output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability PVE-2021-34264 Advisory: hydroshare before 1.9.5 has multiple - undisclosed - security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hydroshare version less then 1.9.5 have ### Response: Having vulnarability PVE-2021-34264 Advisory: hydroshare before 1.9.5 has multiple - undisclosed - security issues.
what vulnarability does hydroshare version less then 1.9.5 have
Having vulnarability CVE-2023-40590 Advisory: Hyper-bump-it 0.5.1 requires 'GitPython' to be version '3.1.34' as minimum, to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyper-bump-it version less then 0.5.1 have ### Response: Having vulnarability CVE-2023-40590 Advisory: Hyper-bump-it 0.5.1 requires 'GitPython' to be version '3.1.34' as minimum, to include a security fix.
what vulnarability does hyper-bump-it version less then 0.5.1 have
Having vulnarability CVE-2020-25659 Advisory: Hyper-kube-config 0.6.1 includes an update of its dependency 'Cryptography' to mitigate CVE-2020-25659.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyper-kube-config version less then 0.6.1 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Hyper-kube-config 0.6.1 includes an update of its dependency 'Cryptography' to mitigate CVE-2020-25659.
what vulnarability does hyper-kube-config version less then 0.6.1 have
Having vulnarability PVE-2024-63209 Advisory: Hypercorn 0.16.0 adds a max keep alive requests configuration option to mitigate the HTTP/2 rapid reset attack. https://github.com/pgjones/hypercorn/commit/7c39c68b61012a3c30979176080861c8b00fb229
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hypercorn version less then 0.16.0 have ### Response: Having vulnarability PVE-2024-63209 Advisory: Hypercorn 0.16.0 adds a max keep alive requests configuration option to mitigate the HTTP/2 rapid reset attack. https://github.com/pgjones/hypercorn/commit/7c39c68b61012a3c30979176080861c8b00fb229
what vulnarability does hypercorn version less then 0.16.0 have
Having vulnarability PVE-2022-50167 Advisory: Hyperfocus 1.0.0a0 adds security check preventing config deletion. https://github.com/u8slvn/hyperfocus/commit/f870d074519add33b67d01a0b84e4a78fbd2d707
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyperfocus version less then 1.0.0a0 have ### Response: Having vulnarability PVE-2022-50167 Advisory: Hyperfocus 1.0.0a0 adds security check preventing config deletion. https://github.com/u8slvn/hyperfocus/commit/f870d074519add33b67d01a0b84e4a78fbd2d707
what vulnarability does hyperfocus version less then 1.0.0a0 have
Having vulnarability CVE-2021-33038 Advisory: An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyperkitty version less then 1.3.4 have ### Response: Having vulnarability CVE-2021-33038 Advisory: An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
what vulnarability does hyperkitty version less then 1.3.4 have
Having vulnarability PVE-2021-39447 Advisory: Hypothesis 3.69.8 moves away from using pickle module and replaces it with json to prevent possible security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hypothesis version less then 3.69.8 have ### Response: Having vulnarability PVE-2021-39447 Advisory: Hypothesis 3.69.8 moves away from using pickle module and replaces it with json to prevent possible security issues.
what vulnarability does hypothesis version less then 3.69.8 have
Having vulnarability CVE-2022-21699 Advisory: Hyppo 0.3.0 updates its dependency 'ipython' to v7.31.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hyppo version less then 0.3.0 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Hyppo 0.3.0 updates its dependency 'ipython' to v7.31.1 to include a security fix.
what vulnarability does hyppo version less then 0.3.0 have
Having vulnarability CVE-2022-21699 Advisory: Hypyp version 0.5.0b2 upgrades its IPython dependency from version 8.7.0 to 8.10.0 in response to CVE-2022-21699. https://github.com/ppsp-team/HyPyP/commit/638471adad98a5064dff98cbd5292ab653822fd0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does hypyp version less then 0.5.0b2 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Hypyp version 0.5.0b2 upgrades its IPython dependency from version 8.7.0 to 8.10.0 in response to CVE-2022-21699. https://github.com/ppsp-team/HyPyP/commit/638471adad98a5064dff98cbd5292ab653822fd0
what vulnarability does hypyp version less then 0.5.0b2 have
Having vulnarability PVE-2022-51696 Advisory: Iao is a malicious package. It triggers the install of W4SP Stealer in your system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iao version greather then 0 have ### Response: Having vulnarability PVE-2022-51696 Advisory: Iao is a malicious package. It triggers the install of W4SP Stealer in your system.
what vulnarability does iao version greather then 0 have
Having vulnarability CVE-2019-10906 Advisory: Ib-client 0.1.2 updates its dependency 'Jinja2' to v2.10.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ib-client version less then 0.1.2 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Ib-client 0.1.2 updates its dependency 'Jinja2' to v2.10.1 to include a security fix.
what vulnarability does ib-client version less then 0.1.2 have
Having vulnarability CVE-2023-47248 Advisory: Ibis-framework versions before 7.1.0 are susceptible to an OS Command Injection vulnerability due to improper neutralization of special elements used in OS commands. This vulnerability allows attackers to execute arbitrary code on the system where the ibis-framework is deployed.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ibis-framework version less then 7.1.0 have ### Response: Having vulnarability CVE-2023-47248 Advisory: Ibis-framework versions before 7.1.0 are susceptible to an OS Command Injection vulnerability due to improper neutralization of special elements used in OS commands. This vulnerability allows attackers to execute arbitrary code on the system where the ibis-framework is deployed.
what vulnarability does ibis-framework version less then 7.1.0 have
Having vulnarability CVE-2022-1941 Advisory: Ibis-substrait version 2.11.1 upgrades its protobuf dependency to version 3.20.2 in response to the security vulnerability CVE-2022-1941. https://github.com/ibis-project/ibis-substrait/commit/d45f2399cd19b5014a0de1deb74abbdbd3a24aa7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ibis-substrait version less then 2.11.1 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Ibis-substrait version 2.11.1 upgrades its protobuf dependency to version 3.20.2 in response to the security vulnerability CVE-2022-1941. https://github.com/ibis-project/ibis-substrait/commit/d45f2399cd19b5014a0de1deb74abbdbd3a24aa7
what vulnarability does ibis-substrait version less then 2.11.1 have
Having vulnarability CVE-2023-2251 Advisory: Ibm-generative-ai version 1.0.1 has upgraded its yaml dependency to "^2.3.0" from the prior "^2.2.2" to address the security issue identified as CVE-2023-2251.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ibm-generative-ai version less then 1.0.1 have ### Response: Having vulnarability CVE-2023-2251 Advisory: Ibm-generative-ai version 1.0.1 has upgraded its yaml dependency to "^2.3.0" from the prior "^2.2.2" to address the security issue identified as CVE-2023-2251.
what vulnarability does ibm-generative-ai version less then 1.0.1 have
Having vulnarability PVE-2024-67500 Advisory: Affected versions of Ibmsecurity are vulnerable to a Insecure Communications flaw. All the SSL/TLS connections to the remote ISVA server are configured in an insecure way.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ibmsecurity version less then 2024.4.5.0 have ### Response: Having vulnarability PVE-2024-67500 Advisory: Affected versions of Ibmsecurity are vulnerable to a Insecure Communications flaw. All the SSL/TLS connections to the remote ISVA server are configured in an insecure way.
what vulnarability does ibmsecurity version less then 2024.4.5.0 have
Having vulnarability PVE-2021-40134 Advisory: Idchecker was re-created for security reasons.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does idchecker version less then 1.1.2 have ### Response: Having vulnarability PVE-2021-40134 Advisory: Idchecker was re-created for security reasons.
what vulnarability does idchecker version less then 1.1.2 have
Having vulnarability CVE-2024-3651 Advisory: CVE-2024-3651 impacts the idna.encode() function, where a specially crafted argument could lead to significant resource consumption, causing a denial-of-service. In version 3.7, this function has been updated to reject such inputs efficiently, minimizing resource use. A practical workaround involves enforcing a maximum domain name length of 253 characters before encoding, as the vulnerability is triggered by unusually large inputs that normal operations wouldn't encounter.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does idna version less then 3.7 have ### Response: Having vulnarability CVE-2024-3651 Advisory: CVE-2024-3651 impacts the idna.encode() function, where a specially crafted argument could lead to significant resource consumption, causing a denial-of-service. In version 3.7, this function has been updated to reject such inputs efficiently, minimizing resource use. A practical workaround involves enforcing a maximum domain name length of 253 characters before encoding, as the vulnerability is triggered by unusually large inputs that normal operations wouldn't encounter.
what vulnarability does idna version less then 3.7 have
Having vulnarability CVE-2022-23491 Advisory: Ietfdata 0.6.3 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ietfdata version less then 0.6.3 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Ietfdata 0.6.3 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
what vulnarability does ietfdata version less then 0.6.3 have
Having vulnarability CVE-2020-15120 Advisory: In "I hate money" before version 4.1.5, an authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. See CVE-2020-15120.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ihatemoney version less then 4.1.5 have ### Response: Having vulnarability CVE-2020-15120 Advisory: In "I hate money" before version 4.1.5, an authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. See CVE-2020-15120.
what vulnarability does ihatemoney version less then 4.1.5 have
Having vulnarability PVE-2021-36819 Advisory: im 1.5.0 removes use of insecure Pickle data.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does im version less then 1.5.0 have ### Response: Having vulnarability PVE-2021-36819 Advisory: im 1.5.0 removes use of insecure Pickle data.
what vulnarability does im version less then 1.5.0 have
Having vulnarability CVE-2023-4863 Advisory: Image-sorting-tool 1.0.0 updates its dependency 'pillow' to include a security fix. https://github.com/ThorpeJosh/image-sorting-tool/pull/36
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does image-sorting-tool version less then 1.0.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Image-sorting-tool 1.0.0 updates its dependency 'pillow' to include a security fix. https://github.com/ThorpeJosh/image-sorting-tool/pull/36
what vulnarability does image-sorting-tool version less then 1.0.0 have
Having vulnarability CVE-2023-4863 Advisory: Imagecodecs 2023.9.18 updates its C dependency 'libwebp' to v1.3.2 to include a fix for a high-risk vulnerability. https://github.com/cgohlke/imagecodecs/commit/3d0dca35e7848ab6a50e157a78a074e6d3e96e7f https://github.com/cgohlke/imagecodecs/blob/v2023.9.18/CHANGES.rst
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imagecodecs version greather then equal to 2019.12.31,less then 2023.9.18 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Imagecodecs 2023.9.18 updates its C dependency 'libwebp' to v1.3.2 to include a fix for a high-risk vulnerability. https://github.com/cgohlke/imagecodecs/commit/3d0dca35e7848ab6a50e157a78a074e6d3e96e7f https://github.com/cgohlke/imagecodecs/blob/v2023.9.18/CHANGES.rst
what vulnarability does imagecodecs version greather then equal to 2019.12.31,less then 2023.9.18 have
Having vulnarability CVE-2020-35653 Advisory: Imageedit 2021 updates its dependency 'pillow' to version >= 8.1.1 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imageedit version less then 2021 have ### Response: Having vulnarability CVE-2020-35653 Advisory: Imageedit 2021 updates its dependency 'pillow' to version >= 8.1.1 to include security fixes.
what vulnarability does imageedit version less then 2021 have
Having vulnarability PVE-2021-37902 Advisory: Imageio 2.6.0 fixes a code injection vulnerability for Windows users that have dcmtk installed, and where an attacker can set the filename. https://github.com/imageio/imageio/commit/5b398716d518cd14e8b978ea3cd8ec6c0236c1d8
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imageio version less then 2.6.0 have ### Response: Having vulnarability PVE-2021-37902 Advisory: Imageio 2.6.0 fixes a code injection vulnerability for Windows users that have dcmtk installed, and where an attacker can set the filename. https://github.com/imageio/imageio/commit/5b398716d518cd14e8b978ea3cd8ec6c0236c1d8
what vulnarability does imageio version less then 2.6.0 have
Having vulnarability PVE-2021-34569 Advisory: Imapclient 1.0.0 defaults to attempting certificate verification, certificate hostname checking, and doesn't use known-insecure TLS settings and protocols.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imapclient version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-34569 Advisory: Imapclient 1.0.0 defaults to attempting certificate verification, certificate hostname checking, and doesn't use known-insecure TLS settings and protocols.
what vulnarability does imapclient version less then 1.0.0 have
Having vulnarability CVE-2023-4863 Advisory: Img2table 1.2.3 updates its dependency 'pillow' to versions '>=10.0.1' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does img2table version less then 1.2.3 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Img2table 1.2.3 updates its dependency 'pillow' to versions '>=10.0.1' to include a security fix.
what vulnarability does img2table version less then 1.2.3 have
Having vulnarability CVE-2023-4863 Advisory: Img2texture 1.1.2 updates its dependency 'pillow' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does img2texture version less then 1.1.2 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Img2texture 1.1.2 updates its dependency 'pillow' to include a security fix.
what vulnarability does img2texture version less then 1.1.2 have
Having vulnarability CVE-2017-18342 Advisory: Imgstore 0.2.9 includes a security patch for the function 'new_for_filename' in 'imgstore/stores.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/loopbio/imgstore/commit/06b49a519b687ff3cd20b06c4c797818df812d06#diff-9e38eed8462f9c72f080c6c96c054a06d828dbd0ebca39f3738471d4557c704a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imgstore version less then 0.2.9 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Imgstore 0.2.9 includes a security patch for the function 'new_for_filename' in 'imgstore/stores.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/loopbio/imgstore/commit/06b49a519b687ff3cd20b06c4c797818df812d06#diff-9e38eed8462f9c72f080c6c96c054a06d828dbd0ebca39f3738471d4557c704a
what vulnarability does imgstore version less then 0.2.9 have
Having vulnarability PVE-2022-44446 Advisory: Imio.dashboard 2.2 secures attribute get in DashboardPODTemplateMigrator. https://github.com/IMIO/imio.dashboard/commit/622147062b4c0cc9f5a0c36cb81b74bec4eb8e3a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imio-dashboard version less then 2.2 have ### Response: Having vulnarability PVE-2022-44446 Advisory: Imio.dashboard 2.2 secures attribute get in DashboardPODTemplateMigrator. https://github.com/IMIO/imio.dashboard/commit/622147062b4c0cc9f5a0c36cb81b74bec4eb8e3a
what vulnarability does imio-dashboard version less then 2.2 have
Having vulnarability PVE-2022-49410 Advisory: Imio.prettylink 1.20 escapes links content to avoid malicious behavior.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imio.prettylink version less then 1.20 have ### Response: Having vulnarability PVE-2022-49410 Advisory: Imio.prettylink 1.20 escapes links content to avoid malicious behavior.
what vulnarability does imio.prettylink version less then 1.20 have
Having vulnarability PVE-2022-48479 Advisory: Impacket 0.9.18 uses cryptographically secure pseudo-random number generators when needed. https://github.com/SecureAuthCorp/impacket/commit/b789e61b9680dd156b50b0f6c2d9dbb1c15653e3
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does impacket version less then 0.9.18 have ### Response: Having vulnarability PVE-2022-48479 Advisory: Impacket 0.9.18 uses cryptographically secure pseudo-random number generators when needed. https://github.com/SecureAuthCorp/impacket/commit/b789e61b9680dd156b50b0f6c2d9dbb1c15653e3
what vulnarability does impacket version less then 0.9.18 have
Having vulnarability CVE-2021-20270 Advisory: Impalacli 0.1.6 updates its dependency 'pygments' to v2.7.4 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does impalacli version less then 0.1.6 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Impalacli 0.1.6 updates its dependency 'pygments' to v2.7.4 to include security fixes.
what vulnarability does impalacli version less then 0.1.6 have
Having vulnarability PVE-2022-45455 Advisory: Important-package is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does important-package version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45455 Advisory: Important-package is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
what vulnarability does important-package version greather then 0,less then 0 have
Having vulnarability PVE-2022-45454 Advisory: Importantpackage is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does importantpackage version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45454 Advisory: Importantpackage is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
what vulnarability does importantpackage version greather then 0,less then 0 have
Having vulnarability CVE-2023-4863 Advisory: Imread 0.6 throughout 0.7.4 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. https://inspector.pypi.io/project/imread/0.7.4/packages/61/03/5997926a43c42ef54ead9b62ad95416646b4f1cc59bc940f331d043b63fc/imread-0.7.4-cp27-cp27m-manylinux2010_x86_64.whl
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does imread version greather then equal to 0.6,less then equal to 0.7.4 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Imread 0.6 throughout 0.7.4 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. https://inspector.pypi.io/project/imread/0.7.4/packages/61/03/5997926a43c42ef54ead9b62ad95416646b4f1cc59bc940f331d043b63fc/imread-0.7.4-cp27-cp27m-manylinux2010_x86_64.whl
what vulnarability does imread version greather then equal to 0.6,less then equal to 0.7.4 have
Having vulnarability CVE-2020-36242 Advisory: In-toto version 1.0.1 updates its dependency "cryptography" to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does in-toto version less then 1.0.1 have ### Response: Having vulnarability CVE-2020-36242 Advisory: In-toto version 1.0.1 updates its dependency "cryptography" to include a security fix.
what vulnarability does in-toto version less then 1.0.1 have
Having vulnarability CVE-2023-29159 Advisory: Inboard 0.46.0 updates its dependency 'starlette' to version '0.27.0' to include a security fix. https://github.com/br3ndonland/inboard/commit/e6280fb3a7c03d5df5c75179a69856e0648b8abb https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does inboard version less then 0.46.0 have ### Response: Having vulnarability CVE-2023-29159 Advisory: Inboard 0.46.0 updates its dependency 'starlette' to version '0.27.0' to include a security fix. https://github.com/br3ndonland/inboard/commit/e6280fb3a7c03d5df5c75179a69856e0648b8abb https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px
what vulnarability does inboard version less then 0.46.0 have
Having vulnarability PVE-2022-51678 Advisory: Incrivelsim is a malicious package. It triggers the install of W4SP Stealer in your system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does incrivelsim version greather then 0 have ### Response: Having vulnarability PVE-2022-51678 Advisory: Incrivelsim is a malicious package. It triggers the install of W4SP Stealer in your system.
what vulnarability does incrivelsim version greather then 0 have
Having vulnarability PVE-2021-35802 Advisory: indico before 2.0.2 uses a insecure transitive dependency (bleach).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does indico version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-35802 Advisory: indico before 2.0.2 uses a insecure transitive dependency (bleach).
what vulnarability does indico version less then 2.0.2 have
Having vulnarability CVE-2020-11090 Advisory: In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, which leads to a view change. Repeated rapid view changes have the potential of bringing down the network. This is fixed in version 1.12.3.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does indy-node version equal to 1.12.2 have ### Response: Having vulnarability CVE-2020-11090 Advisory: In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, which leads to a view change. Repeated rapid view changes have the potential of bringing down the network. This is fixed in version 1.12.3.
what vulnarability does indy-node version equal to 1.12.2 have
Having vulnarability CVE-2018-18074 Advisory: Influx-prompt version 0.0.3 updates its dependency 'requests' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does influx-prompt version less then 0.0.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Influx-prompt version 0.0.3 updates its dependency 'requests' to include a security fix.
what vulnarability does influx-prompt version less then 0.0.3 have
Having vulnarability CVE-2019-9740 Advisory: Influxable 1.3.2 updates to 'python:3.9.2-buster' in Dockerfile to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does influxable version less then 1.3.2 have ### Response: Having vulnarability CVE-2019-9740 Advisory: Influxable 1.3.2 updates to 'python:3.9.2-buster' in Dockerfile to include security fixes.
what vulnarability does influxable version less then 1.3.2 have
Having vulnarability CVE-2023-32681 Advisory: Infobip-api-python-sdk 5.0.1 updates its dependency 'requests' to v2.31.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does infobip-api-python-sdk version less then 5.0.1 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Infobip-api-python-sdk 5.0.1 updates its dependency 'requests' to v2.31.0 to include a security fix.
what vulnarability does infobip-api-python-sdk version less then 5.0.1 have
Having vulnarability PVE-2023-52908 Advisory: Informmodule is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does informmodule version greather then 0 have ### Response: Having vulnarability PVE-2023-52908 Advisory: Informmodule is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
what vulnarability does informmodule version greather then 0 have
Having vulnarability PVE-2023-52917 Advisory: Infosys is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does infosys version greather then 0 have ### Response: Having vulnarability PVE-2023-52917 Advisory: Infosys is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
what vulnarability does infosys version greather then 0 have
Having vulnarability PVE-2021-39200 Advisory: Infracheck 1.7.rc2 adds a `ssh-fingerprint` check, which verifies if any remote host fingerprint matches. This helps detecting man-in-the-middle and server takeover attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does infracheck version less then 1.7.rc2 have ### Response: Having vulnarability PVE-2021-39200 Advisory: Infracheck 1.7.rc2 adds a `ssh-fingerprint` check, which verifies if any remote host fingerprint matches. This helps detecting man-in-the-middle and server takeover attacks.
what vulnarability does infracheck version less then 1.7.rc2 have
Having vulnarability PVE-2022-44884 Advisory: Injective-py 0.5.6.4 adds root CA certs for mainnet & testnet for secure gRPC connections by default. https://github.com/InjectiveLabs/sdk-python/commit/383301ab4b82016234729495f4bccdec3b6d5487
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does injective-py version less then 0.5.6.4 have ### Response: Having vulnarability PVE-2022-44884 Advisory: Injective-py 0.5.6.4 adds root CA certs for mainnet & testnet for secure gRPC connections by default. https://github.com/InjectiveLabs/sdk-python/commit/383301ab4b82016234729495f4bccdec3b6d5487
what vulnarability does injective-py version less then 0.5.6.4 have
Having vulnarability CVE-2022-24439 Advisory: Inquirer 3.1.2 updates its dependency 'GitPython' to v3.1.30 to include a security fix. https://github.com/magmax/python-inquirer/pull/331/commits/455f8b98cb402542810fb55bb717682101aeca27
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does inquirer version less then 3.1.2 have ### Response: Having vulnarability CVE-2022-24439 Advisory: Inquirer 3.1.2 updates its dependency 'GitPython' to v3.1.30 to include a security fix. https://github.com/magmax/python-inquirer/pull/331/commits/455f8b98cb402542810fb55bb717682101aeca27
what vulnarability does inquirer version less then 3.1.2 have
Having vulnarability PVE-2021-25853 Advisory: Insecure-package 0.2.0 test vuln.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does insecure-package version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-25853 Advisory: Insecure-package 0.2.0 test vuln.
what vulnarability does insecure-package version less then 0.2.0 have
Having vulnarability CVE-2023-3972 Advisory: A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does insights-core version less then 3.2.12 have ### Response: Having vulnarability CVE-2023-3972 Advisory: A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).
what vulnarability does insights-core version less then 3.2.12 have
Having vulnarability CVE-2022-3596 Advisory: Instack-undercloud is affected by CVE-2022-3596: This flaw allows unauthenticated, remote attackers to inspect sensitive data after discovering the IP address of the undercloud, possibly leading to compromising private information, including administrator access credentials. https://access.redhat.com/security/cve/CVE-2022-3596
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does instack-undercloud version less then equal to 9.5.1 have ### Response: Having vulnarability CVE-2022-3596 Advisory: Instack-undercloud is affected by CVE-2022-3596: This flaw allows unauthenticated, remote attackers to inspect sensitive data after discovering the IP address of the undercloud, possibly leading to compromising private information, including administrator access credentials. https://access.redhat.com/security/cve/CVE-2022-3596
what vulnarability does instack-undercloud version less then equal to 9.5.1 have
Having vulnarability PVE-2022-51681 Advisory: Installpy is a malicious package. It triggers the install of W4SP Stealer in your system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does installpy version greather then 0 have ### Response: Having vulnarability PVE-2022-51681 Advisory: Installpy is a malicious package. It triggers the install of W4SP Stealer in your system.
what vulnarability does installpy version greather then 0 have
Having vulnarability CVE-2017-18342 Advisory: Installtool 1.0 includes a security patch for the function 'XEQ' in 'installtool.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/l0r3zz/public/commit/ab00de531d125629c11811473bfee9e4063572b2#diff-4f5fe0b656de6953412f12024a4e76b35b618409e88f79d86e52c52c020dac58
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does installtool version less then 1.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Installtool 1.0 includes a security patch for the function 'XEQ' in 'installtool.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/l0r3zz/public/commit/ab00de531d125629c11811473bfee9e4063572b2#diff-4f5fe0b656de6953412f12024a4e76b35b618409e88f79d86e52c52c020dac58
what vulnarability does installtool version less then 1.0 have
Having vulnarability PVE-2021-34809 Advisory: Instana 1.20.2 upgrades the `event-loop-lag` because of security vulnerabilities in its dependency tree.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does instana version less then 1.20.2 have ### Response: Having vulnarability PVE-2021-34809 Advisory: Instana 1.20.2 upgrades the `event-loop-lag` because of security vulnerabilities in its dependency tree.
what vulnarability does instana version less then 1.20.2 have
Having vulnarability PVE-2021-43742 Advisory: Instawow 1.35.0 improves security by refusing requests to the RPC API which do not originate from the Instawow client (same origin). https://github.com/layday/instawow/commit/478d86bd06819a099c679d4b64d739c0a70080a8
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does instawow version less then 1.35.0 have ### Response: Having vulnarability PVE-2021-43742 Advisory: Instawow 1.35.0 improves security by refusing requests to the RPC API which do not originate from the Instawow client (same origin). https://github.com/layday/instawow/commit/478d86bd06819a099c679d4b64d739c0a70080a8
what vulnarability does instawow version less then 1.35.0 have
Having vulnarability PVE-2024-64374 Advisory: Intel-extension-for-transformers 1.2.2 escapes SQL strings for SDL to prevent SQL injections. https://github.com/intel/intel-extension-for-transformers/commit/43e8b9a9ee9fa7b27176fe14505f435f7add3620
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intel-extension-for-transformers version less then 1.2.2 have ### Response: Having vulnarability PVE-2024-64374 Advisory: Intel-extension-for-transformers 1.2.2 escapes SQL strings for SDL to prevent SQL injections. https://github.com/intel/intel-extension-for-transformers/commit/43e8b9a9ee9fa7b27176fe14505f435f7add3620
what vulnarability does intel-extension-for-transformers version less then 1.2.2 have
Having vulnarability CVE-2022-26032 Advisory: Intel-opencl-rt 2022.1 includes a fix for CVE-2022-26032: Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intel-opencl-rt version less then 2022.1 have ### Response: Having vulnarability CVE-2022-26032 Advisory: Intel-opencl-rt 2022.1 includes a fix for CVE-2022-26032: Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
what vulnarability does intel-opencl-rt version less then 2022.1 have
Having vulnarability CVE-2019-9635 Advisory: NULL pointer dereference in Intel-tensorflow before 1.12.2 could cause a denial of service via an invalid GIF file. See CVE-2019-9635.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intel-tensorflow version less then 1.12.2 have ### Response: Having vulnarability CVE-2019-9635 Advisory: NULL pointer dereference in Intel-tensorflow before 1.12.2 could cause a denial of service via an invalid GIF file. See CVE-2019-9635.
what vulnarability does intel-tensorflow version less then 1.12.2 have
Having vulnarability CVE-2020-15195 Advisory: Intel-tensorflow-avx512 versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 include a fix for CVE-2020-15195: In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of 'SparseFillEmptyRowsGrad' uses a double indexing pattern. It is possible for 'reverse_index_map(i)' to be an index outside of bounds of 'grad_values', thus resulting in a heap buffer overflow. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intel-tensorflow-avx512 version less then 1.15.4,greather then equal to 2.0.0a0,less then 2.0.3,greather then equal to 2.1.0a0,less then 2.1.2,greather then equal to 2.2.0a0,less then 2.2.1,greather then equal to 2.3.0a0,less then 2.3.1 have ### Response: Having vulnarability CVE-2020-15195 Advisory: Intel-tensorflow-avx512 versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 include a fix for CVE-2020-15195: In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of 'SparseFillEmptyRowsGrad' uses a double indexing pattern. It is possible for 'reverse_index_map(i)' to be an index outside of bounds of 'grad_values', thus resulting in a heap buffer overflow. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr
what vulnarability does intel-tensorflow-avx512 version less then 1.15.4,greather then equal to 2.0.0a0,less then 2.0.3,greather then equal to 2.1.0a0,less then 2.1.2,greather then equal to 2.2.0a0,less then 2.2.1,greather then equal to 2.3.0a0,less then 2.3.1 have
Having vulnarability PVE-2021-38326 Advisory: Intelmq through 2.1.1 is not secure. Its backend incorrectly handles messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the web server.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intelmq version less then equal to 2.1.1 have ### Response: Having vulnarability PVE-2021-38326 Advisory: Intelmq through 2.1.1 is not secure. Its backend incorrectly handles messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the web server.
what vulnarability does intelmq version less then equal to 2.1.1 have
Having vulnarability CVE-2020-11016 Advisory: Intelmq-manager 2.1.1 includes a fix for CVE-2020-11016: IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intelmq-manager version greather then equal to 1.1.0,less then 2.1.1 have ### Response: Having vulnarability CVE-2020-11016 Advisory: Intelmq-manager 2.1.1 includes a fix for CVE-2020-11016: IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver.
what vulnarability does intelmq-manager version greather then equal to 1.1.0,less then 2.1.1 have
Having vulnarability CVE-2021-3572 Advisory: Intensity-normalization 2.1.2 updates its dependency 'pip' minimum version to v21.3 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intensity-normalization version less then 2.1.2 have ### Response: Having vulnarability CVE-2021-3572 Advisory: Intensity-normalization 2.1.2 updates its dependency 'pip' minimum version to v21.3 to include a security fix.
what vulnarability does intensity-normalization version less then 2.1.2 have
Having vulnarability CVE-2018-19787 Advisory: Intermine 1.12.0 (Intermine client library) updates its dependency 'lxml' to v4.5.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does intermine version less then 1.12.0 have ### Response: Having vulnarability CVE-2018-19787 Advisory: Intermine 1.12.0 (Intermine client library) updates its dependency 'lxml' to v4.5.1 to include a security fix.
what vulnarability does intermine version less then 1.12.0 have
Having vulnarability PVE-2023-63160 Advisory: Internetarchive 3.1.0 mitigates a potential race condition leading to a Time-of-Check-to-Time-of-Use (TOCTOU) vulnerability. The fix ensures only one thread creates a directory, preventing simultaneous attempts from multiple threads, which could lead to unexpected behaviors or errors. https://github.com/jjjake/internetarchive/commit/9b075207efb49e8d2ea90c52bad55353d4adaf60
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does internetarchive version less then 3.1.0 have ### Response: Having vulnarability PVE-2023-63160 Advisory: Internetarchive 3.1.0 mitigates a potential race condition leading to a Time-of-Check-to-Time-of-Use (TOCTOU) vulnerability. The fix ensures only one thread creates a directory, preventing simultaneous attempts from multiple threads, which could lead to unexpected behaviors or errors. https://github.com/jjjake/internetarchive/commit/9b075207efb49e8d2ea90c52bad55353d4adaf60
what vulnarability does internetarchive version less then 3.1.0 have
Having vulnarability PVE-2021-38442 Advisory: Interpret-community 0.12.1 upgrades websocket-extensions for security reasons.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does interpret-community version less then 0.12.1 have ### Response: Having vulnarability PVE-2021-38442 Advisory: Interpret-community 0.12.1 upgrades websocket-extensions for security reasons.
what vulnarability does interpret-community version less then 0.12.1 have
Having vulnarability PVE-2021-38734 Advisory: Invenio 0.99.0 fixes an alert deletion tool vulnerability (WebAlert), it includes a new password reset mechanism using new secure mail cookies and temporary role membership facilities (WebAccess, WebSession), and it also includes a script that will update your local user table in order to use encrypted passwords for more security.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio version less then 0.99.0 have ### Response: Having vulnarability PVE-2021-38734 Advisory: Invenio 0.99.0 fixes an alert deletion tool vulnerability (WebAlert), it includes a new password reset mechanism using new secure mail cookies and temporary role membership facilities (WebAccess, WebSession), and it also includes a script that will update your local user table in order to use encrypted passwords for more security.
what vulnarability does invenio version less then 0.99.0 have
Having vulnarability CVE-2018-16516 Advisory: Invenio-admin 1.1.1 and 1.0.1 update its dependency 'Flask-Admin' to v1.5.3 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-admin version less then 1.0.1,equal to 1.1.0 have ### Response: Having vulnarability CVE-2018-16516 Advisory: Invenio-admin 1.1.1 and 1.0.1 update its dependency 'Flask-Admin' to v1.5.3 to include a security fix.
what vulnarability does invenio-admin version less then 1.0.1,equal to 1.1.0 have
Having vulnarability CVE-2019-1020006 Advisory: Invenio-app 1.1.1 fixes a security issue where APP_ALLOWED_HOSTS was not always being checked, and thus could allow host header injection attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-app version less then 1.1.1 have ### Response: Having vulnarability CVE-2019-1020006 Advisory: Invenio-app 1.1.1 fixes a security issue where APP_ALLOWED_HOSTS was not always being checked, and thus could allow host header injection attacks.
what vulnarability does invenio-app version less then 1.1.1 have
Having vulnarability PVE-2021-40030 Advisory: Invenio-app-ils 1.0.0a28 adds cookies configuration for improved security.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-app-ils version less then 1.0.0a28 have ### Response: Having vulnarability PVE-2021-40030 Advisory: Invenio-app-ils 1.0.0a28 adds cookies configuration for improved security.
what vulnarability does invenio-app-ils version less then 1.0.0a28 have
Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-app-rdm version greather then equal to 0,less then 6.0.5,greather then equal to 7.0.0.dev0,less then 7.0.0.dev5 have ### Response: Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.
what vulnarability does invenio-app-rdm version greather then equal to 0,less then 6.0.5,greather then equal to 7.0.0.dev0,less then 7.0.0.dev5 have
Having vulnarability CVE-2019-1020005 Advisory: invenio-communities before 1.0.0a20 allows XSS.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-communities version less then 1.0.0a20 have ### Response: Having vulnarability CVE-2019-1020005 Advisory: invenio-communities before 1.0.0a20 allows XSS.
what vulnarability does invenio-communities version less then 1.0.0a20 have
Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-drafts-resources version greather then equal to 0,less then 0.13.7,greather then equal to 0.14.0,less then 0.14.6 have ### Response: Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.
what vulnarability does invenio-drafts-resources version greather then equal to 0,less then 0.13.7,greather then equal to 0.14.0,less then 0.14.6 have
Having vulnarability PVE-2023-59972 Advisory: Invenio-github 1.0.2 includes a fix for a CSRF vulnerability for API requests. https://github.com/inveniosoftware/invenio-github/commit/c0600e6d6586c0980fbfda73945527bbd77f1dce
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-github version less then 1.0.2 have ### Response: Having vulnarability PVE-2023-59972 Advisory: Invenio-github 1.0.2 includes a fix for a CSRF vulnerability for API requests. https://github.com/inveniosoftware/invenio-github/commit/c0600e6d6586c0980fbfda73945527bbd77f1dce
what vulnarability does invenio-github version less then 1.0.2 have
Having vulnarability CVE-2019-1020019 Advisory: invenio-previewer before 1.0.0a12 allows XSS.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-previewer version less then 1.0.0a12 have ### Response: Having vulnarability CVE-2019-1020019 Advisory: invenio-previewer before 1.0.0a12 allows XSS.
what vulnarability does invenio-previewer version less then 1.0.0a12 have
Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-rdm-records version greather then equal to 0,less then 0.32.6,greather then equal to 0.33.0,less then 0.33.10 have ### Response: Having vulnarability CVE-2021-43781 Advisory: Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.
what vulnarability does invenio-rdm-records version greather then equal to 0,less then 0.32.6,greather then equal to 0.33.0,less then 0.33.10 have
Having vulnarability CVE-2019-1020003 Advisory: Invenio-records versions 1.0.2, 1.1.1 and 1.2.2 include a fix for CVE-2019-1020003, a XSS vulnerability. https://github.com/inveniosoftware/invenio-records/security/advisories/GHSA-vxh3-mvv7-265j
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-records version less then 1.0.2,equal to 1.1.0,greather then equal to 1.2.0,less then 1.2.2 have ### Response: Having vulnarability CVE-2019-1020003 Advisory: Invenio-records versions 1.0.2, 1.1.1 and 1.2.2 include a fix for CVE-2019-1020003, a XSS vulnerability. https://github.com/inveniosoftware/invenio-records/security/advisories/GHSA-vxh3-mvv7-265j
what vulnarability does invenio-records version less then 1.0.2,equal to 1.1.0,greather then equal to 1.2.0,less then 1.2.2 have
Having vulnarability PVE-2021-25856 Advisory: Invenio-search 0.1.3 fixes a potential XSS issues by changing search flash messages template so that they are not displayed as safe HTML by default. https://github.com/inveniosoftware/invenio-search/commit/deb2fe3213d6f8dcab41714a579dd13dcfba6e87
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invenio-search version less then 0.1.3 have ### Response: Having vulnarability PVE-2021-25856 Advisory: Invenio-search 0.1.3 fixes a potential XSS issues by changing search flash messages template so that they are not displayed as safe HTML by default. https://github.com/inveniosoftware/invenio-search/commit/deb2fe3213d6f8dcab41714a579dd13dcfba6e87
what vulnarability does invenio-search version less then 0.1.3 have
Having vulnarability CVE-2022-2113 Advisory: Cross-site Scripting (XSS) - Stored in GitHub repository inventree/inventree prior to 0.7.2.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does inventree version less then 0.7.2 have ### Response: Having vulnarability CVE-2022-2113 Advisory: Cross-site Scripting (XSS) - Stored in GitHub repository inventree/inventree prior to 0.7.2.
what vulnarability does inventree version less then 0.7.2 have
Having vulnarability CVE-2022-1941 Advisory: Invokeai 2.0.2 updates its dependency, protobuf, from version 3.19.4 to 3.19.6. This update was prompted by a vulnerability identified as CVE-2022-1941. https://github.com/invoke-ai/InvokeAI/commit/90d37eac034592cc3aed5a15a98971801b21988e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does invokeai version less then 2.0.2 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Invokeai 2.0.2 updates its dependency, protobuf, from version 3.19.4 to 3.19.6. This update was prompted by a vulnerability identified as CVE-2022-1941. https://github.com/invoke-ai/InvokeAI/commit/90d37eac034592cc3aed5a15a98971801b21988e
what vulnarability does invokeai version less then 2.0.2 have
Having vulnarability PVE-2021-40098 Advisory: Lotedgehubdev 0.14.5 upgrades underlying dependencies to address vulnerability issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iotedgehubdev version less then 0.14.5 have ### Response: Having vulnarability PVE-2021-40098 Advisory: Lotedgehubdev 0.14.5 upgrades underlying dependencies to address vulnerability issues.
what vulnarability does iotedgehubdev version less then 0.14.5 have
Having vulnarability CVE-2014-7850 Advisory: Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipa version less then 4.1.2 have ### Response: Having vulnarability CVE-2014-7850 Advisory: Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.
what vulnarability does ipa version less then 4.1.2 have
Having vulnarability PVE-2022-47818 Advisory: Ipahttp is a malicious package, typosquatting. https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipahttp version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47818 Advisory: Ipahttp is a malicious package, typosquatting. https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library
what vulnarability does ipahttp version greather then 0,less then 0 have
Having vulnarability CVE-2023-32681 Advisory: Ipams 1.3.3 updates its dependency 'requests' to version '2.31.0' to include a security fix. https://github.com/rwxd/ipams/commit/0f54f1f30b0446594eb3c245882e00dd728dabba
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipams version less then 1.3.3 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Ipams 1.3.3 updates its dependency 'requests' to version '2.31.0' to include a security fix. https://github.com/rwxd/ipams/commit/0f54f1f30b0446594eb3c245882e00dd728dabba
what vulnarability does ipams version less then 1.3.3 have
Having vulnarability PVE-2022-45457 Advisory: Ipboards is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipboards version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45457 Advisory: Ipboards is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
what vulnarability does ipboards version greather then 0,less then 0 have
Having vulnarability PVE-2022-48449 Advisory: Ipp 2019.1 fixes a potential security problem in the AES-CTR cipher functions.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipp version less then 2019.1 have ### Response: Having vulnarability PVE-2022-48449 Advisory: Ipp 2019.1 fixes a potential security problem in the AES-CTR cipher functions.
what vulnarability does ipp version less then 2019.1 have
Having vulnarability PVE-2023-54738 Advisory: Ipp-crypto 2021.7 adds mitigation for Frequency Throttling Side-Channel attacks for ECB, CMAC and GCM modes of AES. https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/frequency-throttling-side-channel-guidance.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipp-crypto version less then 2021.7 have ### Response: Having vulnarability PVE-2023-54738 Advisory: Ipp-crypto 2021.7 adds mitigation for Frequency Throttling Side-Channel attacks for ECB, CMAC and GCM modes of AES. https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/frequency-throttling-side-channel-guidance.html
what vulnarability does ipp-crypto version less then 2021.7 have
Having vulnarability CVE-2015-5217 Advisory: providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipsilon version less then 1.0.1 have ### Response: Having vulnarability CVE-2015-5217 Advisory: providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
what vulnarability does ipsilon version less then 1.0.1 have
Having vulnarability CVE-2018-1000656 Advisory: Ipwb 0.2018.08.29.1434 updates its dependency 'Flask' to v0.12.3 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipwb version less then 0.2018.08.29.1434 have ### Response: Having vulnarability CVE-2018-1000656 Advisory: Ipwb 0.2018.08.29.1434 updates its dependency 'Flask' to v0.12.3 to include security fixes.
what vulnarability does ipwb version less then 0.2018.08.29.1434 have
Having vulnarability CVE-2019-7539 Advisory: A code injection issue was discovered in ipycache through 2016-05-31.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipycache version greather then equal to 0,less then equal to 0.1.4 have ### Response: Having vulnarability CVE-2019-7539 Advisory: A code injection issue was discovered in ipycache through 2016-05-31.
what vulnarability does ipycache version greather then equal to 0,less then equal to 0.1.4 have
Having vulnarability CVE-2020-7760 Advisory: Ipyflow 0.0.69 updates its NPM dependency 'codemirror' to v5.58.3 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipyflow version less then 0.0.69 have ### Response: Having vulnarability CVE-2020-7760 Advisory: Ipyflow 0.0.69 updates its NPM dependency 'codemirror' to v5.58.3 to include a security fix.
what vulnarability does ipyflow version less then 0.0.69 have
Having vulnarability PVE-2022-51743 Advisory: Ipyhton is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipyhton version greather then 0 have ### Response: Having vulnarability PVE-2022-51743 Advisory: Ipyhton is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
what vulnarability does ipyhton version greather then 0 have
Having vulnarability CVE-2015-4707 Advisory: Cross-site scripting (XSS) vulnerability in IPython before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/notebooks path.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipython version less then 3.2.0 have ### Response: Having vulnarability CVE-2015-4707 Advisory: Cross-site scripting (XSS) vulnerability in IPython before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/notebooks path.
what vulnarability does ipython version less then 3.2.0 have
Having vulnarability CVE-2021-3807 Advisory: Ipyvue-remote-component 1.1.1 updates its NPM dependency 'ansi-regex' to v5.0.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipyvue-remote-component version less then 1.1.1 have ### Response: Having vulnarability CVE-2021-3807 Advisory: Ipyvue-remote-component 1.1.1 updates its NPM dependency 'ansi-regex' to v5.0.1 to include a security fix.
what vulnarability does ipyvue-remote-component version less then 1.1.1 have
Having vulnarability CVE-2021-23364 Advisory: Ipyvue-time-series 1.0.2 updates its NPM dependency 'browserslist' to v4.16.6 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipyvue-time-series version less then 1.0.2 have ### Response: Having vulnarability CVE-2021-23364 Advisory: Ipyvue-time-series 1.0.2 updates its NPM dependency 'browserslist' to v4.16.6 to include a security fix.
what vulnarability does ipyvue-time-series version less then 1.0.2 have
Having vulnarability PVE-2022-50664 Advisory: Ipywidgets 8.0.0 sanitizes descriptions by default. https://github.com/jupyter-widgets/ipywidgets/pull/2785
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ipywidgets version less then 8.0.0 have ### Response: Having vulnarability PVE-2022-50664 Advisory: Ipywidgets 8.0.0 sanitizes descriptions by default. https://github.com/jupyter-widgets/ipywidgets/pull/2785
what vulnarability does ipywidgets version less then 8.0.0 have
Having vulnarability PVE-2021-25859 Advisory: irc3 before 0.4.4 is vulnerable to several undisclosed security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does irc3 version less then 0.4.4 have ### Response: Having vulnarability PVE-2021-25859 Advisory: irc3 before 0.4.4 is vulnerable to several undisclosed security issues.
what vulnarability does irc3 version less then 0.4.4 have
Having vulnarability CVE-2016-0775 Advisory: Iroin-python-pptx 0.6.12 updates its dependency 'pillow' to v3.3.2 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iroin-python-pptx version less then 0.6.12 have ### Response: Having vulnarability CVE-2016-0775 Advisory: Iroin-python-pptx 0.6.12 updates its dependency 'pillow' to v3.3.2 to include security fixes.
what vulnarability does iroin-python-pptx version less then 0.6.12 have
Having vulnarability CVE-2015-7514 Advisory: OpenStack Ironic 4.2.0 through 4.2.1 does not "clean" the disk after use, which allows remote authenticated users to obtain sensitive information.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ironic version less then 4.2.2 have ### Response: Having vulnarability CVE-2015-7514 Advisory: OpenStack Ironic 4.2.0 through 4.2.1 does not "clean" the disk after use, which allows remote authenticated users to obtain sensitive information.
what vulnarability does ironic version less then 4.2.2 have
Having vulnarability CVE-2015-5306 Advisory: Ironic-inspector (aka ironic-discoverd) 2.3.0 includes a fix for CVE-2015-5306: When debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error. https://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ironic-discoverd version less then 2.3.0 have ### Response: Having vulnarability CVE-2015-5306 Advisory: Ironic-inspector (aka ironic-discoverd) 2.3.0 includes a fix for CVE-2015-5306: When debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error. https://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f
what vulnarability does ironic-discoverd version less then 2.3.0 have
Having vulnarability CVE-2015-5306 Advisory: Ironic-inspector 2.3.0 includes a fix for CVE-2015-5306: When debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error. https://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ironic-inspector version less then 2.3.0 have ### Response: Having vulnarability CVE-2015-5306 Advisory: Ironic-inspector 2.3.0 includes a fix for CVE-2015-5306: When debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error. https://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f
what vulnarability does ironic-inspector version less then 2.3.0 have