output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2022-48009 Advisory: Feast 0.1.2 (Python SDK) includes Feast Core and UI, which update dependencies to include security fixes.
https://github.com/feast-dev/feast/commit/93e08927baf58e068efba186d91e8b1951ce88b0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does feast version less then 0.1.2 have ### Response: Having vulnarability PVE-2022-48009 Advisory: Feast 0.1.2 (Python SDK) includes Feast Core and UI, which update dependencies to include security fixes.
https://github.com/feast-dev/feast/commit/93e08927baf58e068efba186d91e8b1951ce88b0 | what vulnarability does feast version less then 0.1.2 have | |
Having vulnarability CVE-2023-32309 Advisory: Featurebyte 0.3.0 updates its dependency 'pymdown-extensions' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does featurebyte version less then 0.3.0 have ### Response: Having vulnarability CVE-2023-32309 Advisory: Featurebyte 0.3.0 updates its dependency 'pymdown-extensions' to include a security fix. | what vulnarability does featurebyte version less then 0.3.0 have | |
Having vulnarability PVE-2021-25814 Advisory: featureserver before 1.06 allowed JSON callbacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does featureserver version less then 1.06 have ### Response: Having vulnarability PVE-2021-25814 Advisory: featureserver before 1.06 allowed JSON callbacks. | what vulnarability does featureserver version less then 1.06 have | |
Having vulnarability PVE-2021-40139 Advisory: Fedcloudclient 1.1.0 improves error checking and enhances security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedcloudclient version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-40139 Advisory: Fedcloudclient 1.1.0 improves error checking and enhances security. | what vulnarability does fedcloudclient version less then 1.1.0 have | |
Having vulnarability CVE-2017-1000001 Advisory: FedMsg 0.18.1 and older is vulnerable to a message validation flaw resulting in message validation not being enabled if configured to be on. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedmsg version less then 0.18.2 have ### Response: Having vulnarability CVE-2017-1000001 Advisory: FedMsg 0.18.1 and older is vulnerable to a message validation flaw resulting in message validation not being enabled if configured to be on. | what vulnarability does fedmsg version less then 0.18.2 have | |
Having vulnarability PVE-2021-40830 Advisory: Fedn 0.2.3 includes several bugfixes and security patches. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedn version less then 0.2.3 have ### Response: Having vulnarability PVE-2021-40830 Advisory: Fedn 0.2.3 includes several bugfixes and security patches. | what vulnarability does fedn version less then 0.2.3 have | |
Having vulnarability PVE-2021-38173 Advisory: Fedora 0.3.10 has some methods to help deal with CSRF, which is a vulnerability that can allow malicious web sites to execute server methods on behalf of an authenticated user. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedora version less then 0.3.10 have ### Response: Having vulnarability PVE-2021-38173 Advisory: Fedora 0.3.10 has some methods to help deal with CSRF, which is a vulnerability that can allow malicious web sites to execute server methods on behalf of an authenticated user. | what vulnarability does fedora version less then 0.3.10 have | |
Having vulnarability PVE-2022-50962 Advisory: Fedsim 0.7.0 updates algorithms to prevent reading from a client's storage data from another one.
https://github.com/varnio/fedsim/issues/18 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fedsim version less then 0.7.0 have ### Response: Having vulnarability PVE-2022-50962 Advisory: Fedsim 0.7.0 updates algorithms to prevent reading from a client's storage data from another one.
https://github.com/varnio/fedsim/issues/18 | what vulnarability does fedsim version less then 0.7.0 have | |
Having vulnarability CVE-2020-5227 Advisory: Feedgen (python feedgen) before 0.9.0 is susceptible to XML Denial of Service attacks. The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to XML Denial of Service Attacks (e.g. XML Bomb). This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only. This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources. See: CVE-2020-5227. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does feedgen version less then 0.9.0 have ### Response: Having vulnarability CVE-2020-5227 Advisory: Feedgen (python feedgen) before 0.9.0 is susceptible to XML Denial of Service attacks. The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to XML Denial of Service Attacks (e.g. XML Bomb). This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only. This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources. See: CVE-2020-5227. | what vulnarability does feedgen version less then 0.9.0 have | |
Having vulnarability CVE-2009-5065 Advisory: Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does feedparser version less then 5.0 have ### Response: Having vulnarability CVE-2009-5065 Advisory: Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas. | what vulnarability does feedparser version less then 5.0 have | |
Having vulnarability PVE-2022-51688 Advisory: Felpesviadinho is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does felpesviadinho version greather then 0 have ### Response: Having vulnarability PVE-2022-51688 Advisory: Felpesviadinho is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does felpesviadinho version greather then 0 have | |
Having vulnarability PVE-2023-52890 Advisory: Fequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fequests version greather then 0 have ### Response: Having vulnarability PVE-2023-52890 Advisory: Fequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does fequests version greather then 0 have | |
Having vulnarability CVE-2024-26130 Advisory: Fflogsapi version 2.1.0 upgrades its cryptography library to version 42.0.5 from 39.0.1 to address the security issue CVE-2024-26130. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fflogsapi version less then 2.1.0 have ### Response: Having vulnarability CVE-2024-26130 Advisory: Fflogsapi version 2.1.0 upgrades its cryptography library to version 42.0.5 from 39.0.1 to address the security issue CVE-2024-26130. | what vulnarability does fflogsapi version less then 2.1.0 have | |
Having vulnarability PVE-2023-59831 Advisory: Ffmpeg-normalize 1.24.0 includes a fix for a Race Condition vulnerability.
https://github.com/slhck/ffmpeg-normalize/commit/daf1bf15dde81e5916b8fb4c7853c833e89328f9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ffmpeg-normalize version less then 1.24.0 have ### Response: Having vulnarability PVE-2023-59831 Advisory: Ffmpeg-normalize 1.24.0 includes a fix for a Race Condition vulnerability.
https://github.com/slhck/ffmpeg-normalize/commit/daf1bf15dde81e5916b8fb4c7853c833e89328f9 | what vulnarability does ffmpeg-normalize version less then 1.24.0 have | |
Having vulnarability CVE-2023-4863 Advisory: Ffpyplayer 4.2.0 throughout 4.3.2 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.
https://inspector.pypi.io/project/ffpyplayer/4.3.2/packages/fb/0f/444815d4aebc8c9a4a4e11298bab6a86c0d91ba29d83e853224fd61d5c66/ffpyplayer-4.3.2-cp39-cp39-macosx_10_9_x86_64.macosx_10_9_intel.macosx_10_10_intel.macosx_10_10_x86_64.whl | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ffpyplayer version greather then equal to 4.2.0,less then equal to 4.3.2 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Ffpyplayer 4.2.0 throughout 4.3.2 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.
https://inspector.pypi.io/project/ffpyplayer/4.3.2/packages/fb/0f/444815d4aebc8c9a4a4e11298bab6a86c0d91ba29d83e853224fd61d5c66/ffpyplayer-4.3.2-cp39-cp39-macosx_10_9_x86_64.macosx_10_9_intel.macosx_10_10_intel.macosx_10_10_x86_64.whl | what vulnarability does ffpyplayer version greather then equal to 4.2.0,less then equal to 4.3.2 have | |
Having vulnarability CVE-2017-12852 Advisory: Fhir-pyrate 0.2.0 requires 'numpy' versions '^1.22' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fhir-pyrate version less then 0.2.0 have ### Response: Having vulnarability CVE-2017-12852 Advisory: Fhir-pyrate 0.2.0 requires 'numpy' versions '^1.22' to include security fixes. | what vulnarability does fhir-pyrate version less then 0.2.0 have | |
Having vulnarability CVE-2023-37480 Advisory: The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack. Attackers can exploit a weakness in the connector template upload feature to upload a malicious zip bomb file, resulting in resource exhaustion and service unavailability for all users of the Fides webserver. This vulnerability affects Fides versions `2.11.0` through `2.15.1`. Exploitation is limited to users with elevated privileges with the `CONNECTOR_TEMPLATE_REGISTER` scope, which includes root users and users with the owner role. The vulnerability has been patched in Fides version `2.16.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There is no known workaround to remediate this vulnerability without upgrading. If an attack occurs, the impact can be mitigated by manually or automatically restarting the affected container. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fidesops version greather then equal to 2.11.0,less then 2.16.0 have ### Response: Having vulnarability CVE-2023-37480 Advisory: The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack. Attackers can exploit a weakness in the connector template upload feature to upload a malicious zip bomb file, resulting in resource exhaustion and service unavailability for all users of the Fides webserver. This vulnerability affects Fides versions `2.11.0` through `2.15.1`. Exploitation is limited to users with elevated privileges with the `CONNECTOR_TEMPLATE_REGISTER` scope, which includes root users and users with the owner role. The vulnerability has been patched in Fides version `2.16.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There is no known workaround to remediate this vulnerability without upgrading. If an attack occurs, the impact can be mitigated by manually or automatically restarting the affected container. | what vulnarability does fidesops version greather then equal to 2.11.0,less then 2.16.0 have | |
Having vulnarability CVE-2021-25288 Advisory: Fiduswriter 3.9.24 updates its dependency 'pillow' to v8.2.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fiduswriter version less then 3.9.24 have ### Response: Having vulnarability CVE-2021-25288 Advisory: Fiduswriter 3.9.24 updates its dependency 'pillow' to v8.2.0 to include security fixes. | what vulnarability does fiduswriter version less then 3.9.24 have | |
Having vulnarability PVE-2023-99961 Advisory: Fief-server 0.25.3 includes a fix for a Server-Side Template Injection (SSTI) vulnerability. This could be exploited by an attacker, who could take advantage of this issue to implement code on the base system by modifying values in the embedded template. Achieving this can lead to the attacker operating commands with permissions under the manipulated process or utilizing Cross-Site Scripting (XSS) for executing code within the user's browser. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fief-server version less then 0.25.3 have ### Response: Having vulnarability PVE-2023-99961 Advisory: Fief-server 0.25.3 includes a fix for a Server-Side Template Injection (SSTI) vulnerability. This could be exploited by an attacker, who could take advantage of this issue to implement code on the base system by modifying values in the embedded template. Achieving this can lead to the attacker operating commands with permissions under the manipulated process or utilizing Cross-Site Scripting (XSS) for executing code within the user's browser. | what vulnarability does fief-server version less then 0.25.3 have | |
Having vulnarability CVE-2024-28219 Advisory: Fin-maestro-kin 0.2.2 updates its dependency 'pillow' to version 10.3.0 to include a fix for a Buffer Overflow vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fin-maestro-kin version less then 0.2.2 have ### Response: Having vulnarability CVE-2024-28219 Advisory: Fin-maestro-kin 0.2.2 updates its dependency 'pillow' to version 10.3.0 to include a fix for a Buffer Overflow vulnerability. | what vulnarability does fin-maestro-kin version less then 0.2.2 have | |
Having vulnarability PVE-2021-37466 Advisory: Fincity-django-allauth 0.18.0 requires the 'AUDIENCE' parameter to be explicitly configured, as required by the Persona specification for security reasons.
https://bugzilla.mozilla.org/show_bug.cgi?id=1051025 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fincity-django-allauth version less then 0.18.0 have ### Response: Having vulnarability PVE-2021-37466 Advisory: Fincity-django-allauth 0.18.0 requires the 'AUDIENCE' parameter to be explicitly configured, as required by the Persona specification for security reasons.
https://bugzilla.mozilla.org/show_bug.cgi?id=1051025 | what vulnarability does fincity-django-allauth version less then 0.18.0 have | |
Having vulnarability CVE-2023-38545 Advisory: Fiona 1.9.4.post1 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fiona version less then equal to 1.9.4.post1 have ### Response: Having vulnarability CVE-2023-38545 Advisory: Fiona 1.9.4.post1 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability. | what vulnarability does fiona version less then equal to 1.9.4.post1 have | |
Having vulnarability CVE-2021-28363 Advisory: Firefly-cli 0.0.10 updates its urllib3 dependency to version 1.26.4 from the earlier 1.26.2, in response to a security vulnerability.
https://github.com/afonsoc12/firefly-cli/commit/bcf967ccfe63e0e8f2750b2d534af5d5969a8ec7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does firefly-cli version less then 0.0.10 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Firefly-cli 0.0.10 updates its urllib3 dependency to version 1.26.4 from the earlier 1.26.2, in response to a security vulnerability.
https://github.com/afonsoc12/firefly-cli/commit/bcf967ccfe63e0e8f2750b2d534af5d5969a8ec7 | what vulnarability does firefly-cli version less then 0.0.10 have | |
Having vulnarability PVE-2022-48146 Advisory: Firepit 1.3.0 adds SQL injection protection in query classes.
https://github.com/opencybersecurityalliance/firepit/commit/20e4debe54c9999e9b96eb923c1b0f0f878491c9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does firepit version less then 1.3.0 have ### Response: Having vulnarability PVE-2022-48146 Advisory: Firepit 1.3.0 adds SQL injection protection in query classes.
https://github.com/opencybersecurityalliance/firepit/commit/20e4debe54c9999e9b96eb923c1b0f0f878491c9 | what vulnarability does firepit version less then 1.3.0 have | |
Having vulnarability PVE-2021-39442 Advisory: Firepyer 0.0.2 adds system, security policy and ICMP methods. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does firepyer version less then 0.0.2 have ### Response: Having vulnarability PVE-2021-39442 Advisory: Firepyer 0.0.2 adds system, security policy and ICMP methods. | what vulnarability does firepyer version less then 0.0.2 have | |
Having vulnarability CVE-2023-30861 Advisory: Firetail 1.0.10 updates its dependency 'flask' to v2.2.5 to include a security fix.
https://github.com/FireTail-io/firetail-py-lib/pull/28 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does firetail version less then 1.0.10 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Firetail 1.0.10 updates its dependency 'flask' to v2.2.5 to include a security fix.
https://github.com/FireTail-io/firetail-py-lib/pull/28 | what vulnarability does firetail version less then 1.0.10 have | |
Having vulnarability CVE-2018-3847 Advisory: Fitsblender 0.4.2 updates its dependency 'astropy' requirement to versions >=5.0.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fitsblender version less then 0.4.2 have ### Response: Having vulnarability CVE-2018-3847 Advisory: Fitsblender 0.4.2 updates its dependency 'astropy' requirement to versions >=5.0.4 to include security fixes. | what vulnarability does fitsblender version less then 0.4.2 have | |
Having vulnarability PVE-2022-44973 Advisory: Fittrackee 0.5.7 sets autoescape on jinja templates.
https://github.com/SamR1/FitTrackee/pull/152 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fittrackee version less then 0.5.7 have ### Response: Having vulnarability PVE-2022-44973 Advisory: Fittrackee 0.5.7 sets autoescape on jinja templates.
https://github.com/SamR1/FitTrackee/pull/152 | what vulnarability does fittrackee version less then 0.5.7 have | |
Having vulnarability PVE-2024-65087 Advisory: Fl4health version 0.1.11 upgrades its Jinja2 dependency to version 3.1.3 as a corrective measure for the security vulnerability identified as CVE-2024-22195. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fl4health version less then 0.1.11 have ### Response: Having vulnarability PVE-2024-65087 Advisory: Fl4health version 0.1.11 upgrades its Jinja2 dependency to version 3.1.3 as a corrective measure for the security vulnerability identified as CVE-2024-22195. | what vulnarability does fl4health version less then 0.1.11 have | |
Having vulnarability CVE-2020-28493 Advisory: Flafl 0.0.5 updates its dependency 'jinja2' to v2.11.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flafl version less then 0.0.5 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Flafl 0.0.5 updates its dependency 'jinja2' to v2.11.3 to include a security fix. | what vulnarability does flafl version less then 0.0.5 have | |
Having vulnarability PVE-2021-38138 Advisory: Flambe 0.4.16 fixes a vulnerability with PyYAML < 5.3.1. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flambe version less then 0.4.16 have ### Response: Having vulnarability PVE-2021-38138 Advisory: Flambe 0.4.16 fixes a vulnerability with PyYAML < 5.3.1. | what vulnarability does flambe version less then 0.4.16 have | |
Having vulnarability CVE-2017-18342 Advisory: Flashfocus 1.2.1 updates pyyaml version to >=4.2b1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flashfocus version less then 1.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Flashfocus 1.2.1 updates pyyaml version to >=4.2b1 to include a security fix. | what vulnarability does flashfocus version less then 1.2.1 have | |
Having vulnarability CVE-2021-28363 Advisory: Flashgeotext version 0.3.1 updates its urllib3 dependency to 1.26.4 from 1.26.3, addressing the security vulnerability CVE-2021-28363.
https://github.com/iwpnd/flashgeotext/commit/e2f9f303fbd99a92a053228f6e8a18d9ae4fdc22 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flashgeotext version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Flashgeotext version 0.3.1 updates its urllib3 dependency to 1.26.4 from 1.26.3, addressing the security vulnerability CVE-2021-28363.
https://github.com/iwpnd/flashgeotext/commit/e2f9f303fbd99a92a053228f6e8a18d9ae4fdc22 | what vulnarability does flashgeotext version less then 0.3.1 have | |
Having vulnarability CVE-2018-1000656 Advisory: flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask version less then 0.12.3 have ### Response: Having vulnarability CVE-2018-1000656 Advisory: flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. | what vulnarability does flask version less then 0.12.3 have | |
Having vulnarability PVE-2021-25821 Advisory: Flask-admin 1.3.0 fixes an XSS vulnerability escaping html in column_editable_list values in the WTForms widget.
https://github.com/flask-admin/flask-admin/commit/f447db0c78c03235d0dd6bdce0c5365fc6a7c321
https://github.com/flask-admin/flask-admin/pull/1002
https://github.com/flask-admin/flask-admin/issues/1000 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-admin version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-25821 Advisory: Flask-admin 1.3.0 fixes an XSS vulnerability escaping html in column_editable_list values in the WTForms widget.
https://github.com/flask-admin/flask-admin/commit/f447db0c78c03235d0dd6bdce0c5365fc6a7c321
https://github.com/flask-admin/flask-admin/pull/1002
https://github.com/flask-admin/flask-admin/issues/1000 | what vulnarability does flask-admin version less then 1.3.0 have | |
Having vulnarability CVE-2021-23980 Advisory: Flask-api-tools 1.6.2 updates its dependency 'bleach' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-api-tools version less then 1.6.2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Flask-api-tools 1.6.2 updates its dependency 'bleach' to include a security fix. | what vulnarability does flask-api-tools version less then 1.6.2 have | |
Having vulnarability PVE-2021-37060 Advisory: Flask-appbuilder 0.2.0 includes reset password corrections. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-appbuilder version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-37060 Advisory: Flask-appbuilder 0.2.0 includes reset password corrections. | what vulnarability does flask-appbuilder version less then 0.2.0 have | |
Having vulnarability PVE-2021-25822 Advisory: Flask-async 0.6.1 fixes a security problem that allowed clients to download arbitrary files if the host server was a windows based operating system and the client used backslashes to escape the directory the files where exposed from.
https://github.com/mrdon/flask/commit/aeed530e3221c1b445c13269dcd2fb67548bcefc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-async version less then 0.6.1 have ### Response: Having vulnarability PVE-2021-25822 Advisory: Flask-async 0.6.1 fixes a security problem that allowed clients to download arbitrary files if the host server was a windows based operating system and the client used backslashes to escape the directory the files where exposed from.
https://github.com/mrdon/flask/commit/aeed530e3221c1b445c13269dcd2fb67548bcefc | what vulnarability does flask-async version less then 0.6.1 have | |
Having vulnarability CVE-2021-33026 Advisory: Flask-caching is vulnerable to CVE-2021-33026: Flask-Caching extension for Flask relies on Pickle for deserialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code.
NOTE: Project maintainers indicate that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision.
https://github.com/pallets-eco/flask-caching/pull/209 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-caching version less then equal to 1.10.1 have ### Response: Having vulnarability CVE-2021-33026 Advisory: Flask-caching is vulnerable to CVE-2021-33026: Flask-Caching extension for Flask relies on Pickle for deserialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code.
NOTE: Project maintainers indicate that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision.
https://github.com/pallets-eco/flask-caching/pull/209 | what vulnarability does flask-caching version less then equal to 1.10.1 have | |
Having vulnarability CVE-2020-25032 Advisory: Flask-CORS before 3.0.9 allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. See CVE-2020-25032. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-cors version less then 3.0.9 have ### Response: Having vulnarability CVE-2020-25032 Advisory: Flask-CORS before 3.0.9 allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. See CVE-2020-25032. | what vulnarability does flask-cors version less then 3.0.9 have | |
Having vulnarability CVE-2017-18342 Advisory: Flask-exceptions 1.2.2 updates its dependency 'pyyaml' minimum version to v4.2b1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-exceptions version less then 1.2.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Flask-exceptions 1.2.2 updates its dependency 'pyyaml' minimum version to v4.2b1 to include a security fix. | what vulnarability does flask-exceptions version less then 1.2.2 have | |
Having vulnarability CVE-2019-10906 Advisory: Flask-flatpages 0.7.1 updates its dependency 'jinja2' to v2.10.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-flatpages version less then 0.7.1 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Flask-flatpages 0.7.1 updates its dependency 'jinja2' to v2.10.1 to include a security fix. | what vulnarability does flask-flatpages version less then 0.7.1 have | |
Having vulnarability PVE-2022-52571 Advisory: Flask-hashids 1.0.0 stop using SECRET_KEY as a salt, which made it recoverable.
https://github.com/Pevtrick/Flask-Hashids/pull/6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-hashids version less then 1.0.0 have ### Response: Having vulnarability PVE-2022-52571 Advisory: Flask-hashids 1.0.0 stop using SECRET_KEY as a salt, which made it recoverable.
https://github.com/Pevtrick/Flask-Hashids/pull/6 | what vulnarability does flask-hashids version less then 1.0.0 have | |
Having vulnarability CVE-2018-18074 Advisory: Flask-i18n 1.1.1 updates its dependency 'requests' to v2.21.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-i18n version less then 1.1.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Flask-i18n 1.1.1 updates its dependency 'requests' to v2.21.0 to include a security fix. | what vulnarability does flask-i18n version less then 1.1.1 have | |
Having vulnarability PVE-2021-25823 Advisory: flask-images 1.1.3 fixes 3 security bugs, each of which would allow for reading any image on disk. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-images version less then 1.1.3 have ### Response: Having vulnarability PVE-2021-25823 Advisory: flask-images 1.1.3 fixes 3 security bugs, each of which would allow for reading any image on disk. | what vulnarability does flask-images version less then 1.1.3 have | |
Having vulnarability PVE-2021-36997 Advisory: flask-ipban 0.2.2 fixes a yaml loading vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-ipban version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-36997 Advisory: flask-ipban 0.2.2 fixes a yaml loading vulnerability. | what vulnarability does flask-ipban version less then 0.2.2 have | |
Having vulnarability PVE-2021-25824 Advisory: flask-micropub 0.2.2 fixes a vulnerability; re-discover the authorization_endpoint and token_endpoint at each stage in the flow. Prevents a buggy or malicious authorization_endpoint from giving you credentials for another user's domain name. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-micropub version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-25824 Advisory: flask-micropub 0.2.2 fixes a vulnerability; re-discover the authorization_endpoint and token_endpoint at each stage in the flow. Prevents a buggy or malicious authorization_endpoint from giving you credentials for another user's domain name. | what vulnarability does flask-micropub version less then 0.2.2 have | |
Having vulnarability PVE-2021-37847 Advisory: flask-monitoring 1.10.0 adds security for automatic endpoint-data retrieval | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-monitoring version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-37847 Advisory: flask-monitoring 1.10.0 adds security for automatic endpoint-data retrieval | what vulnarability does flask-monitoring version less then 1.10.0 have | |
Having vulnarability PVE-2021-25825 Advisory: Flask-oauthlib before 0.9.1 didn't verify client_secret when authenticating non-confidential clients.
https://github.com/lepture/flask-oauthlib/commit/829fdea095d2dac9cc03eb41b2e9946225c995fb | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-oauthlib version less then 0.9.1 have ### Response: Having vulnarability PVE-2021-25825 Advisory: Flask-oauthlib before 0.9.1 didn't verify client_secret when authenticating non-confidential clients.
https://github.com/lepture/flask-oauthlib/commit/829fdea095d2dac9cc03eb41b2e9946225c995fb | what vulnarability does flask-oauthlib version less then 0.9.1 have | |
Having vulnarability CVE-2016-1000001 Advisory: flask-oidc version 0.1.2 and earlier is vulnerable to an open redirect | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-oidc version less then 0.1.2 have ### Response: Having vulnarability CVE-2016-1000001 Advisory: flask-oidc version 0.1.2 and earlier is vulnerable to an open redirect | what vulnarability does flask-oidc version less then 0.1.2 have | |
Having vulnarability PVE-2021-41280 Advisory: Flask-pagedown 0.1.4 uses secure URLs when request is secure.
https://github.com/miguelgrinberg/flask-pagedown/issues/3
https://github.com/miguelgrinberg/flask-pagedown/commit/50ba142994e47d584f5bdf083e0c47f4a9209aa4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-pagedown version less then 0.1.4 have ### Response: Having vulnarability PVE-2021-41280 Advisory: Flask-pagedown 0.1.4 uses secure URLs when request is secure.
https://github.com/miguelgrinberg/flask-pagedown/issues/3
https://github.com/miguelgrinberg/flask-pagedown/commit/50ba142994e47d584f5bdf083e0c47f4a9209aa4 | what vulnarability does flask-pagedown version less then 0.1.4 have | |
Having vulnarability PVE-2021-39225 Advisory: Flask-pyoidc before 3.7.0 did not properly validate the ID token according to the OIDC specification. It also still depended on a pyoidc version that is now known to not be secure. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-pyoidc version less then 3.7.0 have ### Response: Having vulnarability PVE-2021-39225 Advisory: Flask-pyoidc before 3.7.0 did not properly validate the ID token according to the OIDC specification. It also still depended on a pyoidc version that is now known to not be secure. | what vulnarability does flask-pyoidc version less then 3.7.0 have | |
Having vulnarability PVE-2021-41218 Advisory: Flask-restless-ng 2.2.6 escapes user input in error messages to prevent potential server-side cross-site scripting. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-restless-ng version less then 2.2.6 have ### Response: Having vulnarability PVE-2021-41218 Advisory: Flask-restless-ng 2.2.6 escapes user input in error messages to prevent potential server-side cross-site scripting. | what vulnarability does flask-restless-ng version less then 2.2.6 have | |
Having vulnarability CVE-2021-32838 Advisory: Flask-restx version 0.5.1 includes a fix for CVE-2021-32838: Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex.
https://github.com/advisories/GHSA-3q6g-vf58-7m4g
https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51
https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da
https://github.com/python-restx/flask-restx/issues/372
https://pypi.org/project/flask-restx/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-restx version less then 0.5.1 have ### Response: Having vulnarability CVE-2021-32838 Advisory: Flask-restx version 0.5.1 includes a fix for CVE-2021-32838: Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex.
https://github.com/advisories/GHSA-3q6g-vf58-7m4g
https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51
https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da
https://github.com/python-restx/flask-restx/issues/372
https://pypi.org/project/flask-restx/ | what vulnarability does flask-restx version less then 0.5.1 have | |
Having vulnarability PVE-2021-27545 Advisory: Flask-security 1.6.0 makes AJAX requests now send a CSRF token for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-security version less then 1.6.0 have ### Response: Having vulnarability PVE-2021-27545 Advisory: Flask-security 1.6.0 makes AJAX requests now send a CSRF token for security reasons. | what vulnarability does flask-security version less then 1.6.0 have | |
Having vulnarability PVE-2021-25827 Advisory: flask-security-fork before 1.8.1 fixes a security bug when validating a confirmation token, also checks if the email that the token was created with matches the user's current email. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-security-fork version less then 1.8.1 have ### Response: Having vulnarability PVE-2021-25827 Advisory: flask-security-fork before 1.8.1 fixes a security bug when validating a confirmation token, also checks if the email that the token was created with matches the user's current email. | what vulnarability does flask-security-fork version less then 1.8.1 have | |
Having vulnarability PVE-2022-44913 Advisory: Flask-security-invenio 1.6.0 makes AJAX requests now send a CSRF token for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-security-invenio version less then 1.6.0 have ### Response: Having vulnarability PVE-2022-44913 Advisory: Flask-security-invenio 1.6.0 makes AJAX requests now send a CSRF token for security reasons. | what vulnarability does flask-security-invenio version less then 1.6.0 have | |
Having vulnarability CVE-2021-32618 Advisory: Flask-security-too 4.1.0 includes a fix for CVE-2021-32618: Flask-Security-Too allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want. This is considered a low severity due to the fact that if Werkzeug is used (which is very common with Flask applications) as the WSGI layer, it by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False'.
https://github.com/Flask-Middleware/flask-security/commit/e39bb04615050448c1b8ba4caa7dacc0edd3e405 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-security-too version less then 4.1.0 have ### Response: Having vulnarability CVE-2021-32618 Advisory: Flask-security-too 4.1.0 includes a fix for CVE-2021-32618: Flask-Security-Too allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want. This is considered a low severity due to the fact that if Werkzeug is used (which is very common with Flask applications) as the WSGI layer, it by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False'.
https://github.com/Flask-Middleware/flask-security/commit/e39bb04615050448c1b8ba4caa7dacc0edd3e405 | what vulnarability does flask-security-too version less then 4.1.0 have | |
Having vulnarability CVE-2022-24880 Advisory: Flask-session-captcha 1.2.1 includes a fix for CVE-2022-24880: In versions prior to 1.2.1, the 'captcha.validate()' function would return 'None' if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.
https://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-session-captcha version less then 1.2.1 have ### Response: Having vulnarability CVE-2022-24880 Advisory: Flask-session-captcha 1.2.1 includes a fix for CVE-2022-24880: In versions prior to 1.2.1, the 'captcha.validate()' function would return 'None' if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.
https://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45 | what vulnarability does flask-session-captcha version less then 1.2.1 have | |
Having vulnarability PVE-2021-39139 Advisory: Flask-sieve 1.0.4 fixes some vulnerabilities by updating the werkzeug package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-sieve version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-39139 Advisory: Flask-sieve 1.0.4 fixes some vulnerabilities by updating the werkzeug package. | what vulnarability does flask-sieve version less then 1.0.4 have | |
Having vulnarability PVE-2021-37309 Advisory: Flask-socketio 4.2.0 addresses potential websocket cross-origin attacks. See: <https://github.com/miguelgrinberg/python-engineio/issues/128>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-socketio version less then 4.2.0 have ### Response: Having vulnarability PVE-2021-37309 Advisory: Flask-socketio 4.2.0 addresses potential websocket cross-origin attacks. See: <https://github.com/miguelgrinberg/python-engineio/issues/128>. | what vulnarability does flask-socketio version less then 4.2.0 have | |
Having vulnarability PVE-2023-53599 Advisory: Flask-squeeze 2.0.3 add BREACH exploit protection for dynamic resources.
https://github.com/mkrd/Flask-Squeeze/commit/3a20ec78a5c3f1db054bac06ab22ecfa25ae6482 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-squeeze version less then 2.0.3 have ### Response: Having vulnarability PVE-2023-53599 Advisory: Flask-squeeze 2.0.3 add BREACH exploit protection for dynamic resources.
https://github.com/mkrd/Flask-Squeeze/commit/3a20ec78a5c3f1db054bac06ab22ecfa25ae6482 | what vulnarability does flask-squeeze version less then 2.0.3 have | |
Having vulnarability PVE-2021-36813 Advisory: flask-statsdclient 2.0.2 is for security vulnerabilities | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-statsdclient version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-36813 Advisory: flask-statsdclient 2.0.2 is for security vulnerabilities | what vulnarability does flask-statsdclient version less then 2.0.2 have | |
Having vulnarability CVE-2021-23393 Advisory: This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-unchained version less then 0.9.0 have ### Response: Having vulnarability CVE-2021-23393 Advisory: This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | what vulnarability does flask-unchained version less then 0.9.0 have | |
Having vulnarability CVE-2021-23401 Advisory: This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-user version less then equal to 1.0.2.2 have ### Response: Having vulnarability CVE-2021-23401 Advisory: This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | what vulnarability does flask-user version less then equal to 1.0.2.2 have | |
Having vulnarability PVE-2021-42493 Advisory: Flask-wtf 0.9.3 fixes how CSRF tokens are verified.
https://github.com/wtforms/flask-wtf/pull/91/commits/91f70259660a106a49cd8cc2ccd137d47c9c393d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flask-wtf version less then 0.9.3 have ### Response: Having vulnarability PVE-2021-42493 Advisory: Flask-wtf 0.9.3 fixes how CSRF tokens are verified.
https://github.com/wtforms/flask-wtf/pull/91/commits/91f70259660a106a49cd8cc2ccd137d47c9c393d | what vulnarability does flask-wtf version less then 0.9.3 have | |
Having vulnarability CVE-2023-52289 Advisory: Flaskcode is affected by a path traversal vulnerability. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flaskcode version less then equal to 0.0.8 have ### Response: Having vulnarability CVE-2023-52289 Advisory: Flaskcode is affected by a path traversal vulnerability. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files. | what vulnarability does flaskcode version less then equal to 0.0.8 have | |
Having vulnarability CVE-2021-23980 Advisory: Flatplan 1.2.0 updates its dependency 'bleach' to v3.3.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flatplan version less then 1.2.0 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Flatplan 1.2.0 updates its dependency 'bleach' to v3.3.0 to include a security fix. | what vulnarability does flatplan version less then 1.2.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Flex 6.12.0 uses 'yaml.safe_load' to prevent a remote code execution vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flex version less then 6.12.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Flex 6.12.0 uses 'yaml.safe_load' to prevent a remote code execution vulnerability. | what vulnarability does flex version less then 6.12.0 have | |
Having vulnarability PVE-2023-62735 Advisory: Flexmeasures 0.17 upgrades the Pillow dependency to versions >=10.0.1 due to vulnerabilities present in earlier versions.
https://github.com/FlexMeasures/flexmeasures/pull/872/commits/843b9f1f385b016323242bbea3f464c86525c975 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flexmeasures version less then 0.17 have ### Response: Having vulnarability PVE-2023-62735 Advisory: Flexmeasures 0.17 upgrades the Pillow dependency to versions >=10.0.1 due to vulnerabilities present in earlier versions.
https://github.com/FlexMeasures/flexmeasures/pull/872/commits/843b9f1f385b016323242bbea3f464c86525c975 | what vulnarability does flexmeasures version less then 0.17 have | |
Having vulnarability CVE-2022-34749 Advisory: Flowchem 1.0.0a1 updates its dependency 'mistune' to v2.0.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flowchem version less then 1.0.0a1 have ### Response: Having vulnarability CVE-2022-34749 Advisory: Flowchem 1.0.0a1 updates its dependency 'mistune' to v2.0.3 to include a security fix. | what vulnarability does flowchem version less then 1.0.0a1 have | |
Having vulnarability CVE-2022-30034 Advisory: Flower 1.1.0 and prior are vulnerable to CVE-2022-30034: All versions as of 05-02-2022 are vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.
https://tprynn.github.io/2022/05/26/flower-vulns.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flower version less then 1.2.0 have ### Response: Having vulnarability CVE-2022-30034 Advisory: Flower 1.1.0 and prior are vulnerable to CVE-2022-30034: All versions as of 05-02-2022 are vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.
https://tprynn.github.io/2022/05/26/flower-vulns.html | what vulnarability does flower version less then 1.2.0 have | |
Having vulnarability PVE-2022-44776 Advisory: Flytekit 0.30.0 stops using unauthenticated git.
https://github.com/flyteorg/flytekit/pull/810 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does flytekit version less then 0.30.0 have ### Response: Having vulnarability PVE-2022-44776 Advisory: Flytekit 0.30.0 stops using unauthenticated git.
https://github.com/flyteorg/flytekit/pull/810 | what vulnarability does flytekit version less then 0.30.0 have | |
Having vulnarability CVE-2024-23334 Advisory: fmeval version 0.4.0 upgrades its aiohttp dependency to 3.9.3 from the earlier 3.9.1 in response to addressing the security vulnerability CVE-2024-23334.
https://github.com/aws/fmeval/pull/194/commits/b5a89e3912db8232670a44a908343038bb1fb5a4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fmeval version less then 0.4.0 have ### Response: Having vulnarability CVE-2024-23334 Advisory: fmeval version 0.4.0 upgrades its aiohttp dependency to 3.9.3 from the earlier 3.9.1 in response to addressing the security vulnerability CVE-2024-23334.
https://github.com/aws/fmeval/pull/194/commits/b5a89e3912db8232670a44a908343038bb1fb5a4 | what vulnarability does fmeval version less then 0.4.0 have | |
Having vulnarability CVE-2018-18074 Advisory: Fnapy 1.1.7 updates its dependency 'requests' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fnapy version less then 1.1.7 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Fnapy 1.1.7 updates its dependency 'requests' to include a security fix. | what vulnarability does fnapy version less then 1.1.7 have | |
Having vulnarability CVE-2023-4863 Advisory: Fondant 0.6.1 updates its dependency 'Pillow' to v10.0.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fondant version less then 0.6.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Fondant 0.6.1 updates its dependency 'Pillow' to v10.0.1 to include a security fix. | what vulnarability does fondant version less then 0.6.1 have | |
Having vulnarability CVE-2023-45139 Advisory: fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fonttools version greather then equal to 0,less then 4.43.0 have ### Response: Having vulnarability CVE-2023-45139 Advisory: fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0. | what vulnarability does fonttools version greather then equal to 0,less then 4.43.0 have | |
Having vulnarability PVE-2021-25828 Advisory: In foolscap before 0.7.0 the "flappserver" feature was found to have a vulnerability in the service-lookup code which, when combined with an attacker who has the ability to write files to a location where the flappserver process could read them, would allow that attacker to obtain control of the flappserver process.
https://github.com/warner/foolscap/commit/e35ce531a8d7763f7c37e7229dec4f1021d7ecc1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does foolscap version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-25828 Advisory: In foolscap before 0.7.0 the "flappserver" feature was found to have a vulnerability in the service-lookup code which, when combined with an attacker who has the ability to write files to a location where the flappserver process could read them, would allow that attacker to obtain control of the flappserver process.
https://github.com/warner/foolscap/commit/e35ce531a8d7763f7c37e7229dec4f1021d7ecc1 | what vulnarability does foolscap version less then 0.7.0 have | |
Having vulnarability CVE-2007-4559 Advisory: Forcebalance 1.9.5 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does forcebalance version less then 1.9.5 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Forcebalance 1.9.5 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does forcebalance version less then 1.9.5 have | |
Having vulnarability PVE-2021-34711 Advisory: Form-designer 0.8 fixes an XSS vulnerability in the administration panel.
https://github.com/feincms/form_designer/pull/18/commits/bc252a4bf3d610c9beaf83ffa39d66f2cbbcc5cd
https://github.com/feincms/form_designer/commit/0e93601195f4c22c84ee1704de34e5331816188b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does form-designer version less then 0.8 have ### Response: Having vulnarability PVE-2021-34711 Advisory: Form-designer 0.8 fixes an XSS vulnerability in the administration panel.
https://github.com/feincms/form_designer/pull/18/commits/bc252a4bf3d610c9beaf83ffa39d66f2cbbcc5cd
https://github.com/feincms/form_designer/commit/0e93601195f4c22c84ee1704de34e5331816188b | what vulnarability does form-designer version less then 0.8 have | |
Having vulnarability PVE-2021-25829 Advisory: Formbar 0.9 fixes a potential code injection issue by removing the rule parsing out of formbar and by using brabbel library for rule parsing and evaluation.
https://github.com/ringo-framework/formbar/commit/bcbcf67fc68c37dd12528e3ddcacd712e4e0e64d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does formbar version less then 0.9 have ### Response: Having vulnarability PVE-2021-25829 Advisory: Formbar 0.9 fixes a potential code injection issue by removing the rule parsing out of formbar and by using brabbel library for rule parsing and evaluation.
https://github.com/ringo-framework/formbar/commit/bcbcf67fc68c37dd12528e3ddcacd712e4e0e64d | what vulnarability does formbar version less then 0.9 have | |
Having vulnarability CVE-2008-6547 Advisory: schema.py in FormEncode for Python (python-formencode) 1.0 does not apply the chained_validators feature, which allows attackers to bypass intended access restrictions via unknown vectors. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does formencode version less then 1.0 have ### Response: Having vulnarability CVE-2008-6547 Advisory: schema.py in FormEncode for Python (python-formencode) 1.0 does not apply the chained_validators feature, which allows attackers to bypass intended access restrictions via unknown vectors. | what vulnarability does formencode version less then 1.0 have | |
Having vulnarability CVE-2024-3651 Advisory: Fortitudo-tech version 1.0.6 updates its idna library from version 3.6 to 3.7 to address the vulnerability described in CVE-2024-3651. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fortitudo-tech version less then 1.0.6 have ### Response: Having vulnarability CVE-2024-3651 Advisory: Fortitudo-tech version 1.0.6 updates its idna library from version 3.6 to 3.7 to address the vulnerability described in CVE-2024-3651. | what vulnarability does fortitudo-tech version less then 1.0.6 have | |
Having vulnarability PVE-2023-62077 Advisory: A vulnerability patch has been integrated into Fosslight-android version 4.1.15. Earlier versions may have hard-coded sensitive credentials and lacked measures to counter potential SQL injection vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-android version less then 4.1.15 have ### Response: Having vulnarability PVE-2023-62077 Advisory: A vulnerability patch has been integrated into Fosslight-android version 4.1.15. Earlier versions may have hard-coded sensitive credentials and lacked measures to counter potential SQL injection vulnerabilities. | what vulnarability does fosslight-android version less then 4.1.15 have | |
Having vulnarability PVE-2023-61797 Advisory: Fosslight-dependency 3.13.5 includes a fix for a XXE vulnerability.
https://github.com/fosslight/fosslight_dependency_scanner/pull/171 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-dependency version less then 3.13.5 have ### Response: Having vulnarability PVE-2023-61797 Advisory: Fosslight-dependency 3.13.5 includes a fix for a XXE vulnerability.
https://github.com/fosslight/fosslight_dependency_scanner/pull/171 | what vulnarability does fosslight-dependency version less then 3.13.5 have | |
Having vulnarability PVE-2023-60863 Advisory: Fosslight-scanner 1.7.16 includes a fix for a Command Injection vulnerability.
https://github.com/fosslight/fosslight_scanner/pull/69 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-scanner version less then 1.7.16 have ### Response: Having vulnarability PVE-2023-60863 Advisory: Fosslight-scanner 1.7.16 includes a fix for a Command Injection vulnerability.
https://github.com/fosslight/fosslight_scanner/pull/69 | what vulnarability does fosslight-scanner version less then 1.7.16 have | |
Having vulnarability CVE-2022-40898 Advisory: Fosslight-source 1.7.2 updates its dependency 'wheel' to include a fix for a ReDoS vulnerability.
https://github.com/fosslight/fosslight_source_scanner/pull/138 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-source version less then 1.7.2 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Fosslight-source 1.7.2 updates its dependency 'wheel' to include a fix for a ReDoS vulnerability.
https://github.com/fosslight/fosslight_source_scanner/pull/138 | what vulnarability does fosslight-source version less then 1.7.2 have | |
Having vulnarability CVE-2022-40897 Advisory: Fosslight-util 1.4.30 pins its dependency 'setuptools' to versions >=65.5.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-util version less then 1.4.30 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Fosslight-util 1.4.30 pins its dependency 'setuptools' to versions >=65.5.1 to include a security fix. | what vulnarability does fosslight-util version less then 1.4.30 have | |
Having vulnarability PVE-2023-61100 Advisory: Fosslight-yocto 3.1.23 includes a fix for a potential SQL injection vulnerability.
https://github.com/fosslight/fosslight_yocto_scanner/pull/14 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fosslight-yocto version less then 3.1.23 have ### Response: Having vulnarability PVE-2023-61100 Advisory: Fosslight-yocto 3.1.23 includes a fix for a potential SQL injection vulnerability.
https://github.com/fosslight/fosslight_yocto_scanner/pull/14 | what vulnarability does fosslight-yocto version less then 3.1.23 have | |
Having vulnarability CVE-2023-45803 Advisory: Fotoobo 1.1.0 updates its dependency 'urlllib3' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fotoobo version less then 1.1.0 have ### Response: Having vulnarability CVE-2023-45803 Advisory: Fotoobo 1.1.0 updates its dependency 'urlllib3' to include a security fix. | what vulnarability does fotoobo version less then 1.1.0 have | |
Having vulnarability PVE-2022-45581 Advisory: Fpdf2 2.5.1 deprecates its font caching mechanism that used the 'pickle' module for security reasons.
https://github.com/PyFPDF/fpdf2/issues/345 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fpdf2 version less then 2.5.1 have ### Response: Having vulnarability PVE-2022-45581 Advisory: Fpdf2 2.5.1 deprecates its font caching mechanism that used the 'pickle' module for security reasons.
https://github.com/PyFPDF/fpdf2/issues/345 | what vulnarability does fpdf2 version less then 2.5.1 have | |
Having vulnarability CVE-2023-32681 Advisory: Fractal-server 1.3.0a3 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/fractal-analytics-platform/fractal-server/pull/723 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fractal-server version less then 1.3.0a3 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Fractal-server 1.3.0a3 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/fractal-analytics-platform/fractal-server/pull/723 | what vulnarability does fractal-server version less then 1.3.0a3 have | |
Having vulnarability CVE-2019-15700 Advisory: public/js/frappe/form/footer/timeline.js in Frappe Framework 12 through 12.0.8 does not escape HTML in the timeline and thus is affected by crafted "changed value of" text. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does frapp version less then 12.0.9 have ### Response: Having vulnarability CVE-2019-15700 Advisory: public/js/frappe/form/footer/timeline.js in Frappe Framework 12 through 12.0.8 does not escape HTML in the timeline and thus is affected by crafted "changed value of" text. | what vulnarability does frapp version less then 12.0.9 have | |
Having vulnarability CVE-2019-14967 Advisory: An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does frappe version less then 11.1.46 have ### Response: Having vulnarability CVE-2019-14967 Advisory: An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability. | what vulnarability does frappe version less then 11.1.46 have | |
Having vulnarability CVE-2008-3274 Advisory: The default configuration of Red Hat Enterprise IPA 1.0.0 and FreeIPA before 1.1.1 places ldap:///anyone on the read ACL for the krbMKey attribute, which allows remote attackers to obtain the Kerberos master key via an anonymous LDAP query. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does freeipa version less then 1.1.1 have ### Response: Having vulnarability CVE-2008-3274 Advisory: The default configuration of Red Hat Enterprise IPA 1.0.0 and FreeIPA before 1.1.1 places ldap:///anyone on the read ACL for the krbMKey attribute, which allows remote attackers to obtain the Kerberos master key via an anonymous LDAP query. | what vulnarability does freeipa version less then 1.1.1 have | |
Having vulnarability PVE-2023-53008 Advisory: Freetakserver 2.0.11a0 includes several fixes for XSS vulnerabilities.
https://github.com/FreeTAKTeam/FreeTakServer/pull/513 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does freetakserver version less then 2.0.11a0 have ### Response: Having vulnarability PVE-2023-53008 Advisory: Freetakserver 2.0.11a0 includes several fixes for XSS vulnerabilities.
https://github.com/FreeTAKTeam/FreeTakServer/pull/513 | what vulnarability does freetakserver version less then 2.0.11a0 have | |
Having vulnarability CVE-2022-25512 Advisory: FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does freetakserver-ui version greather then equal to 0,less then equal to 1.9.8 have ### Response: Having vulnarability CVE-2022-25512 Advisory: FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys. | what vulnarability does freetakserver-ui version greather then equal to 0,less then equal to 1.9.8 have | |
Having vulnarability CVE-2020-15101 Advisory: In freewvs before 0.1.1, a directory structure of more than 1000 nested directories can interrupt a freewvs scan due to Python's recursion limit and os.walk(). This can be problematic in a case where an administrator scans the dirs of potentially untrusted users.
https://github.com/schokokeksorg/freewvs/security/advisories/GHSA-7pmh-vrww-25xx
https://github.com/schokokeksorg/freewvs/commit/83a6b55c0435c69f447488b791555e6078803143 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does freewvs version less then 0.1.1 have ### Response: Having vulnarability CVE-2020-15101 Advisory: In freewvs before 0.1.1, a directory structure of more than 1000 nested directories can interrupt a freewvs scan due to Python's recursion limit and os.walk(). This can be problematic in a case where an administrator scans the dirs of potentially untrusted users.
https://github.com/schokokeksorg/freewvs/security/advisories/GHSA-7pmh-vrww-25xx
https://github.com/schokokeksorg/freewvs/commit/83a6b55c0435c69f447488b791555e6078803143 | what vulnarability does freewvs version less then 0.1.1 have | |
Having vulnarability PVE-2021-35028 Advisory: In fresco after 0.5.5 user supplied data is no longer reflected in error messages raised from "fresco.routeargs.RequestArg". This fixes a potential XSS vulnerability affecting versions starting from 0.5.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fresco version greather then equal to 0.5.0,less then 0.5.5 have ### Response: Having vulnarability PVE-2021-35028 Advisory: In fresco after 0.5.5 user supplied data is no longer reflected in error messages raised from "fresco.routeargs.RequestArg". This fixes a potential XSS vulnerability affecting versions starting from 0.5.0. | what vulnarability does fresco version greather then equal to 0.5.0,less then 0.5.5 have | |
Having vulnarability PVE-2021-36642 Advisory: friendlyshell 1.0.3 fixes security warnings, and bugs with parsing quoted command parameters. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does friendlyshell version less then 1.0.3 have ### Response: Having vulnarability PVE-2021-36642 Advisory: friendlyshell 1.0.3 fixes security warnings, and bugs with parsing quoted command parameters. | what vulnarability does friendlyshell version less then 1.0.3 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.