output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2022-50873 Advisory: Ema-workbench 2.2.0 replaces all HTTP links with secure HTTPS URLs.
https://github.com/quaquel/EMAworkbench/pull/134 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ema-workbench version less then 2.2.0 have ### Response: Having vulnarability PVE-2022-50873 Advisory: Ema-workbench 2.2.0 replaces all HTTP links with secure HTTPS URLs.
https://github.com/quaquel/EMAworkbench/pull/134 | what vulnarability does ema-workbench version less then 2.2.0 have | |
Having vulnarability PVE-2024-99795 Advisory: Emailproxy vesions before 2023.11.19 are susceptible to unverified password changes because of improper validation of expired authorization tokens. An attacker can exploit this by utilizing valid account addresses and precise timing to access an account without validating the account password. This vulnerability specifically impacts instances using a proxy with the CCG flow and is especially critical in publicly accessible environments, such as those available over the internet or a network.
https://github.com/simonrob/email-oauth2-proxy/pull/60 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emailproxy version greather then equal to 0,less then 2023.11.19 have ### Response: Having vulnarability PVE-2024-99795 Advisory: Emailproxy vesions before 2023.11.19 are susceptible to unverified password changes because of improper validation of expired authorization tokens. An attacker can exploit this by utilizing valid account addresses and precise timing to access an account without validating the account password. This vulnerability specifically impacts instances using a proxy with the CCG flow and is especially critical in publicly accessible environments, such as those available over the internet or a network.
https://github.com/simonrob/email-oauth2-proxy/pull/60 | what vulnarability does emailproxy version greather then equal to 0,less then 2023.11.19 have | |
Having vulnarability CVE-2024-23731 Advisory: The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code, related to the openapi.py yaml.load function argument. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embedchain version less then 0.1.57 have ### Response: Having vulnarability CVE-2024-23731 Advisory: The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code, related to the openapi.py yaml.load function argument. | what vulnarability does embedchain version less then 0.1.57 have | |
Having vulnarability PVE-2022-52255 Advisory: Embedded-topic-model 1.2.0 updates its dependency 'skicit-learn' to versions '>=1.3.*' to include a security fix.
https://github.com/lffloyd/embedded-topic-model/commit/331fc0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embedded-topic-model version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-52255 Advisory: Embedded-topic-model 1.2.0 updates its dependency 'skicit-learn' to versions '>=1.3.*' to include a security fix.
https://github.com/lffloyd/embedded-topic-model/commit/331fc0 | what vulnarability does embedded-topic-model version less then 1.2.0 have | |
Having vulnarability CVE-2020-8492 Advisory: Embody-codec version 1.0.28 raises its Python version requirement from at least 3.7 but less than 4.0, to now requiring a minimum of 3.9 due to security concerns outlined in CVE-2020-8492.
https://github.com/aidee-health/embody-codec/pull/354/commits/a82092116340a5ee3d7d6fd70d11fb5bd4c2746d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does embody-codec version less then 1.0.28 have ### Response: Having vulnarability CVE-2020-8492 Advisory: Embody-codec version 1.0.28 raises its Python version requirement from at least 3.7 but less than 4.0, to now requiring a minimum of 3.9 due to security concerns outlined in CVE-2020-8492.
https://github.com/aidee-health/embody-codec/pull/354/commits/a82092116340a5ee3d7d6fd70d11fb5bd4c2746d | what vulnarability does embody-codec version less then 1.0.28 have | |
Having vulnarability CVE-2010-2053 Advisory: emesenelib/ProfileManager.py in emesene before 1.6.2 allows local users to overwrite arbitrary files via a symlink attack on the emsnpic temporary file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emesene version less then 1.6.2 have ### Response: Having vulnarability CVE-2010-2053 Advisory: emesenelib/ProfileManager.py in emesene before 1.6.2 allows local users to overwrite arbitrary files via a symlink attack on the emsnpic temporary file. | what vulnarability does emesene version less then 1.6.2 have | |
Having vulnarability PVE-2021-40547 Advisory: Emrt.necd.content 2.0.15 fixes a possible JavaScript injection. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does emrt-necd-content version less then 2.0.15 have ### Response: Having vulnarability PVE-2021-40547 Advisory: Emrt.necd.content 2.0.15 fixes a possible JavaScript injection. | what vulnarability does emrt-necd-content version less then 2.0.15 have | |
Having vulnarability CVE-2020-36242 Advisory: Encapsia-api 0.2.9 updates its dependency 'cryptography' to v3.4.6 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encapsia-api version less then 0.2.9 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Encapsia-api 0.2.9 updates its dependency 'cryptography' to v3.4.6 to include a security fix. | what vulnarability does encapsia-api version less then 0.2.9 have | |
Having vulnarability CVE-2007-4559 Advisory: Encapsia-cli 0.5.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encapsia-cli version less then 0.5.2 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Encapsia-cli 0.5.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does encapsia-cli version less then 0.5.2 have | |
Having vulnarability PVE-2023-59692 Advisory: Encord-active 0.1.63 includes a fix for a Race Condition vulnerability.
https://github.com/encord-team/encord-active/pull/508 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does encord-active version less then 0.1.63 have ### Response: Having vulnarability PVE-2023-59692 Advisory: Encord-active 0.1.63 includes a fix for a Race Condition vulnerability.
https://github.com/encord-team/encord-active/pull/508 | what vulnarability does encord-active version less then 0.1.63 have | |
Having vulnarability CVE-2023-32681 Advisory: Energyquantified 0.11 updates its dependency 'requests' to v2.31 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does energyquantified version less then 0.11 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Energyquantified 0.11 updates its dependency 'requests' to v2.31 to include a security fix. | what vulnarability does energyquantified version less then 0.11 have | |
Having vulnarability CVE-2021-39182 Advisory: Enrocrypt 1.1.4 includes a fix for CVE-2021-39182: Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. As a workaround, users can remove the 'MD5' hashing function from the file 'hashing.py'.
https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783
https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does enrocrypt version less then 1.1.4 have ### Response: Having vulnarability CVE-2021-39182 Advisory: Enrocrypt 1.1.4 includes a fix for CVE-2021-39182: Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. As a workaround, users can remove the 'MD5' hashing function from the file 'hashing.py'.
https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783
https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce | what vulnarability does enrocrypt version less then 1.1.4 have | |
Having vulnarability CVE-2017-18342 Advisory: Entente 0.11.0 includes a security patch for the function 'test_composite_landmarks_cli' in 'entente/test_cli.py'. it used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/lace/entente/commit/bbbf1985cbb38f749e7dd998bbf42b72c4d1d99c#diff-52de9aa5fb74fe3cdb1d128e9e6b246c69003cf86a181c79f22ec2510dc19b3e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does entente version less then 0.11.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Entente 0.11.0 includes a security patch for the function 'test_composite_landmarks_cli' in 'entente/test_cli.py'. it used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/lace/entente/commit/bbbf1985cbb38f749e7dd998bbf42b72c4d1d99c#diff-52de9aa5fb74fe3cdb1d128e9e6b246c69003cf86a181c79f22ec2510dc19b3e | what vulnarability does entente version less then 0.11.0 have | |
Having vulnarability CVE-2024-28219 Advisory: Entropy-pooling version 1.0.4 updates its Pillow dependency from version 10.2.0 to 10.3.0 in response to the security concerns identified in CVE-2024-28219. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does entropy-pooling version less then 1.0.4 have ### Response: Having vulnarability CVE-2024-28219 Advisory: Entropy-pooling version 1.0.4 updates its Pillow dependency from version 10.2.0 to 10.3.0 in response to the security concerns identified in CVE-2024-28219. | what vulnarability does entropy-pooling version less then 1.0.4 have | |
Having vulnarability CVE-2023-49568 Advisory: Envd 0.3.45 updates its Go dependency 'go-git' to v5.11.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envd version less then 0.3.45 have ### Response: Having vulnarability CVE-2023-49568 Advisory: Envd 0.3.45 updates its Go dependency 'go-git' to v5.11.0 to include a security fix. | what vulnarability does envd version less then 0.3.45 have | |
Having vulnarability PVE-2022-48468 Advisory: Envelope 2.0.0 removes an insecure PRNG.
https://github.com/CZ-NIC/envelope/commit/766eeb7eb20468b39c79ef8eba705fe171aacbbc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envelope version less then 2.0.0 have ### Response: Having vulnarability PVE-2022-48468 Advisory: Envelope 2.0.0 removes an insecure PRNG.
https://github.com/CZ-NIC/envelope/commit/766eeb7eb20468b39c79ef8eba705fe171aacbbc | what vulnarability does envelope version less then 2.0.0 have | |
Having vulnarability CVE-2021-23980 Advisory: Envyconfig 1.1.4 updates its dependency 'bleach' to v3.3.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does envyconfig version less then 1.1.4 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Envyconfig 1.1.4 updates its dependency 'bleach' to v3.3.0 to include a security fix. | what vulnarability does envyconfig version less then 1.1.4 have | |
Having vulnarability CVE-2021-42343 Advisory: Eoreader 0.9.0 updates its dependency 'dask' to v2021.10.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eoreader version less then 0.9.0 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Eoreader 0.9.0 updates its dependency 'dask' to v2021.10.0 to include a security fix. | what vulnarability does eoreader version less then 0.9.0 have | |
Having vulnarability CVE-2021-44832 Advisory: Epam.indigo 1.6.1 updates version of 'Elasticsearch' to v7.16.1 to remove risk of log4j issue.
https://github.com/epam/Indigo/pull/553 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epam-indigo version less then 1.6.1 have ### Response: Having vulnarability CVE-2021-44832 Advisory: Epam.indigo 1.6.1 updates version of 'Elasticsearch' to v7.16.1 to remove risk of log4j issue.
https://github.com/epam/Indigo/pull/553 | what vulnarability does epam-indigo version less then 1.6.1 have | |
Having vulnarability PVE-2023-60929 Advisory: Ephios 0.15.12 includes a fix for a privilege escalation vulnerability.
https://github.com/ephios-dev/ephios/pull/1042 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ephios version less then 0.15.12 have ### Response: Having vulnarability PVE-2023-60929 Advisory: Ephios 0.15.12 includes a fix for a privilege escalation vulnerability.
https://github.com/ephios-dev/ephios/pull/1042 | what vulnarability does ephios version less then 0.15.12 have | |
Having vulnarability PVE-2021-39030 Advisory: Epsagon 1.5.0 updates several dependencies in package.json due to vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epsagon version less then 1.5.0 have ### Response: Having vulnarability PVE-2021-39030 Advisory: Epsagon 1.5.0 updates several dependencies in package.json due to vulnerabilities. | what vulnarability does epsagon version less then 1.5.0 have | |
Having vulnarability PVE-2021-40189 Advisory: Epyk 1.5.6 fixes an external JavaScript text injection issue.
https://github.com/epykure/epyk-ui/commit/8cafc5a9b4c1c487f52b98d875657551902c2e40 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does epyk version less then 1.5.6 have ### Response: Having vulnarability PVE-2021-40189 Advisory: Epyk 1.5.6 fixes an external JavaScript text injection issue.
https://github.com/epykure/epyk-ui/commit/8cafc5a9b4c1c487f52b98d875657551902c2e40 | what vulnarability does epyk version less then 1.5.6 have | |
Having vulnarability PVE-2021-25812 Advisory: Errbot 1.3.0 fixes a security issue: the plugin directory permissions were too lax.
https://github.com/errbotio/errbot/commit/3bf9abe82eb188dd8d3a992280550a903c5d141c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does errbot version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-25812 Advisory: Errbot 1.3.0 fixes a security issue: the plugin directory permissions were too lax.
https://github.com/errbotio/errbot/commit/3bf9abe82eb188dd8d3a992280550a903c5d141c | what vulnarability does errbot version less then 1.3.0 have | |
Having vulnarability PVE-2023-59960 Advisory: Ert 4.5.6 includes a fix for a Race Condition vulnerability.
https://github.com/equinor/ert/pull/5358 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ert version less then 4.5.6 have ### Response: Having vulnarability PVE-2023-59960 Advisory: Ert 4.5.6 includes a fix for a Race Condition vulnerability.
https://github.com/equinor/ert/pull/5358 | what vulnarability does ert version less then 4.5.6 have | |
Having vulnarability PVE-2021-40562 Advisory: Ert-storage 0.1.8 enables token-based security for the 'ert-storage'. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ert-storage version less then 0.1.8 have ### Response: Having vulnarability PVE-2021-40562 Advisory: Ert-storage 0.1.8 enables token-based security for the 'ert-storage'. | what vulnarability does ert-storage version less then 0.1.8 have | |
Having vulnarability PVE-2023-58713 Advisory: Esmerald 1.2.3 updates its dependency 'Starlette' to versions '>=0.27.0' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esmerald version less then 1.2.3 have ### Response: Having vulnarability PVE-2023-58713 Advisory: Esmerald 1.2.3 updates its dependency 'Starlette' to versions '>=0.27.0' to include a security fix. | what vulnarability does esmerald version less then 1.2.3 have | |
Having vulnarability PVE-2021-38581 Advisory: Espeakng 1.49.0 fixes many security issues. No details were given. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does espeakng version less then 1.49.0 have ### Response: Having vulnarability PVE-2021-38581 Advisory: Espeakng 1.49.0 fixes many security issues. No details were given. | what vulnarability does espeakng version less then 1.49.0 have | |
Having vulnarability PVE-2021-38623 Advisory: Esphome 1.15.0b1 includes a fix for an http_request ESP32 insecure requests that may return the address of local variable. See: <https://github.com/esphome/issues/issues/1175>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esphome version less then 1.15.0b1 have ### Response: Having vulnarability PVE-2021-38623 Advisory: Esphome 1.15.0b1 includes a fix for an http_request ESP32 insecure requests that may return the address of local variable. See: <https://github.com/esphome/issues/issues/1175>. | what vulnarability does esphome version less then 1.15.0b1 have | |
Having vulnarability CVE-2023-46894 Advisory: Esptool is affected by CVE-2023-46894: An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.
https://github.com/espressif/esptool/issues/926 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esptool version greather then equal to 0 have ### Response: Having vulnarability CVE-2023-46894 Advisory: Esptool is affected by CVE-2023-46894: An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.
https://github.com/espressif/esptool/issues/926 | what vulnarability does esptool version greather then equal to 0 have | |
Having vulnarability PVE-2023-61963 Advisory: Esrapgra 0.1.1 escapes strings using 'shlex' to prevent shell-escape attacks.
https://github.com/audy/esrapgra/commit/6ac83acd895d864bfbcaa1f26020615c9fa9610f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does esrapgra version less then 0.1.1 have ### Response: Having vulnarability PVE-2023-61963 Advisory: Esrapgra 0.1.1 escapes strings using 'shlex' to prevent shell-escape attacks.
https://github.com/audy/esrapgra/commit/6ac83acd895d864bfbcaa1f26020615c9fa9610f | what vulnarability does esrapgra version less then 0.1.1 have | |
Having vulnarability PVE-2024-99787 Advisory: Eth-abi versions above 4.2.0 are susceptible to a Denial of Service (DoS) attack when attempting to parse zero-sized types (ZST). Such parsing, despite being compliant with the ABI specifications, can result in excessive memory allocation if malicious ZST tuples are processed. A potential mitigation strategy involves prohibiting the parsing of ZST to prevent this vulnerability from being exploited.
https://github.com/ethereum/eth-abi/commit/7db682955568b01faf0858ac14bc73c624e5dd10 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-abi version greather then equal to 0,less then 4.2.0 have ### Response: Having vulnarability PVE-2024-99787 Advisory: Eth-abi versions above 4.2.0 are susceptible to a Denial of Service (DoS) attack when attempting to parse zero-sized types (ZST). Such parsing, despite being compliant with the ABI specifications, can result in excessive memory allocation if malicious ZST tuples are processed. A potential mitigation strategy involves prohibiting the parsing of ZST to prevent this vulnerability from being exploited.
https://github.com/ethereum/eth-abi/commit/7db682955568b01faf0858ac14bc73c624e5dd10 | what vulnarability does eth-abi version greather then equal to 0,less then 4.2.0 have | |
Having vulnarability CVE-2022-1930 Advisory: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-account version greather then equal to 0,less then 0.5.9 have ### Response: Having vulnarability CVE-2022-1930 Advisory: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method | what vulnarability does eth-account version greather then equal to 0,less then 0.5.9 have | |
Having vulnarability CVE-2018-15560 Advisory: Eth-hash 0.2.0 updates its dependency 'pycryptodome' minimum requirement to v3.6.6 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-hash version less then 0.2.0 have ### Response: Having vulnarability CVE-2018-15560 Advisory: Eth-hash 0.2.0 updates its dependency 'pycryptodome' minimum requirement to v3.6.6 to include a security fix. | what vulnarability does eth-hash version less then 0.2.0 have | |
Having vulnarability PVE-2022-44610 Advisory: Eth-keyfile 0.6.0 mitigates a timing attack vector affecting the hmac comparation when decoding keyfiles.
https://github.com/ethereum/eth-keyfile/issues/12 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eth-keyfile version less then 0.6.0 have ### Response: Having vulnarability PVE-2022-44610 Advisory: Eth-keyfile 0.6.0 mitigates a timing attack vector affecting the hmac comparation when decoding keyfiles.
https://github.com/ethereum/eth-keyfile/issues/12 | what vulnarability does eth-keyfile version less then 0.6.0 have | |
Having vulnarability CVE-2018-1000805 Advisory: Etherweaver 0.3.0 updates its dependency 'paramiko' to v2.4.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etherweaver version less then 0.3.0 have ### Response: Having vulnarability CVE-2018-1000805 Advisory: Etherweaver 0.3.0 updates its dependency 'paramiko' to v2.4.2 to include a security fix. | what vulnarability does etherweaver version less then 0.3.0 have | |
Having vulnarability PVE-2021-37042 Advisory: Ethically 0.0.3 fixes security issues with dependencies. This package is no longer in PyPI. No more information was found. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethically version less then 0.0.3 have ### Response: Having vulnarability PVE-2021-37042 Advisory: Ethically 0.0.3 fixes security issues with dependencies. This package is no longer in PyPI. No more information was found. | what vulnarability does ethically version less then 0.0.3 have | |
Having vulnarability PVE-2021-37387 Advisory: Ethsnarks 0.18.10.1 fixes security bugs in MiMC-p/p and Miximus. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethsnarks version less then 0.18.10.1 have ### Response: Having vulnarability PVE-2021-37387 Advisory: Ethsnarks 0.18.10.1 fixes security bugs in MiMC-p/p and Miximus. | what vulnarability does ethsnarks version less then 0.18.10.1 have | |
Having vulnarability PVE-2024-63353 Advisory: Ethyca-fides 2.1.0 addresses a race condition vulnerability that occurred during the initialization of the FidesConfig class. This vulnerability could lead to unexpected behavior or incorrect security configurations if two threads attempted to modify the security attribute simultaneously. The fix ensures that the security attribute is safely initialized as an SecuritySettings object and that the test_mode attribute is correctly set using the get_test_mode() function.
https://github.com/ethyca/fides/pull/1718/commits/22df5c9917a8a3b43b40dfcb1a4c246f74e6d36c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ethyca-fides version less then 2.1.0 have ### Response: Having vulnarability PVE-2024-63353 Advisory: Ethyca-fides 2.1.0 addresses a race condition vulnerability that occurred during the initialization of the FidesConfig class. This vulnerability could lead to unexpected behavior or incorrect security configurations if two threads attempted to modify the security attribute simultaneously. The fix ensures that the security attribute is safely initialized as an SecuritySettings object and that the test_mode attribute is correctly set using the get_test_mode() function.
https://github.com/ethyca/fides/pull/1718/commits/22df5c9917a8a3b43b40dfcb1a4c246f74e6d36c | what vulnarability does ethyca-fides version less then 2.1.0 have | |
Having vulnarability PVE-2022-51664 Advisory: Etlhelper 0.14.0 performs validation on table and column names that are passed to the load function to prevent malicious code being inserted into the auto-generated SQL.
https://github.com/BritishGeologicalSurvey/etlhelper/pull/134 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etlhelper version less then 0.14.0 have ### Response: Having vulnarability PVE-2022-51664 Advisory: Etlhelper 0.14.0 performs validation on table and column names that are passed to the load function to prevent malicious code being inserted into the auto-generated SQL.
https://github.com/BritishGeologicalSurvey/etlhelper/pull/134 | what vulnarability does etlhelper version less then 0.14.0 have | |
Having vulnarability CVE-2019-7164 Advisory: Etlstat 0.6.1 updates SQLAlchemy to versions >=1.3.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does etlstat version less then 0.6.1 have ### Response: Having vulnarability CVE-2019-7164 Advisory: Etlstat 0.6.1 updates SQLAlchemy to versions >=1.3.0 to include security fixes. | what vulnarability does etlstat version less then 0.6.1 have | |
Having vulnarability PVE-2021-37459 Advisory: Euphorie 11.1.2 tightens the security on several client views. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does euphorie version less then 11.1.2 have ### Response: Having vulnarability PVE-2021-37459 Advisory: Euphorie 11.1.2 tightens the security on several client views. | what vulnarability does euphorie version less then 11.1.2 have | |
Having vulnarability CVE-2021-33430 Advisory: Evalml version 0.42.0 updates its minimum required version of numpy to >=1.21.0 from the previously specified >=1.20.0. This change addresses the security issue CVE-2021-33430.
https://github.com/alteryx/evalml/pull/3207/commits/2e3daedb4d800952d5f8c7488450df870ed09a48 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evalml version less then 0.42.0 have ### Response: Having vulnarability CVE-2021-33430 Advisory: Evalml version 0.42.0 updates its minimum required version of numpy to >=1.21.0 from the previously specified >=1.20.0. This change addresses the security issue CVE-2021-33430.
https://github.com/alteryx/evalml/pull/3207/commits/2e3daedb4d800952d5f8c7488450df870ed09a48 | what vulnarability does evalml version less then 0.42.0 have | |
Having vulnarability PVE-2021-41325 Advisory: Evalne version 0.3.3 includes a security patch for the function '_evaluate_ee_e2e_cmd' in 'evalne/evaluation/evaluator.py'. It contained an OS injection vulnerability: subprocess call with shell=True.
https://github.com/Dru-Mara/EvalNE/commit/7041dbb701eb622f6ce38b4ab529b14d86656a26#diff-2279cc18e0f5d8bb6d8fc4820ab5190a43df3a2b6135d860204bcb3b2bc993e0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evalne version less then 0.3.3 have ### Response: Having vulnarability PVE-2021-41325 Advisory: Evalne version 0.3.3 includes a security patch for the function '_evaluate_ee_e2e_cmd' in 'evalne/evaluation/evaluator.py'. It contained an OS injection vulnerability: subprocess call with shell=True.
https://github.com/Dru-Mara/EvalNE/commit/7041dbb701eb622f6ce38b4ab529b14d86656a26#diff-2279cc18e0f5d8bb6d8fc4820ab5190a43df3a2b6135d860204bcb3b2bc993e0 | what vulnarability does evalne version less then 0.3.3 have | |
Having vulnarability PVE-2017-47652 Advisory: Eve 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve version less then 0.0.7 have ### Response: Having vulnarability PVE-2017-47652 Advisory: Eve 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks. | what vulnarability does eve version less then 0.0.7 have | |
Having vulnarability PVE-2017-47652 Advisory: Eve-alpha 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks.
https://github.com/pyeve/eve/commit/fe4efe705c320f2fe0f47ae1d59da057232afb74 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve-alpha version less then 0.0.7 have ### Response: Having vulnarability PVE-2017-47652 Advisory: Eve-alpha 0.0.7 disables Mongo Javascript operators by default, as they might be used as vectors for injection attacks.
https://github.com/pyeve/eve/commit/fe4efe705c320f2fe0f47ae1d59da057232afb74 | what vulnarability does eve-alpha version less then 0.0.7 have | |
Having vulnarability CVE-2020-36660 Advisory: Eve-srp 0.12.12 includes a fix for CVE-2020-36660: This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely.
https://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240
NOTE: The patched release is not on PyPI. Look for it in eve-srp GH repo. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eve-srp version greather then equal to 0,less then 0.12.12 have ### Response: Having vulnarability CVE-2020-36660 Advisory: Eve-srp 0.12.12 includes a fix for CVE-2020-36660: This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely.
https://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240
NOTE: The patched release is not on PyPI. Look for it in eve-srp GH repo. | what vulnarability does eve-srp version greather then equal to 0,less then 0.12.12 have | |
Having vulnarability CVE-2016-3076 Advisory: Evennia 0.8 updates its dependency 'pillow' to v5.2.0 to include security fixes.
https://github.com/evennia/evennia/commit/6b7766d2956ae7be19f2cf7be0d43056c0accbb0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evennia version less then 0.8 have ### Response: Having vulnarability CVE-2016-3076 Advisory: Evennia 0.8 updates its dependency 'pillow' to v5.2.0 to include security fixes.
https://github.com/evennia/evennia/commit/6b7766d2956ae7be19f2cf7be0d43056c0accbb0 | what vulnarability does evennia version less then 0.8 have | |
Having vulnarability CVE-2021-33503 Advisory: Event-scheduler 0.1.2 updates its dependency 'urllib3' to v1.26.5 due to security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does event-scheduler version less then 0.1.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Event-scheduler 0.1.2 updates its dependency 'urllib3' to v1.26.5 due to security issues. | what vulnarability does event-scheduler version less then 0.1.2 have | |
Having vulnarability PVE-2021-37232 Advisory: event-tracking 0.2.9 changes: This upgrade will fix the security vulnerability in the old versions of jinja2. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does event-tracking version less then 0.2.9 have ### Response: Having vulnarability PVE-2021-37232 Advisory: event-tracking 0.2.9 changes: This upgrade will fix the security vulnerability in the old versions of jinja2. | what vulnarability does event-tracking version less then 0.2.9 have | |
Having vulnarability CVE-2021-21419 Advisory: Eventlet 0.31.0 includes a fix for CVE-2021-21419: A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eventlet version less then 0.31.0 have ### Response: Having vulnarability CVE-2021-21419 Advisory: Eventlet 0.31.0 includes a fix for CVE-2021-21419: A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process. | what vulnarability does eventlet version less then 0.31.0 have | |
Having vulnarability PVE-2021-38402 Advisory: Eventmq 0.3.13rc1 upgrades the psutil dependency to a more secure version. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eventmq version less then 0.3.13rc1 have ### Response: Having vulnarability PVE-2021-38402 Advisory: Eventmq 0.3.13rc1 upgrades the psutil dependency to a more secure version. | what vulnarability does eventmq version less then 0.3.13rc1 have | |
Having vulnarability CVE-2021-38296 Advisory: Evidently 0.4.17 upgrades its pyspark dependency to version 3.3.2 or later in response to CVE-2021-38296.
https://github.com/evidentlyai/evidently/pull/1013/commits/a4423bff8e8eab56306a2686d66a1a3e80d62755 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does evidently version less then 0.4.17 have ### Response: Having vulnarability CVE-2021-38296 Advisory: Evidently 0.4.17 upgrades its pyspark dependency to version 3.3.2 or later in response to CVE-2021-38296.
https://github.com/evidentlyai/evidently/pull/1013/commits/a4423bff8e8eab56306a2686d66a1a3e80d62755 | what vulnarability does evidently version less then 0.4.17 have | |
Having vulnarability CVE-2023-23931 Advisory: Exasol-bucketfs 0.8.0 updates its dependency 'cryptography' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exasol-bucketfs version less then 0.8.0 have ### Response: Having vulnarability CVE-2023-23931 Advisory: Exasol-bucketfs 0.8.0 updates its dependency 'cryptography' to include security fixes. | what vulnarability does exasol-bucketfs version less then 0.8.0 have | |
Having vulnarability CVE-2021-32559 Advisory: Exasol-integration-test-docker-environment 0.9.0 removes its dependency 'pywin32' to avoid a potential vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exasol-integration-test-docker-environment version less then 0.9.0 have ### Response: Having vulnarability CVE-2021-32559 Advisory: Exasol-integration-test-docker-environment 0.9.0 removes its dependency 'pywin32' to avoid a potential vulnerability. | what vulnarability does exasol-integration-test-docker-environment version less then 0.9.0 have | |
Having vulnarability CVE-2023-1428 Advisory: Exchanges-wrapper 1.3.4 updates its dependency 'grpcio' to version '1.56.0' to include a fix for a Reachable Assertion vulnerability.
https://github.com/DogsTailFarmer/exchanges-wrapper/commit/f679262b648bdf08d4fa4e4f071a12562c25a54a
https://github.com/advisories/GHSA-6628-q6j9-w8vg | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exchanges-wrapper version less then 1.3.4 have ### Response: Having vulnarability CVE-2023-1428 Advisory: Exchanges-wrapper 1.3.4 updates its dependency 'grpcio' to version '1.56.0' to include a fix for a Reachable Assertion vulnerability.
https://github.com/DogsTailFarmer/exchanges-wrapper/commit/f679262b648bdf08d4fa4e4f071a12562c25a54a
https://github.com/advisories/GHSA-6628-q6j9-w8vg | what vulnarability does exchanges-wrapper version less then 1.3.4 have | |
Having vulnarability PVE-2024-67501 Advisory: Execnet 1.0.6 resolves a race condition that occurred when multiple threads simultaneously transmitted data over channels, which previously led to crashes in the serializer and process. This fix enhances stability and concurrency handling. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does execnet version less then 1.0.6 have ### Response: Having vulnarability PVE-2024-67501 Advisory: Execnet 1.0.6 resolves a race condition that occurred when multiple threads simultaneously transmitted data over channels, which previously led to crashes in the serializer and process. This fix enhances stability and concurrency handling. | what vulnarability does execnet version less then 1.0.6 have | |
Having vulnarability CVE-2021-23980 Advisory: Exgrex-py 0.3a2 updates its dependency 'bleach' to v3.3.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exgrex-py version less then 0.3a2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Exgrex-py 0.3a2 updates its dependency 'bleach' to v3.3.0 to include a security fix. | what vulnarability does exgrex-py version less then 0.3a2 have | |
Having vulnarability CVE-2021-23980 Advisory: Exgrex-pytest 0.1a2 updates underlying dependencies for security reasons: bleach -> 3.3.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exgrex-pytest version less then 0.1a2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Exgrex-pytest 0.1a2 updates underlying dependencies for security reasons: bleach -> 3.3.0. | what vulnarability does exgrex-pytest version less then 0.1a2 have | |
Having vulnarability CVE-2017-1000126 Advisory: A stack out of bounds read vulnerability exists in Exiv2 library 0.26 within the webp parser. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exiv2 version equal to 0.26 have ### Response: Having vulnarability CVE-2017-1000126 Advisory: A stack out of bounds read vulnerability exists in Exiv2 library 0.26 within the webp parser. | what vulnarability does exiv2 version equal to 0.26 have | |
Having vulnarability CVE-2021-33503 Advisory: Exonetapi 3.0.2 updates its dependency 'urllib3' to v1.26.6 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exonetapi version less then 3.0.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Exonetapi 3.0.2 updates its dependency 'urllib3' to v1.26.6 to include a security fix. | what vulnarability does exonetapi version less then 3.0.2 have | |
Having vulnarability PVE-2021-39207 Advisory: Exoskeleton 1.2.1 requires lxml version >= 4.6.2 (released 2020-11-26) as it fixes a vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exoskeleton version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-39207 Advisory: Exoskeleton 1.2.1 requires lxml version >= 4.6.2 (released 2020-11-26) as it fixes a vulnerability. | what vulnarability does exoskeleton version less then 1.2.1 have | |
Having vulnarability CVE-2022-38792 Advisory: The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does exotel version greather then equal to 0.1.6 have ### Response: Having vulnarability CVE-2022-38792 Advisory: The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem. | what vulnarability does exotel version greather then equal to 0.1.6 have | |
Having vulnarability CVE-2020-28168 Advisory: Experimaestro 0.7.11 updates its NPM dependency 'axios' to v0.21.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does experimaestro version less then 0.7.11 have ### Response: Having vulnarability CVE-2020-28168 Advisory: Experimaestro 0.7.11 updates its NPM dependency 'axios' to v0.21.1 to include a security fix. | what vulnarability does experimaestro version less then 0.7.11 have | |
Having vulnarability PVE-2021-37348 Advisory: Extensiveautomation-server 12.1.0 reactivates SSLv3 cipher to support Linux client in python 2.6, fixes a security issue on folder creation in repository (no more full rights), and fixes a security issue on web services (bad handle of the level access). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extensiveautomation-server version less then 12.1.0 have ### Response: Having vulnarability PVE-2021-37348 Advisory: Extensiveautomation-server 12.1.0 reactivates SSLv3 cipher to support Linux client in python 2.6, fixes a security issue on folder creation in repository (no more full rights), and fixes a security issue on web services (bad handle of the level access). | what vulnarability does extensiveautomation-server version less then 12.1.0 have | |
Having vulnarability CVE-2006-2458 Advisory: Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extractor version less then 0.5.13 have ### Response: Having vulnarability CVE-2006-2458 Advisory: Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c). | what vulnarability does extractor version less then 0.5.13 have | |
Having vulnarability CVE-2023-32681 Advisory: Extremitypathfinder 2.6.0 updates its dependency 'requests' to v2.31.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does extremitypathfinder version less then 2.6.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Extremitypathfinder 2.6.0 updates its dependency 'requests' to v2.31.0 to include a security fix. | what vulnarability does extremitypathfinder version less then 2.6.0 have | |
Having vulnarability CVE-2014-1934 Advisory: tag.py in eyeD3 (aka python-eyed3) 7.0.3, 0.6.18, and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eyed3 version less then 0.6.18 have ### Response: Having vulnarability CVE-2014-1934 Advisory: tag.py in eyeD3 (aka python-eyed3) 7.0.3, 0.6.18, and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file. | what vulnarability does eyed3 version less then 0.6.18 have | |
Having vulnarability CVE-2023-34092 Advisory: Ezbeq 1.0.0b25 updates its dependency 'vite' to v4.3.9 to include a security fix.
https://github.com/3ll3d00d/ezbeq/commit/9a929ef090229cbec0280a695478d184d76c042e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ezbeq version less then 1.0.0b25 have ### Response: Having vulnarability CVE-2023-34092 Advisory: Ezbeq 1.0.0b25 updates its dependency 'vite' to v4.3.9 to include a security fix.
https://github.com/3ll3d00d/ezbeq/commit/9a929ef090229cbec0280a695478d184d76c042e | what vulnarability does ezbeq version less then 1.0.0b25 have | |
Having vulnarability CVE-2022-34982 Advisory: The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does eziod version greather then equal to 0,less then 0.0.2 have ### Response: Having vulnarability CVE-2022-34982 Advisory: The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party. | what vulnarability does eziod version greather then equal to 0,less then 0.0.2 have | |
Having vulnarability None Advisory: Certain versions of Flask, part of the Pallets Project, are susceptible to an Improper Input Validation vulnerability. This issue could lead to excessive memory usage, potentially causing a denial of service if attackers supply JSON data in an incorrect encoding. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does f-ask version greather then equal to 0,less then 0.12.3 have ### Response: Having vulnarability None Advisory: Certain versions of Flask, part of the Pallets Project, are susceptible to an Improper Input Validation vulnerability. This issue could lead to excessive memory usage, potentially causing a denial of service if attackers supply JSON data in an incorrect encoding. | what vulnarability does f-ask version greather then equal to 0,less then 0.12.3 have | |
Having vulnarability CVE-2021-43818 Advisory: Faapi 3.1.0 updates its dependency 'lxml' to v4.7.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faapi version less then 3.1.0 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Faapi 3.1.0 updates its dependency 'lxml' to v4.7.1 to include a security fix. | what vulnarability does faapi version less then 3.1.0 have | |
Having vulnarability CVE-2011-2185 Advisory: Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fabric version less then 1.1.0 have ### Response: Having vulnarability CVE-2011-2185 Advisory: Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/. | what vulnarability does fabric version less then 1.1.0 have | |
Having vulnarability PVE-2023-99977 Advisory: The function upload_template() within Fabric2, specifically in versions 0.9.0 up to but not including 1.13.2, contains a vulnerability. It requires cleaning up a temporary file with sudo uploads if the destination path is found to be invalid. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fabric2 version greather then equal to 0.9.0,less then 1.13.2 have ### Response: Having vulnarability PVE-2023-99977 Advisory: The function upload_template() within Fabric2, specifically in versions 0.9.0 up to but not including 1.13.2, contains a vulnerability. It requires cleaning up a temporary file with sudo uploads if the destination path is found to be invalid. | what vulnarability does fabric2 version greather then equal to 0.9.0,less then 1.13.2 have | |
Having vulnarability PVE-2021-34374 Advisory: Facebook-online-friend-tracker 2.0.0 makes users enter their credentials securely instead of entering them in raw text.
https://github.com/bhamodi/facebook-online-friend-tracker/commit/979f27f8b78aa44f242ff099cbfad71bb938e4d7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-online-friend-tracker version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-34374 Advisory: Facebook-online-friend-tracker 2.0.0 makes users enter their credentials securely instead of entering them in raw text.
https://github.com/bhamodi/facebook-online-friend-tracker/commit/979f27f8b78aa44f242ff099cbfad71bb938e4d7 | what vulnarability does facebook-online-friend-tracker version less then 2.0.0 have | |
Having vulnarability PVE-2023-99980 Advisory: Facebook-py (fork of facebook-sdk) is vulnerable to CSRF (Cross-site Request Forgery).
https://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-py version less then equal to 0.2.0 have ### Response: Having vulnarability PVE-2023-99980 Advisory: Facebook-py (fork of facebook-sdk) is vulnerable to CSRF (Cross-site Request Forgery).
https://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326 | what vulnarability does facebook-py version less then equal to 0.2.0 have | |
Having vulnarability PVE-2023-99980 Advisory: Facebook-sdk 0.3.2 adds support for 'state property' in auth urls to prevent Cross-site Request Forgery (CSRF) attacks.
https://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does facebook-sdk version less then 0.3.2 have ### Response: Having vulnarability PVE-2023-99980 Advisory: Facebook-sdk 0.3.2 adds support for 'state property' in auth urls to prevent Cross-site Request Forgery (CSRF) attacks.
https://github.com/mobolic/facebook-sdk/commit/3fc17fa91feacba3b2188dcd6033962dd7c89326 | what vulnarability does facebook-sdk version less then 0.3.2 have | |
Having vulnarability CVE-2020-27783 Advisory: Fafi 0.2.0 updates its dependency 'lxml' to version '4.6.2' to include a security fix.
https://github.com/svandragt/fafi/commit/9b1826fb2bb71f3e791c6cc0c875de6b6d1a4229 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fafi version less then 0.2.0 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Fafi 0.2.0 updates its dependency 'lxml' to version '4.6.2' to include a security fix.
https://github.com/svandragt/fafi/commit/9b1826fb2bb71f3e791c6cc0c875de6b6d1a4229 | what vulnarability does fafi version less then 0.2.0 have | |
Having vulnarability PVE-2021-37386 Advisory: Faker 0.1 includes the message: "`bundler-audit` has identified that i18 has fix a security vulnerability, that has been fixed in the 0.8 version." | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faker version less then 0.1 have ### Response: Having vulnarability PVE-2021-37386 Advisory: Faker 0.1 includes the message: "`bundler-audit` has identified that i18 has fix a security vulnerability, that has been fixed in the 0.8 version." | what vulnarability does faker version less then 0.1 have | |
Having vulnarability CVE-2022-29217 Advisory: Falcon-helpers 0.19.0 requires 'pyjwt>=2.4' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falcon-helpers version less then 0.19.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Falcon-helpers 0.19.0 requires 'pyjwt>=2.4' to include a security fix. | what vulnarability does falcon-helpers version less then 0.19.0 have | |
Having vulnarability CVE-2022-23491 Advisory: Falcon-toolkit 3.0.2 updates its dependency 'certifi' to v2022.12.7 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falcon-toolkit version less then 3.0.2 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Falcon-toolkit 3.0.2 updates its dependency 'certifi' to v2022.12.7 to include a security fix. | what vulnarability does falcon-toolkit version less then 3.0.2 have | |
Having vulnarability CVE-2022-30595 Advisory: Falocalrepo 4.3.1 updates its dependency 'falocalrepo-server' to version '3.2.2' to include a fix for a vulnerability.
https://github.com/FurryCoders/FALocalRepo/commit/807d2e9e47dcb3ec5cf21569025b9053e2b958b3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falocalrepo version less then 4.3.1 have ### Response: Having vulnarability CVE-2022-30595 Advisory: Falocalrepo 4.3.1 updates its dependency 'falocalrepo-server' to version '3.2.2' to include a fix for a vulnerability.
https://github.com/FurryCoders/FALocalRepo/commit/807d2e9e47dcb3ec5cf21569025b9053e2b958b3 | what vulnarability does falocalrepo version less then 4.3.1 have | |
Having vulnarability CVE-2022-30595 Advisory: Falocalrepo-server 3.2.2 updates its dependency 'pillow' requirement to '^9.1.1' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does falocalrepo-server version less then 3.2.2 have ### Response: Having vulnarability CVE-2022-30595 Advisory: Falocalrepo-server 3.2.2 updates its dependency 'pillow' requirement to '^9.1.1' to include a security fix. | what vulnarability does falocalrepo-server version less then 3.2.2 have | |
Having vulnarability PVE-2022-51682 Advisory: Faq is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faq version greather then 0 have ### Response: Having vulnarability PVE-2022-51682 Advisory: Faq is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does faq version greather then 0 have | |
Having vulnarability PVE-2021-39351 Advisory: Faraday-agent-dispatcher 1.2.1 escapes user-controlled executor parameters in order to prevent OS argument injection (not command injection).
https://github.com/infobyte/faraday_agent_dispatcher/commit/1f268993e49f4cba1862f1113036e165d2e9695d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faraday-agent-dispatcher version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-39351 Advisory: Faraday-agent-dispatcher 1.2.1 escapes user-controlled executor parameters in order to prevent OS argument injection (not command injection).
https://github.com/infobyte/faraday_agent_dispatcher/commit/1f268993e49f4cba1862f1113036e165d2e9695d | what vulnarability does faraday-agent-dispatcher version less then 1.2.1 have | |
Having vulnarability CVE-2023-1712 Advisory: Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 1.15.0.
Alias:
GHSA-w7qg-j435-78qw | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does farm-haystack version less then equal to 1.15.0 have ### Response: Having vulnarability CVE-2023-1712 Advisory: Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 1.15.0.
Alias:
GHSA-w7qg-j435-78qw | what vulnarability does farm-haystack version less then equal to 1.15.0 have | |
Having vulnarability PVE-2021-37514 Advisory: Fast-curator 0.2.2 switches to pyyaml `safe_load` for better security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fast-curator version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-37514 Advisory: Fast-curator 0.2.2 switches to pyyaml `safe_load` for better security. | what vulnarability does fast-curator version less then 0.2.2 have | |
Having vulnarability PVE-2024-64930 Advisory: FastAPI 0.109.1 addresses a critical security issue by upgrading its dependency python-multipart to version >=0.0.7. The upgrade mitigates a Regular Expression Denial of Service (ReDoS) vulnerability, which occurs when parsing form data.
https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi version less then 0.109.1 have ### Response: Having vulnarability PVE-2024-64930 Advisory: FastAPI 0.109.1 addresses a critical security issue by upgrading its dependency python-multipart to version >=0.0.7. The upgrade mitigates a Regular Expression Denial of Service (ReDoS) vulnerability, which occurs when parsing form data.
https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389 | what vulnarability does fastapi version less then 0.109.1 have | |
Having vulnarability PVE-2021-38783 Advisory: Fastapi-login 1.4.0 fixes a security vulnerability found in uvicorn | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-login version less then 1.4.0 have ### Response: Having vulnarability PVE-2021-38783 Advisory: Fastapi-login 1.4.0 fixes a security vulnerability found in uvicorn | what vulnarability does fastapi-login version less then 1.4.0 have | |
Having vulnarability CVE-2022-24065 Advisory: Fastapi-mvc 0.13.1 updates its dependency 'cookiecutter' to v2.1.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-mvc version less then 0.13.1 have ### Response: Having vulnarability CVE-2022-24065 Advisory: Fastapi-mvc 0.13.1 updates its dependency 'cookiecutter' to v2.1.1 to include a security fix. | what vulnarability does fastapi-mvc version less then 0.13.1 have | |
Having vulnarability CVE-2022-29217 Advisory: Fastapi-opa 1.3.7 updates its dependency 'pyjwt' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-opa version less then 1.3.7 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Fastapi-opa 1.3.7 updates its dependency 'pyjwt' to include a security fix. | what vulnarability does fastapi-opa version less then 1.3.7 have | |
Having vulnarability PVE-2024-99794 Advisory: fastapi-proxy-lib versions before 0.1.0 are vulnerable to information exposure when processing requests through shared usage of httpx.AsyncClient. This vulnerability allows an attacker to leak cookies among users by sending a set-cookie response header. It occurs only if ForwardHttpProxy is used, or ReverseHttpProxy or ReverseWebSocketProxy are employed with servers capable of sending a set-cookie response. A mitigation strategy involves avoiding the use of ForwardHttpProxy and not employing ReverseHttpProxy or ReverseWebSocketProxy with servers that might send a set-cookie response.
https://github.com/WSH032/fastapi-proxy-lib/pull/10/commits/056c72569bb5bc8268cadd73fa476f73b5fbc946 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-proxy-lib version greather then equal to 0,less then 0.1.0 have ### Response: Having vulnarability PVE-2024-99794 Advisory: fastapi-proxy-lib versions before 0.1.0 are vulnerable to information exposure when processing requests through shared usage of httpx.AsyncClient. This vulnerability allows an attacker to leak cookies among users by sending a set-cookie response header. It occurs only if ForwardHttpProxy is used, or ReverseHttpProxy or ReverseWebSocketProxy are employed with servers capable of sending a set-cookie response. A mitigation strategy involves avoiding the use of ForwardHttpProxy and not employing ReverseHttpProxy or ReverseWebSocketProxy with servers that might send a set-cookie response.
https://github.com/WSH032/fastapi-proxy-lib/pull/10/commits/056c72569bb5bc8268cadd73fa476f73b5fbc946 | what vulnarability does fastapi-proxy-lib version greather then equal to 0,less then 0.1.0 have | |
Having vulnarability CVE-2021-29510 Advisory: Fastapi-restful 0.3.1 includes a fix for the 'pydantic' dependency (update is required). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-restful version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Fastapi-restful 0.3.1 includes a fix for the 'pydantic' dependency (update is required). | what vulnarability does fastapi-restful version less then 0.3.1 have | |
Having vulnarability PVE-2023-52885 Advisory: Fastapi-toolkit 0.0.27 has a backdoor that adds a FastAPI route allowing a remote attacker to execute arbitrary python code and SQL queries in the context of the web application.
https://securitylabs.datadoghq.com/articles/malicious-pypi-package-fastapi-toolkit | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-toolkit version equal to 0.0.27 have ### Response: Having vulnarability PVE-2023-52885 Advisory: Fastapi-toolkit 0.0.27 has a backdoor that adds a FastAPI route allowing a remote attacker to execute arbitrary python code and SQL queries in the context of the web application.
https://securitylabs.datadoghq.com/articles/malicious-pypi-package-fastapi-toolkit | what vulnarability does fastapi-toolkit version equal to 0.0.27 have | |
Having vulnarability CVE-2022-29217 Advisory: Fastapi-users 10.0.6 updates its dependency 'pyjwt' to version '2.4.0' to include a security fix.
https://github.com/fastapi-users/fastapi-users/pull/1005
https://github.com/advisories/GHSA-ffqj-6fqr-9h24 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastapi-users version less then 10.0.6 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Fastapi-users 10.0.6 updates its dependency 'pyjwt' to version '2.4.0' to include a security fix.
https://github.com/fastapi-users/fastapi-users/pull/1005
https://github.com/advisories/GHSA-ffqj-6fqr-9h24 | what vulnarability does fastapi-users version less then 10.0.6 have | |
Having vulnarability CVE-2023-48699 Advisory: Fastbots 0.1.5 includes a fix for CVE-2023-48699: Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to RCE. The vulnerability is in the function 'def __locator__(self, locator_name: str)' in 'page.py'.
https://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastbots version less then 0.1.5 have ### Response: Having vulnarability CVE-2023-48699 Advisory: Fastbots 0.1.5 includes a fix for CVE-2023-48699: Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to RCE. The vulnerability is in the function 'def __locator__(self, locator_name: str)' in 'page.py'.
https://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9 | what vulnarability does fastbots version less then 0.1.5 have | |
Having vulnarability CVE-2020-12607 Advisory: An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fastecdsa version less then 2.1.2 have ### Response: Having vulnarability CVE-2020-12607 Advisory: An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail. | what vulnarability does fastecdsa version less then 2.1.2 have | |
Having vulnarability PVE-2022-51675 Advisory: Fatnoob is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fatnoob version greather then 0 have ### Response: Having vulnarability PVE-2022-51675 Advisory: Fatnoob is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does fatnoob version greather then 0 have | |
Having vulnarability PVE-2023-62037 Advisory: Faucet 1.10.1 includes a fix for a potential path traversal vulnerability.
https://github.com/faucetsdn/faucet/pull/3876 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does faucet version less then 1.10.1 have ### Response: Having vulnarability PVE-2023-62037 Advisory: Faucet 1.10.1 includes a fix for a potential path traversal vulnerability.
https://github.com/faucetsdn/faucet/pull/3876 | what vulnarability does faucet version less then 1.10.1 have | |
Having vulnarability CVE-2022-2514 Advisory: The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fava version greather then equal to 0,less then 1.22 have ### Response: Having vulnarability CVE-2022-2514 Advisory: The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim. | what vulnarability does fava version greather then equal to 0,less then 1.22 have | |
Having vulnarability CVE-2021-33503 Advisory: Fbpcp 0.2.2 updates its dependency 'urllib3' to v1.26.7 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fbpcp version less then 0.2.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Fbpcp 0.2.2 updates its dependency 'urllib3' to v1.26.7 to include security fixes. | what vulnarability does fbpcp version less then 0.2.2 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.