output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability PVE-2021-38223 Advisory: Khoros 2.2.0 includes changes to the :doc:`supporting modules <supporting-modules>`. The ``yaml.load()`` function call got replaced with ``yaml.safe_load()`` in :py:func:`khoros.utils.helper.import_yaml_file` as it is a better security practice.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does khoros version less then 2.2.0 have ### Response: Having vulnarability PVE-2021-38223 Advisory: Khoros 2.2.0 includes changes to the :doc:`supporting modules <supporting-modules>`. The ``yaml.load()`` function call got replaced with ``yaml.safe_load()`` in :py:func:`khoros.utils.helper.import_yaml_file` as it is a better security practice.
what vulnarability does khoros version less then 2.2.0 have
Having vulnarability PVE-2021-37935 Advisory: khorosjx 2.3.1 upgrades the bleach package to version 3.1.1 to mitigate an XSS security issue
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does khorosjx version less then 2.3.1 have ### Response: Having vulnarability PVE-2021-37935 Advisory: khorosjx 2.3.1 upgrades the bleach package to version 3.1.1 to mitigate an XSS security issue
what vulnarability does khorosjx version less then 2.3.1 have
Having vulnarability CVE-2022-21699 Advisory: Kiez 0.3.3 updates its dependency 'IPython' to v7.31.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiez version less then 0.3.3 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Kiez 0.3.3 updates its dependency 'IPython' to v7.31.1 to include a security fix.
what vulnarability does kiez version less then 0.3.3 have
Having vulnarability PVE-2021-41724 Advisory: Kili 2.87.0 secured its core API. From 16/09/2021 on, package maintainers prompt all users of the Python SDK on the SaaS application to upgrade kili to its last version. No more details were given.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kili version less then 2.87.0 have ### Response: Having vulnarability PVE-2021-41724 Advisory: Kili 2.87.0 secured its core API. From 16/09/2021 on, package maintainers prompt all users of the Python SDK on the SaaS application to upgrade kili to its last version. No more details were given.
what vulnarability does kili version less then 2.87.0 have
Having vulnarability PVE-2021-36841 Advisory: kinto 12.0.2 **security**: Fix a pagination bug in the PostgreSQL backend that could leak records between collections
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto version less then 12.0.2 have ### Response: Having vulnarability PVE-2021-36841 Advisory: kinto 12.0.2 **security**: Fix a pagination bug in the PostgreSQL backend that could leak records between collections
what vulnarability does kinto version less then 12.0.2 have
Having vulnarability PVE-2024-65061 Advisory: Kinto-attachment 6.4.0 addresses a high-severity vulnerability, CVE-2024-1314. This issue allowed the replacement of attachment files on read-only records if the attacker had "read" permission on a parent entity. https://github.com/Kinto/kinto-attachment/security/advisories/GHSA-hvp4-vrv2-8wrq
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto-attachment version less then 6.4.0 have ### Response: Having vulnarability PVE-2024-65061 Advisory: Kinto-attachment 6.4.0 addresses a high-severity vulnerability, CVE-2024-1314. This issue allowed the replacement of attachment files on read-only records if the attacker had "read" permission on a parent entity. https://github.com/Kinto/kinto-attachment/security/advisories/GHSA-hvp4-vrv2-8wrq
what vulnarability does kinto-attachment version less then 6.4.0 have
Having vulnarability PVE-2021-37169 Advisory: Signer parameters in kinto-dist before 15.0.2 were displayed in capabilities. This was a security concern.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto-dist version less then 15.0.2 have ### Response: Having vulnarability PVE-2021-37169 Advisory: Signer parameters in kinto-dist before 15.0.2 were displayed in capabilities. This was a security concern.
what vulnarability does kinto-dist version less then 15.0.2 have
Having vulnarability CVE-2019-12855 Advisory: Kiosk-client 0.2.1 updates Twisted to the latest version due to CVE-2019-12855. In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiosk-client version less then 0.2.1 have ### Response: Having vulnarability CVE-2019-12855 Advisory: Kiosk-client 0.2.1 updates Twisted to the latest version due to CVE-2019-12855. In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
what vulnarability does kiosk-client version less then 0.2.1 have
Having vulnarability CVE-2020-7729 Advisory: Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kivy version less then 2023.05.21 have ### Response: Having vulnarability CVE-2020-7729 Advisory: Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7
what vulnarability does kivy version less then 2023.05.21 have
Having vulnarability CVE-2023-4863 Advisory: Kivy-deps.sdl2 0.6.0 and prior versions (wheels for Windows) include a version of 'libwebp-7.dll', which is affected by a high-risk vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kivy-deps.sdl2 version less then equal to 0.6.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Kivy-deps.sdl2 0.6.0 and prior versions (wheels for Windows) include a version of 'libwebp-7.dll', which is affected by a high-risk vulnerability.
what vulnarability does kivy-deps.sdl2 version less then equal to 0.6.0 have
Having vulnarability CVE-2021-45115 Advisory: Kiwitcms 11.1 updates its dependency 'Django' to v4.0.2 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiwitcms version less then 11.1 have ### Response: Having vulnarability CVE-2021-45115 Advisory: Kiwitcms 11.1 updates its dependency 'Django' to v4.0.2 to include security fixes.
what vulnarability does kiwitcms version less then 11.1 have
Having vulnarability PVE-2022-45025 Advisory: Klayout 0.27.6 restricts evaluation of expressions in string to numeric conversion. This will fix a potential vulnerability which allows someone to sneak in expression code through malicious configuration, technology or layer properties files.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does klayout version less then 0.27.6 have ### Response: Having vulnarability PVE-2022-45025 Advisory: Klayout 0.27.6 restricts evaluation of expressions in string to numeric conversion. This will fix a potential vulnerability which allows someone to sneak in expression code through malicious configuration, technology or layer properties files.
what vulnarability does klayout version less then 0.27.6 have
Having vulnarability CVE-2017-18342 Advisory: Klocmod 0.2.1 updates its dependency 'pyyaml' to v5.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does klocmod version less then 0.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Klocmod 0.2.1 updates its dependency 'pyyaml' to v5.1 to include a security fix.
what vulnarability does klocmod version less then 0.2.1 have
Having vulnarability PVE-2021-36510 Advisory: Knowledge-repo 0.8.0 removed two security vulnerabilities associated with arbitrary code execution from code stored in knowledge repositories on both clients and servers via knowledge repository configuration and embedded tooling. https://github.com/airbnb/knowledge-repo/pull/382
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does knowledge-repo version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-36510 Advisory: Knowledge-repo 0.8.0 removed two security vulnerabilities associated with arbitrary code execution from code stored in knowledge repositories on both clients and servers via knowledge repository configuration and embedded tooling. https://github.com/airbnb/knowledge-repo/pull/382
what vulnarability does knowledge-repo version less then 0.8.0 have
Having vulnarability CVE-2017-1002153 Advisory: Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does koji version equal to 1.13.0 have ### Response: Having vulnarability CVE-2017-1002153 Advisory: Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission.
what vulnarability does koji version equal to 1.13.0 have
Having vulnarability CVE-2023-4863 Advisory: Kolena 0.94.1 updates its dependency 'pillow' to version '^10.0.1' to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolena version less then 0.94.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Kolena 0.94.1 updates its dependency 'pillow' to version '^10.0.1' to include security fixes.
what vulnarability does kolena version less then 0.94.1 have
Having vulnarability PVE-2022-49589 Advisory: Kolibri 0.15.4 sanitizes exported CSVs to avoid CSV injection. https://github.com/learningequality/kolibri/pull/9523/commits/95609c11f4497a64f24a3949779969e0badcd55c
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolibri version less then 0.15.4 have ### Response: Having vulnarability PVE-2022-49589 Advisory: Kolibri 0.15.4 sanitizes exported CSVs to avoid CSV injection. https://github.com/learningequality/kolibri/pull/9523/commits/95609c11f4497a64f24a3949779969e0badcd55c
what vulnarability does kolibri version less then 0.15.4 have
Having vulnarability CVE-2022-0639 Advisory: Kolibri-explore-plugin 2.0.12 updates its NPM dependency 'url-parse' to v1.5.7 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolibri-explore-plugin version less then 2.0.12 have ### Response: Having vulnarability CVE-2022-0639 Advisory: Kolibri-explore-plugin 2.0.12 updates its NPM dependency 'url-parse' to v1.5.7 to include security fixes.
what vulnarability does kolibri-explore-plugin version less then 2.0.12 have
Having vulnarability CVE-2022-38060 Advisory: Kolla 12.6.0, 13.5.0 and 14.5.0 include a fix for CVE-2022-38060: A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolla version less then 12.6.0,greather then equal to 13.0.0.0rc1,less then 13.5.0,greather then equal to 14.0.0.0rc1,less then 14.5.0 have ### Response: Having vulnarability CVE-2022-38060 Advisory: Kolla 12.6.0, 13.5.0 and 14.5.0 include a fix for CVE-2022-38060: A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589
what vulnarability does kolla version less then 12.6.0,greather then equal to 13.0.0.0rc1,less then 13.5.0,greather then equal to 14.0.0.0rc1,less then 14.5.0 have
Having vulnarability CVE-2023-2088 Advisory: Kolla-ansible 16.0.0.0rc1 includes a fix for CVE-2023-2088: A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality. https://opendev.org/openstack/kolla-ansible/commit/a77ea13ef1991543df29b7eea14b1f91ef26f858
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolla-ansible version less then equal to 15.1.0 have ### Response: Having vulnarability CVE-2023-2088 Advisory: Kolla-ansible 16.0.0.0rc1 includes a fix for CVE-2023-2088: A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality. https://opendev.org/openstack/kolla-ansible/commit/a77ea13ef1991543df29b7eea14b1f91ef26f858
what vulnarability does kolla-ansible version less then equal to 15.1.0 have
Having vulnarability PVE-2023-60847 Advisory: Kombu 3.0.13 includes a fix for a Race Condition vulnerability. https://github.com/celery/kombu/commit/b24697ee29b063ade45b1850bb8c27658ee31dff
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kombu version less then 3.0.13 have ### Response: Having vulnarability PVE-2023-60847 Advisory: Kombu 3.0.13 includes a fix for a Race Condition vulnerability. https://github.com/celery/kombu/commit/b24697ee29b063ade45b1850bb8c27658ee31dff
what vulnarability does kombu version less then 3.0.13 have
Having vulnarability CVE-2018-9856 Advisory: Kotti 1.3.2 and 2.0.0b2 include a fix for CVE-2018-9856: Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request. https://github.com/advisories/GHSA-3hq4-f2v6-q338
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kotti version less then 1.3.2,greather then equal to 2.0.0a1,less then 2.0.0b2 have ### Response: Having vulnarability CVE-2018-9856 Advisory: Kotti 1.3.2 and 2.0.0b2 include a fix for CVE-2018-9856: Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request. https://github.com/advisories/GHSA-3hq4-f2v6-q338
what vulnarability does kotti version less then 1.3.2,greather then equal to 2.0.0a1,less then 2.0.0b2 have
Having vulnarability PVE-2017-47613 Advisory: Kploy 0.7.0 adds support for passing secrets securely via environmental variables.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kploy version less then 0.7.0 have ### Response: Having vulnarability PVE-2017-47613 Advisory: Kploy 0.7.0 adds support for passing secrets securely via environmental variables.
what vulnarability does kploy version less then 0.7.0 have
Having vulnarability PVE-2023-54815 Advisory: Krptn 0.5.5 mitigates the risk of severe memory corruption by adding simple type-checking. https://github.com/krptn/krypton/commit/aa950a900c3e9d3336bf78dd6b4887e03b041175
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does krptn version less then 0.5.5 have ### Response: Having vulnarability PVE-2023-54815 Advisory: Krptn 0.5.5 mitigates the risk of severe memory corruption by adding simple type-checking. https://github.com/krptn/krypton/commit/aa950a900c3e9d3336bf78dd6b4887e03b041175
what vulnarability does krptn version less then 0.5.5 have
Having vulnarability CVE-2021-44228 Advisory: Kserve 0.10.0 updates its dependency 'ray' to v1.10.0 to include a fix for a critical vulnerability. https://github.com/kserve/kserve/issues/2190
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kserve version less then 0.10.0 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Kserve 0.10.0 updates its dependency 'ray' to v1.10.0 to include a fix for a critical vulnerability. https://github.com/kserve/kserve/issues/2190
what vulnarability does kserve version less then 0.10.0 have
Having vulnarability CVE-2023-36189 Advisory: Kube-copilot 0.1.21 updates its dependency 'langchain' to v0.0.278 to include a security fix. https://github.com/feiskyer/kube-copilot/pull/43
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kube-copilot version less then 0.1.21 have ### Response: Having vulnarability CVE-2023-36189 Advisory: Kube-copilot 0.1.21 updates its dependency 'langchain' to v0.0.278 to include a security fix. https://github.com/feiskyer/kube-copilot/pull/43
what vulnarability does kube-copilot version less then 0.1.21 have
Having vulnarability CVE-2019-11324 Advisory: Kubernetes 10.0.1 updates its dependency 'urllib3' to include a security fix. https://github.com/kubernetes-client/python/pull/897
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubernetes version less then 10.0.1 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Kubernetes 10.0.1 updates its dependency 'urllib3' to include a security fix. https://github.com/kubernetes-client/python/pull/897
what vulnarability does kubernetes version less then 10.0.1 have
Having vulnarability CVE-2021-3121 Advisory: Kubernetes-asyncio 19.15.0 updates gogo/protobuf to v1.3.2 to include a security fix. https://github.com/kubernetes/kubernetes/pull/100515
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubernetes-asyncio version less then 19.15.0 have ### Response: Having vulnarability CVE-2021-3121 Advisory: Kubernetes-asyncio 19.15.0 updates gogo/protobuf to v1.3.2 to include a security fix. https://github.com/kubernetes/kubernetes/pull/100515
what vulnarability does kubernetes-asyncio version less then 19.15.0 have
Having vulnarability CVE-2017-18342 Advisory: Kubetest 0.1.0 updates the pyyaml version for security reasons. See: CVE-2017-18342.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubetest version less then 0.1.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Kubetest 0.1.0 updates the pyyaml version for security reasons. See: CVE-2017-18342.
what vulnarability does kubetest version less then 0.1.0 have
Having vulnarability PVE-2023-58920 Advisory: Kuzu 0.0.3 includes a fix for a format string vulnerability. https://github.com/kuzudb/kuzu/pull/1335/commits/b6267047c6d9c3d316330c745946368b27c3e823
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kuzu version less then 0.0.3 have ### Response: Having vulnarability PVE-2023-58920 Advisory: Kuzu 0.0.3 includes a fix for a format string vulnerability. https://github.com/kuzudb/kuzu/pull/1335/commits/b6267047c6d9c3d316330c745946368b27c3e823
what vulnarability does kuzu version less then 0.0.3 have
Having vulnarability CVE-2017-18342 Advisory: Kvm48 1.3.600 includes a security patch for the function 'load' in 'kvm48/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/SNH48Live/KVM48/commit/1cd560899b8bbb10de64ce5a4f6e88fd61f4199d#diff-ebd9623cdd31ae084d3bdeb718bdcf42de239f8b24a1170581c4c6f89dedeaae
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kvm48 version less then 1.3.600 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Kvm48 1.3.600 includes a security patch for the function 'load' in 'kvm48/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/SNH48Live/KVM48/commit/1cd560899b8bbb10de64ce5a4f6e88fd61f4199d#diff-ebd9623cdd31ae084d3bdeb718bdcf42de239f8b24a1170581c4c6f89dedeaae
what vulnarability does kvm48 version less then 1.3.600 have
Having vulnarability CVE-2018-18074 Advisory: Kytos 2019.1b1 updates its dependency 'requests' to v2.21.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kytos version less then 2019.1b1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kytos 2019.1b1 updates its dependency 'requests' to v2.21.0 to include a security fix.
what vulnarability does kytos version less then 2019.1b1 have
Having vulnarability CVE-2018-18074 Advisory: Kytos-utils 2019.1b3 updates its dependency 'requests' to '>=2.20.0' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kytos-utils version less then 2019.1b3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kytos-utils 2019.1b3 updates its dependency 'requests' to '>=2.20.0' to include a security fix.
what vulnarability does kytos-utils version less then 2019.1b3 have
Having vulnarability CVE-2022-31015 Advisory: Label-sleuth 0.11.6 updates its dependency 'waitress' to v2.1.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-sleuth version less then 0.11.6 have ### Response: Having vulnarability CVE-2022-31015 Advisory: Label-sleuth 0.11.6 updates its dependency 'waitress' to v2.1.2 to include a security fix.
what vulnarability does label-sleuth version less then 0.11.6 have
Having vulnarability CVE-2021-34552 Advisory: Label-studio version 0.0.45 has updated its Pillow library dependency to version 8.3.1, moving from a previous specification of versions greater than or equal to 8 and less than or equal to 8.3. This change addresses the security issue identified as CVE-2021-34552. https://github.com/HumanSignal/label-studio-converter/pull/44/commits/51edb4ddda8035a6215ccd92746488df720ef25b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-studio version less then 0.0.45 have ### Response: Having vulnarability CVE-2021-34552 Advisory: Label-studio version 0.0.45 has updated its Pillow library dependency to version 8.3.1, moving from a previous specification of versions greater than or equal to 8 and less than or equal to 8.3. This change addresses the security issue identified as CVE-2021-34552. https://github.com/HumanSignal/label-studio-converter/pull/44/commits/51edb4ddda8035a6215ccd92746488df720ef25b
what vulnarability does label-studio version less then 0.0.45 have
Having vulnarability CVE-2021-28676 Advisory: Label-studio-converter 0.0.43 updates its dependency 'pillow' to v8.3.1 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-studio-converter version less then 0.0.43 have ### Response: Having vulnarability CVE-2021-28676 Advisory: Label-studio-converter 0.0.43 updates its dependency 'pillow' to v8.3.1 to include security fixes.
what vulnarability does label-studio-converter version less then 0.0.43 have
Having vulnarability PVE-2024-64091 Advisory: Labgrid 23.0.2 fixes a race condition that previously occurred in the handling of USBSDMuxDevice/USBSDWireDevice paths. This issue arose particularly during USB resets or fast replugging events. It potentially led to the incorrect assignment of control and disk paths for the USBSDMuxDevice and USBSDWireDevice, impacting their accurate and reliable operation. https://github.com/labgrid-project/labgrid/compare/v23.0.1...v23.0.2#diff-bc256bde0e401738303653d85da6e6a1a1a937880d1eb6f9c423a9970eb349d2
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does labgrid version less then 23.0.2 have ### Response: Having vulnarability PVE-2024-64091 Advisory: Labgrid 23.0.2 fixes a race condition that previously occurred in the handling of USBSDMuxDevice/USBSDWireDevice paths. This issue arose particularly during USB resets or fast replugging events. It potentially led to the incorrect assignment of control and disk paths for the USBSDMuxDevice and USBSDWireDevice, impacting their accurate and reliable operation. https://github.com/labgrid-project/labgrid/compare/v23.0.1...v23.0.2#diff-bc256bde0e401738303653d85da6e6a1a1a937880d1eb6f9c423a9970eb349d2
what vulnarability does labgrid version less then 23.0.2 have
Having vulnarability CVE-2022-40896 Advisory: Ladok3 4.2 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability. https://github.com/dbosk/ladok3/commit/685f2fca6d38960a650060b1bdd13ca88f30b13f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladok3 version less then 4.2 have ### Response: Having vulnarability CVE-2022-40896 Advisory: Ladok3 4.2 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability. https://github.com/dbosk/ladok3/commit/685f2fca6d38960a650060b1bdd13ca88f30b13f
what vulnarability does ladok3 version less then 4.2 have
Having vulnarability CVE-2019-1010268 Advisory: Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladon version greather then equal to 0.6.1,less then equal to 0.9.40 have ### Response: Having vulnarability CVE-2019-1010268 Advisory: Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.
what vulnarability does ladon version greather then equal to 0.6.1,less then equal to 0.9.40 have
Having vulnarability CVE-2022-40897 Advisory: Ladybug-comfort 0.16.18 updates its dependency 'setuptools' to v65.5.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladybug-comfort version less then 0.16.18 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Ladybug-comfort 0.16.18 updates its dependency 'setuptools' to v65.5.1 to include a security fix.
what vulnarability does ladybug-comfort version less then 0.16.18 have
Having vulnarability CVE-2019-6446 Advisory: Lagmat 0.3.3 updates its dependency 'numpy' to v1.19.5 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lagmat version less then 0.3.3 have ### Response: Having vulnarability CVE-2019-6446 Advisory: Lagmat 0.3.3 updates its dependency 'numpy' to v1.19.5 to include a security fix.
what vulnarability does lagmat version less then 0.3.3 have
Having vulnarability PVE-2023-62784 Advisory: Lakefs 1.3.1 fixes a bug that allows an user with permission to write actions can impersonate another user when auth token is configured in environment variable. https://github.com/treeverse/lakeFS/security/advisories/GHSA-26hr-q2wp-rvc5
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lakefs version less then 1.3.1 have ### Response: Having vulnarability PVE-2023-62784 Advisory: Lakefs 1.3.1 fixes a bug that allows an user with permission to write actions can impersonate another user when auth token is configured in environment variable. https://github.com/treeverse/lakeFS/security/advisories/GHSA-26hr-q2wp-rvc5
what vulnarability does lakefs version less then 1.3.1 have
Having vulnarability PVE-2021-35209 Advisory: lambda-tools before 0.1.2 used an unsafe way to load untrusted lambda definitions via `yaml.load`.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lambda-tools version less then 0.1.2 have ### Response: Having vulnarability PVE-2021-35209 Advisory: lambda-tools before 0.1.2 used an unsafe way to load untrusted lambda definitions via `yaml.load`.
what vulnarability does lambda-tools version less then 0.1.2 have
Having vulnarability PVE-2021-25874 Advisory: lambdajson 0.1.5 includes a security fix. Using ast.literal_eval as eval.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lambdajson version less then 0.1.5 have ### Response: Having vulnarability PVE-2021-25874 Advisory: lambdajson 0.1.5 includes a security fix. Using ast.literal_eval as eval.
what vulnarability does lambdajson version less then 0.1.5 have
Having vulnarability CVE-2018-18074 Advisory: Lander 0.1.15 updates 'requests' to 2.20.0 for security reasons.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lander version less then 0.1.15 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Lander 0.1.15 updates 'requests' to 2.20.0 for security reasons.
what vulnarability does lander version less then 0.1.15 have
Having vulnarability PVE-2021-37414 Advisory: Lando 0.11.3 adds `cluster_api_settings .ssl_ca_cert` config flag to allow secure k8s connections. See <https://github.com/Duke-GCB/lando/pull/209>.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lando version less then 0.11.3 have ### Response: Having vulnarability PVE-2021-37414 Advisory: Lando 0.11.3 adds `cluster_api_settings .ssl_ca_cert` config flag to allow secure k8s connections. See <https://github.com/Duke-GCB/lando/pull/209>.
what vulnarability does lando version less then 0.11.3 have
Having vulnarability CVE-2023-29374 Advisory: LangChain 0.0.142 includes a fix for CVE-2023-29374: The LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method. https://github.com/hwchase17/langchain/pull/1119 https://github.com/langchain-ai/langchain/commit/5ca7ce77cd536991d04f476e420446a3b21d2a7b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langchain version less then 0.0.142 have ### Response: Having vulnarability CVE-2023-29374 Advisory: LangChain 0.0.142 includes a fix for CVE-2023-29374: The LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method. https://github.com/hwchase17/langchain/pull/1119 https://github.com/langchain-ai/langchain/commit/5ca7ce77cd536991d04f476e420446a3b21d2a7b
what vulnarability does langchain version less then 0.0.142 have
Having vulnarability CVE-2023-45920 Advisory: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langchain-experimental version less then 0.0.52 have ### Response: Having vulnarability CVE-2023-45920 Advisory: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py.
what vulnarability does langchain-experimental version less then 0.0.52 have
Having vulnarability PVE-2024-65269 Advisory: Langfuse version 2.1.0 updates its nodemailer dependency to 6.9.9 from 6.9.8, prompted by security considerations. https://github.com/langfuse/langfuse/pull/1027
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langfuse version less then 2.1.0 have ### Response: Having vulnarability PVE-2024-65269 Advisory: Langfuse version 2.1.0 updates its nodemailer dependency to 6.9.9 from 6.9.8, prompted by security considerations. https://github.com/langfuse/langfuse/pull/1027
what vulnarability does langfuse version less then 2.1.0 have
Having vulnarability PVE-2021-38926 Advisory: Language-formatters-pre-commit-hooks 1.6.0 enhances its security in commands execution to prevent shell-injection. https://github.com/macisamuele/language-formatters-pre-commit-hooks/pull/38/files
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does language-formatters-pre-commit-hooks version less then 1.6.0 have ### Response: Having vulnarability PVE-2021-38926 Advisory: Language-formatters-pre-commit-hooks 1.6.0 enhances its security in commands execution to prevent shell-injection. https://github.com/macisamuele/language-formatters-pre-commit-hooks/pull/38/files
what vulnarability does language-formatters-pre-commit-hooks version less then 1.6.0 have
Having vulnarability PVE-2021-37597 Advisory: Lapdog 0.18.7 improves API security by switching to custom Lapdog OAuth tokens. Currently this is only supported by Broad accounts. Non-broad accounts will continue to use standard Google application-default credentials when authenticating through the Lapdog API.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lapdog version less then 0.18.7 have ### Response: Having vulnarability PVE-2021-37597 Advisory: Lapdog 0.18.7 improves API security by switching to custom Lapdog OAuth tokens. Currently this is only supported by Broad accounts. Non-broad accounts will continue to use standard Google application-default credentials when authenticating through the Lapdog API.
what vulnarability does lapdog version less then 0.18.7 have
Having vulnarability CVE-2017-18342 Advisory: Laporte-Mqtt 0.2.2 includes a security patch for the function 'load_config' in 'laporte_mqtt/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/vinklat/laporte-mqtt/commit/db24ded1c1ed0232c42bb826b9c1dc30fb925f2e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does laporte-mqtt version less then 0.2.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Laporte-Mqtt 0.2.2 includes a security patch for the function 'load_config' in 'laporte_mqtt/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/vinklat/laporte-mqtt/commit/db24ded1c1ed0232c42bb826b9c1dc30fb925f2e
what vulnarability does laporte-mqtt version less then 0.2.2 have
Having vulnarability PVE-2022-52518 Advisory: Lattice 0.1.2 replaces its dependency 'GitPython' with 'pygit2' to avoid security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lattice version less then 0.1.2 have ### Response: Having vulnarability PVE-2022-52518 Advisory: Lattice 0.1.2 replaces its dependency 'GitPython' with 'pygit2' to avoid security issues.
what vulnarability does lattice version less then 0.1.2 have
Having vulnarability PVE-2023-58696 Advisory: Launchable 1.38.10 includes a fix for a OS command injection vulnerability. https://github.com/launchableinc/cli/pull/393
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchable version less then 1.38.10 have ### Response: Having vulnarability PVE-2023-58696 Advisory: Launchable 1.38.10 includes a fix for a OS command injection vulnerability. https://github.com/launchableinc/cli/pull/393
what vulnarability does launchable version less then 1.38.10 have
Having vulnarability CVE-2017-18342 Advisory: Launchdarkly-server-sdk 6.11.2 uses 'yaml.safe_load()' instead of 'yaml.load()' for YAML/JSON test data parsing to fix an arbitrary code execution vulnerability. https://github.com/launchdarkly/python-server-sdk/issues/136
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchdarkly-server-sdk version less then 6.11.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Launchdarkly-server-sdk 6.11.2 uses 'yaml.safe_load()' instead of 'yaml.load()' for YAML/JSON test data parsing to fix an arbitrary code execution vulnerability. https://github.com/launchdarkly/python-server-sdk/issues/136
what vulnarability does launchdarkly-server-sdk version less then 6.11.2 have
Having vulnarability CVE-2020-28493 Advisory: Launchkey 3.9.1 updates its dependency 'jinja2' to v2.11.3 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchkey version less then 3.9.1 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Launchkey 3.9.1 updates its dependency 'jinja2' to v2.11.3 to include a security fix.
what vulnarability does launchkey version less then 3.9.1 have
Having vulnarability CVE-2020-35653 Advisory: layeredimage 2021.2.1 updates its dependency 'pillow' to versions >= 8.1.1 to imclude security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does layeredimage version less then 2021.2.1 have ### Response: Having vulnarability CVE-2020-35653 Advisory: layeredimage 2021.2.1 updates its dependency 'pillow' to versions >= 8.1.1 to imclude security fixes.
what vulnarability does layeredimage version less then 2021.2.1 have
Having vulnarability CVE-2021-22570 Advisory: Lazuli 2.2.2 pins its dependency 'protobuf' to v3.20.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lazuli version less then 2.2.2 have ### Response: Having vulnarability CVE-2021-22570 Advisory: Lazuli 2.2.2 pins its dependency 'protobuf' to v3.20.1 to include a security fix.
what vulnarability does lazuli version less then 2.2.2 have
Having vulnarability CVE-2022-40898 Advisory: Lbt-dragonfly 0.9.404 updates its dependency 'wheel' to v0.38.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lbt-dragonfly version less then 0.9.404 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Lbt-dragonfly 0.9.404 updates its dependency 'wheel' to v0.38.1 to include a security fix.
what vulnarability does lbt-dragonfly version less then 0.9.404 have
Having vulnarability CVE-2022-40897 Advisory: Lbt-honeybee 0.7.125 updates its dependency 'setuptools' to v65.5.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lbt-honeybee version less then 0.7.125 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Lbt-honeybee 0.7.125 updates its dependency 'setuptools' to v65.5.1 to include a security fix.
what vulnarability does lbt-honeybee version less then 0.7.125 have
Having vulnarability CVE-2021-41945 Advisory: Lc-sdk-python 0.3.1 updates 'httpx' dependency to v0.23.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lc-sdk-python version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Lc-sdk-python 0.3.1 updates 'httpx' dependency to v0.23.0 to include a security fix.
what vulnarability does lc-sdk-python version less then 0.3.1 have
Having vulnarability PVE-2021-25875 Advisory: ldap3 before 0.9.5.4 has several security issues in lazy connections.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldap3 version less then 0.9.5.4 have ### Response: Having vulnarability PVE-2021-25875 Advisory: ldap3 before 0.9.5.4 has several security issues in lazy connections.
what vulnarability does ldap3 version less then 0.9.5.4 have
Having vulnarability PVE-2022-52390 Advisory: Ldap3-ad-leavers 1.2.0 includes a fix for a code injection vulnerability. https://github.com/mervinhemaraju/ldap3-ad-leavers/commit/0e8351c3b6df679423e3cd8fa847487a55f85687
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldap3-ad-leavers version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-52390 Advisory: Ldap3-ad-leavers 1.2.0 includes a fix for a code injection vulnerability. https://github.com/mervinhemaraju/ldap3-ad-leavers/commit/0e8351c3b6df679423e3cd8fa847487a55f85687
what vulnarability does ldap3-ad-leavers version less then 1.2.0 have
Having vulnarability CVE-2019-25095 Advisory: A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldapcherry version greather then equal to 0,less then 1.0.0 have ### Response: Having vulnarability CVE-2019-25095 Advisory: A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability.
what vulnarability does ldapcherry version greather then equal to 0,less then 1.0.0 have
Having vulnarability PVE-2017-47230 Advisory: Leap.bitmask 0.9.0 stops including 3rd party libs logs. These logs could include, for example, exported PGP private keys. https://github.com/leapcode/bitmask-dev/commit/fc65820f9e9a9a39434bbef3f5e9251436d9b458
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does leap-bitmask version less then 0.9 have ### Response: Having vulnarability PVE-2017-47230 Advisory: Leap.bitmask 0.9.0 stops including 3rd party libs logs. These logs could include, for example, exported PGP private keys. https://github.com/leapcode/bitmask-dev/commit/fc65820f9e9a9a39434bbef3f5e9251436d9b458
what vulnarability does leap-bitmask version less then 0.9 have
Having vulnarability PVE-2022-45477 Advisory: Learninglib is a malicious package, typosquatting. It installs cryptomining malware in your system. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does learninglib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45477 Advisory: Learninglib is a malicious package, typosquatting. It installs cryptomining malware in your system. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/
what vulnarability does learninglib version greather then 0,less then 0 have
Having vulnarability PVE-2024-67135 Advisory: Ledfx 2.0.70 addresses and resolves a critical issue that could cause crashes due to a race condition and the presence of empty virtual data. The race condition could potentially be exploited to cause a denial of service (DoS).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ledfx version less then 2.0.70 have ### Response: Having vulnarability PVE-2024-67135 Advisory: Ledfx 2.0.70 addresses and resolves a critical issue that could cause crashes due to a race condition and the presence of empty virtual data. The race condition could potentially be exploited to cause a denial of service (DoS).
what vulnarability does ledfx version less then 2.0.70 have
Having vulnarability PVE-2022-51649 Advisory: Lekt 14.0.13 updates Open EDX image version to 14.2.1, which includes a security fix for a XSS vulnerability in edx-platform. https://github.com/lektorium-tutor/lekt/commit/b46a7b0fa806604eddaed8646a2a8712a8508c79
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lekt version less then 14.0.13 have ### Response: Having vulnarability PVE-2022-51649 Advisory: Lekt 14.0.13 updates Open EDX image version to 14.2.1, which includes a security fix for a XSS vulnerability in edx-platform. https://github.com/lektorium-tutor/lekt/commit/b46a7b0fa806604eddaed8646a2a8712a8508c79
what vulnarability does lekt version less then 14.0.13 have
Having vulnarability CVE-2015-7764 Advisory: Lemur 0.1.5 includes a fix for CVE-2015-7764: Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode. http://www.openwall.com/lists/oss-security/2015/10/20/3 https://github.com/Netflix/lemur/issues/117 https://github.com/kvesteri/sqlalchemy-utils/issues/166
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lemur version less then 0.1.5 have ### Response: Having vulnarability CVE-2015-7764 Advisory: Lemur 0.1.5 includes a fix for CVE-2015-7764: Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode. http://www.openwall.com/lists/oss-security/2015/10/20/3 https://github.com/Netflix/lemur/issues/117 https://github.com/kvesteri/sqlalchemy-utils/issues/166
what vulnarability does lemur version less then 0.1.5 have
Having vulnarability CVE-2020-23478 Advisory: Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does leo version greather then equal to 0,less then 6.3 have ### Response: Having vulnarability CVE-2020-23478 Advisory: Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.
what vulnarability does leo version greather then equal to 0,less then 6.3 have
Having vulnarability PVE-2022-44654 Advisory: Levenshtein 0.12.1 fixes handling of numerous possible wraparounds in calculating the size of memory allocations; incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library. https://github.com/ztane/python-Levenshtein/issues/62
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does levenshtein version less then 0.12.1 have ### Response: Having vulnarability PVE-2022-44654 Advisory: Levenshtein 0.12.1 fixes handling of numerous possible wraparounds in calculating the size of memory allocations; incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library. https://github.com/ztane/python-Levenshtein/issues/62
what vulnarability does levenshtein version less then 0.12.1 have
Having vulnarability PVE-2021-34612 Advisory: Lfm 2.0 uses tempfile secure versions mkdtemp() and mkstemp().
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lfm version less then 2.0 have ### Response: Having vulnarability PVE-2021-34612 Advisory: Lfm 2.0 uses tempfile secure versions mkdtemp() and mkstemp().
what vulnarability does lfm version less then 2.0 have
Having vulnarability CVE-2021-28676 Advisory: Lg-rez version 2.1.4 updates its dependency 'pillow' to v8.2.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lg-rez version less then 2.1.4 have ### Response: Having vulnarability CVE-2021-28676 Advisory: Lg-rez version 2.1.4 updates its dependency 'pillow' to v8.2.0 to include security fixes.
what vulnarability does lg-rez version less then 2.1.4 have
Having vulnarability PVE-2023-59300 Advisory: Libarchive-c 4.0 includes a fix for an unsafe defaults vulnerability that could have lead to path traversal. https://github.com/Changaco/python-libarchive-c/commit/98c14d296a7f3ab04dd0a4c8c9c2920f88537fa7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libarchive-c version less then 4.0 have ### Response: Having vulnarability PVE-2023-59300 Advisory: Libarchive-c 4.0 includes a fix for an unsafe defaults vulnerability that could have lead to path traversal. https://github.com/Changaco/python-libarchive-c/commit/98c14d296a7f3ab04dd0a4c8c9c2920f88537fa7
what vulnarability does libarchive-c version less then 4.0 have
Having vulnarability PVE-2022-45410 Advisory: Libari is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems. https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libari version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45410 Advisory: Libari is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems. https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/
what vulnarability does libari version greather then 0,less then 0 have
Having vulnarability CVE-2020-27783 Advisory: Libgenesis 0.1.8 updates its dependency 'lxml' minimum version to v4.6.5 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libgenesis version less then 0.1.8 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Libgenesis 0.1.8 updates its dependency 'lxml' minimum version to v4.6.5 to include security fixes.
what vulnarability does libgenesis version less then 0.1.8 have
Having vulnarability PVE-2023-52926 Advisory: Libhttps is a malicious package. It installs info-stealing Malware. https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libhttps version greather then 0 have ### Response: Having vulnarability PVE-2023-52926 Advisory: Libhttps is a malicious package. It installs info-stealing Malware. https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware
what vulnarability does libhttps version greather then 0 have
Having vulnarability PVE-2021-39450 Advisory: For web-security reasons, libhxl 4.21.3 blocks the fetching of datasets from localhost, *.localdomain (or any dotted quad) unless allow_local is True.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libhxl version less then 4.21.3 have ### Response: Having vulnarability PVE-2021-39450 Advisory: For web-security reasons, libhxl 4.21.3 blocks the fetching of datasets from localhost, *.localdomain (or any dotted quad) unless allow_local is True.
what vulnarability does libhxl version less then 4.21.3 have
Having vulnarability PVE-2023-62431 Advisory: Libosdp 1.3.0 includes a fix for a CWE-1392: Use of Default Credentials. https://github.com/goToMain/libosdp/commit/cb918c29ca672375cc4bdcef84e2c8d21a8df3e8
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libosdp version less then 1.3.0 have ### Response: Having vulnarability PVE-2023-62431 Advisory: Libosdp 1.3.0 includes a fix for a CWE-1392: Use of Default Credentials. https://github.com/goToMain/libosdp/commit/cb918c29ca672375cc4bdcef84e2c8d21a8df3e8
what vulnarability does libosdp version less then 1.3.0 have
Having vulnarability PVE-2022-45409 Advisory: Libpesh is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems. https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpesh version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45409 Advisory: Libpesh is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems. https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/
what vulnarability does libpesh version greather then 0,less then 0 have
Having vulnarability PVE-2022-45415 Advisory: Libpeshka is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpeshka version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45415 Advisory: Libpeshka is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
what vulnarability does libpeshka version greather then 0,less then 0 have
Having vulnarability PVE-2022-45408 Advisory: Libpeshnx is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems. https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpeshnx version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45408 Advisory: Libpeshnx is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems. https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/
what vulnarability does libpeshnx version greather then 0,less then 0 have
Having vulnarability CVE-2023-2650 Advisory: Libre-fastapi-jwt 0.20.3 updates its dependency 'cryptography' to version '41.0.1' to include a security fix. https://github.com/LibreNZ/libre-fastapi-jwt/commit/fa128ea36cf021e104f564d3c7bc3874f83461fe
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libre-fastapi-jwt version less then 0.20.3 have ### Response: Having vulnarability CVE-2023-2650 Advisory: Libre-fastapi-jwt 0.20.3 updates its dependency 'cryptography' to version '41.0.1' to include a security fix. https://github.com/LibreNZ/libre-fastapi-jwt/commit/fa128ea36cf021e104f564d3c7bc3874f83461fe
what vulnarability does libre-fastapi-jwt version less then 0.20.3 have
Having vulnarability CVE-2023-25577 Advisory: Libretranslate 1.5.4 updates its Werkzeug dependency from 2.2.2 to 2.3.8. This upgrade addresses the vulnerability identified as CVE-2023-25577. https://github.com/LibreTranslate/LibreTranslate/pull/570/commits/51341d92ade55e47d94ac2f6dd095fcc226e62d0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libretranslate version less then 1.5.4 have ### Response: Having vulnarability CVE-2023-25577 Advisory: Libretranslate 1.5.4 updates its Werkzeug dependency from 2.2.2 to 2.3.8. This upgrade addresses the vulnerability identified as CVE-2023-25577. https://github.com/LibreTranslate/LibreTranslate/pull/570/commits/51341d92ade55e47d94ac2f6dd095fcc226e62d0
what vulnarability does libretranslate version less then 1.5.4 have
Having vulnarability PVE-2021-25877 Advisory: libtaxii before 1.1.105 has multiple XML parsing related vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtaxii version less then 1.1.105 have ### Response: Having vulnarability PVE-2021-25877 Advisory: libtaxii before 1.1.105 has multiple XML parsing related vulnerabilities.
what vulnarability does libtaxii version less then 1.1.105 have
Having vulnarability CVE-2020-8927 Advisory: Libtmux 0.11.0 updates its dependency 'brotly' to versions >=1.0.9 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtmux version less then 0.11.0 have ### Response: Having vulnarability CVE-2020-8927 Advisory: Libtmux 0.11.0 updates its dependency 'brotly' to versions >=1.0.9 to include a security fix.
what vulnarability does libtmux version less then 0.11.0 have
Having vulnarability PVE-2021-43049 Advisory: Libtorrent 2.0.3 (the underlying core dependency of the Python bindings) fixes an integer overflow in hash_picker and properly restricts max file sizes in torrents. https://github.com/arvidn/libtorrent/commit/58a489332ca05303e8001c24478f27338309c858
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtorrent version less then 2.0.3 have ### Response: Having vulnarability PVE-2021-43049 Advisory: Libtorrent 2.0.3 (the underlying core dependency of the Python bindings) fixes an integer overflow in hash_picker and properly restricts max file sizes in torrents. https://github.com/arvidn/libtorrent/commit/58a489332ca05303e8001c24478f27338309c858
what vulnarability does libtorrent version less then 2.0.3 have
Having vulnarability CVE-2022-21187 Advisory: Libvcs before 0.11.1 is vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libvcs version less then 0.11.1 have ### Response: Having vulnarability CVE-2022-21187 Advisory: Libvcs before 0.11.1 is vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
what vulnarability does libvcs version less then 0.11.1 have
Having vulnarability CVE-2021-28902 Advisory: In function read_yin_container() in libyang <= v1.0.225 or possibly <= 1.0.240 doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libyang version less then 1.0.240 have ### Response: Having vulnarability CVE-2021-28902 Advisory: In function read_yin_container() in libyang <= v1.0.225 or possibly <= 1.0.240 doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
what vulnarability does libyang version less then 1.0.240 have
Having vulnarability CVE-2022-25236 Advisory: Licenseware 2.0.0 updates its dependency 'libexpat1' in the Dockerfile to include security fixes. https://github.com/licenseware/licenseware-sdk-v2/pull/59
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does licenseware version less then 2.0.0 have ### Response: Having vulnarability CVE-2022-25236 Advisory: Licenseware 2.0.0 updates its dependency 'libexpat1' in the Dockerfile to include security fixes. https://github.com/licenseware/licenseware-sdk-v2/pull/59
what vulnarability does licenseware version less then 2.0.0 have
Having vulnarability CVE-2021-32297 Advisory: A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution. https://github.com/lief-project/LIEF/commit/19e06755e8ce1ecf136360a5c36cded3701ac253
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lief version less then 0.11.0 have ### Response: Having vulnarability CVE-2021-32297 Advisory: A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution. https://github.com/lief-project/LIEF/commit/19e06755e8ce1ecf136360a5c36cded3701ac253
what vulnarability does lief version less then 0.11.0 have
Having vulnarability PVE-2021-37424 Advisory: Lifx-control-panel 1.5.4 fixes a pretty major security exploit. It adds safe-scopes to all 'eval()' calls. https://github.com/samclane/LIFX-Control-Panel/commit/3f95fd5362b52144b44e47102ab386baa511f143
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lifx-control-panel version less then 1.5.4 have ### Response: Having vulnarability PVE-2021-37424 Advisory: Lifx-control-panel 1.5.4 fixes a pretty major security exploit. It adds safe-scopes to all 'eval()' calls. https://github.com/samclane/LIFX-Control-Panel/commit/3f95fd5362b52144b44e47102ab386baa511f143
what vulnarability does lifx-control-panel version less then 1.5.4 have
Having vulnarability PVE-2023-52882 Advisory: Light-the-torch 0.7.0 mitigates the risk of supply chain attacks. https://github.com/pmeier/light-the-torch/pull/115 https://github.com/pmeier/light-the-torch/pull/118
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does light-the-torch version less then 0.7.0 have ### Response: Having vulnarability PVE-2023-52882 Advisory: Light-the-torch 0.7.0 mitigates the risk of supply chain attacks. https://github.com/pmeier/light-the-torch/pull/115 https://github.com/pmeier/light-the-torch/pull/118
what vulnarability does light-the-torch version less then 0.7.0 have
Having vulnarability CVE-2023-34092 Advisory: Lightning 2.0.4 updates its dependency 'vite' to version '2.9.16' to include a security fix. https://github.com/Lightning-AI/lightning/commit/7d2a46efa9834c3bb0bc1069df0a2e3a6e855d01
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lightning version less then 2.0.4 have ### Response: Having vulnarability CVE-2023-34092 Advisory: Lightning 2.0.4 updates its dependency 'vite' to version '2.9.16' to include a security fix. https://github.com/Lightning-AI/lightning/commit/7d2a46efa9834c3bb0bc1069df0a2e3a6e855d01
what vulnarability does lightning version less then 2.0.4 have
Having vulnarability CVE-2023-47248 Advisory: Lilac 0.3.7 upgrades its pyarrow dependency to version ^13.0.0 from ^14.0.1 in response to CVE-2023-47248. https://github.com/lilacai/lilac/pull/1191/commits/493dd721e01019185fa62beb0c162286d24dbbbe
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lilac version less then 0.3.7 have ### Response: Having vulnarability CVE-2023-47248 Advisory: Lilac 0.3.7 upgrades its pyarrow dependency to version ^13.0.0 from ^14.0.1 in response to CVE-2023-47248. https://github.com/lilacai/lilac/pull/1191/commits/493dd721e01019185fa62beb0c162286d24dbbbe
what vulnarability does lilac version less then 0.3.7 have
Having vulnarability PVE-2024-66762 Advisory: Liminal-sdk-python 2024.03.0 fixes a race condition when refreshing the access token. https://github.com/liminal-ai-security/liminal-sdk-python/pull/66/commits/866a018f704d2947e62ab037c94771f47d14c8b0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does liminal-sdk-python version less then 2024.03.0 have ### Response: Having vulnarability PVE-2024-66762 Advisory: Liminal-sdk-python 2024.03.0 fixes a race condition when refreshing the access token. https://github.com/liminal-ai-security/liminal-sdk-python/pull/66/commits/866a018f704d2947e62ab037c94771f47d14c8b0
what vulnarability does liminal-sdk-python version less then 2024.03.0 have
Having vulnarability CVE-2019-19010 Advisory: Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does limnoria version less then 2019.11.09 have ### Response: Having vulnarability CVE-2019-19010 Advisory: Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
what vulnarability does limnoria version less then 2019.11.09 have
Having vulnarability CVE-2020-18699 Advisory: Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arbitrary code by entering scripts in the 'Username' parameter of the in component 'app/api/cms/user.py' (https://github.com/TaleLin/lin-cms-flask/issues/28). See CVE-2020-18699.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lin-cms version less then 0.2.0b1 have ### Response: Having vulnarability CVE-2020-18699 Advisory: Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arbitrary code by entering scripts in the 'Username' parameter of the in component 'app/api/cms/user.py' (https://github.com/TaleLin/lin-cms-flask/issues/28). See CVE-2020-18699.
what vulnarability does lin-cms version less then 0.2.0b1 have
Having vulnarability CVE-2020-18698 Advisory: Lin-CMS-flask allows remote attackers to launch brute force login attempts without restriction via the 'login' function in the component 'app/api/cms/user.py'. https://github.com/TaleLin/lin-cms-flask/issues/27
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lin-cms-flask version greather then 0 have ### Response: Having vulnarability CVE-2020-18698 Advisory: Lin-CMS-flask allows remote attackers to launch brute force login attempts without restriction via the 'login' function in the component 'app/api/cms/user.py'. https://github.com/TaleLin/lin-cms-flask/issues/27
what vulnarability does lin-cms-flask version greather then 0 have
Having vulnarability CVE-2023-37276 Advisory: Line-bot-sdk 3.2.0 updates its dependency 'aiohttp' to version '3.8.5' to include a fix for an HTTP Request Smuggling vulnerability. https://github.com/line/line-bot-sdk-python/pull/491
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does line-bot-sdk version less then 3.2.0 have ### Response: Having vulnarability CVE-2023-37276 Advisory: Line-bot-sdk 3.2.0 updates its dependency 'aiohttp' to version '3.8.5' to include a fix for an HTTP Request Smuggling vulnerability. https://github.com/line/line-bot-sdk-python/pull/491
what vulnarability does line-bot-sdk version less then 3.2.0 have