nhttps://github.com/TexteaInc/funix/commit/b6b07001aea435aabb243e402ff54720f70093d8", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does funix version less then 0.4.1 have ### Response: Having vulnarability PVE-2023-60177 Advisory: Funix 0.4.1 includes a fix for a Missing Authentication for Critical Function vulnerability. The vulnerable funix version uses the wrong variables for the judgment, which makes it possible to run the function directly without the secret.\r\nhttps://github.com/TexteaInc/funix/commit/b6b07001aea435aabb243e402ff54720f70093d8" }, { "instruction": "what vulnarability does fuse-med-ml version less then 0.2.7 have", "input": "", "output": "Having vulnarability CVE-2022-1941 Advisory: Fuse-med-ml 0.2.7 updates its dependency 'protobuf' requirement to \">=3.20.2\" to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fuse-med-ml version less then 0.2.7 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Fuse-med-ml 0.2.7 updates its dependency 'protobuf' requirement to \">=3.20.2\" to include a security fix." }, { "instruction": "what vulnarability does futoin-cid version less then 0.8.5 have", "input": "", "output": "Having vulnarability PVE-2021-35184 Advisory: futoin-cid before 0.8.5 does not properly check components loading from the root directory when using os.path.join().\r\nhttps://github.com/futoin/cid-tool/commit/8da1898f5eb2d987514822d964b51e02e3ca58df", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does futoin-cid version less then 0.8.5 have ### Response: Having vulnarability PVE-2021-35184 Advisory: futoin-cid before 0.8.5 does not properly check components loading from the root directory when using os.path.join().\r\nhttps://github.com/futoin/cid-tool/commit/8da1898f5eb2d987514822d964b51e02e3ca58df" }, { "instruction": "what vulnarability does future version less then equal to 0.18.2 have", "input": "", "output": "Having vulnarability CVE-2022-40899 Advisory: Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.\r\nhttps://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215\r\nhttps://github.com/python/cpython/pull/17157", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does future version less then equal to 0.18.2 have ### Response: Having vulnarability CVE-2022-40899 Advisory: Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.\r\nhttps://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215\r\nhttps://github.com/python/cpython/pull/17157" }, { "instruction": "what vulnarability does galaxy-importer version less then 0.2.15 have", "input": "", "output": "Having vulnarability CVE-2021-23980 Advisory: Galaxy-importer 0.2.15 updates 'bleach' dependency to v3.3.0 to fix a 'XSS mutation' vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does galaxy-importer version less then 0.2.15 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Galaxy-importer 0.2.15 updates 'bleach' dependency to v3.3.0 to fix a 'XSS mutation' vulnerability." }, { "instruction": "what vulnarability does galaxy-ng version less then 4.4.0 have", "input": "", "output": "Having vulnarability CVE-2021-32052 Advisory: Galaxy-ng 4.4.0 updates its dependency 'Django' to v3.2.6 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does galaxy-ng version less then 4.4.0 have ### Response: Having vulnarability CVE-2021-32052 Advisory: Galaxy-ng 4.4.0 updates its dependency 'Django' to v3.2.6 to include security fixes." }, { "instruction": "what vulnarability does gallery-dl version less then 1.5.3 have", "input": "", "output": "Having vulnarability PVE-2021-42368 Advisory: Gallery-dl 1.5.3 improves the downloader/postprocessor module loading to prevent potential security risk through relative imports.\r\nhttps://github.com/mikf/gallery-dl/commit/e9ae6fd080d8c9662a1ce688ec622d413b99e615", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gallery-dl version less then 1.5.3 have ### Response: Having vulnarability PVE-2021-42368 Advisory: Gallery-dl 1.5.3 improves the downloader/postprocessor module loading to prevent potential security risk through relative imports.\r\nhttps://github.com/mikf/gallery-dl/commit/e9ae6fd080d8c9662a1ce688ec622d413b99e615" }, { "instruction": "what vulnarability does gameserverlister version less then 1.0.8 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Gameserverlister 1.0.8 updates its dependency 'requests' to include a fix for an Information Exposure vulnerability.\r\nhttps://github.com/cetteup/GameserverLister/commit/ea36f5a098e90a73d58ff7f1da368ec6911f0cd9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gameserverlister version less then 1.0.8 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Gameserverlister 1.0.8 updates its dependency 'requests' to include a fix for an Information Exposure vulnerability.\r\nhttps://github.com/cetteup/GameserverLister/commit/ea36f5a098e90a73d58ff7f1da368ec6911f0cd9" }, { "instruction": "what vulnarability does gandi-cli version less then 0.10 have", "input": "", "output": "Having vulnarability PVE-2021-25836 Advisory: gandi.cli 0.10 includes two security related fixes: \r\n\r\n- validate server certificate using request as\r\n xmlrpc transport.\r\n- Security: restrict configuration file rights to owner only.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gandi-cli version less then 0.10 have ### Response: Having vulnarability PVE-2021-25836 Advisory: gandi.cli 0.10 includes two security related fixes: \r\n\r\n- validate server certificate using request as\r\n xmlrpc transport.\r\n- Security: restrict configuration file rights to owner only." }, { "instruction": "what vulnarability does ganga version less then 6.5.0 have", "input": "", "output": "Having vulnarability PVE-2023-60245 Advisory: Ganga 6.5.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/ganga-devs/ganga/pull/941", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ganga version less then 6.5.0 have ### Response: Having vulnarability PVE-2023-60245 Advisory: Ganga 6.5.0 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/ganga-devs/ganga/pull/941" }, { "instruction": "what vulnarability does garbevents version less then 2.0.8 have", "input": "", "output": "Having vulnarability CVE-2021-39214 Advisory: Garbevents 2.0.8 updates its dependency 'mitmproxy' to v7.0.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does garbevents version less then 2.0.8 have ### Response: Having vulnarability CVE-2021-39214 Advisory: Garbevents 2.0.8 updates its dependency 'mitmproxy' to v7.0.3 to include a security fix." }, { "instruction": "what vulnarability does gateone version greather then equal to 0,less then equal to 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2020-19003 Advisory: An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gateone version greather then equal to 0,less then equal to 1.2.0 have ### Response: Having vulnarability CVE-2020-19003 Advisory: An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list." }, { "instruction": "what vulnarability does gcp-secretmanager-cache version less then 0.2.3 have", "input": "", "output": "Having vulnarability PVE-2022-48190 Advisory: Gcp-secretmanager-cache 0.2.3 adds handling of characters in user names to prevent SQL injection.\r\nhttps://github.com/MikeMoore63/gcp-secretmanager-cache/commit/97c58ed91f7577f9829dfc257d953b86df3c6ee0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gcp-secretmanager-cache version less then 0.2.3 have ### Response: Having vulnarability PVE-2022-48190 Advisory: Gcp-secretmanager-cache 0.2.3 adds handling of characters in user names to prevent SQL injection.\r\nhttps://github.com/MikeMoore63/gcp-secretmanager-cache/commit/97c58ed91f7577f9829dfc257d953b86df3c6ee0" }, { "instruction": "what vulnarability does gdal version less then 1.10.0 have", "input": "", "output": "Having vulnarability PVE-2021-42375 Advisory: Gdal 1.10.0 fixes various vulnerabilities/DoS in the GXF driver.\r\nhttps://github.com/OSGeo/gdal/commit/283146cbff813f0a7eff3e1fe4712ff1f48f1188", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gdal version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-42375 Advisory: Gdal 1.10.0 fixes various vulnerabilities/DoS in the GXF driver.\r\nhttps://github.com/OSGeo/gdal/commit/283146cbff813f0a7eff3e1fe4712ff1f48f1188" }, { "instruction": "what vulnarability does gdbgui version less then 0.11.1.1 have", "input": "", "output": "Having vulnarability PVE-2022-49578 Advisory: Gdbgui 0.11.1.1 adds CSRF and XSS protection.\r\nhttps://github.com/cs01/gdbgui/pull/168", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gdbgui version less then 0.11.1.1 have ### Response: Having vulnarability PVE-2022-49578 Advisory: Gdbgui 0.11.1.1 adds CSRF and XSS protection.\r\nhttps://github.com/cs01/gdbgui/pull/168" }, { "instruction": "what vulnarability does gds-django-jet version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2021-40668 Advisory: Gds-django-jet 1.0.4 fixes an security issue with accessing 'model_lookup_view' (when using 'RelatedFieldAjaxListFilter') without permissions.\r\nhttps://github.com/govindsharma7/gds-django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gds-django-jet version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-40668 Advisory: Gds-django-jet 1.0.4 fixes an security issue with accessing 'model_lookup_view' (when using 'RelatedFieldAjaxListFilter') without permissions.\r\nhttps://github.com/govindsharma7/gds-django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9" }, { "instruction": "what vulnarability does genbadge version less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2013-1665 Advisory: Genbadge 1.0.0 starts to use 'defusedxml' to fix a known vulnerability. See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does genbadge version less then 1.0.0 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Genbadge 1.0.0 starts to use 'defusedxml' to fix a known vulnerability. See: ." }, { "instruction": "what vulnarability does genesisbot version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45449 Advisory: Genesisbot is a malicious package, typosquatting. \"The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim\".\r\nhttps://thehackernews.com/2021/07/several-malicious-typosquatted-python.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does genesisbot version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45449 Advisory: Genesisbot is a malicious package, typosquatting. \"The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim\".\r\nhttps://thehackernews.com/2021/07/several-malicious-typosquatted-python.html" }, { "instruction": "what vulnarability does geno2phenotb version less then 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2022-21797 Advisory: Geno2phenotb 1.0.1 updates its dependency 'joblib' to version '1.2.0' to include a fix for an Arbitrary Code Execution vulnerability.\r\nhttps://github.com/msmdev/geno2phenoTB/commit/139d29184dbec34ca12368783ea205793c22df6e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geno2phenotb version less then 1.0.1 have ### Response: Having vulnarability CVE-2022-21797 Advisory: Geno2phenotb 1.0.1 updates its dependency 'joblib' to version '1.2.0' to include a fix for an Arbitrary Code Execution vulnerability.\r\nhttps://github.com/msmdev/geno2phenoTB/commit/139d29184dbec34ca12368783ea205793c22df6e" }, { "instruction": "what vulnarability does genshi version less then 0.6.1 have", "input": "", "output": "Having vulnarability PVE-2021-39055 Advisory: Genshi 0.6.1 updates the HTML sanitizer to strip any CSS comments in style attributes, which could previously be used to hide malicious property values. This security fix also enhances the sanitizing of CSS in style attributes. Genshi's 'HTMLSanitizer' disallows style attributes by default (this remains unchanged) and warns against such attacks in its documentation.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does genshi version less then 0.6.1 have ### Response: Having vulnarability PVE-2021-39055 Advisory: Genshi 0.6.1 updates the HTML sanitizer to strip any CSS comments in style attributes, which could previously be used to hide malicious property values. This security fix also enhances the sanitizing of CSS in style attributes. Genshi's 'HTMLSanitizer' disallows style attributes by default (this remains unchanged) and warns against such attacks in its documentation." }, { "instruction": "what vulnarability does geoipsets version less then 2.3.2 have", "input": "", "output": "Having vulnarability PVE-2022-44473 Advisory: Geoipsets 2.3.2 improves the systemd service sandboxing to lower exposure of update-geoipsets.service unit file.\r\nhttps://github.com/chr0mag/geoipsets/issues/18", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geoipsets version less then 2.3.2 have ### Response: Having vulnarability PVE-2022-44473 Advisory: Geoipsets 2.3.2 improves the systemd service sandboxing to lower exposure of update-geoipsets.service unit file.\r\nhttps://github.com/chr0mag/geoipsets/issues/18" }, { "instruction": "what vulnarability does geojson-client version less then 0.4 have", "input": "", "output": "Having vulnarability PVE-2021-38898 Advisory: Geojson-client 0.4 fetches NSW Rural Fire Service feed securely via HTTPS.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geojson-client version less then 0.4 have ### Response: Having vulnarability PVE-2021-38898 Advisory: Geojson-client 0.4 fetches NSW Rural Fire Service feed securely via HTTPS." }, { "instruction": "what vulnarability does geokey version less then 0.8 have", "input": "", "output": "Having vulnarability PVE-2017-47616 Advisory: Geokey 0.8 fixes that administrators where able to add the same user more than once to the list of administrators, which caused integrity errors.\r\nhttps://github.com/ExCiteS/geokey/pull/308", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geokey version less then 0.8 have ### Response: Having vulnarability PVE-2017-47616 Advisory: Geokey 0.8 fixes that administrators where able to add the same user more than once to the list of administrators, which caused integrity errors.\r\nhttps://github.com/ExCiteS/geokey/pull/308" }, { "instruction": "what vulnarability does geonode version less then 2.10 have", "input": "", "output": "Having vulnarability CVE-2018-20060 Advisory: Geonode 2.10 updates 'urllib3' to v1.24.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geonode version less then 2.10 have ### Response: Having vulnarability CVE-2018-20060 Advisory: Geonode 2.10 updates 'urllib3' to v1.24.2 to include security fixes." }, { "instruction": "what vulnarability does geonode-oauth-toolkit version less then 0.8.0 have", "input": "", "output": "Having vulnarability PVE-2021-40423 Advisory: Geonode-oauth-toolkit 0.8.0 fixes vulnerabilities on Basic authentication.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geonode-oauth-toolkit version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-40423 Advisory: Geonode-oauth-toolkit 0.8.0 fixes vulnerabilities on Basic authentication." }, { "instruction": "what vulnarability does geopandas version less then 0.14.1 have", "input": "", "output": "Having vulnarability CVE-2023-47248 Advisory: Geopandas 0.14.1 includes a fix for CVE-2023-47248, a vulnerability affecting the dependency 'pyarrow'.\r\nhttps://github.com/geopandas/geopandas/pull/3070", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geopandas version less then 0.14.1 have ### Response: Having vulnarability CVE-2023-47248 Advisory: Geopandas 0.14.1 includes a fix for CVE-2023-47248, a vulnerability affecting the dependency 'pyarrow'.\r\nhttps://github.com/geopandas/geopandas/pull/3070" }, { "instruction": "what vulnarability does geoshape version less then equal to 1.7.11 have", "input": "", "output": "Having vulnarability CVE-2023-26043 Advisory: Geoshape 1.7.11 and prior versions rely on Geonode 1.4, which is vulnerable to CVE-2023-26043.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geoshape version less then equal to 1.7.11 have ### Response: Having vulnarability CVE-2023-26043 Advisory: Geoshape 1.7.11 and prior versions rely on Geonode 1.4, which is vulnerable to CVE-2023-26043." }, { "instruction": "what vulnarability does geosss version less then 0.1.9 have", "input": "", "output": "Having vulnarability CVE-2024-21503 Advisory: Geosss 0.1.9 secures its codebase by updating the version constraint for Black to \">=24.3.0, < 25.0.0\" to mitigate the risk associated with CVE-2024-21503.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geosss version less then 0.1.9 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Geosss 0.1.9 secures its codebase by updating the version constraint for Black to \">=24.3.0, < 25.0.0\" to mitigate the risk associated with CVE-2024-21503." }, { "instruction": "what vulnarability does geotribu version less then 0.31.1 have", "input": "", "output": "Having vulnarability CVE-2022-22817 Advisory: Geotribu 0.31.1 updates its Pillow dependency to version 10.2 to address the CVE-2022-22817.\r\nhttps://github.com/geotribu/cli/pull/165/commits/ee7ff27877b789df2d385e1dcdbd912bb08ea003", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geotribu version less then 0.31.1 have ### Response: Having vulnarability CVE-2022-22817 Advisory: Geotribu 0.31.1 updates its Pillow dependency to version 10.2 to address the CVE-2022-22817.\r\nhttps://github.com/geotribu/cli/pull/165/commits/ee7ff27877b789df2d385e1dcdbd912bb08ea003" }, { "instruction": "what vulnarability does gequests version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52889 Advisory: Gequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.\r\nhttps://thehackernews.com/2022/12/malware-strains-targeting-python-and.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gequests version greather then 0 have ### Response: Having vulnarability PVE-2023-52889 Advisory: Gequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.\r\nhttps://thehackernews.com/2022/12/malware-strains-targeting-python-and.html" }, { "instruction": "what vulnarability does gerapy version less then 0.9.3 have", "input": "", "output": "Having vulnarability CVE-2020-7698 Advisory: This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized. See: CVE-2020-7698.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gerapy version less then 0.9.3 have ### Response: Having vulnarability CVE-2020-7698 Advisory: This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized. See: CVE-2020-7698." }, { "instruction": "what vulnarability does getgauge version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2023-45803 Advisory: Getgauge 0.4.1 updates its dependency 'urllib3' to v2.0.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does getgauge version less then 0.4.1 have ### Response: Having vulnarability CVE-2023-45803 Advisory: Getgauge 0.4.1 updates its dependency 'urllib3' to v2.0.7 to include a security fix." }, { "instruction": "what vulnarability does geti-sdk version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2023-54990 Advisory: Geti-sdk 1.0.0 enables SSL certificate validation by default.\r\nhttps://github.com/openvinotoolkit/geti-sdk/pull/77", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geti-sdk version less then 1.0.0 have ### Response: Having vulnarability PVE-2023-54990 Advisory: Geti-sdk 1.0.0 enables SSL certificate validation by default.\r\nhttps://github.com/openvinotoolkit/geti-sdk/pull/77" }, { "instruction": "what vulnarability does getmail version less then 3.2.5,greather then equal to 4.0.0a1,less then 4.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-38862 Advisory: Versions of getmail prior to 4.2.0 and 3.2.5 contain a security vulnerability. A local attacker with a shell account could exploit a race condition (or a similar symlink attack) to cause getmail to create or overwrite files in a directory of the local user's choosing if the system administrator ran getmail as root and delivered messages to a maildir or mbox file under the control of the attacker, resulting in a local root exploit. (This vulnerability is not exploitable if the administrator does not deliver mail to the maildirs/mbox files of untrusted local users, or if getmail is configured to use an external unprivileged MDA. Also, this vulnerability is not remotely exploitable.)", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does getmail version less then 3.2.5,greather then equal to 4.0.0a1,less then 4.2.0 have ### Response: Having vulnarability PVE-2021-38862 Advisory: Versions of getmail prior to 4.2.0 and 3.2.5 contain a security vulnerability. A local attacker with a shell account could exploit a race condition (or a similar symlink attack) to cause getmail to create or overwrite files in a directory of the local user's choosing if the system administrator ran getmail as root and delivered messages to a maildir or mbox file under the control of the attacker, resulting in a local root exploit. (This vulnerability is not exploitable if the administrator does not deliver mail to the maildirs/mbox files of untrusted local users, or if getmail is configured to use an external unprivileged MDA. Also, this vulnerability is not remotely exploitable.)" }, { "instruction": "what vulnarability does gevent version less then 1.2a1 have", "input": "", "output": "Having vulnarability PVE-2021-25837 Advisory: Gevent 1.2a1 no longer prints the entire WSGI environment by default for errors logged by :class:'~gevent.pywsgi.WSGIHandler'.\r\nhttps://github.com/gevent/gevent/pull/781", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gevent version less then 1.2a1 have ### Response: Having vulnarability PVE-2021-25837 Advisory: Gevent 1.2a1 no longer prints the entire WSGI environment by default for errors logged by :class:'~gevent.pywsgi.WSGIHandler'.\r\nhttps://github.com/gevent/gevent/pull/781" }, { "instruction": "what vulnarability does geventhttpclient version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-25838 Advisory: geventhttpclient 1.2.0 includes an undisclosed security fix related to SSL support.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geventhttpclient version less then 1.2.0 have ### Response: Having vulnarability PVE-2021-25838 Advisory: geventhttpclient 1.2.0 includes an undisclosed security fix related to SSL support." }, { "instruction": "what vulnarability does ggshield version less then 1.18.0 have", "input": "", "output": "Having vulnarability CVE-2023-3817 Advisory: Ggshield 1.18.0 updates its dependency 'cryptography' to version '41.0.3' to include a fix for a Denial of Service vulnerability.\r\nhttps://github.com/GitGuardian/ggshield/commit/3c67771a4d66accede14fa23dfce9ea51571e082", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ggshield version less then 1.18.0 have ### Response: Having vulnarability CVE-2023-3817 Advisory: Ggshield 1.18.0 updates its dependency 'cryptography' to version '41.0.3' to include a fix for a Denial of Service vulnerability.\r\nhttps://github.com/GitGuardian/ggshield/commit/3c67771a4d66accede14fa23dfce9ea51571e082" }, { "instruction": "what vulnarability does ghga-service-commons version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2023-29159 Advisory: Ghga-service-commons 0.4.1 updates its dependency 'fastapi' to v0.96.0 to include a security fix.\r\nhttps://github.com/ghga-de/ghga-service-commons/pull/12", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ghga-service-commons version less then 0.4.1 have ### Response: Having vulnarability CVE-2023-29159 Advisory: Ghga-service-commons 0.4.1 updates its dependency 'fastapi' to v0.96.0 to include a security fix.\r\nhttps://github.com/ghga-de/ghga-service-commons/pull/12" }, { "instruction": "what vulnarability does gibson version less then equal to 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2024-0959 Advisory: A vulnerability was found in StanfordVL GibsonEnv 0.3.1. It has been classified as critical. Affected is the function cloudpickle.load of the file gibson\\utils\\pposgd_fuse.py. The manipulation leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252204.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gibson version less then equal to 0.3.1 have ### Response: Having vulnarability CVE-2024-0959 Advisory: A vulnerability was found in StanfordVL GibsonEnv 0.3.1. It has been classified as critical. Affected is the function cloudpickle.load of the file gibson\\utils\\pposgd_fuse.py. The manipulation leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252204." }, { "instruction": "what vulnarability does gimpformats version less then 2021 have", "input": "", "output": "Having vulnarability CVE-2021-27923 Advisory: Gimpformats 2021 updates its dependency \"pillow\" to a version >= 8.1.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gimpformats version less then 2021 have ### Response: Having vulnarability CVE-2021-27923 Advisory: Gimpformats 2021 updates its dependency \"pillow\" to a version >= 8.1.1 to include security fixes." }, { "instruction": "what vulnarability does gino-quart version less then 0.1.1b2 have", "input": "", "output": "Having vulnarability CVE-2020-36242 Advisory: Gino-quart 0.1.1b2 updates 'cryptography' dependency to fix a security issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gino-quart version less then 0.1.1b2 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Gino-quart 0.1.1b2 updates 'cryptography' dependency to fix a security issue." }, { "instruction": "what vulnarability does giosgapps-bindings version less then 0.0.19 have", "input": "", "output": "Having vulnarability CVE-2019-14232 Advisory: Giosgapps-bindings 0.0.19 updates its dependency Django to v2.2.8 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does giosgapps-bindings version less then 0.0.19 have ### Response: Having vulnarability CVE-2019-14232 Advisory: Giosgapps-bindings 0.0.19 updates its dependency Django to v2.2.8 to include security fixes." }, { "instruction": "what vulnarability does girder version less then 1.3.3 have", "input": "", "output": "Having vulnarability PVE-2021-34631 Advisory: Girder 1.3.3 improves security of temporary access flow by expiring temp tokens and deleting them from the system.\r\nhttps://github.com/girder/girder/commit/269d4c1800ca64e27a720dee6e4937cbd7197637", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does girder version less then 1.3.3 have ### Response: Having vulnarability PVE-2021-34631 Advisory: Girder 1.3.3 improves security of temporary access flow by expiring temp tokens and deleting them from the system.\r\nhttps://github.com/girder/girder/commit/269d4c1800ca64e27a720dee6e4937cbd7197637" }, { "instruction": "what vulnarability does giskard version less then 2.0.0b25 have", "input": "", "output": "Having vulnarability PVE-2023-61784 Advisory: Giskard 2.0.0b25 secures Giskard readonly demo space at Hugging Face Space.\r\nhttps://github.com/Giskard-AI/giskard/pull/1355", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does giskard version less then 2.0.0b25 have ### Response: Having vulnarability PVE-2023-61784 Advisory: Giskard 2.0.0b25 secures Giskard readonly demo space at Hugging Face Space.\r\nhttps://github.com/Giskard-AI/giskard/pull/1355" }, { "instruction": "what vulnarability does git-batch version less then 2.0.16 have", "input": "", "output": "Having vulnarability CVE-2023-41040 Advisory: Git-batch 2.0.16 updates its dependency 'gitpython' to v3.1.35 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-batch version less then 2.0.16 have ### Response: Having vulnarability CVE-2023-41040 Advisory: Git-batch 2.0.16 updates its dependency 'gitpython' to v3.1.35 to include a security fix." }, { "instruction": "what vulnarability does git-big-picture version less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-3028 Advisory: git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code execution.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-big-picture version less then 1.0.0 have ### Response: Having vulnarability CVE-2021-3028 Advisory: git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code execution." }, { "instruction": "what vulnarability does git-cola version less then 4.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-48991 Advisory: Git-cola 4.0.0 fixes insecure usage of NamedTemporaryFile().\r\nhttps://github.com/git-cola/git-cola/pull/1209", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-cola version less then 4.0.0 have ### Response: Having vulnarability PVE-2022-48991 Advisory: Git-cola 4.0.0 fixes insecure usage of NamedTemporaryFile().\r\nhttps://github.com/git-cola/git-cola/pull/1209" }, { "instruction": "what vulnarability does git-portfolio version less then 0.10.1 have", "input": "", "output": "Having vulnarability PVE-2021-39510 Advisory: Git-portfolio 0.10.1 includes various security patches.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-portfolio version less then 0.10.1 have ### Response: Having vulnarability PVE-2021-39510 Advisory: Git-portfolio 0.10.1 includes various security patches." }, { "instruction": "what vulnarability does git-url-parse version less then equal to 1.2.2 have", "input": "", "output": "Having vulnarability CVE-2023-32758 Advisory: Giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-url-parse version less then equal to 1.2.2 have ### Response: Having vulnarability CVE-2023-32758 Advisory: Giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package." }, { "instruction": "what vulnarability does git-vuln-finder version less then 1.3 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Git-vuln-finder 1.3 updates its dependency 'urllib3' to v1.26.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-vuln-finder version less then 1.3 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Git-vuln-finder 1.3 updates its dependency 'urllib3' to v1.26.5 to include a security fix." }, { "instruction": "what vulnarability does gitfive version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2022-52058 Advisory: Gitfive 1.1.0 adds sanitization to avoid ANSI injection attacks.\r\nhttps://github.com/mxrch/GitFive/commit/6c0a5a6a57c1c0a04ecfd1b0938920f767ba082f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitfive version less then 1.1.0 have ### Response: Having vulnarability PVE-2022-52058 Advisory: Gitfive 1.1.0 adds sanitization to avoid ANSI injection attacks.\r\nhttps://github.com/mxrch/GitFive/commit/6c0a5a6a57c1c0a04ecfd1b0938920f767ba082f" }, { "instruction": "what vulnarability does github-changelog-md version less then 0.8.1 have", "input": "", "output": "Having vulnarability CVE-2024-22195 Advisory: Github-changelog-md version 0.8.1 has updated its jinja2 dependency from 3.1.2 to 3.1.3 to address the security issue identified as CVE-2024-22195.\r\nhttps://github.com/seapagan/github-changelog-md/commit/cccc57445478b949679782ffc6b8ac6f7710af0a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does github-changelog-md version less then 0.8.1 have ### Response: Having vulnarability CVE-2024-22195 Advisory: Github-changelog-md version 0.8.1 has updated its jinja2 dependency from 3.1.2 to 3.1.3 to address the security issue identified as CVE-2024-22195.\r\nhttps://github.com/seapagan/github-changelog-md/commit/cccc57445478b949679782ffc6b8ac6f7710af0a" }, { "instruction": "what vulnarability does github-rate-limits-exporter version less then 0.7.2 have", "input": "", "output": "Having vulnarability CVE-2023-0361 Advisory: Github-rate-limits-exporter 0.7.2 updates its dependency 'libgnutls30' to version '3.7.1-5+deb11u3' to include a security fix.\r\nhttps://github.com/theodore86/github-rate-limits-exporter/commit/44073972e4a8e1bc86f842e3b6d421eba80e2ff6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does github-rate-limits-exporter version less then 0.7.2 have ### Response: Having vulnarability CVE-2023-0361 Advisory: Github-rate-limits-exporter 0.7.2 updates its dependency 'libgnutls30' to version '3.7.1-5+deb11u3' to include a security fix.\r\nhttps://github.com/theodore86/github-rate-limits-exporter/commit/44073972e4a8e1bc86f842e3b6d421eba80e2ff6" }, { "instruction": "what vulnarability does githubkit version less then 0.9.4 have", "input": "", "output": "Having vulnarability CVE-2022-3786 Advisory: Githubkit 0.9.4 updates its dependency 'cryptography' to v38.0.3 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does githubkit version less then 0.9.4 have ### Response: Having vulnarability CVE-2022-3786 Advisory: Githubkit 0.9.4 updates its dependency 'cryptography' to v38.0.3 to include security fixes." }, { "instruction": "what vulnarability does gitlab-languages version less then 1.4.1 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Gitlab-languages 1.4.1 updates dependencies because of a security vulnerability in 'requests' <2.20.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitlab-languages version less then 1.4.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Gitlab-languages 1.4.1 updates dependencies because of a security vulnerability in 'requests' <2.20.0." }, { "instruction": "what vulnarability does gitlabform version less then 2.0.5 have", "input": "", "output": "Having vulnarability PVE-2021-40639 Advisory: Gitlabform 2.0.5 fixes potential security issue by enabling autoescaping when loading the 'Jinja' templates.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitlabform version less then 2.0.5 have ### Response: Having vulnarability PVE-2021-40639 Advisory: Gitlabform 2.0.5 fixes potential security issue by enabling autoescaping when loading the 'Jinja' templates." }, { "instruction": "what vulnarability does gitpython version less then 3.1.27 have", "input": "", "output": "Having vulnarability PVE-2022-52518 Advisory: Gitpython 3.1.27 includes a fix for a REDoS vulnerability.\r\nhttps://github.com/gitpython-developers/GitPython/commit/75f4f63ab3856a552f06082aabf98845b5fa21e3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitpython version less then 3.1.27 have ### Response: Having vulnarability PVE-2022-52518 Advisory: Gitpython 3.1.27 includes a fix for a REDoS vulnerability.\r\nhttps://github.com/gitpython-developers/GitPython/commit/75f4f63ab3856a552f06082aabf98845b5fa21e3" }, { "instruction": "what vulnarability does gitsup version less then 0.4.0 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Gitsup 0.4.0 updates its dependency 'urllib3' to v1.26.8 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitsup version less then 0.4.0 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Gitsup 0.4.0 updates its dependency 'urllib3' to v1.26.8 to include a security fix." }, { "instruction": "what vulnarability does glance version less then 11.0.1,equal to 12.0.0 have", "input": "", "output": "Having vulnarability CVE-2015-5162 Advisory: The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glance version less then 11.0.1,equal to 12.0.0 have ### Response: Having vulnarability CVE-2015-5162 Advisory: The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image." }, { "instruction": "what vulnarability does glance-store version greather then equal to 0 have", "input": "", "output": "Having vulnarability CVE-2024-1141 Advisory: A vulnerability was found in python-glance-store. The issue occurs when the package logs the access_key for the glance-store when the DEBUG log level is enabled. See CVE-2024-1141.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glance-store version greather then equal to 0 have ### Response: Having vulnarability CVE-2024-1141 Advisory: A vulnerability was found in python-glance-store. The issue occurs when the package logs the access_key for the glance-store when the DEBUG log level is enabled. See CVE-2024-1141." }, { "instruction": "what vulnarability does glance_store version less then 3.0.1,greather then equal to 4.0.0,less then 4.1.1,greather then equal to 4.2.0,less then 4.3.1 have", "input": "", "output": "Having vulnarability CVE-2023-2088 Advisory: Glance_store 4.4.0, 4.3.1, 4.1.1 and 3.0.1 raise the minimum version of 'os-brick' to include the fix for CVE-2023-2088.\r\nhttps://opendev.org/openstack/glance_store/commit/ce86bf38239e3962db880bc9bfbaa9f6364a2d14", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glance_store version less then 3.0.1,greather then equal to 4.0.0,less then 4.1.1,greather then equal to 4.2.0,less then 4.3.1 have ### Response: Having vulnarability CVE-2023-2088 Advisory: Glance_store 4.4.0, 4.3.1, 4.1.1 and 3.0.1 raise the minimum version of 'os-brick' to include the fix for CVE-2023-2088.\r\nhttps://opendev.org/openstack/glance_store/commit/ce86bf38239e3962db880bc9bfbaa9f6364a2d14" }, { "instruction": "what vulnarability does glances version less then 3.2.0 have", "input": "", "output": "Having vulnarability CVE-2021-23337 Advisory: Glances 3.2.0 updates its NPM dependency 'lodash' to fixes a potential command injection vulnerability.\r\nhttps://github.com/nicolargo/glances/commit/0448e3432f5d48185d4c9e2ecff8b801fcfabb9e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glances version less then 3.2.0 have ### Response: Having vulnarability CVE-2021-23337 Advisory: Glances 3.2.0 updates its NPM dependency 'lodash' to fixes a potential command injection vulnerability.\r\nhttps://github.com/nicolargo/glances/commit/0448e3432f5d48185d4c9e2ecff8b801fcfabb9e" }, { "instruction": "what vulnarability does glances-api version less then 0.3.6 have", "input": "", "output": "Having vulnarability CVE-2021-41945 Advisory: Glances-api 0.3.6 updates its httpx dependency from \">=0.22,<1\" to \">=0.23,<1\". This modification is in response to CVE-2021-41945, a known security vulnerability.\r\nhttps://github.com/home-assistant-ecosystem/python-glances-api/commit/2abd37bca2547875efe7471ea6c2d2889412a552", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glances-api version less then 0.3.6 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Glances-api 0.3.6 updates its httpx dependency from \">=0.22,<1\" to \">=0.23,<1\". This modification is in response to CVE-2021-41945, a known security vulnerability.\r\nhttps://github.com/home-assistant-ecosystem/python-glances-api/commit/2abd37bca2547875efe7471ea6c2d2889412a552" }, { "instruction": "what vulnarability does global-workqueue version greather then equal to 1.4.1rc5,less then 2.0.4 have", "input": "", "output": "Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does global-workqueue version greather then equal to 1.4.1rc5,less then 2.0.4 have ### Response: Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package." }, { "instruction": "what vulnarability does globox version less then 2.4.1 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Globox 2.4.1 updates its dependency 'pillow' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does globox version less then 2.4.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Globox 2.4.1 updates its dependency 'pillow' to include a security fix." }, { "instruction": "what vulnarability does globus-action-provider-tools version less then 0.11.2 have", "input": "", "output": "Having vulnarability CVE-2021-29510 Advisory: Globus-action-provider-tools 0.11.2 updates its Pydantic library version to address the security issue identified as CVE-2021-29510.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does globus-action-provider-tools version less then 0.11.2 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Globus-action-provider-tools 0.11.2 updates its Pydantic library version to address the security issue identified as CVE-2021-29510." }, { "instruction": "what vulnarability does globus-automate-client version less then 0.15.0 have", "input": "", "output": "Having vulnarability PVE-2022-47833 Advisory: Globus-automate-client 0.15.0 updates its dependency 'click' to v8.0.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does globus-automate-client version less then 0.15.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Globus-automate-client 0.15.0 updates its dependency 'click' to v8.0.4 to include a security fix." }, { "instruction": "what vulnarability does glooey version less then 0.3.5 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Glooey 0.3.5 includes a security patch for the function 'yaml' in 'glooey/themes/helpers.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/kxgames/glooey/commit/9178939df55a44dcf0a890aec0aceef2f4989947", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glooey version less then 0.3.5 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Glooey 0.3.5 includes a security patch for the function 'yaml' in 'glooey/themes/helpers.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/kxgames/glooey/commit/9178939df55a44dcf0a890aec0aceef2f4989947" }, { "instruction": "what vulnarability does glovo-api-python version less then 2.0.0 have", "input": "", "output": "Having vulnarability CVE-2020-7212 Advisory: Glovo-api-python 2.0.0 updates its dependency 'urllib3' to v1.25.9 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glovo-api-python version less then 2.0.0 have ### Response: Having vulnarability CVE-2020-7212 Advisory: Glovo-api-python 2.0.0 updates its dependency 'urllib3' to v1.25.9 to include security fixes." }, { "instruction": "what vulnarability does gnoll version less then 2.12.0 have", "input": "", "output": "Having vulnarability PVE-2022-51464 Advisory: Gnoll 2.12.0 starts using PCG for securer and more statistically consistent randomness.\r\nhttps://github.com/ianfhunter/GNOLL/pull/295", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gnoll version less then 2.12.0 have ### Response: Having vulnarability PVE-2022-51464 Advisory: Gnoll 2.12.0 starts using PCG for securer and more statistically consistent randomness.\r\nhttps://github.com/ianfhunter/GNOLL/pull/295" }, { "instruction": "what vulnarability does gns3-gui version less then 1.5.1 have", "input": "", "output": "Having vulnarability PVE-2021-25839 Advisory: Gns3-gui 1.5.1 prevents clients sending empty hostnames that could lead to bypassing an access control.\r\nhttps://github.com/GNS3/gns3-gui/commit/939f8f52c187ca95fa71be7deb3a4a86bdc2e761", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gns3-gui version less then 1.5.1 have ### Response: Having vulnarability PVE-2021-25839 Advisory: Gns3-gui 1.5.1 prevents clients sending empty hostnames that could lead to bypassing an access control.\r\nhttps://github.com/GNS3/gns3-gui/commit/939f8f52c187ca95fa71be7deb3a4a86bdc2e761" }, { "instruction": "what vulnarability does gns3-server version less then 1.2.3 have", "input": "", "output": "Having vulnarability CVE-2015-2667 Advisory: Untrusted search path vulnerability in GNS3 1.2.3 allows local users to gain privileges via a Trojan horse uuid.dll in an unspecified directory.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gns3-server version less then 1.2.3 have ### Response: Having vulnarability CVE-2015-2667 Advisory: Untrusted search path vulnerability in GNS3 1.2.3 allows local users to gain privileges via a Trojan horse uuid.dll in an unspecified directory." }, { "instruction": "what vulnarability does gnss-lib-py version less then 0.1.9 have", "input": "", "output": "Having vulnarability CVE-2023-24816 Advisory: Gnss-lib-py 0.1.9 updates its dependency 'ipython' to v8.12.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gnss-lib-py version less then 0.1.9 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Gnss-lib-py 0.1.9 updates its dependency 'ipython' to v8.12.0 to include a security fix." }, { "instruction": "what vulnarability does gocept-month version less then 2.2 have", "input": "", "output": "Having vulnarability PVE-2021-40231 Advisory: Gocept.month 2.2 adds a missing security declaration needed for the '.browser.widget.MonthWidget', the month widget for 'z3c.form'.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gocept-month version less then 2.2 have ### Response: Having vulnarability PVE-2021-40231 Advisory: Gocept.month 2.2 adds a missing security declaration needed for the '.browser.widget.MonthWidget', the month widget for 'z3c.form'." }, { "instruction": "what vulnarability does goharbor version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-36776 Advisory: Goharbor 1.1.0 fixes security issues in the token service.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does goharbor version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-36776 Advisory: Goharbor 1.1.0 fixes security issues in the token service." }, { "instruction": "what vulnarability does google-ads version less then 0.5.2 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: The Google-ads version 0.5.2 updates its PyYAML dependency, shifting from the previous range of >= 3.11, < 4.0 to the new range of >= 4.2b1, < 5.0, as a measure to address the security vulnerability detailed in CVE-2017-18342.\r\nhttps://github.com/googleads/google-ads-python/commit/f47be2a5f9ec920d72a57a78a003dd0493bd0065", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does google-ads version less then 0.5.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: The Google-ads version 0.5.2 updates its PyYAML dependency, shifting from the previous range of >= 3.11, < 4.0 to the new range of >= 4.2b1, < 5.0, as a measure to address the security vulnerability detailed in CVE-2017-18342.\r\nhttps://github.com/googleads/google-ads-python/commit/f47be2a5f9ec920d72a57a78a003dd0493bd0065" }, { "instruction": "what vulnarability does google-appengine version less then 1.5.4 have", "input": "", "output": "Having vulnarability CVE-2011-4211 Advisory: The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly control the opening of files, which allows local users to bypass intended access restrictions and create arbitrary files via ALLOWED_MODES and ALLOWED_DIRS changes within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does google-appengine version less then 1.5.4 have ### Response: Having vulnarability CVE-2011-4211 Advisory: The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly control the opening of files, which allows local users to bypass intended access restrictions and create arbitrary files via ALLOWED_MODES and ALLOWED_DIRS changes within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364." }, { "instruction": "what vulnarability does google-compute-engine version less then 1.3.3 have", "input": "", "output": "Having vulnarability PVE-2017-47160 Advisory: Google-compute-engine 1.3.3 improves security for temporary key location.\r\nhttps://github.com/GoogleCloudPlatform/compute-image-packages/commit/f02348bbfefdcfcf55f2829c6a5ca0725a176d99", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does google-compute-engine version less then 1.3.3 have ### Response: Having vulnarability PVE-2017-47160 Advisory: Google-compute-engine 1.3.3 improves security for temporary key location.\r\nhttps://github.com/GoogleCloudPlatform/compute-image-packages/commit/f02348bbfefdcfcf55f2829c6a5ca0725a176d99" }, { "instruction": "what vulnarability does google-images-search version less then 1.3.8 have", "input": "", "output": "Having vulnarability CVE-2021-25290 Advisory: Google-images-search 1.3.8 updates its dependency 'Pillow' to version 8.1.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does google-images-search version less then 1.3.8 have ### Response: Having vulnarability CVE-2021-25290 Advisory: Google-images-search 1.3.8 updates its dependency 'Pillow' to version 8.1.1 to include security fixes." }, { "instruction": "what vulnarability does gordo version less then 0.15.1 have", "input": "", "output": "Having vulnarability CVE-2019-11324 Advisory: Gordo 0.15.1 updates its dependency 'urllib3' requirement to \">= 1.24.2\" to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gordo version less then 0.15.1 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Gordo 0.15.1 updates its dependency 'urllib3' requirement to \">= 1.24.2\" to include a security fix." }, { "instruction": "what vulnarability does gordo-client version less then 6.2.2 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Gordo-client 6.2.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/equinor/gordo-client/pull/89", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gordo-client version less then 6.2.2 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Gordo-client 6.2.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/equinor/gordo-client/pull/89" }, { "instruction": "what vulnarability does gordo-components version less then 0.15.1 have", "input": "", "output": "Having vulnarability CVE-2019-11324 Advisory: Gordo-components 0.15.1 updates its dependency 'urllib3' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gordo-components version less then 0.15.1 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Gordo-components 0.15.1 updates its dependency 'urllib3' to include a security fix." }, { "instruction": "what vulnarability does gordo-core version less then 0.3.2 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Gordo-core 0.3.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/equinor/gordo-core/pull/27", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gordo-core version less then 0.3.2 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Gordo-core 0.3.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/equinor/gordo-core/pull/27" }, { "instruction": "what vulnarability does gphoto2 version greather then equal to 2.3.0,less then equal to 2.4.0 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Gphoto2 2.3.0 throughout 2.4.0 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.\r\nhttps://inspector.pypi.io/project/gphoto2/2.4.0/packages/98/87/05136be73bcb763156fef792751360640d060a6611ac163d8febdf2010c7/gphoto2-2.4.0-cp310-cp310-macosx_10_9_x86_64.whl", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gphoto2 version greather then equal to 2.3.0,less then equal to 2.4.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Gphoto2 2.3.0 throughout 2.4.0 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.\r\nhttps://inspector.pypi.io/project/gphoto2/2.4.0/packages/98/87/05136be73bcb763156fef792751360640d060a6611ac163d8febdf2010c7/gphoto2-2.4.0-cp310-cp310-macosx_10_9_x86_64.whl" }, { "instruction": "what vulnarability does gphotos-sync version less then 2.9 have", "input": "", "output": "Having vulnarability CVE-2019-11324 Advisory: Gphotos-sync 2.9 updates its dependency 'urllib3' to v1.25.3 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gphotos-sync version less then 2.9 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Gphotos-sync 2.9 updates its dependency 'urllib3' to v1.25.3 to include security fixes." }, { "instruction": "what vulnarability does gpmf version less then 1.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-38566 Advisory: Gpmf 1.2.2 addresses OOB attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gpmf version less then 1.2.2 have ### Response: Having vulnarability PVE-2021-38566 Advisory: Gpmf 1.2.2 addresses OOB attacks." }, { "instruction": "what vulnarability does gps-time version less then 2.8.6 have", "input": "", "output": "Having vulnarability CVE-2020-26247 Advisory: Gps-time 2.8.6 updates its Ruby dependency 'nokogiri' to v1.11.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gps-time version less then 2.8.6 have ### Response: Having vulnarability CVE-2020-26247 Advisory: Gps-time 2.8.6 updates its Ruby dependency 'nokogiri' to v1.11.0 to include a security fix." }, { "instruction": "what vulnarability does gpyg version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2024-67021 Advisory: Gpyg version 0.3.0 resolves the issue with unquoted strings by ensuring user inputs are correctly quoted.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gpyg version less then 0.3.0 have ### Response: Having vulnarability PVE-2024-67021 Advisory: Gpyg version 0.3.0 resolves the issue with unquoted strings by ensuring user inputs are correctly quoted." }, { "instruction": "what vulnarability does gradio version less then 2.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-43619 Advisory: Gradio 2.6.0 fixes arbitrary file read vulnerabilities.\r\nhttps://github.com/gradio-app/gradio/pull/406", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gradio version less then 2.6.0 have ### Response: Having vulnarability PVE-2021-43619 Advisory: Gradio 2.6.0 fixes arbitrary file read vulnerabilities.\r\nhttps://github.com/gradio-app/gradio/pull/406" }, { "instruction": "what vulnarability does grafana-dashboard-builder version less then 0.6.0a1 have", "input": "", "output": "Having vulnarability PVE-2021-38648 Advisory: Grafana-dashboard-builder 0.6.0a1 fixes a pyyaml security issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grafana-dashboard-builder version less then 0.6.0a1 have ### Response: Having vulnarability PVE-2021-38648 Advisory: Grafana-dashboard-builder 0.6.0a1 fixes a pyyaml security issue." }, { "instruction": "what vulnarability does grafana-django-saml2-auth version less then 2.1.0 have", "input": "", "output": "Having vulnarability PVE-2022-48393 Advisory: Grafana-django-saml2-auth 2.1.0 fixes an open redirect vulnerability in the login flow.\r\nhttps://github.com/grafana/django-saml2-auth/commit/572375fe50048a4b48348b9ce17cb2a512bef8d5", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grafana-django-saml2-auth version less then 2.1.0 have ### Response: Having vulnarability PVE-2022-48393 Advisory: Grafana-django-saml2-auth 2.1.0 fixes an open redirect vulnerability in the login flow.\r\nhttps://github.com/grafana/django-saml2-auth/commit/572375fe50048a4b48348b9ce17cb2a512bef8d5" }, { "instruction": "what vulnarability does gramaddict version greather then equal to 0,less then 1.2.4 have", "input": "", "output": "Having vulnarability CVE-2020-36245 Advisory: GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gramaddict version greather then equal to 0,less then 1.2.4 have ### Response: Having vulnarability CVE-2020-36245 Advisory: GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network." }, { "instruction": "what vulnarability does granary version less then 6.1 have", "input": "", "output": "Having vulnarability PVE-2023-61270 Advisory: Granary 6.1 includes a fix for a potential XSS in https://brid.gy service.\r\nhttps://github.com/snarfed/bridgy/security/advisories/GHSA-4w4f-g49g-3f7j", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does granary version less then 6.1 have ### Response: Having vulnarability PVE-2023-61270 Advisory: Granary 6.1 includes a fix for a potential XSS in https://brid.gy service.\r\nhttps://github.com/snarfed/bridgy/security/advisories/GHSA-4w4f-g49g-3f7j" }, { "instruction": "what vulnarability does graph-notebook version less then 3.0.5 have", "input": "", "output": "Having vulnarability PVE-2021-41231 Advisory: Graph-notebook 3.0.5 includes an upgrade of a Jupyter Notebook dependency for a security fix. \r\nhttps://github.com/aws/graph-notebook/pull/182", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graph-notebook version less then 3.0.5 have ### Response: Having vulnarability PVE-2021-41231 Advisory: Graph-notebook 3.0.5 includes an upgrade of a Jupyter Notebook dependency for a security fix. \r\nhttps://github.com/aws/graph-notebook/pull/182" }, { "instruction": "what vulnarability does graphene-django version less then 3.0.1 have", "input": "", "output": "Having vulnarability CVE-2021-41248 Advisory: Graphene-django 3.0.1 updates its NPM dependency 'graphiql' to v1.4.7 to fix a potential vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphene-django version less then 3.0.1 have ### Response: Having vulnarability CVE-2021-41248 Advisory: Graphene-django 3.0.1 updates its NPM dependency 'graphiql' to v1.4.7 to fix a potential vulnerability." }, { "instruction": "what vulnarability does graphenelib version less then 0.6.1 have", "input": "", "output": "Having vulnarability PVE-2023-62447 Advisory: Graphenelib 0.6.1 includes a security fix: Certificate validation is disabled for wss urls.\r\nhttps://github.com/xeroc/python-graphenelib/issues/60", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphenelib version less then 0.6.1 have ### Response: Having vulnarability PVE-2023-62447 Advisory: Graphenelib 0.6.1 includes a security fix: Certificate validation is disabled for wss urls.\r\nhttps://github.com/xeroc/python-graphenelib/issues/60" }, { "instruction": "what vulnarability does graphite-web version less then 1.1.8 have", "input": "", "output": "Having vulnarability PVE-2021-40227 Advisory: Graphite-web 1.1.8 prevents cross-site scripting.\r\nhttps://github.com/graphite-project/graphite-web/pull/2620", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphite-web version less then 1.1.8 have ### Response: Having vulnarability PVE-2021-40227 Advisory: Graphite-web 1.1.8 prevents cross-site scripting.\r\nhttps://github.com/graphite-project/graphite-web/pull/2620" }, { "instruction": "what vulnarability does graphrepo version less then 0.1.8 have", "input": "", "output": "Having vulnarability CVE-2020-1747 Advisory: Graphrepo 0.1.8 updates its dependency 'pyyaml' to v5.3.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphrepo version less then 0.1.8 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Graphrepo 0.1.8 updates its dependency 'pyyaml' to v5.3.1 to include a security fix." }, { "instruction": "what vulnarability does graphscope version less then 0.7.0 have", "input": "", "output": "Having vulnarability CVE-2018-8088 Advisory: Graphscope 0.7.0 updates its dependency 'SLF4J' to v1.7.31 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphscope version less then 0.7.0 have ### Response: Having vulnarability CVE-2018-8088 Advisory: Graphscope 0.7.0 updates its dependency 'SLF4J' to v1.7.31 to include a security fix." }, { "instruction": "what vulnarability does gretel-client version less then 0.16.2 have", "input": "", "output": "Having vulnarability CVE-2021-33503 Advisory: Gretel-client 0.16.2 updates its dependency 'urllib3' requirement to '>=1.26.5' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gretel-client version less then 0.16.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Gretel-client 0.16.2 updates its dependency 'urllib3' requirement to '>=1.26.5' to include a security fix." }, { "instruction": "what vulnarability does griptape version less then 0.18.0 have", "input": "", "output": "Having vulnarability PVE-2023-61648 Advisory: Griptape 0.18.0 includes a fix for a prompt injection vulnerability.\r\nhttps://github.com/griptape-ai/griptape/issues/280", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does griptape version less then 0.18.0 have ### Response: Having vulnarability PVE-2023-61648 Advisory: Griptape 0.18.0 includes a fix for a prompt injection vulnerability.\r\nhttps://github.com/griptape-ai/griptape/issues/280" }, { "instruction": "what vulnarability does grooveshop-django-api version less then 0.44.3 have", "input": "", "output": "Having vulnarability PVE-2023-62368 Advisory: Grooveshop-django-api 0.44.3 include a fix for an unsafe defaults vulnerability in config file.\r\nhttps://github.com/vasilistotskas/grooveshop-django-api/commit/fe64d9814f90cc86ea1a52656d689512d4e60a31", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grooveshop-django-api version less then 0.44.3 have ### Response: Having vulnarability PVE-2023-62368 Advisory: Grooveshop-django-api 0.44.3 include a fix for an unsafe defaults vulnerability in config file.\r\nhttps://github.com/vasilistotskas/grooveshop-django-api/commit/fe64d9814f90cc86ea1a52656d689512d4e60a31" }, { "instruction": "what vulnarability does grpcio version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2017-7860 Advisory: Grpcio 1.2.0 includes a fix for CVE-2017-7860: Google gRPC before 2017-02-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the parse_unix function in core/ext/client_channel/parse_address.c.\r\nhttps://github.com/grpc/grpc/pull/9833/commits/bcd5f12e4bca2ed2c00cddb5ffd046aef6f4fb31", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grpcio version less then 1.2.0 have ### Response: Having vulnarability CVE-2017-7860 Advisory: Grpcio 1.2.0 includes a fix for CVE-2017-7860: Google gRPC before 2017-02-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the parse_unix function in core/ext/client_channel/parse_address.c.\r\nhttps://github.com/grpc/grpc/pull/9833/commits/bcd5f12e4bca2ed2c00cddb5ffd046aef6f4fb31" }, { "instruction": "what vulnarability does grpcio-tools version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2017-7861 Advisory: Grpcio-tools 1.2.0 depends on 'grpcio' v1.2.0, which includes security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grpcio-tools version less then 1.2.0 have ### Response: Having vulnarability CVE-2017-7861 Advisory: Grpcio-tools 1.2.0 depends on 'grpcio' v1.2.0, which includes security fixes." }, { "instruction": "what vulnarability does gseapy version less then 0.10.5 have", "input": "", "output": "Having vulnarability PVE-2021-41066 Advisory: Gseapy 0.10.5 fixes 'InsecureRequestWarning'.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gseapy version less then 0.10.5 have ### Response: Having vulnarability PVE-2021-41066 Advisory: Gseapy 0.10.5 fixes 'InsecureRequestWarning'." }, { "instruction": "what vulnarability does gsutil version less then 3.41 have", "input": "", "output": "Having vulnarability PVE-2021-27541 Advisory: Gsutil 3.41 includes changes to protect the security of resumable upload IDs.\r\nhttps://github.com/GoogleCloudPlatform/gsutil/commit/43cf0087b97c889d8e3eca67499ac2e887a6726a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gsutil version less then 3.41 have ### Response: Having vulnarability PVE-2021-27541 Advisory: Gsutil 3.41 includes changes to protect the security of resumable upload IDs.\r\nhttps://github.com/GoogleCloudPlatform/gsutil/commit/43cf0087b97c889d8e3eca67499ac2e887a6726a" }, { "instruction": "what vulnarability does guake version less then 3.8.5 have", "input": "", "output": "Having vulnarability CVE-2021-23556 Advisory: Guake 3.8.5 includes a fix for CVE-2021-23556: The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.\r\nhttps://github.com/Guake/guake/issues/1796", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does guake version less then 3.8.5 have ### Response: Having vulnarability CVE-2021-23556 Advisory: Guake 3.8.5 includes a fix for CVE-2021-23556: The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.\r\nhttps://github.com/Guake/guake/issues/1796" }, { "instruction": "what vulnarability does guarddog version less then 0.1.5 have", "input": "", "output": "Having vulnarability PVE-2022-52100 Advisory: Guarddog 0.1.5 uses 'tarsafe' instead of built-in 'tarfile' to extract archives, to fix an arbitrary file write vulnerability when scanning a specially-crafted PyPI packages.\r\nhttps://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does guarddog version less then 0.1.5 have ### Response: Having vulnarability PVE-2022-52100 Advisory: Guarddog 0.1.5 uses 'tarsafe' instead of built-in 'tarfile' to extract archives, to fix an arbitrary file write vulnerability when scanning a specially-crafted PyPI packages.\r\nhttps://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq" }, { "instruction": "what vulnarability does guillotina version less then 4.5.8 have", "input": "", "output": "Having vulnarability PVE-2021-36961 Advisory: guillotina 4.5.8 fixes memory leak in security policy lookups", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does guillotina version less then 4.5.8 have ### Response: Having vulnarability PVE-2021-36961 Advisory: guillotina 4.5.8 fixes memory leak in security policy lookups" }, { "instruction": "what vulnarability does guillotina-dynamictablestorage version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-40218 Advisory: guillotina-dynamictablestorage 1.1.0 fixes a possible sql injection.\r\nhttps://github.com/guillotinaweb/guillotina_dynamictablestorage/commit/8f3c94147ab8b834f6cbfda1c2540b75124cfdf9", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does guillotina-dynamictablestorage version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-40218 Advisory: guillotina-dynamictablestorage 1.1.0 fixes a possible sql injection.\r\nhttps://github.com/guillotinaweb/guillotina_dynamictablestorage/commit/8f3c94147ab8b834f6cbfda1c2540b75124cfdf9" }, { "instruction": "what vulnarability does gunicorn version less then 19.10.0,greather then equal to 20.0.0,less then 20.0.1 have", "input": "", "output": "Having vulnarability PVE-2021-40104 Advisory: Gunicorn 20.0.1 fixes chunked encoding support to prevent http request smuggling attacks.\r\nhttps://github.com/benoitc/gunicorn/issues/2176\r\nhttps://github.com/p4k03n4t0r/http-request-smuggling#request-smuggling-using-mitmproxy-and-gunicorn", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gunicorn version less then 19.10.0,greather then equal to 20.0.0,less then 20.0.1 have ### Response: Having vulnarability PVE-2021-40104 Advisory: Gunicorn 20.0.1 fixes chunked encoding support to prevent http request smuggling attacks.\r\nhttps://github.com/benoitc/gunicorn/issues/2176\r\nhttps://github.com/p4k03n4t0r/http-request-smuggling#request-smuggling-using-mitmproxy-and-gunicorn" }, { "instruction": "what vulnarability does gvar version less then 9.2.1 have", "input": "", "output": "Having vulnarability PVE-2021-37809 Advisory: Gvar 9.2.1 fixes bugs in gvar.load and gvar.dump caused by recent security upgrades to pyYAML.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gvar version less then 9.2.1 have ### Response: Having vulnarability PVE-2021-37809 Advisory: Gvar 9.2.1 fixes bugs in gvar.load and gvar.dump caused by recent security upgrades to pyYAML." }, { "instruction": "what vulnarability does gvsbuild version less then 2022.6.0 have", "input": "", "output": "Having vulnarability CVE-2022-3970 Advisory: Gvsbuild 2022.6.0 includes a fix for CVE-2022-3970, an integer overflow critical vulnerability affecting a C dependency (Libtiff).\r\nhttps://github.com/wingtk/gvsbuild/pull/744/commits/652f23e9ef52bac8eb9bfad179f8b68ee90be08b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gvsbuild version less then 2022.6.0 have ### Response: Having vulnarability CVE-2022-3970 Advisory: Gvsbuild 2022.6.0 includes a fix for CVE-2022-3970, an integer overflow critical vulnerability affecting a C dependency (Libtiff).\r\nhttps://github.com/wingtk/gvsbuild/pull/744/commits/652f23e9ef52bac8eb9bfad179f8b68ee90be08b" }, { "instruction": "what vulnarability does gyver version less then 2.8.3 have", "input": "", "output": "Having vulnarability CVE-2023-38325 Advisory: Gyver 2.8.3 updates its dependency 'cryptography' to versions ^41.0.4 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gyver version less then 2.8.3 have ### Response: Having vulnarability CVE-2023-38325 Advisory: Gyver 2.8.3 updates its dependency 'cryptography' to versions ^41.0.4 to include security fixes." }, { "instruction": "what vulnarability does h2o version less then 3.34.0.7 have", "input": "", "output": "Having vulnarability CVE-2021-45046 Advisory: H2o 3.34.0.7 updates its dependency 'log4j' to v2.17.0 to fix critical and severe vulnerabilities.\r\nhttps://github.com/h2oai/h2o-3/commit/85dc8a3fdbfef002919d15764b1ad99b3c39f851", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does h2o version less then 3.34.0.7 have ### Response: Having vulnarability CVE-2021-45046 Advisory: H2o 3.34.0.7 updates its dependency 'log4j' to v2.17.0 to fix critical and severe vulnerabilities.\r\nhttps://github.com/h2oai/h2o-3/commit/85dc8a3fdbfef002919d15764b1ad99b3c39f851" }, { "instruction": "what vulnarability does hail version less then 0.2.127 have", "input": "", "output": "Having vulnarability CVE-2023-51663 Advisory: Hail, a Python-based data analysis tool, uses OpenID Connect (OIDC) email addresses to verify user domains. However, users can change their email addresses, potentially gaining unauthorized access to resources. For instance, a user could create a Microsoft or Google account, change their email to test@example.org, and then create a Hail Batch account in clusters under the example.org domain. While they can't access private data or impersonate others, they can run jobs and create Azure Tenants if they have the necessary access. \r\nhttps://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hail version less then 0.2.127 have ### Response: Having vulnarability CVE-2023-51663 Advisory: Hail, a Python-based data analysis tool, uses OpenID Connect (OIDC) email addresses to verify user domains. However, users can change their email addresses, potentially gaining unauthorized access to resources. For instance, a user could create a Microsoft or Google account, change their email to test@example.org, and then create a Hail Batch account in clusters under the example.org domain. While they can't access private data or impersonate others, they can run jobs and create Azure Tenants if they have the necessary access. \r\nhttps://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw" }, { "instruction": "what vulnarability does handprint version less then 1.5.0 have", "input": "", "output": "Having vulnarability CVE-2020-26137 Advisory: Handprint 1.5.0 updates its dependency 'urllib3' to v1.26.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does handprint version less then 1.5.0 have ### Response: Having vulnarability CVE-2020-26137 Advisory: Handprint 1.5.0 updates its dependency 'urllib3' to v1.26.5 to include a security fix." }, { "instruction": "what vulnarability does hardeneks version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Hardeneks 0.4.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hardeneks version less then 0.4.1 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Hardeneks 0.4.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix." }, { "instruction": "what vulnarability does hardline version less then 0.12 have", "input": "", "output": "Having vulnarability PVE-2021-39435 Advisory: Hardline 0.12 contains privacy enchantments for hashID domain names.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hardline version less then 0.12 have ### Response: Having vulnarability PVE-2021-39435 Advisory: Hardline 0.12 contains privacy enchantments for hashID domain names." }, { "instruction": "what vulnarability does hashers version less then 0.2.11 have", "input": "", "output": "Having vulnarability PVE-2021-39643 Advisory: Hashers 0.2.11 adds protection against time-attacks on string comparisons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hashers version less then 0.2.11 have ### Response: Having vulnarability PVE-2021-39643 Advisory: Hashers 0.2.11 adds protection against time-attacks on string comparisons." }, { "instruction": "what vulnarability does hassmart-homeassistant version less then 0.67.0 have", "input": "", "output": "Having vulnarability CVE-2018-21019 Advisory: Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hassmart-homeassistant version less then 0.67.0 have ### Response: Having vulnarability CVE-2018-21019 Advisory: Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py." }, { "instruction": "what vulnarability does hazen version less then 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2021-23727 Advisory: Hazen 1.0.1 removes its dependency 'celery', preventing a security issue.\r\nhttps://github.com/GSTT-CSC/hazen/pull/253", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hazen version less then 1.0.1 have ### Response: Having vulnarability CVE-2021-23727 Advisory: Hazen 1.0.1 removes its dependency 'celery', preventing a security issue.\r\nhttps://github.com/GSTT-CSC/hazen/pull/253" }, { "instruction": "what vulnarability does hdrhistogram version less then 0.10.0 have", "input": "", "output": "Having vulnarability CVE-2022-40899 Advisory: Hdrhistogram 0.10.0 removes its dependency 'future' to avoid a vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hdrhistogram version less then 0.10.0 have ### Response: Having vulnarability CVE-2022-40899 Advisory: Hdrhistogram 0.10.0 removes its dependency 'future' to avoid a vulnerability." }, { "instruction": "what vulnarability does healpy version less then equal to 1.16.6 have", "input": "", "output": "Having vulnarability CVE-2023-38545 Advisory: Healpy 1.16.6 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does healpy version less then equal to 1.16.6 have ### Response: Having vulnarability CVE-2023-38545 Advisory: Healpy 1.16.6 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability." }, { "instruction": "what vulnarability does heat version less then equal to 5.0.3,greather then equal to 6.0.0,less then equal to 6.1.0,less then equal to 7.0.0 have", "input": "", "output": "Having vulnarability CVE-2016-9185 Advisory: In OpenStack Heat, by launching a new Heat stack with a local URL an authenticated user may conduct network discovery revealing internal network configuration. Affected versions are <=5.0.3, >=6.0.0 <=6.1.0, and ==7.0.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does heat version less then equal to 5.0.3,greather then equal to 6.0.0,less then equal to 6.1.0,less then equal to 7.0.0 have ### Response: Having vulnarability CVE-2016-9185 Advisory: In OpenStack Heat, by launching a new Heat stack with a local URL an authenticated user may conduct network discovery revealing internal network configuration. Affected versions are <=5.0.3, >=6.0.0 <=6.1.0, and ==7.0.0." }, { "instruction": "what vulnarability does heedy version less then 0.3.0a1 have", "input": "", "output": "Having vulnarability PVE-2021-37687 Advisory: Heedy 0.3.0a1 reports it its changelog: There might [...] be security issues. Use at your own risk.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does heedy version less then 0.3.0a1 have ### Response: Having vulnarability PVE-2021-37687 Advisory: Heedy 0.3.0a1 reports it its changelog: There might [...] be security issues. Use at your own risk." }, { "instruction": "what vulnarability does hello-world-exampl version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51741 Advisory: Hello-world-exampl is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hello-world-exampl version greather then 0 have ### Response: Having vulnarability PVE-2022-51741 Advisory: Hello-world-exampl is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does hello-world-example version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51742 Advisory: Hello-world-example is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hello-world-example version greather then 0 have ### Response: Having vulnarability PVE-2022-51742 Advisory: Hello-world-example is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does help-tokens version less then 1.0.4 have", "input": "", "output": "Having vulnarability PVE-2024-67010 Advisory: Help-tokens 1.0.4 has updated its Jinja2 requirement from version 2.9.6 to 2.10.1 to address a known security vulnerability found in previous versions, as identified by CVE-2019-10906.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does help-tokens version less then 1.0.4 have ### Response: Having vulnarability PVE-2024-67010 Advisory: Help-tokens 1.0.4 has updated its Jinja2 requirement from version 2.9.6 to 2.10.1 to address a known security vulnerability found in previous versions, as identified by CVE-2019-10906." }, { "instruction": "what vulnarability does henosis version less then 0.0.11 have", "input": "", "output": "Having vulnarability PVE-2021-36303 Advisory: Henosis 0.0.11 uses 'yaml.safe_load()' to prevent a code execution vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does henosis version less then 0.0.11 have ### Response: Having vulnarability PVE-2021-36303 Advisory: Henosis 0.0.11 uses 'yaml.safe_load()' to prevent a code execution vulnerability." }, { "instruction": "what vulnarability does hexkit version less then 2.2.0 have", "input": "", "output": "Having vulnarability CVE-2024-26130 Advisory: Hexkit 2.2.0 has upgraded its cryptography library requirement to version 42.0.4 or later, addressing the security issue CVE-2024-26130.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hexkit version less then 2.2.0 have ### Response: Having vulnarability CVE-2024-26130 Advisory: Hexkit 2.2.0 has upgraded its cryptography library requirement to version 42.0.4 or later, addressing the security issue CVE-2024-26130." }, { "instruction": "what vulnarability does heyoo version less then 0.4 have", "input": "", "output": "Having vulnarability PVE-2024-65785 Advisory: Heyoo version 0.4 has disabled the debug mode, which was previously activated by default in the hook. The app was vulnerable to exploitation once online.\r\nhttps://github.com/Neurotech-HQ/heyoo/pull/85/commits/7631be553bd15093d807f4446a3ab941e6a14994", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does heyoo version less then 0.4 have ### Response: Having vulnarability PVE-2024-65785 Advisory: Heyoo version 0.4 has disabled the debug mode, which was previously activated by default in the hook. The app was vulnerable to exploitation once online.\r\nhttps://github.com/Neurotech-HQ/heyoo/pull/85/commits/7631be553bd15093d807f4446a3ab941e6a14994" }, { "instruction": "what vulnarability does hhpy version less then 0.1.8 have", "input": "", "output": "Having vulnarability PVE-2021-38480 Advisory: Hhpy 0.1.8 includes an upgrade of bleach for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hhpy version less then 0.1.8 have ### Response: Having vulnarability PVE-2021-38480 Advisory: Hhpy 0.1.8 includes an upgrade of bleach for security reasons." }, { "instruction": "what vulnarability does hiddifypanel version less then 8.7.0,greather then equal to 9.0.0.dev0,less then 9.0.0.dev25 have", "input": "", "output": "Having vulnarability PVE-2023-62138 Advisory: Hiddifypanel 8.7.0 and 9.0.0.dev25 include a security fix related to broken authorization.\r\nhttps://github.com/hiddify/HiddifyPanel/commit/6802ab32d7dab1ab61767b6f87a16746112c9f0a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hiddifypanel version less then 8.7.0,greather then equal to 9.0.0.dev0,less then 9.0.0.dev25 have ### Response: Having vulnarability PVE-2023-62138 Advisory: Hiddifypanel 8.7.0 and 9.0.0.dev25 include a security fix related to broken authorization.\r\nhttps://github.com/hiddify/HiddifyPanel/commit/6802ab32d7dab1ab61767b6f87a16746112c9f0a" }, { "instruction": "what vulnarability does highcharts-core version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Highcharts-core 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.\r\nhttps://github.com/highcharts-for-python/highcharts-core/commit/199f42b7ab5759411c923d0a24fd26b57aa25f25", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does highcharts-core version less then 1.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Highcharts-core 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.\r\nhttps://github.com/highcharts-for-python/highcharts-core/commit/199f42b7ab5759411c923d0a24fd26b57aa25f25" }, { "instruction": "what vulnarability does highcharts-gantt version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Highcharts-gantt 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.\r\nhttps://github.com/highcharts-for-python/highcharts-gantt/commit/804b5bf1bd39f75690e6c13621a60cfcd39abf75", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does highcharts-gantt version less then 1.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Highcharts-gantt 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.\r\nhttps://github.com/highcharts-for-python/highcharts-gantt/commit/804b5bf1bd39f75690e6c13621a60cfcd39abf75" }, { "instruction": "what vulnarability does highcharts-maps version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Highcharts-maps 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.\r\nhttps://github.com/highcharts-for-python/highcharts-maps/commit/dac460249e2bbc1e33a518af48cb6fc6c91ca00e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does highcharts-maps version less then 1.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Highcharts-maps 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.\r\nhttps://github.com/highcharts-for-python/highcharts-maps/commit/dac460249e2bbc1e33a518af48cb6fc6c91ca00e" }, { "instruction": "what vulnarability does highcharts-stock version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Highcharts-stock 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.\r\nhttps://github.com/highcharts-for-python/highcharts-stock/commit/9477155fc20a6ca2e3f184c8fe151f25db431e3e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does highcharts-stock version less then 1.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Highcharts-stock 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.\r\nhttps://github.com/highcharts-for-python/highcharts-stock/commit/9477155fc20a6ca2e3f184c8fe151f25db431e3e" }, { "instruction": "what vulnarability does hikari version less then 2.0.0.dev73 have", "input": "", "output": "Having vulnarability PVE-2024-67104 Advisory: Hikari version 2.0.0.dev73 addresses a bug where prematurely shutting down a bot during its startup phase led to a deadlock, enhancing stability and functionality during the bot's initialization process.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hikari version less then 2.0.0.dev73 have ### Response: Having vulnarability PVE-2024-67104 Advisory: Hikari version 2.0.0.dev73 addresses a bug where prematurely shutting down a bot during its startup phase led to a deadlock, enhancing stability and functionality during the bot's initialization process." }, { "instruction": "what vulnarability does hippogym version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2020-10377 Advisory: Hippogym 1.1.0 updates its dependency 'pillow' to v7.1.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hippogym version less then 1.1.0 have ### Response: Having vulnarability CVE-2020-10377 Advisory: Hippogym 1.1.0 updates its dependency 'pillow' to v7.1.0 to include security fixes." }, { "instruction": "what vulnarability does hiredis version less then 2.1.0 have", "input": "", "output": "Having vulnarability CVE-2021-32765 Advisory: Hiredis (python wrapper for hiredis) 2.1.0 supports hiredis 1.1.0, that includes a security fix.\r\nhttps://github.com/redis/hiredis-py/pull/135", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hiredis version less then 2.1.0 have ### Response: Having vulnarability CVE-2021-32765 Advisory: Hiredis (python wrapper for hiredis) 2.1.0 supports hiredis 1.1.0, that includes a security fix.\r\nhttps://github.com/redis/hiredis-py/pull/135" }, { "instruction": "what vulnarability does hivemind version less then 0.9.5 have", "input": "", "output": "Having vulnarability PVE-2021-40150 Advisory: Hivemind 0.9.5 includes a security fix: Unpickling data from peers may lead to remote code execution.\r\nhttps://github.com/learning-at-home/hivemind/issues/155", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hivemind version less then 0.9.5 have ### Response: Having vulnarability PVE-2021-40150 Advisory: Hivemind 0.9.5 includes a security fix: Unpickling data from peers may lead to remote code execution.\r\nhttps://github.com/learning-at-home/hivemind/issues/155" }, { "instruction": "what vulnarability does hkjournalist version less then 0.0.8 have", "input": "", "output": "Having vulnarability PVE-2021-41327 Advisory: Hkjournalist version 0.0.8 includes a security patch for the function 'report' in 'hkjournalist/journalist.py'. It contained an OS injection vulnerability: subprocess call with shell=True.\r\nhttps://github.com/li-xin-yi/HK-journalist/commit/ec95050b13fed27f77ac3ab7ecbc7b1f27f50921", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hkjournalist version less then 0.0.8 have ### Response: Having vulnarability PVE-2021-41327 Advisory: Hkjournalist version 0.0.8 includes a security patch for the function 'report' in 'hkjournalist/journalist.py'. It contained an OS injection vulnerability: subprocess call with shell=True.\r\nhttps://github.com/li-xin-yi/HK-journalist/commit/ec95050b13fed27f77ac3ab7ecbc7b1f27f50921" }, { "instruction": "what vulnarability does hnswlib version less then equal to 0.7.0 have", "input": "", "output": "Having vulnarability CVE-2023-37365 Advisory: Hnswlib 0.7.0 has a double free in init_index when the M argument is a large integer.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hnswlib version less then equal to 0.7.0 have ### Response: Having vulnarability CVE-2023-37365 Advisory: Hnswlib 0.7.0 has a double free in init_index when the M argument is a large integer." }, { "instruction": "what vulnarability does holepunch version less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-3737 Advisory: Holepunch 1.0.0 drops support for Python 2 and 3 < 3.6. These versions are not receiving security updates anymore.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does holepunch version less then 1.0.0 have ### Response: Having vulnarability CVE-2021-3737 Advisory: Holepunch 1.0.0 drops support for Python 2 and 3 < 3.6. These versions are not receiving security updates anymore." }, { "instruction": "what vulnarability does holidays version less then 0.45 have", "input": "", "output": "Having vulnarability PVE-2024-66787 Advisory: Holidays 0.45 addresses security concerns flagged by SonarCloud related to vulnerable regular expression patterns that could lead to denial of service. The issue, identified as potentially causing polynomial runtime due to backtracking, was mitigated by modifying regex strings in the codebase.\r\nhttps://github.com/vacanza/python-holidays/pull/1723", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does holidays version less then 0.45 have ### Response: Having vulnarability PVE-2024-66787 Advisory: Holidays 0.45 addresses security concerns flagged by SonarCloud related to vulnerable regular expression patterns that could lead to denial of service. The issue, identified as potentially causing polynomial runtime due to backtracking, was mitigated by modifying regex strings in the codebase.\r\nhttps://github.com/vacanza/python-holidays/pull/1723" }, { "instruction": "what vulnarability does holocron version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-25844 Advisory: holocron 0.2.0 fixed a security issue when content author may steal private data through content's meta header.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does holocron version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-25844 Advisory: holocron 0.2.0 fixed a security issue when content author may steal private data through content's meta header." }, { "instruction": "what vulnarability does home-assistant-frontend version less then 20220420.0 have", "input": "", "output": "Having vulnarability PVE-2022-48229 Advisory: Home-assistant-frontend 20220420.0 no longer uses the insecure git protocol.\r\nhttps://github.com/home-assistant/frontend/commit/1e0647c0d1a360469da5f299cacbffcaca186a8a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does home-assistant-frontend version less then 20220420.0 have ### Response: Having vulnarability PVE-2022-48229 Advisory: Home-assistant-frontend 20220420.0 no longer uses the insecure git protocol.\r\nhttps://github.com/home-assistant/frontend/commit/1e0647c0d1a360469da5f299cacbffcaca186a8a" }, { "instruction": "what vulnarability does homeassistant version less then 0.37 have", "input": "", "output": "Having vulnarability PVE-2021-34222 Advisory: homeassistant before 0.37 uses a weak random number generator to create access tokens for camera feeds which could be brute force attacked in 2.5 weeks", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does homeassistant version less then 0.37 have ### Response: Having vulnarability PVE-2021-34222 Advisory: homeassistant before 0.37 uses a weak random number generator to create access tokens for camera feeds which could be brute force attacked in 2.5 weeks" }, { "instruction": "what vulnarability does honeybee-display version less then 0.2.14 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Honeybee-display 0.2.14 updates its dependency 'wheel' to v0.38.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does honeybee-display version less then 0.2.14 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Honeybee-display 0.2.14 updates its dependency 'wheel' to v0.38.1 to include a security fix." }, { "instruction": "what vulnarability does honeybee-radiance version less then 1.64.132 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Honeybee-radiance 1.64.132 updates its dev dependency 'wheel' to v0.38.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does honeybee-radiance version less then 1.64.132 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Honeybee-radiance 1.64.132 updates its dev dependency 'wheel' to v0.38.1 to include a security fix." }, { "instruction": "what vulnarability does honeybee-radiance-postprocess version less then 0.4.166 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Honeybee-radiance-postprocess 0.4.166 updates its dependency 'wheel' to v0.38.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does honeybee-radiance-postprocess version less then 0.4.166 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Honeybee-radiance-postprocess 0.4.166 updates its dependency 'wheel' to v0.38.1 to include a security fix." }, { "instruction": "what vulnarability does honeycomb-beeline version less then 3.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-33571 Advisory: Honeycomb-beeline 3.0.0 updates its dependency 'Django' minimum version to v2.2.26 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does honeycomb-beeline version less then 3.0.0 have ### Response: Having vulnarability CVE-2021-33571 Advisory: Honeycomb-beeline 3.0.0 updates its dependency 'Django' minimum version to v2.2.26 to include security fixes." }, { "instruction": "what vulnarability does hooktest version less then 1.3.1 have", "input": "", "output": "Having vulnarability CVE-2019-19588 Advisory: Hooktest 1.3.1 updates its dependency \"validators\" to v0.12.6 to fix a security leak.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hooktest version less then 1.3.1 have ### Response: Having vulnarability CVE-2019-19588 Advisory: Hooktest 1.3.1 updates its dependency \"validators\" to v0.12.6 to fix a security leak." }, { "instruction": "what vulnarability does hopeit.engine version less then 0.16.1 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Hopeit.engine 0.16.1 updates its dependency 'PyJWT' to v2.4.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hopeit.engine version less then 0.16.1 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Hopeit.engine 0.16.1 updates its dependency 'PyJWT' to v2.4.0 to include a security fix." }, { "instruction": "what vulnarability does horizon version less then 15.3.2,greather then equal to 17.0,less then 18.3.3,greather then equal to 16.0.0.0b1,less then 16.2.1 have", "input": "", "output": "Having vulnarability CVE-2020-29565 Advisory: An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the \"next\" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the provided malicious URL. See CVE-2020-29565.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does horizon version less then 15.3.2,greather then equal to 17.0,less then 18.3.3,greather then equal to 16.0.0.0b1,less then 16.2.1 have ### Response: Having vulnarability CVE-2020-29565 Advisory: An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the \"next\" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the provided malicious URL. See CVE-2020-29565." }, { "instruction": "what vulnarability does horovod version greather then equal to 0,less then 0.24.0 have", "input": "", "output": "Having vulnarability CVE-2022-0315 Advisory: Insecure Temporary File in GitHub repository horovod/horovod prior to 0.24.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does horovod version greather then equal to 0,less then 0.24.0 have ### Response: Having vulnarability CVE-2022-0315 Advisory: Insecure Temporary File in GitHub repository horovod/horovod prior to 0.24.0." }, { "instruction": "what vulnarability does hotaru version less then 3.2.4 have", "input": "", "output": "Having vulnarability CVE-2020-15192 Advisory: Hotaru 3.2.4 updates Tensorflow to >= 2.2.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hotaru version less then 3.2.4 have ### Response: Having vulnarability CVE-2020-15192 Advisory: Hotaru 3.2.4 updates Tensorflow to >= 2.2.1 to include security fixes." }, { "instruction": "what vulnarability does hover version less then equal to 0.4.0 have", "input": "", "output": "Having vulnarability PVE-2021-39389 Advisory: Hover 0.4.0 was released with the acknowledgement that it (and previous versions?) includes a potential security concern. In particular, it displays traceback information if something breaks in the scope of the recipe.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hover version less then equal to 0.4.0 have ### Response: Having vulnarability PVE-2021-39389 Advisory: Hover 0.4.0 was released with the acknowledgement that it (and previous versions?) includes a potential security concern. In particular, it displays traceback information if something breaks in the scope of the recipe." }, { "instruction": "what vulnarability does hpack version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2016-6580 Advisory: A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hpack version less then 1.2.0 have ### Response: Having vulnarability CVE-2016-6580 Advisory: A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree." }, { "instruction": "what vulnarability does hpim-dm version less then 1.4 have", "input": "", "output": "Having vulnarability PVE-2021-39387 Advisory: Hpim-dm 1.4 fixes security issues on IPv6 HPIM-DM interfaces.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hpim-dm version less then 1.4 have ### Response: Having vulnarability PVE-2021-39387 Advisory: Hpim-dm 1.4 fixes security issues on IPv6 HPIM-DM interfaces." }, { "instruction": "what vulnarability does htbulma version less then 0.1.1 have", "input": "", "output": "Having vulnarability PVE-2022-47768 Advisory: Htbulma 0.1.1 limits 'FileSelect' to the path to avoid directory transversal attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does htbulma version less then 0.1.1 have ### Response: Having vulnarability PVE-2022-47768 Advisory: Htbulma 0.1.1 limits 'FileSelect' to the path to avoid directory transversal attacks." }, { "instruction": "what vulnarability does html-to-csv version greather then 0 have", "input": "", "output": "Having vulnarability CVE-2021-23654 Advisory: All versions of html-to-csv are affected by CVE-2021-23654: When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this, a malicious actor can embed or generate a malicious link or execute commands via CSV files.\r\nhttps://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does html-to-csv version greather then 0 have ### Response: Having vulnarability CVE-2021-23654 Advisory: All versions of html-to-csv are affected by CVE-2021-23654: When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this, a malicious actor can embed or generate a malicious link or execute commands via CSV files.\r\nhttps://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py" }, { "instruction": "what vulnarability does html5 version less then 0.99999999 have", "input": "", "output": "Having vulnarability PVE-2021-25845 Advisory: Html5 0.99999999 fixes a XSS vulnerability exploitable when using legacy browsers. This release alters the API so that quote_attr_values is now a ternary setting, choosing between legacy-safe behavior, spec behavior, and always quoting.\r\nhttps://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does html5 version less then 0.99999999 have ### Response: Having vulnarability PVE-2021-25845 Advisory: Html5 0.99999999 fixes a XSS vulnerability exploitable when using legacy browsers. This release alters the API so that quote_attr_values is now a ternary setting, choosing between legacy-safe behavior, spec behavior, and always quoting.\r\nhttps://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7" }, { "instruction": "what vulnarability does html5lib version less then 0.99999999,greather then equal to 1.0b1,less then 1.0b9 have", "input": "", "output": "Having vulnarability CVE-2016-9909 Advisory: The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values.\r\nhttps://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does html5lib version less then 0.99999999,greather then equal to 1.0b1,less then 1.0b9 have ### Response: Having vulnarability CVE-2016-9909 Advisory: The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values.\r\nhttps://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7" }, { "instruction": "what vulnarability does htmlgenerator version less then 1.2.9 have", "input": "", "output": "Having vulnarability PVE-2022-44729 Advisory: Htmlgenerator 1.2.9 fixes XSS vulnerability on html attributes.\r\nhttps://github.com/basxsoftwareassociation/htmlgenerator/commit/63bb8892834485d22d4313898e8e61d76ade08b1", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does htmlgenerator version less then 1.2.9 have ### Response: Having vulnarability PVE-2022-44729 Advisory: Htmlgenerator 1.2.9 fixes XSS vulnerability on html attributes.\r\nhttps://github.com/basxsoftwareassociation/htmlgenerator/commit/63bb8892834485d22d4313898e8e61d76ade08b1" }, { "instruction": "what vulnarability does http-tools version less then 3.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-39214 Advisory: Http-tools 3.0.0 updates its dependency 'mitmproxy' to version '9.0.1' to include a fix for an HTTP Request Smuggling vulnerability.\r\nhttps://github.com/MobSF/httptools/commit/896d06ab49b4eeb01353567c730afc32a380e99a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does http-tools version less then 3.0.0 have ### Response: Having vulnarability CVE-2021-39214 Advisory: Http-tools 3.0.0 updates its dependency 'mitmproxy' to version '9.0.1' to include a fix for an HTTP Request Smuggling vulnerability.\r\nhttps://github.com/MobSF/httptools/commit/896d06ab49b4eeb01353567c730afc32a380e99a" }, { "instruction": "what vulnarability does httpauth version less then 0.2 have", "input": "", "output": "Having vulnarability PVE-2021-25847 Advisory: httpauth 0.2 fixes a security issue: Invalid username + empty password were being accepted.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpauth version less then 0.2 have ### Response: Having vulnarability PVE-2021-25847 Advisory: httpauth 0.2 fixes a security issue: Invalid username + empty password were being accepted." }, { "instruction": "what vulnarability does httpie version less then 1.0.3 have", "input": "", "output": "Having vulnarability CVE-2019-10751 Advisory: Httpie 1.0.3 fixes CVE-2019-10751. The way the output filename is generated for ``--download`` requests without ``--output`` resulting in a redirect has been changed to only consider the initial URL as the base for the generated filename, and not the final one. See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpie version less then 1.0.3 have ### Response: Having vulnarability CVE-2019-10751 Advisory: Httpie 1.0.3 fixes CVE-2019-10751. The way the output filename is generated for ``--download`` requests without ``--output`` resulting in a redirect has been changed to only consider the initial URL as the base for the generated filename, and not the final one. See: ." }, { "instruction": "what vulnarability does httplib2 version less then 0.18.0 have", "input": "", "output": "Having vulnarability CVE-2020-11078 Advisory: In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0. See CVE-2020-11078.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httplib2 version less then 0.18.0 have ### Response: Having vulnarability CVE-2020-11078 Advisory: In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0. See CVE-2020-11078." }, { "instruction": "what vulnarability does httprunner version less then 2.0.5 have", "input": "", "output": "Having vulnarability PVE-2021-36945 Advisory: Httprunner 2.0.5 fixes XSS in response json.\r\nhttps://github.com/httprunner/httprunner/commit/6cd930ce0d37a3f92bb4f4b9689c7617e610ff43", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httprunner version less then 2.0.5 have ### Response: Having vulnarability PVE-2021-36945 Advisory: Httprunner 2.0.5 fixes XSS in response json.\r\nhttps://github.com/httprunner/httprunner/commit/6cd930ce0d37a3f92bb4f4b9689c7617e610ff43" }, { "instruction": "what vulnarability does httpsig version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-25849 Advisory: httpsig 1.0.0 removed suport for reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpsig version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-25849 Advisory: httpsig 1.0.0 removed suport for reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig." }, { "instruction": "what vulnarability does httpsig-cffi version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-25850 Advisory: httpsig-cffi 1.0.0 removed suport for reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpsig-cffi version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-25850 Advisory: httpsig-cffi 1.0.0 removed suport for reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig." }, { "instruction": "what vulnarability does httpslib version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52925 Advisory: Httpslib is a malicious package. It installs info-stealing Malware.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpslib version greather then 0 have ### Response: Having vulnarability PVE-2023-52925 Advisory: Httpslib is a malicious package. It installs info-stealing Malware.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware" }, { "instruction": "what vulnarability does httptools version less then 0.5.0 have", "input": "", "output": "Having vulnarability CVE-2022-32214 Advisory: Httptools 0.5.0 updates the bundled 'llhttp' library to v6.0.9 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httptools version less then 0.5.0 have ### Response: Having vulnarability CVE-2022-32214 Advisory: Httptools 0.5.0 updates the bundled 'llhttp' library to v6.0.9 to include security fixes." }, { "instruction": "what vulnarability does httpx version less then 0.23.0 have", "input": "", "output": "Having vulnarability CVE-2021-41945 Advisory: Httpx 0.23.0 includes a fix for CVE-2021-41945: Encode OSS httpx < 0.23.0 is affected by improper input validation in 'httpx.URL', 'httpx.Client' and some functions using 'httpx.URL.copy_with'.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpx version less then 0.23.0 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Httpx 0.23.0 includes a fix for CVE-2021-41945: Encode OSS httpx < 0.23.0 is affected by improper input validation in 'httpx.URL', 'httpx.Client' and some functions using 'httpx.URL.copy_with'." }, { "instruction": "what vulnarability does hub version less then 0.9.0 have", "input": "", "output": "Having vulnarability PVE-2021-39217 Advisory: Hub 0.9.0 upgrades urllib3 to urllib3[secure].", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hub version less then 0.9.0 have ### Response: Having vulnarability PVE-2021-39217 Advisory: Hub 0.9.0 upgrades urllib3 to urllib3[secure]." }, { "instruction": "what vulnarability does hubitatmaker version less then 0.5.4 have", "input": "", "output": "Having vulnarability CVE-2020-14343 Advisory: Hubitatmaker 0.5.4 updates its dependency 'pyyaml' to v5.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hubitatmaker version less then 0.5.4 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Hubitatmaker 0.5.4 updates its dependency 'pyyaml' to v5.4 to include a security fix." }, { "instruction": "what vulnarability does huey version less then 2.5.0 have", "input": "", "output": "Having vulnarability PVE-2023-61327 Advisory: Huey 2.5.0 includes a a fix for a potential vulnerability: A race condition where a task is enqueued and executed before the corresponding database changes have been committed.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does huey version less then 2.5.0 have ### Response: Having vulnarability PVE-2023-61327 Advisory: Huey 2.5.0 includes a a fix for a potential vulnerability: A race condition where a task is enqueued and executed before the corresponding database changes have been committed." }, { "instruction": "what vulnarability does hug version less then 2.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-34472 Advisory: Hug 2.3.0 fixes a vulnerability in the static file router that allows files in parent directory to be accessed.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hug version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-34472 Advisory: Hug 2.3.0 fixes a vulnerability in the static file router that allows files in parent directory to be accessed." }, { "instruction": "what vulnarability does huggingface-hub version less then 0.13.4 have", "input": "", "output": "Having vulnarability PVE-2023-54919 Advisory: Huggingface-hub 0.13.4 includes a security fix: Malicious repo can overwrite any file on disk.\r\nhttps://github.com/huggingface/huggingface_hub/pull/1429", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does huggingface-hub version less then 0.13.4 have ### Response: Having vulnarability PVE-2023-54919 Advisory: Huggingface-hub 0.13.4 includes a security fix: Malicious repo can overwrite any file on disk.\r\nhttps://github.com/huggingface/huggingface_hub/pull/1429" }, { "instruction": "what vulnarability does hugo version less then 0.114.0 have", "input": "", "output": "Having vulnarability CVE-2023-24538 Advisory: Hugo 0.114.0 fixes the upstream Go templates bug with reversed key/value assignment, in response to the identified CVE-2023-24538 vulnerability. \r\nhttps://github.com/gohugoio/hugo/commit/ee359df172ece11989e9b1bf35c2d376f2608ac6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hugo version less then 0.114.0 have ### Response: Having vulnarability CVE-2023-24538 Advisory: Hugo 0.114.0 fixes the upstream Go templates bug with reversed key/value assignment, in response to the identified CVE-2023-24538 vulnerability. \r\nhttps://github.com/gohugoio/hugo/commit/ee359df172ece11989e9b1bf35c2d376f2608ac6" }, { "instruction": "what vulnarability does humanqueen version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45444 Advisory: Humanqueen is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.\r\nhttps://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does humanqueen version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45444 Advisory: Humanqueen is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.\r\nhttps://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository" }, { "instruction": "what vulnarability does humanqueenn version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45445 Advisory: Humanqueenn is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.\r\nhttps://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does humanqueenn version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45445 Advisory: Humanqueenn is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.\r\nhttps://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository" }, { "instruction": "what vulnarability does humblesetuptools version less then 0.9.5 have", "input": "", "output": "Having vulnarability PVE-2021-25851 Advisory: humblesetuptools 0.9.5 fixes a security vulnerability in SSL certificate validation.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does humblesetuptools version less then 0.9.5 have ### Response: Having vulnarability PVE-2021-25851 Advisory: humblesetuptools 0.9.5 fixes a security vulnerability in SSL certificate validation." }, { "instruction": "what vulnarability does hv4gha version less then 0.1.1 have", "input": "", "output": "Having vulnarability CVE-2023-3446 Advisory: Hv4gha 0.1.1 updates its dependency 'cryptography' to v41.0.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hv4gha version less then 0.1.1 have ### Response: Having vulnarability CVE-2023-3446 Advisory: Hv4gha 0.1.1 updates its dependency 'cryptography' to v41.0.3 to include a security fix." }, { "instruction": "what vulnarability does hwi version less then 1.1.2 have", "input": "", "output": "Having vulnarability CVE-2020-14199 Advisory: Hwi 1.1.2 includes a fix for CVE-2020-14199: BIP-143 in the Bitcoin protocol specification mishandles the signing of a Segwit transaction, which allows attackers to trick a user into making two signatures in certain cases, potentially leading to a huge transaction fee. NOTE: this affects all hardware wallets.\r\nhttps://github.com/bitcoin-core/HWI/commit/2ce8734a5ebdab84efcaef61ce6a10af43ddc10b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hwi version less then 1.1.2 have ### Response: Having vulnarability CVE-2020-14199 Advisory: Hwi 1.1.2 includes a fix for CVE-2020-14199: BIP-143 in the Bitcoin protocol specification mishandles the signing of a Segwit transaction, which allows attackers to trick a user into making two signatures in certain cases, potentially leading to a huge transaction fee. NOTE: this affects all hardware wallets.\r\nhttps://github.com/bitcoin-core/HWI/commit/2ce8734a5ebdab84efcaef61ce6a10af43ddc10b" }, { "instruction": "what vulnarability does hxl-proxy version less then 1.22 have", "input": "", "output": "Having vulnarability PVE-2021-39450 Advisory: Hxl-proxy 1.22 updates to libhxl=4.22 for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hxl-proxy version less then 1.22 have ### Response: Having vulnarability PVE-2021-39450 Advisory: Hxl-proxy 1.22 updates to libhxl=4.22 for security reasons." }, { "instruction": "what vulnarability does hydrolib-core version less then 0.5.2 have", "input": "", "output": "Having vulnarability PVE-2023-55070 Advisory: Hydrolib-core 0.5.2 includes a fix for a potential REDoS vulnerability.\r\nhttps://github.com/Deltares/HYDROLIB-core/pull/541/commits/38502fbed717f874903c7290269fa7ae0bc8305b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hydrolib-core version less then 0.5.2 have ### Response: Having vulnarability PVE-2023-55070 Advisory: Hydrolib-core 0.5.2 includes a fix for a potential REDoS vulnerability.\r\nhttps://github.com/Deltares/HYDROLIB-core/pull/541/commits/38502fbed717f874903c7290269fa7ae0bc8305b" }, { "instruction": "what vulnarability does hydroshare version less then 1.9.5 have", "input": "", "output": "Having vulnarability PVE-2021-34264 Advisory: hydroshare before 1.9.5 has multiple - undisclosed - security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hydroshare version less then 1.9.5 have ### Response: Having vulnarability PVE-2021-34264 Advisory: hydroshare before 1.9.5 has multiple - undisclosed - security issues." }, { "instruction": "what vulnarability does hyper-bump-it version less then 0.5.1 have", "input": "", "output": "Having vulnarability CVE-2023-40590 Advisory: Hyper-bump-it 0.5.1 requires 'GitPython' to be version '3.1.34' as minimum, to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyper-bump-it version less then 0.5.1 have ### Response: Having vulnarability CVE-2023-40590 Advisory: Hyper-bump-it 0.5.1 requires 'GitPython' to be version '3.1.34' as minimum, to include a security fix." }, { "instruction": "what vulnarability does hyper-kube-config version less then 0.6.1 have", "input": "", "output": "Having vulnarability CVE-2020-25659 Advisory: Hyper-kube-config 0.6.1 includes an update of its dependency 'Cryptography' to mitigate CVE-2020-25659.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyper-kube-config version less then 0.6.1 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Hyper-kube-config 0.6.1 includes an update of its dependency 'Cryptography' to mitigate CVE-2020-25659." }, { "instruction": "what vulnarability does hypercorn version less then 0.16.0 have", "input": "", "output": "Having vulnarability PVE-2024-63209 Advisory: Hypercorn 0.16.0 adds a max keep alive requests configuration option to mitigate the HTTP/2 rapid reset attack.\r\nhttps://github.com/pgjones/hypercorn/commit/7c39c68b61012a3c30979176080861c8b00fb229", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hypercorn version less then 0.16.0 have ### Response: Having vulnarability PVE-2024-63209 Advisory: Hypercorn 0.16.0 adds a max keep alive requests configuration option to mitigate the HTTP/2 rapid reset attack.\r\nhttps://github.com/pgjones/hypercorn/commit/7c39c68b61012a3c30979176080861c8b00fb229" }, { "instruction": "what vulnarability does hyperfocus version less then 1.0.0a0 have", "input": "", "output": "Having vulnarability PVE-2022-50167 Advisory: Hyperfocus 1.0.0a0 adds security check preventing config deletion.\r\nhttps://github.com/u8slvn/hyperfocus/commit/f870d074519add33b67d01a0b84e4a78fbd2d707", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyperfocus version less then 1.0.0a0 have ### Response: Having vulnarability PVE-2022-50167 Advisory: Hyperfocus 1.0.0a0 adds security check preventing config deletion.\r\nhttps://github.com/u8slvn/hyperfocus/commit/f870d074519add33b67d01a0b84e4a78fbd2d707" }, { "instruction": "what vulnarability does hyperkitty version less then 1.3.4 have", "input": "", "output": "Having vulnarability CVE-2021-33038 Advisory: An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyperkitty version less then 1.3.4 have ### Response: Having vulnarability CVE-2021-33038 Advisory: An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3." }, { "instruction": "what vulnarability does hypothesis version less then 3.69.8 have", "input": "", "output": "Having vulnarability PVE-2021-39447 Advisory: Hypothesis 3.69.8 moves away from using pickle module and replaces it with json to prevent possible security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hypothesis version less then 3.69.8 have ### Response: Having vulnarability PVE-2021-39447 Advisory: Hypothesis 3.69.8 moves away from using pickle module and replaces it with json to prevent possible security issues." }, { "instruction": "what vulnarability does hyppo version less then 0.3.0 have", "input": "", "output": "Having vulnarability CVE-2022-21699 Advisory: Hyppo 0.3.0 updates its dependency 'ipython' to v7.31.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyppo version less then 0.3.0 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Hyppo 0.3.0 updates its dependency 'ipython' to v7.31.1 to include a security fix." }, { "instruction": "what vulnarability does hypyp version less then 0.5.0b2 have", "input": "", "output": "Having vulnarability CVE-2022-21699 Advisory: Hypyp version 0.5.0b2 upgrades its IPython dependency from version 8.7.0 to 8.10.0 in response to CVE-2022-21699.\r\nhttps://github.com/ppsp-team/HyPyP/commit/638471adad98a5064dff98cbd5292ab653822fd0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hypyp version less then 0.5.0b2 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Hypyp version 0.5.0b2 upgrades its IPython dependency from version 8.7.0 to 8.10.0 in response to CVE-2022-21699.\r\nhttps://github.com/ppsp-team/HyPyP/commit/638471adad98a5064dff98cbd5292ab653822fd0" }, { "instruction": "what vulnarability does iao version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51696 Advisory: Iao is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iao version greather then 0 have ### Response: Having vulnarability PVE-2022-51696 Advisory: Iao is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does ib-client version less then 0.1.2 have", "input": "", "output": "Having vulnarability CVE-2019-10906 Advisory: Ib-client 0.1.2 updates its dependency 'Jinja2' to v2.10.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ib-client version less then 0.1.2 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Ib-client 0.1.2 updates its dependency 'Jinja2' to v2.10.1 to include a security fix." }, { "instruction": "what vulnarability does ibis-framework version less then 7.1.0 have", "input": "", "output": "Having vulnarability CVE-2023-47248 Advisory: Ibis-framework versions before 7.1.0 are susceptible to an OS Command Injection vulnerability due to improper neutralization of special elements used in OS commands. This vulnerability allows attackers to execute arbitrary code on the system where the ibis-framework is deployed.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ibis-framework version less then 7.1.0 have ### Response: Having vulnarability CVE-2023-47248 Advisory: Ibis-framework versions before 7.1.0 are susceptible to an OS Command Injection vulnerability due to improper neutralization of special elements used in OS commands. This vulnerability allows attackers to execute arbitrary code on the system where the ibis-framework is deployed." }, { "instruction": "what vulnarability does ibis-substrait version less then 2.11.1 have", "input": "", "output": "Having vulnarability CVE-2022-1941 Advisory: Ibis-substrait version 2.11.1 upgrades its protobuf dependency to version 3.20.2 in response to the security vulnerability CVE-2022-1941.\r\nhttps://github.com/ibis-project/ibis-substrait/commit/d45f2399cd19b5014a0de1deb74abbdbd3a24aa7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ibis-substrait version less then 2.11.1 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Ibis-substrait version 2.11.1 upgrades its protobuf dependency to version 3.20.2 in response to the security vulnerability CVE-2022-1941.\r\nhttps://github.com/ibis-project/ibis-substrait/commit/d45f2399cd19b5014a0de1deb74abbdbd3a24aa7" }, { "instruction": "what vulnarability does ibm-generative-ai version less then 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2023-2251 Advisory: Ibm-generative-ai version 1.0.1 has upgraded its yaml dependency to \"^2.3.0\" from the prior \"^2.2.2\" to address the security issue identified as CVE-2023-2251.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ibm-generative-ai version less then 1.0.1 have ### Response: Having vulnarability CVE-2023-2251 Advisory: Ibm-generative-ai version 1.0.1 has upgraded its yaml dependency to \"^2.3.0\" from the prior \"^2.2.2\" to address the security issue identified as CVE-2023-2251." }, { "instruction": "what vulnarability does ibmsecurity version less then 2024.4.5.0 have", "input": "", "output": "Having vulnarability PVE-2024-67500 Advisory: Affected versions of Ibmsecurity are vulnerable to a Insecure Communications flaw. All the SSL/TLS connections to the remote ISVA server are configured in an insecure way.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ibmsecurity version less then 2024.4.5.0 have ### Response: Having vulnarability PVE-2024-67500 Advisory: Affected versions of Ibmsecurity are vulnerable to a Insecure Communications flaw. All the SSL/TLS connections to the remote ISVA server are configured in an insecure way." }, { "instruction": "what vulnarability does idchecker version less then 1.1.2 have", "input": "", "output": "Having vulnarability PVE-2021-40134 Advisory: Idchecker was re-created for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does idchecker version less then 1.1.2 have ### Response: Having vulnarability PVE-2021-40134 Advisory: Idchecker was re-created for security reasons." }, { "instruction": "what vulnarability does idna version less then 3.7 have", "input": "", "output": "Having vulnarability CVE-2024-3651 Advisory: CVE-2024-3651 impacts the idna.encode() function, where a specially crafted argument could lead to significant resource consumption, causing a denial-of-service. In version 3.7, this function has been updated to reject such inputs efficiently, minimizing resource use. A practical workaround involves enforcing a maximum domain name length of 253 characters before encoding, as the vulnerability is triggered by unusually large inputs that normal operations wouldn't encounter.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does idna version less then 3.7 have ### Response: Having vulnarability CVE-2024-3651 Advisory: CVE-2024-3651 impacts the idna.encode() function, where a specially crafted argument could lead to significant resource consumption, causing a denial-of-service. In version 3.7, this function has been updated to reject such inputs efficiently, minimizing resource use. A practical workaround involves enforcing a maximum domain name length of 253 characters before encoding, as the vulnerability is triggered by unusually large inputs that normal operations wouldn't encounter." }, { "instruction": "what vulnarability does ietfdata version less then 0.6.3 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Ietfdata 0.6.3 updates its dependency 'certifi' to v2022.12.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ietfdata version less then 0.6.3 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Ietfdata 0.6.3 updates its dependency 'certifi' to v2022.12.7 to include a security fix." }, { "instruction": "what vulnarability does ihatemoney version less then 4.1.5 have", "input": "", "output": "Having vulnarability CVE-2020-15120 Advisory: In \"I hate money\" before version 4.1.5, an authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. See CVE-2020-15120.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ihatemoney version less then 4.1.5 have ### Response: Having vulnarability CVE-2020-15120 Advisory: In \"I hate money\" before version 4.1.5, an authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. See CVE-2020-15120." }, { "instruction": "what vulnarability does im version less then 1.5.0 have", "input": "", "output": "Having vulnarability PVE-2021-36819 Advisory: im 1.5.0 removes use of insecure Pickle data.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does im version less then 1.5.0 have ### Response: Having vulnarability PVE-2021-36819 Advisory: im 1.5.0 removes use of insecure Pickle data." }, { "instruction": "what vulnarability does image-sorting-tool version less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Image-sorting-tool 1.0.0 updates its dependency 'pillow' to include a security fix.\r\nhttps://github.com/ThorpeJosh/image-sorting-tool/pull/36", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does image-sorting-tool version less then 1.0.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Image-sorting-tool 1.0.0 updates its dependency 'pillow' to include a security fix.\r\nhttps://github.com/ThorpeJosh/image-sorting-tool/pull/36" }, { "instruction": "what vulnarability does imagecodecs version greather then equal to 2019.12.31,less then 2023.9.18 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Imagecodecs 2023.9.18 updates its C dependency 'libwebp' to v1.3.2 to include a fix for a high-risk vulnerability.\r\nhttps://github.com/cgohlke/imagecodecs/commit/3d0dca35e7848ab6a50e157a78a074e6d3e96e7f\r\nhttps://github.com/cgohlke/imagecodecs/blob/v2023.9.18/CHANGES.rst", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imagecodecs version greather then equal to 2019.12.31,less then 2023.9.18 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Imagecodecs 2023.9.18 updates its C dependency 'libwebp' to v1.3.2 to include a fix for a high-risk vulnerability.\r\nhttps://github.com/cgohlke/imagecodecs/commit/3d0dca35e7848ab6a50e157a78a074e6d3e96e7f\r\nhttps://github.com/cgohlke/imagecodecs/blob/v2023.9.18/CHANGES.rst" }, { "instruction": "what vulnarability does imageedit version less then 2021 have", "input": "", "output": "Having vulnarability CVE-2020-35653 Advisory: Imageedit 2021 updates its dependency 'pillow' to version >= 8.1.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imageedit version less then 2021 have ### Response: Having vulnarability CVE-2020-35653 Advisory: Imageedit 2021 updates its dependency 'pillow' to version >= 8.1.1 to include security fixes." }, { "instruction": "what vulnarability does imageio version less then 2.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-37902 Advisory: Imageio 2.6.0 fixes a code injection vulnerability for Windows users that have dcmtk installed, and where an attacker can set the filename.\r\nhttps://github.com/imageio/imageio/commit/5b398716d518cd14e8b978ea3cd8ec6c0236c1d8", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imageio version less then 2.6.0 have ### Response: Having vulnarability PVE-2021-37902 Advisory: Imageio 2.6.0 fixes a code injection vulnerability for Windows users that have dcmtk installed, and where an attacker can set the filename.\r\nhttps://github.com/imageio/imageio/commit/5b398716d518cd14e8b978ea3cd8ec6c0236c1d8" }, { "instruction": "what vulnarability does imapclient version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-34569 Advisory: Imapclient 1.0.0 defaults to attempting certificate verification, certificate hostname checking, and doesn't use known-insecure TLS settings and protocols.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imapclient version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-34569 Advisory: Imapclient 1.0.0 defaults to attempting certificate verification, certificate hostname checking, and doesn't use known-insecure TLS settings and protocols." }, { "instruction": "what vulnarability does img2table version less then 1.2.3 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Img2table 1.2.3 updates its dependency 'pillow' to versions '>=10.0.1' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does img2table version less then 1.2.3 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Img2table 1.2.3 updates its dependency 'pillow' to versions '>=10.0.1' to include a security fix." }, { "instruction": "what vulnarability does img2texture version less then 1.1.2 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Img2texture 1.1.2 updates its dependency 'pillow' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does img2texture version less then 1.1.2 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Img2texture 1.1.2 updates its dependency 'pillow' to include a security fix." }, { "instruction": "what vulnarability does imgstore version less then 0.2.9 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Imgstore 0.2.9 includes a security patch for the function 'new_for_filename' in 'imgstore/stores.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/loopbio/imgstore/commit/06b49a519b687ff3cd20b06c4c797818df812d06#diff-9e38eed8462f9c72f080c6c96c054a06d828dbd0ebca39f3738471d4557c704a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imgstore version less then 0.2.9 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Imgstore 0.2.9 includes a security patch for the function 'new_for_filename' in 'imgstore/stores.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/loopbio/imgstore/commit/06b49a519b687ff3cd20b06c4c797818df812d06#diff-9e38eed8462f9c72f080c6c96c054a06d828dbd0ebca39f3738471d4557c704a" }, { "instruction": "what vulnarability does imio-dashboard version less then 2.2 have", "input": "", "output": "Having vulnarability PVE-2022-44446 Advisory: Imio.dashboard 2.2 secures attribute get in DashboardPODTemplateMigrator.\r\nhttps://github.com/IMIO/imio.dashboard/commit/622147062b4c0cc9f5a0c36cb81b74bec4eb8e3a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imio-dashboard version less then 2.2 have ### Response: Having vulnarability PVE-2022-44446 Advisory: Imio.dashboard 2.2 secures attribute get in DashboardPODTemplateMigrator.\r\nhttps://github.com/IMIO/imio.dashboard/commit/622147062b4c0cc9f5a0c36cb81b74bec4eb8e3a" }, { "instruction": "what vulnarability does imio.prettylink version less then 1.20 have", "input": "", "output": "Having vulnarability PVE-2022-49410 Advisory: Imio.prettylink 1.20 escapes links content to avoid malicious behavior.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imio.prettylink version less then 1.20 have ### Response: Having vulnarability PVE-2022-49410 Advisory: Imio.prettylink 1.20 escapes links content to avoid malicious behavior." }, { "instruction": "what vulnarability does impacket version less then 0.9.18 have", "input": "", "output": "Having vulnarability PVE-2022-48479 Advisory: Impacket 0.9.18 uses cryptographically secure pseudo-random number generators when needed.\r\nhttps://github.com/SecureAuthCorp/impacket/commit/b789e61b9680dd156b50b0f6c2d9dbb1c15653e3", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does impacket version less then 0.9.18 have ### Response: Having vulnarability PVE-2022-48479 Advisory: Impacket 0.9.18 uses cryptographically secure pseudo-random number generators when needed.\r\nhttps://github.com/SecureAuthCorp/impacket/commit/b789e61b9680dd156b50b0f6c2d9dbb1c15653e3" }, { "instruction": "what vulnarability does impalacli version less then 0.1.6 have", "input": "", "output": "Having vulnarability CVE-2021-20270 Advisory: Impalacli 0.1.6 updates its dependency 'pygments' to v2.7.4 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does impalacli version less then 0.1.6 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Impalacli 0.1.6 updates its dependency 'pygments' to v2.7.4 to include security fixes." }, { "instruction": "what vulnarability does important-package version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45455 Advisory: Important-package is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does important-package version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45455 Advisory: Important-package is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html" }, { "instruction": "what vulnarability does importantpackage version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45454 Advisory: Importantpackage is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does importantpackage version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45454 Advisory: Importantpackage is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html" }, { "instruction": "what vulnarability does imread version greather then equal to 0.6,less then equal to 0.7.4 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Imread 0.6 throughout 0.7.4 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.\r\nhttps://inspector.pypi.io/project/imread/0.7.4/packages/61/03/5997926a43c42ef54ead9b62ad95416646b4f1cc59bc940f331d043b63fc/imread-0.7.4-cp27-cp27m-manylinux2010_x86_64.whl", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imread version greather then equal to 0.6,less then equal to 0.7.4 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Imread 0.6 throughout 0.7.4 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.\r\nhttps://inspector.pypi.io/project/imread/0.7.4/packages/61/03/5997926a43c42ef54ead9b62ad95416646b4f1cc59bc940f331d043b63fc/imread-0.7.4-cp27-cp27m-manylinux2010_x86_64.whl" }, { "instruction": "what vulnarability does in-toto version less then 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2020-36242 Advisory: In-toto version 1.0.1 updates its dependency \"cryptography\" to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does in-toto version less then 1.0.1 have ### Response: Having vulnarability CVE-2020-36242 Advisory: In-toto version 1.0.1 updates its dependency \"cryptography\" to include a security fix." }, { "instruction": "what vulnarability does inboard version less then 0.46.0 have", "input": "", "output": "Having vulnarability CVE-2023-29159 Advisory: Inboard 0.46.0 updates its dependency 'starlette' to version '0.27.0' to include a security fix.\r\nhttps://github.com/br3ndonland/inboard/commit/e6280fb3a7c03d5df5c75179a69856e0648b8abb\r\nhttps://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does inboard version less then 0.46.0 have ### Response: Having vulnarability CVE-2023-29159 Advisory: Inboard 0.46.0 updates its dependency 'starlette' to version '0.27.0' to include a security fix.\r\nhttps://github.com/br3ndonland/inboard/commit/e6280fb3a7c03d5df5c75179a69856e0648b8abb\r\nhttps://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px" }, { "instruction": "what vulnarability does incrivelsim version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51678 Advisory: Incrivelsim is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does incrivelsim version greather then 0 have ### Response: Having vulnarability PVE-2022-51678 Advisory: Incrivelsim is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does indico version less then 2.0.2 have", "input": "", "output": "Having vulnarability PVE-2021-35802 Advisory: indico before 2.0.2 uses a insecure transitive dependency (bleach).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does indico version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-35802 Advisory: indico before 2.0.2 uses a insecure transitive dependency (bleach)." }, { "instruction": "what vulnarability does indy-node version equal to 1.12.2 have", "input": "", "output": "Having vulnarability CVE-2020-11090 Advisory: In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, which leads to a view change. Repeated rapid view changes have the potential of bringing down the network. This is fixed in version 1.12.3.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does indy-node version equal to 1.12.2 have ### Response: Having vulnarability CVE-2020-11090 Advisory: In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, which leads to a view change. Repeated rapid view changes have the potential of bringing down the network. This is fixed in version 1.12.3." }, { "instruction": "what vulnarability does influx-prompt version less then 0.0.3 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Influx-prompt version 0.0.3 updates its dependency 'requests' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does influx-prompt version less then 0.0.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Influx-prompt version 0.0.3 updates its dependency 'requests' to include a security fix." }, { "instruction": "what vulnarability does influxable version less then 1.3.2 have", "input": "", "output": "Having vulnarability CVE-2019-9740 Advisory: Influxable 1.3.2 updates to 'python:3.9.2-buster' in Dockerfile to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does influxable version less then 1.3.2 have ### Response: Having vulnarability CVE-2019-9740 Advisory: Influxable 1.3.2 updates to 'python:3.9.2-buster' in Dockerfile to include security fixes." }, { "instruction": "what vulnarability does infobip-api-python-sdk version less then 5.0.1 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Infobip-api-python-sdk 5.0.1 updates its dependency 'requests' to v2.31.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does infobip-api-python-sdk version less then 5.0.1 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Infobip-api-python-sdk 5.0.1 updates its dependency 'requests' to v2.31.0 to include a security fix." }, { "instruction": "what vulnarability does informmodule version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52908 Advisory: Informmodule is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does informmodule version greather then 0 have ### Response: Having vulnarability PVE-2023-52908 Advisory: Informmodule is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html" }, { "instruction": "what vulnarability does infosys version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52917 Advisory: Infosys is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does infosys version greather then 0 have ### Response: Having vulnarability PVE-2023-52917 Advisory: Infosys is a malicious package. It delivers the W4SP Stealer Malware to your system.\r\nhttps://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html" }, { "instruction": "what vulnarability does infracheck version less then 1.7.rc2 have", "input": "", "output": "Having vulnarability PVE-2021-39200 Advisory: Infracheck 1.7.rc2 adds a `ssh-fingerprint` check, which verifies if any remote host fingerprint matches. This helps detecting man-in-the-middle and server takeover attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does infracheck version less then 1.7.rc2 have ### Response: Having vulnarability PVE-2021-39200 Advisory: Infracheck 1.7.rc2 adds a `ssh-fingerprint` check, which verifies if any remote host fingerprint matches. This helps detecting man-in-the-middle and server takeover attacks." }, { "instruction": "what vulnarability does injective-py version less then 0.5.6.4 have", "input": "", "output": "Having vulnarability PVE-2022-44884 Advisory: Injective-py 0.5.6.4 adds root CA certs for mainnet & testnet for secure gRPC connections by default.\r\nhttps://github.com/InjectiveLabs/sdk-python/commit/383301ab4b82016234729495f4bccdec3b6d5487", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does injective-py version less then 0.5.6.4 have ### Response: Having vulnarability PVE-2022-44884 Advisory: Injective-py 0.5.6.4 adds root CA certs for mainnet & testnet for secure gRPC connections by default.\r\nhttps://github.com/InjectiveLabs/sdk-python/commit/383301ab4b82016234729495f4bccdec3b6d5487" }, { "instruction": "what vulnarability does inquirer version less then 3.1.2 have", "input": "", "output": "Having vulnarability CVE-2022-24439 Advisory: Inquirer 3.1.2 updates its dependency 'GitPython' to v3.1.30 to include a security fix.\r\nhttps://github.com/magmax/python-inquirer/pull/331/commits/455f8b98cb402542810fb55bb717682101aeca27", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does inquirer version less then 3.1.2 have ### Response: Having vulnarability CVE-2022-24439 Advisory: Inquirer 3.1.2 updates its dependency 'GitPython' to v3.1.30 to include a security fix.\r\nhttps://github.com/magmax/python-inquirer/pull/331/commits/455f8b98cb402542810fb55bb717682101aeca27" }, { "instruction": "what vulnarability does insecure-package version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-25853 Advisory: Insecure-package 0.2.0 test vuln.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does insecure-package version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-25853 Advisory: Insecure-package 0.2.0 test vuln." }, { "instruction": "what vulnarability does insights-core version less then 3.2.12 have", "input": "", "output": "Having vulnarability CVE-2023-3972 Advisory: A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does insights-core version less then 3.2.12 have ### Response: Having vulnarability CVE-2023-3972 Advisory: A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide)." }, { "instruction": "what vulnarability does instack-undercloud version less then equal to 9.5.1 have", "input": "", "output": "Having vulnarability CVE-2022-3596 Advisory: Instack-undercloud is affected by CVE-2022-3596: This flaw allows unauthenticated, remote attackers to inspect sensitive data after discovering the IP address of the undercloud, possibly leading to compromising private information, including administrator access credentials.\r\nhttps://access.redhat.com/security/cve/CVE-2022-3596", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does instack-undercloud version less then equal to 9.5.1 have ### Response: Having vulnarability CVE-2022-3596 Advisory: Instack-undercloud is affected by CVE-2022-3596: This flaw allows unauthenticated, remote attackers to inspect sensitive data after discovering the IP address of the undercloud, possibly leading to compromising private information, including administrator access credentials.\r\nhttps://access.redhat.com/security/cve/CVE-2022-3596" }, { "instruction": "what vulnarability does installpy version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51681 Advisory: Installpy is a malicious package. It triggers the install of W4SP Stealer in your system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does installpy version greather then 0 have ### Response: Having vulnarability PVE-2022-51681 Advisory: Installpy is a malicious package. It triggers the install of W4SP Stealer in your system." }, { "instruction": "what vulnarability does installtool version less then 1.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Installtool 1.0 includes a security patch for the function 'XEQ' in 'installtool.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/l0r3zz/public/commit/ab00de531d125629c11811473bfee9e4063572b2#diff-4f5fe0b656de6953412f12024a4e76b35b618409e88f79d86e52c52c020dac58", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does installtool version less then 1.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Installtool 1.0 includes a security patch for the function 'XEQ' in 'installtool.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/l0r3zz/public/commit/ab00de531d125629c11811473bfee9e4063572b2#diff-4f5fe0b656de6953412f12024a4e76b35b618409e88f79d86e52c52c020dac58" }, { "instruction": "what vulnarability does instana version less then 1.20.2 have", "input": "", "output": "Having vulnarability PVE-2021-34809 Advisory: Instana 1.20.2 upgrades the `event-loop-lag` because of security vulnerabilities in its dependency tree.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does instana version less then 1.20.2 have ### Response: Having vulnarability PVE-2021-34809 Advisory: Instana 1.20.2 upgrades the `event-loop-lag` because of security vulnerabilities in its dependency tree." }, { "instruction": "what vulnarability does instawow version less then 1.35.0 have", "input": "", "output": "Having vulnarability PVE-2021-43742 Advisory: Instawow 1.35.0 improves security by refusing requests to the RPC API which do not originate from the Instawow client (same origin).\r\nhttps://github.com/layday/instawow/commit/478d86bd06819a099c679d4b64d739c0a70080a8", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does instawow version less then 1.35.0 have ### Response: Having vulnarability PVE-2021-43742 Advisory: Instawow 1.35.0 improves security by refusing requests to the RPC API which do not originate from the Instawow client (same origin).\r\nhttps://github.com/layday/instawow/commit/478d86bd06819a099c679d4b64d739c0a70080a8" }, { "instruction": "what vulnarability does intel-extension-for-transformers version less then 1.2.2 have", "input": "", "output": "Having vulnarability PVE-2024-64374 Advisory: Intel-extension-for-transformers 1.2.2 escapes SQL strings for SDL to prevent SQL injections.\r\nhttps://github.com/intel/intel-extension-for-transformers/commit/43e8b9a9ee9fa7b27176fe14505f435f7add3620", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intel-extension-for-transformers version less then 1.2.2 have ### Response: Having vulnarability PVE-2024-64374 Advisory: Intel-extension-for-transformers 1.2.2 escapes SQL strings for SDL to prevent SQL injections.\r\nhttps://github.com/intel/intel-extension-for-transformers/commit/43e8b9a9ee9fa7b27176fe14505f435f7add3620" }, { "instruction": "what vulnarability does intel-opencl-rt version less then 2022.1 have", "input": "", "output": "Having vulnarability CVE-2022-26032 Advisory: Intel-opencl-rt 2022.1 includes a fix for CVE-2022-26032: Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access.\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intel-opencl-rt version less then 2022.1 have ### Response: Having vulnarability CVE-2022-26032 Advisory: Intel-opencl-rt 2022.1 includes a fix for CVE-2022-26032: Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access.\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html" }, { "instruction": "what vulnarability does intel-tensorflow version less then 1.12.2 have", "input": "", "output": "Having vulnarability CVE-2019-9635 Advisory: NULL pointer dereference in Intel-tensorflow before 1.12.2 could cause a denial of service via an invalid GIF file. See CVE-2019-9635.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intel-tensorflow version less then 1.12.2 have ### Response: Having vulnarability CVE-2019-9635 Advisory: NULL pointer dereference in Intel-tensorflow before 1.12.2 could cause a denial of service via an invalid GIF file. See CVE-2019-9635." }, { "instruction": "what vulnarability does intel-tensorflow-avx512 version less then 1.15.4,greather then equal to 2.0.0a0,less then 2.0.3,greather then equal to 2.1.0a0,less then 2.1.2,greather then equal to 2.2.0a0,less then 2.2.1,greather then equal to 2.3.0a0,less then 2.3.1 have", "input": "", "output": "Having vulnarability CVE-2020-15195 Advisory: Intel-tensorflow-avx512 versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 include a fix for CVE-2020-15195: In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of 'SparseFillEmptyRowsGrad' uses a double indexing pattern. It is possible for 'reverse_index_map(i)' to be an index outside of bounds of 'grad_values', thus resulting in a heap buffer overflow.\nhttps://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intel-tensorflow-avx512 version less then 1.15.4,greather then equal to 2.0.0a0,less then 2.0.3,greather then equal to 2.1.0a0,less then 2.1.2,greather then equal to 2.2.0a0,less then 2.2.1,greather then equal to 2.3.0a0,less then 2.3.1 have ### Response: Having vulnarability CVE-2020-15195 Advisory: Intel-tensorflow-avx512 versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 include a fix for CVE-2020-15195: In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of 'SparseFillEmptyRowsGrad' uses a double indexing pattern. It is possible for 'reverse_index_map(i)' to be an index outside of bounds of 'grad_values', thus resulting in a heap buffer overflow.\nhttps://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr" }, { "instruction": "what vulnarability does intelmq version less then equal to 2.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-38326 Advisory: Intelmq through 2.1.1 is not secure. Its backend incorrectly handles messages given by user-input in the \"send\" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the web server.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intelmq version less then equal to 2.1.1 have ### Response: Having vulnarability PVE-2021-38326 Advisory: Intelmq through 2.1.1 is not secure. Its backend incorrectly handles messages given by user-input in the \"send\" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the web server." }, { "instruction": "what vulnarability does intelmq-manager version greather then equal to 1.1.0,less then 2.1.1 have", "input": "", "output": "Having vulnarability CVE-2020-11016 Advisory: Intelmq-manager 2.1.1 includes a fix for CVE-2020-11016: IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the \"send\" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intelmq-manager version greather then equal to 1.1.0,less then 2.1.1 have ### Response: Having vulnarability CVE-2020-11016 Advisory: Intelmq-manager 2.1.1 includes a fix for CVE-2020-11016: IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the \"send\" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver." }, { "instruction": "what vulnarability does intensity-normalization version less then 2.1.2 have", "input": "", "output": "Having vulnarability CVE-2021-3572 Advisory: Intensity-normalization 2.1.2 updates its dependency 'pip' minimum version to v21.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intensity-normalization version less then 2.1.2 have ### Response: Having vulnarability CVE-2021-3572 Advisory: Intensity-normalization 2.1.2 updates its dependency 'pip' minimum version to v21.3 to include a security fix." }, { "instruction": "what vulnarability does intermine version less then 1.12.0 have", "input": "", "output": "Having vulnarability CVE-2018-19787 Advisory: Intermine 1.12.0 (Intermine client library) updates its dependency 'lxml' to v4.5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intermine version less then 1.12.0 have ### Response: Having vulnarability CVE-2018-19787 Advisory: Intermine 1.12.0 (Intermine client library) updates its dependency 'lxml' to v4.5.1 to include a security fix." }, { "instruction": "what vulnarability does internetarchive version less then 3.1.0 have", "input": "", "output": "Having vulnarability PVE-2023-63160 Advisory: Internetarchive 3.1.0 mitigates a potential race condition leading to a Time-of-Check-to-Time-of-Use (TOCTOU) vulnerability. The fix ensures only one thread creates a directory, preventing simultaneous attempts from multiple threads, which could lead to unexpected behaviors or errors.\r\nhttps://github.com/jjjake/internetarchive/commit/9b075207efb49e8d2ea90c52bad55353d4adaf60", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does internetarchive version less then 3.1.0 have ### Response: Having vulnarability PVE-2023-63160 Advisory: Internetarchive 3.1.0 mitigates a potential race condition leading to a Time-of-Check-to-Time-of-Use (TOCTOU) vulnerability. The fix ensures only one thread creates a directory, preventing simultaneous attempts from multiple threads, which could lead to unexpected behaviors or errors.\r\nhttps://github.com/jjjake/internetarchive/commit/9b075207efb49e8d2ea90c52bad55353d4adaf60" }, { "instruction": "what vulnarability does interpret-community version less then 0.12.1 have", "input": "", "output": "Having vulnarability PVE-2021-38442 Advisory: Interpret-community 0.12.1 upgrades websocket-extensions for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does interpret-community version less then 0.12.1 have ### Response: Having vulnarability PVE-2021-38442 Advisory: Interpret-community 0.12.1 upgrades websocket-extensions for security reasons." }, { "instruction": "what vulnarability does invenio version less then 0.99.0 have", "input": "", "output": "Having vulnarability PVE-2021-38734 Advisory: Invenio 0.99.0 fixes an alert deletion tool vulnerability (WebAlert), it includes a new password reset mechanism using new secure mail cookies and temporary role membership facilities (WebAccess, WebSession), and it also includes a script that will update your local user table in order to use encrypted passwords for more security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio version less then 0.99.0 have ### Response: Having vulnarability PVE-2021-38734 Advisory: Invenio 0.99.0 fixes an alert deletion tool vulnerability (WebAlert), it includes a new password reset mechanism using new secure mail cookies and temporary role membership facilities (WebAccess, WebSession), and it also includes a script that will update your local user table in order to use encrypted passwords for more security." }, { "instruction": "what vulnarability does invenio-admin version less then 1.0.1,equal to 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2018-16516 Advisory: Invenio-admin 1.1.1 and 1.0.1 update its dependency 'Flask-Admin' to v1.5.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-admin version less then 1.0.1,equal to 1.1.0 have ### Response: Having vulnarability CVE-2018-16516 Advisory: Invenio-admin 1.1.1 and 1.0.1 update its dependency 'Flask-Admin' to v1.5.3 to include a security fix." }, { "instruction": "what vulnarability does invenio-app version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2019-1020006 Advisory: Invenio-app 1.1.1 fixes a security issue where APP_ALLOWED_HOSTS was not always being checked, and thus could allow host header injection attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-app version less then 1.1.1 have ### Response: Having vulnarability CVE-2019-1020006 Advisory: Invenio-app 1.1.1 fixes a security issue where APP_ALLOWED_HOSTS was not always being checked, and thus could allow host header injection attacks." }, { "instruction": "what vulnarability does invenio-app-ils version less then 1.0.0a28 have", "input": "", "output": "Having vulnarability PVE-2021-40030 Advisory: Invenio-app-ils 1.0.0a28 adds cookies configuration for improved security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-app-ils version less then 1.0.0a28 have ### Response: Having vulnarability PVE-2021-40030 Advisory: Invenio-app-ils 1.0.0a28 adds cookies configuration for improved security." }, { "instruction": "what vulnarability does invenio-app-rdm version greather then equal to 0,less then 6.0.5,greather then equal to 7.0.0.dev0,less then 7.0.0.dev5 have", "input": "", "output": "Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-app-rdm version greather then equal to 0,less then 6.0.5,greather then equal to 7.0.0.dev0,less then 7.0.0.dev5 have ### Response: Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively." }, { "instruction": "what vulnarability does invenio-communities version less then 1.0.0a20 have", "input": "", "output": "Having vulnarability CVE-2019-1020005 Advisory: invenio-communities before 1.0.0a20 allows XSS.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-communities version less then 1.0.0a20 have ### Response: Having vulnarability CVE-2019-1020005 Advisory: invenio-communities before 1.0.0a20 allows XSS." }, { "instruction": "what vulnarability does invenio-drafts-resources version greather then equal to 0,less then 0.13.7,greather then equal to 0.14.0,less then 0.14.6 have", "input": "", "output": "Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-drafts-resources version greather then equal to 0,less then 0.13.7,greather then equal to 0.14.0,less then 0.14.6 have ### Response: Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively." }, { "instruction": "what vulnarability does invenio-github version less then 1.0.2 have", "input": "", "output": "Having vulnarability PVE-2023-59972 Advisory: Invenio-github 1.0.2 includes a fix for a CSRF vulnerability for API requests.\r\nhttps://github.com/inveniosoftware/invenio-github/commit/c0600e6d6586c0980fbfda73945527bbd77f1dce", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-github version less then 1.0.2 have ### Response: Having vulnarability PVE-2023-59972 Advisory: Invenio-github 1.0.2 includes a fix for a CSRF vulnerability for API requests.\r\nhttps://github.com/inveniosoftware/invenio-github/commit/c0600e6d6586c0980fbfda73945527bbd77f1dce" }, { "instruction": "what vulnarability does invenio-previewer version less then 1.0.0a12 have", "input": "", "output": "Having vulnarability CVE-2019-1020019 Advisory: invenio-previewer before 1.0.0a12 allows XSS.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-previewer version less then 1.0.0a12 have ### Response: Having vulnarability CVE-2019-1020019 Advisory: invenio-previewer before 1.0.0a12 allows XSS." }, { "instruction": "what vulnarability does invenio-rdm-records version greather then equal to 0,less then 0.32.6,greather then equal to 0.33.0,less then 0.33.10 have", "input": "", "output": "Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-rdm-records version greather then equal to 0,less then 0.32.6,greather then equal to 0.33.0,less then 0.33.10 have ### Response: Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively." }, { "instruction": "what vulnarability does invenio-records version less then 1.0.2,equal to 1.1.0,greather then equal to 1.2.0,less then 1.2.2 have", "input": "", "output": "Having vulnarability CVE-2019-1020003 Advisory: Invenio-records versions 1.0.2, 1.1.1 and 1.2.2 include a fix for CVE-2019-1020003, a XSS vulnerability.\r\nhttps://github.com/inveniosoftware/invenio-records/security/advisories/GHSA-vxh3-mvv7-265j", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-records version less then 1.0.2,equal to 1.1.0,greather then equal to 1.2.0,less then 1.2.2 have ### Response: Having vulnarability CVE-2019-1020003 Advisory: Invenio-records versions 1.0.2, 1.1.1 and 1.2.2 include a fix for CVE-2019-1020003, a XSS vulnerability.\r\nhttps://github.com/inveniosoftware/invenio-records/security/advisories/GHSA-vxh3-mvv7-265j" }, { "instruction": "what vulnarability does invenio-search version less then 0.1.3 have", "input": "", "output": "Having vulnarability PVE-2021-25856 Advisory: Invenio-search 0.1.3 fixes a potential XSS issues by changing search flash messages template so that they are not displayed as safe HTML by default.\r\nhttps://github.com/inveniosoftware/invenio-search/commit/deb2fe3213d6f8dcab41714a579dd13dcfba6e87", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-search version less then 0.1.3 have ### Response: Having vulnarability PVE-2021-25856 Advisory: Invenio-search 0.1.3 fixes a potential XSS issues by changing search flash messages template so that they are not displayed as safe HTML by default.\r\nhttps://github.com/inveniosoftware/invenio-search/commit/deb2fe3213d6f8dcab41714a579dd13dcfba6e87" }, { "instruction": "what vulnarability does inventree version less then 0.7.2 have", "input": "", "output": "Having vulnarability CVE-2022-2113 Advisory: Cross-site Scripting (XSS) - Stored in GitHub repository inventree/inventree prior to 0.7.2.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does inventree version less then 0.7.2 have ### Response: Having vulnarability CVE-2022-2113 Advisory: Cross-site Scripting (XSS) - Stored in GitHub repository inventree/inventree prior to 0.7.2." }, { "instruction": "what vulnarability does invokeai version less then 2.0.2 have", "input": "", "output": "Having vulnarability CVE-2022-1941 Advisory: Invokeai 2.0.2 updates its dependency, protobuf, from version 3.19.4 to 3.19.6. This update was prompted by a vulnerability identified as CVE-2022-1941.\r\nhttps://github.com/invoke-ai/InvokeAI/commit/90d37eac034592cc3aed5a15a98971801b21988e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invokeai version less then 2.0.2 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Invokeai 2.0.2 updates its dependency, protobuf, from version 3.19.4 to 3.19.6. This update was prompted by a vulnerability identified as CVE-2022-1941.\r\nhttps://github.com/invoke-ai/InvokeAI/commit/90d37eac034592cc3aed5a15a98971801b21988e" }, { "instruction": "what vulnarability does iotedgehubdev version less then 0.14.5 have", "input": "", "output": "Having vulnarability PVE-2021-40098 Advisory: Lotedgehubdev 0.14.5 upgrades underlying dependencies to address vulnerability issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iotedgehubdev version less then 0.14.5 have ### Response: Having vulnarability PVE-2021-40098 Advisory: Lotedgehubdev 0.14.5 upgrades underlying dependencies to address vulnerability issues." }, { "instruction": "what vulnarability does ipa version less then 4.1.2 have", "input": "", "output": "Having vulnarability CVE-2014-7850 Advisory: Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipa version less then 4.1.2 have ### Response: Having vulnarability CVE-2014-7850 Advisory: Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation." }, { "instruction": "what vulnarability does ipahttp version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47818 Advisory: Ipahttp is a malicious package, typosquatting.\r\nhttps://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipahttp version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47818 Advisory: Ipahttp is a malicious package, typosquatting.\r\nhttps://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library" }, { "instruction": "what vulnarability does ipams version less then 1.3.3 have", "input": "", "output": "Having vulnarability CVE-2023-32681 Advisory: Ipams 1.3.3 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/rwxd/ipams/commit/0f54f1f30b0446594eb3c245882e00dd728dabba", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipams version less then 1.3.3 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Ipams 1.3.3 updates its dependency 'requests' to version '2.31.0' to include a security fix.\r\nhttps://github.com/rwxd/ipams/commit/0f54f1f30b0446594eb3c245882e00dd728dabba" }, { "instruction": "what vulnarability does ipboards version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45457 Advisory: Ipboards is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipboards version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45457 Advisory: Ipboards is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.\r\nhttps://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html" }, { "instruction": "what vulnarability does ipp version less then 2019.1 have", "input": "", "output": "Having vulnarability PVE-2022-48449 Advisory: Ipp 2019.1 fixes a potential security problem in the AES-CTR cipher functions.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipp version less then 2019.1 have ### Response: Having vulnarability PVE-2022-48449 Advisory: Ipp 2019.1 fixes a potential security problem in the AES-CTR cipher functions." }, { "instruction": "what vulnarability does ipp-crypto version less then 2021.7 have", "input": "", "output": "Having vulnarability PVE-2023-54738 Advisory: Ipp-crypto 2021.7 adds mitigation for Frequency Throttling Side-Channel attacks for ECB, CMAC and GCM modes of AES.\r\nhttps://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/frequency-throttling-side-channel-guidance.html", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipp-crypto version less then 2021.7 have ### Response: Having vulnarability PVE-2023-54738 Advisory: Ipp-crypto 2021.7 adds mitigation for Frequency Throttling Side-Channel attacks for ECB, CMAC and GCM modes of AES.\r\nhttps://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/frequency-throttling-side-channel-guidance.html" }, { "instruction": "what vulnarability does ipsilon version less then 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2015-5217 Advisory: providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipsilon version less then 1.0.1 have ### Response: Having vulnarability CVE-2015-5217 Advisory: providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name." }, { "instruction": "what vulnarability does ipwb version less then 0.2018.08.29.1434 have", "input": "", "output": "Having vulnarability CVE-2018-1000656 Advisory: Ipwb 0.2018.08.29.1434 updates its dependency 'Flask' to v0.12.3 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipwb version less then 0.2018.08.29.1434 have ### Response: Having vulnarability CVE-2018-1000656 Advisory: Ipwb 0.2018.08.29.1434 updates its dependency 'Flask' to v0.12.3 to include security fixes." }, { "instruction": "what vulnarability does ipycache version greather then equal to 0,less then equal to 0.1.4 have", "input": "", "output": "Having vulnarability CVE-2019-7539 Advisory: A code injection issue was discovered in ipycache through 2016-05-31.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipycache version greather then equal to 0,less then equal to 0.1.4 have ### Response: Having vulnarability CVE-2019-7539 Advisory: A code injection issue was discovered in ipycache through 2016-05-31." }, { "instruction": "what vulnarability does ipyflow version less then 0.0.69 have", "input": "", "output": "Having vulnarability CVE-2020-7760 Advisory: Ipyflow 0.0.69 updates its NPM dependency 'codemirror' to v5.58.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipyflow version less then 0.0.69 have ### Response: Having vulnarability CVE-2020-7760 Advisory: Ipyflow 0.0.69 updates its NPM dependency 'codemirror' to v5.58.3 to include a security fix." }, { "instruction": "what vulnarability does ipyhton version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51743 Advisory: Ipyhton is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipyhton version greather then 0 have ### Response: Having vulnarability PVE-2022-51743 Advisory: Ipyhton is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does ipython version less then 3.2.0 have", "input": "", "output": "Having vulnarability CVE-2015-4707 Advisory: Cross-site scripting (XSS) vulnerability in IPython before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/notebooks path.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipython version less then 3.2.0 have ### Response: Having vulnarability CVE-2015-4707 Advisory: Cross-site scripting (XSS) vulnerability in IPython before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/notebooks path." }, { "instruction": "what vulnarability does ipyvue-remote-component version less then 1.1.1 have", "input": "", "output": "Having vulnarability CVE-2021-3807 Advisory: Ipyvue-remote-component 1.1.1 updates its NPM dependency 'ansi-regex' to v5.0.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipyvue-remote-component version less then 1.1.1 have ### Response: Having vulnarability CVE-2021-3807 Advisory: Ipyvue-remote-component 1.1.1 updates its NPM dependency 'ansi-regex' to v5.0.1 to include a security fix." }, { "instruction": "what vulnarability does ipyvue-time-series version less then 1.0.2 have", "input": "", "output": "Having vulnarability CVE-2021-23364 Advisory: Ipyvue-time-series 1.0.2 updates its NPM dependency 'browserslist' to v4.16.6 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipyvue-time-series version less then 1.0.2 have ### Response: Having vulnarability CVE-2021-23364 Advisory: Ipyvue-time-series 1.0.2 updates its NPM dependency 'browserslist' to v4.16.6 to include a security fix." }, { "instruction": "what vulnarability does ipywidgets version less then 8.0.0 have", "input": "", "output": "Having vulnarability PVE-2022-50664 Advisory: Ipywidgets 8.0.0 sanitizes descriptions by default.\r\nhttps://github.com/jupyter-widgets/ipywidgets/pull/2785", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipywidgets version less then 8.0.0 have ### Response: Having vulnarability PVE-2022-50664 Advisory: Ipywidgets 8.0.0 sanitizes descriptions by default.\r\nhttps://github.com/jupyter-widgets/ipywidgets/pull/2785" }, { "instruction": "what vulnarability does irc3 version less then 0.4.4 have", "input": "", "output": "Having vulnarability PVE-2021-25859 Advisory: irc3 before 0.4.4 is vulnerable to several undisclosed security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does irc3 version less then 0.4.4 have ### Response: Having vulnarability PVE-2021-25859 Advisory: irc3 before 0.4.4 is vulnerable to several undisclosed security issues." }, { "instruction": "what vulnarability does iroin-python-pptx version less then 0.6.12 have", "input": "", "output": "Having vulnarability CVE-2016-0775 Advisory: Iroin-python-pptx 0.6.12 updates its dependency 'pillow' to v3.3.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iroin-python-pptx version less then 0.6.12 have ### Response: Having vulnarability CVE-2016-0775 Advisory: Iroin-python-pptx 0.6.12 updates its dependency 'pillow' to v3.3.2 to include security fixes." }, { "instruction": "what vulnarability does ironic version less then 4.2.2 have", "input": "", "output": "Having vulnarability CVE-2015-7514 Advisory: OpenStack Ironic 4.2.0 through 4.2.1 does not \"clean\" the disk after use, which allows remote authenticated users to obtain sensitive information.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ironic version less then 4.2.2 have ### Response: Having vulnarability CVE-2015-7514 Advisory: OpenStack Ironic 4.2.0 through 4.2.1 does not \"clean\" the disk after use, which allows remote authenticated users to obtain sensitive information." }, { "instruction": "what vulnarability does ironic-discoverd version less then 2.3.0 have", "input": "", "output": "Having vulnarability CVE-2015-5306 Advisory: Ironic-inspector (aka ironic-discoverd) 2.3.0 includes a fix for CVE-2015-5306: When debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error.\r\nhttps://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ironic-discoverd version less then 2.3.0 have ### Response: Having vulnarability CVE-2015-5306 Advisory: Ironic-inspector (aka ironic-discoverd) 2.3.0 includes a fix for CVE-2015-5306: When debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error.\r\nhttps://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f" }, { "instruction": "what vulnarability does ironic-inspector version less then 2.3.0 have", "input": "", "output": "Having vulnarability CVE-2015-5306 Advisory: Ironic-inspector 2.3.0 includes a fix for CVE-2015-5306: When debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error.\r\nhttps://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ironic-inspector version less then 2.3.0 have ### Response: Having vulnarability CVE-2015-5306 Advisory: Ironic-inspector 2.3.0 includes a fix for CVE-2015-5306: When debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error.\r\nhttps://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f" }, { "instruction": "what vulnarability does irrd version greather then equal to 4.2.0,less then 4.2.3 have", "input": "", "output": "Having vulnarability CVE-2022-24798 Advisory: Irrd 4.2.3 includes a fix for CVE-2022-24798: IRRd did not always filter password hashes in query responses relating to 'mntner' objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected. This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. There are no known workarounds for this issue.\r\nhttps://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does irrd version greather then equal to 4.2.0,less then 4.2.3 have ### Response: Having vulnarability CVE-2022-24798 Advisory: Irrd 4.2.3 includes a fix for CVE-2022-24798: IRRd did not always filter password hashes in query responses relating to 'mntner' objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected. This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. There are no known workarounds for this issue.\r\nhttps://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw" }, { "instruction": "what vulnarability does irssi version less then 1.1.2 have", "input": "", "output": "Having vulnarability CVE-2019-5882 Advisory: Irssi 1.1.x before 1.1.2 has a use after free when hidden lines are expired from the scroll buffer.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does irssi version less then 1.1.2 have ### Response: Having vulnarability CVE-2019-5882 Advisory: Irssi 1.1.x before 1.1.2 has a use after free when hidden lines are expired from the scroll buffer." }, { "instruction": "what vulnarability does iscc-core version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2023-52828 Advisory: Iscc-core 0.2.0 uses a cryptographycally safe random choice function.\r\nhttps://github.com/iscc/iscc-core/commit/87570e28fb14fd016bc0f1938d1a23397a98edb4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iscc-core version less then 0.2.0 have ### Response: Having vulnarability PVE-2023-52828 Advisory: Iscc-core 0.2.0 uses a cryptographycally safe random choice function.\r\nhttps://github.com/iscc/iscc-core/commit/87570e28fb14fd016bc0f1938d1a23397a98edb4" }, { "instruction": "what vulnarability does iso6709 version less then 0.1.4 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Iso6709 0.1.4 updates its dependency 'requests' to v2.22.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iso6709 version less then 0.1.4 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Iso6709 0.1.4 updates its dependency 'requests' to v2.22.2 to include a security fix." }, { "instruction": "what vulnarability does isogeo-export-xl version less then 1.3.0 have", "input": "", "output": "Having vulnarability CVE-2020-6802 Advisory: Isogeo-export-xl 1.3.0 updates its dependency 'bleach' to v3.1.1. to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does isogeo-export-xl version less then 1.3.0 have ### Response: Having vulnarability CVE-2020-6802 Advisory: Isogeo-export-xl 1.3.0 updates its dependency 'bleach' to v3.1.1. to include a security fix." }, { "instruction": "what vulnarability does isso version less then 0.6 have", "input": "", "output": "Having vulnarability PVE-2021-25862 Advisory: isso 0.6 fixes a cross-site request forgery vulnerability for comment creation, voting, editing and deletion.\r\nhttps://github.com/isso-comments/isso/commit/8d22ab3f4646b51161878835566695ee39083511\r\nhttps://github.com/isso-comments/isso/commit/232e2fb474730612c760391b87b3e4f15cb6dfaf", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does isso version less then 0.6 have ### Response: Having vulnarability PVE-2021-25862 Advisory: isso 0.6 fixes a cross-site request forgery vulnerability for comment creation, voting, editing and deletion.\r\nhttps://github.com/isso-comments/isso/commit/8d22ab3f4646b51161878835566695ee39083511\r\nhttps://github.com/isso-comments/isso/commit/232e2fb474730612c760391b87b3e4f15cb6dfaf" }, { "instruction": "what vulnarability does isso-cn version less then 0.6 have", "input": "", "output": "Having vulnarability PVE-2021-37714 Advisory: Isso-cn 0.6 fixes a cross-site request forgery vulnerability for comment creation, voting, editing and deletion.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does isso-cn version less then 0.6 have ### Response: Having vulnarability PVE-2021-37714 Advisory: Isso-cn 0.6 fixes a cross-site request forgery vulnerability for comment creation, voting, editing and deletion." }, { "instruction": "what vulnarability does itutor-fastapi-middlewares version less then 0.0.3 have", "input": "", "output": "Having vulnarability CVE-2021-41945 Advisory: Itutor-fastapi-middlewares 0.0.3 updates its dependency 'httpx' to v0.23.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does itutor-fastapi-middlewares version less then 0.0.3 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Itutor-fastapi-middlewares 0.0.3 updates its dependency 'httpx' to v0.23.0 to include a security fix." }, { "instruction": "what vulnarability does jageocoder version less then 2.0.2 have", "input": "", "output": "Having vulnarability CVE-2023-30861 Advisory: Jageocoder 2.0.2 updates its dependency 'flask' to version '2.2.5' to include a security fix.\r\nhttps://github.com/t-sagara/jageocoder/commit/d6aae38a75089863c1eae574f2c93027228a6ca8", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jageocoder version less then 2.0.2 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Jageocoder 2.0.2 updates its dependency 'flask' to version '2.2.5' to include a security fix.\r\nhttps://github.com/t-sagara/jageocoder/commit/d6aae38a75089863c1eae574f2c93027228a6ca8" }, { "instruction": "what vulnarability does jake version less then 0.2.59 have", "input": "", "output": "Having vulnarability CVE-2020-27783 Advisory: Jake 0.2.59 updates its dependency 'lxml' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jake version less then 0.2.59 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Jake 0.2.59 updates its dependency 'lxml' to include a security fix." }, { "instruction": "what vulnarability does jaraco-abode version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2022-51477 Advisory: Jaraco.abode 0.7.0 doesn't store passwords in cache files to avoid a potential information disclosure vulnerability.\r\nhttps://github.com/jaraco/jaraco.abode/commit/2fc5844f8f961a41a9ab0d3268927755fac1aad7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jaraco-abode version less then 0.7.0 have ### Response: Having vulnarability PVE-2022-51477 Advisory: Jaraco.abode 0.7.0 doesn't store passwords in cache files to avoid a potential information disclosure vulnerability.\r\nhttps://github.com/jaraco/jaraco.abode/commit/2fc5844f8f961a41a9ab0d3268927755fac1aad7" }, { "instruction": "what vulnarability does jarvis-ui version less then 0.2.8 have", "input": "", "output": "Having vulnarability PVE-2022-49685 Advisory: Jarvis-ui 0.2.8 hexlifies token to secure it over internet.\r\nhttps://github.com/thevickypedia/Jarvis_UI/commit/f6bca8b2d9785890a96b7db3e74ea816978c7bc4", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jarvis-ui version less then 0.2.8 have ### Response: Having vulnarability PVE-2022-49685 Advisory: Jarvis-ui 0.2.8 hexlifies token to secure it over internet.\r\nhttps://github.com/thevickypedia/Jarvis_UI/commit/f6bca8b2d9785890a96b7db3e74ea816978c7bc4" }, { "instruction": "what vulnarability does jcrypt version less then 1.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-38425 Advisory: The encryption method in Jcrypt 1.1.0 includes security and speed improvements.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jcrypt version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-38425 Advisory: The encryption method in Jcrypt 1.1.0 includes security and speed improvements." }, { "instruction": "what vulnarability does jcvi version less then equal to 1.3.5 have", "input": "", "output": "Having vulnarability CVE-2023-35932 Advisory: Jcvi 1.3.6 includes a fix for a configuration injection vulnerability.\r\nhttps://github.com/tanghaibao/jcvi/commit/d1cf612b650627dac07427c67e4fbd74d3ab8ada\r\nhttps://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jcvi version less then equal to 1.3.5 have ### Response: Having vulnarability CVE-2023-35932 Advisory: Jcvi 1.3.6 includes a fix for a configuration injection vulnerability.\r\nhttps://github.com/tanghaibao/jcvi/commit/d1cf612b650627dac07427c67e4fbd74d3ab8ada\r\nhttps://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q" }, { "instruction": "what vulnarability does jeIlyfish version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2021-38694 Advisory: JeIlyfish is a malicious Python library caught stealing SSH and GPG keys. Note that the first \"L\" is a capital \"i\". Reference: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jeIlyfish version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-38694 Advisory: JeIlyfish is a malicious Python library caught stealing SSH and GPG keys. Note that the first \"L\" is a capital \"i\". Reference: ." }, { "instruction": "what vulnarability does jefferson version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2023-0592 Advisory: A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory. This issue affects jefferson before 0.4.1.\r\nhttps://github.com/sviehb/jefferson/commit/971aca1a8b3b9f4fcb4674fa9621d3349195cdc6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jefferson version less then 0.4.1 have ### Response: Having vulnarability CVE-2023-0592 Advisory: A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory. This issue affects jefferson before 0.4.1.\r\nhttps://github.com/sviehb/jefferson/commit/971aca1a8b3b9f4fcb4674fa9621d3349195cdc6" }, { "instruction": "what vulnarability does jellyfin-mpv-shim version less then 2.0.2 have", "input": "", "output": "Having vulnarability CVE-2021-30145 Advisory: Jellyfin-mpv-shim 2.0.2 updates its 'MPV' build to version '20211219' to include a security fix.\r\nhttps://github.com/jellyfin/jellyfin-mpv-shim/commit/618752c4792ba59d5b3f481950f4d254c652ec31", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jellyfin-mpv-shim version less then 2.0.2 have ### Response: Having vulnarability CVE-2021-30145 Advisory: Jellyfin-mpv-shim 2.0.2 updates its 'MPV' build to version '20211219' to include a security fix.\r\nhttps://github.com/jellyfin/jellyfin-mpv-shim/commit/618752c4792ba59d5b3f481950f4d254c652ec31" }, { "instruction": "what vulnarability does jetforce version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-38130 Advisory: For security, unhandled exceptions in jetforce 0.2.0 display a generic error message instead of the plain exception string.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jetforce version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-38130 Advisory: For security, unhandled exceptions in jetforce 0.2.0 display a generic error message instead of the plain exception string." }, { "instruction": "what vulnarability does jetson-stats version less then 4.2.4 have", "input": "", "output": "Having vulnarability PVE-2023-99925 Advisory: Jetson-stats 4.2.4 updates its dependency 'tornado' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jetson-stats version less then 4.2.4 have ### Response: Having vulnarability PVE-2023-99925 Advisory: Jetson-stats 4.2.4 updates its dependency 'tornado' to include a security fix." }, { "instruction": "what vulnarability does jiant version less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2019-14751 Advisory: Jiant 1.2.0 updates the NLTK requirement to version 3.4.5 to avoid a potential security issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jiant version less then 1.2.0 have ### Response: Having vulnarability CVE-2019-14751 Advisory: Jiant 1.2.0 updates the NLTK requirement to version 3.4.5 to avoid a potential security issue." }, { "instruction": "what vulnarability does jina version less then 2.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-29536 Advisory: Jina version 2.0.0 updates its dependency \"Tensorflow\" to v2.4.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jina version less then 2.0.0 have ### Response: Having vulnarability CVE-2021-29536 Advisory: Jina version 2.0.0 updates its dependency \"Tensorflow\" to v2.4.2 to include security fixes." }, { "instruction": "what vulnarability does jinja2 version less then 2.11.3 have", "input": "", "output": "Having vulnarability CVE-2020-28493 Advisory: This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the '_punctuation_re regex' operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jinja2 version less then 2.11.3 have ### Response: Having vulnarability CVE-2020-28493 Advisory: This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the '_punctuation_re regex' operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory." }, { "instruction": "what vulnarability does jinjafx version less then 1.3.4 have", "input": "", "output": "Having vulnarability CVE-2020-14343 Advisory: JinjaFx v1.3.4 fixes a code execution vulnerability related with YAML parsing.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jinjafx version less then 1.3.4 have ### Response: Having vulnarability CVE-2020-14343 Advisory: JinjaFx v1.3.4 fixes a code execution vulnerability related with YAML parsing." }, { "instruction": "what vulnarability does jira-commands version less then 0.12.1 have", "input": "", "output": "Having vulnarability CVE-2022-23491 Advisory: Jira-commands 0.12.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jira-commands version less then 0.12.1 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Jira-commands 0.12.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix." }, { "instruction": "what vulnarability does jnitrace version less then 2.2.1 have", "input": "", "output": "Having vulnarability PVE-2021-37427 Advisory: Jnitrace 2.2.1 upgrades eslint-package to patch security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jnitrace version less then 2.2.1 have ### Response: Having vulnarability PVE-2021-37427 Advisory: Jnitrace 2.2.1 upgrades eslint-package to patch security vulnerability." }, { "instruction": "what vulnarability does jno version less then equal to 0.4.0 have", "input": "", "output": "Having vulnarability CVE-2021-44832 Advisory: Jno 0.4.0 and prior uses a version of Arduino IDE that depends on a version of 'log4j' containing severe and critical vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jno version less then equal to 0.4.0 have ### Response: Having vulnarability CVE-2021-44832 Advisory: Jno 0.4.0 and prior uses a version of Arduino IDE that depends on a version of 'log4j' containing severe and critical vulnerabilities." }, { "instruction": "what vulnarability does joblib version less then 1.1.1 have", "input": "", "output": "Having vulnarability PVE-2022-51394 Advisory: Joblib 1.1.1 fixes a security issue where 'eval(pre_dispatch)' could potentially run arbitrary code. Now only basic numerics are supported.\r\nhttps://github.com/joblib/joblib/pull/1327", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does joblib version less then 1.1.1 have ### Response: Having vulnarability PVE-2022-51394 Advisory: Joblib 1.1.1 fixes a security issue where 'eval(pre_dispatch)' could potentially run arbitrary code. Now only basic numerics are supported.\r\nhttps://github.com/joblib/joblib/pull/1327" }, { "instruction": "what vulnarability does jose version less then 0.3.0 have", "input": "", "output": "Having vulnarability PVE-2021-25867 Advisory: jose 0.3.0 fixed critical JWT vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jose version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-25867 Advisory: jose 0.3.0 fixed critical JWT vulnerability." }, { "instruction": "what vulnarability does js-ember version less then equal to 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2015-1866 Advisory: Js.ember (ember.js packaging for fanstatic) 1.0.0 includes ember.js v1.0.0, which has known transitive vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does js-ember version less then equal to 1.0.0 have ### Response: Having vulnarability CVE-2015-1866 Advisory: Js.ember (ember.js packaging for fanstatic) 1.0.0 includes ember.js v1.0.0, which has known transitive vulnerabilities." }, { "instruction": "what vulnarability does js-jquery-datatables version greather then 0.0a have", "input": "", "output": "Having vulnarability PVE-2023-99917 Advisory: A security flaw with Cross-site scripting could potentially enable an attacker to take over a user's session. Essentially, this may allow the unauthorized individual to alter the user's password and invalidate the victim's session, all while maintaining access themselves.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does js-jquery-datatables version greather then 0.0a have ### Response: Having vulnarability PVE-2023-99917 Advisory: A security flaw with Cross-site scripting could potentially enable an attacker to take over a user's session. Essentially, this may allow the unauthorized individual to alter the user's password and invalidate the victim's session, all while maintaining access themselves." }, { "instruction": "what vulnarability does js-mocha version less then equal to 2.2.5 have", "input": "", "output": "Having vulnarability CVE-2016-10540 Advisory: Js.mocha 2.2.5 (Fanstatic packaging of Mocha) has NPM dependencies with known vulnerabilities (glob).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does js-mocha version less then equal to 2.2.5 have ### Response: Having vulnarability CVE-2016-10540 Advisory: Js.mocha 2.2.5 (Fanstatic packaging of Mocha) has NPM dependencies with known vulnerabilities (glob)." }, { "instruction": "what vulnarability does js-videojs version less then 4.12.5 have", "input": "", "output": "Having vulnarability PVE-2021-36130 Advisory: Js-videojs 4.12.5 updates videojs-swf to v4.5.4 to fix a potential XSS vulnerability. \r\nhttps://github.com/videojs/video.js/pull/1955", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does js-videojs version less then 4.12.5 have ### Response: Having vulnarability PVE-2021-36130 Advisory: Js-videojs 4.12.5 updates videojs-swf to v4.5.4 to fix a potential XSS vulnerability. \r\nhttps://github.com/videojs/video.js/pull/1955" }, { "instruction": "what vulnarability does jsnapy version less then 1.3.0 have", "input": "", "output": "Having vulnarability CVE-2018-0023 Advisory: JSNAPy 1.3.0 includes a fix for CVE-2018-0023: The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jsnapy version less then 1.3.0 have ### Response: Having vulnarability CVE-2018-0023 Advisory: JSNAPy 1.3.0 includes a fix for CVE-2018-0023: The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github." }, { "instruction": "what vulnarability does json2xml version less then 3.0.0 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Json2xml version 3.0.0 updates its dependency \"requests\" minimum requirement to v2.20.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does json2xml version less then 3.0.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Json2xml version 3.0.0 updates its dependency \"requests\" minimum requirement to v2.20.0 to include a security fix." }, { "instruction": "what vulnarability does jsonargparse version less then 4.22.0 have", "input": "", "output": "Having vulnarability PVE-2023-59178 Advisory: Jsonargparse 4.22.0 includes a fix for a ReDoS vulnerability.\r\nhttps://github.com/omni-us/jsonargparse/commit/7f5e9b808130de4e60093b5a9fde264f69d74e93", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jsonargparse version less then 4.22.0 have ### Response: Having vulnarability PVE-2023-59178 Advisory: Jsonargparse 4.22.0 includes a fix for a ReDoS vulnerability.\r\nhttps://github.com/omni-us/jsonargparse/commit/7f5e9b808130de4e60093b5a9fde264f69d74e93" }, { "instruction": "what vulnarability does jsoneditor version less then 2.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-40863 Advisory: Jsoneditor 2.2.2 fixes a security error in the server side file retriever script of the web application.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jsoneditor version less then 2.2.2 have ### Response: Having vulnarability PVE-2021-40863 Advisory: Jsoneditor 2.2.2 fixes a security error in the server side file retriever script of the web application." }, { "instruction": "what vulnarability does jsonrpc-pyclient version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2021-25869 Advisory: jsonrpc-pyclient 0.7.0 fixes security issues in unixdomainsocket connectors.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jsonrpc-pyclient version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-25869 Advisory: jsonrpc-pyclient 0.7.0 fixes security issues in unixdomainsocket connectors." }, { "instruction": "what vulnarability does jubatus version greather then equal to 0,less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2018-0524 Advisory: Jubatus 1.0.2 and earlier allows remote code execution via unspecified vectors.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jubatus version greather then equal to 0,less then 1.1.0 have ### Response: Having vulnarability CVE-2018-0524 Advisory: Jubatus 1.0.2 and earlier allows remote code execution via unspecified vectors." }, { "instruction": "what vulnarability does juicenet-cli version less then 0.32.0 have", "input": "", "output": "Having vulnarability CVE-2024-22195 Advisory: Juicenet-cli version 0.32.0 resolves CVE-2024-22195 by upgrading its jinja2 dependency from version 3.1.2 to 3.1.3.\r\nhttps://github.com/Ravencentric/juicenet-cli/commit/6e64a808e7f132c45202028b1b5d29d761ebb6d6", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does juicenet-cli version less then 0.32.0 have ### Response: Having vulnarability CVE-2024-22195 Advisory: Juicenet-cli version 0.32.0 resolves CVE-2024-22195 by upgrading its jinja2 dependency from version 3.1.2 to 3.1.3.\r\nhttps://github.com/Ravencentric/juicenet-cli/commit/6e64a808e7f132c45202028b1b5d29d761ebb6d6" }, { "instruction": "what vulnarability does jumpssh version less then 1.6.3 have", "input": "", "output": "Having vulnarability PVE-2021-38051 Advisory: Jumpssh 1.6.3 removes pytest-runner from setup_requires as this is deprecated for security reasons, see https://github.com/pytest-dev/pytest-runner", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jumpssh version less then 1.6.3 have ### Response: Having vulnarability PVE-2021-38051 Advisory: Jumpssh 1.6.3 removes pytest-runner from setup_requires as this is deprecated for security reasons, see https://github.com/pytest-dev/pytest-runner" }, { "instruction": "what vulnarability does junkeldat version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45426 Advisory: Junkeldat is a typosquatting package. It installs malware in your system that leaks your data.\r\nhttps://github.com/rsc-dev/pypi_malware", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does junkeldat version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45426 Advisory: Junkeldat is a typosquatting package. It installs malware in your system that leaks your data.\r\nhttps://github.com/rsc-dev/pypi_malware" }, { "instruction": "what vulnarability does junos-eznc version less then 2.2.1 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Junos-eznc 2.2.1 fixes PyYAML as per CVE-2017-18342.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does junos-eznc version less then 2.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Junos-eznc 2.2.1 fixes PyYAML as per CVE-2017-18342." }, { "instruction": "what vulnarability does juntagrico version less then 1.5.5 have", "input": "", "output": "Having vulnarability CVE-2022-34265 Advisory: Juntagrico 1.5.5 updates its dependency 'django' requirement to \"~=4.0.8\" to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does juntagrico version less then 1.5.5 have ### Response: Having vulnarability CVE-2022-34265 Advisory: Juntagrico 1.5.5 updates its dependency 'django' requirement to \"~=4.0.8\" to include security fixes." }, { "instruction": "what vulnarability does jupyter-archive version less then 3.3.2 have", "input": "", "output": "Having vulnarability CVE-2007-4559 Advisory: Jupyter-archive 3.3.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-archive version less then 3.3.2 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Jupyter-archive 3.3.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267." }, { "instruction": "what vulnarability does jupyter-core version greather then equal to 0,less then 4.11.2 have", "input": "", "output": "Having vulnarability CVE-2022-39286 Advisory: Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in 'jupyter_core' that stems from 'jupyter_core' executing untrusted files in CWD. This vulnerability allows one user to run code as another.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-core version greather then equal to 0,less then 4.11.2 have ### Response: Having vulnarability CVE-2022-39286 Advisory: Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in 'jupyter_core' that stems from 'jupyter_core' executing untrusted files in CWD. This vulnerability allows one user to run code as another." }, { "instruction": "what vulnarability does jupyter-enterprise-gateway version less then 0.8.0 have", "input": "", "output": "Having vulnarability PVE-2022-52144 Advisory: Jupyter-enterprise-gateway 0.8.0 enables SSH tunneling by default.\r\nhttps://github.com/jupyter-server/enterprise_gateway/issues/234", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-enterprise-gateway version less then 0.8.0 have ### Response: Having vulnarability PVE-2022-52144 Advisory: Jupyter-enterprise-gateway 0.8.0 enables SSH tunneling by default.\r\nhttps://github.com/jupyter-server/enterprise_gateway/issues/234" }, { "instruction": "what vulnarability does jupyter-jsmol version less then 2021.9.0 have", "input": "", "output": "Having vulnarability CVE-2021-37701 Advisory: Jupyter-jsmol 2021.9.0 updates its NPM dependency 'tar' to v6.1.11 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-jsmol version less then 2021.9.0 have ### Response: Having vulnarability CVE-2021-37701 Advisory: Jupyter-jsmol 2021.9.0 updates its NPM dependency 'tar' to v6.1.11 to include security fixes." }, { "instruction": "what vulnarability does jupyter-jsonnet version less then 0.3 have", "input": "", "output": "Having vulnarability PVE-2022-50889 Advisory: Jupyter-jsonnet 0.3 disables imports to avoid security issues.\r\nhttps://github.com/abentley/jupyter-jsonnet/commit/238dfb7218d395758dceb215c0eecb4cd40ee16f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-jsonnet version less then 0.3 have ### Response: Having vulnarability PVE-2022-50889 Advisory: Jupyter-jsonnet 0.3 disables imports to avoid security issues.\r\nhttps://github.com/abentley/jupyter-jsonnet/commit/238dfb7218d395758dceb215c0eecb4cd40ee16f" }, { "instruction": "what vulnarability does jupyter-kuleuven-slides version less then 0.3.3 have", "input": "", "output": "Having vulnarability PVE-2022-51892 Advisory: Jupyter-kuleuven-slides 0.3.3 sanitizes SVG data to prevent injection attacks.\r\nhttps://github.com/KULeuven-Diepenbeek/jupyter-KULeuven-slides/commit/b0fd098606c853d2a875b083e312929bd2b74930", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-kuleuven-slides version less then 0.3.3 have ### Response: Having vulnarability PVE-2022-51892 Advisory: Jupyter-kuleuven-slides 0.3.3 sanitizes SVG data to prevent injection attacks.\r\nhttps://github.com/KULeuven-Diepenbeek/jupyter-KULeuven-slides/commit/b0fd098606c853d2a875b083e312929bd2b74930" }, { "instruction": "what vulnarability does jupyter-lsp version less then equal to 2.2.1 have", "input": "", "output": "Having vulnarability CVE-2024-22415 Advisory: jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-lsp version less then equal to 2.2.1 have ### Response: Having vulnarability CVE-2024-22415 Advisory: jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp." }, { "instruction": "what vulnarability does jupyter-matlab-proxy version less then 0.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-41081 Advisory: Jupyter-matlab-proxy 0.1.1 includes bug fixes and security patches.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-matlab-proxy version less then 0.1.1 have ### Response: Having vulnarability PVE-2021-41081 Advisory: Jupyter-matlab-proxy 0.1.1 includes bug fixes and security patches." }, { "instruction": "what vulnarability does jupyter-micropython-upydevice version less then equal to 0.0.7 have", "input": "", "output": "Having vulnarability CVE-2023-48051 Advisory: jupyter-micropython-upydevice 0.0.7 and prior versions ship with vulnerable dependencies (upydev == 0.3.8).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-micropython-upydevice version less then equal to 0.0.7 have ### Response: Having vulnarability CVE-2023-48051 Advisory: jupyter-micropython-upydevice 0.0.7 and prior versions ship with vulnerable dependencies (upydev == 0.3.8)." }, { "instruction": "what vulnarability does jupyter-nbrequirements version less then 0.6.0 have", "input": "", "output": "Having vulnarability CVE-2020-6802 Advisory: Jupyter-nbrequirements 0.6.0 updates bleach from 3.1.0 to 3.1.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-nbrequirements version less then 0.6.0 have ### Response: Having vulnarability CVE-2020-6802 Advisory: Jupyter-nbrequirements 0.6.0 updates bleach from 3.1.0 to 3.1.1 to include a security fix." }, { "instruction": "what vulnarability does jupyter-server version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-38212 Advisory: Jupyter-server 0.2.0 adds a \"secure_write\" to function for cookie/token saves. See: .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-server version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-38212 Advisory: Jupyter-server 0.2.0 adds a \"secure_write\" to function for cookie/token saves. See: ." }, { "instruction": "what vulnarability does jupyter-server-proxy version less then 3.2.1 have", "input": "", "output": "Having vulnarability CVE-2022-21697 Advisory: Jupyter-server-proxy 3.2.1 includes a fix for CVE-2022-21697: Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the 'allowed_hosts' check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity.\r\nhttps://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-server-proxy version less then 3.2.1 have ### Response: Having vulnarability CVE-2022-21697 Advisory: Jupyter-server-proxy 3.2.1 includes a fix for CVE-2022-21697: Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the 'allowed_hosts' check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity.\r\nhttps://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw" }, { "instruction": "what vulnarability does jupyterhub version less then equal to 0.2 have", "input": "", "output": "Having vulnarability PVE-2021-38973 Advisory: The maintainers of jupyterhub acknowledge in their changelog notes for version 0.2 that when the environment dictionary is used for authentication as an admin, jupyterhub becomes vulnerable to pre-existing security issues because these environment variables may be passed to the user via the batch submit command.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub version less then equal to 0.2 have ### Response: Having vulnarability PVE-2021-38973 Advisory: The maintainers of jupyterhub acknowledge in their changelog notes for version 0.2 that when the environment dictionary is used for authentication as an admin, jupyterhub becomes vulnerable to pre-existing security issues because these environment variables may be passed to the user via the batch submit command." }, { "instruction": "what vulnarability does jupyterhub-firstuseauthenticator version greather then equal to 0,less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2021-41194 Advisory: FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub-firstuseauthenticator version greather then equal to 0,less then 1.0.0 have ### Response: Having vulnarability CVE-2021-41194 Advisory: FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs." }, { "instruction": "what vulnarability does jupyterhub-kubespawner version greather then equal to 0,less then 0.12.0 have", "input": "", "output": "Having vulnarability CVE-2020-15110 Advisory: In jupyterhub-kubespawner before 0.12, certain usernames will be able to craft particular server names which will grant them access to the default server of other users who have matching usernames. This has been fixed in 0.12.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub-kubespawner version greather then equal to 0,less then 0.12.0 have ### Response: Having vulnarability CVE-2020-15110 Advisory: In jupyterhub-kubespawner before 0.12, certain usernames will be able to craft particular server names which will grant them access to the default server of other users who have matching usernames. This has been fixed in 0.12." }, { "instruction": "what vulnarability does jupyterhub-nativeauthenticator version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2023-58753 Advisory: Jupyterhub-nativeauthenticator 1.2.0 includes XSRF tokens for cross-site protection.\r\nhttps://github.com/jupyterhub/nativeauthenticator/pull/236", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub-nativeauthenticator version less then 1.2.0 have ### Response: Having vulnarability PVE-2023-58753 Advisory: Jupyterhub-nativeauthenticator 1.2.0 includes XSRF tokens for cross-site protection.\r\nhttps://github.com/jupyterhub/nativeauthenticator/pull/236" }, { "instruction": "what vulnarability does jupyterhub-systemdspawner version less then 0.15 have", "input": "", "output": "Having vulnarability CVE-2020-26261 Advisory: Jupyterhub-systemdspawner 0.15 includes a fix for CVE-2020-26261: In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub-systemdspawner version less then 0.15 have ### Response: Having vulnarability CVE-2020-26261 Advisory: Jupyterhub-systemdspawner 0.15 includes a fix for CVE-2020-26261: In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default." }, { "instruction": "what vulnarability does jupyterlab version less then 3.0.8 have", "input": "", "output": "Having vulnarability CVE-2021-21306 Advisory: Jupyterlab 3.0.8 updates its dependency 'marked' to v2.0.0 to address a vulnerability. See also .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab version less then 3.0.8 have ### Response: Having vulnarability CVE-2021-21306 Advisory: Jupyterlab 3.0.8 updates its dependency 'marked' to v2.0.0 to address a vulnerability. See also ." }, { "instruction": "what vulnarability does jupyterlab-git version less then 0.32.0 have", "input": "", "output": "Having vulnarability PVE-2021-41073 Advisory: Jupyterlab-git 0.32.0 upgrades underlying packages to address security warnings.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-git version less then 0.32.0 have ### Response: Having vulnarability PVE-2021-41073 Advisory: Jupyterlab-git 0.32.0 upgrades underlying packages to address security warnings." }, { "instruction": "what vulnarability does jupyterlab-iframe version less then 0.5.0 have", "input": "", "output": "Having vulnarability CVE-2021-32640 Advisory: Jupyterlab-iframe 0.5.0 updates its dependencies 'ws' to version '7.4.6' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/timkpaine/jupyterlab_iframe/pull/139", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-iframe version less then 0.5.0 have ### Response: Having vulnarability CVE-2021-32640 Advisory: Jupyterlab-iframe 0.5.0 updates its dependencies 'ws' to version '7.4.6' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/timkpaine/jupyterlab_iframe/pull/139" }, { "instruction": "what vulnarability does jupyterlab-link-share version less then 0.2.1 have", "input": "", "output": "Having vulnarability CVE-2021-23362 Advisory: Jupyterlab-link-share 0.2.1 updates its NPM dependency 'hosted-git-info' to v2.8.9 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-link-share version less then 0.2.1 have ### Response: Having vulnarability CVE-2021-23362 Advisory: Jupyterlab-link-share 0.2.1 updates its NPM dependency 'hosted-git-info' to v2.8.9 to include a security fix." }, { "instruction": "what vulnarability does jupyterlab-lsp version less then 5.0.2 have", "input": "", "output": "Having vulnarability CVE-2024-22415 Advisory: jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-lsp version less then 5.0.2 have ### Response: Having vulnarability CVE-2024-22415 Advisory: jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp." }, { "instruction": "what vulnarability does jupyterlab-theme-solarized-dark version less then 1.0.2 have", "input": "", "output": "Having vulnarability PVE-2021-41738 Advisory: Jupyterlab-theme-solarized-dark 1.0.2 updates its dependency \"lodash\" to v4.17.19 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-theme-solarized-dark version less then 1.0.2 have ### Response: Having vulnarability PVE-2021-41738 Advisory: Jupyterlab-theme-solarized-dark 1.0.2 updates its dependency \"lodash\" to v4.17.19 to include a security fix." }, { "instruction": "what vulnarability does jupyterquiz version less then 1.7.5 have", "input": "", "output": "Having vulnarability PVE-2021-41822 Advisory: Jupyterquiz version 1.7.5 improves security of decoding JSON question data.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterquiz version less then 1.7.5 have ### Response: Having vulnarability PVE-2021-41822 Advisory: Jupyterquiz version 1.7.5 improves security of decoding JSON question data." }, { "instruction": "what vulnarability does jupytext version less then 1.10.3 have", "input": "", "output": "Having vulnarability CVE-2021-21306 Advisory: Jupytext 1.10.3 updates 'marked', an indirect dependency of the 'jupyterlab-jupytext' extension, to fix a moderate vulnerability (https://github.com/mwouts/jupytext/issues/750).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupytext version less then 1.10.3 have ### Response: Having vulnarability CVE-2021-21306 Advisory: Jupytext 1.10.3 updates 'marked', an indirect dependency of the 'jupyterlab-jupytext' extension, to fix a moderate vulnerability (https://github.com/mwouts/jupytext/issues/750)." }, { "instruction": "what vulnarability does jw-util version less then 2.3 have", "input": "", "output": "Having vulnarability CVE-2020-13388 Advisory: Jw-util 2.3 includes a fix for CVE-2020-13388: When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jw-util version less then 2.3 have ### Response: Having vulnarability CVE-2020-13388 Advisory: Jw-util 2.3 includes a fix for CVE-2020-13388: When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used." }, { "instruction": "what vulnarability does jwcrypto version less then 0.3.2 have", "input": "", "output": "Having vulnarability CVE-2016-6298 Advisory: The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jwcrypto version less then 0.3.2 have ### Response: Having vulnarability CVE-2016-6298 Advisory: The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA)." }, { "instruction": "what vulnarability does jwql version less then 0.16.0 have", "input": "", "output": "Having vulnarability CVE-2018-14574 Advisory: Jwql 0.16.0 updates its dependency 'Django' to v2.1.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jwql version less then 0.16.0 have ### Response: Having vulnarability CVE-2018-14574 Advisory: Jwql 0.16.0 updates its dependency 'Django' to v2.1.2 to include a security fix." }, { "instruction": "what vulnarability does k8t version less then 0.7.5 have", "input": "", "output": "Having vulnarability CVE-2021-3121 Advisory: K8t 0.7.5 updates docker image to include a security fix.\r\nhttps://github.com/ClarkSource/k8t/commit/0f0ef80254cc841175e24738f4e19956a04e6435", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does k8t version less then 0.7.5 have ### Response: Having vulnarability CVE-2021-3121 Advisory: K8t 0.7.5 updates docker image to include a security fix.\r\nhttps://github.com/ClarkSource/k8t/commit/0f0ef80254cc841175e24738f4e19956a04e6435" }, { "instruction": "what vulnarability does kafkacrypto version less then 0.9.10.0 have", "input": "", "output": "Having vulnarability PVE-2022-50614 Advisory: Kafkacrypto 0.9.10.0 adds validation to make returned random0 values match those originally used. This avoids a protocol-level hypothetical attack.\r\nhttps://github.com/tmcqueen-materials/kafkacrypto/commit/649395b3fa30fdb1670bfd9f7e6ab30d63985b2f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kafkacrypto version less then 0.9.10.0 have ### Response: Having vulnarability PVE-2022-50614 Advisory: Kafkacrypto 0.9.10.0 adds validation to make returned random0 values match those originally used. This avoids a protocol-level hypothetical attack.\r\nhttps://github.com/tmcqueen-materials/kafkacrypto/commit/649395b3fa30fdb1670bfd9f7e6ab30d63985b2f" }, { "instruction": "what vulnarability does kagi version less then 0.4.0 have", "input": "", "output": "Having vulnarability PVE-2023-58962 Advisory: Kagi 0.4.0 includes a fix for an insufficiently protected secret token.\r\nhttps://github.com/justinmayer/kagi/pull/72", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kagi version less then 0.4.0 have ### Response: Having vulnarability PVE-2023-58962 Advisory: Kagi 0.4.0 includes a fix for an insufficiently protected secret token.\r\nhttps://github.com/justinmayer/kagi/pull/72" }, { "instruction": "what vulnarability does kako version less then 1.1.0 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Kako 1.1.0 updates its dependency 'requests' to v2.22.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kako version less then 1.1.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kako 1.1.0 updates its dependency 'requests' to v2.22.0 to include a security fix." }, { "instruction": "what vulnarability does kalliope version less then 0.5.3 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Kalliope 0.5.3 updates 'requests' dependency to v2.20.1 to fix a security vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kalliope version less then 0.5.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kalliope 0.5.3 updates 'requests' dependency to v2.20.1 to fix a security vulnerability." }, { "instruction": "what vulnarability does kallithea version less then 0.3.2 have", "input": "", "output": "Having vulnarability CVE-2016-3114 Advisory: Kallithea before 0.3.2 allows remote authenticated users to edit or delete open pull requests or delete comments by leveraging read access.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kallithea version less then 0.3.2 have ### Response: Having vulnarability CVE-2016-3114 Advisory: Kallithea before 0.3.2 allows remote authenticated users to edit or delete open pull requests or delete comments by leveraging read access." }, { "instruction": "what vulnarability does karlovic version less then 0.1.3beta have", "input": "", "output": "Having vulnarability PVE-2021-38963 Advisory: Karlovic 0.1.3beta includes a fix for a vulnerable Pillow function.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does karlovic version less then 0.1.3beta have ### Response: Having vulnarability PVE-2021-38963 Advisory: Karlovic 0.1.3beta includes a fix for a vulnerable Pillow function." }, { "instruction": "what vulnarability does katal version less then 0.0.6 have", "input": "", "output": "Having vulnarability PVE-2021-34247 Advisory: katal before 0.0.6 uses eval() internally.\r\nhttps://github.com/suizokukan/katal/commit/7973faa8f8d90a4385e3e1f0056a698823303462", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does katal version less then 0.0.6 have ### Response: Having vulnarability PVE-2021-34247 Advisory: katal before 0.0.6 uses eval() internally.\r\nhttps://github.com/suizokukan/katal/commit/7973faa8f8d90a4385e3e1f0056a698823303462" }, { "instruction": "what vulnarability does katka-core version less then 0.11.0 have", "input": "", "output": "Having vulnarability PVE-2021-36914 Advisory: Katka-core 0.11.0 decreases the amount of gaping security holes related to broken authentication.\r\nhttps://github.com/kpn/katka-core/commit/adeffeff55c5b58d73bbbe9ccbf5735677f1b650", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does katka-core version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-36914 Advisory: Katka-core 0.11.0 decreases the amount of gaping security holes related to broken authentication.\r\nhttps://github.com/kpn/katka-core/commit/adeffeff55c5b58d73bbbe9ccbf5735677f1b650" }, { "instruction": "what vulnarability does katsdptelstate version less then 0.9 have", "input": "", "output": "Having vulnarability PVE-2021-38321 Advisory: Katsdptelstate 0.9 disable pickles by default for security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does katsdptelstate version less then 0.9 have ### Response: Having vulnarability PVE-2021-38321 Advisory: Katsdptelstate 0.9 disable pickles by default for security." }, { "instruction": "what vulnarability does kaze-python version less then 0.6.5 have", "input": "", "output": "Having vulnarability PVE-2021-36494 Advisory: kaze-python 0.6.5 fixes vulnerability to RPC invoke functionality that can send node into unclosed loop during 'test' invokes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kaze-python version less then 0.6.5 have ### Response: Having vulnarability PVE-2021-36494 Advisory: kaze-python 0.6.5 fixes vulnerability to RPC invoke functionality that can send node into unclosed loop during 'test' invokes." }, { "instruction": "what vulnarability does kdcproxy version less then 0.3.2 have", "input": "", "output": "Having vulnarability CVE-2015-5159 Advisory: python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kdcproxy version less then 0.3.2 have ### Response: Having vulnarability CVE-2015-5159 Advisory: python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request." }, { "instruction": "what vulnarability does kedro version less then 0.17.7 have", "input": "", "output": "Having vulnarability CVE-2022-22817 Advisory: Kedro 0.17.7 updates its dependency 'pillow' minimum requirement (for python_version > '3.6') to v9.0.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kedro version less then 0.17.7 have ### Response: Having vulnarability CVE-2022-22817 Advisory: Kedro 0.17.7 updates its dependency 'pillow' minimum requirement (for python_version > '3.6') to v9.0.0 to include a security fix." }, { "instruction": "what vulnarability does kedro-viz version less then 2.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-37353 Advisory: Kedro-viz 2.1.0 fixes an infosec vulnerability in LoDash (16).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kedro-viz version less then 2.1.0 have ### Response: Having vulnarability PVE-2021-37353 Advisory: Kedro-viz 2.1.0 fixes an infosec vulnerability in LoDash (16)." }, { "instruction": "what vulnarability does keep version equal to 1.2 have", "input": "", "output": "Having vulnarability CVE-2022-30877 Advisory: Keep 1.2 included a code-execution backdoor inserted by a third party.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keep version equal to 1.2 have ### Response: Having vulnarability CVE-2022-30877 Advisory: Keep 1.2 included a code-execution backdoor inserted by a third party.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer" }, { "instruction": "what vulnarability does keepkey version less then 6.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-41885 Advisory: Keepkey 6.6.0 includes vulnerability fixes. No more information was disclosed.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keepkey version less then 6.6.0 have ### Response: Having vulnarability PVE-2021-41885 Advisory: Keepkey 6.6.0 includes vulnerability fixes. No more information was disclosed." }, { "instruction": "what vulnarability does keplergl version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2020-15168 Advisory: Keplergl 0.3.1 updates its NPM dependency 'node-fetch' to v2.6.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keplergl version less then 0.3.1 have ### Response: Having vulnarability CVE-2020-15168 Advisory: Keplergl 0.3.1 updates its NPM dependency 'node-fetch' to v2.6.1 to include a security fix." }, { "instruction": "what vulnarability does keras version less then 2.6.0rc3 have", "input": "", "output": "Having vulnarability CVE-2021-37678 Advisory: Keras 2.6.0rc3 fixes a security issue for loading keras models via yaml, which could allow arbitrary code execution. See CVE-2021-37678.\r\nhttps://github.com/keras-team/keras/commit/32febb6cdebe166fc70ad72f2da37607c13bb11a", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keras version less then 2.6.0rc3 have ### Response: Having vulnarability CVE-2021-37678 Advisory: Keras 2.6.0rc3 fixes a security issue for loading keras models via yaml, which could allow arbitrary code execution. See CVE-2021-37678.\r\nhttps://github.com/keras-team/keras/commit/32febb6cdebe166fc70ad72f2da37607c13bb11a" }, { "instruction": "what vulnarability does kerberos version greather then 0 have", "input": "", "output": "Having vulnarability CVE-2015-3206 Advisory: The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kerberos version greather then 0 have ### Response: Having vulnarability CVE-2015-3206 Advisory: The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack." }, { "instruction": "what vulnarability does kerko version less then 0.6 have", "input": "", "output": "Having vulnarability PVE-2022-52593 Advisory: Kerko 0.6 fixes several XSS vulnerabilities.\r\nhttps://github.com/whiskyechobravo/kerko/commit/0b53ffd6940648e5cb5fe16bc305aac9c19c71fd", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kerko version less then 0.6 have ### Response: Having vulnarability PVE-2022-52593 Advisory: Kerko 0.6 fixes several XSS vulnerabilities.\r\nhttps://github.com/whiskyechobravo/kerko/commit/0b53ffd6940648e5cb5fe16bc305aac9c19c71fd" }, { "instruction": "what vulnarability does keycloak-httpd-client-install version less then 0.8 have", "input": "", "output": "Having vulnarability CVE-2017-15111 Advisory: keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keycloak-httpd-client-install version less then 0.8 have ### Response: Having vulnarability CVE-2017-15111 Advisory: keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link." }, { "instruction": "what vulnarability does keylime version less then 6.3.0 have", "input": "", "output": "Having vulnarability CVE-2021-43310 Advisory: A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keylime version less then 6.3.0 have ### Response: Having vulnarability CVE-2021-43310 Advisory: A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution." }, { "instruction": "what vulnarability does keyring version less then 0.10 have", "input": "", "output": "Having vulnarability CVE-2012-5577 Advisory: Python keyring lib before 0.10 created keyring files with world-readable permissions. See: CVE-2012-5577.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keyring version less then 0.10 have ### Response: Having vulnarability CVE-2012-5577 Advisory: Python keyring lib before 0.10 created keyring files with world-readable permissions. See: CVE-2012-5577." }, { "instruction": "what vulnarability does keystone version less then 11.04,greather then equal to 12.0.0,less then 12.0.0,greather then equal to 13.0.0less then 13.0.0 have", "input": "", "output": "Having vulnarability CVE-2018-14432 Advisory: In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated \"GET /v3/OS-FEDERATION/projects\" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keystone version less then 11.04,greather then equal to 12.0.0,less then 12.0.0,greather then equal to 13.0.0less then 13.0.0 have ### Response: Having vulnarability CVE-2018-14432 Advisory: In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated \"GET /v3/OS-FEDERATION/projects\" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected." }, { "instruction": "what vulnarability does keystone-json-assignment version less then 0.0.4 have", "input": "", "output": "Having vulnarability CVE-2019-3683 Advisory: Keystone-json-assignment 0.0.4 includes a fix for CVE-2019-3683: The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full \"member\" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.\r\nhttps://github.com/SUSE-Cloud/keystone-json-assignment/commit/d7888c75505465490250c00cc0ef4bb1af662f9f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keystone-json-assignment version less then 0.0.4 have ### Response: Having vulnarability CVE-2019-3683 Advisory: Keystone-json-assignment 0.0.4 includes a fix for CVE-2019-3683: The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full \"member\" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.\r\nhttps://github.com/SUSE-Cloud/keystone-json-assignment/commit/d7888c75505465490250c00cc0ef4bb1af662f9f" }, { "instruction": "what vulnarability does keystonemiddleware version less then 0.11.0,greather then equal to 1.0.0,less then 1.2.0 have", "input": "", "output": "Having vulnarability CVE-2014-7144 Advisory: Keystonemiddleware versions 0.11.0 and 1.2.0 include a fix for CVE-2014-7144: OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the \"insecure\" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.\r\nhttp://www.openwall.com/lists/oss-security/2014/09/25/51\r\nhttps://bugs.launchpad.net/python-keystoneclient/+bug/1353315\r\nhttp://rhn.redhat.com/errata/RHSA-2014-1783.html\r\nhttp://rhn.redhat.com/errata/RHSA-2014-1784.html\r\nhttp://rhn.redhat.com/errata/RHSA-2015-0020.html\r\nhttp://www.ubuntu.com/usn/USN-2705-1\r\nhttp://www.securityfocus.com/bid/69864\r\nhttp://secunia.com/advisories/62709", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keystonemiddleware version less then 0.11.0,greather then equal to 1.0.0,less then 1.2.0 have ### Response: Having vulnarability CVE-2014-7144 Advisory: Keystonemiddleware versions 0.11.0 and 1.2.0 include a fix for CVE-2014-7144: OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the \"insecure\" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.\r\nhttp://www.openwall.com/lists/oss-security/2014/09/25/51\r\nhttps://bugs.launchpad.net/python-keystoneclient/+bug/1353315\r\nhttp://rhn.redhat.com/errata/RHSA-2014-1783.html\r\nhttp://rhn.redhat.com/errata/RHSA-2014-1784.html\r\nhttp://rhn.redhat.com/errata/RHSA-2015-0020.html\r\nhttp://www.ubuntu.com/usn/USN-2705-1\r\nhttp://www.securityfocus.com/bid/69864\r\nhttp://secunia.com/advisories/62709" }, { "instruction": "what vulnarability does kfp-tekton version less then 1.4.0 have", "input": "", "output": "Having vulnarability CVE-2022-1941 Advisory: Kfp-tekton 1.4.0 updates its dependency 'protobuf' to v3.20.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kfp-tekton version less then 1.4.0 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Kfp-tekton 1.4.0 updates its dependency 'protobuf' to v3.20.3 to include a security fix." }, { "instruction": "what vulnarability does kgexplore version greather then equal to 0.1.1,less then equal to 0.1.2 have", "input": "", "output": "Having vulnarability CVE-2022-33002 Advisory: The KGExplore package in PyPI v0.1.1 to v0.1.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kgexplore version greather then equal to 0.1.1,less then equal to 0.1.2 have ### Response: Having vulnarability CVE-2022-33002 Advisory: The KGExplore package in PyPI v0.1.1 to v0.1.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges." }, { "instruction": "what vulnarability does kglab version less then 0.4.1 have", "input": "", "output": "Having vulnarability CVE-2021-32797 Advisory: Kglab 0.4.1 requires 'Jupyterlab' >= 3.1.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kglab version less then 0.4.1 have ### Response: Having vulnarability CVE-2021-32797 Advisory: Kglab 0.4.1 requires 'Jupyterlab' >= 3.1.4 to include a security fix." }, { "instruction": "what vulnarability does khoros version less then 2.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-38223 Advisory: Khoros 2.2.0 includes changes to the :doc:`supporting modules `. The ``yaml.load()`` function call got replaced with ``yaml.safe_load()`` in :py:func:`khoros.utils.helper.import_yaml_file` as it is a better security practice.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does khoros version less then 2.2.0 have ### Response: Having vulnarability PVE-2021-38223 Advisory: Khoros 2.2.0 includes changes to the :doc:`supporting modules `. The ``yaml.load()`` function call got replaced with ``yaml.safe_load()`` in :py:func:`khoros.utils.helper.import_yaml_file` as it is a better security practice." }, { "instruction": "what vulnarability does khorosjx version less then 2.3.1 have", "input": "", "output": "Having vulnarability PVE-2021-37935 Advisory: khorosjx 2.3.1 upgrades the bleach package to version 3.1.1 to mitigate an XSS security issue", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does khorosjx version less then 2.3.1 have ### Response: Having vulnarability PVE-2021-37935 Advisory: khorosjx 2.3.1 upgrades the bleach package to version 3.1.1 to mitigate an XSS security issue" }, { "instruction": "what vulnarability does kiez version less then 0.3.3 have", "input": "", "output": "Having vulnarability CVE-2022-21699 Advisory: Kiez 0.3.3 updates its dependency 'IPython' to v7.31.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiez version less then 0.3.3 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Kiez 0.3.3 updates its dependency 'IPython' to v7.31.1 to include a security fix." }, { "instruction": "what vulnarability does kili version less then 2.87.0 have", "input": "", "output": "Having vulnarability PVE-2021-41724 Advisory: Kili 2.87.0 secured its core API. From 16/09/2021 on, package maintainers prompt all users of the Python SDK on the SaaS application to upgrade kili to its last version. No more details were given.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kili version less then 2.87.0 have ### Response: Having vulnarability PVE-2021-41724 Advisory: Kili 2.87.0 secured its core API. From 16/09/2021 on, package maintainers prompt all users of the Python SDK on the SaaS application to upgrade kili to its last version. No more details were given." }, { "instruction": "what vulnarability does kinto version less then 12.0.2 have", "input": "", "output": "Having vulnarability PVE-2021-36841 Advisory: kinto 12.0.2\r\n **security**: Fix a pagination bug in the PostgreSQL backend that could leak records between collections", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto version less then 12.0.2 have ### Response: Having vulnarability PVE-2021-36841 Advisory: kinto 12.0.2\r\n **security**: Fix a pagination bug in the PostgreSQL backend that could leak records between collections" }, { "instruction": "what vulnarability does kinto-attachment version less then 6.4.0 have", "input": "", "output": "Having vulnarability PVE-2024-65061 Advisory: Kinto-attachment 6.4.0 addresses a high-severity vulnerability, CVE-2024-1314. This issue allowed the replacement of attachment files on read-only records if the attacker had \"read\" permission on a parent entity.\r\nhttps://github.com/Kinto/kinto-attachment/security/advisories/GHSA-hvp4-vrv2-8wrq", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto-attachment version less then 6.4.0 have ### Response: Having vulnarability PVE-2024-65061 Advisory: Kinto-attachment 6.4.0 addresses a high-severity vulnerability, CVE-2024-1314. This issue allowed the replacement of attachment files on read-only records if the attacker had \"read\" permission on a parent entity.\r\nhttps://github.com/Kinto/kinto-attachment/security/advisories/GHSA-hvp4-vrv2-8wrq" }, { "instruction": "what vulnarability does kinto-dist version less then 15.0.2 have", "input": "", "output": "Having vulnarability PVE-2021-37169 Advisory: Signer parameters in kinto-dist before 15.0.2 were displayed in capabilities. This was a security concern.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto-dist version less then 15.0.2 have ### Response: Having vulnarability PVE-2021-37169 Advisory: Signer parameters in kinto-dist before 15.0.2 were displayed in capabilities. This was a security concern." }, { "instruction": "what vulnarability does kiosk-client version less then 0.2.1 have", "input": "", "output": "Having vulnarability CVE-2019-12855 Advisory: Kiosk-client 0.2.1 updates Twisted to the latest version due to CVE-2019-12855. In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiosk-client version less then 0.2.1 have ### Response: Having vulnarability CVE-2019-12855 Advisory: Kiosk-client 0.2.1 updates Twisted to the latest version due to CVE-2019-12855. In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections." }, { "instruction": "what vulnarability does kivy version less then 2023.05.21 have", "input": "", "output": "Having vulnarability CVE-2020-7729 Advisory: Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729.\r\nhttps://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kivy version less then 2023.05.21 have ### Response: Having vulnarability CVE-2020-7729 Advisory: Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729.\r\nhttps://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7" }, { "instruction": "what vulnarability does kivy-deps.sdl2 version less then equal to 0.6.0 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Kivy-deps.sdl2 0.6.0 and prior versions (wheels for Windows) include a version of 'libwebp-7.dll', which is affected by a high-risk vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kivy-deps.sdl2 version less then equal to 0.6.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Kivy-deps.sdl2 0.6.0 and prior versions (wheels for Windows) include a version of 'libwebp-7.dll', which is affected by a high-risk vulnerability." }, { "instruction": "what vulnarability does kiwitcms version less then 11.1 have", "input": "", "output": "Having vulnarability CVE-2021-45115 Advisory: Kiwitcms 11.1 updates its dependency 'Django' to v4.0.2 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiwitcms version less then 11.1 have ### Response: Having vulnarability CVE-2021-45115 Advisory: Kiwitcms 11.1 updates its dependency 'Django' to v4.0.2 to include security fixes." }, { "instruction": "what vulnarability does klayout version less then 0.27.6 have", "input": "", "output": "Having vulnarability PVE-2022-45025 Advisory: Klayout 0.27.6 restricts evaluation of expressions in string to numeric conversion. This will fix a potential vulnerability which allows someone to sneak in expression code through malicious configuration, technology or layer properties files.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does klayout version less then 0.27.6 have ### Response: Having vulnarability PVE-2022-45025 Advisory: Klayout 0.27.6 restricts evaluation of expressions in string to numeric conversion. This will fix a potential vulnerability which allows someone to sneak in expression code through malicious configuration, technology or layer properties files." }, { "instruction": "what vulnarability does klocmod version less then 0.2.1 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Klocmod 0.2.1 updates its dependency 'pyyaml' to v5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does klocmod version less then 0.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Klocmod 0.2.1 updates its dependency 'pyyaml' to v5.1 to include a security fix." }, { "instruction": "what vulnarability does knowledge-repo version less then 0.8.0 have", "input": "", "output": "Having vulnarability PVE-2021-36510 Advisory: Knowledge-repo 0.8.0 removed two security vulnerabilities associated with arbitrary code execution from code stored in knowledge repositories on both clients and servers via knowledge repository configuration and embedded tooling.\r\nhttps://github.com/airbnb/knowledge-repo/pull/382", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does knowledge-repo version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-36510 Advisory: Knowledge-repo 0.8.0 removed two security vulnerabilities associated with arbitrary code execution from code stored in knowledge repositories on both clients and servers via knowledge repository configuration and embedded tooling.\r\nhttps://github.com/airbnb/knowledge-repo/pull/382" }, { "instruction": "what vulnarability does koji version equal to 1.13.0 have", "input": "", "output": "Having vulnarability CVE-2017-1002153 Advisory: Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does koji version equal to 1.13.0 have ### Response: Having vulnarability CVE-2017-1002153 Advisory: Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission." }, { "instruction": "what vulnarability does kolena version less then 0.94.1 have", "input": "", "output": "Having vulnarability CVE-2023-4863 Advisory: Kolena 0.94.1 updates its dependency 'pillow' to version '^10.0.1' to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolena version less then 0.94.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Kolena 0.94.1 updates its dependency 'pillow' to version '^10.0.1' to include security fixes." }, { "instruction": "what vulnarability does kolibri version less then 0.15.4 have", "input": "", "output": "Having vulnarability PVE-2022-49589 Advisory: Kolibri 0.15.4 sanitizes exported CSVs to avoid CSV injection.\r\nhttps://github.com/learningequality/kolibri/pull/9523/commits/95609c11f4497a64f24a3949779969e0badcd55c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolibri version less then 0.15.4 have ### Response: Having vulnarability PVE-2022-49589 Advisory: Kolibri 0.15.4 sanitizes exported CSVs to avoid CSV injection.\r\nhttps://github.com/learningequality/kolibri/pull/9523/commits/95609c11f4497a64f24a3949779969e0badcd55c" }, { "instruction": "what vulnarability does kolibri-explore-plugin version less then 2.0.12 have", "input": "", "output": "Having vulnarability CVE-2022-0639 Advisory: Kolibri-explore-plugin 2.0.12 updates its NPM dependency 'url-parse' to v1.5.7 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolibri-explore-plugin version less then 2.0.12 have ### Response: Having vulnarability CVE-2022-0639 Advisory: Kolibri-explore-plugin 2.0.12 updates its NPM dependency 'url-parse' to v1.5.7 to include security fixes." }, { "instruction": "what vulnarability does kolla version less then 12.6.0,greather then equal to 13.0.0.0rc1,less then 13.5.0,greather then equal to 14.0.0.0rc1,less then 14.5.0 have", "input": "", "output": "Having vulnarability CVE-2022-38060 Advisory: Kolla 12.6.0, 13.5.0 and 14.5.0 include a fix for CVE-2022-38060: A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges.\r\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2022-1589", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolla version less then 12.6.0,greather then equal to 13.0.0.0rc1,less then 13.5.0,greather then equal to 14.0.0.0rc1,less then 14.5.0 have ### Response: Having vulnarability CVE-2022-38060 Advisory: Kolla 12.6.0, 13.5.0 and 14.5.0 include a fix for CVE-2022-38060: A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges.\r\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2022-1589" }, { "instruction": "what vulnarability does kolla-ansible version less then equal to 15.1.0 have", "input": "", "output": "Having vulnarability CVE-2023-2088 Advisory: Kolla-ansible 16.0.0.0rc1 includes a fix for CVE-2023-2088: A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality.\r\nhttps://opendev.org/openstack/kolla-ansible/commit/a77ea13ef1991543df29b7eea14b1f91ef26f858", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolla-ansible version less then equal to 15.1.0 have ### Response: Having vulnarability CVE-2023-2088 Advisory: Kolla-ansible 16.0.0.0rc1 includes a fix for CVE-2023-2088: A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality.\r\nhttps://opendev.org/openstack/kolla-ansible/commit/a77ea13ef1991543df29b7eea14b1f91ef26f858" }, { "instruction": "what vulnarability does kombu version less then 3.0.13 have", "input": "", "output": "Having vulnarability PVE-2023-60847 Advisory: Kombu 3.0.13 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/celery/kombu/commit/b24697ee29b063ade45b1850bb8c27658ee31dff", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kombu version less then 3.0.13 have ### Response: Having vulnarability PVE-2023-60847 Advisory: Kombu 3.0.13 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/celery/kombu/commit/b24697ee29b063ade45b1850bb8c27658ee31dff" }, { "instruction": "what vulnarability does kotti version less then 1.3.2,greather then equal to 2.0.0a1,less then 2.0.0b2 have", "input": "", "output": "Having vulnarability CVE-2018-9856 Advisory: Kotti 1.3.2 and 2.0.0b2 include a fix for CVE-2018-9856: Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request.\r\nhttps://github.com/advisories/GHSA-3hq4-f2v6-q338", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kotti version less then 1.3.2,greather then equal to 2.0.0a1,less then 2.0.0b2 have ### Response: Having vulnarability CVE-2018-9856 Advisory: Kotti 1.3.2 and 2.0.0b2 include a fix for CVE-2018-9856: Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request.\r\nhttps://github.com/advisories/GHSA-3hq4-f2v6-q338" }, { "instruction": "what vulnarability does kploy version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2017-47613 Advisory: Kploy 0.7.0 adds support for passing secrets securely via environmental variables.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kploy version less then 0.7.0 have ### Response: Having vulnarability PVE-2017-47613 Advisory: Kploy 0.7.0 adds support for passing secrets securely via environmental variables." }, { "instruction": "what vulnarability does krptn version less then 0.5.5 have", "input": "", "output": "Having vulnarability PVE-2023-54815 Advisory: Krptn 0.5.5 mitigates the risk of severe memory corruption by adding simple type-checking.\r\nhttps://github.com/krptn/krypton/commit/aa950a900c3e9d3336bf78dd6b4887e03b041175", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does krptn version less then 0.5.5 have ### Response: Having vulnarability PVE-2023-54815 Advisory: Krptn 0.5.5 mitigates the risk of severe memory corruption by adding simple type-checking.\r\nhttps://github.com/krptn/krypton/commit/aa950a900c3e9d3336bf78dd6b4887e03b041175" }, { "instruction": "what vulnarability does kserve version less then 0.10.0 have", "input": "", "output": "Having vulnarability CVE-2021-44228 Advisory: Kserve 0.10.0 updates its dependency 'ray' to v1.10.0 to include a fix for a critical vulnerability.\r\nhttps://github.com/kserve/kserve/issues/2190", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kserve version less then 0.10.0 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Kserve 0.10.0 updates its dependency 'ray' to v1.10.0 to include a fix for a critical vulnerability.\r\nhttps://github.com/kserve/kserve/issues/2190" }, { "instruction": "what vulnarability does kube-copilot version less then 0.1.21 have", "input": "", "output": "Having vulnarability CVE-2023-36189 Advisory: Kube-copilot 0.1.21 updates its dependency 'langchain' to v0.0.278 to include a security fix.\r\nhttps://github.com/feiskyer/kube-copilot/pull/43", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kube-copilot version less then 0.1.21 have ### Response: Having vulnarability CVE-2023-36189 Advisory: Kube-copilot 0.1.21 updates its dependency 'langchain' to v0.0.278 to include a security fix.\r\nhttps://github.com/feiskyer/kube-copilot/pull/43" }, { "instruction": "what vulnarability does kubernetes version less then 10.0.1 have", "input": "", "output": "Having vulnarability CVE-2019-11324 Advisory: Kubernetes 10.0.1 updates its dependency 'urllib3' to include a security fix.\r\nhttps://github.com/kubernetes-client/python/pull/897", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubernetes version less then 10.0.1 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Kubernetes 10.0.1 updates its dependency 'urllib3' to include a security fix.\r\nhttps://github.com/kubernetes-client/python/pull/897" }, { "instruction": "what vulnarability does kubernetes-asyncio version less then 19.15.0 have", "input": "", "output": "Having vulnarability CVE-2021-3121 Advisory: Kubernetes-asyncio 19.15.0 updates gogo/protobuf to v1.3.2 to include a security fix.\r\nhttps://github.com/kubernetes/kubernetes/pull/100515", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubernetes-asyncio version less then 19.15.0 have ### Response: Having vulnarability CVE-2021-3121 Advisory: Kubernetes-asyncio 19.15.0 updates gogo/protobuf to v1.3.2 to include a security fix.\r\nhttps://github.com/kubernetes/kubernetes/pull/100515" }, { "instruction": "what vulnarability does kubetest version less then 0.1.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Kubetest 0.1.0 updates the pyyaml version for security reasons. See: CVE-2017-18342.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubetest version less then 0.1.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Kubetest 0.1.0 updates the pyyaml version for security reasons. See: CVE-2017-18342." }, { "instruction": "what vulnarability does kuzu version less then 0.0.3 have", "input": "", "output": "Having vulnarability PVE-2023-58920 Advisory: Kuzu 0.0.3 includes a fix for a format string vulnerability.\r\nhttps://github.com/kuzudb/kuzu/pull/1335/commits/b6267047c6d9c3d316330c745946368b27c3e823", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kuzu version less then 0.0.3 have ### Response: Having vulnarability PVE-2023-58920 Advisory: Kuzu 0.0.3 includes a fix for a format string vulnerability.\r\nhttps://github.com/kuzudb/kuzu/pull/1335/commits/b6267047c6d9c3d316330c745946368b27c3e823" }, { "instruction": "what vulnarability does kvm48 version less then 1.3.600 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Kvm48 1.3.600 includes a security patch for the function 'load' in 'kvm48/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/SNH48Live/KVM48/commit/1cd560899b8bbb10de64ce5a4f6e88fd61f4199d#diff-ebd9623cdd31ae084d3bdeb718bdcf42de239f8b24a1170581c4c6f89dedeaae", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kvm48 version less then 1.3.600 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Kvm48 1.3.600 includes a security patch for the function 'load' in 'kvm48/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/SNH48Live/KVM48/commit/1cd560899b8bbb10de64ce5a4f6e88fd61f4199d#diff-ebd9623cdd31ae084d3bdeb718bdcf42de239f8b24a1170581c4c6f89dedeaae" }, { "instruction": "what vulnarability does kytos version less then 2019.1b1 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Kytos 2019.1b1 updates its dependency 'requests' to v2.21.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kytos version less then 2019.1b1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kytos 2019.1b1 updates its dependency 'requests' to v2.21.0 to include a security fix." }, { "instruction": "what vulnarability does kytos-utils version less then 2019.1b3 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Kytos-utils 2019.1b3 updates its dependency 'requests' to '>=2.20.0' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kytos-utils version less then 2019.1b3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kytos-utils 2019.1b3 updates its dependency 'requests' to '>=2.20.0' to include a security fix." }, { "instruction": "what vulnarability does label-sleuth version less then 0.11.6 have", "input": "", "output": "Having vulnarability CVE-2022-31015 Advisory: Label-sleuth 0.11.6 updates its dependency 'waitress' to v2.1.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-sleuth version less then 0.11.6 have ### Response: Having vulnarability CVE-2022-31015 Advisory: Label-sleuth 0.11.6 updates its dependency 'waitress' to v2.1.2 to include a security fix." }, { "instruction": "what vulnarability does label-studio version less then 0.0.45 have", "input": "", "output": "Having vulnarability CVE-2021-34552 Advisory: Label-studio version 0.0.45 has updated its Pillow library dependency to version 8.3.1, moving from a previous specification of versions greater than or equal to 8 and less than or equal to 8.3. This change addresses the security issue identified as CVE-2021-34552.\r\nhttps://github.com/HumanSignal/label-studio-converter/pull/44/commits/51edb4ddda8035a6215ccd92746488df720ef25b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-studio version less then 0.0.45 have ### Response: Having vulnarability CVE-2021-34552 Advisory: Label-studio version 0.0.45 has updated its Pillow library dependency to version 8.3.1, moving from a previous specification of versions greater than or equal to 8 and less than or equal to 8.3. This change addresses the security issue identified as CVE-2021-34552.\r\nhttps://github.com/HumanSignal/label-studio-converter/pull/44/commits/51edb4ddda8035a6215ccd92746488df720ef25b" }, { "instruction": "what vulnarability does label-studio-converter version less then 0.0.43 have", "input": "", "output": "Having vulnarability CVE-2021-28676 Advisory: Label-studio-converter 0.0.43 updates its dependency 'pillow' to v8.3.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-studio-converter version less then 0.0.43 have ### Response: Having vulnarability CVE-2021-28676 Advisory: Label-studio-converter 0.0.43 updates its dependency 'pillow' to v8.3.1 to include security fixes." }, { "instruction": "what vulnarability does labgrid version less then 23.0.2 have", "input": "", "output": "Having vulnarability PVE-2024-64091 Advisory: Labgrid 23.0.2 fixes a race condition that previously occurred in the handling of USBSDMuxDevice/USBSDWireDevice paths. This issue arose particularly during USB resets or fast replugging events. It potentially led to the incorrect assignment of control and disk paths for the USBSDMuxDevice and USBSDWireDevice, impacting their accurate and reliable operation.\r\nhttps://github.com/labgrid-project/labgrid/compare/v23.0.1...v23.0.2#diff-bc256bde0e401738303653d85da6e6a1a1a937880d1eb6f9c423a9970eb349d2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does labgrid version less then 23.0.2 have ### Response: Having vulnarability PVE-2024-64091 Advisory: Labgrid 23.0.2 fixes a race condition that previously occurred in the handling of USBSDMuxDevice/USBSDWireDevice paths. This issue arose particularly during USB resets or fast replugging events. It potentially led to the incorrect assignment of control and disk paths for the USBSDMuxDevice and USBSDWireDevice, impacting their accurate and reliable operation.\r\nhttps://github.com/labgrid-project/labgrid/compare/v23.0.1...v23.0.2#diff-bc256bde0e401738303653d85da6e6a1a1a937880d1eb6f9c423a9970eb349d2" }, { "instruction": "what vulnarability does ladok3 version less then 4.2 have", "input": "", "output": "Having vulnarability CVE-2022-40896 Advisory: Ladok3 4.2 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/dbosk/ladok3/commit/685f2fca6d38960a650060b1bdd13ca88f30b13f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladok3 version less then 4.2 have ### Response: Having vulnarability CVE-2022-40896 Advisory: Ladok3 4.2 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability.\r\nhttps://github.com/dbosk/ladok3/commit/685f2fca6d38960a650060b1bdd13ca88f30b13f" }, { "instruction": "what vulnarability does ladon version greather then equal to 0.6.1,less then equal to 0.9.40 have", "input": "", "output": "Having vulnarability CVE-2019-1010268 Advisory: Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladon version greather then equal to 0.6.1,less then equal to 0.9.40 have ### Response: Having vulnarability CVE-2019-1010268 Advisory: Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call." }, { "instruction": "what vulnarability does ladybug-comfort version less then 0.16.18 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Ladybug-comfort 0.16.18 updates its dependency 'setuptools' to v65.5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladybug-comfort version less then 0.16.18 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Ladybug-comfort 0.16.18 updates its dependency 'setuptools' to v65.5.1 to include a security fix." }, { "instruction": "what vulnarability does lagmat version less then 0.3.3 have", "input": "", "output": "Having vulnarability CVE-2019-6446 Advisory: Lagmat 0.3.3 updates its dependency 'numpy' to v1.19.5 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lagmat version less then 0.3.3 have ### Response: Having vulnarability CVE-2019-6446 Advisory: Lagmat 0.3.3 updates its dependency 'numpy' to v1.19.5 to include a security fix." }, { "instruction": "what vulnarability does lakefs version less then 1.3.1 have", "input": "", "output": "Having vulnarability PVE-2023-62784 Advisory: Lakefs 1.3.1 fixes a bug that allows an user with permission to write actions can impersonate another user when auth token is configured in environment variable.\r\nhttps://github.com/treeverse/lakeFS/security/advisories/GHSA-26hr-q2wp-rvc5", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lakefs version less then 1.3.1 have ### Response: Having vulnarability PVE-2023-62784 Advisory: Lakefs 1.3.1 fixes a bug that allows an user with permission to write actions can impersonate another user when auth token is configured in environment variable.\r\nhttps://github.com/treeverse/lakeFS/security/advisories/GHSA-26hr-q2wp-rvc5" }, { "instruction": "what vulnarability does lambda-tools version less then 0.1.2 have", "input": "", "output": "Having vulnarability PVE-2021-35209 Advisory: lambda-tools before 0.1.2 used an unsafe way to load untrusted lambda definitions via `yaml.load`.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lambda-tools version less then 0.1.2 have ### Response: Having vulnarability PVE-2021-35209 Advisory: lambda-tools before 0.1.2 used an unsafe way to load untrusted lambda definitions via `yaml.load`." }, { "instruction": "what vulnarability does lambdajson version less then 0.1.5 have", "input": "", "output": "Having vulnarability PVE-2021-25874 Advisory: lambdajson 0.1.5 includes a security fix. Using ast.literal_eval as eval.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lambdajson version less then 0.1.5 have ### Response: Having vulnarability PVE-2021-25874 Advisory: lambdajson 0.1.5 includes a security fix. Using ast.literal_eval as eval." }, { "instruction": "what vulnarability does lander version less then 0.1.15 have", "input": "", "output": "Having vulnarability CVE-2018-18074 Advisory: Lander 0.1.15 updates 'requests' to 2.20.0 for security reasons.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lander version less then 0.1.15 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Lander 0.1.15 updates 'requests' to 2.20.0 for security reasons." }, { "instruction": "what vulnarability does lando version less then 0.11.3 have", "input": "", "output": "Having vulnarability PVE-2021-37414 Advisory: Lando 0.11.3 adds `cluster_api_settings .ssl_ca_cert` config flag to allow secure k8s connections. See .", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lando version less then 0.11.3 have ### Response: Having vulnarability PVE-2021-37414 Advisory: Lando 0.11.3 adds `cluster_api_settings .ssl_ca_cert` config flag to allow secure k8s connections. See ." }, { "instruction": "what vulnarability does langchain version less then 0.0.142 have", "input": "", "output": "Having vulnarability CVE-2023-29374 Advisory: LangChain 0.0.142 includes a fix for CVE-2023-29374: The LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.\r\nhttps://github.com/hwchase17/langchain/pull/1119\r\nhttps://github.com/langchain-ai/langchain/commit/5ca7ce77cd536991d04f476e420446a3b21d2a7b", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langchain version less then 0.0.142 have ### Response: Having vulnarability CVE-2023-29374 Advisory: LangChain 0.0.142 includes a fix for CVE-2023-29374: The LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.\r\nhttps://github.com/hwchase17/langchain/pull/1119\r\nhttps://github.com/langchain-ai/langchain/commit/5ca7ce77cd536991d04f476e420446a3b21d2a7b" }, { "instruction": "what vulnarability does langchain-experimental version less then 0.0.52 have", "input": "", "output": "Having vulnarability CVE-2023-45920 Advisory: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langchain-experimental version less then 0.0.52 have ### Response: Having vulnarability CVE-2023-45920 Advisory: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py." }, { "instruction": "what vulnarability does langfuse version less then 2.1.0 have", "input": "", "output": "Having vulnarability PVE-2024-65269 Advisory: Langfuse version 2.1.0 updates its nodemailer dependency to 6.9.9 from 6.9.8, prompted by security considerations.\r\nhttps://github.com/langfuse/langfuse/pull/1027", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langfuse version less then 2.1.0 have ### Response: Having vulnarability PVE-2024-65269 Advisory: Langfuse version 2.1.0 updates its nodemailer dependency to 6.9.9 from 6.9.8, prompted by security considerations.\r\nhttps://github.com/langfuse/langfuse/pull/1027" }, { "instruction": "what vulnarability does language-formatters-pre-commit-hooks version less then 1.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-38926 Advisory: Language-formatters-pre-commit-hooks 1.6.0 enhances its security in commands execution to prevent shell-injection.\r\nhttps://github.com/macisamuele/language-formatters-pre-commit-hooks/pull/38/files", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does language-formatters-pre-commit-hooks version less then 1.6.0 have ### Response: Having vulnarability PVE-2021-38926 Advisory: Language-formatters-pre-commit-hooks 1.6.0 enhances its security in commands execution to prevent shell-injection.\r\nhttps://github.com/macisamuele/language-formatters-pre-commit-hooks/pull/38/files" }, { "instruction": "what vulnarability does lapdog version less then 0.18.7 have", "input": "", "output": "Having vulnarability PVE-2021-37597 Advisory: Lapdog 0.18.7 improves API security by switching to custom Lapdog OAuth tokens. Currently this is only supported by Broad accounts. Non-broad accounts will continue to use standard Google application-default credentials when authenticating through the Lapdog API.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lapdog version less then 0.18.7 have ### Response: Having vulnarability PVE-2021-37597 Advisory: Lapdog 0.18.7 improves API security by switching to custom Lapdog OAuth tokens. Currently this is only supported by Broad accounts. Non-broad accounts will continue to use standard Google application-default credentials when authenticating through the Lapdog API." }, { "instruction": "what vulnarability does laporte-mqtt version less then 0.2.2 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Laporte-Mqtt 0.2.2 includes a security patch for the function 'load_config' in 'laporte_mqtt/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/vinklat/laporte-mqtt/commit/db24ded1c1ed0232c42bb826b9c1dc30fb925f2e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does laporte-mqtt version less then 0.2.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Laporte-Mqtt 0.2.2 includes a security patch for the function 'load_config' in 'laporte_mqtt/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/vinklat/laporte-mqtt/commit/db24ded1c1ed0232c42bb826b9c1dc30fb925f2e" }, { "instruction": "what vulnarability does lattice version less then 0.1.2 have", "input": "", "output": "Having vulnarability PVE-2022-52518 Advisory: Lattice 0.1.2 replaces its dependency 'GitPython' with 'pygit2' to avoid security issues.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lattice version less then 0.1.2 have ### Response: Having vulnarability PVE-2022-52518 Advisory: Lattice 0.1.2 replaces its dependency 'GitPython' with 'pygit2' to avoid security issues." }, { "instruction": "what vulnarability does launchable version less then 1.38.10 have", "input": "", "output": "Having vulnarability PVE-2023-58696 Advisory: Launchable 1.38.10 includes a fix for a OS command injection vulnerability.\r\nhttps://github.com/launchableinc/cli/pull/393", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchable version less then 1.38.10 have ### Response: Having vulnarability PVE-2023-58696 Advisory: Launchable 1.38.10 includes a fix for a OS command injection vulnerability.\r\nhttps://github.com/launchableinc/cli/pull/393" }, { "instruction": "what vulnarability does launchdarkly-server-sdk version less then 6.11.2 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Launchdarkly-server-sdk 6.11.2 uses 'yaml.safe_load()' instead of 'yaml.load()' for YAML/JSON test data parsing to fix an arbitrary code execution vulnerability.\r\nhttps://github.com/launchdarkly/python-server-sdk/issues/136", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchdarkly-server-sdk version less then 6.11.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Launchdarkly-server-sdk 6.11.2 uses 'yaml.safe_load()' instead of 'yaml.load()' for YAML/JSON test data parsing to fix an arbitrary code execution vulnerability.\r\nhttps://github.com/launchdarkly/python-server-sdk/issues/136" }, { "instruction": "what vulnarability does launchkey version less then 3.9.1 have", "input": "", "output": "Having vulnarability CVE-2020-28493 Advisory: Launchkey 3.9.1 updates its dependency 'jinja2' to v2.11.3 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchkey version less then 3.9.1 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Launchkey 3.9.1 updates its dependency 'jinja2' to v2.11.3 to include a security fix." }, { "instruction": "what vulnarability does layeredimage version less then 2021.2.1 have", "input": "", "output": "Having vulnarability CVE-2020-35653 Advisory: layeredimage 2021.2.1 updates its dependency 'pillow' to versions >= 8.1.1 to imclude security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does layeredimage version less then 2021.2.1 have ### Response: Having vulnarability CVE-2020-35653 Advisory: layeredimage 2021.2.1 updates its dependency 'pillow' to versions >= 8.1.1 to imclude security fixes." }, { "instruction": "what vulnarability does lazuli version less then 2.2.2 have", "input": "", "output": "Having vulnarability CVE-2021-22570 Advisory: Lazuli 2.2.2 pins its dependency 'protobuf' to v3.20.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lazuli version less then 2.2.2 have ### Response: Having vulnarability CVE-2021-22570 Advisory: Lazuli 2.2.2 pins its dependency 'protobuf' to v3.20.1 to include a security fix." }, { "instruction": "what vulnarability does lbt-dragonfly version less then 0.9.404 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Lbt-dragonfly 0.9.404 updates its dependency 'wheel' to v0.38.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lbt-dragonfly version less then 0.9.404 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Lbt-dragonfly 0.9.404 updates its dependency 'wheel' to v0.38.1 to include a security fix." }, { "instruction": "what vulnarability does lbt-honeybee version less then 0.7.125 have", "input": "", "output": "Having vulnarability CVE-2022-40897 Advisory: Lbt-honeybee 0.7.125 updates its dependency 'setuptools' to v65.5.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lbt-honeybee version less then 0.7.125 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Lbt-honeybee 0.7.125 updates its dependency 'setuptools' to v65.5.1 to include a security fix." }, { "instruction": "what vulnarability does lc-sdk-python version less then 0.3.1 have", "input": "", "output": "Having vulnarability CVE-2021-41945 Advisory: Lc-sdk-python 0.3.1 updates 'httpx' dependency to v0.23.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lc-sdk-python version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Lc-sdk-python 0.3.1 updates 'httpx' dependency to v0.23.0 to include a security fix." }, { "instruction": "what vulnarability does ldap3 version less then 0.9.5.4 have", "input": "", "output": "Having vulnarability PVE-2021-25875 Advisory: ldap3 before 0.9.5.4 has several security issues in lazy connections.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldap3 version less then 0.9.5.4 have ### Response: Having vulnarability PVE-2021-25875 Advisory: ldap3 before 0.9.5.4 has several security issues in lazy connections." }, { "instruction": "what vulnarability does ldap3-ad-leavers version less then 1.2.0 have", "input": "", "output": "Having vulnarability PVE-2022-52390 Advisory: Ldap3-ad-leavers 1.2.0 includes a fix for a code injection vulnerability.\r\nhttps://github.com/mervinhemaraju/ldap3-ad-leavers/commit/0e8351c3b6df679423e3cd8fa847487a55f85687", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldap3-ad-leavers version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-52390 Advisory: Ldap3-ad-leavers 1.2.0 includes a fix for a code injection vulnerability.\r\nhttps://github.com/mervinhemaraju/ldap3-ad-leavers/commit/0e8351c3b6df679423e3cd8fa847487a55f85687" }, { "instruction": "what vulnarability does ldapcherry version greather then equal to 0,less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2019-25095 Advisory: A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldapcherry version greather then equal to 0,less then 1.0.0 have ### Response: Having vulnarability CVE-2019-25095 Advisory: A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability." }, { "instruction": "what vulnarability does leap-bitmask version less then 0.9 have", "input": "", "output": "Having vulnarability PVE-2017-47230 Advisory: Leap.bitmask 0.9.0 stops including 3rd party libs logs. These logs could include, for example, exported PGP private keys.\r\nhttps://github.com/leapcode/bitmask-dev/commit/fc65820f9e9a9a39434bbef3f5e9251436d9b458", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does leap-bitmask version less then 0.9 have ### Response: Having vulnarability PVE-2017-47230 Advisory: Leap.bitmask 0.9.0 stops including 3rd party libs logs. These logs could include, for example, exported PGP private keys.\r\nhttps://github.com/leapcode/bitmask-dev/commit/fc65820f9e9a9a39434bbef3f5e9251436d9b458" }, { "instruction": "what vulnarability does learninglib version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45477 Advisory: Learninglib is a malicious package, typosquatting. It installs cryptomining malware in your system.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does learninglib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45477 Advisory: Learninglib is a malicious package, typosquatting. It installs cryptomining malware in your system.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/" }, { "instruction": "what vulnarability does ledfx version less then 2.0.70 have", "input": "", "output": "Having vulnarability PVE-2024-67135 Advisory: Ledfx 2.0.70 addresses and resolves a critical issue that could cause crashes due to a race condition and the presence of empty virtual data. The race condition could potentially be exploited to cause a denial of service (DoS).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ledfx version less then 2.0.70 have ### Response: Having vulnarability PVE-2024-67135 Advisory: Ledfx 2.0.70 addresses and resolves a critical issue that could cause crashes due to a race condition and the presence of empty virtual data. The race condition could potentially be exploited to cause a denial of service (DoS)." }, { "instruction": "what vulnarability does lekt version less then 14.0.13 have", "input": "", "output": "Having vulnarability PVE-2022-51649 Advisory: Lekt 14.0.13 updates Open EDX image version to 14.2.1, which includes a security fix for a XSS vulnerability in edx-platform.\r\nhttps://github.com/lektorium-tutor/lekt/commit/b46a7b0fa806604eddaed8646a2a8712a8508c79", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lekt version less then 14.0.13 have ### Response: Having vulnarability PVE-2022-51649 Advisory: Lekt 14.0.13 updates Open EDX image version to 14.2.1, which includes a security fix for a XSS vulnerability in edx-platform.\r\nhttps://github.com/lektorium-tutor/lekt/commit/b46a7b0fa806604eddaed8646a2a8712a8508c79" }, { "instruction": "what vulnarability does lemur version less then 0.1.5 have", "input": "", "output": "Having vulnarability CVE-2015-7764 Advisory: Lemur 0.1.5 includes a fix for CVE-2015-7764: Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode.\r\nhttp://www.openwall.com/lists/oss-security/2015/10/20/3\r\nhttps://github.com/Netflix/lemur/issues/117\r\nhttps://github.com/kvesteri/sqlalchemy-utils/issues/166", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lemur version less then 0.1.5 have ### Response: Having vulnarability CVE-2015-7764 Advisory: Lemur 0.1.5 includes a fix for CVE-2015-7764: Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode.\r\nhttp://www.openwall.com/lists/oss-security/2015/10/20/3\r\nhttps://github.com/Netflix/lemur/issues/117\r\nhttps://github.com/kvesteri/sqlalchemy-utils/issues/166" }, { "instruction": "what vulnarability does leo version greather then equal to 0,less then 6.3 have", "input": "", "output": "Having vulnarability CVE-2020-23478 Advisory: Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does leo version greather then equal to 0,less then 6.3 have ### Response: Having vulnarability CVE-2020-23478 Advisory: Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py." }, { "instruction": "what vulnarability does levenshtein version less then 0.12.1 have", "input": "", "output": "Having vulnarability PVE-2022-44654 Advisory: Levenshtein 0.12.1 fixes handling of numerous possible wraparounds in calculating the size of memory allocations; incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library.\r\nhttps://github.com/ztane/python-Levenshtein/issues/62", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does levenshtein version less then 0.12.1 have ### Response: Having vulnarability PVE-2022-44654 Advisory: Levenshtein 0.12.1 fixes handling of numerous possible wraparounds in calculating the size of memory allocations; incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library.\r\nhttps://github.com/ztane/python-Levenshtein/issues/62" }, { "instruction": "what vulnarability does lfm version less then 2.0 have", "input": "", "output": "Having vulnarability PVE-2021-34612 Advisory: Lfm 2.0 uses tempfile secure versions mkdtemp() and mkstemp().", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lfm version less then 2.0 have ### Response: Having vulnarability PVE-2021-34612 Advisory: Lfm 2.0 uses tempfile secure versions mkdtemp() and mkstemp()." }, { "instruction": "what vulnarability does lg-rez version less then 2.1.4 have", "input": "", "output": "Having vulnarability CVE-2021-28676 Advisory: Lg-rez version 2.1.4 updates its dependency 'pillow' to v8.2.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lg-rez version less then 2.1.4 have ### Response: Having vulnarability CVE-2021-28676 Advisory: Lg-rez version 2.1.4 updates its dependency 'pillow' to v8.2.0 to include security fixes." }, { "instruction": "what vulnarability does libarchive-c version less then 4.0 have", "input": "", "output": "Having vulnarability PVE-2023-59300 Advisory: Libarchive-c 4.0 includes a fix for an unsafe defaults vulnerability that could have lead to path traversal.\r\nhttps://github.com/Changaco/python-libarchive-c/commit/98c14d296a7f3ab04dd0a4c8c9c2920f88537fa7", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libarchive-c version less then 4.0 have ### Response: Having vulnarability PVE-2023-59300 Advisory: Libarchive-c 4.0 includes a fix for an unsafe defaults vulnerability that could have lead to path traversal.\r\nhttps://github.com/Changaco/python-libarchive-c/commit/98c14d296a7f3ab04dd0a4c8c9c2920f88537fa7" }, { "instruction": "what vulnarability does libari version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45410 Advisory: Libari is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.\r\nhttps://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libari version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45410 Advisory: Libari is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.\r\nhttps://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/" }, { "instruction": "what vulnarability does libgenesis version less then 0.1.8 have", "input": "", "output": "Having vulnarability CVE-2020-27783 Advisory: Libgenesis 0.1.8 updates its dependency 'lxml' minimum version to v4.6.5 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libgenesis version less then 0.1.8 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Libgenesis 0.1.8 updates its dependency 'lxml' minimum version to v4.6.5 to include security fixes." }, { "instruction": "what vulnarability does libhttps version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2023-52926 Advisory: Libhttps is a malicious package. It installs info-stealing Malware.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libhttps version greather then 0 have ### Response: Having vulnarability PVE-2023-52926 Advisory: Libhttps is a malicious package. It installs info-stealing Malware.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware" }, { "instruction": "what vulnarability does libhxl version less then 4.21.3 have", "input": "", "output": "Having vulnarability PVE-2021-39450 Advisory: For web-security reasons, libhxl 4.21.3 blocks the fetching of datasets from localhost, *.localdomain (or any dotted quad) unless allow_local is True.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libhxl version less then 4.21.3 have ### Response: Having vulnarability PVE-2021-39450 Advisory: For web-security reasons, libhxl 4.21.3 blocks the fetching of datasets from localhost, *.localdomain (or any dotted quad) unless allow_local is True." }, { "instruction": "what vulnarability does libosdp version less then 1.3.0 have", "input": "", "output": "Having vulnarability PVE-2023-62431 Advisory: Libosdp 1.3.0 includes a fix for a CWE-1392: Use of Default Credentials.\r\nhttps://github.com/goToMain/libosdp/commit/cb918c29ca672375cc4bdcef84e2c8d21a8df3e8", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libosdp version less then 1.3.0 have ### Response: Having vulnarability PVE-2023-62431 Advisory: Libosdp 1.3.0 includes a fix for a CWE-1392: Use of Default Credentials.\r\nhttps://github.com/goToMain/libosdp/commit/cb918c29ca672375cc4bdcef84e2c8d21a8df3e8" }, { "instruction": "what vulnarability does libpesh version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45409 Advisory: Libpesh is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.\r\nhttps://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpesh version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45409 Advisory: Libpesh is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.\r\nhttps://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/" }, { "instruction": "what vulnarability does libpeshka version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45415 Advisory: Libpeshka is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpeshka version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45415 Advisory: Libpeshka is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.\r\nhttps://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/" }, { "instruction": "what vulnarability does libpeshnx version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45408 Advisory: Libpeshnx is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.\r\nhttps://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpeshnx version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45408 Advisory: Libpeshnx is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.\r\nhttps://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/" }, { "instruction": "what vulnarability does libre-fastapi-jwt version less then 0.20.3 have", "input": "", "output": "Having vulnarability CVE-2023-2650 Advisory: Libre-fastapi-jwt 0.20.3 updates its dependency 'cryptography' to version '41.0.1' to include a security fix.\r\nhttps://github.com/LibreNZ/libre-fastapi-jwt/commit/fa128ea36cf021e104f564d3c7bc3874f83461fe", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libre-fastapi-jwt version less then 0.20.3 have ### Response: Having vulnarability CVE-2023-2650 Advisory: Libre-fastapi-jwt 0.20.3 updates its dependency 'cryptography' to version '41.0.1' to include a security fix.\r\nhttps://github.com/LibreNZ/libre-fastapi-jwt/commit/fa128ea36cf021e104f564d3c7bc3874f83461fe" }, { "instruction": "what vulnarability does libretranslate version less then 1.5.4 have", "input": "", "output": "Having vulnarability CVE-2023-25577 Advisory: Libretranslate 1.5.4 updates its Werkzeug dependency from 2.2.2 to 2.3.8. This upgrade addresses the vulnerability identified as CVE-2023-25577.\r\nhttps://github.com/LibreTranslate/LibreTranslate/pull/570/commits/51341d92ade55e47d94ac2f6dd095fcc226e62d0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libretranslate version less then 1.5.4 have ### Response: Having vulnarability CVE-2023-25577 Advisory: Libretranslate 1.5.4 updates its Werkzeug dependency from 2.2.2 to 2.3.8. This upgrade addresses the vulnerability identified as CVE-2023-25577.\r\nhttps://github.com/LibreTranslate/LibreTranslate/pull/570/commits/51341d92ade55e47d94ac2f6dd095fcc226e62d0" }, { "instruction": "what vulnarability does libtaxii version less then 1.1.105 have", "input": "", "output": "Having vulnarability PVE-2021-25877 Advisory: libtaxii before 1.1.105 has multiple XML parsing related vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtaxii version less then 1.1.105 have ### Response: Having vulnarability PVE-2021-25877 Advisory: libtaxii before 1.1.105 has multiple XML parsing related vulnerabilities." }, { "instruction": "what vulnarability does libtmux version less then 0.11.0 have", "input": "", "output": "Having vulnarability CVE-2020-8927 Advisory: Libtmux 0.11.0 updates its dependency 'brotly' to versions >=1.0.9 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtmux version less then 0.11.0 have ### Response: Having vulnarability CVE-2020-8927 Advisory: Libtmux 0.11.0 updates its dependency 'brotly' to versions >=1.0.9 to include a security fix." }, { "instruction": "what vulnarability does libtorrent version less then 2.0.3 have", "input": "", "output": "Having vulnarability PVE-2021-43049 Advisory: Libtorrent 2.0.3 (the underlying core dependency of the Python bindings) fixes an integer overflow in hash_picker and properly restricts max file sizes in torrents.\r\nhttps://github.com/arvidn/libtorrent/commit/58a489332ca05303e8001c24478f27338309c858", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtorrent version less then 2.0.3 have ### Response: Having vulnarability PVE-2021-43049 Advisory: Libtorrent 2.0.3 (the underlying core dependency of the Python bindings) fixes an integer overflow in hash_picker and properly restricts max file sizes in torrents.\r\nhttps://github.com/arvidn/libtorrent/commit/58a489332ca05303e8001c24478f27338309c858" }, { "instruction": "what vulnarability does libvcs version less then 0.11.1 have", "input": "", "output": "Having vulnarability CVE-2022-21187 Advisory: Libvcs before 0.11.1 is vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libvcs version less then 0.11.1 have ### Response: Having vulnarability CVE-2022-21187 Advisory: Libvcs before 0.11.1 is vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution." }, { "instruction": "what vulnarability does libyang version less then 1.0.240 have", "input": "", "output": "Having vulnarability CVE-2021-28902 Advisory: In function read_yin_container() in libyang <= v1.0.225 or possibly <= 1.0.240 doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libyang version less then 1.0.240 have ### Response: Having vulnarability CVE-2021-28902 Advisory: In function read_yin_container() in libyang <= v1.0.225 or possibly <= 1.0.240 doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash." }, { "instruction": "what vulnarability does licenseware version less then 2.0.0 have", "input": "", "output": "Having vulnarability CVE-2022-25236 Advisory: Licenseware 2.0.0 updates its dependency 'libexpat1' in the Dockerfile to include security fixes.\r\nhttps://github.com/licenseware/licenseware-sdk-v2/pull/59", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does licenseware version less then 2.0.0 have ### Response: Having vulnarability CVE-2022-25236 Advisory: Licenseware 2.0.0 updates its dependency 'libexpat1' in the Dockerfile to include security fixes.\r\nhttps://github.com/licenseware/licenseware-sdk-v2/pull/59" }, { "instruction": "what vulnarability does lief version less then 0.11.0 have", "input": "", "output": "Having vulnarability CVE-2021-32297 Advisory: A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution.\r\nhttps://github.com/lief-project/LIEF/commit/19e06755e8ce1ecf136360a5c36cded3701ac253", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lief version less then 0.11.0 have ### Response: Having vulnarability CVE-2021-32297 Advisory: A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution.\r\nhttps://github.com/lief-project/LIEF/commit/19e06755e8ce1ecf136360a5c36cded3701ac253" }, { "instruction": "what vulnarability does lifx-control-panel version less then 1.5.4 have", "input": "", "output": "Having vulnarability PVE-2021-37424 Advisory: Lifx-control-panel 1.5.4 fixes a pretty major security exploit. It adds safe-scopes to all 'eval()' calls.\r\nhttps://github.com/samclane/LIFX-Control-Panel/commit/3f95fd5362b52144b44e47102ab386baa511f143", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lifx-control-panel version less then 1.5.4 have ### Response: Having vulnarability PVE-2021-37424 Advisory: Lifx-control-panel 1.5.4 fixes a pretty major security exploit. It adds safe-scopes to all 'eval()' calls.\r\nhttps://github.com/samclane/LIFX-Control-Panel/commit/3f95fd5362b52144b44e47102ab386baa511f143" }, { "instruction": "what vulnarability does light-the-torch version less then 0.7.0 have", "input": "", "output": "Having vulnarability PVE-2023-52882 Advisory: Light-the-torch 0.7.0 mitigates the risk of supply chain attacks.\r\nhttps://github.com/pmeier/light-the-torch/pull/115\r\nhttps://github.com/pmeier/light-the-torch/pull/118", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does light-the-torch version less then 0.7.0 have ### Response: Having vulnarability PVE-2023-52882 Advisory: Light-the-torch 0.7.0 mitigates the risk of supply chain attacks.\r\nhttps://github.com/pmeier/light-the-torch/pull/115\r\nhttps://github.com/pmeier/light-the-torch/pull/118" }, { "instruction": "what vulnarability does lightning version less then 2.0.4 have", "input": "", "output": "Having vulnarability CVE-2023-34092 Advisory: Lightning 2.0.4 updates its dependency 'vite' to version '2.9.16' to include a security fix.\r\nhttps://github.com/Lightning-AI/lightning/commit/7d2a46efa9834c3bb0bc1069df0a2e3a6e855d01", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lightning version less then 2.0.4 have ### Response: Having vulnarability CVE-2023-34092 Advisory: Lightning 2.0.4 updates its dependency 'vite' to version '2.9.16' to include a security fix.\r\nhttps://github.com/Lightning-AI/lightning/commit/7d2a46efa9834c3bb0bc1069df0a2e3a6e855d01" }, { "instruction": "what vulnarability does lilac version less then 0.3.7 have", "input": "", "output": "Having vulnarability CVE-2023-47248 Advisory: Lilac 0.3.7 upgrades its pyarrow dependency to version ^13.0.0 from ^14.0.1 in response to CVE-2023-47248.\r\nhttps://github.com/lilacai/lilac/pull/1191/commits/493dd721e01019185fa62beb0c162286d24dbbbe", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lilac version less then 0.3.7 have ### Response: Having vulnarability CVE-2023-47248 Advisory: Lilac 0.3.7 upgrades its pyarrow dependency to version ^13.0.0 from ^14.0.1 in response to CVE-2023-47248.\r\nhttps://github.com/lilacai/lilac/pull/1191/commits/493dd721e01019185fa62beb0c162286d24dbbbe" }, { "instruction": "what vulnarability does liminal-sdk-python version less then 2024.03.0 have", "input": "", "output": "Having vulnarability PVE-2024-66762 Advisory: Liminal-sdk-python 2024.03.0 fixes a race condition when refreshing the access token.\r\nhttps://github.com/liminal-ai-security/liminal-sdk-python/pull/66/commits/866a018f704d2947e62ab037c94771f47d14c8b0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does liminal-sdk-python version less then 2024.03.0 have ### Response: Having vulnarability PVE-2024-66762 Advisory: Liminal-sdk-python 2024.03.0 fixes a race condition when refreshing the access token.\r\nhttps://github.com/liminal-ai-security/liminal-sdk-python/pull/66/commits/866a018f704d2947e62ab037c94771f47d14c8b0" }, { "instruction": "what vulnarability does limnoria version less then 2019.11.09 have", "input": "", "output": "Having vulnarability CVE-2019-19010 Advisory: Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does limnoria version less then 2019.11.09 have ### Response: Having vulnarability CVE-2019-19010 Advisory: Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands." }, { "instruction": "what vulnarability does lin-cms version less then 0.2.0b1 have", "input": "", "output": "Having vulnarability CVE-2020-18699 Advisory: Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arbitrary code by entering scripts in the 'Username' parameter of the in component 'app/api/cms/user.py' (https://github.com/TaleLin/lin-cms-flask/issues/28). See CVE-2020-18699.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lin-cms version less then 0.2.0b1 have ### Response: Having vulnarability CVE-2020-18699 Advisory: Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arbitrary code by entering scripts in the 'Username' parameter of the in component 'app/api/cms/user.py' (https://github.com/TaleLin/lin-cms-flask/issues/28). See CVE-2020-18699." }, { "instruction": "what vulnarability does lin-cms-flask version greather then 0 have", "input": "", "output": "Having vulnarability CVE-2020-18698 Advisory: Lin-CMS-flask allows remote attackers to launch brute force login attempts without restriction via the 'login' function in the component 'app/api/cms/user.py'.\r\nhttps://github.com/TaleLin/lin-cms-flask/issues/27", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lin-cms-flask version greather then 0 have ### Response: Having vulnarability CVE-2020-18698 Advisory: Lin-CMS-flask allows remote attackers to launch brute force login attempts without restriction via the 'login' function in the component 'app/api/cms/user.py'.\r\nhttps://github.com/TaleLin/lin-cms-flask/issues/27" }, { "instruction": "what vulnarability does line-bot-sdk version less then 3.2.0 have", "input": "", "output": "Having vulnarability CVE-2023-37276 Advisory: Line-bot-sdk 3.2.0 updates its dependency 'aiohttp' to version '3.8.5' to include a fix for an HTTP Request Smuggling vulnerability.\r\nhttps://github.com/line/line-bot-sdk-python/pull/491", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does line-bot-sdk version less then 3.2.0 have ### Response: Having vulnarability CVE-2023-37276 Advisory: Line-bot-sdk 3.2.0 updates its dependency 'aiohttp' to version '3.8.5' to include a fix for an HTTP Request Smuggling vulnerability.\r\nhttps://github.com/line/line-bot-sdk-python/pull/491" }, { "instruction": "what vulnarability does line-item-manager version less then 0.2.2 have", "input": "", "output": "Having vulnarability CVE-2020-14343 Advisory: Line-item-manager 0.2.2 updates its dependency 'pyyaml' requirements to >=5.4 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does line-item-manager version less then 0.2.2 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Line-item-manager 0.2.2 updates its dependency 'pyyaml' requirements to >=5.4 to include a security fix." }, { "instruction": "what vulnarability does lingfo version less then 0.2.4 have", "input": "", "output": "Having vulnarability CVE-2023-40267 Advisory: Lingfo 0.2.4 updates its dependency 'gitpython' to version '3.1.32' to include a fix for a Remote Code Execution vulnerability.\r\nhttps://github.com/lingfo/lingfo/commit/4f571a7c3ded9b1775e5b741c48c49e6510b7a8f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lingfo version less then 0.2.4 have ### Response: Having vulnarability CVE-2023-40267 Advisory: Lingfo 0.2.4 updates its dependency 'gitpython' to version '3.1.32' to include a fix for a Remote Code Execution vulnerability.\r\nhttps://github.com/lingfo/lingfo/commit/4f571a7c3ded9b1775e5b741c48c49e6510b7a8f" }, { "instruction": "what vulnarability does linkml version less then 1.5.2 have", "input": "", "output": "Having vulnarability PVE-2024-63769 Advisory: Linkml 1.5.2 introduces critical security enhancements to mitigate potential code injection vulnerabilities, specifically by refining the pydanticgen/pythongen modules. These improvements address the handling of quotes and multiline descriptions in enum fields, ensuring safer processing of descriptions and preventing malicious code execution. \r\nhttps://github.com/linkml/linkml/pull/1402", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does linkml version less then 1.5.2 have ### Response: Having vulnarability PVE-2024-63769 Advisory: Linkml 1.5.2 introduces critical security enhancements to mitigate potential code injection vulnerabilities, specifically by refining the pydanticgen/pythongen modules. These improvements address the handling of quotes and multiline descriptions in enum fields, ensuring safer processing of descriptions and preventing malicious code execution. \r\nhttps://github.com/linkml/linkml/pull/1402" }, { "instruction": "what vulnarability does linotp version greather then equal to 0,less then 2.11.1 have", "input": "", "output": "Having vulnarability CVE-2019-12887 Advisory: KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does linotp version greather then equal to 0,less then 2.11.1 have ### Response: Having vulnarability CVE-2019-12887 Advisory: KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2)." }, { "instruction": "what vulnarability does lintegrate version less then 0.1.11 have", "input": "", "output": "Having vulnarability CVE-2021-34141 Advisory: Lintegrate 0.1.11 updates its dependency 'numpy' to v>=1.21 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lintegrate version less then 0.1.11 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Lintegrate 0.1.11 updates its dependency 'numpy' to v>=1.21 to include security fixes." }, { "instruction": "what vulnarability does lionagi version less then 0.0.102 have", "input": "", "output": "Having vulnarability CVE-2023-49081 Advisory: Lionagi 0.0.102 updates its dependency package aiohttp version from 3.8.6 to 3.9.0 to include security fixes due to the CVE-2023-49081.\r\nhttps://github.com/lion-agi/lionagi/pull/41", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lionagi version less then 0.0.102 have ### Response: Having vulnarability CVE-2023-49081 Advisory: Lionagi 0.0.102 updates its dependency package aiohttp version from 3.8.6 to 3.9.0 to include security fixes due to the CVE-2023-49081.\r\nhttps://github.com/lion-agi/lionagi/pull/41" }, { "instruction": "what vulnarability does litellm version less then 1.35.1.dev1 have", "input": "", "output": "Having vulnarability PVE-2024-67612 Advisory: Litellm version 1.35.1.dev1 introduces a low-severity security fix by disabling demo accounts on the Admin UI. Previously, the Proxy used a hardcoded demo account with no permissions, posing a potential security risk.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does litellm version less then 1.35.1.dev1 have ### Response: Having vulnarability PVE-2024-67612 Advisory: Litellm version 1.35.1.dev1 introduces a low-severity security fix by disabling demo accounts on the Admin UI. Previously, the Proxy used a hardcoded demo account with no permissions, posing a potential security risk." }, { "instruction": "what vulnarability does lithops version less then 1.0.1 have", "input": "", "output": "Having vulnarability CVE-2018-1000656 Advisory: Lithops 1.0.1 fixes a flask security issue. See: CVE-2018-1000656.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lithops version less then 1.0.1 have ### Response: Having vulnarability CVE-2018-1000656 Advisory: Lithops 1.0.1 fixes a flask security issue. See: CVE-2018-1000656." }, { "instruction": "what vulnarability does livefyre version less then 2.0.3 have", "input": "", "output": "Having vulnarability PVE-2021-34170 Advisory: livefyre before 2.0.3 uses a release of a transitive dependency with known security vulnerabilities (PyJWT).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does livefyre version less then 2.0.3 have ### Response: Having vulnarability PVE-2021-34170 Advisory: livefyre before 2.0.3 uses a release of a transitive dependency with known security vulnerabilities (PyJWT)." }, { "instruction": "what vulnarability does llama-agi version less then 0.2.0 have", "input": "", "output": "Having vulnarability CVE-2023-39662 Advisory: llama-agi 0.2.0 and prior versions ship with vulnerable dependencies (llama-index\r\n == 0.6.13).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does llama-agi version less then 0.2.0 have ### Response: Having vulnarability CVE-2023-39662 Advisory: llama-agi 0.2.0 and prior versions ship with vulnerable dependencies (llama-index\r\n == 0.6.13)." }, { "instruction": "what vulnarability does llama-cpp-python version less then 0.2.12 have", "input": "", "output": "Having vulnarability PVE-2023-62135 Advisory: Llama-cpp-python 0.2.12 includes a fix for an Arbitrary Code Execution vulnerability.\r\nhttps://github.com/abetlen/llama-cpp-python/pull/854", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does llama-cpp-python version less then 0.2.12 have ### Response: Having vulnarability PVE-2023-62135 Advisory: Llama-cpp-python 0.2.12 includes a fix for an Arbitrary Code Execution vulnerability.\r\nhttps://github.com/abetlen/llama-cpp-python/pull/854" }, { "instruction": "what vulnarability does llama-hub version less then 0.0.67 have", "input": "", "output": "Having vulnarability CVE-2024-23730 Advisory: The OpenAPI and ChatGPT plugin loaders in LlamaHub (aka llama-hub) before 0.0.67 allow attackers to execute arbitrary code because safe_load is not used for YAML.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does llama-hub version less then 0.0.67 have ### Response: Having vulnarability CVE-2024-23730 Advisory: The OpenAPI and ChatGPT plugin loaders in LlamaHub (aka llama-hub) before 0.0.67 allow attackers to execute arbitrary code because safe_load is not used for YAML." }, { "instruction": "what vulnarability does llama-index version less then equal to 0.7.13 have", "input": "", "output": "Having vulnarability CVE-2023-39662 Advisory: An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does llama-index version less then equal to 0.7.13 have ### Response: Having vulnarability CVE-2023-39662 Advisory: An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function." }, { "instruction": "what vulnarability does lmdb version greather then equal to 0,less then 0.98 have", "input": "", "output": "Having vulnarability CVE-2019-16225 Advisory: An issue was discovered in py-lmdb 0.97. For certain values of mp_flags, mdb_page_touch does not properly set up mc->mc_pg[mc->top], leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lmdb version greather then equal to 0,less then 0.98 have ### Response: Having vulnarability CVE-2019-16225 Advisory: An issue was discovered in py-lmdb 0.97. For certain values of mp_flags, mdb_page_touch does not properly set up mc->mc_pg[mc->top], leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker." }, { "instruction": "what vulnarability does lmdeploy version less then 0.0.10 have", "input": "", "output": "Having vulnarability PVE-2023-61437 Advisory: Lmdeploy 0.0.10 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/InternLM/lmdeploy/pull/460", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lmdeploy version less then 0.0.10 have ### Response: Having vulnarability PVE-2023-61437 Advisory: Lmdeploy 0.0.10 includes a fix for a potential race condition vulnerability.\r\nhttps://github.com/InternLM/lmdeploy/pull/460" }, { "instruction": "what vulnarability does localstack version less then 0.12.14 have", "input": "", "output": "Having vulnarability PVE-2022-52465 Advisory: Localstack 0.12.14 fixes CORS setup to prevent CSRF attacks.\r\nhttps://github.com/localstack/localstack/commit/809235e3079a1060dae599ce83ed06c84b0e34a5", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does localstack version less then 0.12.14 have ### Response: Having vulnarability PVE-2022-52465 Advisory: Localstack 0.12.14 fixes CORS setup to prevent CSRF attacks.\r\nhttps://github.com/localstack/localstack/commit/809235e3079a1060dae599ce83ed06c84b0e34a5" }, { "instruction": "what vulnarability does locopy version less then 0.3.8 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Locopy 0.3.8 includes a security patch for the function 'read_config_yaml' in 'locopy/utility.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/capitalone/locopy/pull/105", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does locopy version less then 0.3.8 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Locopy 0.3.8 includes a security patch for the function 'read_config_yaml' in 'locopy/utility.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/capitalone/locopy/pull/105" }, { "instruction": "what vulnarability does locust version less then 1.3.2 have", "input": "", "output": "Having vulnarability PVE-2022-50450 Advisory: Locust 1.3.2 includes a fix for a XSS vulnerability.\r\nhttps://github.com/locustio/locust/pull/1603/commits/0d118179709b4a60174810bae4db41d40e4c99ad", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does locust version less then 1.3.2 have ### Response: Having vulnarability PVE-2022-50450 Advisory: Locust 1.3.2 includes a fix for a XSS vulnerability.\r\nhttps://github.com/locustio/locust/pull/1603/commits/0d118179709b4a60174810bae4db41d40e4c99ad" }, { "instruction": "what vulnarability does locustio version less then 0.7 have", "input": "", "output": "Having vulnarability PVE-2021-25878 Advisory: Locustio before 0.7 uses pickle, exposing to RCE.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does locustio version less then 0.7 have ### Response: Having vulnarability PVE-2021-25878 Advisory: Locustio before 0.7 uses pickle, exposing to RCE." }, { "instruction": "what vulnarability does logbesselk version less then 0.8.5 have", "input": "", "output": "Having vulnarability CVE-2021-41227 Advisory: Logbesselk 0.8.5 updates its dependency 'tensorflow' to v2.8.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does logbesselk version less then 0.8.5 have ### Response: Having vulnarability CVE-2021-41227 Advisory: Logbesselk 0.8.5 updates its dependency 'tensorflow' to v2.8.0 to include security fixes." }, { "instruction": "what vulnarability does loggerhead version less then 1.18.1 have", "input": "", "output": "Having vulnarability CVE-2011-0728 Advisory: Cross-site scripting (XSS) vulnerability in templatefunctions.py in Loggerhead before 1.18.1 allows remote authenticated users to inject arbitrary web script or HTML via a filename, which is not properly handled in a revision view.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does loggerhead version less then 1.18.1 have ### Response: Having vulnarability CVE-2011-0728 Advisory: Cross-site scripting (XSS) vulnerability in templatefunctions.py in Loggerhead before 1.18.1 allows remote authenticated users to inject arbitrary web script or HTML via a filename, which is not properly handled in a revision view." }, { "instruction": "what vulnarability does logilab-common version less then 0.61.0 have", "input": "", "output": "Having vulnarability CVE-2014-1839 Advisory: The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does logilab-common version less then 0.61.0 have ### Response: Having vulnarability CVE-2014-1839 Advisory: The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file." }, { "instruction": "what vulnarability does logprep version less then 7.0.0 have", "input": "", "output": "Having vulnarability CVE-2023-37920 Advisory: Logprep 7.0.0 updates its dependency 'certifi' to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does logprep version less then 7.0.0 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Logprep 7.0.0 updates its dependency 'certifi' to include a security fix." }, { "instruction": "what vulnarability does loguru version greather then equal to 0,less then 0.5.3 have", "input": "", "output": "Having vulnarability CVE-2022-0338 Advisory: Insertion of Sensitive Information into Log File in Conda loguru prior to 0.5.3.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does loguru version greather then equal to 0,less then 0.5.3 have ### Response: Having vulnarability CVE-2022-0338 Advisory: Insertion of Sensitive Information into Log File in Conda loguru prior to 0.5.3." }, { "instruction": "what vulnarability does lookatme version less then 2.3.0 have", "input": "", "output": "Having vulnarability CVE-2020-15271 Advisory: In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically loaded the built-in \"terminal\" and \"file_loader\" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. This is fixed in version 2.3.0. As a workaround, the `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme. See CVE-2020-15271.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lookatme version less then 2.3.0 have ### Response: Having vulnarability CVE-2020-15271 Advisory: In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically loaded the built-in \"terminal\" and \"file_loader\" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. This is fixed in version 2.3.0. As a workaround, the `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme. See CVE-2020-15271." }, { "instruction": "what vulnarability does lti-consumer-xblock version greather then equal to 7.0.0,less then 7.2.2 have", "input": "", "output": "Having vulnarability CVE-2023-23611 Advisory: Lti-consumer-xblock 7.2.2 includes a fix for CVE-2023-23611: Any LTI tool that is integrated with on the Open edX platform can post a grade back for any LTI XBlock so long as it knows or can guess the block location for that XBlock.\r\nhttps://github.com/openedx/xblock-lti-consumer/security/advisories/GHSA-7j9p-67mm-5g87", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lti-consumer-xblock version greather then equal to 7.0.0,less then 7.2.2 have ### Response: Having vulnarability CVE-2023-23611 Advisory: Lti-consumer-xblock 7.2.2 includes a fix for CVE-2023-23611: Any LTI tool that is integrated with on the Open edX platform can post a grade back for any LTI XBlock so long as it knows or can guess the block location for that XBlock.\r\nhttps://github.com/openedx/xblock-lti-consumer/security/advisories/GHSA-7j9p-67mm-5g87" }, { "instruction": "what vulnarability does luckycharms version less then 0.5.2 have", "input": "", "output": "Having vulnarability PVE-2021-37144 Advisory: Luckycharms 0.5.2 upgrades some dependencies with security vulnerabilities.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does luckycharms version less then 0.5.2 have ### Response: Having vulnarability PVE-2021-37144 Advisory: Luckycharms 0.5.2 upgrades some dependencies with security vulnerabilities." }, { "instruction": "what vulnarability does ludwig version less then 0.7 have", "input": "", "output": "Having vulnarability PVE-2024-64244 Advisory: Ludwig 0.7 addresses a race condition that occurred during schema validation when running multiple threads of LudwigModel. This fix ensures thread safety and prevents potential AssertionErrors.\r\nhttps://github.com/ludwig-ai/ludwig/pull/2653/commits/92cc531456b45728b9267784e5beb37a8d184c1c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ludwig version less then 0.7 have ### Response: Having vulnarability PVE-2024-64244 Advisory: Ludwig 0.7 addresses a race condition that occurred during schema validation when running multiple threads of LudwigModel. This fix ensures thread safety and prevents potential AssertionErrors.\r\nhttps://github.com/ludwig-ai/ludwig/pull/2653/commits/92cc531456b45728b9267784e5beb37a8d184c1c" }, { "instruction": "what vulnarability does luigi version less then 2.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-34671 Advisory: Luigi 2.1.1 fixes a security issue where malicious users can run arbitrary code if they have file system (even external mounts) and network access on the machine running luigid (executed by the user that you run luigid with).\r\nhttps://github.com/spotify/luigi/pull/1631", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does luigi version less then 2.1.1 have ### Response: Having vulnarability PVE-2021-34671 Advisory: Luigi 2.1.1 fixes a security issue where malicious users can run arbitrary code if they have file system (even external mounts) and network access on the machine running luigid (executed by the user that you run luigid with).\r\nhttps://github.com/spotify/luigi/pull/1631" }, { "instruction": "what vulnarability does lunr version less then 0.5.3 have", "input": "", "output": "Having vulnarability PVE-2023-60442 Advisory: Lunr 0.5.3 includes a fix for a Catastrophic Backtracking vulnerability.\r\nhttps://github.com/yeraydiazdiaz/lunr.py/commit/03c32809f12fb4d0b6699fc7f134ea015774ad65", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lunr version less then 0.5.3 have ### Response: Having vulnarability PVE-2023-60442 Advisory: Lunr 0.5.3 includes a fix for a Catastrophic Backtracking vulnerability.\r\nhttps://github.com/yeraydiazdiaz/lunr.py/commit/03c32809f12fb4d0b6699fc7f134ea015774ad65" }, { "instruction": "what vulnarability does lurklite version less then 0.4.9 have", "input": "", "output": "Having vulnarability PVE-2021-38394 Advisory: Lurklite 0.4.9 includes a change that allows Discord administrators to be specified with user IDs as well as usernamediscriminator, improving security with username changes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lurklite version less then 0.4.9 have ### Response: Having vulnarability PVE-2021-38394 Advisory: Lurklite 0.4.9 includes a change that allows Discord administrators to be specified with user IDs as well as usernamediscriminator, improving security with username changes." }, { "instruction": "what vulnarability does lxdui version greather then equal to 0 have", "input": "", "output": "Having vulnarability CVE-2021-40494 Advisory: A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lxdui version greather then equal to 0 have ### Response: Having vulnarability CVE-2021-40494 Advisory: A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system." }, { "instruction": "what vulnarability does lxml version less then 2.3.4 have", "input": "", "output": "Having vulnarability PVE-2023-63015 Advisory: Lxml 2.3.4 fixes a crash due to race condition when errors (or user messages) occur during threaded XSLT processing.\r\nhttps://github.com/lxml/lxml/commit/26ae51c60462ba1567a123bc9701ff18f9c10789", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lxml version less then 2.3.4 have ### Response: Having vulnarability PVE-2023-63015 Advisory: Lxml 2.3.4 fixes a crash due to race condition when errors (or user messages) occur during threaded XSLT processing.\r\nhttps://github.com/lxml/lxml/commit/26ae51c60462ba1567a123bc9701ff18f9c10789" }, { "instruction": "what vulnarability does lytekit version less then 0.30.0 have", "input": "", "output": "Having vulnarability CVE-2022-21699 Advisory: Lytekit 0.30.0 updates its dependency 'ipython' to v7.31.1 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lytekit version less then 0.30.0 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Lytekit 0.30.0 updates its dependency 'ipython' to v7.31.1 to include a security fix." }, { "instruction": "what vulnarability does m2crypto version less then equal to 0.40.1 have", "input": "", "output": "Having vulnarability CVE-2023-50781 Advisory: A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does m2crypto version less then equal to 0.40.1 have ### Response: Having vulnarability CVE-2023-50781 Advisory: A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data." }, { "instruction": "what vulnarability does machado version less then 0.4.0 have", "input": "", "output": "Having vulnarability CVE-2021-31542 Advisory: Machado 0.4.0 updates its dependency 'Django' to v3.2.14 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does machado version less then 0.4.0 have ### Response: Having vulnarability CVE-2021-31542 Advisory: Machado 0.4.0 updates its dependency 'Django' to v3.2.14 to include security fixes." }, { "instruction": "what vulnarability does mackup version less then 0.8.28 have", "input": "", "output": "Having vulnarability PVE-2021-38383 Advisory: Mackup 0.8.28 includes a vulnerability fix. No details were given.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mackup version less then 0.8.28 have ### Response: Having vulnarability PVE-2021-38383 Advisory: Mackup 0.8.28 includes a vulnerability fix. No details were given." }, { "instruction": "what vulnarability does maestral version less then 0.4.1 have", "input": "", "output": "Having vulnarability PVE-2021-37523 Advisory: Communication between the sync daemon and frontend (GUI or CLI) in maestral 0.4.1 is faster and more secure than in previous versions. Additionally, it uses Unix domain sockets instead of TCP/IP sockets for communication with daemon. This means that communication is lighter, faster and more secure (other users on the same PC can no longer connect to your sync daemon).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maestral version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-37523 Advisory: Communication between the sync daemon and frontend (GUI or CLI) in maestral 0.4.1 is faster and more secure than in previous versions. Additionally, it uses Unix domain sockets instead of TCP/IP sockets for communication with daemon. This means that communication is lighter, faster and more secure (other users on the same PC can no longer connect to your sync daemon)." }, { "instruction": "what vulnarability does maestrowf version less then 1.1.10 have", "input": "", "output": "Having vulnarability CVE-2022-3786 Advisory: Maestrowf version 1.1.10 upgrades its cryptography package from version 37.0.1 to 38.0.3 as a measure to tackle the security vulnerability CVE-2022-3786.\r\nhttps://github.com/LLNL/maestrowf/pull/410/commits/6768a29c2951d2e531dc1c7d0839a92f84bb4df0", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maestrowf version less then 1.1.10 have ### Response: Having vulnarability CVE-2022-3786 Advisory: Maestrowf version 1.1.10 upgrades its cryptography package from version 37.0.1 to 38.0.3 as a measure to tackle the security vulnerability CVE-2022-3786.\r\nhttps://github.com/LLNL/maestrowf/pull/410/commits/6768a29c2951d2e531dc1c7d0839a92f84bb4df0" }, { "instruction": "what vulnarability does mage-ai version less then 0.8.58 have", "input": "", "output": "Having vulnarability PVE-2023-59622 Advisory: Mage-ai 0.8.58 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/mage-ai/mage-ai/pull/2462", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mage-ai version less then 0.8.58 have ### Response: Having vulnarability PVE-2023-59622 Advisory: Mage-ai 0.8.58 includes a fix for a Race Condition vulnerability.\r\nhttps://github.com/mage-ai/mage-ai/pull/2462" }, { "instruction": "what vulnarability does magnum version less then 3.1.2 have", "input": "", "output": "Having vulnarability CVE-2016-7404 Advisory: OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does magnum version less then 3.1.2 have ### Response: Having vulnarability CVE-2016-7404 Advisory: OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform." }, { "instruction": "what vulnarability does mail-validator version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51744 Advisory: Mail-validator is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mail-validator version greather then 0 have ### Response: Having vulnarability PVE-2022-51744 Advisory: Mail-validator is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does mailchecker version less then 3.2.9 have", "input": "", "output": "Having vulnarability CVE-2018-3721 Advisory: Mailchecker version 3.2.9 includes a security enhancement by forcing the lodash library to update to versions greater than 4.17.5. This update addresses the CVE-2018-3721.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mailchecker version less then 3.2.9 have ### Response: Having vulnarability CVE-2018-3721 Advisory: Mailchecker version 3.2.9 includes a security enhancement by forcing the lodash library to update to versions greater than 4.17.5. This update addresses the CVE-2018-3721." }, { "instruction": "what vulnarability does mailman version less then 2.1.14 have", "input": "", "output": "Having vulnarability CVE-2011-0707 Advisory: Mailman 2.1.14 includes a fix for CVE-2011-0707: Three XSS flaws due improper escaping of the full name of the member.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mailman version less then 2.1.14 have ### Response: Having vulnarability CVE-2011-0707 Advisory: Mailman 2.1.14 includes a fix for CVE-2011-0707: Three XSS flaws due improper escaping of the full name of the member." }, { "instruction": "what vulnarability does mailpile version less then 1.0.0rc4 have", "input": "", "output": "Having vulnarability CVE-2018-20954 Advisory: The \"Security and Privacy\" Encryption feature in Mailpile before 1.0.0rc4 does not exclude disabled, revoked, and expired keys.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mailpile version less then 1.0.0rc4 have ### Response: Having vulnarability CVE-2018-20954 Advisory: The \"Security and Privacy\" Encryption feature in Mailpile before 1.0.0rc4 does not exclude disabled, revoked, and expired keys." }, { "instruction": "what vulnarability does mako version less then 0.3.4 have", "input": "", "output": "Having vulnarability CVE-2010-2480 Advisory: Mako 0.3.4 includes a fix for CVE-2010-2480: Improper escaping of single quotes in escape.cgi (XSS).", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mako version less then 0.3.4 have ### Response: Having vulnarability CVE-2010-2480 Advisory: Mako 0.3.4 includes a fix for CVE-2010-2480: Improper escaping of single quotes in escape.cgi (XSS)." }, { "instruction": "what vulnarability does malojaserver version greather then equal to 0,less then 3.2.2 have", "input": "", "output": "Having vulnarability PVE-2024-99775 Advisory: Malojaserver is susceptible to Cross-site Scripting (XSS) vulnerability through the error page mechanism. This exploit occurs when an attacker sends a crafted URL containing malicious HTML content, leading to unauthorized script execution within the user's browser context if the user visits the malicious link. Cross-site scripting attacks compromise web-based applications by escaping the security context, allowing attackers to inject malicious code. This type of exploit can lead to session hijackings, exposure of sensitive information, and malware distribution through various methods including stored, reflected, DOM-based, and mutated XSS. Mitigation strategies include sanitizing data input, encoding special characters, disabling client-side scripts, redirecting invalid requests, session management to prevent simultaneous logins, and implementing a Content Security Policy.\r\nhttps://github.com/krateng/maloja/commit/febaff97228b37a192f2630aa331cac5e5c3e98e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does malojaserver version greather then equal to 0,less then 3.2.2 have ### Response: Having vulnarability PVE-2024-99775 Advisory: Malojaserver is susceptible to Cross-site Scripting (XSS) vulnerability through the error page mechanism. This exploit occurs when an attacker sends a crafted URL containing malicious HTML content, leading to unauthorized script execution within the user's browser context if the user visits the malicious link. Cross-site scripting attacks compromise web-based applications by escaping the security context, allowing attackers to inject malicious code. This type of exploit can lead to session hijackings, exposure of sensitive information, and malware distribution through various methods including stored, reflected, DOM-based, and mutated XSS. Mitigation strategies include sanitizing data input, encoding special characters, disabling client-side scripts, redirecting invalid requests, session management to prevent simultaneous logins, and implementing a Content Security Policy.\r\nhttps://github.com/krateng/maloja/commit/febaff97228b37a192f2630aa331cac5e5c3e98e" }, { "instruction": "what vulnarability does mangadex-downloader version greather then equal to 1.3.0,less then 1.7.2 have", "input": "", "output": "Having vulnarability CVE-2022-36082 Advisory: mangadex-downloader is a command-line tool to download manga from MangaDex. When using `file:` command and `` is a web URL location (http, https), mangadex-downloader between versions 1.3.0 and 1.7.2 will try to open and read a file in local disk for each line of website contents. Version 1.7.2 contains a patch for this issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mangadex-downloader version greather then equal to 1.3.0,less then 1.7.2 have ### Response: Having vulnarability CVE-2022-36082 Advisory: mangadex-downloader is a command-line tool to download manga from MangaDex. When using `file:` command and `` is a web URL location (http, https), mangadex-downloader between versions 1.3.0 and 1.7.2 will try to open and read a file in local disk for each line of website contents. Version 1.7.2 contains a patch for this issue." }, { "instruction": "what vulnarability does manifest-tool version less then 2.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-38628 Advisory: Manifest-tool 2.0.0 adds an option to sign candidate image using update private key, allowing to implement secure boot on a device side.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does manifest-tool version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-38628 Advisory: Manifest-tool 2.0.0 adds an option to sign candidate image using update private key, allowing to implement secure boot on a device side." }, { "instruction": "what vulnarability does manila version less then 16.2.0 have", "input": "", "output": "Having vulnarability CVE-2020-27781 Advisory: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even \"admin\" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does manila version less then 16.2.0 have ### Response: Having vulnarability CVE-2020-27781 Advisory: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even \"admin\" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0." }, { "instruction": "what vulnarability does manim-studio version less then 0.6.8 have", "input": "", "output": "Having vulnarability PVE-2023-63061 Advisory: Manim-studio 0.6.8 prevents from running malicious code.\r\nhttps://github.com/MathItYT/manim-studio/commit/ec6dd80e54f6d9e4ed95001b43f23d310d9203af", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does manim-studio version less then 0.6.8 have ### Response: Having vulnarability PVE-2023-63061 Advisory: Manim-studio 0.6.8 prevents from running malicious code.\r\nhttps://github.com/MathItYT/manim-studio/commit/ec6dd80e54f6d9e4ed95001b43f23d310d9203af" }, { "instruction": "what vulnarability does mantissa version less then 0.6.14 have", "input": "", "output": "Having vulnarability PVE-2021-25883 Advisory: mantissa before 0.6.14 in xmantissa.webtheme allows access to arbitrary filesystem contents.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mantissa version less then 0.6.14 have ### Response: Having vulnarability PVE-2021-25883 Advisory: mantissa before 0.6.14 in xmantissa.webtheme allows access to arbitrary filesystem contents." }, { "instruction": "what vulnarability does mapchete version less then 2022.11.0 have", "input": "", "output": "Having vulnarability CVE-2020-10812 Advisory: Mapchete 2022.11.0 updates its dependency 'rasterio' requirement to '>1.2.10' to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mapchete version less then 2022.11.0 have ### Response: Having vulnarability CVE-2020-10812 Advisory: Mapchete 2022.11.0 updates its dependency 'rasterio' requirement to '>1.2.10' to include security fixes." }, { "instruction": "what vulnarability does mapproxy version less then equal to 1.10.3 have", "input": "", "output": "Having vulnarability CVE-2017-1000426 Advisory: MapProxy version 1.10.3 and older is vulnerable to a Cross Site Scripting attack in the demo service resulting in possible information disclosure.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mapproxy version less then equal to 1.10.3 have ### Response: Having vulnarability CVE-2017-1000426 Advisory: MapProxy version 1.10.3 and older is vulnerable to a Cross Site Scripting attack in the demo service resulting in possible information disclosure." }, { "instruction": "what vulnarability does mapscript version less then 4.10.6,greather then 5.0,less then 5.6.4 have", "input": "", "output": "Having vulnarability CVE-2010-2539 Advisory: Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mapscript version less then 4.10.6,greather then 5.0,less then 5.6.4 have ### Response: Having vulnarability CVE-2010-2539 Advisory: Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files." }, { "instruction": "what vulnarability does maptasker version less then 1.3.3 have", "input": "", "output": "Having vulnarability CVE-2013-1665 Advisory: Maptasker 1.3.3 uses 'defusedxml' to prevent XXE vulnerabilities.\r\nhttps://github.com/mctinker/Map-Tasker/commit/748dc69ed16053fff0b8bb54fb1a3b589300355c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maptasker version less then 1.3.3 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Maptasker 1.3.3 uses 'defusedxml' to prevent XXE vulnerabilities.\r\nhttps://github.com/mctinker/Map-Tasker/commit/748dc69ed16053fff0b8bb54fb1a3b589300355c" }, { "instruction": "what vulnarability does maratlib version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45472 Advisory: Maratlib is a malicious package, typosquatting. It installs cryptomining malware in your system.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maratlib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45472 Advisory: Maratlib is a malicious package, typosquatting. It installs cryptomining malware in your system.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/" }, { "instruction": "what vulnarability does maratlib1 version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45473 Advisory: Maratlib1 is a malicious package, typosquatting. It installs cryptomining malware in your system.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maratlib1 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45473 Advisory: Maratlib1 is a malicious package, typosquatting. It installs cryptomining malware in your system.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/" }, { "instruction": "what vulnarability does marcador version greather then equal to 0.1,less then 0.14 have", "input": "", "output": "Having vulnarability CVE-2022-28470 Advisory: marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does marcador version greather then equal to 0.1,less then 0.14 have ### Response: Having vulnarability CVE-2022-28470 Advisory: marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor." }, { "instruction": "what vulnarability does mariabd version greather then 0 have", "input": "", "output": "Having vulnarability PVE-2022-51745 Advisory: Mariabd is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mariabd version greather then 0 have ### Response: Having vulnarability PVE-2022-51745 Advisory: Mariabd is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards." }, { "instruction": "what vulnarability does marimo version less then 0.1.67 have", "input": "", "output": "Having vulnarability PVE-2023-63162 Advisory: Marimo 0.1.67 updates its fonttools dependency from version 4.38.0 to 4.43.0 to include a security fix for a XML External Entity (XXE) Injection vulnerability on fonttools versions before 4.43.0.\r\nhttps://github.com/marimo-team/marimo/pull/475", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does marimo version less then 0.1.67 have ### Response: Having vulnarability PVE-2023-63162 Advisory: Marimo 0.1.67 updates its fonttools dependency from version 4.38.0 to 4.43.0 to include a security fix for a XML External Entity (XXE) Injection vulnerability on fonttools versions before 4.43.0.\r\nhttps://github.com/marimo-team/marimo/pull/475" }, { "instruction": "what vulnarability does markdown-it-py version greather then equal to 0,less then 2.2.0 have", "input": "", "output": "Having vulnarability CVE-2023-26303 Advisory: Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does markdown-it-py version greather then equal to 0,less then 2.2.0 have ### Response: Having vulnarability CVE-2023-26303 Advisory: Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input." }, { "instruction": "what vulnarability does markdown2 version less then 1.0.1.14 have", "input": "", "output": "Having vulnarability PVE-2021-25884 Advisory: markdown2 before 1.0.1.14 has a security hole in the md5-hashing scheme for handling HTML chunks during processing.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does markdown2 version less then 1.0.1.14 have ### Response: Having vulnarability PVE-2021-25884 Advisory: markdown2 before 1.0.1.14 has a security hole in the md5-hashing scheme for handling HTML chunks during processing." }, { "instruction": "what vulnarability does marshmallow version less then 2.15.1,greather then equal to 3.0.0a0,less then 3.0.0b9 have", "input": "", "output": "Having vulnarability CVE-2018-17175 Advisory: In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema \"only\" option treats an empty list as implying no \"only\" option, which allows a request that was intended to expose no fields to instead expose all fields (if the schema is being filtered dynamically using the \"only\" option, and there is a user role that produces an empty value for \"only\").", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does marshmallow version less then 2.15.1,greather then equal to 3.0.0a0,less then 3.0.0b9 have ### Response: Having vulnarability CVE-2018-17175 Advisory: In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema \"only\" option treats an empty list as implying no \"only\" option, which allows a request that was intended to expose no fields to instead expose all fields (if the schema is being filtered dynamically using the \"only\" option, and there is a user role that produces an empty value for \"only\")." }, { "instruction": "what vulnarability does martypy version less then 1.2 have", "input": "", "output": "Having vulnarability PVE-2021-36739 Advisory: martypy 1.2 requests security issues in `requests` and `urllib3` dependencies", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does martypy version less then 1.2 have ### Response: Having vulnarability PVE-2021-36739 Advisory: martypy 1.2 requests security issues in `requests` and `urllib3` dependencies" }, { "instruction": "what vulnarability does masonite version less then 2.3.25 have", "input": "", "output": "Having vulnarability PVE-2021-43626 Advisory: Masonite 2.3.25 improves requests checking to add CSRF headers.\r\nhttps://github.com/MasoniteFramework/masonite/commit/9f8b326a209be2b8cf5b0208dc8c69ebd5dd6a97", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does masonite version less then 2.3.25 have ### Response: Having vulnarability PVE-2021-43626 Advisory: Masonite 2.3.25 improves requests checking to add CSRF headers.\r\nhttps://github.com/MasoniteFramework/masonite/commit/9f8b326a209be2b8cf5b0208dc8c69ebd5dd6a97" }, { "instruction": "what vulnarability does mastercard-oauth1-signer version less then 1.4.0 have", "input": "", "output": "Having vulnarability PVE-2023-62158 Advisory: Mastercard-oauth1-signer 1.4.0 includes a fix for an unsafe randomness vulnerability.\r\nhttps://github.com/Mastercard/oauth1-signer-python/commit/9492b61895de895c6fbf23b2cfcf21c6f70dd99f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mastercard-oauth1-signer version less then 1.4.0 have ### Response: Having vulnarability PVE-2023-62158 Advisory: Mastercard-oauth1-signer 1.4.0 includes a fix for an unsafe randomness vulnerability.\r\nhttps://github.com/Mastercard/oauth1-signer-python/commit/9492b61895de895c6fbf23b2cfcf21c6f70dd99f" }, { "instruction": "what vulnarability does mastodon-py version less then equal to 1.8.1 have", "input": "", "output": "Having vulnarability CVE-2022-2166 Advisory: Mastodon.py 1.8.1 and prior supports 'mastodon' v3.5.5, which is affected by an Improper Restriction of Excessive Authentication Attempts addressed on the CVE-2022-2166.\r\nhttps://github.com/mastodon/mastodon/commit/21fd25a269cca742af431f0d13299e139f267346", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mastodon-py version less then equal to 1.8.1 have ### Response: Having vulnarability CVE-2022-2166 Advisory: Mastodon.py 1.8.1 and prior supports 'mastodon' v3.5.5, which is affected by an Improper Restriction of Excessive Authentication Attempts addressed on the CVE-2022-2166.\r\nhttps://github.com/mastodon/mastodon/commit/21fd25a269cca742af431f0d13299e139f267346" }, { "instruction": "what vulnarability does mastodon.py version less then 1.4.1 have", "input": "", "output": "Having vulnarability PVE-2023-55125 Advisory: Mastodon.py 1.4.1 starts supporting 'mastodon' v2.8.2, which includes a fix for a XSS vulnerability.\r\nhttps://github.com/halcy/Mastodon.py/commit/08d808e2ace017ace45c4043ef9b414333051810\r\nhttps://github.com/mastodon/mastodon/pull/8959/commits/1a3b1549cbe525e9fd2d57564ed46b0cd6f88589", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mastodon.py version less then 1.4.1 have ### Response: Having vulnarability PVE-2023-55125 Advisory: Mastodon.py 1.4.1 starts supporting 'mastodon' v2.8.2, which includes a fix for a XSS vulnerability.\r\nhttps://github.com/halcy/Mastodon.py/commit/08d808e2ace017ace45c4043ef9b414333051810\r\nhttps://github.com/mastodon/mastodon/pull/8959/commits/1a3b1549cbe525e9fd2d57564ed46b0cd6f88589" }, { "instruction": "what vulnarability does mat2 version greather then equal to 0,less then 0.13.0 have", "input": "", "output": "Having vulnarability CVE-2022-35410 Advisory: mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mat2 version greather then equal to 0,less then 0.13.0 have ### Response: Having vulnarability CVE-2022-35410 Advisory: mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive." }, { "instruction": "what vulnarability does matlab-proxy version less then 0.10.0 have", "input": "", "output": "Having vulnarability CVE-2023-46233 Advisory: Matlab-proxy 0.10.0 updates the crypto-js dependency from 4.1.1 to 4.2.0 due to the CVE-2023-46233.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matlab-proxy version less then 0.10.0 have ### Response: Having vulnarability CVE-2023-46233 Advisory: Matlab-proxy 0.10.0 updates the crypto-js dependency from 4.1.1 to 4.2.0 due to the CVE-2023-46233." }, { "instruction": "what vulnarability does matlabreport version less then 0.6.0 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: Matlabreport 0.6.0 includes a security patch for the function 'makeReport' in 'matlabreport/makereport.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/ahoetker/matlabreport/commit/31fccc6076457d0212b624a1da79515801ae39c2", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matlabreport version less then 0.6.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Matlabreport 0.6.0 includes a security patch for the function 'makeReport' in 'matlabreport/makereport.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().\r\nhttps://github.com/ahoetker/matlabreport/commit/31fccc6076457d0212b624a1da79515801ae39c2" }, { "instruction": "what vulnarability does matplatlib-plus version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45474 Advisory: Matplatlib-plus is a malicious package, typosquatting. It installs cryptomining malware in your system.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matplatlib-plus version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45474 Advisory: Matplatlib-plus is a malicious package, typosquatting. It installs cryptomining malware in your system.\r\nhttps://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/" }, { "instruction": "what vulnarability does matrix-nio version less then 0.20 have", "input": "", "output": "Having vulnarability CVE-2022-39254 Advisory: Matrix-nio 0.20 includes a fix for CVE-2022-39254: Prior to version 0.20, when a user requests a room key from their devices, the software correctly remember the request. Once they receive a forwarded room key, they accept it without checking who the room key came from. This allows homeservers to try to insert room keys of questionable validity, potentially mounting an impersonation attack.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-nio version less then 0.20 have ### Response: Having vulnarability CVE-2022-39254 Advisory: Matrix-nio 0.20 includes a fix for CVE-2022-39254: Prior to version 0.20, when a user requests a room key from their devices, the software correctly remember the request. Once they receive a forwarded room key, they accept it without checking who the room key came from. This allows homeservers to try to insert room keys of questionable validity, potentially mounting an impersonation attack." }, { "instruction": "what vulnarability does matrix-registration version less then 0.7.1 have", "input": "", "output": "Having vulnarability CVE-2019-16789 Advisory: Matrix-registration 0.7.1 updates the waitress dependency because versions below 1.4.2 contain a vulnerability. See CVE-2019-16789.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-registration version less then 0.7.1 have ### Response: Having vulnarability CVE-2019-16789 Advisory: Matrix-registration 0.7.1 updates the waitress dependency because versions below 1.4.2 contain a vulnerability. See CVE-2019-16789." }, { "instruction": "what vulnarability does matrix-sydent version less then 1.0.2 have", "input": "", "output": "Having vulnarability CVE-2019-11340 Advisory: util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on user@bad.example.net@good.example.com returns the user@bad.example.net substring. See: CVE-2019-11340.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-sydent version less then 1.0.2 have ### Response: Having vulnarability CVE-2019-11340 Advisory: util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on user@bad.example.net@good.example.com returns the user@bad.example.net substring. See: CVE-2019-11340." }, { "instruction": "what vulnarability does matrix-synapse version less then 0.28.1 have", "input": "", "output": "Having vulnarability CVE-2018-10657 Advisory: Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2^63 - 1 render rooms unusable, related to federation/federation_base.py and handlers/message.py, as exploited in the wild in April 2018.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-synapse version less then 0.28.1 have ### Response: Having vulnarability CVE-2018-10657 Advisory: Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2^63 - 1 render rooms unusable, related to federation/federation_base.py and handlers/message.py, as exploited in the wild in April 2018." }, { "instruction": "what vulnarability does matrix-synapse-testutils version less then 1.69.0 have", "input": "", "output": "Having vulnarability CVE-2022-39335 Advisory: Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix Federation API allows remote homeservers to request the authorization events in a room. This is necessary so that a homeserver receiving some events can validate that those events are legitimate and permitted in their room. However, in versions of Synapse up to and including 1.68.0, a Synapse homeserver answering a query for authorization events does not sufficiently check that the requesting server should be able to access them. The issue was patched in Synapse 1.69.0. Homeserver administrators are advised to upgrade.\r\n\r\nAlias(es):\r\nGHSA-45cj-f97f-ggwv\r\nPYSEC-2023-65", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-synapse-testutils version less then 1.69.0 have ### Response: Having vulnarability CVE-2022-39335 Advisory: Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix Federation API allows remote homeservers to request the authorization events in a room. This is necessary so that a homeserver receiving some events can validate that those events are legitimate and permitted in their room. However, in versions of Synapse up to and including 1.68.0, a Synapse homeserver answering a query for authorization events does not sufficiently check that the requesting server should be able to access them. The issue was patched in Synapse 1.69.0. Homeserver administrators are advised to upgrade.\r\n\r\nAlias(es):\r\nGHSA-45cj-f97f-ggwv\r\nPYSEC-2023-65" }, { "instruction": "what vulnarability does matrixctl version less then 0.10.0 have", "input": "", "output": "Having vulnarability PVE-2021-40785 Advisory: Matrixctl 0.10.0 starts to use secure temporary directory for ansible_runner's private data.\r\nhttps://github.com/MichaelSasser/matrixctl/commit/efd2fae77537a1f3b050019540745f32057d781e", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrixctl version less then 0.10.0 have ### Response: Having vulnarability PVE-2021-40785 Advisory: Matrixctl 0.10.0 starts to use secure temporary directory for ansible_runner's private data.\r\nhttps://github.com/MichaelSasser/matrixctl/commit/efd2fae77537a1f3b050019540745f32057d781e" }, { "instruction": "what vulnarability does matthisk-httpsig version less then 1.0.0 have", "input": "", "output": "Having vulnarability PVE-2021-25886 Advisory: matthisk-httpsig before 1.0.0 allowed reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matthisk-httpsig version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-25886 Advisory: matthisk-httpsig before 1.0.0 allowed reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig." }, { "instruction": "what vulnarability does mautrix-telegram version less then 0.6.0 have", "input": "", "output": "Having vulnarability PVE-2021-37432 Advisory: Mautrix-telegram 0.6.0 fixes a vulnerability in event handling.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mautrix-telegram version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-37432 Advisory: Mautrix-telegram 0.6.0 fixes a vulnerability in event handling." }, { "instruction": "what vulnarability does maxminddb version less then 1.1.2 have", "input": "", "output": "Having vulnarability PVE-2021-25887 Advisory: maxminddb 1.1.2 includes a number of important security fixes. Among these fixes is improved validation of the database metadata. Unfortunately, MaxMind GeoIP2 and GeoLite2 databases created earlier than January 28, 2014 had an invalid data type for the `record_size` in the metadata. Previously these databases worked on little endian machines with libmaxminddb but did not work on big endian machines. Due to increased safety checks when reading the file, these databases will no longer work on any platform. If you are using one of these databases, we recommend that you upgrade to the latest GeoLite2 or GeoIP2 database", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maxminddb version less then 1.1.2 have ### Response: Having vulnarability PVE-2021-25887 Advisory: maxminddb 1.1.2 includes a number of important security fixes. Among these fixes is improved validation of the database metadata. Unfortunately, MaxMind GeoIP2 and GeoLite2 databases created earlier than January 28, 2014 had an invalid data type for the `record_size` in the metadata. Previously these databases worked on little endian machines with libmaxminddb but did not work on big endian machines. Due to increased safety checks when reading the file, these databases will no longer work on any platform. If you are using one of these databases, we recommend that you upgrade to the latest GeoLite2 or GeoIP2 database" }, { "instruction": "what vulnarability does mayan-edms version less then 3.0.2 have", "input": "", "output": "Having vulnarability CVE-2018-16406 Advisory: Mayan-edms versions before 3.0.2 are affected by CVE-2018-16406:\r\nThe Cabinets app has XSS via a crafted cabinet label.\r\nhttps://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst\r\nhttps://gitlab.com/mayan-edms/mayan-edms/commit/48dfc06e49c7f773749e063f8cc69c95509d1c32\r\nhttps://gitlab.com/mayan-edms/mayan-edms/issues/495", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mayan-edms version less then 3.0.2 have ### Response: Having vulnarability CVE-2018-16406 Advisory: Mayan-edms versions before 3.0.2 are affected by CVE-2018-16406:\r\nThe Cabinets app has XSS via a crafted cabinet label.\r\nhttps://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst\r\nhttps://gitlab.com/mayan-edms/mayan-edms/commit/48dfc06e49c7f773749e063f8cc69c95509d1c32\r\nhttps://gitlab.com/mayan-edms/mayan-edms/issues/495" }, { "instruction": "what vulnarability does md4c version less then 1.0.0 have", "input": "", "output": "Having vulnarability CVE-2020-26148 Advisory: Md4c (Python bindings) v1.0.0 includes a fix for 'ISANYOF' macro, which is vulnerable in md4c main package versions before 0.4.6: The mentioned macro could provide unexpected results when encountering zero byte in the input text; in some cases leading to broken internal state of the parser. The bug could result in a denial of service and possibly also in other security implications.\r\nhttps://github.com/mity/md4c/issues/130", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does md4c version less then 1.0.0 have ### Response: Having vulnarability CVE-2020-26148 Advisory: Md4c (Python bindings) v1.0.0 includes a fix for 'ISANYOF' macro, which is vulnerable in md4c main package versions before 0.4.6: The mentioned macro could provide unexpected results when encountering zero byte in the input text; in some cases leading to broken internal state of the parser. The bug could result in a denial of service and possibly also in other security implications.\r\nhttps://github.com/mity/md4c/issues/130" }, { "instruction": "what vulnarability does mdbackup version less then 0.2.0 have", "input": "", "output": "Having vulnarability PVE-2021-37725 Advisory: Mdbackup 0.2.0 comes with some bug fixes that made the utility more secure. It introduces the ``Vault secret backend``, where important data (like passwords) can be stored, and the ``File secret backend`` (a fallback secret backend) where secrets are read from the file system directly.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mdbackup version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-37725 Advisory: Mdbackup 0.2.0 comes with some bug fixes that made the utility more secure. It introduces the ``Vault secret backend``, where important data (like passwords) can be stored, and the ``File secret backend`` (a fallback secret backend) where secrets are read from the file system directly." }, { "instruction": "what vulnarability does mdcatch version less then 0.9.1 have", "input": "", "output": "Having vulnarability PVE-2021-38433 Advisory: Mdcatch 0.9.1 increases security by removing \"shell=True\".\r\nhttps://github.com/azazellochg/MDCatch/pull/14/commits/c4a6551cdd80d3f3bb9a76bc9e2ee08fcab2e818", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mdcatch version less then 0.9.1 have ### Response: Having vulnarability PVE-2021-38433 Advisory: Mdcatch 0.9.1 increases security by removing \"shell=True\".\r\nhttps://github.com/azazellochg/MDCatch/pull/14/commits/c4a6551cdd80d3f3bb9a76bc9e2ee08fcab2e818" }, { "instruction": "what vulnarability does meapi version less then 0.3.8 have", "input": "", "output": "Having vulnarability PVE-2022-50252 Advisory: Meapi 0.3.8 prevents changes in protected attrs.\r\nhttps://github.com/david-lev/meapi/commit/fb8a90c7050bb3b334e71c4592cf86ec196de289", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does meapi version less then 0.3.8 have ### Response: Having vulnarability PVE-2022-50252 Advisory: Meapi 0.3.8 prevents changes in protected attrs.\r\nhttps://github.com/david-lev/meapi/commit/fb8a90c7050bb3b334e71c4592cf86ec196de289" }, { "instruction": "what vulnarability does mechanicalsoup version greather then equal to 0.2.0,less then 1.3.0 have", "input": "", "output": "Having vulnarability CVE-2023-34457 Advisory: MechanicalSoup is a Python library for automating interaction with websites. Starting in version 0.2.0 and prior to version 1.3.0, a malicious web server can read arbitrary files on the client using a '' inside HTML form. All users of MechanicalSoup's form submission are affected, unless they took very specific (and manual) steps to reset HTML form field values. Version 1.3.0 contains a patch for this issue.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mechanicalsoup version greather then equal to 0.2.0,less then 1.3.0 have ### Response: Having vulnarability CVE-2023-34457 Advisory: MechanicalSoup is a Python library for automating interaction with websites. Starting in version 0.2.0 and prior to version 1.3.0, a malicious web server can read arbitrary files on the client using a '' inside HTML form. All users of MechanicalSoup's form submission are affected, unless they took very specific (and manual) steps to reset HTML form field values. Version 1.3.0 contains a patch for this issue." }, { "instruction": "what vulnarability does mechanize version less then 0.4.6 have", "input": "", "output": "Having vulnarability CVE-2021-32837 Advisory: Mechanize 0.4.6 includes a fix for CVE-2021-32837: Mechanize contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash.\r\nhttps://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mechanize version less then 0.4.6 have ### Response: Having vulnarability CVE-2021-32837 Advisory: Mechanize 0.4.6 includes a fix for CVE-2021-32837: Mechanize contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash.\r\nhttps://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize" }, { "instruction": "what vulnarability does megalib version less then 0.9.5alpha have", "input": "", "output": "Having vulnarability CVE-2019-11324 Advisory: Megalib 0.9.5alpha updates its dependency 'urllib3' to v1.24.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does megalib version less then 0.9.5alpha have ### Response: Having vulnarability CVE-2019-11324 Advisory: Megalib 0.9.5alpha updates its dependency 'urllib3' to v1.24.2 to include a security fix." }, { "instruction": "what vulnarability does mei2volpiano version less then equal to 0.8.2 have", "input": "", "output": "Having vulnarability CVE-2022-37189 Advisory: DDMAL MEI2Volpiano 0.8.2 is vulnerable to XML External Entity (XXE), leading to a Denial of Service. This occurs due to the usage of the unsafe 'xml.etree' library to parse untrusted XML input.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mei2volpiano version less then equal to 0.8.2 have ### Response: Having vulnarability CVE-2022-37189 Advisory: DDMAL MEI2Volpiano 0.8.2 is vulnerable to XML External Entity (XXE), leading to a Denial of Service. This occurs due to the usage of the unsafe 'xml.etree' library to parse untrusted XML input." }, { "instruction": "what vulnarability does meilisearch version less then 0.18.3 have", "input": "", "output": "Having vulnarability PVE-2022-46406 Advisory: Meilisearch (python client) 0.18.3 is compatible with Meilisearch 0.27.0, that sets a limit to filters to avoid a stack overflow crash when using a huge list of filters.\r\nhttps://github.com/meilisearch/meilisearch/issues/1967", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does meilisearch version less then 0.18.3 have ### Response: Having vulnarability PVE-2022-46406 Advisory: Meilisearch (python client) 0.18.3 is compatible with Meilisearch 0.27.0, that sets a limit to filters to avoid a stack overflow crash when using a huge list of filters.\r\nhttps://github.com/meilisearch/meilisearch/issues/1967" }, { "instruction": "what vulnarability does meinheld version less then 1.0.2 have", "input": "", "output": "Having vulnarability CVE-2020-7658 Advisory: Meinheld prior to 1.0.2 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. See: CVE-2020-7658.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does meinheld version less then 1.0.2 have ### Response: Having vulnarability CVE-2020-7658 Advisory: Meinheld prior to 1.0.2 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. See: CVE-2020-7658." }, { "instruction": "what vulnarability does mendeleev version less then 0.10.0 have", "input": "", "output": "Having vulnarability CVE-2022-24757 Advisory: Mendeleev 0.10.0 updates its dependency 'jupyter-server' to v1.18.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mendeleev version less then 0.10.0 have ### Response: Having vulnarability CVE-2022-24757 Advisory: Mendeleev 0.10.0 updates its dependency 'jupyter-server' to v1.18.1 to include security fixes." }, { "instruction": "what vulnarability does mentat version less then 0.1.20 have", "input": "", "output": "Having vulnarability CVE-2023-41040 Advisory: Mentat 0.1.20 updates its dependency 'gitpython' to v3.1.35 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mentat version less then 0.1.20 have ### Response: Having vulnarability CVE-2023-41040 Advisory: Mentat 0.1.20 updates its dependency 'gitpython' to v3.1.35 to include a security fix." }, { "instruction": "what vulnarability does meraki version less then 1.40.1 have", "input": "", "output": "Having vulnarability CVE-2023-49081 Advisory: Versions of aiohttp before 1.40.1, an asynchronous HTTP client/server framework for asyncio and Python, are susceptible to a vulnerability where improper validation allows an attacker to modify or create a new HTTP request by controlling the HTTP version of the request. This issue specifically affects environments where the attacker has the ability to control the HTTP version.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does meraki version less then 1.40.1 have ### Response: Having vulnarability CVE-2023-49081 Advisory: Versions of aiohttp before 1.40.1, an asynchronous HTTP client/server framework for asyncio and Python, are susceptible to a vulnerability where improper validation allows an attacker to modify or create a new HTTP request by controlling the HTTP version of the request. This issue specifically affects environments where the attacker has the ability to control the HTTP version." }, { "instruction": "what vulnarability does mercurial version less then 1.6.4 have", "input": "", "output": "Having vulnarability CVE-2010-4237 Advisory: Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mercurial version less then 1.6.4 have ### Response: Having vulnarability CVE-2010-4237 Advisory: Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack." }, { "instruction": "what vulnarability does metadataproxy version less then 1.1.1 have", "input": "", "output": "Having vulnarability PVE-2021-25888 Advisory: metadataproxy before 1.1.1 has a flaw in the proxy functionality when used in passthrough mode that would expose the host's IAM role credentials when extra paths were added to the end of the security-credentials end-point. metadataproxy will now properly capture any call to iam/security-credentials/ and return the scoped credentials, rather than the host's credentials.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metadataproxy version less then 1.1.1 have ### Response: Having vulnarability PVE-2021-25888 Advisory: metadataproxy before 1.1.1 has a flaw in the proxy functionality when used in passthrough mode that would expose the host's IAM role credentials when extra paths were added to the end of the security-credentials end-point. metadataproxy will now properly capture any call to iam/security-credentials/ and return the scoped credentials, rather than the host's credentials." }, { "instruction": "what vulnarability does metagpt version less then 0.6.5 have", "input": "", "output": "Having vulnarability CVE-2024-23750 Advisory: MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metagpt version less then 0.6.5 have ### Response: Having vulnarability CVE-2024-23750 Advisory: MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen." }, { "instruction": "what vulnarability does metakb version less then 1.1.0a8 have", "input": "", "output": "Having vulnarability CVE-2022-29217 Advisory: Metakb 1.1.0a8 updates its dependency 'pyjwt' to v2.4.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metakb version less then 1.1.0a8 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Metakb 1.1.0a8 updates its dependency 'pyjwt' to v2.4.0 to include a security fix." }, { "instruction": "what vulnarability does metarace version less then 1.11.3 have", "input": "", "output": "Having vulnarability PVE-2022-49649 Advisory: Metarace 1.11.3 changes 'default_file' to remove a path traversal vulnerability. It discards any path components in file before searching CWD, DEFAULT_PATH and DB_PATH, in that order.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metarace version less then 1.11.3 have ### Response: Having vulnarability PVE-2022-49649 Advisory: Metarace 1.11.3 changes 'default_file' to remove a path traversal vulnerability. It discards any path components in file before searching CWD, DEFAULT_PATH and DB_PATH, in that order." }, { "instruction": "what vulnarability does metpx-sarracenia version less then 2.20.4b2 have", "input": "", "output": "Having vulnarability PVE-2021-38182 Advisory: Metpx-sarracenia 2.20.4b2 removes recursion in the connection recovery, which was vulnerable to stack exhaustion on long failures.\r\nhttps://github.com/MetPX/sarracenia/commit/b1b78e1a1fcfe08fe81dee2840aa29d71becda65", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metpx-sarracenia version less then 2.20.4b2 have ### Response: Having vulnarability PVE-2021-38182 Advisory: Metpx-sarracenia 2.20.4b2 removes recursion in the connection recovery, which was vulnerable to stack exhaustion on long failures.\r\nhttps://github.com/MetPX/sarracenia/commit/b1b78e1a1fcfe08fe81dee2840aa29d71becda65" }, { "instruction": "what vulnarability does metricflow version less then 0.100.0 have", "input": "", "output": "Having vulnarability CVE-2021-41495 Advisory: Metricflow 0.100.0 updates its dependency 'numpy' to v1.22.2 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metricflow version less then 0.100.0 have ### Response: Having vulnarability CVE-2021-41495 Advisory: Metricflow 0.100.0 updates its dependency 'numpy' to v1.22.2 to include a security fix." }, { "instruction": "what vulnarability does metron-tagger version less then 1.0.7 have", "input": "", "output": "Having vulnarability PVE-2021-38645 Advisory: Metron-tagger 1.0.7 uses a more secure SSL context.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metron-tagger version less then 1.0.7 have ### Response: Having vulnarability PVE-2021-38645 Advisory: Metron-tagger 1.0.7 uses a more secure SSL context." }, { "instruction": "what vulnarability does mezzanine version less then 0.10.5 have", "input": "", "output": "Having vulnarability PVE-2021-42776 Advisory: Mezzanine 0.10.5 fixes Ajax in admin not using CSRF token for forms.\r\nhttps://github.com/stephenmcd/mezzanine/commit/2cf8c388305c8121668c186b5a98aa0ec6046c3d", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mezzanine version less then 0.10.5 have ### Response: Having vulnarability PVE-2021-42776 Advisory: Mezzanine 0.10.5 fixes Ajax in admin not using CSRF token for forms.\r\nhttps://github.com/stephenmcd/mezzanine/commit/2cf8c388305c8121668c186b5a98aa0ec6046c3d" }, { "instruction": "what vulnarability does mgp2pdf version less then 0.10 have", "input": "", "output": "Having vulnarability PVE-2021-25889 Advisory: In mgp2pdf before 0.10 `%filter`` is enabled by default which is a security risk.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mgp2pdf version less then 0.10 have ### Response: Having vulnarability PVE-2021-25889 Advisory: In mgp2pdf before 0.10 `%filter`` is enabled by default which is a security risk." }, { "instruction": "what vulnarability does mi version less then 0.2 have", "input": "", "output": "Having vulnarability PVE-2021-37998 Advisory: Mi 0.2 adds ACL-based security.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mi version less then 0.2 have ### Response: Having vulnarability PVE-2021-37998 Advisory: Mi 0.2 adds ACL-based security." }, { "instruction": "what vulnarability does mia-accounting version less then 1.5.4 have", "input": "", "output": "Having vulnarability PVE-2023-58719 Advisory: Mia-accounting 1.5.4 adds safeguard to the next URI utilities to prevent Cross-Site Scripting (XSS) attacks.\r\nhttps://github.com/imacat/mia-accounting/commit/482a0faa2387863de8201c4c44b8178d293c849f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mia-accounting version less then 1.5.4 have ### Response: Having vulnarability PVE-2023-58719 Advisory: Mia-accounting 1.5.4 adds safeguard to the next URI utilities to prevent Cross-Site Scripting (XSS) attacks.\r\nhttps://github.com/imacat/mia-accounting/commit/482a0faa2387863de8201c4c44b8178d293c849f" }, { "instruction": "what vulnarability does miarec-ftpfs version less then 2024.1.2 have", "input": "", "output": "Having vulnarability PVE-2024-64487 Advisory: Miarec-ftpfs 2024.1.2 fixes a potential race condition that could cause connection leakage under certain conditions such as Read-Modify-Write and Check-Then-Act.\r\nhttps://github.com/miarec/miarec_ftpfs/commit/eb03c3369e53c2ab27760d128be3b2f8b0423b7c", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does miarec-ftpfs version less then 2024.1.2 have ### Response: Having vulnarability PVE-2024-64487 Advisory: Miarec-ftpfs 2024.1.2 fixes a potential race condition that could cause connection leakage under certain conditions such as Read-Modify-Write and Check-Then-Act.\r\nhttps://github.com/miarec/miarec_ftpfs/commit/eb03c3369e53c2ab27760d128be3b2f8b0423b7c" }, { "instruction": "what vulnarability does miarec-s3fs version less then 2024.1.1 have", "input": "", "output": "Having vulnarability PVE-2024-64186 Advisory: Miarec-s3fs 2024.1.1 addresses a race condition that occurred when S3FS was accessed concurrently by multiple threads. This update ensures stable and synchronized access to S3FS resources.\r\nhttps://github.com/miarec/miarec_s3fs/commit/4508e6333e5aa1e3a8c8c0abe6910cd8881c7551", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does miarec-s3fs version less then 2024.1.1 have ### Response: Having vulnarability PVE-2024-64186 Advisory: Miarec-s3fs 2024.1.1 addresses a race condition that occurred when S3FS was accessed concurrently by multiple threads. This update ensures stable and synchronized access to S3FS resources.\r\nhttps://github.com/miarec/miarec_s3fs/commit/4508e6333e5aa1e3a8c8c0abe6910cd8881c7551" }, { "instruction": "what vulnarability does miarec-sshfs version less then 2024.1.5 have", "input": "", "output": "Having vulnarability PVE-2024-64486 Advisory: Miarec-sshfs 2024.1.5 fixes a potential race condition that could occur when the SSHFS object was accessed by multiple threads simultaneously. This issue could lead to inconsistent states or unexpected behavior due to simultaneous operations on the same resource.\r\nhttps://github.com/miarec/miarec_sshfs/commit/fa428029191a4998a01329d1ff8c3a1d58b69cff", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does miarec-sshfs version less then 2024.1.5 have ### Response: Having vulnarability PVE-2024-64486 Advisory: Miarec-sshfs 2024.1.5 fixes a potential race condition that could occur when the SSHFS object was accessed by multiple threads simultaneously. This issue could lead to inconsistent states or unexpected behavior due to simultaneous operations on the same resource.\r\nhttps://github.com/miarec/miarec_sshfs/commit/fa428029191a4998a01329d1ff8c3a1d58b69cff" }, { "instruction": "what vulnarability does micropython-copy version less then 1.22.0 have", "input": "", "output": "Having vulnarability CVE-2023-7152 Advisory: A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does micropython-copy version less then 1.22.0 have ### Response: Having vulnarability CVE-2023-7152 Advisory: A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability." }, { "instruction": "what vulnarability does micropython-io version less then 1.22.0 have", "input": "", "output": "Having vulnarability CVE-2023-7152 Advisory: A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does micropython-io version less then 1.22.0 have ### Response: Having vulnarability CVE-2023-7152 Advisory: A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability." }, { "instruction": "what vulnarability does micropython-mdns version less then 1.3.0 have", "input": "", "output": "Having vulnarability CVE-2022-40898 Advisory: Micropython-mdns 1.3.0 updates its dependency 'wheel' to v0.38.0 to include a security fix.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does micropython-mdns version less then 1.3.0 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Micropython-mdns 1.3.0 updates its dependency 'wheel' to v0.38.0 to include a security fix." }, { "instruction": "what vulnarability does microstructpy version less then 1.5.4 have", "input": "", "output": "Having vulnarability CVE-2021-41496 Advisory: Microstructpy 1.5.4 updates its dependency 'numpy' to v1.22.0 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does microstructpy version less then 1.5.4 have ### Response: Having vulnarability CVE-2021-41496 Advisory: Microstructpy 1.5.4 updates its dependency 'numpy' to v1.22.0 to include security fixes." }, { "instruction": "what vulnarability does mihifepe version less then 0.2.2 have", "input": "", "output": "Having vulnarability PVE-2021-41348 Advisory: Mihifepe version 0.2.2 includes security patches for several functions. They contained OS injection vulnerabilities: subprocess call with shell=True.\r\nhttps://github.com/Craven-Biostat-Lab/mihifepe/commit/b69847025764efc5c6b134c73e18fcfb11b42e0f", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mihifepe version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-41348 Advisory: Mihifepe version 0.2.2 includes security patches for several functions. They contained OS injection vulnerabilities: subprocess call with shell=True.\r\nhttps://github.com/Craven-Biostat-Lab/mihifepe/commit/b69847025764efc5c6b134c73e18fcfb11b42e0f" }, { "instruction": "what vulnarability does mikado version less then 2.1.0 have", "input": "", "output": "Having vulnarability PVE-2021-40159 Advisory: Mikado 2.1.0 removes unsafe calls to 'tempfile.mktemp' and other such files, for increased security according to CodeQL.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mikado version less then 2.1.0 have ### Response: Having vulnarability PVE-2021-40159 Advisory: Mikado 2.1.0 removes unsafe calls to 'tempfile.mktemp' and other such files, for increased security according to CodeQL." }, { "instruction": "what vulnarability does milvus version less then 2.2.6 have", "input": "", "output": "Having vulnarability CVE-2023-28432 Advisory: Milvus 2.2.6 (lightweight version of Milvus) includes a binary of Milvus version 2.2.5, that includes a security fix.\r\nhttps://github.com/milvus-io/milvus-lite/commit/4aa88881e44c91b6e1c5e89f3a88e61c80054eff\r\nhttps://github.com/milvus-io/milvus/issues/22980", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does milvus version less then 2.2.6 have ### Response: Having vulnarability CVE-2023-28432 Advisory: Milvus 2.2.6 (lightweight version of Milvus) includes a binary of Milvus version 2.2.5, that includes a security fix.\r\nhttps://github.com/milvus-io/milvus-lite/commit/4aa88881e44c91b6e1c5e89f3a88e61c80054eff\r\nhttps://github.com/milvus-io/milvus/issues/22980" }, { "instruction": "what vulnarability does mindee version less then 2.0.1 have", "input": "", "output": "Having vulnarability CVE-2022-24303 Advisory: Mindee 2.0.1 updates its dependency 'Pillow' to v9.0.1 to include security fixes.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mindee version less then 2.0.1 have ### Response: Having vulnarability CVE-2022-24303 Advisory: Mindee 2.0.1 updates its dependency 'Pillow' to v9.0.1 to include security fixes." }, { "instruction": "what vulnarability does mindsdb version less then 22.11.4.3 have", "input": "", "output": "Having vulnarability CVE-2022-23522 Advisory: MindsDB is an open source machine learning platform. An unsafe extraction is being performed using `shutil.unpack_archive()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. This vulnerability is sometimes called a **TarSlip** or a **ZipSlip variant**. Unpacking files using the high-level function `shutil.unpack_archive()` from a potentially malicious tarball without validating that the destination file path remained within the intended destination directory may cause files to be overwritten outside the destination directory. An attacker could craft a malicious tarball with a filename path and then serve the archive remotely using a personal bucket `s3`, thus, retrieve the tarball through **mindsdb** and overwrite the system files of the hosting server. This issue has been addressed in version 22.11.4.3. Users are advised to upgrade. Users unable to upgrade should avoid ingesting archives from untrusted sources.\r\n\r\nAlias(es):\r\nGHSA-7x45-phmr-9wqp\r\nPYSEC-2023-26", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mindsdb version less then 22.11.4.3 have ### Response: Having vulnarability CVE-2022-23522 Advisory: MindsDB is an open source machine learning platform. An unsafe extraction is being performed using `shutil.unpack_archive()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. This vulnerability is sometimes called a **TarSlip** or a **ZipSlip variant**. Unpacking files using the high-level function `shutil.unpack_archive()` from a potentially malicious tarball without validating that the destination file path remained within the intended destination directory may cause files to be overwritten outside the destination directory. An attacker could craft a malicious tarball with a filename path and then serve the archive remotely using a personal bucket `s3`, thus, retrieve the tarball through **mindsdb** and overwrite the system files of the hosting server. This issue has been addressed in version 22.11.4.3. Users are advised to upgrade. Users unable to upgrade should avoid ingesting archives from untrusted sources.\r\n\r\nAlias(es):\r\nGHSA-7x45-phmr-9wqp\r\nPYSEC-2023-26" }, { "instruction": "what vulnarability does mindspore version less then 0.5.0-beta have", "input": "", "output": "Having vulnarability CVE-2020-15358 Advisory: Mindspore 0.5.0-beta updates its dependency \"Sqlite\" to version 3.32.2, to handle CVE-2020-15358.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mindspore version less then 0.5.0-beta have ### Response: Having vulnarability CVE-2020-15358 Advisory: Mindspore 0.5.0-beta updates its dependency \"Sqlite\" to version 3.32.2, to handle CVE-2020-15358." }, { "instruction": "what vulnarability does mini-amf version less then 0.8 have", "input": "", "output": "Having vulnarability PVE-2021-33048 Advisory: mini-amf before 0.8 is vulnerable to XML entity attacks.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mini-amf version less then 0.8 have ### Response: Having vulnarability PVE-2021-33048 Advisory: mini-amf before 0.8 is vulnerable to XML entity attacks." }, { "instruction": "what vulnarability does mirahezebot-plugins version greather then equal to 9.0.0,less then 9.0.2 have", "input": "", "output": "Having vulnarability CVE-2020-15251 Advisory: Mirahezebot-plugins 9.0.2 includes a fix for CVE-2020-15251: In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2.\r\nhttps://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mirahezebot-plugins version greather then equal to 9.0.0,less then 9.0.2 have ### Response: Having vulnarability CVE-2020-15251 Advisory: Mirahezebot-plugins 9.0.2 includes a fix for CVE-2020-15251: In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2.\r\nhttps://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "instruction": "what vulnarability does misago version less then 0.14.0 have", "input": "", "output": "Having vulnarability PVE-2022-45162 Advisory: Misago 0.14.0 handles maliciously constructed quasi urls sent to login view that passed 'is_safe_url' and crashed redirect().\r\nhttps://github.com/rafalp/Misago/issues/943", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does misago version less then 0.14.0 have ### Response: Having vulnarability PVE-2022-45162 Advisory: Misago 0.14.0 handles maliciously constructed quasi urls sent to login view that passed 'is_safe_url' and crashed redirect().\r\nhttps://github.com/rafalp/Misago/issues/943" }, { "instruction": "what vulnarability does mishmash version less then 0.3b12 have", "input": "", "output": "Having vulnarability CVE-2017-18342 Advisory: mishmash 0.3b12 - Pyaml >= 4.2b1 for security alert.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mishmash version less then 0.3b12 have ### Response: Having vulnarability CVE-2017-18342 Advisory: mishmash 0.3b12 - Pyaml >= 4.2b1 for security alert." }, { "instruction": "what vulnarability does misp-maltego version less then 1.4.5 have", "input": "", "output": "Having vulnarability CVE-2020-12889 Advisory: Misp-maltego 1.4.5 resolves an information disclosure vulnerability when using MISP-maltego as remote transform server. The transform server would cache the MISP credentials of the first user connected, and provide access to that MISP instance for any later user. See: CVE-2020-12889.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does misp-maltego version less then 1.4.5 have ### Response: Having vulnarability CVE-2020-12889 Advisory: Misp-maltego 1.4.5 resolves an information disclosure vulnerability when using MISP-maltego as remote transform server. The transform server would cache the MISP credentials of the first user connected, and provide access to that MISP instance for any later user. See: CVE-2020-12889." }, { "instruction": "what vulnarability does mistral version less then 7.0.1 have", "input": "", "output": "Having vulnarability CVE-2018-16849 Advisory: Mistral 7.0.1 includes a fix for CVE-2018-16849: By manipulating the SSH private key filename, the std.ssh action can be used to disclose the presence of arbitrary files within the filesystem of the executor running the action. Since std.ssh private_key_filename can take an absolute path, it can be used to assess whether or not a file exists on the executor's filesystem.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mistral version less then 7.0.1 have ### Response: Having vulnarability CVE-2018-16849 Advisory: Mistral 7.0.1 includes a fix for CVE-2018-16849: By manipulating the SSH private key filename, the std.ssh action can be used to disclose the presence of arbitrary files within the filesystem of the executor running the action. Since std.ssh private_key_filename can take an absolute path, it can be used to assess whether or not a file exists on the executor's filesystem." }, { "instruction": "what vulnarability does mistune version less then 0.7.2 have", "input": "", "output": "Having vulnarability PVE-2021-25890 Advisory: Mistune before 0.7.2 is vulnerable to an XSS attack. It is possible to bypass the renderer's link security check.\r\nhttps://github.com/lepture/mistune/issues/87", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mistune version less then 0.7.2 have ### Response: Having vulnarability PVE-2021-25890 Advisory: Mistune before 0.7.2 is vulnerable to an XSS attack. It is possible to bypass the renderer's link security check.\r\nhttps://github.com/lepture/mistune/issues/87" }, { "instruction": "what vulnarability does mitiq version less then 0.4.0 have", "input": "", "output": "Having vulnarability CVE-2020-26215 Advisory: Mitiq 0.4.0 updates notebook version in requirements to resolve a vulnerability. See CVE-2020-26215.\r\nhttps://github.com/unitaryfund/mitiq/pull/445", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitiq version less then 0.4.0 have ### Response: Having vulnarability CVE-2020-26215 Advisory: Mitiq 0.4.0 updates notebook version in requirements to resolve a vulnerability. See CVE-2020-26215.\r\nhttps://github.com/unitaryfund/mitiq/pull/445" }, { "instruction": "what vulnarability does mitmproxy version less then 0.17 have", "input": "", "output": "Having vulnarability PVE-2021-25891 Advisory: Mitmproxy before 0.17 has a XSS vulnerability in HTTP errors.\r\nhttps://github.com/mitmproxy/mitmproxy/pull/1066", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitmproxy version less then 0.17 have ### Response: Having vulnarability PVE-2021-25891 Advisory: Mitmproxy before 0.17 has a XSS vulnerability in HTTP errors.\r\nhttps://github.com/mitmproxy/mitmproxy/pull/1066" }, { "instruction": "what vulnarability does mitmproxy-iframe version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-47801 Advisory: Mitmproxy-iframe is a malicious package, typosquatting. It contains an \"artificially introduced\" code execution vulnerability.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-removes-mitmproxy2-over-code-execution-concerns/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitmproxy-iframe version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47801 Advisory: Mitmproxy-iframe is a malicious package, typosquatting. It contains an \"artificially introduced\" code execution vulnerability.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-removes-mitmproxy2-over-code-execution-concerns/" }, { "instruction": "what vulnarability does mitmproxy2 version greather then 0,less then 0 have", "input": "", "output": "Having vulnarability PVE-2022-45479 Advisory: Mitmproxy2 is a malicious package, typosquatting. It contains an \"artificially introduced\" code execution vulnerability.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-removes-mitmproxy2-over-code-execution-concerns/", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitmproxy2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45479 Advisory: Mitmproxy2 is a malicious package, typosquatting. It contains an \"artificially introduced\" code execution vulnerability.\r\nhttps://www.bleepingcomputer.com/news/security/pypi-removes-mitmproxy2-over-code-execution-concerns/" }, { "instruction": "what vulnarability does mitogen version greather then equal to 0,less then 0.2.8 have", "input": "", "output": "Having vulnarability CVE-2019-15149 Advisory: Mitogen 0.2.8 includes a fix for CVE-2019-15149: core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism.\r\nhttps://github.com/mitogen-hq/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitogen version greather then equal to 0,less then 0.2.8 have ### Response: Having vulnarability CVE-2019-15149 Advisory: Mitogen 0.2.8 includes a fix for CVE-2019-15149: core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism.\r\nhttps://github.com/mitogen-hq/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc" }, { "instruction": "what vulnarability does mitsuba version less then 0.4.0 have", "input": "", "output": "Having vulnarability PVE-2023-62797 Advisory: Mitsuba 0.4.0 fixes a race condition in `jit_sync_thread()` which can corrupt internal\r\nnanothread data structures.\r\nhttps://github.com/mitsuba-renderer/drjit-core/commit/6690923505cb4fca3fb7d75b2e1705008c0af738", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitsuba version less then 0.4.0 have ### Response: Having vulnarability PVE-2023-62797 Advisory: Mitsuba 0.4.0 fixes a race condition in `jit_sync_thread()` which can corrupt internal\r\nnanothread data structures.\r\nhttps://github.com/mitsuba-renderer/drjit-core/commit/6690923505cb4fca3fb7d75b2e1705008c0af738" }, { "instruction": "what vulnarability does mixminion version less then 0.0.2 have", "input": "", "output": "Having vulnarability PVE-2021-25892 Advisory: mixminion before 0.0.2 is vulnerable to certain trivial DoS attacks. In particular, it's possible to send zlib bombs or flood a server with open connections.", "text": "Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mixminion version less then 0.0.2 have ### Response: Having vulnarability PVE-2021-25892 Advisory: mixminion before 0.0.2 is vulnerable to certain trivial DoS attacks. In particular, it's possible to send zlib bombs or flood a server with open connections." }, { "instruction": "what vulnarability does mjml version greather then 0.10.0 ,less then 0.11.0 have", "input": "", "output": "Having vulnarability CVE-2024-26151 Advisory: The `mjml` PyPI package, found at the `FelixSchwarz/mjml-python` GitHub repo, is an unofficial Python port of MJML, a markup language created by Mailjet. All users of `FelixSchwarz/mjml-python` who insert untrusted data into mjml templates unless that data is checked in a very strict manner. User input like `<script>` would be rendered as `