output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2022-51669 Advisory: Djangocms-frontend 1.0.1 avoids HTML injection into carousels when ckeditor is not installed.
https://github.com/django-cms/djangocms-frontend/commit/80972e7bf9f7a361d26ca35bcaa5b7578277b3ff | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangocms-frontend version less then 1.0.1 have ### Response: Having vulnarability PVE-2022-51669 Advisory: Djangocms-frontend 1.0.1 avoids HTML injection into carousels when ckeditor is not installed.
https://github.com/django-cms/djangocms-frontend/commit/80972e7bf9f7a361d26ca35bcaa5b7578277b3ff | what vulnarability does djangocms-frontend version less then 1.0.1 have | |
Having vulnarability PVE-2021-25798 Advisory: Djangocms-highlightjs 0.3.1 escapes code in plugin template.
https://github.com/nephila/djangocms-highlightjs/pull/1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangocms-highlightjs version less then 0.3.1 have ### Response: Having vulnarability PVE-2021-25798 Advisory: Djangocms-highlightjs 0.3.1 escapes code in plugin template.
https://github.com/nephila/djangocms-highlightjs/pull/1 | what vulnarability does djangocms-highlightjs version less then 0.3.1 have | |
Having vulnarability PVE-2022-51740 Advisory: Djangoo is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangoo version greather then 0 have ### Response: Having vulnarability PVE-2022-51740 Advisory: Djangoo is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does djangoo version greather then 0 have | |
Having vulnarability PVE-2021-25799 Advisory: djangorestframework 2.2.1 fixes a security issue: Use `defusedxml` package to address XML parsing vulnerabilities.
https://github.com/encode/django-rest-framework/commit/dcee027fa97f015ff3b87f0fd72b7995cdd6e155 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangorestframework version less then 2.2.1 have ### Response: Having vulnarability PVE-2021-25799 Advisory: djangorestframework 2.2.1 fixes a security issue: Use `defusedxml` package to address XML parsing vulnerabilities.
https://github.com/encode/django-rest-framework/commit/dcee027fa97f015ff3b87f0fd72b7995cdd6e155 | what vulnarability does djangorestframework version less then 2.2.1 have | |
Having vulnarability PVE-2021-36524 Advisory: Djangorestframework-api-key before 0.2.0 stores the API key in plaintext in the database.
https://github.com/florimondmanca/djangorestframework-api-key/commit/fc51137e056ff3fa3fee7c30f46429f4ab0007c2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangorestframework-api-key version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-36524 Advisory: Djangorestframework-api-key before 0.2.0 stores the API key in plaintext in the database.
https://github.com/florimondmanca/djangorestframework-api-key/commit/fc51137e056ff3fa3fee7c30f46429f4ab0007c2 | what vulnarability does djangorestframework-api-key version less then 0.2.0 have | |
Having vulnarability PVE-2021-34792 Advisory: Djangorestframework-simplejwt before 1.5 allowed '__getattr__' access to the underlying JWT through the 'rest_framework_simplejwt.module.TokenUser' class.
https://github.com/jazzband/djangorestframework-simplejwt/commit/af5ff91f2f7d070070967292a5289d5d9168dc99 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangorestframework-simplejwt version less then 1.5 have ### Response: Having vulnarability PVE-2021-34792 Advisory: Djangorestframework-simplejwt before 1.5 allowed '__getattr__' access to the underlying JWT through the 'rest_framework_simplejwt.module.TokenUser' class.
https://github.com/jazzband/djangorestframework-simplejwt/commit/af5ff91f2f7d070070967292a5289d5d9168dc99 | what vulnarability does djangorestframework-simplejwt version less then 1.5 have | |
Having vulnarability CVE-2017-1000246 Advisory: Djangosaml2 0.17.2 upgrades the pysaml2 dependency to version 4.6.0 which fixes a security issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangosaml2 version less then 0.17.2 have ### Response: Having vulnarability CVE-2017-1000246 Advisory: Djangosaml2 0.17.2 upgrades the pysaml2 dependency to version 4.6.0 which fixes a security issue. | what vulnarability does djangosaml2 version less then 0.17.2 have | |
Having vulnarability CVE-2014-3994 Advisory: Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djblets version less then 0.8.3 have ### Response: Having vulnarability CVE-2014-3994 Advisory: Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name. | what vulnarability does djblets version less then 0.8.3 have | |
Having vulnarability PVE-2021-37913 Advisory: djedefre 0.7.0 fixes a security bug in "djoser.views.UserView" | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djedefre version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-37913 Advisory: djedefre 0.7.0 fixes a security bug in "djoser.views.UserView" | what vulnarability does djedefre version less then 0.7.0 have | |
Having vulnarability PVE-2021-42044 Advisory: Djem version 0.6 adds CSRF tokens to outgoing AJAX requests. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djem version less then 0.6 have ### Response: Having vulnarability PVE-2021-42044 Advisory: Djem version 0.6 adds CSRF tokens to outgoing AJAX requests. | what vulnarability does djem version less then 0.6 have | |
Having vulnarability PVE-2021-34904 Advisory: djoser 0.7.0 fixes a security bug in djoser.views.UserView. (Missing more information) | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djoser version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-34904 Advisory: djoser 0.7.0 fixes a security bug in djoser.views.UserView. (Missing more information) | what vulnarability does djoser version less then 0.7.0 have | |
Having vulnarability PVE-2021-37339 Advisory: Dlhub-gateway 2.0.0 fixes security requirements in the swagger spec. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dlhub-gateway version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-37339 Advisory: Dlhub-gateway 2.0.0 fixes security requirements in the swagger spec. | what vulnarability does dlhub-gateway version less then 2.0.0 have | |
Having vulnarability CVE-2023-4863 Advisory: Dlib-bin 19.24.0 throughout 19.24.1 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.
https://inspector.pypi.io/project/dlib-bin/19.24.1/packages/a4/f3/30ff2558cfaa7c29d9efdc59e38ae730250e379a72dbeeeb958584b29516/dlib_bin-19.24.1-cp310-cp310-macosx_10_9_x86_64.whl | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dlib-bin version greather then equal to 19.24.0,less then equal to 19.24.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Dlib-bin 19.24.0 throughout 19.24.1 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.
https://inspector.pypi.io/project/dlib-bin/19.24.1/packages/a4/f3/30ff2558cfaa7c29d9efdc59e38ae730250e379a72dbeeeb958584b29516/dlib_bin-19.24.1-cp310-cp310-macosx_10_9_x86_64.whl | what vulnarability does dlib-bin version greather then equal to 19.24.0,less then equal to 19.24.1 have | |
Having vulnarability PVE-2022-45143 Advisory: Dmoj 1.2.0 disables Nim due to an arbitrary code execution vulnerability.
https://github.com/DMOJ/judge-server/issues/318 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dmoj version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-45143 Advisory: Dmoj 1.2.0 disables Nim due to an arbitrary code execution vulnerability.
https://github.com/DMOJ/judge-server/issues/318 | what vulnarability does dmoj version less then 1.2.0 have | |
Having vulnarability CVE-2021-28363 Advisory: Dnsimple 2.1.2 updates its dependency 'urllib3' to v1.26.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dnsimple version less then 2.1.2 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Dnsimple 2.1.2 updates its dependency 'urllib3' to v1.26.4 to include a security fix. | what vulnarability does dnsimple version less then 2.1.2 have | |
Having vulnarability CVE-2022-22846 Advisory: Dnslib 0.9.17 includes a fix for CVE-2022-22846: The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.
https://github.com/paulc/dnslib/issues/30 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dnslib version less then 0.9.17 have ### Response: Having vulnarability CVE-2022-22846 Advisory: Dnslib 0.9.17 includes a fix for CVE-2022-22846: The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.
https://github.com/paulc/dnslib/issues/30 | what vulnarability does dnslib version less then 0.9.17 have | |
Having vulnarability PVE-2024-65401 Advisory: Dnspython 2.6.0 fixes a DoS vulnerability highlighted in the "TuDoor" paper (CVE-2023-29483), where spoofed DNS responses could disrupt service. The update prevents denial of service by ignoring malicious packets, allowing the resolver to wait for valid responses until a query's timeout. This mitigation ensures continued service despite attempted attacks, enhancing the resolver's reliability and security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dnspython version less then 2.6.0 have ### Response: Having vulnarability PVE-2024-65401 Advisory: Dnspython 2.6.0 fixes a DoS vulnerability highlighted in the "TuDoor" paper (CVE-2023-29483), where spoofed DNS responses could disrupt service. The update prevents denial of service by ignoring malicious packets, allowing the resolver to wait for valid responses until a query's timeout. This mitigation ensures continued service despite attempted attacks, enhancing the resolver's reliability and security. | what vulnarability does dnspython version less then 2.6.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Dnsupdate 0.4 includes a security patch for the function '_load_cache' in 'dnsupdate.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/lopsided98/dnsupdate/commit/f708d0b6c7340334199b3a91bdbb626b5da09633#diff-bbb8416d14c72839288c2df5695624f5b1810a9fb4d94ab83750725cddfda472 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dnsupdate version less then 0.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Dnsupdate 0.4 includes a security patch for the function '_load_cache' in 'dnsupdate.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/lopsided98/dnsupdate/commit/f708d0b6c7340334199b3a91bdbb626b5da09633#diff-bbb8416d14c72839288c2df5695624f5b1810a9fb4d94ab83750725cddfda472 | what vulnarability does dnsupdate version less then 0.4 have | |
Having vulnarability PVE-2021-38925 Advisory: Docassemble 0.3.35 includes a more robust code injection detection mechanism. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docassemble version less then 0.3.35 have ### Response: Having vulnarability PVE-2021-38925 Advisory: Docassemble 0.3.35 includes a more robust code injection detection mechanism. | what vulnarability does docassemble version less then 0.3.35 have | |
Having vulnarability CVE-2023-46046 Advisory: Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docassemble-base version greather then equal to 1.4.53,less then 1.4.97 have ### Response: Having vulnarability CVE-2023-46046 Advisory: Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch. | what vulnarability does docassemble-base version greather then equal to 1.4.53,less then 1.4.97 have | |
Having vulnarability CVE-2023-45925 Advisory: Docassemble is an expert system for guided interviews and document assembly. Prior to 1.4.97, a user could type HTML into a field, including the field for the user's name, and then that HTML could be displayed on the screen as HTML. The vulnerability has been patched in version 1.4.97 of the master branch. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docassemble-webapp version greather then equal to 0,less then 1.4.97 have ### Response: Having vulnarability CVE-2023-45925 Advisory: Docassemble is an expert system for guided interviews and document assembly. Prior to 1.4.97, a user could type HTML into a field, including the field for the user's name, and then that HTML could be displayed on the screen as HTML. The vulnerability has been patched in version 1.4.97 of the master branch. | what vulnarability does docassemble-webapp version greather then equal to 0,less then 1.4.97 have | |
Having vulnarability PVE-2021-42228 Advisory: Doccano 1.0.1 adds X-Frame-Options header to prevent clickjacking. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does doccano version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-42228 Advisory: Doccano 1.0.1 adds X-Frame-Options header to prevent clickjacking. | what vulnarability does doccano version less then 1.0.1 have | |
Having vulnarability CVE-2022-23491 Advisory: Docdeid 0.1.5 updates its dependency 'certifi' to v2022.12.7 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docdeid version less then 0.1.5 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Docdeid 0.1.5 updates its dependency 'certifi' to v2022.12.7 to include a security fix. | what vulnarability does docdeid version less then 0.1.5 have | |
Having vulnarability CVE-2018-1000808 Advisory: Docker 3.5.1 updates its dependency 'pyOpenSSL' to v18.0.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docker version less then 3.5.1 have ### Response: Having vulnarability CVE-2018-1000808 Advisory: Docker 3.5.1 updates its dependency 'pyOpenSSL' to v18.0.0 to include security fixes. | what vulnarability does docker version less then 3.5.1 have | |
Having vulnarability CVE-2014-5277 Advisory: Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docker-py version greather then equal to 0,less then 0.5.3 have ### Response: Having vulnarability CVE-2014-5277 Advisory: Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. | what vulnarability does docker-py version greather then equal to 0,less then 0.5.3 have | |
Having vulnarability PVE-2021-25805 Advisory: Docker-registry 0.8.1 includes a fix for a path traversal vulnerability.
https://github.com/docker-archive/docker-registry/compare/0.8.0...0.8.1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docker-registry version less then 0.8.1 have ### Response: Having vulnarability PVE-2021-25805 Advisory: Docker-registry 0.8.1 includes a fix for a path traversal vulnerability.
https://github.com/docker-archive/docker-registry/compare/0.8.0...0.8.1 | what vulnarability does docker-registry version less then 0.8.1 have | |
Having vulnarability CVE-2021-32559 Advisory: Docker-tidy 1.1.14 fixes a transitive vulnerability affecting 'pywin32' dependency. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docker-tidy version less then 1.1.14 have ### Response: Having vulnarability CVE-2021-32559 Advisory: Docker-tidy 1.1.14 fixes a transitive vulnerability affecting 'pywin32' dependency. | what vulnarability does docker-tidy version less then 1.1.14 have | |
Having vulnarability CVE-2023-48311 Advisory: dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dockerspawner version greather then equal to 0.11.0,less then 13.0.0 have ### Response: Having vulnarability CVE-2023-48311 Advisory: dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior. | what vulnarability does dockerspawner version greather then equal to 0.11.0,less then 13.0.0 have | |
Having vulnarability CVE-2009-5042 Advisory: Docutils 0.6 includes a fix for CVE-2009-5042: Python-docutils allows insecure usage of temporary files.
https://github.com/advisories/GHSA-cg75-6938-wx58 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docutils version greather then equal to 0.5,less then 0.6 have ### Response: Having vulnarability CVE-2009-5042 Advisory: Docutils 0.6 includes a fix for CVE-2009-5042: Python-docutils allows insecure usage of temporary files.
https://github.com/advisories/GHSA-cg75-6938-wx58 | what vulnarability does docutils version greather then equal to 0.5,less then 0.6 have | |
Having vulnarability CVE-2017-18342 Advisory: Docutils-Glep 1.2 includes a security patch for the function 'parse' in 'docutils_glep/reader.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/mgorny/docutils-glep/commit/d407ea56b1b91a0ac2450fe13306a0be8cffce41 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does docutils-glep version less then 1.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Docutils-Glep 1.2 includes a security patch for the function 'parse' in 'docutils_glep/reader.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/mgorny/docutils-glep/commit/d407ea56b1b91a0ac2450fe13306a0be8cffce41 | what vulnarability does docutils-glep version less then 1.2 have | |
Having vulnarability CVE-2017-7537 Advisory: It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dogtag-pki version less then 10.6.4 have ### Response: Having vulnarability CVE-2017-7537 Advisory: It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates. | what vulnarability does dogtag-pki version less then 10.6.4 have | |
Having vulnarability CVE-2020-7212 Advisory: Domonic 0.2.17 updates its dependency 'urllib3' to v1.25.8 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does domonic version less then 0.2.17 have ### Response: Having vulnarability CVE-2020-7212 Advisory: Domonic 0.2.17 updates its dependency 'urllib3' to v1.25.8 to include a security fix. | what vulnarability does domonic version less then 0.2.17 have | |
Having vulnarability CVE-2019-7537 Advisory: An issue was discovered in Donfig 0.3.0. There is a vulnerability in the collect_yaml method in config_obj.py. It can execute arbitrary Python commands, resulting in command execution. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does donfig version equal to 0.3.0 have ### Response: Having vulnarability CVE-2019-7537 Advisory: An issue was discovered in Donfig 0.3.0. There is a vulnerability in the collect_yaml method in config_obj.py. It can execute arbitrary Python commands, resulting in command execution. | what vulnarability does donfig version equal to 0.3.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Dosma 0.0.13 includes a security patch for the function 'init' in 'dosma/defaults.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ad12/DOSMA/commit/44457025faac9f09ac0bd26c93185adc612da7dc# | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dosma version less then 0.0.13 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Dosma 0.0.13 includes a security patch for the function 'init' in 'dosma/defaults.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ad12/DOSMA/commit/44457025faac9f09ac0bd26c93185adc612da7dc# | what vulnarability does dosma version less then 0.0.13 have | |
Having vulnarability CVE-2023-45803 Advisory: Doubt 4.5.1 updates its dependency 'urllib3' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does doubt version less then 4.5.1 have ### Response: Having vulnarability CVE-2023-45803 Advisory: Doubt 4.5.1 updates its dependency 'urllib3' to include a security fix. | what vulnarability does doubt version less then 4.5.1 have | |
Having vulnarability CVE-2022-23648 Advisory: Dovesnap 1.0.28 updates its dependency on the containerd library from version to address the security vulnerability identified as CVE-2022-23648. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dovesnap version less then 1.0.28 have ### Response: Having vulnarability CVE-2022-23648 Advisory: Dovesnap 1.0.28 updates its dependency on the containerd library from version to address the security vulnerability identified as CVE-2022-23648. | what vulnarability does dovesnap version less then 1.0.28 have | |
Having vulnarability CVE-2022-39280 Advisory: Dparse 0.5.2 includes a fix for CVE-2022-39280: Versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dparse version less then 0.5.2 have ### Response: Having vulnarability CVE-2022-39280 Advisory: Dparse 0.5.2 includes a fix for CVE-2022-39280: Versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed. | what vulnarability does dparse version less then 0.5.2 have | |
Having vulnarability CVE-2022-39280 Advisory: Dparse2 0.6.0 fixes a security issue related to Regex parsing.
https://github.com/pyupio/dparse/commit/3aecaac9a1bde349418810a320a7e5ec31ee276a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dparse2 version less then 0.6.0 have ### Response: Having vulnarability CVE-2022-39280 Advisory: Dparse2 0.6.0 fixes a security issue related to Regex parsing.
https://github.com/pyupio/dparse/commit/3aecaac9a1bde349418810a320a7e5ec31ee276a | what vulnarability does dparse2 version less then 0.6.0 have | |
Having vulnarability PVE-2021-25807 Advisory: Dpaste 2.8 fixes a XSS bug where HTML tags were not properly escaped with the simple "code" lexer.
https://github.com/bartTC/dpaste/commit/497e5f0c28d575b3e92ef65b70384314a9e330da | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dpaste version less then 2.8 have ### Response: Having vulnarability PVE-2021-25807 Advisory: Dpaste 2.8 fixes a XSS bug where HTML tags were not properly escaped with the simple "code" lexer.
https://github.com/bartTC/dpaste/commit/497e5f0c28d575b3e92ef65b70384314a9e330da | what vulnarability does dpaste version less then 2.8 have | |
Having vulnarability PVE-2021-35851 Advisory: dplib 1.4 fixes some security issues and added support for mapchange and namechange events | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dplib version less then 1.4 have ### Response: Having vulnarability PVE-2021-35851 Advisory: dplib 1.4 fixes some security issues and added support for mapchange and namechange events | what vulnarability does dplib version less then 1.4 have | |
Having vulnarability PVE-2022-45439 Advisory: Dpp-client is a typosquatting package. It installs a trojan in your system that leaks your data.
https://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dpp-client version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45439 Advisory: Dpp-client is a typosquatting package. It installs a trojan in your system that leaks your data.
https://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2 | what vulnarability does dpp-client version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45440 Advisory: Dpp-client1234 is a typosquatting package. It installs a trojan in your system that leaks your data.
https://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dpp-client1234 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45440 Advisory: Dpp-client1234 is a typosquatting package. It installs a trojan in your system that leaks your data.
https://medium.com/ochrona/3-new-malicious-packages-found-on-pypi-a6bbb14b5e2 | what vulnarability does dpp-client1234 version greather then 0,less then 0 have | |
Having vulnarability CVE-2021-33503 Advisory: Dpymenus 2.1.5 fixes a security issue in the 'urllib3' dependency for versions prior to 1.26.5. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dpymenus version less then 2.1.5 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Dpymenus 2.1.5 fixes a security issue in the 'urllib3' dependency for versions prior to 1.26.5. | what vulnarability does dpymenus version less then 2.1.5 have | |
Having vulnarability CVE-2022-34053 Advisory: The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dr-web-engine version less then equal to 0.2.6.0b0 have ### Response: Having vulnarability CVE-2022-34053 Advisory: The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does dr-web-engine version less then equal to 0.2.6.0b0 have | |
Having vulnarability CVE-2020-26137 Advisory: Draft-kings 2.0.3 updates its dependency 'urllib3' to v1.25.9 due to security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does draft-kings version less then 2.0.3 have ### Response: Having vulnarability CVE-2020-26137 Advisory: Draft-kings 2.0.3 updates its dependency 'urllib3' to v1.25.9 due to security issues. | what vulnarability does draft-kings version less then 2.0.3 have | |
Having vulnarability CVE-2022-40898 Advisory: Dragonfly-energy 1.22.50 updates its dependency 'wheel' to v0.38.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dragonfly-energy version less then 1.22.50 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Dragonfly-energy 1.22.50 updates its dependency 'wheel' to v0.38.1 to include a security fix. | what vulnarability does dragonfly-energy version less then 1.22.50 have | |
Having vulnarability CVE-2022-40898 Advisory: Dragonfly-uwg 0.5.294 updates its dependency 'wheel' to v0.38.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dragonfly-uwg version less then 0.5.294 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Dragonfly-uwg 0.5.294 updates its dependency 'wheel' to v0.38.1 to include a security fix. | what vulnarability does dragonfly-uwg version less then 0.5.294 have | |
Having vulnarability PVE-2021-39108 Advisory: Drf-api-logger 0.0.7 includes the warning that 'allowed hosts protection' is skipped when a RAW_URI value is used for DRF_API_LOGGER_PATH_TYPE. Consequently, an insecure URI may be returned. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-api-logger version less then equal to 0.0.7 have ### Response: Having vulnarability PVE-2021-39108 Advisory: Drf-api-logger 0.0.7 includes the warning that 'allowed hosts protection' is skipped when a RAW_URI value is used for DRF_API_LOGGER_PATH_TYPE. Consequently, an insecure URI may be returned. | what vulnarability does drf-api-logger version less then equal to 0.0.7 have | |
Having vulnarability PVE-2022-45334 Advisory: Drf-excel 0.4.1 includes proper escaping for possible malicious characters.
https://github.com/wharton/drf-excel/pull/34 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-excel version less then 0.4.1 have ### Response: Having vulnarability PVE-2022-45334 Advisory: Drf-excel 0.4.1 includes proper escaping for possible malicious characters.
https://github.com/wharton/drf-excel/pull/34 | what vulnarability does drf-excel version less then 0.4.1 have | |
Having vulnarability CVE-2019-16865 Advisory: Drf-extra-fields 2.0.0 updates Pillow to 6.2.1 to fix a security vulnerability.
https://github.com/Hipo/drf-extra-fields/commit/dd6d19b9201477e6d93074e898e6ed0f8f350cae | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-extra-fields version less then 2.0.0 have ### Response: Having vulnarability CVE-2019-16865 Advisory: Drf-extra-fields 2.0.0 updates Pillow to 6.2.1 to fix a security vulnerability.
https://github.com/Hipo/drf-extra-fields/commit/dd6d19b9201477e6d93074e898e6ed0f8f350cae | what vulnarability does drf-extra-fields version less then 2.0.0 have | |
Having vulnarability CVE-2020-10594 Advisory: An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained. See: CVE-2020-10594. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-jwt version greather then equal to 1.15.0,less then 1.15.1 have ### Response: Having vulnarability CVE-2020-10594 Advisory: An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained. See: CVE-2020-10594. | what vulnarability does drf-jwt version greather then equal to 1.15.0,less then 1.15.1 have | |
Having vulnarability PVE-2021-42526 Advisory: Drf-renderer-xlsx 0.4.1 includes proper escaping for possible malicious characters.
https://github.com/wharton/drf-renderer-xlsx/pull/34 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-renderer-xlsx version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-42526 Advisory: Drf-renderer-xlsx 0.4.1 includes proper escaping for possible malicious characters.
https://github.com/wharton/drf-renderer-xlsx/pull/34 | what vulnarability does drf-renderer-xlsx version less then 0.4.1 have | |
Having vulnarability PVE-2023-59167 Advisory: Drf-spectacular 0.9.4 includes a fix for a path traversal vulnerability.
https://github.com/tfranzel/drf-spectacular/commit/7e77bb3ea852f407f1780c8ae6b5b17a9c8b8520 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-spectacular version less then 0.9.4 have ### Response: Having vulnarability PVE-2023-59167 Advisory: Drf-spectacular 0.9.4 includes a fix for a path traversal vulnerability.
https://github.com/tfranzel/drf-spectacular/commit/7e77bb3ea852f407f1780c8ae6b5b17a9c8b8520 | what vulnarability does drf-spectacular version less then 0.9.4 have | |
Having vulnarability PVE-2021-34856 Advisory: drf-tracking before 1.3.0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drf-tracking version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-34856 Advisory: drf-tracking before 1.3.0 | what vulnarability does drf-tracking version less then 1.3.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Drt 1.2.1 includes a security patch for the function 'readConfig' in 'drt/configfile.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ccdale/drt/commit/2fffc617a9ddac040182d54a3227c87eb268b8ed | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drt version less then 1.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Drt 1.2.1 includes a security patch for the function 'readConfig' in 'drt/configfile.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ccdale/drt/commit/2fffc617a9ddac040182d54a3227c87eb268b8ed | what vulnarability does drt version less then 1.2.1 have | |
Having vulnarability CVE-2022-34055 Advisory: The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does drxhello version equal to 0.0.1 have ### Response: Having vulnarability CVE-2022-34055 Advisory: The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does drxhello version equal to 0.0.1 have | |
Having vulnarability PVE-2023-54740 Advisory: Dstack 0.2.2 runs all traffic through SSH tunnel. Before, when running a remote workflow that used ports (for example, to host dev environments or applications), 'dstack' made those ports on the remote machine public, allowing anyone within the configured VPC to access them via HTTP.
https://github.com/dstackai/dstack/pull/270 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dstack version less then 0.2.2 have ### Response: Having vulnarability PVE-2023-54740 Advisory: Dstack 0.2.2 runs all traffic through SSH tunnel. Before, when running a remote workflow that used ports (for example, to host dev environments or applications), 'dstack' made those ports on the remote machine public, allowing anyone within the configured VPC to access them via HTTP.
https://github.com/dstackai/dstack/pull/270 | what vulnarability does dstack version less then 0.2.2 have | |
Having vulnarability CVE-2023-46134 Advisory: D-Tale 3.7.0 includes a fix for CVE-2023-46134: Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.
https://github.com/man-group/dtale/security/advisories/GHSA-jq6c-r9xf-qxjm | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dtale version less then 3.7.0 have ### Response: Having vulnarability CVE-2023-46134 Advisory: D-Tale 3.7.0 includes a fix for CVE-2023-46134: Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.
https://github.com/man-group/dtale/security/advisories/GHSA-jq6c-r9xf-qxjm | what vulnarability does dtale version less then 3.7.0 have | |
Having vulnarability PVE-2022-51884 Advisory: Duckdb 0.6.0 fixes overflow when using substrings.
https://github.com/duckdb/duckdb/pull/5273 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does duckdb version less then 0.6.0 have ### Response: Having vulnarability PVE-2022-51884 Advisory: Duckdb 0.6.0 fixes overflow when using substrings.
https://github.com/duckdb/duckdb/pull/5273 | what vulnarability does duckdb version less then 0.6.0 have | |
Having vulnarability CVE-2015-0838 Advisory: Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dulwich version less then 0.9.920150320 have ### Response: Having vulnarability CVE-2015-0838 Advisory: Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file. | what vulnarability does dulwich version less then 0.9.920150320 have | |
Having vulnarability CVE-2007-5201 Advisory: The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does duplicity version less then 0.4.9 have ### Response: Having vulnarability CVE-2007-5201 Advisory: The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments. | what vulnarability does duplicity version less then 0.4.9 have | |
Having vulnarability CVE-2022-46175 Advisory: Duty-board 0.0.1a2 updates its NPM dependency 'json5' to v1.0.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does duty-board version less then 0.0.1a2 have ### Response: Having vulnarability CVE-2022-46175 Advisory: Duty-board 0.0.1a2 updates its NPM dependency 'json5' to v1.0.2 to include a security fix. | what vulnarability does duty-board version less then 0.0.1a2 have | |
Having vulnarability PVE-2023-53003 Advisory: Dynamicprompts 0.3.2 includes a fix for a path traversal vulnerability.
https://github.com/adieyal/dynamicprompts/commit/c97bef04b403dd6f77e414473c297f1abc787ea1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dynamicprompts version less then 0.3.2 have ### Response: Having vulnarability PVE-2023-53003 Advisory: Dynamicprompts 0.3.2 includes a fix for a path traversal vulnerability.
https://github.com/adieyal/dynamicprompts/commit/c97bef04b403dd6f77e414473c297f1abc787ea1 | what vulnarability does dynamicprompts version less then 0.3.2 have | |
Having vulnarability CVE-2019-15786 Advisory: ROBOTIS Dynamixel SDK through 3.7.11 has a buffer overflow via a large rxpacket. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dynamixel-sdk version less then equal to 3.7.11 have ### Response: Having vulnarability CVE-2019-15786 Advisory: ROBOTIS Dynamixel SDK through 3.7.11 has a buffer overflow via a large rxpacket. | what vulnarability does dynamixel-sdk version less then equal to 3.7.11 have | |
Having vulnarability PVE-2021-40192 Advisory: Dynamo-release 0.99 includes fixes for various vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dynamo-release version less then 0.99 have ### Response: Having vulnarability PVE-2021-40192 Advisory: Dynamo-release 0.99 includes fixes for various vulnerabilities. | what vulnarability does dynamo-release version less then 0.99 have | |
Having vulnarability PVE-2023-55189 Advisory: Dynamodb-encryption-sdk 1.3.0 includes a security fix: When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. Users who cannot upgrade to use the 'CachingMostRecentProvider' can call 'clear()' on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.
https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62
https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dynamodb-encryption-sdk version greather then equal to 0,less then 1.3.0 have ### Response: Having vulnarability PVE-2023-55189 Advisory: Dynamodb-encryption-sdk 1.3.0 includes a security fix: When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. Users who cannot upgrade to use the 'CachingMostRecentProvider' can call 'clear()' on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.
https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62
https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b | what vulnarability does dynamodb-encryption-sdk version greather then equal to 0,less then 1.3.0 have | |
Having vulnarability PVE-2021-33124 Advisory: easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easy-install version less then 0.7 have ### Response: Having vulnarability PVE-2021-33124 Advisory: easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product. | what vulnarability does easy-install version less then 0.7 have | |
Having vulnarability CVE-2020-26710 Advisory: easy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easy-parse version less then equal to 0.1.1 have ### Response: Having vulnarability CVE-2020-26710 Advisory: easy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | what vulnarability does easy-parse version less then equal to 0.1.1 have | |
Having vulnarability CVE-2020-26705 Advisory: The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input. See CVE-2020-26705.
https://github.com/darkfoxprime/python-easy_xml/issues/1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easy-xml version equal to 0.5.0 have ### Response: Having vulnarability CVE-2020-26705 Advisory: The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input. See CVE-2020-26705.
https://github.com/darkfoxprime/python-easy_xml/issues/1 | what vulnarability does easy-xml version equal to 0.5.0 have | |
Having vulnarability CVE-2020-5262 Advisory: Easybuild 4.1.2 includes a fix for CVE-2020-5262: GitHub personal access token leaking into temporary EasyBuild (debug) logs.
https://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easybuild version less then 4.1.2 have ### Response: Having vulnarability CVE-2020-5262 Advisory: Easybuild 4.1.2 includes a fix for CVE-2020-5262: GitHub personal access token leaking into temporary EasyBuild (debug) logs.
https://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm | what vulnarability does easybuild version less then 4.1.2 have | |
Having vulnarability CVE-2021-43527 Advisory: Easybuild-easyconfigs 4.5.1 includes a fix for CVE-2021-43527: A remote code execution flaw was found in the way NSS verifies certificates.
https://github.com/easybuilders/easybuild-easyconfigs/pull/14497 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easybuild-easyconfigs version less then 4.5.1 have ### Response: Having vulnarability CVE-2021-43527 Advisory: Easybuild-easyconfigs 4.5.1 includes a fix for CVE-2021-43527: A remote code execution flaw was found in the way NSS verifies certificates.
https://github.com/easybuilders/easybuild-easyconfigs/pull/14497 | what vulnarability does easybuild-easyconfigs version less then 4.5.1 have | |
Having vulnarability PVE-2023-52912 Advisory: Easycordey is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easycordey version greather then 0 have ### Response: Having vulnarability PVE-2023-52912 Advisory: Easycordey is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does easycordey version greather then 0 have | |
Having vulnarability PVE-2023-52913 Advisory: Easycordeyy is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easycordeyy version greather then 0 have ### Response: Having vulnarability PVE-2023-52913 Advisory: Easycordeyy is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does easycordeyy version greather then 0 have | |
Having vulnarability PVE-2022-45443 Advisory: Easyfuncsys is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.
https://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easyfuncsys version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45443 Advisory: Easyfuncsys is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.
https://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository | what vulnarability does easyfuncsys version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45414 Advisory: Easyinstall is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easyinstall version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45414 Advisory: Easyinstall is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does easyinstall version greather then 0,less then 0 have | |
Having vulnarability PVE-2023-52935 Advisory: Easytimestamp is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does easytimestamp version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52935 Advisory: Easytimestamp is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | what vulnarability does easytimestamp version greather then equal to 0 have | |
Having vulnarability CVE-2021-23437 Advisory: Ebookmaker updates its dependency 'pillow' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ebookmaker version less then 0.11.14 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Ebookmaker updates its dependency 'pillow' to include a security fix. | what vulnarability does ebookmaker version less then 0.11.14 have | |
Having vulnarability PVE-2021-38053 Advisory: Ec2-metadata 2.2.0 moves to use Instance Metadata Service version 2 to prevent SSRF attacks.
https://github.com/adamchainz/ec2-metadata/issues/150
https://github.com/adamchainz/ec2-metadata/pull/166 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ec2-metadata version less then 2.2.0 have ### Response: Having vulnarability PVE-2021-38053 Advisory: Ec2-metadata 2.2.0 moves to use Instance Metadata Service version 2 to prevent SSRF attacks.
https://github.com/adamchainz/ec2-metadata/issues/150
https://github.com/adamchainz/ec2-metadata/pull/166 | what vulnarability does ec2-metadata version less then 2.2.0 have | |
Having vulnarability CVE-2019-14859 Advisory: A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions. See: CVE-2019-14859. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ecdsa version less then 0.13.3 have ### Response: Having vulnarability CVE-2019-14859 Advisory: A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions. See: CVE-2019-14859. | what vulnarability does ecdsa version less then 0.13.3 have | |
Having vulnarability CVE-2023-32681 Advisory: Ecowitt2mqtt 2023.06.0 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/bachya/ecowitt2mqtt/pull/596/files | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ecowitt2mqtt version less then 2023.06.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Ecowitt2mqtt 2023.06.0 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/bachya/ecowitt2mqtt/pull/596/files | what vulnarability does ecowitt2mqtt version less then 2023.06.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Edapy 0.3.0 includes a security patch for the function '_read_yaml' in 'edapy/csv/init.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/MartinThoma/edapy/commit/47b958781a702e176ea72fe59ab8596ad93aabdc#diff-150063df356bdd6b5d718194a9ccb7750d86f8608959d31cef59012a8471709f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edapy version less then 0.3.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Edapy 0.3.0 includes a security patch for the function '_read_yaml' in 'edapy/csv/init.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/MartinThoma/edapy/commit/47b958781a702e176ea72fe59ab8596ad93aabdc#diff-150063df356bdd6b5d718194a9ccb7750d86f8608959d31cef59012a8471709f | what vulnarability does edapy version less then 0.3.0 have | |
Having vulnarability PVE-2021-41918 Advisory: Edrn-sync version 1.0.5 addresses a vulnerability created by weak default passwords sync'd from the DMCC users list. It generates more secure random passwords for new users and also provides a utility for detecting old weak passwords and changing them to something randomized. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edrn-sync version less then 1.0.5 have ### Response: Having vulnarability PVE-2021-41918 Advisory: Edrn-sync version 1.0.5 addresses a vulnerability created by weak default passwords sync'd from the DMCC users list. It generates more secure random passwords for new users and also provides a utility for detecting old weak passwords and changing them to something randomized. | what vulnarability does edrn-sync version less then 1.0.5 have | |
Having vulnarability CVE-2011-0720 Advisory: Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edrnsite-policy version less then 1.0.5 have ### Response: Having vulnarability CVE-2011-0720 Advisory: Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors. | what vulnarability does edrnsite-policy version less then 1.0.5 have | |
Having vulnarability CVE-2024-3651 Advisory: Edumfa version 2.0.2 has updated its dependency on the idna library to version 3.7 in response to the security vulnerability detailed in CVE-2024-3651. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edumfa version less then 2.0.2 have ### Response: Having vulnarability CVE-2024-3651 Advisory: Edumfa version 2.0.2 has updated its dependency on the idna library to version 3.7 in response to the security vulnerability detailed in CVE-2024-3651. | what vulnarability does edumfa version less then 2.0.2 have | |
Having vulnarability PVE-2024-64800 Advisory: Edx-celeryutils updates its Jinja2 dependency from version 2.9.6 to 2.10.1 to address the security vulnerability CVE-2019-10906.
https://github.com/openedx/edx-celeryutils/commit/d38e5f5866917346a8a503b42ad1129f55ee3b4d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edx-celeryutils version less then 0.3.0 have ### Response: Having vulnarability PVE-2024-64800 Advisory: Edx-celeryutils updates its Jinja2 dependency from version 2.9.6 to 2.10.1 to address the security vulnerability CVE-2019-10906.
https://github.com/openedx/edx-celeryutils/commit/d38e5f5866917346a8a503b42ad1129f55ee3b4d | what vulnarability does edx-celeryutils version less then 0.3.0 have | |
Having vulnarability CVE-2019-10906 Advisory: Edx-django-utils 1.0.5 updates its Jinja2 dependency from version 2.10 to 2.10.1 in response to the security vulnerability CVE-2019-10906.
https://github.com/openedx/edx-django-utils/commit/57371627ad50ccfff4e55a3af9f85c9c8f30aafd | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edx-django-utils version less then 1.0.5 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Edx-django-utils 1.0.5 updates its Jinja2 dependency from version 2.10 to 2.10.1 in response to the security vulnerability CVE-2019-10906.
https://github.com/openedx/edx-django-utils/commit/57371627ad50ccfff4e55a3af9f85c9c8f30aafd | what vulnarability does edx-django-utils version less then 1.0.5 have | |
Having vulnarability CVE-2017-18342 Advisory: Edx-ecommerce-worker 0.8.3 updates its dependency 'pyyaml' to v5.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does edx-ecommerce-worker version less then 0.8.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Edx-ecommerce-worker 0.8.3 updates its dependency 'pyyaml' to v5.1 to include a security fix. | what vulnarability does edx-ecommerce-worker version less then 0.8.3 have | |
Having vulnarability PVE-2023-62343 Advisory: Eedl 0.2023.11.13 includes a fix for CWE-377 (Insecure Temporary File) in vrt_path.
https://github.com/water3d/eedl/pull/41/commits/da77bdf43441ae79f35cb5d7891937015958833a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eedl version less then 0.2023.11.13 have ### Response: Having vulnarability PVE-2023-62343 Advisory: Eedl 0.2023.11.13 includes a fix for CWE-377 (Insecure Temporary File) in vrt_path.
https://github.com/water3d/eedl/pull/41/commits/da77bdf43441ae79f35cb5d7891937015958833a | what vulnarability does eedl version less then 0.2023.11.13 have | |
Having vulnarability PVE-2021-40568 Advisory: Egon 0.4.1 improves security and provides improved performance. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does egon version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-40568 Advisory: Egon 0.4.1 improves security and provides improved performance. | what vulnarability does egon version less then 0.4.1 have | |
Having vulnarability CVE-2017-18342 Advisory: Eh 1.3.0 and 0.2.8 update its dependency 'pyyaml' to a version >=4.2b1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eh version less then 0.2.8,greather then equal to 1.0.0,less then 1.3.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Eh 1.3.0 and 0.2.8 update its dependency 'pyyaml' to a version >=4.2b1 to include a security fix. | what vulnarability does eh version less then 0.2.8,greather then equal to 1.0.0,less then 1.3.0 have | |
Having vulnarability PVE-2021-42963 Advisory: Ekuiper 1.1.2 runs build process/container as 'kuiper' user to avoid security risks.
https://github.com/lf-edge/ekuiper/commit/1327eb69d0173c8d4a2070a835be6894f5a90b2b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ekuiper version less then 1.1.2 have ### Response: Having vulnarability PVE-2021-42963 Advisory: Ekuiper 1.1.2 runs build process/container as 'kuiper' user to avoid security risks.
https://github.com/lf-edge/ekuiper/commit/1327eb69d0173c8d4a2070a835be6894f5a90b2b | what vulnarability does ekuiper version less then 1.1.2 have | |
Having vulnarability CVE-2019-7617 Advisory: When the Elastic APM agent for Python versions before 5.1.0 is run as a CGI script, there is a variable name clash flaw if a remote attacker can control the proxy header. This could result in an attacker redirecting collected APM data to a proxy of their choosing. See: CVE-2019-7617. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elastic-apm version less then 5.1.0 have ### Response: Having vulnarability CVE-2019-7617 Advisory: When the Elastic APM agent for Python versions before 5.1.0 is run as a CGI script, there is a variable name clash flaw if a remote attacker can control the proxy header. This could result in an attacker redirecting collected APM data to a proxy of their choosing. See: CVE-2019-7617. | what vulnarability does elastic-apm version less then 5.1.0 have | |
Having vulnarability CVE-2018-6353 Advisory: The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does electrum version less then 2.9.4,greather then equal to 3.0,less then 3.0.5 have ### Response: Having vulnarability CVE-2018-6353 Advisory: The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022. | what vulnarability does electrum version less then 2.9.4,greather then equal to 3.0,less then 3.0.5 have | |
Having vulnarability CVE-2018-6353 Advisory: The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does electrum-python version less then 2.9.4,greather then equal to 3.0,less then 3.0.5 have ### Response: Having vulnarability CVE-2018-6353 Advisory: The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022. | what vulnarability does electrum-python version less then 2.9.4,greather then equal to 3.0,less then 3.0.5 have | |
Having vulnarability PVE-2021-42043 Advisory: Electrumsv-secp256k1 version 8.0.0 makes build system support new GitHub & PyPI security requirements. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does electrumsv-secp256k1 version less then 8.0.0 have ### Response: Having vulnarability PVE-2021-42043 Advisory: Electrumsv-secp256k1 version 8.0.0 makes build system support new GitHub & PyPI security requirements. | what vulnarability does electrumsv-secp256k1 version less then 8.0.0 have | |
Having vulnarability PVE-2021-36324 Advisory: Electrumx before 1.4.1 did not use PROTOCOL_MIN to 1.0. Earlier protocol versions are used by 2.9.x clients of Electrum and Electron Cash. They all have a local daemon vulnerability.
https://github.com/kyuupichan/electrumx/commit/fec2ee1d8f2590a2ef5c970326e378415b4f6d6e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does electrumx version less then 1.4.1 have ### Response: Having vulnarability PVE-2021-36324 Advisory: Electrumx before 1.4.1 did not use PROTOCOL_MIN to 1.0. Earlier protocol versions are used by 2.9.x clients of Electrum and Electron Cash. They all have a local daemon vulnerability.
https://github.com/kyuupichan/electrumx/commit/fec2ee1d8f2590a2ef5c970326e378415b4f6d6e | what vulnarability does electrumx version less then 1.4.1 have | |
Having vulnarability PVE-2023-61368 Advisory: Elemental-cms 1.1.39 adds secure flag to session cookie.
https://github.com/paranoid-software/elemental-cms/pull/78 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elemental-cms version less then 1.1.39 have ### Response: Having vulnarability PVE-2023-61368 Advisory: Elemental-cms 1.1.39 adds secure flag to session cookie.
https://github.com/paranoid-software/elemental-cms/pull/78 | what vulnarability does elemental-cms version less then 1.1.39 have | |
Having vulnarability CVE-2012-2146 Advisory: Elixir as on PyPI, is vulnerable to CVE-2012-2146: Elixir uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
https://bugzilla.redhat.com/show_bug.cgi?id=810013 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elixir version less then equal to 0.8.0 have ### Response: Having vulnarability CVE-2012-2146 Advisory: Elixir as on PyPI, is vulnerable to CVE-2012-2146: Elixir uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
https://bugzilla.redhat.com/show_bug.cgi?id=810013 | what vulnarability does elixir version less then equal to 0.8.0 have | |
Having vulnarability PVE-2021-42011 Advisory: Elkm1 v1.0.0 adds support for TLS 1.2 secure connection mode. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elkm1 version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-42011 Advisory: Elkm1 v1.0.0 adds support for TLS 1.2 secure connection mode. | what vulnarability does elkm1 version less then 1.0.0 have | |
Having vulnarability PVE-2021-40313 Advisory: Elyra 2.2.3 allows secure connections to S3 object storage. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does elyra version less then 2.2.3 have ### Response: Having vulnarability PVE-2021-40313 Advisory: Elyra 2.2.3 allows secure connections to S3 object storage. | what vulnarability does elyra version less then 2.2.3 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.