output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2022-24798 Advisory: Irrd 4.2.3 includes a fix for CVE-2022-24798: IRRd did not always filter password hashes in query responses relating to 'mntner' objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected. This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. There are no known workarounds for this issue.
https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does irrd version greather then equal to 4.2.0,less then 4.2.3 have ### Response: Having vulnarability CVE-2022-24798 Advisory: Irrd 4.2.3 includes a fix for CVE-2022-24798: IRRd did not always filter password hashes in query responses relating to 'mntner' objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected. This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. There are no known workarounds for this issue.
https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw | what vulnarability does irrd version greather then equal to 4.2.0,less then 4.2.3 have | |
Having vulnarability CVE-2019-5882 Advisory: Irssi 1.1.x before 1.1.2 has a use after free when hidden lines are expired from the scroll buffer. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does irssi version less then 1.1.2 have ### Response: Having vulnarability CVE-2019-5882 Advisory: Irssi 1.1.x before 1.1.2 has a use after free when hidden lines are expired from the scroll buffer. | what vulnarability does irssi version less then 1.1.2 have | |
Having vulnarability PVE-2023-52828 Advisory: Iscc-core 0.2.0 uses a cryptographycally safe random choice function.
https://github.com/iscc/iscc-core/commit/87570e28fb14fd016bc0f1938d1a23397a98edb4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iscc-core version less then 0.2.0 have ### Response: Having vulnarability PVE-2023-52828 Advisory: Iscc-core 0.2.0 uses a cryptographycally safe random choice function.
https://github.com/iscc/iscc-core/commit/87570e28fb14fd016bc0f1938d1a23397a98edb4 | what vulnarability does iscc-core version less then 0.2.0 have | |
Having vulnarability CVE-2018-18074 Advisory: Iso6709 0.1.4 updates its dependency 'requests' to v2.22.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does iso6709 version less then 0.1.4 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Iso6709 0.1.4 updates its dependency 'requests' to v2.22.2 to include a security fix. | what vulnarability does iso6709 version less then 0.1.4 have | |
Having vulnarability CVE-2020-6802 Advisory: Isogeo-export-xl 1.3.0 updates its dependency 'bleach' to v3.1.1. to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does isogeo-export-xl version less then 1.3.0 have ### Response: Having vulnarability CVE-2020-6802 Advisory: Isogeo-export-xl 1.3.0 updates its dependency 'bleach' to v3.1.1. to include a security fix. | what vulnarability does isogeo-export-xl version less then 1.3.0 have | |
Having vulnarability PVE-2021-25862 Advisory: isso 0.6 fixes a cross-site request forgery vulnerability for comment creation, voting, editing and deletion.
https://github.com/isso-comments/isso/commit/8d22ab3f4646b51161878835566695ee39083511
https://github.com/isso-comments/isso/commit/232e2fb474730612c760391b87b3e4f15cb6dfaf | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does isso version less then 0.6 have ### Response: Having vulnarability PVE-2021-25862 Advisory: isso 0.6 fixes a cross-site request forgery vulnerability for comment creation, voting, editing and deletion.
https://github.com/isso-comments/isso/commit/8d22ab3f4646b51161878835566695ee39083511
https://github.com/isso-comments/isso/commit/232e2fb474730612c760391b87b3e4f15cb6dfaf | what vulnarability does isso version less then 0.6 have | |
Having vulnarability PVE-2021-37714 Advisory: Isso-cn 0.6 fixes a cross-site request forgery vulnerability for comment creation, voting, editing and deletion. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does isso-cn version less then 0.6 have ### Response: Having vulnarability PVE-2021-37714 Advisory: Isso-cn 0.6 fixes a cross-site request forgery vulnerability for comment creation, voting, editing and deletion. | what vulnarability does isso-cn version less then 0.6 have | |
Having vulnarability CVE-2021-41945 Advisory: Itutor-fastapi-middlewares 0.0.3 updates its dependency 'httpx' to v0.23.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does itutor-fastapi-middlewares version less then 0.0.3 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Itutor-fastapi-middlewares 0.0.3 updates its dependency 'httpx' to v0.23.0 to include a security fix. | what vulnarability does itutor-fastapi-middlewares version less then 0.0.3 have | |
Having vulnarability CVE-2023-30861 Advisory: Jageocoder 2.0.2 updates its dependency 'flask' to version '2.2.5' to include a security fix.
https://github.com/t-sagara/jageocoder/commit/d6aae38a75089863c1eae574f2c93027228a6ca8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jageocoder version less then 2.0.2 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Jageocoder 2.0.2 updates its dependency 'flask' to version '2.2.5' to include a security fix.
https://github.com/t-sagara/jageocoder/commit/d6aae38a75089863c1eae574f2c93027228a6ca8 | what vulnarability does jageocoder version less then 2.0.2 have | |
Having vulnarability CVE-2020-27783 Advisory: Jake 0.2.59 updates its dependency 'lxml' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jake version less then 0.2.59 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Jake 0.2.59 updates its dependency 'lxml' to include a security fix. | what vulnarability does jake version less then 0.2.59 have | |
Having vulnarability PVE-2022-51477 Advisory: Jaraco.abode 0.7.0 doesn't store passwords in cache files to avoid a potential information disclosure vulnerability.
https://github.com/jaraco/jaraco.abode/commit/2fc5844f8f961a41a9ab0d3268927755fac1aad7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jaraco-abode version less then 0.7.0 have ### Response: Having vulnarability PVE-2022-51477 Advisory: Jaraco.abode 0.7.0 doesn't store passwords in cache files to avoid a potential information disclosure vulnerability.
https://github.com/jaraco/jaraco.abode/commit/2fc5844f8f961a41a9ab0d3268927755fac1aad7 | what vulnarability does jaraco-abode version less then 0.7.0 have | |
Having vulnarability PVE-2022-49685 Advisory: Jarvis-ui 0.2.8 hexlifies token to secure it over internet.
https://github.com/thevickypedia/Jarvis_UI/commit/f6bca8b2d9785890a96b7db3e74ea816978c7bc4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jarvis-ui version less then 0.2.8 have ### Response: Having vulnarability PVE-2022-49685 Advisory: Jarvis-ui 0.2.8 hexlifies token to secure it over internet.
https://github.com/thevickypedia/Jarvis_UI/commit/f6bca8b2d9785890a96b7db3e74ea816978c7bc4 | what vulnarability does jarvis-ui version less then 0.2.8 have | |
Having vulnarability PVE-2021-38425 Advisory: The encryption method in Jcrypt 1.1.0 includes security and speed improvements. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jcrypt version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-38425 Advisory: The encryption method in Jcrypt 1.1.0 includes security and speed improvements. | what vulnarability does jcrypt version less then 1.1.0 have | |
Having vulnarability CVE-2023-35932 Advisory: Jcvi 1.3.6 includes a fix for a configuration injection vulnerability.
https://github.com/tanghaibao/jcvi/commit/d1cf612b650627dac07427c67e4fbd74d3ab8ada
https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jcvi version less then equal to 1.3.5 have ### Response: Having vulnarability CVE-2023-35932 Advisory: Jcvi 1.3.6 includes a fix for a configuration injection vulnerability.
https://github.com/tanghaibao/jcvi/commit/d1cf612b650627dac07427c67e4fbd74d3ab8ada
https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q | what vulnarability does jcvi version less then equal to 1.3.5 have | |
Having vulnarability PVE-2021-38694 Advisory: JeIlyfish is a malicious Python library caught stealing SSH and GPG keys. Note that the first "L" is a capital "i". Reference: <https://www.zdnet.com/article/two-malicious-python-libraries-removed-from-pypi/>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jeIlyfish version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-38694 Advisory: JeIlyfish is a malicious Python library caught stealing SSH and GPG keys. Note that the first "L" is a capital "i". Reference: <https://www.zdnet.com/article/two-malicious-python-libraries-removed-from-pypi/>. | what vulnarability does jeIlyfish version greather then 0,less then 0 have | |
Having vulnarability CVE-2023-0592 Advisory: A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory. This issue affects jefferson before 0.4.1.
https://github.com/sviehb/jefferson/commit/971aca1a8b3b9f4fcb4674fa9621d3349195cdc6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jefferson version less then 0.4.1 have ### Response: Having vulnarability CVE-2023-0592 Advisory: A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory. This issue affects jefferson before 0.4.1.
https://github.com/sviehb/jefferson/commit/971aca1a8b3b9f4fcb4674fa9621d3349195cdc6 | what vulnarability does jefferson version less then 0.4.1 have | |
Having vulnarability CVE-2021-30145 Advisory: Jellyfin-mpv-shim 2.0.2 updates its 'MPV' build to version '20211219' to include a security fix.
https://github.com/jellyfin/jellyfin-mpv-shim/commit/618752c4792ba59d5b3f481950f4d254c652ec31 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jellyfin-mpv-shim version less then 2.0.2 have ### Response: Having vulnarability CVE-2021-30145 Advisory: Jellyfin-mpv-shim 2.0.2 updates its 'MPV' build to version '20211219' to include a security fix.
https://github.com/jellyfin/jellyfin-mpv-shim/commit/618752c4792ba59d5b3f481950f4d254c652ec31 | what vulnarability does jellyfin-mpv-shim version less then 2.0.2 have | |
Having vulnarability PVE-2021-38130 Advisory: For security, unhandled exceptions in jetforce 0.2.0 display a generic error message instead of the plain exception string. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jetforce version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-38130 Advisory: For security, unhandled exceptions in jetforce 0.2.0 display a generic error message instead of the plain exception string. | what vulnarability does jetforce version less then 0.2.0 have | |
Having vulnarability PVE-2023-99925 Advisory: Jetson-stats 4.2.4 updates its dependency 'tornado' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jetson-stats version less then 4.2.4 have ### Response: Having vulnarability PVE-2023-99925 Advisory: Jetson-stats 4.2.4 updates its dependency 'tornado' to include a security fix. | what vulnarability does jetson-stats version less then 4.2.4 have | |
Having vulnarability CVE-2019-14751 Advisory: Jiant 1.2.0 updates the NLTK requirement to version 3.4.5 to avoid a potential security issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jiant version less then 1.2.0 have ### Response: Having vulnarability CVE-2019-14751 Advisory: Jiant 1.2.0 updates the NLTK requirement to version 3.4.5 to avoid a potential security issue. | what vulnarability does jiant version less then 1.2.0 have | |
Having vulnarability CVE-2021-29536 Advisory: Jina version 2.0.0 updates its dependency "Tensorflow" to v2.4.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jina version less then 2.0.0 have ### Response: Having vulnarability CVE-2021-29536 Advisory: Jina version 2.0.0 updates its dependency "Tensorflow" to v2.4.2 to include security fixes. | what vulnarability does jina version less then 2.0.0 have | |
Having vulnarability CVE-2020-28493 Advisory: This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the '_punctuation_re regex' operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jinja2 version less then 2.11.3 have ### Response: Having vulnarability CVE-2020-28493 Advisory: This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the '_punctuation_re regex' operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory. | what vulnarability does jinja2 version less then 2.11.3 have | |
Having vulnarability CVE-2020-14343 Advisory: JinjaFx v1.3.4 fixes a code execution vulnerability related with YAML parsing. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jinjafx version less then 1.3.4 have ### Response: Having vulnarability CVE-2020-14343 Advisory: JinjaFx v1.3.4 fixes a code execution vulnerability related with YAML parsing. | what vulnarability does jinjafx version less then 1.3.4 have | |
Having vulnarability CVE-2022-23491 Advisory: Jira-commands 0.12.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jira-commands version less then 0.12.1 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Jira-commands 0.12.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix. | what vulnarability does jira-commands version less then 0.12.1 have | |
Having vulnarability PVE-2021-37427 Advisory: Jnitrace 2.2.1 upgrades eslint-package to patch security vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jnitrace version less then 2.2.1 have ### Response: Having vulnarability PVE-2021-37427 Advisory: Jnitrace 2.2.1 upgrades eslint-package to patch security vulnerability. | what vulnarability does jnitrace version less then 2.2.1 have | |
Having vulnarability CVE-2021-44832 Advisory: Jno 0.4.0 and prior uses a version of Arduino IDE that depends on a version of 'log4j' containing severe and critical vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jno version less then equal to 0.4.0 have ### Response: Having vulnarability CVE-2021-44832 Advisory: Jno 0.4.0 and prior uses a version of Arduino IDE that depends on a version of 'log4j' containing severe and critical vulnerabilities. | what vulnarability does jno version less then equal to 0.4.0 have | |
Having vulnarability PVE-2022-51394 Advisory: Joblib 1.1.1 fixes a security issue where 'eval(pre_dispatch)' could potentially run arbitrary code. Now only basic numerics are supported.
https://github.com/joblib/joblib/pull/1327 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does joblib version less then 1.1.1 have ### Response: Having vulnarability PVE-2022-51394 Advisory: Joblib 1.1.1 fixes a security issue where 'eval(pre_dispatch)' could potentially run arbitrary code. Now only basic numerics are supported.
https://github.com/joblib/joblib/pull/1327 | what vulnarability does joblib version less then 1.1.1 have | |
Having vulnarability PVE-2021-25867 Advisory: jose 0.3.0 fixed critical JWT vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jose version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-25867 Advisory: jose 0.3.0 fixed critical JWT vulnerability. | what vulnarability does jose version less then 0.3.0 have | |
Having vulnarability CVE-2015-1866 Advisory: Js.ember (ember.js packaging for fanstatic) 1.0.0 includes ember.js v1.0.0, which has known transitive vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does js-ember version less then equal to 1.0.0 have ### Response: Having vulnarability CVE-2015-1866 Advisory: Js.ember (ember.js packaging for fanstatic) 1.0.0 includes ember.js v1.0.0, which has known transitive vulnerabilities. | what vulnarability does js-ember version less then equal to 1.0.0 have | |
Having vulnarability PVE-2023-99917 Advisory: A security flaw with Cross-site scripting could potentially enable an attacker to take over a user's session. Essentially, this may allow the unauthorized individual to alter the user's password and invalidate the victim's session, all while maintaining access themselves. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does js-jquery-datatables version greather then 0.0a have ### Response: Having vulnarability PVE-2023-99917 Advisory: A security flaw with Cross-site scripting could potentially enable an attacker to take over a user's session. Essentially, this may allow the unauthorized individual to alter the user's password and invalidate the victim's session, all while maintaining access themselves. | what vulnarability does js-jquery-datatables version greather then 0.0a have | |
Having vulnarability CVE-2016-10540 Advisory: Js.mocha 2.2.5 (Fanstatic packaging of Mocha) has NPM dependencies with known vulnerabilities (glob). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does js-mocha version less then equal to 2.2.5 have ### Response: Having vulnarability CVE-2016-10540 Advisory: Js.mocha 2.2.5 (Fanstatic packaging of Mocha) has NPM dependencies with known vulnerabilities (glob). | what vulnarability does js-mocha version less then equal to 2.2.5 have | |
Having vulnarability PVE-2021-36130 Advisory: Js-videojs 4.12.5 updates videojs-swf to v4.5.4 to fix a potential XSS vulnerability.
https://github.com/videojs/video.js/pull/1955 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does js-videojs version less then 4.12.5 have ### Response: Having vulnarability PVE-2021-36130 Advisory: Js-videojs 4.12.5 updates videojs-swf to v4.5.4 to fix a potential XSS vulnerability.
https://github.com/videojs/video.js/pull/1955 | what vulnarability does js-videojs version less then 4.12.5 have | |
Having vulnarability CVE-2018-0023 Advisory: JSNAPy 1.3.0 includes a fix for CVE-2018-0023: The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jsnapy version less then 1.3.0 have ### Response: Having vulnarability CVE-2018-0023 Advisory: JSNAPy 1.3.0 includes a fix for CVE-2018-0023: The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github. | what vulnarability does jsnapy version less then 1.3.0 have | |
Having vulnarability CVE-2018-18074 Advisory: Json2xml version 3.0.0 updates its dependency "requests" minimum requirement to v2.20.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does json2xml version less then 3.0.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Json2xml version 3.0.0 updates its dependency "requests" minimum requirement to v2.20.0 to include a security fix. | what vulnarability does json2xml version less then 3.0.0 have | |
Having vulnarability PVE-2023-59178 Advisory: Jsonargparse 4.22.0 includes a fix for a ReDoS vulnerability.
https://github.com/omni-us/jsonargparse/commit/7f5e9b808130de4e60093b5a9fde264f69d74e93 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jsonargparse version less then 4.22.0 have ### Response: Having vulnarability PVE-2023-59178 Advisory: Jsonargparse 4.22.0 includes a fix for a ReDoS vulnerability.
https://github.com/omni-us/jsonargparse/commit/7f5e9b808130de4e60093b5a9fde264f69d74e93 | what vulnarability does jsonargparse version less then 4.22.0 have | |
Having vulnarability PVE-2021-40863 Advisory: Jsoneditor 2.2.2 fixes a security error in the server side file retriever script of the web application. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jsoneditor version less then 2.2.2 have ### Response: Having vulnarability PVE-2021-40863 Advisory: Jsoneditor 2.2.2 fixes a security error in the server side file retriever script of the web application. | what vulnarability does jsoneditor version less then 2.2.2 have | |
Having vulnarability PVE-2021-25869 Advisory: jsonrpc-pyclient 0.7.0 fixes security issues in unixdomainsocket connectors. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jsonrpc-pyclient version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-25869 Advisory: jsonrpc-pyclient 0.7.0 fixes security issues in unixdomainsocket connectors. | what vulnarability does jsonrpc-pyclient version less then 0.7.0 have | |
Having vulnarability CVE-2018-0524 Advisory: Jubatus 1.0.2 and earlier allows remote code execution via unspecified vectors. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jubatus version greather then equal to 0,less then 1.1.0 have ### Response: Having vulnarability CVE-2018-0524 Advisory: Jubatus 1.0.2 and earlier allows remote code execution via unspecified vectors. | what vulnarability does jubatus version greather then equal to 0,less then 1.1.0 have | |
Having vulnarability CVE-2024-22195 Advisory: Juicenet-cli version 0.32.0 resolves CVE-2024-22195 by upgrading its jinja2 dependency from version 3.1.2 to 3.1.3.
https://github.com/Ravencentric/juicenet-cli/commit/6e64a808e7f132c45202028b1b5d29d761ebb6d6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does juicenet-cli version less then 0.32.0 have ### Response: Having vulnarability CVE-2024-22195 Advisory: Juicenet-cli version 0.32.0 resolves CVE-2024-22195 by upgrading its jinja2 dependency from version 3.1.2 to 3.1.3.
https://github.com/Ravencentric/juicenet-cli/commit/6e64a808e7f132c45202028b1b5d29d761ebb6d6 | what vulnarability does juicenet-cli version less then 0.32.0 have | |
Having vulnarability PVE-2021-38051 Advisory: Jumpssh 1.6.3 removes pytest-runner from setup_requires as this is deprecated for security reasons, see https://github.com/pytest-dev/pytest-runner | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jumpssh version less then 1.6.3 have ### Response: Having vulnarability PVE-2021-38051 Advisory: Jumpssh 1.6.3 removes pytest-runner from setup_requires as this is deprecated for security reasons, see https://github.com/pytest-dev/pytest-runner | what vulnarability does jumpssh version less then 1.6.3 have | |
Having vulnarability PVE-2022-45426 Advisory: Junkeldat is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does junkeldat version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45426 Advisory: Junkeldat is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does junkeldat version greather then 0,less then 0 have | |
Having vulnarability CVE-2017-18342 Advisory: Junos-eznc 2.2.1 fixes PyYAML as per CVE-2017-18342. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does junos-eznc version less then 2.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Junos-eznc 2.2.1 fixes PyYAML as per CVE-2017-18342. | what vulnarability does junos-eznc version less then 2.2.1 have | |
Having vulnarability CVE-2022-34265 Advisory: Juntagrico 1.5.5 updates its dependency 'django' requirement to "~=4.0.8" to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does juntagrico version less then 1.5.5 have ### Response: Having vulnarability CVE-2022-34265 Advisory: Juntagrico 1.5.5 updates its dependency 'django' requirement to "~=4.0.8" to include security fixes. | what vulnarability does juntagrico version less then 1.5.5 have | |
Having vulnarability CVE-2007-4559 Advisory: Jupyter-archive 3.3.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-archive version less then 3.3.2 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Jupyter-archive 3.3.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does jupyter-archive version less then 3.3.2 have | |
Having vulnarability CVE-2022-39286 Advisory: Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in 'jupyter_core' that stems from 'jupyter_core' executing untrusted files in CWD. This vulnerability allows one user to run code as another. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-core version greather then equal to 0,less then 4.11.2 have ### Response: Having vulnarability CVE-2022-39286 Advisory: Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in 'jupyter_core' that stems from 'jupyter_core' executing untrusted files in CWD. This vulnerability allows one user to run code as another. | what vulnarability does jupyter-core version greather then equal to 0,less then 4.11.2 have | |
Having vulnarability PVE-2022-52144 Advisory: Jupyter-enterprise-gateway 0.8.0 enables SSH tunneling by default.
https://github.com/jupyter-server/enterprise_gateway/issues/234 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-enterprise-gateway version less then 0.8.0 have ### Response: Having vulnarability PVE-2022-52144 Advisory: Jupyter-enterprise-gateway 0.8.0 enables SSH tunneling by default.
https://github.com/jupyter-server/enterprise_gateway/issues/234 | what vulnarability does jupyter-enterprise-gateway version less then 0.8.0 have | |
Having vulnarability CVE-2021-37701 Advisory: Jupyter-jsmol 2021.9.0 updates its NPM dependency 'tar' to v6.1.11 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-jsmol version less then 2021.9.0 have ### Response: Having vulnarability CVE-2021-37701 Advisory: Jupyter-jsmol 2021.9.0 updates its NPM dependency 'tar' to v6.1.11 to include security fixes. | what vulnarability does jupyter-jsmol version less then 2021.9.0 have | |
Having vulnarability PVE-2022-50889 Advisory: Jupyter-jsonnet 0.3 disables imports to avoid security issues.
https://github.com/abentley/jupyter-jsonnet/commit/238dfb7218d395758dceb215c0eecb4cd40ee16f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-jsonnet version less then 0.3 have ### Response: Having vulnarability PVE-2022-50889 Advisory: Jupyter-jsonnet 0.3 disables imports to avoid security issues.
https://github.com/abentley/jupyter-jsonnet/commit/238dfb7218d395758dceb215c0eecb4cd40ee16f | what vulnarability does jupyter-jsonnet version less then 0.3 have | |
Having vulnarability PVE-2022-51892 Advisory: Jupyter-kuleuven-slides 0.3.3 sanitizes SVG data to prevent injection attacks.
https://github.com/KULeuven-Diepenbeek/jupyter-KULeuven-slides/commit/b0fd098606c853d2a875b083e312929bd2b74930 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-kuleuven-slides version less then 0.3.3 have ### Response: Having vulnarability PVE-2022-51892 Advisory: Jupyter-kuleuven-slides 0.3.3 sanitizes SVG data to prevent injection attacks.
https://github.com/KULeuven-Diepenbeek/jupyter-KULeuven-slides/commit/b0fd098606c853d2a875b083e312929bd2b74930 | what vulnarability does jupyter-kuleuven-slides version less then 0.3.3 have | |
Having vulnarability CVE-2024-22415 Advisory: jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-lsp version less then equal to 2.2.1 have ### Response: Having vulnarability CVE-2024-22415 Advisory: jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp. | what vulnarability does jupyter-lsp version less then equal to 2.2.1 have | |
Having vulnarability PVE-2021-41081 Advisory: Jupyter-matlab-proxy 0.1.1 includes bug fixes and security patches. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-matlab-proxy version less then 0.1.1 have ### Response: Having vulnarability PVE-2021-41081 Advisory: Jupyter-matlab-proxy 0.1.1 includes bug fixes and security patches. | what vulnarability does jupyter-matlab-proxy version less then 0.1.1 have | |
Having vulnarability CVE-2023-48051 Advisory: jupyter-micropython-upydevice 0.0.7 and prior versions ship with vulnerable dependencies (upydev == 0.3.8). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-micropython-upydevice version less then equal to 0.0.7 have ### Response: Having vulnarability CVE-2023-48051 Advisory: jupyter-micropython-upydevice 0.0.7 and prior versions ship with vulnerable dependencies (upydev == 0.3.8). | what vulnarability does jupyter-micropython-upydevice version less then equal to 0.0.7 have | |
Having vulnarability CVE-2020-6802 Advisory: Jupyter-nbrequirements 0.6.0 updates bleach from 3.1.0 to 3.1.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-nbrequirements version less then 0.6.0 have ### Response: Having vulnarability CVE-2020-6802 Advisory: Jupyter-nbrequirements 0.6.0 updates bleach from 3.1.0 to 3.1.1 to include a security fix. | what vulnarability does jupyter-nbrequirements version less then 0.6.0 have | |
Having vulnarability PVE-2021-38212 Advisory: Jupyter-server 0.2.0 adds a "secure_write" to function for cookie/token saves. See: <https://github.com/jupyter/jupyter_server/pull/77>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-server version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-38212 Advisory: Jupyter-server 0.2.0 adds a "secure_write" to function for cookie/token saves. See: <https://github.com/jupyter/jupyter_server/pull/77>. | what vulnarability does jupyter-server version less then 0.2.0 have | |
Having vulnarability CVE-2022-21697 Advisory: Jupyter-server-proxy 3.2.1 includes a fix for CVE-2022-21697: Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the 'allowed_hosts' check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity.
https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyter-server-proxy version less then 3.2.1 have ### Response: Having vulnarability CVE-2022-21697 Advisory: Jupyter-server-proxy 3.2.1 includes a fix for CVE-2022-21697: Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the 'allowed_hosts' check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity.
https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw | what vulnarability does jupyter-server-proxy version less then 3.2.1 have | |
Having vulnarability PVE-2021-38973 Advisory: The maintainers of jupyterhub acknowledge in their changelog notes for version 0.2 that when the environment dictionary is used for authentication as an admin, jupyterhub becomes vulnerable to pre-existing security issues because these environment variables may be passed to the user via the batch submit command. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub version less then equal to 0.2 have ### Response: Having vulnarability PVE-2021-38973 Advisory: The maintainers of jupyterhub acknowledge in their changelog notes for version 0.2 that when the environment dictionary is used for authentication as an admin, jupyterhub becomes vulnerable to pre-existing security issues because these environment variables may be passed to the user via the batch submit command. | what vulnarability does jupyterhub version less then equal to 0.2 have | |
Having vulnarability CVE-2021-41194 Advisory: FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub-firstuseauthenticator version greather then equal to 0,less then 1.0.0 have ### Response: Having vulnarability CVE-2021-41194 Advisory: FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs. | what vulnarability does jupyterhub-firstuseauthenticator version greather then equal to 0,less then 1.0.0 have | |
Having vulnarability CVE-2020-15110 Advisory: In jupyterhub-kubespawner before 0.12, certain usernames will be able to craft particular server names which will grant them access to the default server of other users who have matching usernames. This has been fixed in 0.12. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub-kubespawner version greather then equal to 0,less then 0.12.0 have ### Response: Having vulnarability CVE-2020-15110 Advisory: In jupyterhub-kubespawner before 0.12, certain usernames will be able to craft particular server names which will grant them access to the default server of other users who have matching usernames. This has been fixed in 0.12. | what vulnarability does jupyterhub-kubespawner version greather then equal to 0,less then 0.12.0 have | |
Having vulnarability PVE-2023-58753 Advisory: Jupyterhub-nativeauthenticator 1.2.0 includes XSRF tokens for cross-site protection.
https://github.com/jupyterhub/nativeauthenticator/pull/236 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub-nativeauthenticator version less then 1.2.0 have ### Response: Having vulnarability PVE-2023-58753 Advisory: Jupyterhub-nativeauthenticator 1.2.0 includes XSRF tokens for cross-site protection.
https://github.com/jupyterhub/nativeauthenticator/pull/236 | what vulnarability does jupyterhub-nativeauthenticator version less then 1.2.0 have | |
Having vulnarability CVE-2020-26261 Advisory: Jupyterhub-systemdspawner 0.15 includes a fix for CVE-2020-26261: In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterhub-systemdspawner version less then 0.15 have ### Response: Having vulnarability CVE-2020-26261 Advisory: Jupyterhub-systemdspawner 0.15 includes a fix for CVE-2020-26261: In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. | what vulnarability does jupyterhub-systemdspawner version less then 0.15 have | |
Having vulnarability CVE-2021-21306 Advisory: Jupyterlab 3.0.8 updates its dependency 'marked' to v2.0.0 to address a vulnerability. See also <https://github.com/jupyterlab/jupyterlab/pull/9809>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab version less then 3.0.8 have ### Response: Having vulnarability CVE-2021-21306 Advisory: Jupyterlab 3.0.8 updates its dependency 'marked' to v2.0.0 to address a vulnerability. See also <https://github.com/jupyterlab/jupyterlab/pull/9809>. | what vulnarability does jupyterlab version less then 3.0.8 have | |
Having vulnarability PVE-2021-41073 Advisory: Jupyterlab-git 0.32.0 upgrades underlying packages to address security warnings. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-git version less then 0.32.0 have ### Response: Having vulnarability PVE-2021-41073 Advisory: Jupyterlab-git 0.32.0 upgrades underlying packages to address security warnings. | what vulnarability does jupyterlab-git version less then 0.32.0 have | |
Having vulnarability CVE-2021-32640 Advisory: Jupyterlab-iframe 0.5.0 updates its dependencies 'ws' to version '7.4.6' to include a fix for a ReDoS vulnerability.
https://github.com/timkpaine/jupyterlab_iframe/pull/139 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-iframe version less then 0.5.0 have ### Response: Having vulnarability CVE-2021-32640 Advisory: Jupyterlab-iframe 0.5.0 updates its dependencies 'ws' to version '7.4.6' to include a fix for a ReDoS vulnerability.
https://github.com/timkpaine/jupyterlab_iframe/pull/139 | what vulnarability does jupyterlab-iframe version less then 0.5.0 have | |
Having vulnarability CVE-2021-23362 Advisory: Jupyterlab-link-share 0.2.1 updates its NPM dependency 'hosted-git-info' to v2.8.9 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-link-share version less then 0.2.1 have ### Response: Having vulnarability CVE-2021-23362 Advisory: Jupyterlab-link-share 0.2.1 updates its NPM dependency 'hosted-git-info' to v2.8.9 to include a security fix. | what vulnarability does jupyterlab-link-share version less then 0.2.1 have | |
Having vulnarability CVE-2024-22415 Advisory: jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-lsp version less then 5.0.2 have ### Response: Having vulnarability CVE-2024-22415 Advisory: jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp. | what vulnarability does jupyterlab-lsp version less then 5.0.2 have | |
Having vulnarability PVE-2021-41738 Advisory: Jupyterlab-theme-solarized-dark 1.0.2 updates its dependency "lodash" to v4.17.19 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterlab-theme-solarized-dark version less then 1.0.2 have ### Response: Having vulnarability PVE-2021-41738 Advisory: Jupyterlab-theme-solarized-dark 1.0.2 updates its dependency "lodash" to v4.17.19 to include a security fix. | what vulnarability does jupyterlab-theme-solarized-dark version less then 1.0.2 have | |
Having vulnarability PVE-2021-41822 Advisory: Jupyterquiz version 1.7.5 improves security of decoding JSON question data. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupyterquiz version less then 1.7.5 have ### Response: Having vulnarability PVE-2021-41822 Advisory: Jupyterquiz version 1.7.5 improves security of decoding JSON question data. | what vulnarability does jupyterquiz version less then 1.7.5 have | |
Having vulnarability CVE-2021-21306 Advisory: Jupytext 1.10.3 updates 'marked', an indirect dependency of the 'jupyterlab-jupytext' extension, to fix a moderate vulnerability (https://github.com/mwouts/jupytext/issues/750). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jupytext version less then 1.10.3 have ### Response: Having vulnarability CVE-2021-21306 Advisory: Jupytext 1.10.3 updates 'marked', an indirect dependency of the 'jupyterlab-jupytext' extension, to fix a moderate vulnerability (https://github.com/mwouts/jupytext/issues/750). | what vulnarability does jupytext version less then 1.10.3 have | |
Having vulnarability CVE-2020-13388 Advisory: Jw-util 2.3 includes a fix for CVE-2020-13388: When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jw-util version less then 2.3 have ### Response: Having vulnarability CVE-2020-13388 Advisory: Jw-util 2.3 includes a fix for CVE-2020-13388: When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used. | what vulnarability does jw-util version less then 2.3 have | |
Having vulnarability CVE-2016-6298 Advisory: The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jwcrypto version less then 0.3.2 have ### Response: Having vulnarability CVE-2016-6298 Advisory: The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA). | what vulnarability does jwcrypto version less then 0.3.2 have | |
Having vulnarability CVE-2018-14574 Advisory: Jwql 0.16.0 updates its dependency 'Django' to v2.1.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does jwql version less then 0.16.0 have ### Response: Having vulnarability CVE-2018-14574 Advisory: Jwql 0.16.0 updates its dependency 'Django' to v2.1.2 to include a security fix. | what vulnarability does jwql version less then 0.16.0 have | |
Having vulnarability CVE-2021-3121 Advisory: K8t 0.7.5 updates docker image to include a security fix.
https://github.com/ClarkSource/k8t/commit/0f0ef80254cc841175e24738f4e19956a04e6435 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does k8t version less then 0.7.5 have ### Response: Having vulnarability CVE-2021-3121 Advisory: K8t 0.7.5 updates docker image to include a security fix.
https://github.com/ClarkSource/k8t/commit/0f0ef80254cc841175e24738f4e19956a04e6435 | what vulnarability does k8t version less then 0.7.5 have | |
Having vulnarability PVE-2022-50614 Advisory: Kafkacrypto 0.9.10.0 adds validation to make returned random0 values match those originally used. This avoids a protocol-level hypothetical attack.
https://github.com/tmcqueen-materials/kafkacrypto/commit/649395b3fa30fdb1670bfd9f7e6ab30d63985b2f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kafkacrypto version less then 0.9.10.0 have ### Response: Having vulnarability PVE-2022-50614 Advisory: Kafkacrypto 0.9.10.0 adds validation to make returned random0 values match those originally used. This avoids a protocol-level hypothetical attack.
https://github.com/tmcqueen-materials/kafkacrypto/commit/649395b3fa30fdb1670bfd9f7e6ab30d63985b2f | what vulnarability does kafkacrypto version less then 0.9.10.0 have | |
Having vulnarability PVE-2023-58962 Advisory: Kagi 0.4.0 includes a fix for an insufficiently protected secret token.
https://github.com/justinmayer/kagi/pull/72 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kagi version less then 0.4.0 have ### Response: Having vulnarability PVE-2023-58962 Advisory: Kagi 0.4.0 includes a fix for an insufficiently protected secret token.
https://github.com/justinmayer/kagi/pull/72 | what vulnarability does kagi version less then 0.4.0 have | |
Having vulnarability CVE-2018-18074 Advisory: Kako 1.1.0 updates its dependency 'requests' to v2.22.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kako version less then 1.1.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kako 1.1.0 updates its dependency 'requests' to v2.22.0 to include a security fix. | what vulnarability does kako version less then 1.1.0 have | |
Having vulnarability CVE-2018-18074 Advisory: Kalliope 0.5.3 updates 'requests' dependency to v2.20.1 to fix a security vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kalliope version less then 0.5.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kalliope 0.5.3 updates 'requests' dependency to v2.20.1 to fix a security vulnerability. | what vulnarability does kalliope version less then 0.5.3 have | |
Having vulnarability CVE-2016-3114 Advisory: Kallithea before 0.3.2 allows remote authenticated users to edit or delete open pull requests or delete comments by leveraging read access. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kallithea version less then 0.3.2 have ### Response: Having vulnarability CVE-2016-3114 Advisory: Kallithea before 0.3.2 allows remote authenticated users to edit or delete open pull requests or delete comments by leveraging read access. | what vulnarability does kallithea version less then 0.3.2 have | |
Having vulnarability PVE-2021-38963 Advisory: Karlovic 0.1.3beta includes a fix for a vulnerable Pillow function. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does karlovic version less then 0.1.3beta have ### Response: Having vulnarability PVE-2021-38963 Advisory: Karlovic 0.1.3beta includes a fix for a vulnerable Pillow function. | what vulnarability does karlovic version less then 0.1.3beta have | |
Having vulnarability PVE-2021-34247 Advisory: katal before 0.0.6 uses eval() internally.
https://github.com/suizokukan/katal/commit/7973faa8f8d90a4385e3e1f0056a698823303462 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does katal version less then 0.0.6 have ### Response: Having vulnarability PVE-2021-34247 Advisory: katal before 0.0.6 uses eval() internally.
https://github.com/suizokukan/katal/commit/7973faa8f8d90a4385e3e1f0056a698823303462 | what vulnarability does katal version less then 0.0.6 have | |
Having vulnarability PVE-2021-36914 Advisory: Katka-core 0.11.0 decreases the amount of gaping security holes related to broken authentication.
https://github.com/kpn/katka-core/commit/adeffeff55c5b58d73bbbe9ccbf5735677f1b650 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does katka-core version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-36914 Advisory: Katka-core 0.11.0 decreases the amount of gaping security holes related to broken authentication.
https://github.com/kpn/katka-core/commit/adeffeff55c5b58d73bbbe9ccbf5735677f1b650 | what vulnarability does katka-core version less then 0.11.0 have | |
Having vulnarability PVE-2021-38321 Advisory: Katsdptelstate 0.9 disable pickles by default for security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does katsdptelstate version less then 0.9 have ### Response: Having vulnarability PVE-2021-38321 Advisory: Katsdptelstate 0.9 disable pickles by default for security. | what vulnarability does katsdptelstate version less then 0.9 have | |
Having vulnarability PVE-2021-36494 Advisory: kaze-python 0.6.5 fixes vulnerability to RPC invoke functionality that can send node into unclosed loop during 'test' invokes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kaze-python version less then 0.6.5 have ### Response: Having vulnarability PVE-2021-36494 Advisory: kaze-python 0.6.5 fixes vulnerability to RPC invoke functionality that can send node into unclosed loop during 'test' invokes. | what vulnarability does kaze-python version less then 0.6.5 have | |
Having vulnarability CVE-2015-5159 Advisory: python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kdcproxy version less then 0.3.2 have ### Response: Having vulnarability CVE-2015-5159 Advisory: python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request. | what vulnarability does kdcproxy version less then 0.3.2 have | |
Having vulnarability CVE-2022-22817 Advisory: Kedro 0.17.7 updates its dependency 'pillow' minimum requirement (for python_version > '3.6') to v9.0.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kedro version less then 0.17.7 have ### Response: Having vulnarability CVE-2022-22817 Advisory: Kedro 0.17.7 updates its dependency 'pillow' minimum requirement (for python_version > '3.6') to v9.0.0 to include a security fix. | what vulnarability does kedro version less then 0.17.7 have | |
Having vulnarability PVE-2021-37353 Advisory: Kedro-viz 2.1.0 fixes an infosec vulnerability in LoDash (16). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kedro-viz version less then 2.1.0 have ### Response: Having vulnarability PVE-2021-37353 Advisory: Kedro-viz 2.1.0 fixes an infosec vulnerability in LoDash (16). | what vulnarability does kedro-viz version less then 2.1.0 have | |
Having vulnarability CVE-2022-30877 Advisory: Keep 1.2 included a code-execution backdoor inserted by a third party.
https://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keep version equal to 1.2 have ### Response: Having vulnarability CVE-2022-30877 Advisory: Keep 1.2 included a code-execution backdoor inserted by a third party.
https://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer | what vulnarability does keep version equal to 1.2 have | |
Having vulnarability PVE-2021-41885 Advisory: Keepkey 6.6.0 includes vulnerability fixes. No more information was disclosed. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keepkey version less then 6.6.0 have ### Response: Having vulnarability PVE-2021-41885 Advisory: Keepkey 6.6.0 includes vulnerability fixes. No more information was disclosed. | what vulnarability does keepkey version less then 6.6.0 have | |
Having vulnarability CVE-2020-15168 Advisory: Keplergl 0.3.1 updates its NPM dependency 'node-fetch' to v2.6.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keplergl version less then 0.3.1 have ### Response: Having vulnarability CVE-2020-15168 Advisory: Keplergl 0.3.1 updates its NPM dependency 'node-fetch' to v2.6.1 to include a security fix. | what vulnarability does keplergl version less then 0.3.1 have | |
Having vulnarability CVE-2021-37678 Advisory: Keras 2.6.0rc3 fixes a security issue for loading keras models via yaml, which could allow arbitrary code execution. See CVE-2021-37678.
https://github.com/keras-team/keras/commit/32febb6cdebe166fc70ad72f2da37607c13bb11a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keras version less then 2.6.0rc3 have ### Response: Having vulnarability CVE-2021-37678 Advisory: Keras 2.6.0rc3 fixes a security issue for loading keras models via yaml, which could allow arbitrary code execution. See CVE-2021-37678.
https://github.com/keras-team/keras/commit/32febb6cdebe166fc70ad72f2da37607c13bb11a | what vulnarability does keras version less then 2.6.0rc3 have | |
Having vulnarability CVE-2015-3206 Advisory: The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kerberos version greather then 0 have ### Response: Having vulnarability CVE-2015-3206 Advisory: The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack. | what vulnarability does kerberos version greather then 0 have | |
Having vulnarability PVE-2022-52593 Advisory: Kerko 0.6 fixes several XSS vulnerabilities.
https://github.com/whiskyechobravo/kerko/commit/0b53ffd6940648e5cb5fe16bc305aac9c19c71fd | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kerko version less then 0.6 have ### Response: Having vulnarability PVE-2022-52593 Advisory: Kerko 0.6 fixes several XSS vulnerabilities.
https://github.com/whiskyechobravo/kerko/commit/0b53ffd6940648e5cb5fe16bc305aac9c19c71fd | what vulnarability does kerko version less then 0.6 have | |
Having vulnarability CVE-2017-15111 Advisory: keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keycloak-httpd-client-install version less then 0.8 have ### Response: Having vulnarability CVE-2017-15111 Advisory: keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link. | what vulnarability does keycloak-httpd-client-install version less then 0.8 have | |
Having vulnarability CVE-2021-43310 Advisory: A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keylime version less then 6.3.0 have ### Response: Having vulnarability CVE-2021-43310 Advisory: A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution. | what vulnarability does keylime version less then 6.3.0 have | |
Having vulnarability CVE-2012-5577 Advisory: Python keyring lib before 0.10 created keyring files with world-readable permissions. See: CVE-2012-5577. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keyring version less then 0.10 have ### Response: Having vulnarability CVE-2012-5577 Advisory: Python keyring lib before 0.10 created keyring files with world-readable permissions. See: CVE-2012-5577. | what vulnarability does keyring version less then 0.10 have | |
Having vulnarability CVE-2018-14432 Advisory: In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keystone version less then 11.04,greather then equal to 12.0.0,less then 12.0.0,greather then equal to 13.0.0less then 13.0.0 have ### Response: Having vulnarability CVE-2018-14432 Advisory: In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected. | what vulnarability does keystone version less then 11.04,greather then equal to 12.0.0,less then 12.0.0,greather then equal to 13.0.0less then 13.0.0 have | |
Having vulnarability CVE-2019-3683 Advisory: Keystone-json-assignment 0.0.4 includes a fix for CVE-2019-3683: The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.
https://github.com/SUSE-Cloud/keystone-json-assignment/commit/d7888c75505465490250c00cc0ef4bb1af662f9f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keystone-json-assignment version less then 0.0.4 have ### Response: Having vulnarability CVE-2019-3683 Advisory: Keystone-json-assignment 0.0.4 includes a fix for CVE-2019-3683: The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.
https://github.com/SUSE-Cloud/keystone-json-assignment/commit/d7888c75505465490250c00cc0ef4bb1af662f9f | what vulnarability does keystone-json-assignment version less then 0.0.4 have | |
Having vulnarability CVE-2014-7144 Advisory: Keystonemiddleware versions 0.11.0 and 1.2.0 include a fix for CVE-2014-7144: OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
http://www.openwall.com/lists/oss-security/2014/09/25/51
https://bugs.launchpad.net/python-keystoneclient/+bug/1353315
http://rhn.redhat.com/errata/RHSA-2014-1783.html
http://rhn.redhat.com/errata/RHSA-2014-1784.html
http://rhn.redhat.com/errata/RHSA-2015-0020.html
http://www.ubuntu.com/usn/USN-2705-1
http://www.securityfocus.com/bid/69864
http://secunia.com/advisories/62709 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does keystonemiddleware version less then 0.11.0,greather then equal to 1.0.0,less then 1.2.0 have ### Response: Having vulnarability CVE-2014-7144 Advisory: Keystonemiddleware versions 0.11.0 and 1.2.0 include a fix for CVE-2014-7144: OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
http://www.openwall.com/lists/oss-security/2014/09/25/51
https://bugs.launchpad.net/python-keystoneclient/+bug/1353315
http://rhn.redhat.com/errata/RHSA-2014-1783.html
http://rhn.redhat.com/errata/RHSA-2014-1784.html
http://rhn.redhat.com/errata/RHSA-2015-0020.html
http://www.ubuntu.com/usn/USN-2705-1
http://www.securityfocus.com/bid/69864
http://secunia.com/advisories/62709 | what vulnarability does keystonemiddleware version less then 0.11.0,greather then equal to 1.0.0,less then 1.2.0 have | |
Having vulnarability CVE-2022-1941 Advisory: Kfp-tekton 1.4.0 updates its dependency 'protobuf' to v3.20.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kfp-tekton version less then 1.4.0 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Kfp-tekton 1.4.0 updates its dependency 'protobuf' to v3.20.3 to include a security fix. | what vulnarability does kfp-tekton version less then 1.4.0 have | |
Having vulnarability CVE-2022-33002 Advisory: The KGExplore package in PyPI v0.1.1 to v0.1.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kgexplore version greather then equal to 0.1.1,less then equal to 0.1.2 have ### Response: Having vulnarability CVE-2022-33002 Advisory: The KGExplore package in PyPI v0.1.1 to v0.1.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does kgexplore version greather then equal to 0.1.1,less then equal to 0.1.2 have | |
Having vulnarability CVE-2021-32797 Advisory: Kglab 0.4.1 requires 'Jupyterlab' >= 3.1.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kglab version less then 0.4.1 have ### Response: Having vulnarability CVE-2021-32797 Advisory: Kglab 0.4.1 requires 'Jupyterlab' >= 3.1.4 to include a security fix. | what vulnarability does kglab version less then 0.4.1 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.