output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability PVE-2022-50873 Advisory: Ema-workbench 2.2.0 replaces all HTTP links with secure HTTPS URLs. https://github.com/quaquel/EMAworkbench/pull/134
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ema-workbench version less then 2.2.0 have ### Response: Having vulnarability PVE-2022-50873 Advisory: Ema-workbench 2.2.0 replaces all HTTP links with secure HTTPS URLs. https://github.com/quaquel/EMAworkbench/pull/134
what vulnarability does ema-workbench version less then 2.2.0 have
Having vulnarability PVE-2024-99795 Advisory: Emailproxy vesions before 2023.11.19 are susceptible to unverified password changes because of improper validation of expired authorization tokens. An attacker can exploit this by utilizing valid account addresses and precise timing to access an account without validating the account password. This vulnerability specifically impacts instances using a proxy with the CCG flow and is especially critical in publicly accessible environments, such as those available over the internet or a network. https://github.com/simonrob/email-oauth2-proxy/pull/60
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emailproxy version greather then equal to 0,less then 2023.11.19 have ### Response: Having vulnarability PVE-2024-99795 Advisory: Emailproxy vesions before 2023.11.19 are susceptible to unverified password changes because of improper validation of expired authorization tokens. An attacker can exploit this by utilizing valid account addresses and precise timing to access an account without validating the account password. This vulnerability specifically impacts instances using a proxy with the CCG flow and is especially critical in publicly accessible environments, such as those available over the internet or a network. https://github.com/simonrob/email-oauth2-proxy/pull/60
what vulnarability does emailproxy version greather then equal to 0,less then 2023.11.19 have
Having vulnarability CVE-2024-23731 Advisory: The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code, related to the openapi.py yaml.load function argument.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embedchain version less then 0.1.57 have ### Response: Having vulnarability CVE-2024-23731 Advisory: The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code, related to the openapi.py yaml.load function argument.
what vulnarability does embedchain version less then 0.1.57 have
Having vulnarability PVE-2022-52255 Advisory: Embedded-topic-model 1.2.0 updates its dependency 'skicit-learn' to versions '>=1.3.*' to include a security fix. https://github.com/lffloyd/embedded-topic-model/commit/331fc0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embedded-topic-model version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-52255 Advisory: Embedded-topic-model 1.2.0 updates its dependency 'skicit-learn' to versions '>=1.3.*' to include a security fix. https://github.com/lffloyd/embedded-topic-model/commit/331fc0
what vulnarability does embedded-topic-model version less then 1.2.0 have
Having vulnarability CVE-2020-8492 Advisory: Embody-codec version 1.0.28 raises its Python version requirement from at least 3.7 but less than 4.0, to now requiring a minimum of 3.9 due to security concerns outlined in CVE-2020-8492. https://github.com/aidee-health/embody-codec/pull/354/commits/a82092116340a5ee3d7d6fd70d11fb5bd4c2746d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embody-codec version less then 1.0.28 have ### Response: Having vulnarability CVE-2020-8492 Advisory: Embody-codec version 1.0.28 raises its Python version requirement from at least 3.7 but less than 4.0, to now requiring a minimum of 3.9 due to security concerns outlined in CVE-2020-8492. https://github.com/aidee-health/embody-codec/pull/354/commits/a82092116340a5ee3d7d6fd70d11fb5bd4c2746d
what vulnarability does embody-codec version less then 1.0.28 have
Having vulnarability CVE-2010-2053 Advisory: emesenelib/ProfileManager.py in emesene before 1.6.2 allows local users to overwrite arbitrary files via a symlink attack on the emsnpic temporary file.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emesene version less then 1.6.2 have ### Response: Having vulnarability CVE-2010-2053 Advisory: emesenelib/ProfileManager.py in emesene before 1.6.2 allows local users to overwrite arbitrary files via a symlink attack on the emsnpic temporary file.
what vulnarability does emesene version less then 1.6.2 have
Having vulnarability PVE-2021-40547 Advisory: Emrt.necd.content 2.0.15 fixes a possible JavaScript injection.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emrt-necd-content version less then 2.0.15 have ### Response: Having vulnarability PVE-2021-40547 Advisory: Emrt.necd.content 2.0.15 fixes a possible JavaScript injection.
what vulnarability does emrt-necd-content version less then 2.0.15 have
Having vulnarability CVE-2020-36242 Advisory: Encapsia-api 0.2.9 updates its dependency 'cryptography' to v3.4.6 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encapsia-api version less then 0.2.9 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Encapsia-api 0.2.9 updates its dependency 'cryptography' to v3.4.6 to include a security fix.
what vulnarability does encapsia-api version less then 0.2.9 have
Having vulnarability CVE-2007-4559 Advisory: Encapsia-cli 0.5.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encapsia-cli version less then 0.5.2 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Encapsia-cli 0.5.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
what vulnarability does encapsia-cli version less then 0.5.2 have
Having vulnarability PVE-2023-59692 Advisory: Encord-active 0.1.63 includes a fix for a Race Condition vulnerability. https://github.com/encord-team/encord-active/pull/508
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encord-active version less then 0.1.63 have ### Response: Having vulnarability PVE-2023-59692 Advisory: Encord-active 0.1.63 includes a fix for a Race Condition vulnerability. https://github.com/encord-team/encord-active/pull/508
what vulnarability does encord-active version less then 0.1.63 have
Having vulnarability CVE-2023-32681 Advisory: Energyquantified 0.11 updates its dependency 'requests' to v2.31 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does energyquantified version less then 0.11 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Energyquantified 0.11 updates its dependency 'requests' to v2.31 to include a security fix.
what vulnarability does energyquantified version less then 0.11 have
Having vulnarability CVE-2021-39182 Advisory: Enrocrypt 1.1.4 includes a fix for CVE-2021-39182: Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. As a workaround, users can remove the 'MD5' hashing function from the file 'hashing.py'. https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does enrocrypt version less then 1.1.4 have ### Response: Having vulnarability CVE-2021-39182 Advisory: Enrocrypt 1.1.4 includes a fix for CVE-2021-39182: Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. As a workaround, users can remove the 'MD5' hashing function from the file 'hashing.py'. https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce
what vulnarability does enrocrypt version less then 1.1.4 have
Having vulnarability CVE-2017-18342 Advisory: Entente 0.11.0 includes a security patch for the function 'test_composite_landmarks_cli' in 'entente/test_cli.py'. it used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/lace/entente/commit/bbbf1985cbb38f749e7dd998bbf42b72c4d1d99c#diff-52de9aa5fb74fe3cdb1d128e9e6b246c69003cf86a181c79f22ec2510dc19b3e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does entente version less then 0.11.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Entente 0.11.0 includes a security patch for the function 'test_composite_landmarks_cli' in 'entente/test_cli.py'. it used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/lace/entente/commit/bbbf1985cbb38f749e7dd998bbf42b72c4d1d99c#diff-52de9aa5fb74fe3cdb1d128e9e6b246c69003cf86a181c79f22ec2510dc19b3e
what vulnarability does entente version less then 0.11.0 have
Having vulnarability CVE-2024-28219 Advisory: Entropy-pooling version 1.0.4 updates its Pillow dependency from version 10.2.0 to 10.3.0 in response to the security concerns identified in CVE-2024-28219.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does entropy-pooling version less then 1.0.4 have ### Response: Having vulnarability CVE-2024-28219 Advisory: Entropy-pooling version 1.0.4 updates its Pillow dependency from version 10.2.0 to 10.3.0 in response to the security concerns identified in CVE-2024-28219.
what vulnarability does entropy-pooling version less then 1.0.4 have
Having vulnarability CVE-2023-49568 Advisory: Envd 0.3.45 updates its Go dependency 'go-git' to v5.11.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envd version less then 0.3.45 have ### Response: Having vulnarability CVE-2023-49568 Advisory: Envd 0.3.45 updates its Go dependency 'go-git' to v5.11.0 to include a security fix.
what vulnarability does envd version less then 0.3.45 have
Having vulnarability PVE-2022-48468 Advisory: Envelope 2.0.0 removes an insecure PRNG. https://github.com/CZ-NIC/envelope/commit/766eeb7eb20468b39c79ef8eba705fe171aacbbc
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envelope version less then 2.0.0 have ### Response: Having vulnarability PVE-2022-48468 Advisory: Envelope 2.0.0 removes an insecure PRNG. https://github.com/CZ-NIC/envelope/commit/766eeb7eb20468b39c79ef8eba705fe171aacbbc
what vulnarability does envelope version less then 2.0.0 have
Having vulnarability CVE-2021-23980 Advisory: Envyconfig 1.1.4 updates its dependency 'bleach' to v3.3.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envyconfig version less then 1.1.4 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Envyconfig 1.1.4 updates its dependency 'bleach' to v3.3.0 to include a security fix.
what vulnarability does envyconfig version less then 1.1.4 have
Having vulnarability CVE-2021-42343 Advisory: Eoreader 0.9.0 updates its dependency 'dask' to v2021.10.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eoreader version less then 0.9.0 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Eoreader 0.9.0 updates its dependency 'dask' to v2021.10.0 to include a security fix.
what vulnarability does eoreader version less then 0.9.0 have
Having vulnarability CVE-2021-44832 Advisory: Epam.indigo 1.6.1 updates version of 'Elasticsearch' to v7.16.1 to remove risk of log4j issue. https://github.com/epam/Indigo/pull/553
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epam-indigo version less then 1.6.1 have ### Response: Having vulnarability CVE-2021-44832 Advisory: Epam.indigo 1.6.1 updates version of 'Elasticsearch' to v7.16.1 to remove risk of log4j issue. https://github.com/epam/Indigo/pull/553
what vulnarability does epam-indigo version less then 1.6.1 have
Having vulnarability PVE-2023-60929 Advisory: Ephios 0.15.12 includes a fix for a privilege escalation vulnerability. https://github.com/ephios-dev/ephios/pull/1042
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ephios version less then 0.15.12 have ### Response: Having vulnarability PVE-2023-60929 Advisory: Ephios 0.15.12 includes a fix for a privilege escalation vulnerability. https://github.com/ephios-dev/ephios/pull/1042
what vulnarability does ephios version less then 0.15.12 have
Having vulnarability PVE-2021-39030 Advisory: Epsagon 1.5.0 updates several dependencies in package.json due to vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epsagon version less then 1.5.0 have ### Response: Having vulnarability PVE-2021-39030 Advisory: Epsagon 1.5.0 updates several dependencies in package.json due to vulnerabilities.
what vulnarability does epsagon version less then 1.5.0 have
Having vulnarability PVE-2021-40189 Advisory: Epyk 1.5.6 fixes an external JavaScript text injection issue. https://github.com/epykure/epyk-ui/commit/8cafc5a9b4c1c487f52b98d875657551902c2e40
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epyk version less then 1.5.6 have ### Response: Having vulnarability PVE-2021-40189 Advisory: Epyk 1.5.6 fixes an external JavaScript text injection issue. https://github.com/epykure/epyk-ui/commit/8cafc5a9b4c1c487f52b98d875657551902c2e40
what vulnarability does epyk version less then 1.5.6 have
Having vulnarability PVE-2021-25812 Advisory: Errbot 1.3.0 fixes a security issue: the plugin directory permissions were too lax. https://github.com/errbotio/errbot/commit/3bf9abe82eb188dd8d3a992280550a903c5d141c
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does errbot version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-25812 Advisory: Errbot 1.3.0 fixes a security issue: the plugin directory permissions were too lax. https://github.com/errbotio/errbot/commit/3bf9abe82eb188dd8d3a992280550a903c5d141c
what vulnarability does errbot version less then 1.3.0 have
Having vulnarability PVE-2023-59960 Advisory: Ert 4.5.6 includes a fix for a Race Condition vulnerability. https://github.com/equinor/ert/pull/5358
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ert version less then 4.5.6 have ### Response: Having vulnarability PVE-2023-59960 Advisory: Ert 4.5.6 includes a fix for a Race Condition vulnerability. https://github.com/equinor/ert/pull/5358
what vulnarability does ert version less then 4.5.6 have
Having vulnarability PVE-2021-40562 Advisory: Ert-storage 0.1.8 enables token-based security for the 'ert-storage'.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ert-storage version less then 0.1.8 have ### Response: Having vulnarability PVE-2021-40562 Advisory: Ert-storage 0.1.8 enables token-based security for the 'ert-storage'.
what vulnarability does ert-storage version less then 0.1.8 have
Having vulnarability PVE-2023-58713 Advisory: Esmerald 1.2.3 updates its dependency 'Starlette' to versions '>=0.27.0' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esmerald version less then 1.2.3 have ### Response: Having vulnarability PVE-2023-58713 Advisory: Esmerald 1.2.3 updates its dependency 'Starlette' to versions '>=0.27.0' to include a security fix.
what vulnarability does esmerald version less then 1.2.3 have
Having vulnarability PVE-2021-38581 Advisory: Espeakng 1.49.0 fixes many security issues. No details were given.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does espeakng version less then 1.49.0 have ### Response: Having vulnarability PVE-2021-38581 Advisory: Espeakng 1.49.0 fixes many security issues. No details were given.
what vulnarability does espeakng version less then 1.49.0 have
Having vulnarability PVE-2021-38623 Advisory: Esphome 1.15.0b1 includes a fix for an http_request ESP32 insecure requests that may return the address of local variable. See: <https://github.com/esphome/issues/issues/1175>.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esphome version less then 1.15.0b1 have ### Response: Having vulnarability PVE-2021-38623 Advisory: Esphome 1.15.0b1 includes a fix for an http_request ESP32 insecure requests that may return the address of local variable. See: <https://github.com/esphome/issues/issues/1175>.
what vulnarability does esphome version less then 1.15.0b1 have
Having vulnarability CVE-2023-46894 Advisory: Esptool is affected by CVE-2023-46894: An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm. https://github.com/espressif/esptool/issues/926
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esptool version greather then equal to 0 have ### Response: Having vulnarability CVE-2023-46894 Advisory: Esptool is affected by CVE-2023-46894: An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm. https://github.com/espressif/esptool/issues/926
what vulnarability does esptool version greather then equal to 0 have
Having vulnarability PVE-2023-61963 Advisory: Esrapgra 0.1.1 escapes strings using 'shlex' to prevent shell-escape attacks. https://github.com/audy/esrapgra/commit/6ac83acd895d864bfbcaa1f26020615c9fa9610f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esrapgra version less then 0.1.1 have ### Response: Having vulnarability PVE-2023-61963 Advisory: Esrapgra 0.1.1 escapes strings using 'shlex' to prevent shell-escape attacks. https://github.com/audy/esrapgra/commit/6ac83acd895d864bfbcaa1f26020615c9fa9610f
what vulnarability does esrapgra version less then 0.1.1 have
Having vulnarability PVE-2024-99787 Advisory: Eth-abi versions above 4.2.0 are susceptible to a Denial of Service (DoS) attack when attempting to parse zero-sized types (ZST). Such parsing, despite being compliant with the ABI specifications, can result in excessive memory allocation if malicious ZST tuples are processed. A potential mitigation strategy involves prohibiting the parsing of ZST to prevent this vulnerability from being exploited. https://github.com/ethereum/eth-abi/commit/7db682955568b01faf0858ac14bc73c624e5dd10
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-abi version greather then equal to 0,less then 4.2.0 have ### Response: Having vulnarability PVE-2024-99787 Advisory: Eth-abi versions above 4.2.0 are susceptible to a Denial of Service (DoS) attack when attempting to parse zero-sized types (ZST). Such parsing, despite being compliant with the ABI specifications, can result in excessive memory allocation if malicious ZST tuples are processed. A potential mitigation strategy involves prohibiting the parsing of ZST to prevent this vulnerability from being exploited. https://github.com/ethereum/eth-abi/commit/7db682955568b01faf0858ac14bc73c624e5dd10
what vulnarability does eth-abi version greather then equal to 0,less then 4.2.0 have
Having vulnarability CVE-2022-1930 Advisory: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-account version greather then equal to 0,less then 0.5.9 have ### Response: Having vulnarability CVE-2022-1930 Advisory: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method
what vulnarability does eth-account version greather then equal to 0,less then 0.5.9 have
Having vulnarability CVE-2018-15560 Advisory: Eth-hash 0.2.0 updates its dependency 'pycryptodome' minimum requirement to v3.6.6 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-hash version less then 0.2.0 have ### Response: Having vulnarability CVE-2018-15560 Advisory: Eth-hash 0.2.0 updates its dependency 'pycryptodome' minimum requirement to v3.6.6 to include a security fix.
what vulnarability does eth-hash version less then 0.2.0 have
Having vulnarability PVE-2022-44610 Advisory: Eth-keyfile 0.6.0 mitigates a timing attack vector affecting the hmac comparation when decoding keyfiles. https://github.com/ethereum/eth-keyfile/issues/12
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-keyfile version less then 0.6.0 have ### Response: Having vulnarability PVE-2022-44610 Advisory: Eth-keyfile 0.6.0 mitigates a timing attack vector affecting the hmac comparation when decoding keyfiles. https://github.com/ethereum/eth-keyfile/issues/12
what vulnarability does eth-keyfile version less then 0.6.0 have
Having vulnarability CVE-2018-1000805 Advisory: Etherweaver 0.3.0 updates its dependency 'paramiko' to v2.4.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etherweaver version less then 0.3.0 have ### Response: Having vulnarability CVE-2018-1000805 Advisory: Etherweaver 0.3.0 updates its dependency 'paramiko' to v2.4.2 to include a security fix.
what vulnarability does etherweaver version less then 0.3.0 have
Having vulnarability PVE-2021-37042 Advisory: Ethically 0.0.3 fixes security issues with dependencies. This package is no longer in PyPI. No more information was found.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethically version less then 0.0.3 have ### Response: Having vulnarability PVE-2021-37042 Advisory: Ethically 0.0.3 fixes security issues with dependencies. This package is no longer in PyPI. No more information was found.
what vulnarability does ethically version less then 0.0.3 have
Having vulnarability PVE-2021-37387 Advisory: Ethsnarks 0.18.10.1 fixes security bugs in MiMC-p/p and Miximus.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethsnarks version less then 0.18.10.1 have ### Response: Having vulnarability PVE-2021-37387 Advisory: Ethsnarks 0.18.10.1 fixes security bugs in MiMC-p/p and Miximus.
what vulnarability does ethsnarks version less then 0.18.10.1 have
Having vulnarability PVE-2024-63353 Advisory: Ethyca-fides 2.1.0 addresses a race condition vulnerability that occurred during the initialization of the FidesConfig class. This vulnerability could lead to unexpected behavior or incorrect security configurations if two threads attempted to modify the security attribute simultaneously. The fix ensures that the security attribute is safely initialized as an SecuritySettings object and that the test_mode attribute is correctly set using the get_test_mode() function. https://github.com/ethyca/fides/pull/1718/commits/22df5c9917a8a3b43b40dfcb1a4c246f74e6d36c
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethyca-fides version less then 2.1.0 have ### Response: Having vulnarability PVE-2024-63353 Advisory: Ethyca-fides 2.1.0 addresses a race condition vulnerability that occurred during the initialization of the FidesConfig class. This vulnerability could lead to unexpected behavior or incorrect security configurations if two threads attempted to modify the security attribute simultaneously. The fix ensures that the security attribute is safely initialized as an SecuritySettings object and that the test_mode attribute is correctly set using the get_test_mode() function. https://github.com/ethyca/fides/pull/1718/commits/22df5c9917a8a3b43b40dfcb1a4c246f74e6d36c
what vulnarability does ethyca-fides version less then 2.1.0 have
Having vulnarability PVE-2022-51664 Advisory: Etlhelper 0.14.0 performs validation on table and column names that are passed to the load function to prevent malicious code being inserted into the auto-generated SQL. https://github.com/BritishGeologicalSurvey/etlhelper/pull/134
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etlhelper version less then 0.14.0 have ### Response: Having vulnarability PVE-2022-51664 Advisory: Etlhelper 0.14.0 performs validation on table and column names that are passed to the load function to prevent malicious code being inserted into the auto-generated SQL. https://github.com/BritishGeologicalSurvey/etlhelper/pull/134
what vulnarability does etlhelper version less then 0.14.0 have
Having vulnarability CVE-2019-7164 Advisory: Etlstat 0.6.1 updates SQLAlchemy to versions >=1.3.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etlstat version less then 0.6.1 have ### Response: Having vulnarability CVE-2019-7164 Advisory: Etlstat 0.6.1 updates SQLAlchemy to versions >=1.3.0 to include security fixes.
what vulnarability does etlstat version less then 0.6.1 have
Having vulnarability PVE-2021-37459 Advisory: Euphorie 11.1.2 tightens the security on several client views.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does euphorie version less then 11.1.2 have ### Response: Having vulnarability PVE-2021-37459 Advisory: Euphorie 11.1.2 tightens the security on several client views.
what vulnarability does euphorie version less then 11.1.2 have
Having vulnarability CVE-2021-33430 Advisory: Evalml version 0.42.0 updates its minimum required version of numpy to >=1.21.0 from the previously specified >=1.20.0. This change addresses the security issue CVE-2021-33430. https://github.com/alteryx/evalml/pull/3207/commits/2e3daedb4d800952d5f8c7488450df870ed09a48
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evalml version less then 0.42.0 have ### Response: Having vulnarability CVE-2021-33430 Advisory: Evalml version 0.42.0 updates its minimum required version of numpy to >=1.21.0 from the previously specified >=1.20.0. This change addresses the security issue CVE-2021-33430. https://github.com/alteryx/evalml/pull/3207/commits/2e3daedb4d800952d5f8c7488450df870ed09a48
what vulnarability does evalml version less then 0.42.0 have
Having vulnarability PVE-2021-41325 Advisory: Evalne version 0.3.3 includes a security patch for the function '_evaluate_ee_e2e_cmd' in 'evalne/evaluation/evaluator.py'. It contained an OS injection vulnerability: subprocess call with shell=True. https://github.com/Dru-Mara/EvalNE/commit/7041dbb701eb622f6ce38b4ab529b14d86656a26#diff-2279cc18e0f5d8bb6d8fc4820ab5190a43df3a2b6135d860204bcb3b2bc993e0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evalne version less then 0.3.3 have ### Response: Having vulnarability PVE-2021-41325 Advisory: Evalne version 0.3.3 includes a security patch for the function '_evaluate_ee_e2e_cmd' in 'evalne/evaluation/evaluator.py'. It contained an OS injection vulnerability: subprocess call with shell=True. https://github.com/Dru-Mara/EvalNE/commit/7041dbb701eb622f6ce38b4ab529b14d86656a26#diff-2279cc18e0f5d8bb6d8fc4820ab5190a43df3a2b6135d860204bcb3b2bc993e0
what vulnarability does evalne version less then 0.3.3 have
Having vulnarability PVE-2017-47652 Advisory: Eve 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve version less then 0.0.7 have ### Response: Having vulnarability PVE-2017-47652 Advisory: Eve 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks.
what vulnarability does eve version less then 0.0.7 have
Having vulnarability PVE-2017-47652 Advisory: Eve-alpha 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks. https://github.com/pyeve/eve/commit/fe4efe705c320f2fe0f47ae1d59da057232afb74
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve-alpha version less then 0.0.7 have ### Response: Having vulnarability PVE-2017-47652 Advisory: Eve-alpha 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks. https://github.com/pyeve/eve/commit/fe4efe705c320f2fe0f47ae1d59da057232afb74
what vulnarability does eve-alpha version less then 0.0.7 have
Having vulnarability CVE-2020-36660 Advisory: Eve-srp 0.12.12 includes a fix for CVE-2020-36660: This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. https://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240 NOTE: The patched release is not on PyPI. Look for it in eve-srp GH repo.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve-srp version greather then equal to 0,less then 0.12.12 have ### Response: Having vulnarability CVE-2020-36660 Advisory: Eve-srp 0.12.12 includes a fix for CVE-2020-36660: This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. https://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240 NOTE: The patched release is not on PyPI. Look for it in eve-srp GH repo.
what vulnarability does eve-srp version greather then equal to 0,less then 0.12.12 have
Having vulnarability CVE-2016-3076 Advisory: Evennia 0.8 updates its dependency 'pillow' to v5.2.0 to include security fixes. https://github.com/evennia/evennia/commit/6b7766d2956ae7be19f2cf7be0d43056c0accbb0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evennia version less then 0.8 have ### Response: Having vulnarability CVE-2016-3076 Advisory: Evennia 0.8 updates its dependency 'pillow' to v5.2.0 to include security fixes. https://github.com/evennia/evennia/commit/6b7766d2956ae7be19f2cf7be0d43056c0accbb0
what vulnarability does evennia version less then 0.8 have
Having vulnarability CVE-2021-33503 Advisory: Event-scheduler 0.1.2 updates its dependency 'urllib3' to v1.26.5 due to security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does event-scheduler version less then 0.1.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Event-scheduler 0.1.2 updates its dependency 'urllib3' to v1.26.5 due to security issues.
what vulnarability does event-scheduler version less then 0.1.2 have
Having vulnarability PVE-2021-37232 Advisory: event-tracking 0.2.9 changes: This upgrade will fix the security vulnerability in the old versions of jinja2.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does event-tracking version less then 0.2.9 have ### Response: Having vulnarability PVE-2021-37232 Advisory: event-tracking 0.2.9 changes: This upgrade will fix the security vulnerability in the old versions of jinja2.
what vulnarability does event-tracking version less then 0.2.9 have
Having vulnarability CVE-2021-21419 Advisory: Eventlet 0.31.0 includes a fix for CVE-2021-21419: A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eventlet version less then 0.31.0 have ### Response: Having vulnarability CVE-2021-21419 Advisory: Eventlet 0.31.0 includes a fix for CVE-2021-21419: A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.
what vulnarability does eventlet version less then 0.31.0 have
Having vulnarability PVE-2021-38402 Advisory: Eventmq 0.3.13rc1 upgrades the psutil dependency to a more secure version.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eventmq version less then 0.3.13rc1 have ### Response: Having vulnarability PVE-2021-38402 Advisory: Eventmq 0.3.13rc1 upgrades the psutil dependency to a more secure version.
what vulnarability does eventmq version less then 0.3.13rc1 have
Having vulnarability CVE-2021-38296 Advisory: Evidently 0.4.17 upgrades its pyspark dependency to version 3.3.2 or later in response to CVE-2021-38296. https://github.com/evidentlyai/evidently/pull/1013/commits/a4423bff8e8eab56306a2686d66a1a3e80d62755
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evidently version less then 0.4.17 have ### Response: Having vulnarability CVE-2021-38296 Advisory: Evidently 0.4.17 upgrades its pyspark dependency to version 3.3.2 or later in response to CVE-2021-38296. https://github.com/evidentlyai/evidently/pull/1013/commits/a4423bff8e8eab56306a2686d66a1a3e80d62755
what vulnarability does evidently version less then 0.4.17 have
Having vulnarability CVE-2023-23931 Advisory: Exasol-bucketfs 0.8.0 updates its dependency 'cryptography' to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exasol-bucketfs version less then 0.8.0 have ### Response: Having vulnarability CVE-2023-23931 Advisory: Exasol-bucketfs 0.8.0 updates its dependency 'cryptography' to include security fixes.
what vulnarability does exasol-bucketfs version less then 0.8.0 have
Having vulnarability CVE-2021-32559 Advisory: Exasol-integration-test-docker-environment 0.9.0 removes its dependency 'pywin32' to avoid a potential vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exasol-integration-test-docker-environment version less then 0.9.0 have ### Response: Having vulnarability CVE-2021-32559 Advisory: Exasol-integration-test-docker-environment 0.9.0 removes its dependency 'pywin32' to avoid a potential vulnerability.
what vulnarability does exasol-integration-test-docker-environment version less then 0.9.0 have
Having vulnarability CVE-2023-1428 Advisory: Exchanges-wrapper 1.3.4 updates its dependency 'grpcio' to version '1.56.0' to include a fix for a Reachable Assertion vulnerability. https://github.com/DogsTailFarmer/exchanges-wrapper/commit/f679262b648bdf08d4fa4e4f071a12562c25a54a https://github.com/advisories/GHSA-6628-q6j9-w8vg
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exchanges-wrapper version less then 1.3.4 have ### Response: Having vulnarability CVE-2023-1428 Advisory: Exchanges-wrapper 1.3.4 updates its dependency 'grpcio' to version '1.56.0' to include a fix for a Reachable Assertion vulnerability. https://github.com/DogsTailFarmer/exchanges-wrapper/commit/f679262b648bdf08d4fa4e4f071a12562c25a54a https://github.com/advisories/GHSA-6628-q6j9-w8vg
what vulnarability does exchanges-wrapper version less then 1.3.4 have
Having vulnarability PVE-2024-67501 Advisory: Execnet 1.0.6 resolves a race condition that occurred when multiple threads simultaneously transmitted data over channels, which previously led to crashes in the serializer and process. This fix enhances stability and concurrency handling.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does execnet version less then 1.0.6 have ### Response: Having vulnarability PVE-2024-67501 Advisory: Execnet 1.0.6 resolves a race condition that occurred when multiple threads simultaneously transmitted data over channels, which previously led to crashes in the serializer and process. This fix enhances stability and concurrency handling.
what vulnarability does execnet version less then 1.0.6 have
Having vulnarability CVE-2021-23980 Advisory: Exgrex-py 0.3a2 updates its dependency 'bleach' to v3.3.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exgrex-py version less then 0.3a2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Exgrex-py 0.3a2 updates its dependency 'bleach' to v3.3.0 to include a security fix.
what vulnarability does exgrex-py version less then 0.3a2 have
Having vulnarability CVE-2021-23980 Advisory: Exgrex-pytest 0.1a2 updates underlying dependencies for security reasons: bleach -> 3.3.0.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exgrex-pytest version less then 0.1a2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Exgrex-pytest 0.1a2 updates underlying dependencies for security reasons: bleach -> 3.3.0.
what vulnarability does exgrex-pytest version less then 0.1a2 have
Having vulnarability CVE-2017-1000126 Advisory: A stack out of bounds read vulnerability exists in Exiv2 library 0.26 within the webp parser.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exiv2 version equal to 0.26 have ### Response: Having vulnarability CVE-2017-1000126 Advisory: A stack out of bounds read vulnerability exists in Exiv2 library 0.26 within the webp parser.
what vulnarability does exiv2 version equal to 0.26 have
Having vulnarability CVE-2021-33503 Advisory: Exonetapi 3.0.2 updates its dependency 'urllib3' to v1.26.6 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exonetapi version less then 3.0.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Exonetapi 3.0.2 updates its dependency 'urllib3' to v1.26.6 to include a security fix.
what vulnarability does exonetapi version less then 3.0.2 have
Having vulnarability PVE-2021-39207 Advisory: Exoskeleton 1.2.1 requires lxml version >= 4.6.2 (released 2020-11-26) as it fixes a vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exoskeleton version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-39207 Advisory: Exoskeleton 1.2.1 requires lxml version >= 4.6.2 (released 2020-11-26) as it fixes a vulnerability.
what vulnarability does exoskeleton version less then 1.2.1 have
Having vulnarability CVE-2022-38792 Advisory: The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exotel version greather then equal to 0.1.6 have ### Response: Having vulnarability CVE-2022-38792 Advisory: The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem.
what vulnarability does exotel version greather then equal to 0.1.6 have
Having vulnarability CVE-2020-28168 Advisory: Experimaestro 0.7.11 updates its NPM dependency 'axios' to v0.21.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does experimaestro version less then 0.7.11 have ### Response: Having vulnarability CVE-2020-28168 Advisory: Experimaestro 0.7.11 updates its NPM dependency 'axios' to v0.21.1 to include a security fix.
what vulnarability does experimaestro version less then 0.7.11 have
Having vulnarability PVE-2021-37348 Advisory: Extensiveautomation-server 12.1.0 reactivates SSLv3 cipher to support Linux client in python 2.6, fixes a security issue on folder creation in repository (no more full rights), and fixes a security issue on web services (bad handle of the level access).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extensiveautomation-server version less then 12.1.0 have ### Response: Having vulnarability PVE-2021-37348 Advisory: Extensiveautomation-server 12.1.0 reactivates SSLv3 cipher to support Linux client in python 2.6, fixes a security issue on folder creation in repository (no more full rights), and fixes a security issue on web services (bad handle of the level access).
what vulnarability does extensiveautomation-server version less then 12.1.0 have
Having vulnarability CVE-2006-2458 Advisory: Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extractor version less then 0.5.13 have ### Response: Having vulnarability CVE-2006-2458 Advisory: Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c).
what vulnarability does extractor version less then 0.5.13 have
Having vulnarability CVE-2023-32681 Advisory: Extremitypathfinder 2.6.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extremitypathfinder version less then 2.6.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Extremitypathfinder 2.6.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
what vulnarability does extremitypathfinder version less then 2.6.0 have
Having vulnarability CVE-2014-1934 Advisory: tag.py in eyeD3 (aka python-eyed3) 7.0.3, 0.6.18, and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eyed3 version less then 0.6.18 have ### Response: Having vulnarability CVE-2014-1934 Advisory: tag.py in eyeD3 (aka python-eyed3) 7.0.3, 0.6.18, and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file.
what vulnarability does eyed3 version less then 0.6.18 have
Having vulnarability CVE-2023-34092 Advisory: Ezbeq 1.0.0b25 updates its dependency 'vite' to v4.3.9 to include a security fix. https://github.com/3ll3d00d/ezbeq/commit/9a929ef090229cbec0280a695478d184d76c042e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ezbeq version less then 1.0.0b25 have ### Response: Having vulnarability CVE-2023-34092 Advisory: Ezbeq 1.0.0b25 updates its dependency 'vite' to v4.3.9 to include a security fix. https://github.com/3ll3d00d/ezbeq/commit/9a929ef090229cbec0280a695478d184d76c042e
what vulnarability does ezbeq version less then 1.0.0b25 have
Having vulnarability CVE-2022-34982 Advisory: The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eziod version greather then equal to 0,less then 0.0.2 have ### Response: Having vulnarability CVE-2022-34982 Advisory: The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.
what vulnarability does eziod version greather then equal to 0,less then 0.0.2 have
Having vulnarability None Advisory: Certain versions of Flask, part of the Pallets Project, are susceptible to an Improper Input Validation vulnerability. This issue could lead to excessive memory usage, potentially causing a denial of service if attackers supply JSON data in an incorrect encoding.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does f-ask version greather then equal to 0,less then 0.12.3 have ### Response: Having vulnarability None Advisory: Certain versions of Flask, part of the Pallets Project, are susceptible to an Improper Input Validation vulnerability. This issue could lead to excessive memory usage, potentially causing a denial of service if attackers supply JSON data in an incorrect encoding.
what vulnarability does f-ask version greather then equal to 0,less then 0.12.3 have
Having vulnarability CVE-2021-43818 Advisory: Faapi 3.1.0 updates its dependency 'lxml' to v4.7.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faapi version less then 3.1.0 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Faapi 3.1.0 updates its dependency 'lxml' to v4.7.1 to include a security fix.
what vulnarability does faapi version less then 3.1.0 have
Having vulnarability CVE-2011-2185 Advisory: Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fabric version less then 1.1.0 have ### Response: Having vulnarability CVE-2011-2185 Advisory: Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/.
what vulnarability does fabric version less then 1.1.0 have
Having vulnarability PVE-2023-99977 Advisory: The function upload_template() within Fabric2, specifically in versions 0.9.0 up to but not including 1.13.2, contains a vulnerability. It requires cleaning up a temporary file with sudo uploads if the destination path is found to be invalid.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fabric2 version greather then equal to 0.9.0,less then 1.13.2 have ### Response: Having vulnarability PVE-2023-99977 Advisory: The function upload_template() within Fabric2, specifically in versions 0.9.0 up to but not including 1.13.2, contains a vulnerability. It requires cleaning up a temporary file with sudo uploads if the destination path is found to be invalid.
what vulnarability does fabric2 version greather then equal to 0.9.0,less then 1.13.2 have
Having vulnarability PVE-2021-34374 Advisory: Facebook-online-friend-tracker 2.0.0 makes users enter their credentials securely instead of entering them in raw text. https://github.com/bhamodi/facebook-online-friend-tracker/commit/979f27f8b78aa44f242ff099cbfad71bb938e4d7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-online-friend-tracker version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-34374 Advisory: Facebook-online-friend-tracker 2.0.0 makes users enter their credentials securely instead of entering them in raw text. https://github.com/bhamodi/facebook-online-friend-tracker/commit/979f27f8b78aa44f242ff099cbfad71bb938e4d7
what vulnarability does facebook-online-friend-tracker version less then 2.0.0 have
Having vulnarability PVE-2023-99980 Advisory: Facebook-py (fork of facebook-sdk) is vulnerable to CSRF (Cross-site Request Forgery). https://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-py version less then equal to 0.2.0 have ### Response: Having vulnarability PVE-2023-99980 Advisory: Facebook-py (fork of facebook-sdk) is vulnerable to CSRF (Cross-site Request Forgery). https://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326
what vulnarability does facebook-py version less then equal to 0.2.0 have
Having vulnarability PVE-2023-99980 Advisory: Facebook-sdk 0.3.2 adds support for 'state property' in auth urls to prevent Cross-site Request Forgery (CSRF) attacks. https://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-sdk version less then 0.3.2 have ### Response: Having vulnarability PVE-2023-99980 Advisory: Facebook-sdk 0.3.2 adds support for 'state property' in auth urls to prevent Cross-site Request Forgery (CSRF) attacks. https://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326
what vulnarability does facebook-sdk version less then 0.3.2 have
Having vulnarability CVE-2020-27783 Advisory: Fafi 0.2.0 updates its dependency 'lxml' to version '4.6.2' to include a security fix. https://github.com/svandragt/fafi/commit/9b1826fb2bb71f3e791c6cc0c875de6b6d1a4229
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fafi version less then 0.2.0 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Fafi 0.2.0 updates its dependency 'lxml' to version '4.6.2' to include a security fix. https://github.com/svandragt/fafi/commit/9b1826fb2bb71f3e791c6cc0c875de6b6d1a4229
what vulnarability does fafi version less then 0.2.0 have
Having vulnarability PVE-2021-37386 Advisory: Faker 0.1 includes the message: "`bundler-audit` has identified that i18 has fix a security vulnerability, that has been fixed in the 0.8 version."
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faker version less then 0.1 have ### Response: Having vulnarability PVE-2021-37386 Advisory: Faker 0.1 includes the message: "`bundler-audit` has identified that i18 has fix a security vulnerability, that has been fixed in the 0.8 version."
what vulnarability does faker version less then 0.1 have
Having vulnarability CVE-2022-29217 Advisory: Falcon-helpers 0.19.0 requires 'pyjwt>=2.4' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falcon-helpers version less then 0.19.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Falcon-helpers 0.19.0 requires 'pyjwt>=2.4' to include a security fix.
what vulnarability does falcon-helpers version less then 0.19.0 have
Having vulnarability CVE-2022-23491 Advisory: Falcon-toolkit 3.0.2 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falcon-toolkit version less then 3.0.2 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Falcon-toolkit 3.0.2 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
what vulnarability does falcon-toolkit version less then 3.0.2 have
Having vulnarability CVE-2022-30595 Advisory: Falocalrepo 4.3.1 updates its dependency 'falocalrepo-server' to version '3.2.2' to include a fix for a vulnerability. https://github.com/FurryCoders/FALocalRepo/commit/807d2e9e47dcb3ec5cf21569025b9053e2b958b3
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falocalrepo version less then 4.3.1 have ### Response: Having vulnarability CVE-2022-30595 Advisory: Falocalrepo 4.3.1 updates its dependency 'falocalrepo-server' to version '3.2.2' to include a fix for a vulnerability. https://github.com/FurryCoders/FALocalRepo/commit/807d2e9e47dcb3ec5cf21569025b9053e2b958b3
what vulnarability does falocalrepo version less then 4.3.1 have
Having vulnarability CVE-2022-30595 Advisory: Falocalrepo-server 3.2.2 updates its dependency 'pillow' requirement to '^9.1.1' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falocalrepo-server version less then 3.2.2 have ### Response: Having vulnarability CVE-2022-30595 Advisory: Falocalrepo-server 3.2.2 updates its dependency 'pillow' requirement to '^9.1.1' to include a security fix.
what vulnarability does falocalrepo-server version less then 3.2.2 have
Having vulnarability PVE-2022-51682 Advisory: Faq is a malicious package. It triggers the install of W4SP Stealer in your system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faq version greather then 0 have ### Response: Having vulnarability PVE-2022-51682 Advisory: Faq is a malicious package. It triggers the install of W4SP Stealer in your system.
what vulnarability does faq version greather then 0 have
Having vulnarability PVE-2021-39351 Advisory: Faraday-agent-dispatcher 1.2.1 escapes user-controlled executor parameters in order to prevent OS argument injection (not command injection). https://github.com/infobyte/faraday_agent_dispatcher/commit/1f268993e49f4cba1862f1113036e165d2e9695d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faraday-agent-dispatcher version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-39351 Advisory: Faraday-agent-dispatcher 1.2.1 escapes user-controlled executor parameters in order to prevent OS argument injection (not command injection). https://github.com/infobyte/faraday_agent_dispatcher/commit/1f268993e49f4cba1862f1113036e165d2e9695d
what vulnarability does faraday-agent-dispatcher version less then 1.2.1 have
Having vulnarability CVE-2023-1712 Advisory: Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 1.15.0. Alias: GHSA-w7qg-j435-78qw
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does farm-haystack version less then equal to 1.15.0 have ### Response: Having vulnarability CVE-2023-1712 Advisory: Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 1.15.0. Alias: GHSA-w7qg-j435-78qw
what vulnarability does farm-haystack version less then equal to 1.15.0 have
Having vulnarability PVE-2021-37514 Advisory: Fast-curator 0.2.2 switches to pyyaml `safe_load` for better security.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fast-curator version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-37514 Advisory: Fast-curator 0.2.2 switches to pyyaml `safe_load` for better security.
what vulnarability does fast-curator version less then 0.2.2 have
Having vulnarability PVE-2024-64930 Advisory: FastAPI 0.109.1 addresses a critical security issue by upgrading its dependency python-multipart to version >=0.0.7. The upgrade mitigates a Regular Expression Denial of Service (ReDoS) vulnerability, which occurs when parsing form data. https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi version less then 0.109.1 have ### Response: Having vulnarability PVE-2024-64930 Advisory: FastAPI 0.109.1 addresses a critical security issue by upgrading its dependency python-multipart to version >=0.0.7. The upgrade mitigates a Regular Expression Denial of Service (ReDoS) vulnerability, which occurs when parsing form data. https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389
what vulnarability does fastapi version less then 0.109.1 have
Having vulnarability PVE-2021-38783 Advisory: Fastapi-login 1.4.0 fixes a security vulnerability found in uvicorn
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-login version less then 1.4.0 have ### Response: Having vulnarability PVE-2021-38783 Advisory: Fastapi-login 1.4.0 fixes a security vulnerability found in uvicorn
what vulnarability does fastapi-login version less then 1.4.0 have
Having vulnarability CVE-2022-24065 Advisory: Fastapi-mvc 0.13.1 updates its dependency 'cookiecutter' to v2.1.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-mvc version less then 0.13.1 have ### Response: Having vulnarability CVE-2022-24065 Advisory: Fastapi-mvc 0.13.1 updates its dependency 'cookiecutter' to v2.1.1 to include a security fix.
what vulnarability does fastapi-mvc version less then 0.13.1 have
Having vulnarability CVE-2022-29217 Advisory: Fastapi-opa 1.3.7 updates its dependency 'pyjwt' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-opa version less then 1.3.7 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Fastapi-opa 1.3.7 updates its dependency 'pyjwt' to include a security fix.
what vulnarability does fastapi-opa version less then 1.3.7 have
Having vulnarability PVE-2024-99794 Advisory: fastapi-proxy-lib versions before 0.1.0 are vulnerable to information exposure when processing requests through shared usage of httpx.AsyncClient. This vulnerability allows an attacker to leak cookies among users by sending a set-cookie response header. It occurs only if ForwardHttpProxy is used, or ReverseHttpProxy or ReverseWebSocketProxy are employed with servers capable of sending a set-cookie response. A mitigation strategy involves avoiding the use of ForwardHttpProxy and not employing ReverseHttpProxy or ReverseWebSocketProxy with servers that might send a set-cookie response. https://github.com/WSH032/fastapi-proxy-lib/pull/10/commits/056c72569bb5bc8268cadd73fa476f73b5fbc946
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-proxy-lib version greather then equal to 0,less then 0.1.0 have ### Response: Having vulnarability PVE-2024-99794 Advisory: fastapi-proxy-lib versions before 0.1.0 are vulnerable to information exposure when processing requests through shared usage of httpx.AsyncClient. This vulnerability allows an attacker to leak cookies among users by sending a set-cookie response header. It occurs only if ForwardHttpProxy is used, or ReverseHttpProxy or ReverseWebSocketProxy are employed with servers capable of sending a set-cookie response. A mitigation strategy involves avoiding the use of ForwardHttpProxy and not employing ReverseHttpProxy or ReverseWebSocketProxy with servers that might send a set-cookie response. https://github.com/WSH032/fastapi-proxy-lib/pull/10/commits/056c72569bb5bc8268cadd73fa476f73b5fbc946
what vulnarability does fastapi-proxy-lib version greather then equal to 0,less then 0.1.0 have
Having vulnarability CVE-2021-29510 Advisory: Fastapi-restful 0.3.1 includes a fix for the 'pydantic' dependency (update is required).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-restful version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Fastapi-restful 0.3.1 includes a fix for the 'pydantic' dependency (update is required).
what vulnarability does fastapi-restful version less then 0.3.1 have
Having vulnarability PVE-2023-52885 Advisory: Fastapi-toolkit 0.0.27 has a backdoor that adds a FastAPI route allowing a remote attacker to execute arbitrary python code and SQL queries in the context of the web application. https://securitylabs.datadoghq.com/articles/malicious-pypi-package-fastapi-toolkit
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-toolkit version equal to 0.0.27 have ### Response: Having vulnarability PVE-2023-52885 Advisory: Fastapi-toolkit 0.0.27 has a backdoor that adds a FastAPI route allowing a remote attacker to execute arbitrary python code and SQL queries in the context of the web application. https://securitylabs.datadoghq.com/articles/malicious-pypi-package-fastapi-toolkit
what vulnarability does fastapi-toolkit version equal to 0.0.27 have
Having vulnarability CVE-2022-29217 Advisory: Fastapi-users 10.0.6 updates its dependency 'pyjwt' to version '2.4.0' to include a security fix. https://github.com/fastapi-users/fastapi-users/pull/1005 https://github.com/advisories/GHSA-ffqj-6fqr-9h24
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-users version less then 10.0.6 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Fastapi-users 10.0.6 updates its dependency 'pyjwt' to version '2.4.0' to include a security fix. https://github.com/fastapi-users/fastapi-users/pull/1005 https://github.com/advisories/GHSA-ffqj-6fqr-9h24
what vulnarability does fastapi-users version less then 10.0.6 have
Having vulnarability CVE-2023-48699 Advisory: Fastbots 0.1.5 includes a fix for CVE-2023-48699: Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to RCE. The vulnerability is in the function 'def __locator__(self, locator_name: str)' in 'page.py'. https://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastbots version less then 0.1.5 have ### Response: Having vulnarability CVE-2023-48699 Advisory: Fastbots 0.1.5 includes a fix for CVE-2023-48699: Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to RCE. The vulnerability is in the function 'def __locator__(self, locator_name: str)' in 'page.py'. https://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9
what vulnarability does fastbots version less then 0.1.5 have
Having vulnarability CVE-2020-12607 Advisory: An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastecdsa version less then 2.1.2 have ### Response: Having vulnarability CVE-2020-12607 Advisory: An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail.
what vulnarability does fastecdsa version less then 2.1.2 have
Having vulnarability PVE-2022-51675 Advisory: Fatnoob is a malicious package. It triggers the install of W4SP Stealer in your system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fatnoob version greather then 0 have ### Response: Having vulnarability PVE-2022-51675 Advisory: Fatnoob is a malicious package. It triggers the install of W4SP Stealer in your system.
what vulnarability does fatnoob version greather then 0 have
Having vulnarability PVE-2023-62037 Advisory: Faucet 1.10.1 includes a fix for a potential path traversal vulnerability. https://github.com/faucetsdn/faucet/pull/3876
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faucet version less then 1.10.1 have ### Response: Having vulnarability PVE-2023-62037 Advisory: Faucet 1.10.1 includes a fix for a potential path traversal vulnerability. https://github.com/faucetsdn/faucet/pull/3876
what vulnarability does faucet version less then 1.10.1 have
Having vulnarability CVE-2022-2514 Advisory: The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fava version greather then equal to 0,less then 1.22 have ### Response: Having vulnarability CVE-2022-2514 Advisory: The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim.
what vulnarability does fava version greather then equal to 0,less then 1.22 have
Having vulnarability CVE-2021-33503 Advisory: Fbpcp 0.2.2 updates its dependency 'urllib3' to v1.26.7 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fbpcp version less then 0.2.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Fbpcp 0.2.2 updates its dependency 'urllib3' to v1.26.7 to include security fixes.
what vulnarability does fbpcp version less then 0.2.2 have