output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2021-38648 Advisory: Grafana-dashboard-builder 0.6.0a1 fixes a pyyaml security issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grafana-dashboard-builder version less then 0.6.0a1 have ### Response: Having vulnarability PVE-2021-38648 Advisory: Grafana-dashboard-builder 0.6.0a1 fixes a pyyaml security issue. | what vulnarability does grafana-dashboard-builder version less then 0.6.0a1 have | |
Having vulnarability PVE-2022-48393 Advisory: Grafana-django-saml2-auth 2.1.0 fixes an open redirect vulnerability in the login flow.
https://github.com/grafana/django-saml2-auth/commit/572375fe50048a4b48348b9ce17cb2a512bef8d5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grafana-django-saml2-auth version less then 2.1.0 have ### Response: Having vulnarability PVE-2022-48393 Advisory: Grafana-django-saml2-auth 2.1.0 fixes an open redirect vulnerability in the login flow.
https://github.com/grafana/django-saml2-auth/commit/572375fe50048a4b48348b9ce17cb2a512bef8d5 | what vulnarability does grafana-django-saml2-auth version less then 2.1.0 have | |
Having vulnarability CVE-2020-36245 Advisory: GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gramaddict version greather then equal to 0,less then 1.2.4 have ### Response: Having vulnarability CVE-2020-36245 Advisory: GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network. | what vulnarability does gramaddict version greather then equal to 0,less then 1.2.4 have | |
Having vulnarability PVE-2023-61270 Advisory: Granary 6.1 includes a fix for a potential XSS in https://brid.gy service.
https://github.com/snarfed/bridgy/security/advisories/GHSA-4w4f-g49g-3f7j | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does granary version less then 6.1 have ### Response: Having vulnarability PVE-2023-61270 Advisory: Granary 6.1 includes a fix for a potential XSS in https://brid.gy service.
https://github.com/snarfed/bridgy/security/advisories/GHSA-4w4f-g49g-3f7j | what vulnarability does granary version less then 6.1 have | |
Having vulnarability PVE-2021-41231 Advisory: Graph-notebook 3.0.5 includes an upgrade of a Jupyter Notebook dependency for a security fix.
https://github.com/aws/graph-notebook/pull/182 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graph-notebook version less then 3.0.5 have ### Response: Having vulnarability PVE-2021-41231 Advisory: Graph-notebook 3.0.5 includes an upgrade of a Jupyter Notebook dependency for a security fix.
https://github.com/aws/graph-notebook/pull/182 | what vulnarability does graph-notebook version less then 3.0.5 have | |
Having vulnarability CVE-2021-41248 Advisory: Graphene-django 3.0.1 updates its NPM dependency 'graphiql' to v1.4.7 to fix a potential vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphene-django version less then 3.0.1 have ### Response: Having vulnarability CVE-2021-41248 Advisory: Graphene-django 3.0.1 updates its NPM dependency 'graphiql' to v1.4.7 to fix a potential vulnerability. | what vulnarability does graphene-django version less then 3.0.1 have | |
Having vulnarability PVE-2023-62447 Advisory: Graphenelib 0.6.1 includes a security fix: Certificate validation is disabled for wss urls.
https://github.com/xeroc/python-graphenelib/issues/60 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphenelib version less then 0.6.1 have ### Response: Having vulnarability PVE-2023-62447 Advisory: Graphenelib 0.6.1 includes a security fix: Certificate validation is disabled for wss urls.
https://github.com/xeroc/python-graphenelib/issues/60 | what vulnarability does graphenelib version less then 0.6.1 have | |
Having vulnarability PVE-2021-40227 Advisory: Graphite-web 1.1.8 prevents cross-site scripting.
https://github.com/graphite-project/graphite-web/pull/2620 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphite-web version less then 1.1.8 have ### Response: Having vulnarability PVE-2021-40227 Advisory: Graphite-web 1.1.8 prevents cross-site scripting.
https://github.com/graphite-project/graphite-web/pull/2620 | what vulnarability does graphite-web version less then 1.1.8 have | |
Having vulnarability CVE-2020-1747 Advisory: Graphrepo 0.1.8 updates its dependency 'pyyaml' to v5.3.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphrepo version less then 0.1.8 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Graphrepo 0.1.8 updates its dependency 'pyyaml' to v5.3.1 to include a security fix. | what vulnarability does graphrepo version less then 0.1.8 have | |
Having vulnarability CVE-2018-8088 Advisory: Graphscope 0.7.0 updates its dependency 'SLF4J' to v1.7.31 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does graphscope version less then 0.7.0 have ### Response: Having vulnarability CVE-2018-8088 Advisory: Graphscope 0.7.0 updates its dependency 'SLF4J' to v1.7.31 to include a security fix. | what vulnarability does graphscope version less then 0.7.0 have | |
Having vulnarability CVE-2021-33503 Advisory: Gretel-client 0.16.2 updates its dependency 'urllib3' requirement to '>=1.26.5' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gretel-client version less then 0.16.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Gretel-client 0.16.2 updates its dependency 'urllib3' requirement to '>=1.26.5' to include a security fix. | what vulnarability does gretel-client version less then 0.16.2 have | |
Having vulnarability PVE-2023-61648 Advisory: Griptape 0.18.0 includes a fix for a prompt injection vulnerability.
https://github.com/griptape-ai/griptape/issues/280 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does griptape version less then 0.18.0 have ### Response: Having vulnarability PVE-2023-61648 Advisory: Griptape 0.18.0 includes a fix for a prompt injection vulnerability.
https://github.com/griptape-ai/griptape/issues/280 | what vulnarability does griptape version less then 0.18.0 have | |
Having vulnarability PVE-2023-62368 Advisory: Grooveshop-django-api 0.44.3 include a fix for an unsafe defaults vulnerability in config file.
https://github.com/vasilistotskas/grooveshop-django-api/commit/fe64d9814f90cc86ea1a52656d689512d4e60a31 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grooveshop-django-api version less then 0.44.3 have ### Response: Having vulnarability PVE-2023-62368 Advisory: Grooveshop-django-api 0.44.3 include a fix for an unsafe defaults vulnerability in config file.
https://github.com/vasilistotskas/grooveshop-django-api/commit/fe64d9814f90cc86ea1a52656d689512d4e60a31 | what vulnarability does grooveshop-django-api version less then 0.44.3 have | |
Having vulnarability CVE-2017-7860 Advisory: Grpcio 1.2.0 includes a fix for CVE-2017-7860: Google gRPC before 2017-02-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the parse_unix function in core/ext/client_channel/parse_address.c.
https://github.com/grpc/grpc/pull/9833/commits/bcd5f12e4bca2ed2c00cddb5ffd046aef6f4fb31 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grpcio version less then 1.2.0 have ### Response: Having vulnarability CVE-2017-7860 Advisory: Grpcio 1.2.0 includes a fix for CVE-2017-7860: Google gRPC before 2017-02-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the parse_unix function in core/ext/client_channel/parse_address.c.
https://github.com/grpc/grpc/pull/9833/commits/bcd5f12e4bca2ed2c00cddb5ffd046aef6f4fb31 | what vulnarability does grpcio version less then 1.2.0 have | |
Having vulnarability CVE-2017-7861 Advisory: Grpcio-tools 1.2.0 depends on 'grpcio' v1.2.0, which includes security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does grpcio-tools version less then 1.2.0 have ### Response: Having vulnarability CVE-2017-7861 Advisory: Grpcio-tools 1.2.0 depends on 'grpcio' v1.2.0, which includes security fixes. | what vulnarability does grpcio-tools version less then 1.2.0 have | |
Having vulnarability PVE-2021-41066 Advisory: Gseapy 0.10.5 fixes 'InsecureRequestWarning'. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gseapy version less then 0.10.5 have ### Response: Having vulnarability PVE-2021-41066 Advisory: Gseapy 0.10.5 fixes 'InsecureRequestWarning'. | what vulnarability does gseapy version less then 0.10.5 have | |
Having vulnarability PVE-2021-27541 Advisory: Gsutil 3.41 includes changes to protect the security of resumable upload IDs.
https://github.com/GoogleCloudPlatform/gsutil/commit/43cf0087b97c889d8e3eca67499ac2e887a6726a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gsutil version less then 3.41 have ### Response: Having vulnarability PVE-2021-27541 Advisory: Gsutil 3.41 includes changes to protect the security of resumable upload IDs.
https://github.com/GoogleCloudPlatform/gsutil/commit/43cf0087b97c889d8e3eca67499ac2e887a6726a | what vulnarability does gsutil version less then 3.41 have | |
Having vulnarability CVE-2021-23556 Advisory: Guake 3.8.5 includes a fix for CVE-2021-23556: The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.
https://github.com/Guake/guake/issues/1796 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does guake version less then 3.8.5 have ### Response: Having vulnarability CVE-2021-23556 Advisory: Guake 3.8.5 includes a fix for CVE-2021-23556: The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.
https://github.com/Guake/guake/issues/1796 | what vulnarability does guake version less then 3.8.5 have | |
Having vulnarability PVE-2022-52100 Advisory: Guarddog 0.1.5 uses 'tarsafe' instead of built-in 'tarfile' to extract archives, to fix an arbitrary file write vulnerability when scanning a specially-crafted PyPI packages.
https://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does guarddog version less then 0.1.5 have ### Response: Having vulnarability PVE-2022-52100 Advisory: Guarddog 0.1.5 uses 'tarsafe' instead of built-in 'tarfile' to extract archives, to fix an arbitrary file write vulnerability when scanning a specially-crafted PyPI packages.
https://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq | what vulnarability does guarddog version less then 0.1.5 have | |
Having vulnarability PVE-2021-36961 Advisory: guillotina 4.5.8 fixes memory leak in security policy lookups | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does guillotina version less then 4.5.8 have ### Response: Having vulnarability PVE-2021-36961 Advisory: guillotina 4.5.8 fixes memory leak in security policy lookups | what vulnarability does guillotina version less then 4.5.8 have | |
Having vulnarability PVE-2021-40218 Advisory: guillotina-dynamictablestorage 1.1.0 fixes a possible sql injection.
https://github.com/guillotinaweb/guillotina_dynamictablestorage/commit/8f3c94147ab8b834f6cbfda1c2540b75124cfdf9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does guillotina-dynamictablestorage version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-40218 Advisory: guillotina-dynamictablestorage 1.1.0 fixes a possible sql injection.
https://github.com/guillotinaweb/guillotina_dynamictablestorage/commit/8f3c94147ab8b834f6cbfda1c2540b75124cfdf9 | what vulnarability does guillotina-dynamictablestorage version less then 1.1.0 have | |
Having vulnarability PVE-2021-40104 Advisory: Gunicorn 20.0.1 fixes chunked encoding support to prevent http request smuggling attacks.
https://github.com/benoitc/gunicorn/issues/2176
https://github.com/p4k03n4t0r/http-request-smuggling#request-smuggling-using-mitmproxy-and-gunicorn | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gunicorn version less then 19.10.0,greather then equal to 20.0.0,less then 20.0.1 have ### Response: Having vulnarability PVE-2021-40104 Advisory: Gunicorn 20.0.1 fixes chunked encoding support to prevent http request smuggling attacks.
https://github.com/benoitc/gunicorn/issues/2176
https://github.com/p4k03n4t0r/http-request-smuggling#request-smuggling-using-mitmproxy-and-gunicorn | what vulnarability does gunicorn version less then 19.10.0,greather then equal to 20.0.0,less then 20.0.1 have | |
Having vulnarability PVE-2021-37809 Advisory: Gvar 9.2.1 fixes bugs in gvar.load and gvar.dump caused by recent security upgrades to pyYAML. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gvar version less then 9.2.1 have ### Response: Having vulnarability PVE-2021-37809 Advisory: Gvar 9.2.1 fixes bugs in gvar.load and gvar.dump caused by recent security upgrades to pyYAML. | what vulnarability does gvar version less then 9.2.1 have | |
Having vulnarability CVE-2022-3970 Advisory: Gvsbuild 2022.6.0 includes a fix for CVE-2022-3970, an integer overflow critical vulnerability affecting a C dependency (Libtiff).
https://github.com/wingtk/gvsbuild/pull/744/commits/652f23e9ef52bac8eb9bfad179f8b68ee90be08b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gvsbuild version less then 2022.6.0 have ### Response: Having vulnarability CVE-2022-3970 Advisory: Gvsbuild 2022.6.0 includes a fix for CVE-2022-3970, an integer overflow critical vulnerability affecting a C dependency (Libtiff).
https://github.com/wingtk/gvsbuild/pull/744/commits/652f23e9ef52bac8eb9bfad179f8b68ee90be08b | what vulnarability does gvsbuild version less then 2022.6.0 have | |
Having vulnarability CVE-2023-38325 Advisory: Gyver 2.8.3 updates its dependency 'cryptography' to versions ^41.0.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does gyver version less then 2.8.3 have ### Response: Having vulnarability CVE-2023-38325 Advisory: Gyver 2.8.3 updates its dependency 'cryptography' to versions ^41.0.4 to include security fixes. | what vulnarability does gyver version less then 2.8.3 have | |
Having vulnarability CVE-2021-45046 Advisory: H2o 3.34.0.7 updates its dependency 'log4j' to v2.17.0 to fix critical and severe vulnerabilities.
https://github.com/h2oai/h2o-3/commit/85dc8a3fdbfef002919d15764b1ad99b3c39f851 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does h2o version less then 3.34.0.7 have ### Response: Having vulnarability CVE-2021-45046 Advisory: H2o 3.34.0.7 updates its dependency 'log4j' to v2.17.0 to fix critical and severe vulnerabilities.
https://github.com/h2oai/h2o-3/commit/85dc8a3fdbfef002919d15764b1ad99b3c39f851 | what vulnarability does h2o version less then 3.34.0.7 have | |
Having vulnarability CVE-2023-51663 Advisory: Hail, a Python-based data analysis tool, uses OpenID Connect (OIDC) email addresses to verify user domains. However, users can change their email addresses, potentially gaining unauthorized access to resources. For instance, a user could create a Microsoft or Google account, change their email to test@example.org, and then create a Hail Batch account in clusters under the example.org domain. While they can't access private data or impersonate others, they can run jobs and create Azure Tenants if they have the necessary access.
https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hail version less then 0.2.127 have ### Response: Having vulnarability CVE-2023-51663 Advisory: Hail, a Python-based data analysis tool, uses OpenID Connect (OIDC) email addresses to verify user domains. However, users can change their email addresses, potentially gaining unauthorized access to resources. For instance, a user could create a Microsoft or Google account, change their email to test@example.org, and then create a Hail Batch account in clusters under the example.org domain. While they can't access private data or impersonate others, they can run jobs and create Azure Tenants if they have the necessary access.
https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw | what vulnarability does hail version less then 0.2.127 have | |
Having vulnarability CVE-2020-26137 Advisory: Handprint 1.5.0 updates its dependency 'urllib3' to v1.26.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does handprint version less then 1.5.0 have ### Response: Having vulnarability CVE-2020-26137 Advisory: Handprint 1.5.0 updates its dependency 'urllib3' to v1.26.5 to include a security fix. | what vulnarability does handprint version less then 1.5.0 have | |
Having vulnarability CVE-2022-23491 Advisory: Hardeneks 0.4.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hardeneks version less then 0.4.1 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Hardeneks 0.4.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix. | what vulnarability does hardeneks version less then 0.4.1 have | |
Having vulnarability PVE-2021-39435 Advisory: Hardline 0.12 contains privacy enchantments for hashID domain names. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hardline version less then 0.12 have ### Response: Having vulnarability PVE-2021-39435 Advisory: Hardline 0.12 contains privacy enchantments for hashID domain names. | what vulnarability does hardline version less then 0.12 have | |
Having vulnarability PVE-2021-39643 Advisory: Hashers 0.2.11 adds protection against time-attacks on string comparisons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hashers version less then 0.2.11 have ### Response: Having vulnarability PVE-2021-39643 Advisory: Hashers 0.2.11 adds protection against time-attacks on string comparisons. | what vulnarability does hashers version less then 0.2.11 have | |
Having vulnarability CVE-2018-21019 Advisory: Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hassmart-homeassistant version less then 0.67.0 have ### Response: Having vulnarability CVE-2018-21019 Advisory: Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py. | what vulnarability does hassmart-homeassistant version less then 0.67.0 have | |
Having vulnarability CVE-2021-23727 Advisory: Hazen 1.0.1 removes its dependency 'celery', preventing a security issue.
https://github.com/GSTT-CSC/hazen/pull/253 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hazen version less then 1.0.1 have ### Response: Having vulnarability CVE-2021-23727 Advisory: Hazen 1.0.1 removes its dependency 'celery', preventing a security issue.
https://github.com/GSTT-CSC/hazen/pull/253 | what vulnarability does hazen version less then 1.0.1 have | |
Having vulnarability CVE-2022-40899 Advisory: Hdrhistogram 0.10.0 removes its dependency 'future' to avoid a vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hdrhistogram version less then 0.10.0 have ### Response: Having vulnarability CVE-2022-40899 Advisory: Hdrhistogram 0.10.0 removes its dependency 'future' to avoid a vulnerability. | what vulnarability does hdrhistogram version less then 0.10.0 have | |
Having vulnarability CVE-2023-38545 Advisory: Healpy 1.16.6 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does healpy version less then equal to 1.16.6 have ### Response: Having vulnarability CVE-2023-38545 Advisory: Healpy 1.16.6 and prior releases ship with a version of 'libcurl' that has a high-severity vulnerability. | what vulnarability does healpy version less then equal to 1.16.6 have | |
Having vulnarability CVE-2016-9185 Advisory: In OpenStack Heat, by launching a new Heat stack with a local URL an authenticated user may conduct network discovery revealing internal network configuration. Affected versions are <=5.0.3, >=6.0.0 <=6.1.0, and ==7.0.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does heat version less then equal to 5.0.3,greather then equal to 6.0.0,less then equal to 6.1.0,less then equal to 7.0.0 have ### Response: Having vulnarability CVE-2016-9185 Advisory: In OpenStack Heat, by launching a new Heat stack with a local URL an authenticated user may conduct network discovery revealing internal network configuration. Affected versions are <=5.0.3, >=6.0.0 <=6.1.0, and ==7.0.0. | what vulnarability does heat version less then equal to 5.0.3,greather then equal to 6.0.0,less then equal to 6.1.0,less then equal to 7.0.0 have | |
Having vulnarability PVE-2021-37687 Advisory: Heedy 0.3.0a1 reports it its changelog: There might [...] be security issues. Use at your own risk. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does heedy version less then 0.3.0a1 have ### Response: Having vulnarability PVE-2021-37687 Advisory: Heedy 0.3.0a1 reports it its changelog: There might [...] be security issues. Use at your own risk. | what vulnarability does heedy version less then 0.3.0a1 have | |
Having vulnarability PVE-2022-51741 Advisory: Hello-world-exampl is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hello-world-exampl version greather then 0 have ### Response: Having vulnarability PVE-2022-51741 Advisory: Hello-world-exampl is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does hello-world-exampl version greather then 0 have | |
Having vulnarability PVE-2022-51742 Advisory: Hello-world-example is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hello-world-example version greather then 0 have ### Response: Having vulnarability PVE-2022-51742 Advisory: Hello-world-example is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does hello-world-example version greather then 0 have | |
Having vulnarability PVE-2024-67010 Advisory: Help-tokens 1.0.4 has updated its Jinja2 requirement from version 2.9.6 to 2.10.1 to address a known security vulnerability found in previous versions, as identified by CVE-2019-10906. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does help-tokens version less then 1.0.4 have ### Response: Having vulnarability PVE-2024-67010 Advisory: Help-tokens 1.0.4 has updated its Jinja2 requirement from version 2.9.6 to 2.10.1 to address a known security vulnerability found in previous versions, as identified by CVE-2019-10906. | what vulnarability does help-tokens version less then 1.0.4 have | |
Having vulnarability PVE-2021-36303 Advisory: Henosis 0.0.11 uses 'yaml.safe_load()' to prevent a code execution vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does henosis version less then 0.0.11 have ### Response: Having vulnarability PVE-2021-36303 Advisory: Henosis 0.0.11 uses 'yaml.safe_load()' to prevent a code execution vulnerability. | what vulnarability does henosis version less then 0.0.11 have | |
Having vulnarability CVE-2024-26130 Advisory: Hexkit 2.2.0 has upgraded its cryptography library requirement to version 42.0.4 or later, addressing the security issue CVE-2024-26130. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hexkit version less then 2.2.0 have ### Response: Having vulnarability CVE-2024-26130 Advisory: Hexkit 2.2.0 has upgraded its cryptography library requirement to version 42.0.4 or later, addressing the security issue CVE-2024-26130. | what vulnarability does hexkit version less then 2.2.0 have | |
Having vulnarability PVE-2024-65785 Advisory: Heyoo version 0.4 has disabled the debug mode, which was previously activated by default in the hook. The app was vulnerable to exploitation once online.
https://github.com/Neurotech-HQ/heyoo/pull/85/commits/7631be553bd15093d807f4446a3ab941e6a14994 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does heyoo version less then 0.4 have ### Response: Having vulnarability PVE-2024-65785 Advisory: Heyoo version 0.4 has disabled the debug mode, which was previously activated by default in the hook. The app was vulnerable to exploitation once online.
https://github.com/Neurotech-HQ/heyoo/pull/85/commits/7631be553bd15093d807f4446a3ab941e6a14994 | what vulnarability does heyoo version less then 0.4 have | |
Having vulnarability PVE-2021-38480 Advisory: Hhpy 0.1.8 includes an upgrade of bleach for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hhpy version less then 0.1.8 have ### Response: Having vulnarability PVE-2021-38480 Advisory: Hhpy 0.1.8 includes an upgrade of bleach for security reasons. | what vulnarability does hhpy version less then 0.1.8 have | |
Having vulnarability PVE-2023-62138 Advisory: Hiddifypanel 8.7.0 and 9.0.0.dev25 include a security fix related to broken authorization.
https://github.com/hiddify/HiddifyPanel/commit/6802ab32d7dab1ab61767b6f87a16746112c9f0a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hiddifypanel version less then 8.7.0,greather then equal to 9.0.0.dev0,less then 9.0.0.dev25 have ### Response: Having vulnarability PVE-2023-62138 Advisory: Hiddifypanel 8.7.0 and 9.0.0.dev25 include a security fix related to broken authorization.
https://github.com/hiddify/HiddifyPanel/commit/6802ab32d7dab1ab61767b6f87a16746112c9f0a | what vulnarability does hiddifypanel version less then 8.7.0,greather then equal to 9.0.0.dev0,less then 9.0.0.dev25 have | |
Having vulnarability CVE-2023-32681 Advisory: Highcharts-core 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/highcharts-for-python/highcharts-core/commit/199f42b7ab5759411c923d0a24fd26b57aa25f25 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does highcharts-core version less then 1.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Highcharts-core 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/highcharts-for-python/highcharts-core/commit/199f42b7ab5759411c923d0a24fd26b57aa25f25 | what vulnarability does highcharts-core version less then 1.2.0 have | |
Having vulnarability CVE-2023-32681 Advisory: Highcharts-gantt 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/highcharts-for-python/highcharts-gantt/commit/804b5bf1bd39f75690e6c13621a60cfcd39abf75 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does highcharts-gantt version less then 1.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Highcharts-gantt 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/highcharts-for-python/highcharts-gantt/commit/804b5bf1bd39f75690e6c13621a60cfcd39abf75 | what vulnarability does highcharts-gantt version less then 1.2.0 have | |
Having vulnarability CVE-2023-32681 Advisory: Highcharts-maps 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/highcharts-for-python/highcharts-maps/commit/dac460249e2bbc1e33a518af48cb6fc6c91ca00e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does highcharts-maps version less then 1.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Highcharts-maps 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/highcharts-for-python/highcharts-maps/commit/dac460249e2bbc1e33a518af48cb6fc6c91ca00e | what vulnarability does highcharts-maps version less then 1.2.0 have | |
Having vulnarability CVE-2023-32681 Advisory: Highcharts-stock 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/highcharts-for-python/highcharts-stock/commit/9477155fc20a6ca2e3f184c8fe151f25db431e3e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does highcharts-stock version less then 1.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Highcharts-stock 1.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/highcharts-for-python/highcharts-stock/commit/9477155fc20a6ca2e3f184c8fe151f25db431e3e | what vulnarability does highcharts-stock version less then 1.2.0 have | |
Having vulnarability PVE-2024-67104 Advisory: Hikari version 2.0.0.dev73 addresses a bug where prematurely shutting down a bot during its startup phase led to a deadlock, enhancing stability and functionality during the bot's initialization process. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hikari version less then 2.0.0.dev73 have ### Response: Having vulnarability PVE-2024-67104 Advisory: Hikari version 2.0.0.dev73 addresses a bug where prematurely shutting down a bot during its startup phase led to a deadlock, enhancing stability and functionality during the bot's initialization process. | what vulnarability does hikari version less then 2.0.0.dev73 have | |
Having vulnarability CVE-2020-10377 Advisory: Hippogym 1.1.0 updates its dependency 'pillow' to v7.1.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hippogym version less then 1.1.0 have ### Response: Having vulnarability CVE-2020-10377 Advisory: Hippogym 1.1.0 updates its dependency 'pillow' to v7.1.0 to include security fixes. | what vulnarability does hippogym version less then 1.1.0 have | |
Having vulnarability CVE-2021-32765 Advisory: Hiredis (python wrapper for hiredis) 2.1.0 supports hiredis 1.1.0, that includes a security fix.
https://github.com/redis/hiredis-py/pull/135 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hiredis version less then 2.1.0 have ### Response: Having vulnarability CVE-2021-32765 Advisory: Hiredis (python wrapper for hiredis) 2.1.0 supports hiredis 1.1.0, that includes a security fix.
https://github.com/redis/hiredis-py/pull/135 | what vulnarability does hiredis version less then 2.1.0 have | |
Having vulnarability PVE-2021-40150 Advisory: Hivemind 0.9.5 includes a security fix: Unpickling data from peers may lead to remote code execution.
https://github.com/learning-at-home/hivemind/issues/155 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hivemind version less then 0.9.5 have ### Response: Having vulnarability PVE-2021-40150 Advisory: Hivemind 0.9.5 includes a security fix: Unpickling data from peers may lead to remote code execution.
https://github.com/learning-at-home/hivemind/issues/155 | what vulnarability does hivemind version less then 0.9.5 have | |
Having vulnarability PVE-2021-41327 Advisory: Hkjournalist version 0.0.8 includes a security patch for the function 'report' in 'hkjournalist/journalist.py'. It contained an OS injection vulnerability: subprocess call with shell=True.
https://github.com/li-xin-yi/HK-journalist/commit/ec95050b13fed27f77ac3ab7ecbc7b1f27f50921 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hkjournalist version less then 0.0.8 have ### Response: Having vulnarability PVE-2021-41327 Advisory: Hkjournalist version 0.0.8 includes a security patch for the function 'report' in 'hkjournalist/journalist.py'. It contained an OS injection vulnerability: subprocess call with shell=True.
https://github.com/li-xin-yi/HK-journalist/commit/ec95050b13fed27f77ac3ab7ecbc7b1f27f50921 | what vulnarability does hkjournalist version less then 0.0.8 have | |
Having vulnarability CVE-2023-37365 Advisory: Hnswlib 0.7.0 has a double free in init_index when the M argument is a large integer. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hnswlib version less then equal to 0.7.0 have ### Response: Having vulnarability CVE-2023-37365 Advisory: Hnswlib 0.7.0 has a double free in init_index when the M argument is a large integer. | what vulnarability does hnswlib version less then equal to 0.7.0 have | |
Having vulnarability CVE-2021-3737 Advisory: Holepunch 1.0.0 drops support for Python 2 and 3 < 3.6. These versions are not receiving security updates anymore. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does holepunch version less then 1.0.0 have ### Response: Having vulnarability CVE-2021-3737 Advisory: Holepunch 1.0.0 drops support for Python 2 and 3 < 3.6. These versions are not receiving security updates anymore. | what vulnarability does holepunch version less then 1.0.0 have | |
Having vulnarability PVE-2024-66787 Advisory: Holidays 0.45 addresses security concerns flagged by SonarCloud related to vulnerable regular expression patterns that could lead to denial of service. The issue, identified as potentially causing polynomial runtime due to backtracking, was mitigated by modifying regex strings in the codebase.
https://github.com/vacanza/python-holidays/pull/1723 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does holidays version less then 0.45 have ### Response: Having vulnarability PVE-2024-66787 Advisory: Holidays 0.45 addresses security concerns flagged by SonarCloud related to vulnerable regular expression patterns that could lead to denial of service. The issue, identified as potentially causing polynomial runtime due to backtracking, was mitigated by modifying regex strings in the codebase.
https://github.com/vacanza/python-holidays/pull/1723 | what vulnarability does holidays version less then 0.45 have | |
Having vulnarability PVE-2021-25844 Advisory: holocron 0.2.0 fixed a security issue when content author may steal private data through content's meta header. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does holocron version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-25844 Advisory: holocron 0.2.0 fixed a security issue when content author may steal private data through content's meta header. | what vulnarability does holocron version less then 0.2.0 have | |
Having vulnarability PVE-2022-48229 Advisory: Home-assistant-frontend 20220420.0 no longer uses the insecure git protocol.
https://github.com/home-assistant/frontend/commit/1e0647c0d1a360469da5f299cacbffcaca186a8a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does home-assistant-frontend version less then 20220420.0 have ### Response: Having vulnarability PVE-2022-48229 Advisory: Home-assistant-frontend 20220420.0 no longer uses the insecure git protocol.
https://github.com/home-assistant/frontend/commit/1e0647c0d1a360469da5f299cacbffcaca186a8a | what vulnarability does home-assistant-frontend version less then 20220420.0 have | |
Having vulnarability PVE-2021-34222 Advisory: homeassistant before 0.37 uses a weak random number generator to create access tokens for camera feeds which could be brute force attacked in 2.5 weeks | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does homeassistant version less then 0.37 have ### Response: Having vulnarability PVE-2021-34222 Advisory: homeassistant before 0.37 uses a weak random number generator to create access tokens for camera feeds which could be brute force attacked in 2.5 weeks | what vulnarability does homeassistant version less then 0.37 have | |
Having vulnarability CVE-2022-40898 Advisory: Honeybee-display 0.2.14 updates its dependency 'wheel' to v0.38.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does honeybee-display version less then 0.2.14 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Honeybee-display 0.2.14 updates its dependency 'wheel' to v0.38.1 to include a security fix. | what vulnarability does honeybee-display version less then 0.2.14 have | |
Having vulnarability CVE-2022-40898 Advisory: Honeybee-radiance 1.64.132 updates its dev dependency 'wheel' to v0.38.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does honeybee-radiance version less then 1.64.132 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Honeybee-radiance 1.64.132 updates its dev dependency 'wheel' to v0.38.1 to include a security fix. | what vulnarability does honeybee-radiance version less then 1.64.132 have | |
Having vulnarability CVE-2022-40898 Advisory: Honeybee-radiance-postprocess 0.4.166 updates its dependency 'wheel' to v0.38.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does honeybee-radiance-postprocess version less then 0.4.166 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Honeybee-radiance-postprocess 0.4.166 updates its dependency 'wheel' to v0.38.1 to include a security fix. | what vulnarability does honeybee-radiance-postprocess version less then 0.4.166 have | |
Having vulnarability CVE-2021-33571 Advisory: Honeycomb-beeline 3.0.0 updates its dependency 'Django' minimum version to v2.2.26 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does honeycomb-beeline version less then 3.0.0 have ### Response: Having vulnarability CVE-2021-33571 Advisory: Honeycomb-beeline 3.0.0 updates its dependency 'Django' minimum version to v2.2.26 to include security fixes. | what vulnarability does honeycomb-beeline version less then 3.0.0 have | |
Having vulnarability CVE-2019-19588 Advisory: Hooktest 1.3.1 updates its dependency "validators" to v0.12.6 to fix a security leak. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hooktest version less then 1.3.1 have ### Response: Having vulnarability CVE-2019-19588 Advisory: Hooktest 1.3.1 updates its dependency "validators" to v0.12.6 to fix a security leak. | what vulnarability does hooktest version less then 1.3.1 have | |
Having vulnarability CVE-2022-29217 Advisory: Hopeit.engine 0.16.1 updates its dependency 'PyJWT' to v2.4.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hopeit.engine version less then 0.16.1 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Hopeit.engine 0.16.1 updates its dependency 'PyJWT' to v2.4.0 to include a security fix. | what vulnarability does hopeit.engine version less then 0.16.1 have | |
Having vulnarability CVE-2020-29565 Advisory: An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the "next" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the provided malicious URL. See CVE-2020-29565. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does horizon version less then 15.3.2,greather then equal to 17.0,less then 18.3.3,greather then equal to 16.0.0.0b1,less then 16.2.1 have ### Response: Having vulnarability CVE-2020-29565 Advisory: An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the "next" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the provided malicious URL. See CVE-2020-29565. | what vulnarability does horizon version less then 15.3.2,greather then equal to 17.0,less then 18.3.3,greather then equal to 16.0.0.0b1,less then 16.2.1 have | |
Having vulnarability CVE-2022-0315 Advisory: Insecure Temporary File in GitHub repository horovod/horovod prior to 0.24.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does horovod version greather then equal to 0,less then 0.24.0 have ### Response: Having vulnarability CVE-2022-0315 Advisory: Insecure Temporary File in GitHub repository horovod/horovod prior to 0.24.0. | what vulnarability does horovod version greather then equal to 0,less then 0.24.0 have | |
Having vulnarability CVE-2020-15192 Advisory: Hotaru 3.2.4 updates Tensorflow to >= 2.2.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hotaru version less then 3.2.4 have ### Response: Having vulnarability CVE-2020-15192 Advisory: Hotaru 3.2.4 updates Tensorflow to >= 2.2.1 to include security fixes. | what vulnarability does hotaru version less then 3.2.4 have | |
Having vulnarability PVE-2021-39389 Advisory: Hover 0.4.0 was released with the acknowledgement that it (and previous versions?) includes a potential security concern. In particular, it displays traceback information if something breaks in the scope of the recipe. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hover version less then equal to 0.4.0 have ### Response: Having vulnarability PVE-2021-39389 Advisory: Hover 0.4.0 was released with the acknowledgement that it (and previous versions?) includes a potential security concern. In particular, it displays traceback information if something breaks in the scope of the recipe. | what vulnarability does hover version less then equal to 0.4.0 have | |
Having vulnarability CVE-2016-6580 Advisory: A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hpack version less then 1.2.0 have ### Response: Having vulnarability CVE-2016-6580 Advisory: A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree. | what vulnarability does hpack version less then 1.2.0 have | |
Having vulnarability PVE-2021-39387 Advisory: Hpim-dm 1.4 fixes security issues on IPv6 HPIM-DM interfaces. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hpim-dm version less then 1.4 have ### Response: Having vulnarability PVE-2021-39387 Advisory: Hpim-dm 1.4 fixes security issues on IPv6 HPIM-DM interfaces. | what vulnarability does hpim-dm version less then 1.4 have | |
Having vulnarability PVE-2022-47768 Advisory: Htbulma 0.1.1 limits 'FileSelect' to the path to avoid directory transversal attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does htbulma version less then 0.1.1 have ### Response: Having vulnarability PVE-2022-47768 Advisory: Htbulma 0.1.1 limits 'FileSelect' to the path to avoid directory transversal attacks. | what vulnarability does htbulma version less then 0.1.1 have | |
Having vulnarability CVE-2021-23654 Advisory: All versions of html-to-csv are affected by CVE-2021-23654: When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this, a malicious actor can embed or generate a malicious link or execute commands via CSV files.
https://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does html-to-csv version greather then 0 have ### Response: Having vulnarability CVE-2021-23654 Advisory: All versions of html-to-csv are affected by CVE-2021-23654: When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this, a malicious actor can embed or generate a malicious link or execute commands via CSV files.
https://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py | what vulnarability does html-to-csv version greather then 0 have | |
Having vulnarability PVE-2021-25845 Advisory: Html5 0.99999999 fixes a XSS vulnerability exploitable when using legacy browsers. This release alters the API so that quote_attr_values is now a ternary setting, choosing between legacy-safe behavior, spec behavior, and always quoting.
https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does html5 version less then 0.99999999 have ### Response: Having vulnarability PVE-2021-25845 Advisory: Html5 0.99999999 fixes a XSS vulnerability exploitable when using legacy browsers. This release alters the API so that quote_attr_values is now a ternary setting, choosing between legacy-safe behavior, spec behavior, and always quoting.
https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7 | what vulnarability does html5 version less then 0.99999999 have | |
Having vulnarability CVE-2016-9909 Advisory: The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values.
https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does html5lib version less then 0.99999999,greather then equal to 1.0b1,less then 1.0b9 have ### Response: Having vulnarability CVE-2016-9909 Advisory: The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values.
https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7 | what vulnarability does html5lib version less then 0.99999999,greather then equal to 1.0b1,less then 1.0b9 have | |
Having vulnarability PVE-2022-44729 Advisory: Htmlgenerator 1.2.9 fixes XSS vulnerability on html attributes.
https://github.com/basxsoftwareassociation/htmlgenerator/commit/63bb8892834485d22d4313898e8e61d76ade08b1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does htmlgenerator version less then 1.2.9 have ### Response: Having vulnarability PVE-2022-44729 Advisory: Htmlgenerator 1.2.9 fixes XSS vulnerability on html attributes.
https://github.com/basxsoftwareassociation/htmlgenerator/commit/63bb8892834485d22d4313898e8e61d76ade08b1 | what vulnarability does htmlgenerator version less then 1.2.9 have | |
Having vulnarability CVE-2021-39214 Advisory: Http-tools 3.0.0 updates its dependency 'mitmproxy' to version '9.0.1' to include a fix for an HTTP Request Smuggling vulnerability.
https://github.com/MobSF/httptools/commit/896d06ab49b4eeb01353567c730afc32a380e99a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does http-tools version less then 3.0.0 have ### Response: Having vulnarability CVE-2021-39214 Advisory: Http-tools 3.0.0 updates its dependency 'mitmproxy' to version '9.0.1' to include a fix for an HTTP Request Smuggling vulnerability.
https://github.com/MobSF/httptools/commit/896d06ab49b4eeb01353567c730afc32a380e99a | what vulnarability does http-tools version less then 3.0.0 have | |
Having vulnarability PVE-2021-25847 Advisory: httpauth 0.2 fixes a security issue: Invalid username + empty password were being accepted. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpauth version less then 0.2 have ### Response: Having vulnarability PVE-2021-25847 Advisory: httpauth 0.2 fixes a security issue: Invalid username + empty password were being accepted. | what vulnarability does httpauth version less then 0.2 have | |
Having vulnarability CVE-2019-10751 Advisory: Httpie 1.0.3 fixes CVE-2019-10751. The way the output filename is generated for ``--download`` requests without ``--output`` resulting in a redirect has been changed to only consider the initial URL as the base for the generated filename, and not the final one. See: <https://github.com/jakubroztocil/httpie/releases/tag/1.0.3>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpie version less then 1.0.3 have ### Response: Having vulnarability CVE-2019-10751 Advisory: Httpie 1.0.3 fixes CVE-2019-10751. The way the output filename is generated for ``--download`` requests without ``--output`` resulting in a redirect has been changed to only consider the initial URL as the base for the generated filename, and not the final one. See: <https://github.com/jakubroztocil/httpie/releases/tag/1.0.3>. | what vulnarability does httpie version less then 1.0.3 have | |
Having vulnarability CVE-2020-11078 Advisory: In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0. See CVE-2020-11078. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httplib2 version less then 0.18.0 have ### Response: Having vulnarability CVE-2020-11078 Advisory: In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0. See CVE-2020-11078. | what vulnarability does httplib2 version less then 0.18.0 have | |
Having vulnarability PVE-2021-36945 Advisory: Httprunner 2.0.5 fixes XSS in response json.
https://github.com/httprunner/httprunner/commit/6cd930ce0d37a3f92bb4f4b9689c7617e610ff43 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httprunner version less then 2.0.5 have ### Response: Having vulnarability PVE-2021-36945 Advisory: Httprunner 2.0.5 fixes XSS in response json.
https://github.com/httprunner/httprunner/commit/6cd930ce0d37a3f92bb4f4b9689c7617e610ff43 | what vulnarability does httprunner version less then 2.0.5 have | |
Having vulnarability PVE-2021-25849 Advisory: httpsig 1.0.0 removed suport for reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpsig version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-25849 Advisory: httpsig 1.0.0 removed suport for reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig. | what vulnarability does httpsig version less then 1.0.0 have | |
Having vulnarability PVE-2021-25850 Advisory: httpsig-cffi 1.0.0 removed suport for reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpsig-cffi version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-25850 Advisory: httpsig-cffi 1.0.0 removed suport for reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig. | what vulnarability does httpsig-cffi version less then 1.0.0 have | |
Having vulnarability PVE-2023-52925 Advisory: Httpslib is a malicious package. It installs info-stealing Malware.
https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpslib version greather then 0 have ### Response: Having vulnarability PVE-2023-52925 Advisory: Httpslib is a malicious package. It installs info-stealing Malware.
https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware | what vulnarability does httpslib version greather then 0 have | |
Having vulnarability CVE-2022-32214 Advisory: Httptools 0.5.0 updates the bundled 'llhttp' library to v6.0.9 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httptools version less then 0.5.0 have ### Response: Having vulnarability CVE-2022-32214 Advisory: Httptools 0.5.0 updates the bundled 'llhttp' library to v6.0.9 to include security fixes. | what vulnarability does httptools version less then 0.5.0 have | |
Having vulnarability CVE-2021-41945 Advisory: Httpx 0.23.0 includes a fix for CVE-2021-41945: Encode OSS httpx < 0.23.0 is affected by improper input validation in 'httpx.URL', 'httpx.Client' and some functions using 'httpx.URL.copy_with'. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does httpx version less then 0.23.0 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Httpx 0.23.0 includes a fix for CVE-2021-41945: Encode OSS httpx < 0.23.0 is affected by improper input validation in 'httpx.URL', 'httpx.Client' and some functions using 'httpx.URL.copy_with'. | what vulnarability does httpx version less then 0.23.0 have | |
Having vulnarability PVE-2021-39217 Advisory: Hub 0.9.0 upgrades urllib3 to urllib3[secure]. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hub version less then 0.9.0 have ### Response: Having vulnarability PVE-2021-39217 Advisory: Hub 0.9.0 upgrades urllib3 to urllib3[secure]. | what vulnarability does hub version less then 0.9.0 have | |
Having vulnarability CVE-2020-14343 Advisory: Hubitatmaker 0.5.4 updates its dependency 'pyyaml' to v5.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hubitatmaker version less then 0.5.4 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Hubitatmaker 0.5.4 updates its dependency 'pyyaml' to v5.4 to include a security fix. | what vulnarability does hubitatmaker version less then 0.5.4 have | |
Having vulnarability PVE-2023-61327 Advisory: Huey 2.5.0 includes a a fix for a potential vulnerability: A race condition where a task is enqueued and executed before the corresponding database changes have been committed. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does huey version less then 2.5.0 have ### Response: Having vulnarability PVE-2023-61327 Advisory: Huey 2.5.0 includes a a fix for a potential vulnerability: A race condition where a task is enqueued and executed before the corresponding database changes have been committed. | what vulnarability does huey version less then 2.5.0 have | |
Having vulnarability PVE-2021-34472 Advisory: Hug 2.3.0 fixes a vulnerability in the static file router that allows files in parent directory to be accessed. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hug version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-34472 Advisory: Hug 2.3.0 fixes a vulnerability in the static file router that allows files in parent directory to be accessed. | what vulnarability does hug version less then 2.3.0 have | |
Having vulnarability PVE-2023-54919 Advisory: Huggingface-hub 0.13.4 includes a security fix: Malicious repo can overwrite any file on disk.
https://github.com/huggingface/huggingface_hub/pull/1429 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does huggingface-hub version less then 0.13.4 have ### Response: Having vulnarability PVE-2023-54919 Advisory: Huggingface-hub 0.13.4 includes a security fix: Malicious repo can overwrite any file on disk.
https://github.com/huggingface/huggingface_hub/pull/1429 | what vulnarability does huggingface-hub version less then 0.13.4 have | |
Having vulnarability CVE-2023-24538 Advisory: Hugo 0.114.0 fixes the upstream Go templates bug with reversed key/value assignment, in response to the identified CVE-2023-24538 vulnerability.
https://github.com/gohugoio/hugo/commit/ee359df172ece11989e9b1bf35c2d376f2608ac6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hugo version less then 0.114.0 have ### Response: Having vulnarability CVE-2023-24538 Advisory: Hugo 0.114.0 fixes the upstream Go templates bug with reversed key/value assignment, in response to the identified CVE-2023-24538 vulnerability.
https://github.com/gohugoio/hugo/commit/ee359df172ece11989e9b1bf35c2d376f2608ac6 | what vulnarability does hugo version less then 0.114.0 have | |
Having vulnarability PVE-2022-45444 Advisory: Humanqueen is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.
https://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does humanqueen version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45444 Advisory: Humanqueen is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.
https://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository | what vulnarability does humanqueen version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45445 Advisory: Humanqueenn is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.
https://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does humanqueenn version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45445 Advisory: Humanqueenn is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens.
https://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository | what vulnarability does humanqueenn version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-25851 Advisory: humblesetuptools 0.9.5 fixes a security vulnerability in SSL certificate validation. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does humblesetuptools version less then 0.9.5 have ### Response: Having vulnarability PVE-2021-25851 Advisory: humblesetuptools 0.9.5 fixes a security vulnerability in SSL certificate validation. | what vulnarability does humblesetuptools version less then 0.9.5 have | |
Having vulnarability CVE-2023-3446 Advisory: Hv4gha 0.1.1 updates its dependency 'cryptography' to v41.0.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hv4gha version less then 0.1.1 have ### Response: Having vulnarability CVE-2023-3446 Advisory: Hv4gha 0.1.1 updates its dependency 'cryptography' to v41.0.3 to include a security fix. | what vulnarability does hv4gha version less then 0.1.1 have | |
Having vulnarability CVE-2020-14199 Advisory: Hwi 1.1.2 includes a fix for CVE-2020-14199: BIP-143 in the Bitcoin protocol specification mishandles the signing of a Segwit transaction, which allows attackers to trick a user into making two signatures in certain cases, potentially leading to a huge transaction fee. NOTE: this affects all hardware wallets.
https://github.com/bitcoin-core/HWI/commit/2ce8734a5ebdab84efcaef61ce6a10af43ddc10b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hwi version less then 1.1.2 have ### Response: Having vulnarability CVE-2020-14199 Advisory: Hwi 1.1.2 includes a fix for CVE-2020-14199: BIP-143 in the Bitcoin protocol specification mishandles the signing of a Segwit transaction, which allows attackers to trick a user into making two signatures in certain cases, potentially leading to a huge transaction fee. NOTE: this affects all hardware wallets.
https://github.com/bitcoin-core/HWI/commit/2ce8734a5ebdab84efcaef61ce6a10af43ddc10b | what vulnarability does hwi version less then 1.1.2 have | |
Having vulnarability PVE-2021-39450 Advisory: Hxl-proxy 1.22 updates to libhxl=4.22 for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hxl-proxy version less then 1.22 have ### Response: Having vulnarability PVE-2021-39450 Advisory: Hxl-proxy 1.22 updates to libhxl=4.22 for security reasons. | what vulnarability does hxl-proxy version less then 1.22 have | |
Having vulnarability PVE-2023-55070 Advisory: Hydrolib-core 0.5.2 includes a fix for a potential REDoS vulnerability.
https://github.com/Deltares/HYDROLIB-core/pull/541/commits/38502fbed717f874903c7290269fa7ae0bc8305b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hydrolib-core version less then 0.5.2 have ### Response: Having vulnarability PVE-2023-55070 Advisory: Hydrolib-core 0.5.2 includes a fix for a potential REDoS vulnerability.
https://github.com/Deltares/HYDROLIB-core/pull/541/commits/38502fbed717f874903c7290269fa7ae0bc8305b | what vulnarability does hydrolib-core version less then 0.5.2 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.