output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2023-54977 Advisory: Ftp-cloudfs 0.26.1 fixes a bug in token cache code with auth 2.0 (keystone) when used with memcache. The same username in different tenants could get the same auth token.
https://github.com/reidrac/ftp-cloudfs/compare/0.26...0.26.1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftp-cloudfs version greather then equal to 0.24,less then 0.26.1 have ### Response: Having vulnarability PVE-2023-54977 Advisory: Ftp-cloudfs 0.26.1 fixes a bug in token cache code with auth 2.0 (keystone) when used with memcache. The same username in different tenants could get the same auth token.
https://github.com/reidrac/ftp-cloudfs/compare/0.26...0.26.1 | what vulnarability does ftp-cloudfs version greather then equal to 0.24,less then 0.26.1 have | |
Having vulnarability PVE-2021-25831 Advisory: ftw.dashboard.dragndrop 1.5.1 includes several undisclosed security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-dashboard-dragndrop version less then 1.5.1 have ### Response: Having vulnarability PVE-2021-25831 Advisory: ftw.dashboard.dragndrop 1.5.1 includes several undisclosed security fixes. | what vulnarability does ftw-dashboard-dragndrop version less then 1.5.1 have | |
Having vulnarability PVE-2021-25832 Advisory: ftw.dashboard.portlets.postit 1.3.4 fixes a security error, it was possible to add postit comment on a foreign dashboard if the userid an portlet id was known. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-dashboard-portlets-postit version less then 1.3.4 have ### Response: Having vulnarability PVE-2021-25832 Advisory: ftw.dashboard.portlets.postit 1.3.4 fixes a security error, it was possible to add postit comment on a foreign dashboard if the userid an portlet id was known. | what vulnarability does ftw-dashboard-portlets-postit version less then 1.3.4 have | |
Having vulnarability PVE-2021-37470 Advisory: Ftw.lawgiver 1.16.1 fixes the Plone workflow security.
https://github.com/4teamwork/ftw.lawgiver/pull/87 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-lawgiver version less then 1.16.1 have ### Response: Having vulnarability PVE-2021-37470 Advisory: Ftw.lawgiver 1.16.1 fixes the Plone workflow security.
https://github.com/4teamwork/ftw.lawgiver/pull/87 | what vulnarability does ftw-lawgiver version less then 1.16.1 have | |
Having vulnarability PVE-2021-25833 Advisory: Ftw.mail 2.2.3 makes mail view XSS-save using the safe-html transform for the mail-body display.
https://github.com/4teamwork/ftw.mail/pull/25 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-mail version less then 2.2.3 have ### Response: Having vulnarability PVE-2021-25833 Advisory: Ftw.mail 2.2.3 makes mail view XSS-save using the safe-html transform for the mail-body display.
https://github.com/4teamwork/ftw.mail/pull/25 | what vulnarability does ftw-mail version less then 2.2.3 have | |
Having vulnarability PVE-2021-25834 Advisory: ftw.meeting before 1.4.1 isn't using safe-html-transform for textfields. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-meeting version less then 1.4.1 have ### Response: Having vulnarability PVE-2021-25834 Advisory: ftw.meeting before 1.4.1 isn't using safe-html-transform for textfields. | what vulnarability does ftw-meeting version less then 1.4.1 have | |
Having vulnarability PVE-2021-25835 Advisory: Ftw.permissionmanager before 2.2.2 allowed users with view permission to access the advanced security features. Since it's possible to search for all users, it exposed all usernames and email addresses to anyone with view permission. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-permissionmanager version less then 2.2.2 have ### Response: Having vulnarability PVE-2021-25835 Advisory: Ftw.permissionmanager before 2.2.2 allowed users with view permission to access the advanced security features. Since it's possible to search for all users, it exposed all usernames and email addresses to anyone with view permission. | what vulnarability does ftw-permissionmanager version less then 2.2.2 have | |
Having vulnarability CVE-2021-44228 Advisory: Ftw.recipe.solr 1.3.5 disables message lookups in log4j dependency to fix a critical vulnerability.
https://github.com/4teamwork/ftw.recipe.solr/commit/5d5ede2d8e0119c74ad6fa51cd2bee434109810f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ftw-recipe-solr version less then 1.3.5 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Ftw.recipe.solr 1.3.5 disables message lookups in log4j dependency to fix a critical vulnerability.
https://github.com/4teamwork/ftw.recipe.solr/commit/5d5ede2d8e0119c74ad6fa51cd2bee434109810f | what vulnarability does ftw-recipe-solr version less then 1.3.5 have | |
Having vulnarability PVE-2021-40175 Advisory: Funcx 0.2.0 overhauls the security architecture. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does funcx version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-40175 Advisory: Funcx 0.2.0 overhauls the security architecture. | what vulnarability does funcx version less then 0.2.0 have | |
Having vulnarability CVE-2023-24816 Advisory: Fundaml 0.1.32 updates its dependency 'ipython' to version '8.10.0' to include a fix for a Remote Code Execution vulnerability.
https://github.com/tzoght/fundaml/commit/02e60c4d8474aa673f02a65556fef2382fe4cf16 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fundaml version less then 0.1.32 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Fundaml 0.1.32 updates its dependency 'ipython' to version '8.10.0' to include a fix for a Remote Code Execution vulnerability.
https://github.com/tzoght/fundaml/commit/02e60c4d8474aa673f02a65556fef2382fe4cf16 | what vulnarability does fundaml version less then 0.1.32 have | |
Having vulnarability CVE-2018-18074 Advisory: Fundnsf 0.0.32 updates requests to v2.20.0 for including a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fundnsf version less then 0.0.32 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Fundnsf 0.0.32 updates requests to v2.20.0 for including a security fix. | what vulnarability does fundnsf version less then 0.0.32 have | |
Having vulnarability PVE-2023-60177 Advisory: Funix 0.4.1 includes a fix for a Missing Authentication for Critical Function vulnerability. The vulnerable funix version uses the wrong variables for the judgment, which makes it possible to run the function directly without the secret.
https://github.com/TexteaInc/funix/commit/b6b07001aea435aabb243e402ff54720f70093d8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does funix version less then 0.4.1 have ### Response: Having vulnarability PVE-2023-60177 Advisory: Funix 0.4.1 includes a fix for a Missing Authentication for Critical Function vulnerability. The vulnerable funix version uses the wrong variables for the judgment, which makes it possible to run the function directly without the secret.
https://github.com/TexteaInc/funix/commit/b6b07001aea435aabb243e402ff54720f70093d8 | what vulnarability does funix version less then 0.4.1 have | |
Having vulnarability CVE-2022-1941 Advisory: Fuse-med-ml 0.2.7 updates its dependency 'protobuf' requirement to ">=3.20.2" to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does fuse-med-ml version less then 0.2.7 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Fuse-med-ml 0.2.7 updates its dependency 'protobuf' requirement to ">=3.20.2" to include a security fix. | what vulnarability does fuse-med-ml version less then 0.2.7 have | |
Having vulnarability PVE-2021-35184 Advisory: futoin-cid before 0.8.5 does not properly check components loading from the root directory when using os.path.join().
https://github.com/futoin/cid-tool/commit/8da1898f5eb2d987514822d964b51e02e3ca58df | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does futoin-cid version less then 0.8.5 have ### Response: Having vulnarability PVE-2021-35184 Advisory: futoin-cid before 0.8.5 does not properly check components loading from the root directory when using os.path.join().
https://github.com/futoin/cid-tool/commit/8da1898f5eb2d987514822d964b51e02e3ca58df | what vulnarability does futoin-cid version less then 0.8.5 have | |
Having vulnarability CVE-2022-40899 Advisory: Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.
https://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215
https://github.com/python/cpython/pull/17157 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does future version less then equal to 0.18.2 have ### Response: Having vulnarability CVE-2022-40899 Advisory: Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.
https://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215
https://github.com/python/cpython/pull/17157 | what vulnarability does future version less then equal to 0.18.2 have | |
Having vulnarability CVE-2021-23980 Advisory: Galaxy-importer 0.2.15 updates 'bleach' dependency to v3.3.0 to fix a 'XSS mutation' vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does galaxy-importer version less then 0.2.15 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Galaxy-importer 0.2.15 updates 'bleach' dependency to v3.3.0 to fix a 'XSS mutation' vulnerability. | what vulnarability does galaxy-importer version less then 0.2.15 have | |
Having vulnarability CVE-2021-32052 Advisory: Galaxy-ng 4.4.0 updates its dependency 'Django' to v3.2.6 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does galaxy-ng version less then 4.4.0 have ### Response: Having vulnarability CVE-2021-32052 Advisory: Galaxy-ng 4.4.0 updates its dependency 'Django' to v3.2.6 to include security fixes. | what vulnarability does galaxy-ng version less then 4.4.0 have | |
Having vulnarability PVE-2021-42368 Advisory: Gallery-dl 1.5.3 improves the downloader/postprocessor module loading to prevent potential security risk through relative imports.
https://github.com/mikf/gallery-dl/commit/e9ae6fd080d8c9662a1ce688ec622d413b99e615 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gallery-dl version less then 1.5.3 have ### Response: Having vulnarability PVE-2021-42368 Advisory: Gallery-dl 1.5.3 improves the downloader/postprocessor module loading to prevent potential security risk through relative imports.
https://github.com/mikf/gallery-dl/commit/e9ae6fd080d8c9662a1ce688ec622d413b99e615 | what vulnarability does gallery-dl version less then 1.5.3 have | |
Having vulnarability CVE-2023-32681 Advisory: Gameserverlister 1.0.8 updates its dependency 'requests' to include a fix for an Information Exposure vulnerability.
https://github.com/cetteup/GameserverLister/commit/ea36f5a098e90a73d58ff7f1da368ec6911f0cd9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gameserverlister version less then 1.0.8 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Gameserverlister 1.0.8 updates its dependency 'requests' to include a fix for an Information Exposure vulnerability.
https://github.com/cetteup/GameserverLister/commit/ea36f5a098e90a73d58ff7f1da368ec6911f0cd9 | what vulnarability does gameserverlister version less then 1.0.8 have | |
Having vulnarability PVE-2021-25836 Advisory: gandi.cli 0.10 includes two security related fixes:
- validate server certificate using request as
xmlrpc transport.
- Security: restrict configuration file rights to owner only. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gandi-cli version less then 0.10 have ### Response: Having vulnarability PVE-2021-25836 Advisory: gandi.cli 0.10 includes two security related fixes:
- validate server certificate using request as
xmlrpc transport.
- Security: restrict configuration file rights to owner only. | what vulnarability does gandi-cli version less then 0.10 have | |
Having vulnarability PVE-2023-60245 Advisory: Ganga 6.5.0 includes a fix for a Race Condition vulnerability.
https://github.com/ganga-devs/ganga/pull/941 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ganga version less then 6.5.0 have ### Response: Having vulnarability PVE-2023-60245 Advisory: Ganga 6.5.0 includes a fix for a Race Condition vulnerability.
https://github.com/ganga-devs/ganga/pull/941 | what vulnarability does ganga version less then 6.5.0 have | |
Having vulnarability CVE-2021-39214 Advisory: Garbevents 2.0.8 updates its dependency 'mitmproxy' to v7.0.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does garbevents version less then 2.0.8 have ### Response: Having vulnarability CVE-2021-39214 Advisory: Garbevents 2.0.8 updates its dependency 'mitmproxy' to v7.0.3 to include a security fix. | what vulnarability does garbevents version less then 2.0.8 have | |
Having vulnarability CVE-2020-19003 Advisory: An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gateone version greather then equal to 0,less then equal to 1.2.0 have ### Response: Having vulnarability CVE-2020-19003 Advisory: An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list. | what vulnarability does gateone version greather then equal to 0,less then equal to 1.2.0 have | |
Having vulnarability PVE-2022-48190 Advisory: Gcp-secretmanager-cache 0.2.3 adds handling of characters in user names to prevent SQL injection.
https://github.com/MikeMoore63/gcp-secretmanager-cache/commit/97c58ed91f7577f9829dfc257d953b86df3c6ee0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gcp-secretmanager-cache version less then 0.2.3 have ### Response: Having vulnarability PVE-2022-48190 Advisory: Gcp-secretmanager-cache 0.2.3 adds handling of characters in user names to prevent SQL injection.
https://github.com/MikeMoore63/gcp-secretmanager-cache/commit/97c58ed91f7577f9829dfc257d953b86df3c6ee0 | what vulnarability does gcp-secretmanager-cache version less then 0.2.3 have | |
Having vulnarability PVE-2021-42375 Advisory: Gdal 1.10.0 fixes various vulnerabilities/DoS in the GXF driver.
https://github.com/OSGeo/gdal/commit/283146cbff813f0a7eff3e1fe4712ff1f48f1188 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gdal version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-42375 Advisory: Gdal 1.10.0 fixes various vulnerabilities/DoS in the GXF driver.
https://github.com/OSGeo/gdal/commit/283146cbff813f0a7eff3e1fe4712ff1f48f1188 | what vulnarability does gdal version less then 1.10.0 have | |
Having vulnarability PVE-2022-49578 Advisory: Gdbgui 0.11.1.1 adds CSRF and XSS protection.
https://github.com/cs01/gdbgui/pull/168 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gdbgui version less then 0.11.1.1 have ### Response: Having vulnarability PVE-2022-49578 Advisory: Gdbgui 0.11.1.1 adds CSRF and XSS protection.
https://github.com/cs01/gdbgui/pull/168 | what vulnarability does gdbgui version less then 0.11.1.1 have | |
Having vulnarability PVE-2021-40668 Advisory: Gds-django-jet 1.0.4 fixes an security issue with accessing 'model_lookup_view' (when using 'RelatedFieldAjaxListFilter') without permissions.
https://github.com/govindsharma7/gds-django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gds-django-jet version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-40668 Advisory: Gds-django-jet 1.0.4 fixes an security issue with accessing 'model_lookup_view' (when using 'RelatedFieldAjaxListFilter') without permissions.
https://github.com/govindsharma7/gds-django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9 | what vulnarability does gds-django-jet version less then 1.0.4 have | |
Having vulnarability CVE-2013-1665 Advisory: Genbadge 1.0.0 starts to use 'defusedxml' to fix a known vulnerability. See: <https://github.com/smarie/python-genbadge/issues/11>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does genbadge version less then 1.0.0 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Genbadge 1.0.0 starts to use 'defusedxml' to fix a known vulnerability. See: <https://github.com/smarie/python-genbadge/issues/11>. | what vulnarability does genbadge version less then 1.0.0 have | |
Having vulnarability PVE-2022-45449 Advisory: Genesisbot is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does genesisbot version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45449 Advisory: Genesisbot is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | what vulnarability does genesisbot version greather then 0,less then 0 have | |
Having vulnarability CVE-2022-21797 Advisory: Geno2phenotb 1.0.1 updates its dependency 'joblib' to version '1.2.0' to include a fix for an Arbitrary Code Execution vulnerability.
https://github.com/msmdev/geno2phenoTB/commit/139d29184dbec34ca12368783ea205793c22df6e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geno2phenotb version less then 1.0.1 have ### Response: Having vulnarability CVE-2022-21797 Advisory: Geno2phenotb 1.0.1 updates its dependency 'joblib' to version '1.2.0' to include a fix for an Arbitrary Code Execution vulnerability.
https://github.com/msmdev/geno2phenoTB/commit/139d29184dbec34ca12368783ea205793c22df6e | what vulnarability does geno2phenotb version less then 1.0.1 have | |
Having vulnarability PVE-2021-39055 Advisory: Genshi 0.6.1 updates the HTML sanitizer to strip any CSS comments in style attributes, which could previously be used to hide malicious property values. This security fix also enhances the sanitizing of CSS in style attributes. Genshi's 'HTMLSanitizer' disallows style attributes by default (this remains unchanged) and warns against such attacks in its documentation. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does genshi version less then 0.6.1 have ### Response: Having vulnarability PVE-2021-39055 Advisory: Genshi 0.6.1 updates the HTML sanitizer to strip any CSS comments in style attributes, which could previously be used to hide malicious property values. This security fix also enhances the sanitizing of CSS in style attributes. Genshi's 'HTMLSanitizer' disallows style attributes by default (this remains unchanged) and warns against such attacks in its documentation. | what vulnarability does genshi version less then 0.6.1 have | |
Having vulnarability PVE-2022-44473 Advisory: Geoipsets 2.3.2 improves the systemd service sandboxing to lower exposure of update-geoipsets.service unit file.
https://github.com/chr0mag/geoipsets/issues/18 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geoipsets version less then 2.3.2 have ### Response: Having vulnarability PVE-2022-44473 Advisory: Geoipsets 2.3.2 improves the systemd service sandboxing to lower exposure of update-geoipsets.service unit file.
https://github.com/chr0mag/geoipsets/issues/18 | what vulnarability does geoipsets version less then 2.3.2 have | |
Having vulnarability PVE-2021-38898 Advisory: Geojson-client 0.4 fetches NSW Rural Fire Service feed securely via HTTPS. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geojson-client version less then 0.4 have ### Response: Having vulnarability PVE-2021-38898 Advisory: Geojson-client 0.4 fetches NSW Rural Fire Service feed securely via HTTPS. | what vulnarability does geojson-client version less then 0.4 have | |
Having vulnarability PVE-2017-47616 Advisory: Geokey 0.8 fixes that administrators where able to add the same user more than once to the list of administrators, which caused integrity errors.
https://github.com/ExCiteS/geokey/pull/308 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geokey version less then 0.8 have ### Response: Having vulnarability PVE-2017-47616 Advisory: Geokey 0.8 fixes that administrators where able to add the same user more than once to the list of administrators, which caused integrity errors.
https://github.com/ExCiteS/geokey/pull/308 | what vulnarability does geokey version less then 0.8 have | |
Having vulnarability CVE-2018-20060 Advisory: Geonode 2.10 updates 'urllib3' to v1.24.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geonode version less then 2.10 have ### Response: Having vulnarability CVE-2018-20060 Advisory: Geonode 2.10 updates 'urllib3' to v1.24.2 to include security fixes. | what vulnarability does geonode version less then 2.10 have | |
Having vulnarability PVE-2021-40423 Advisory: Geonode-oauth-toolkit 0.8.0 fixes vulnerabilities on Basic authentication. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geonode-oauth-toolkit version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-40423 Advisory: Geonode-oauth-toolkit 0.8.0 fixes vulnerabilities on Basic authentication. | what vulnarability does geonode-oauth-toolkit version less then 0.8.0 have | |
Having vulnarability CVE-2023-47248 Advisory: Geopandas 0.14.1 includes a fix for CVE-2023-47248, a vulnerability affecting the dependency 'pyarrow'.
https://github.com/geopandas/geopandas/pull/3070 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geopandas version less then 0.14.1 have ### Response: Having vulnarability CVE-2023-47248 Advisory: Geopandas 0.14.1 includes a fix for CVE-2023-47248, a vulnerability affecting the dependency 'pyarrow'.
https://github.com/geopandas/geopandas/pull/3070 | what vulnarability does geopandas version less then 0.14.1 have | |
Having vulnarability CVE-2023-26043 Advisory: Geoshape 1.7.11 and prior versions rely on Geonode 1.4, which is vulnerable to CVE-2023-26043. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geoshape version less then equal to 1.7.11 have ### Response: Having vulnarability CVE-2023-26043 Advisory: Geoshape 1.7.11 and prior versions rely on Geonode 1.4, which is vulnerable to CVE-2023-26043. | what vulnarability does geoshape version less then equal to 1.7.11 have | |
Having vulnarability CVE-2024-21503 Advisory: Geosss 0.1.9 secures its codebase by updating the version constraint for Black to ">=24.3.0, < 25.0.0" to mitigate the risk associated with CVE-2024-21503. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geosss version less then 0.1.9 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Geosss 0.1.9 secures its codebase by updating the version constraint for Black to ">=24.3.0, < 25.0.0" to mitigate the risk associated with CVE-2024-21503. | what vulnarability does geosss version less then 0.1.9 have | |
Having vulnarability CVE-2022-22817 Advisory: Geotribu 0.31.1 updates its Pillow dependency to version 10.2 to address the CVE-2022-22817.
https://github.com/geotribu/cli/pull/165/commits/ee7ff27877b789df2d385e1dcdbd912bb08ea003 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geotribu version less then 0.31.1 have ### Response: Having vulnarability CVE-2022-22817 Advisory: Geotribu 0.31.1 updates its Pillow dependency to version 10.2 to address the CVE-2022-22817.
https://github.com/geotribu/cli/pull/165/commits/ee7ff27877b789df2d385e1dcdbd912bb08ea003 | what vulnarability does geotribu version less then 0.31.1 have | |
Having vulnarability PVE-2023-52889 Advisory: Gequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gequests version greather then 0 have ### Response: Having vulnarability PVE-2023-52889 Advisory: Gequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does gequests version greather then 0 have | |
Having vulnarability CVE-2020-7698 Advisory: This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized. See: CVE-2020-7698. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gerapy version less then 0.9.3 have ### Response: Having vulnarability CVE-2020-7698 Advisory: This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized. See: CVE-2020-7698. | what vulnarability does gerapy version less then 0.9.3 have | |
Having vulnarability CVE-2023-45803 Advisory: Getgauge 0.4.1 updates its dependency 'urllib3' to v2.0.7 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does getgauge version less then 0.4.1 have ### Response: Having vulnarability CVE-2023-45803 Advisory: Getgauge 0.4.1 updates its dependency 'urllib3' to v2.0.7 to include a security fix. | what vulnarability does getgauge version less then 0.4.1 have | |
Having vulnarability PVE-2023-54990 Advisory: Geti-sdk 1.0.0 enables SSL certificate validation by default.
https://github.com/openvinotoolkit/geti-sdk/pull/77 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geti-sdk version less then 1.0.0 have ### Response: Having vulnarability PVE-2023-54990 Advisory: Geti-sdk 1.0.0 enables SSL certificate validation by default.
https://github.com/openvinotoolkit/geti-sdk/pull/77 | what vulnarability does geti-sdk version less then 1.0.0 have | |
Having vulnarability PVE-2021-38862 Advisory: Versions of getmail prior to 4.2.0 and 3.2.5 contain a security vulnerability. A local attacker with a shell account could exploit a race condition (or a similar symlink attack) to cause getmail to create or overwrite files in a directory of the local user's choosing if the system administrator ran getmail as root and delivered messages to a maildir or mbox file under the control of the attacker, resulting in a local root exploit. (This vulnerability is not exploitable if the administrator does not deliver mail to the maildirs/mbox files of untrusted local users, or if getmail is configured to use an external unprivileged MDA. Also, this vulnerability is not remotely exploitable.) | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does getmail version less then 3.2.5,greather then equal to 4.0.0a1,less then 4.2.0 have ### Response: Having vulnarability PVE-2021-38862 Advisory: Versions of getmail prior to 4.2.0 and 3.2.5 contain a security vulnerability. A local attacker with a shell account could exploit a race condition (or a similar symlink attack) to cause getmail to create or overwrite files in a directory of the local user's choosing if the system administrator ran getmail as root and delivered messages to a maildir or mbox file under the control of the attacker, resulting in a local root exploit. (This vulnerability is not exploitable if the administrator does not deliver mail to the maildirs/mbox files of untrusted local users, or if getmail is configured to use an external unprivileged MDA. Also, this vulnerability is not remotely exploitable.) | what vulnarability does getmail version less then 3.2.5,greather then equal to 4.0.0a1,less then 4.2.0 have | |
Having vulnarability PVE-2021-25837 Advisory: Gevent 1.2a1 no longer prints the entire WSGI environment by default for errors logged by :class:'~gevent.pywsgi.WSGIHandler'.
https://github.com/gevent/gevent/pull/781 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gevent version less then 1.2a1 have ### Response: Having vulnarability PVE-2021-25837 Advisory: Gevent 1.2a1 no longer prints the entire WSGI environment by default for errors logged by :class:'~gevent.pywsgi.WSGIHandler'.
https://github.com/gevent/gevent/pull/781 | what vulnarability does gevent version less then 1.2a1 have | |
Having vulnarability PVE-2021-25838 Advisory: geventhttpclient 1.2.0 includes an undisclosed security fix related to SSL support. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does geventhttpclient version less then 1.2.0 have ### Response: Having vulnarability PVE-2021-25838 Advisory: geventhttpclient 1.2.0 includes an undisclosed security fix related to SSL support. | what vulnarability does geventhttpclient version less then 1.2.0 have | |
Having vulnarability CVE-2023-3817 Advisory: Ggshield 1.18.0 updates its dependency 'cryptography' to version '41.0.3' to include a fix for a Denial of Service vulnerability.
https://github.com/GitGuardian/ggshield/commit/3c67771a4d66accede14fa23dfce9ea51571e082 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ggshield version less then 1.18.0 have ### Response: Having vulnarability CVE-2023-3817 Advisory: Ggshield 1.18.0 updates its dependency 'cryptography' to version '41.0.3' to include a fix for a Denial of Service vulnerability.
https://github.com/GitGuardian/ggshield/commit/3c67771a4d66accede14fa23dfce9ea51571e082 | what vulnarability does ggshield version less then 1.18.0 have | |
Having vulnarability CVE-2023-29159 Advisory: Ghga-service-commons 0.4.1 updates its dependency 'fastapi' to v0.96.0 to include a security fix.
https://github.com/ghga-de/ghga-service-commons/pull/12 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ghga-service-commons version less then 0.4.1 have ### Response: Having vulnarability CVE-2023-29159 Advisory: Ghga-service-commons 0.4.1 updates its dependency 'fastapi' to v0.96.0 to include a security fix.
https://github.com/ghga-de/ghga-service-commons/pull/12 | what vulnarability does ghga-service-commons version less then 0.4.1 have | |
Having vulnarability CVE-2024-0959 Advisory: A vulnerability was found in StanfordVL GibsonEnv 0.3.1. It has been classified as critical. Affected is the function cloudpickle.load of the file gibson\utils\pposgd_fuse.py. The manipulation leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252204. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gibson version less then equal to 0.3.1 have ### Response: Having vulnarability CVE-2024-0959 Advisory: A vulnerability was found in StanfordVL GibsonEnv 0.3.1. It has been classified as critical. Affected is the function cloudpickle.load of the file gibson\utils\pposgd_fuse.py. The manipulation leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252204. | what vulnarability does gibson version less then equal to 0.3.1 have | |
Having vulnarability CVE-2021-27923 Advisory: Gimpformats 2021 updates its dependency "pillow" to a version >= 8.1.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gimpformats version less then 2021 have ### Response: Having vulnarability CVE-2021-27923 Advisory: Gimpformats 2021 updates its dependency "pillow" to a version >= 8.1.1 to include security fixes. | what vulnarability does gimpformats version less then 2021 have | |
Having vulnarability CVE-2020-36242 Advisory: Gino-quart 0.1.1b2 updates 'cryptography' dependency to fix a security issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gino-quart version less then 0.1.1b2 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Gino-quart 0.1.1b2 updates 'cryptography' dependency to fix a security issue. | what vulnarability does gino-quart version less then 0.1.1b2 have | |
Having vulnarability CVE-2019-14232 Advisory: Giosgapps-bindings 0.0.19 updates its dependency Django to v2.2.8 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does giosgapps-bindings version less then 0.0.19 have ### Response: Having vulnarability CVE-2019-14232 Advisory: Giosgapps-bindings 0.0.19 updates its dependency Django to v2.2.8 to include security fixes. | what vulnarability does giosgapps-bindings version less then 0.0.19 have | |
Having vulnarability PVE-2021-34631 Advisory: Girder 1.3.3 improves security of temporary access flow by expiring temp tokens and deleting them from the system.
https://github.com/girder/girder/commit/269d4c1800ca64e27a720dee6e4937cbd7197637 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does girder version less then 1.3.3 have ### Response: Having vulnarability PVE-2021-34631 Advisory: Girder 1.3.3 improves security of temporary access flow by expiring temp tokens and deleting them from the system.
https://github.com/girder/girder/commit/269d4c1800ca64e27a720dee6e4937cbd7197637 | what vulnarability does girder version less then 1.3.3 have | |
Having vulnarability PVE-2023-61784 Advisory: Giskard 2.0.0b25 secures Giskard readonly demo space at Hugging Face Space.
https://github.com/Giskard-AI/giskard/pull/1355 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does giskard version less then 2.0.0b25 have ### Response: Having vulnarability PVE-2023-61784 Advisory: Giskard 2.0.0b25 secures Giskard readonly demo space at Hugging Face Space.
https://github.com/Giskard-AI/giskard/pull/1355 | what vulnarability does giskard version less then 2.0.0b25 have | |
Having vulnarability CVE-2023-41040 Advisory: Git-batch 2.0.16 updates its dependency 'gitpython' to v3.1.35 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-batch version less then 2.0.16 have ### Response: Having vulnarability CVE-2023-41040 Advisory: Git-batch 2.0.16 updates its dependency 'gitpython' to v3.1.35 to include a security fix. | what vulnarability does git-batch version less then 2.0.16 have | |
Having vulnarability CVE-2021-3028 Advisory: git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code execution. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-big-picture version less then 1.0.0 have ### Response: Having vulnarability CVE-2021-3028 Advisory: git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code execution. | what vulnarability does git-big-picture version less then 1.0.0 have | |
Having vulnarability PVE-2022-48991 Advisory: Git-cola 4.0.0 fixes insecure usage of NamedTemporaryFile().
https://github.com/git-cola/git-cola/pull/1209 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-cola version less then 4.0.0 have ### Response: Having vulnarability PVE-2022-48991 Advisory: Git-cola 4.0.0 fixes insecure usage of NamedTemporaryFile().
https://github.com/git-cola/git-cola/pull/1209 | what vulnarability does git-cola version less then 4.0.0 have | |
Having vulnarability PVE-2021-39510 Advisory: Git-portfolio 0.10.1 includes various security patches. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-portfolio version less then 0.10.1 have ### Response: Having vulnarability PVE-2021-39510 Advisory: Git-portfolio 0.10.1 includes various security patches. | what vulnarability does git-portfolio version less then 0.10.1 have | |
Having vulnarability CVE-2023-32758 Advisory: Giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-url-parse version less then equal to 1.2.2 have ### Response: Having vulnarability CVE-2023-32758 Advisory: Giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package. | what vulnarability does git-url-parse version less then equal to 1.2.2 have | |
Having vulnarability CVE-2021-33503 Advisory: Git-vuln-finder 1.3 updates its dependency 'urllib3' to v1.26.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does git-vuln-finder version less then 1.3 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Git-vuln-finder 1.3 updates its dependency 'urllib3' to v1.26.5 to include a security fix. | what vulnarability does git-vuln-finder version less then 1.3 have | |
Having vulnarability PVE-2022-52058 Advisory: Gitfive 1.1.0 adds sanitization to avoid ANSI injection attacks.
https://github.com/mxrch/GitFive/commit/6c0a5a6a57c1c0a04ecfd1b0938920f767ba082f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitfive version less then 1.1.0 have ### Response: Having vulnarability PVE-2022-52058 Advisory: Gitfive 1.1.0 adds sanitization to avoid ANSI injection attacks.
https://github.com/mxrch/GitFive/commit/6c0a5a6a57c1c0a04ecfd1b0938920f767ba082f | what vulnarability does gitfive version less then 1.1.0 have | |
Having vulnarability CVE-2024-22195 Advisory: Github-changelog-md version 0.8.1 has updated its jinja2 dependency from 3.1.2 to 3.1.3 to address the security issue identified as CVE-2024-22195.
https://github.com/seapagan/github-changelog-md/commit/cccc57445478b949679782ffc6b8ac6f7710af0a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does github-changelog-md version less then 0.8.1 have ### Response: Having vulnarability CVE-2024-22195 Advisory: Github-changelog-md version 0.8.1 has updated its jinja2 dependency from 3.1.2 to 3.1.3 to address the security issue identified as CVE-2024-22195.
https://github.com/seapagan/github-changelog-md/commit/cccc57445478b949679782ffc6b8ac6f7710af0a | what vulnarability does github-changelog-md version less then 0.8.1 have | |
Having vulnarability CVE-2023-0361 Advisory: Github-rate-limits-exporter 0.7.2 updates its dependency 'libgnutls30' to version '3.7.1-5+deb11u3' to include a security fix.
https://github.com/theodore86/github-rate-limits-exporter/commit/44073972e4a8e1bc86f842e3b6d421eba80e2ff6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does github-rate-limits-exporter version less then 0.7.2 have ### Response: Having vulnarability CVE-2023-0361 Advisory: Github-rate-limits-exporter 0.7.2 updates its dependency 'libgnutls30' to version '3.7.1-5+deb11u3' to include a security fix.
https://github.com/theodore86/github-rate-limits-exporter/commit/44073972e4a8e1bc86f842e3b6d421eba80e2ff6 | what vulnarability does github-rate-limits-exporter version less then 0.7.2 have | |
Having vulnarability CVE-2022-3786 Advisory: Githubkit 0.9.4 updates its dependency 'cryptography' to v38.0.3 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does githubkit version less then 0.9.4 have ### Response: Having vulnarability CVE-2022-3786 Advisory: Githubkit 0.9.4 updates its dependency 'cryptography' to v38.0.3 to include security fixes. | what vulnarability does githubkit version less then 0.9.4 have | |
Having vulnarability CVE-2018-18074 Advisory: Gitlab-languages 1.4.1 updates dependencies because of a security vulnerability in 'requests' <2.20.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitlab-languages version less then 1.4.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Gitlab-languages 1.4.1 updates dependencies because of a security vulnerability in 'requests' <2.20.0. | what vulnarability does gitlab-languages version less then 1.4.1 have | |
Having vulnarability PVE-2021-40639 Advisory: Gitlabform 2.0.5 fixes potential security issue by enabling autoescaping when loading the 'Jinja' templates. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitlabform version less then 2.0.5 have ### Response: Having vulnarability PVE-2021-40639 Advisory: Gitlabform 2.0.5 fixes potential security issue by enabling autoescaping when loading the 'Jinja' templates. | what vulnarability does gitlabform version less then 2.0.5 have | |
Having vulnarability PVE-2022-52518 Advisory: Gitpython 3.1.27 includes a fix for a REDoS vulnerability.
https://github.com/gitpython-developers/GitPython/commit/75f4f63ab3856a552f06082aabf98845b5fa21e3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitpython version less then 3.1.27 have ### Response: Having vulnarability PVE-2022-52518 Advisory: Gitpython 3.1.27 includes a fix for a REDoS vulnerability.
https://github.com/gitpython-developers/GitPython/commit/75f4f63ab3856a552f06082aabf98845b5fa21e3 | what vulnarability does gitpython version less then 3.1.27 have | |
Having vulnarability CVE-2021-33503 Advisory: Gitsup 0.4.0 updates its dependency 'urllib3' to v1.26.8 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gitsup version less then 0.4.0 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Gitsup 0.4.0 updates its dependency 'urllib3' to v1.26.8 to include a security fix. | what vulnarability does gitsup version less then 0.4.0 have | |
Having vulnarability CVE-2015-5162 Advisory: The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glance version less then 11.0.1,equal to 12.0.0 have ### Response: Having vulnarability CVE-2015-5162 Advisory: The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image. | what vulnarability does glance version less then 11.0.1,equal to 12.0.0 have | |
Having vulnarability CVE-2024-1141 Advisory: A vulnerability was found in python-glance-store. The issue occurs when the package logs the access_key for the glance-store when the DEBUG log level is enabled. See CVE-2024-1141. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glance-store version greather then equal to 0 have ### Response: Having vulnarability CVE-2024-1141 Advisory: A vulnerability was found in python-glance-store. The issue occurs when the package logs the access_key for the glance-store when the DEBUG log level is enabled. See CVE-2024-1141. | what vulnarability does glance-store version greather then equal to 0 have | |
Having vulnarability CVE-2023-2088 Advisory: Glance_store 4.4.0, 4.3.1, 4.1.1 and 3.0.1 raise the minimum version of 'os-brick' to include the fix for CVE-2023-2088.
https://opendev.org/openstack/glance_store/commit/ce86bf38239e3962db880bc9bfbaa9f6364a2d14 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glance_store version less then 3.0.1,greather then equal to 4.0.0,less then 4.1.1,greather then equal to 4.2.0,less then 4.3.1 have ### Response: Having vulnarability CVE-2023-2088 Advisory: Glance_store 4.4.0, 4.3.1, 4.1.1 and 3.0.1 raise the minimum version of 'os-brick' to include the fix for CVE-2023-2088.
https://opendev.org/openstack/glance_store/commit/ce86bf38239e3962db880bc9bfbaa9f6364a2d14 | what vulnarability does glance_store version less then 3.0.1,greather then equal to 4.0.0,less then 4.1.1,greather then equal to 4.2.0,less then 4.3.1 have | |
Having vulnarability CVE-2021-23337 Advisory: Glances 3.2.0 updates its NPM dependency 'lodash' to fixes a potential command injection vulnerability.
https://github.com/nicolargo/glances/commit/0448e3432f5d48185d4c9e2ecff8b801fcfabb9e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glances version less then 3.2.0 have ### Response: Having vulnarability CVE-2021-23337 Advisory: Glances 3.2.0 updates its NPM dependency 'lodash' to fixes a potential command injection vulnerability.
https://github.com/nicolargo/glances/commit/0448e3432f5d48185d4c9e2ecff8b801fcfabb9e | what vulnarability does glances version less then 3.2.0 have | |
Having vulnarability CVE-2021-41945 Advisory: Glances-api 0.3.6 updates its httpx dependency from ">=0.22,<1" to ">=0.23,<1". This modification is in response to CVE-2021-41945, a known security vulnerability.
https://github.com/home-assistant-ecosystem/python-glances-api/commit/2abd37bca2547875efe7471ea6c2d2889412a552 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glances-api version less then 0.3.6 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Glances-api 0.3.6 updates its httpx dependency from ">=0.22,<1" to ">=0.23,<1". This modification is in response to CVE-2021-41945, a known security vulnerability.
https://github.com/home-assistant-ecosystem/python-glances-api/commit/2abd37bca2547875efe7471ea6c2d2889412a552 | what vulnarability does glances-api version less then 0.3.6 have | |
Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does global-workqueue version greather then equal to 1.4.1rc5,less then 2.0.4 have ### Response: Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | what vulnarability does global-workqueue version greather then equal to 1.4.1rc5,less then 2.0.4 have | |
Having vulnarability CVE-2023-4863 Advisory: Globox 2.4.1 updates its dependency 'pillow' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does globox version less then 2.4.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Globox 2.4.1 updates its dependency 'pillow' to include a security fix. | what vulnarability does globox version less then 2.4.1 have | |
Having vulnarability CVE-2021-29510 Advisory: Globus-action-provider-tools 0.11.2 updates its Pydantic library version to address the security issue identified as CVE-2021-29510. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does globus-action-provider-tools version less then 0.11.2 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Globus-action-provider-tools 0.11.2 updates its Pydantic library version to address the security issue identified as CVE-2021-29510. | what vulnarability does globus-action-provider-tools version less then 0.11.2 have | |
Having vulnarability PVE-2022-47833 Advisory: Globus-automate-client 0.15.0 updates its dependency 'click' to v8.0.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does globus-automate-client version less then 0.15.0 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Globus-automate-client 0.15.0 updates its dependency 'click' to v8.0.4 to include a security fix. | what vulnarability does globus-automate-client version less then 0.15.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Glooey 0.3.5 includes a security patch for the function 'yaml' in 'glooey/themes/helpers.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/kxgames/glooey/commit/9178939df55a44dcf0a890aec0aceef2f4989947 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glooey version less then 0.3.5 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Glooey 0.3.5 includes a security patch for the function 'yaml' in 'glooey/themes/helpers.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/kxgames/glooey/commit/9178939df55a44dcf0a890aec0aceef2f4989947 | what vulnarability does glooey version less then 0.3.5 have | |
Having vulnarability CVE-2020-7212 Advisory: Glovo-api-python 2.0.0 updates its dependency 'urllib3' to v1.25.9 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does glovo-api-python version less then 2.0.0 have ### Response: Having vulnarability CVE-2020-7212 Advisory: Glovo-api-python 2.0.0 updates its dependency 'urllib3' to v1.25.9 to include security fixes. | what vulnarability does glovo-api-python version less then 2.0.0 have | |
Having vulnarability PVE-2022-51464 Advisory: Gnoll 2.12.0 starts using PCG for securer and more statistically consistent randomness.
https://github.com/ianfhunter/GNOLL/pull/295 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gnoll version less then 2.12.0 have ### Response: Having vulnarability PVE-2022-51464 Advisory: Gnoll 2.12.0 starts using PCG for securer and more statistically consistent randomness.
https://github.com/ianfhunter/GNOLL/pull/295 | what vulnarability does gnoll version less then 2.12.0 have | |
Having vulnarability PVE-2021-25839 Advisory: Gns3-gui 1.5.1 prevents clients sending empty hostnames that could lead to bypassing an access control.
https://github.com/GNS3/gns3-gui/commit/939f8f52c187ca95fa71be7deb3a4a86bdc2e761 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gns3-gui version less then 1.5.1 have ### Response: Having vulnarability PVE-2021-25839 Advisory: Gns3-gui 1.5.1 prevents clients sending empty hostnames that could lead to bypassing an access control.
https://github.com/GNS3/gns3-gui/commit/939f8f52c187ca95fa71be7deb3a4a86bdc2e761 | what vulnarability does gns3-gui version less then 1.5.1 have | |
Having vulnarability CVE-2015-2667 Advisory: Untrusted search path vulnerability in GNS3 1.2.3 allows local users to gain privileges via a Trojan horse uuid.dll in an unspecified directory. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gns3-server version less then 1.2.3 have ### Response: Having vulnarability CVE-2015-2667 Advisory: Untrusted search path vulnerability in GNS3 1.2.3 allows local users to gain privileges via a Trojan horse uuid.dll in an unspecified directory. | what vulnarability does gns3-server version less then 1.2.3 have | |
Having vulnarability CVE-2023-24816 Advisory: Gnss-lib-py 0.1.9 updates its dependency 'ipython' to v8.12.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gnss-lib-py version less then 0.1.9 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Gnss-lib-py 0.1.9 updates its dependency 'ipython' to v8.12.0 to include a security fix. | what vulnarability does gnss-lib-py version less then 0.1.9 have | |
Having vulnarability PVE-2021-40231 Advisory: Gocept.month 2.2 adds a missing security declaration needed for the '.browser.widget.MonthWidget', the month widget for 'z3c.form'. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gocept-month version less then 2.2 have ### Response: Having vulnarability PVE-2021-40231 Advisory: Gocept.month 2.2 adds a missing security declaration needed for the '.browser.widget.MonthWidget', the month widget for 'z3c.form'. | what vulnarability does gocept-month version less then 2.2 have | |
Having vulnarability PVE-2021-36776 Advisory: Goharbor 1.1.0 fixes security issues in the token service. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does goharbor version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-36776 Advisory: Goharbor 1.1.0 fixes security issues in the token service. | what vulnarability does goharbor version less then 1.1.0 have | |
Having vulnarability CVE-2017-18342 Advisory: The Google-ads version 0.5.2 updates its PyYAML dependency, shifting from the previous range of >= 3.11, < 4.0 to the new range of >= 4.2b1, < 5.0, as a measure to address the security vulnerability detailed in CVE-2017-18342.
https://github.com/googleads/google-ads-python/commit/f47be2a5f9ec920d72a57a78a003dd0493bd0065 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does google-ads version less then 0.5.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: The Google-ads version 0.5.2 updates its PyYAML dependency, shifting from the previous range of >= 3.11, < 4.0 to the new range of >= 4.2b1, < 5.0, as a measure to address the security vulnerability detailed in CVE-2017-18342.
https://github.com/googleads/google-ads-python/commit/f47be2a5f9ec920d72a57a78a003dd0493bd0065 | what vulnarability does google-ads version less then 0.5.2 have | |
Having vulnarability CVE-2011-4211 Advisory: The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly control the opening of files, which allows local users to bypass intended access restrictions and create arbitrary files via ALLOWED_MODES and ALLOWED_DIRS changes within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does google-appengine version less then 1.5.4 have ### Response: Having vulnarability CVE-2011-4211 Advisory: The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly control the opening of files, which allows local users to bypass intended access restrictions and create arbitrary files via ALLOWED_MODES and ALLOWED_DIRS changes within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364. | what vulnarability does google-appengine version less then 1.5.4 have | |
Having vulnarability PVE-2017-47160 Advisory: Google-compute-engine 1.3.3 improves security for temporary key location.
https://github.com/GoogleCloudPlatform/compute-image-packages/commit/f02348bbfefdcfcf55f2829c6a5ca0725a176d99 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does google-compute-engine version less then 1.3.3 have ### Response: Having vulnarability PVE-2017-47160 Advisory: Google-compute-engine 1.3.3 improves security for temporary key location.
https://github.com/GoogleCloudPlatform/compute-image-packages/commit/f02348bbfefdcfcf55f2829c6a5ca0725a176d99 | what vulnarability does google-compute-engine version less then 1.3.3 have | |
Having vulnarability CVE-2021-25290 Advisory: Google-images-search 1.3.8 updates its dependency 'Pillow' to version 8.1.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does google-images-search version less then 1.3.8 have ### Response: Having vulnarability CVE-2021-25290 Advisory: Google-images-search 1.3.8 updates its dependency 'Pillow' to version 8.1.1 to include security fixes. | what vulnarability does google-images-search version less then 1.3.8 have | |
Having vulnarability CVE-2019-11324 Advisory: Gordo 0.15.1 updates its dependency 'urllib3' requirement to ">= 1.24.2" to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gordo version less then 0.15.1 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Gordo 0.15.1 updates its dependency 'urllib3' requirement to ">= 1.24.2" to include a security fix. | what vulnarability does gordo version less then 0.15.1 have | |
Having vulnarability CVE-2023-32681 Advisory: Gordo-client 6.2.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/equinor/gordo-client/pull/89 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gordo-client version less then 6.2.2 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Gordo-client 6.2.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/equinor/gordo-client/pull/89 | what vulnarability does gordo-client version less then 6.2.2 have | |
Having vulnarability CVE-2019-11324 Advisory: Gordo-components 0.15.1 updates its dependency 'urllib3' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gordo-components version less then 0.15.1 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Gordo-components 0.15.1 updates its dependency 'urllib3' to include a security fix. | what vulnarability does gordo-components version less then 0.15.1 have | |
Having vulnarability CVE-2023-32681 Advisory: Gordo-core 0.3.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/equinor/gordo-core/pull/27 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gordo-core version less then 0.3.2 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Gordo-core 0.3.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/equinor/gordo-core/pull/27 | what vulnarability does gordo-core version less then 0.3.2 have | |
Having vulnarability CVE-2023-4863 Advisory: Gphoto2 2.3.0 throughout 2.4.0 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.
https://inspector.pypi.io/project/gphoto2/2.4.0/packages/98/87/05136be73bcb763156fef792751360640d060a6611ac163d8febdf2010c7/gphoto2-2.4.0-cp310-cp310-macosx_10_9_x86_64.whl | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gphoto2 version greather then equal to 2.3.0,less then equal to 2.4.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Gphoto2 2.3.0 throughout 2.4.0 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.
https://inspector.pypi.io/project/gphoto2/2.4.0/packages/98/87/05136be73bcb763156fef792751360640d060a6611ac163d8febdf2010c7/gphoto2-2.4.0-cp310-cp310-macosx_10_9_x86_64.whl | what vulnarability does gphoto2 version greather then equal to 2.3.0,less then equal to 2.4.0 have | |
Having vulnarability CVE-2019-11324 Advisory: Gphotos-sync 2.9 updates its dependency 'urllib3' to v1.25.3 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gphotos-sync version less then 2.9 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Gphotos-sync 2.9 updates its dependency 'urllib3' to v1.25.3 to include security fixes. | what vulnarability does gphotos-sync version less then 2.9 have | |
Having vulnarability PVE-2021-38566 Advisory: Gpmf 1.2.2 addresses OOB attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gpmf version less then 1.2.2 have ### Response: Having vulnarability PVE-2021-38566 Advisory: Gpmf 1.2.2 addresses OOB attacks. | what vulnarability does gpmf version less then 1.2.2 have | |
Having vulnarability CVE-2020-26247 Advisory: Gps-time 2.8.6 updates its Ruby dependency 'nokogiri' to v1.11.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gps-time version less then 2.8.6 have ### Response: Having vulnarability CVE-2020-26247 Advisory: Gps-time 2.8.6 updates its Ruby dependency 'nokogiri' to v1.11.0 to include a security fix. | what vulnarability does gps-time version less then 2.8.6 have | |
Having vulnarability PVE-2024-67021 Advisory: Gpyg version 0.3.0 resolves the issue with unquoted strings by ensuring user inputs are correctly quoted. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gpyg version less then 0.3.0 have ### Response: Having vulnarability PVE-2024-67021 Advisory: Gpyg version 0.3.0 resolves the issue with unquoted strings by ensuring user inputs are correctly quoted. | what vulnarability does gpyg version less then 0.3.0 have | |
Having vulnarability PVE-2021-43619 Advisory: Gradio 2.6.0 fixes arbitrary file read vulnerabilities.
https://github.com/gradio-app/gradio/pull/406 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gradio version less then 2.6.0 have ### Response: Having vulnarability PVE-2021-43619 Advisory: Gradio 2.6.0 fixes arbitrary file read vulnerabilities.
https://github.com/gradio-app/gradio/pull/406 | what vulnarability does gradio version less then 2.6.0 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.