output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2021-38223 Advisory: Khoros 2.2.0 includes changes to the :doc:`supporting modules <supporting-modules>`. The ``yaml.load()`` function call got replaced with ``yaml.safe_load()`` in :py:func:`khoros.utils.helper.import_yaml_file` as it is a better security practice. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does khoros version less then 2.2.0 have ### Response: Having vulnarability PVE-2021-38223 Advisory: Khoros 2.2.0 includes changes to the :doc:`supporting modules <supporting-modules>`. The ``yaml.load()`` function call got replaced with ``yaml.safe_load()`` in :py:func:`khoros.utils.helper.import_yaml_file` as it is a better security practice. | what vulnarability does khoros version less then 2.2.0 have | |
Having vulnarability PVE-2021-37935 Advisory: khorosjx 2.3.1 upgrades the bleach package to version 3.1.1 to mitigate an XSS security issue | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does khorosjx version less then 2.3.1 have ### Response: Having vulnarability PVE-2021-37935 Advisory: khorosjx 2.3.1 upgrades the bleach package to version 3.1.1 to mitigate an XSS security issue | what vulnarability does khorosjx version less then 2.3.1 have | |
Having vulnarability CVE-2022-21699 Advisory: Kiez 0.3.3 updates its dependency 'IPython' to v7.31.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiez version less then 0.3.3 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Kiez 0.3.3 updates its dependency 'IPython' to v7.31.1 to include a security fix. | what vulnarability does kiez version less then 0.3.3 have | |
Having vulnarability PVE-2021-41724 Advisory: Kili 2.87.0 secured its core API. From 16/09/2021 on, package maintainers prompt all users of the Python SDK on the SaaS application to upgrade kili to its last version. No more details were given. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kili version less then 2.87.0 have ### Response: Having vulnarability PVE-2021-41724 Advisory: Kili 2.87.0 secured its core API. From 16/09/2021 on, package maintainers prompt all users of the Python SDK on the SaaS application to upgrade kili to its last version. No more details were given. | what vulnarability does kili version less then 2.87.0 have | |
Having vulnarability PVE-2021-36841 Advisory: kinto 12.0.2
**security**: Fix a pagination bug in the PostgreSQL backend that could leak records between collections | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto version less then 12.0.2 have ### Response: Having vulnarability PVE-2021-36841 Advisory: kinto 12.0.2
**security**: Fix a pagination bug in the PostgreSQL backend that could leak records between collections | what vulnarability does kinto version less then 12.0.2 have | |
Having vulnarability PVE-2024-65061 Advisory: Kinto-attachment 6.4.0 addresses a high-severity vulnerability, CVE-2024-1314. This issue allowed the replacement of attachment files on read-only records if the attacker had "read" permission on a parent entity.
https://github.com/Kinto/kinto-attachment/security/advisories/GHSA-hvp4-vrv2-8wrq | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto-attachment version less then 6.4.0 have ### Response: Having vulnarability PVE-2024-65061 Advisory: Kinto-attachment 6.4.0 addresses a high-severity vulnerability, CVE-2024-1314. This issue allowed the replacement of attachment files on read-only records if the attacker had "read" permission on a parent entity.
https://github.com/Kinto/kinto-attachment/security/advisories/GHSA-hvp4-vrv2-8wrq | what vulnarability does kinto-attachment version less then 6.4.0 have | |
Having vulnarability PVE-2021-37169 Advisory: Signer parameters in kinto-dist before 15.0.2 were displayed in capabilities. This was a security concern. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kinto-dist version less then 15.0.2 have ### Response: Having vulnarability PVE-2021-37169 Advisory: Signer parameters in kinto-dist before 15.0.2 were displayed in capabilities. This was a security concern. | what vulnarability does kinto-dist version less then 15.0.2 have | |
Having vulnarability CVE-2019-12855 Advisory: Kiosk-client 0.2.1 updates Twisted to the latest version due to CVE-2019-12855. In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiosk-client version less then 0.2.1 have ### Response: Having vulnarability CVE-2019-12855 Advisory: Kiosk-client 0.2.1 updates Twisted to the latest version due to CVE-2019-12855. In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections. | what vulnarability does kiosk-client version less then 0.2.1 have | |
Having vulnarability CVE-2020-7729 Advisory: Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729.
https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kivy version less then 2023.05.21 have ### Response: Having vulnarability CVE-2020-7729 Advisory: Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729.
https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 | what vulnarability does kivy version less then 2023.05.21 have | |
Having vulnarability CVE-2023-4863 Advisory: Kivy-deps.sdl2 0.6.0 and prior versions (wheels for Windows) include a version of 'libwebp-7.dll', which is affected by a high-risk vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kivy-deps.sdl2 version less then equal to 0.6.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Kivy-deps.sdl2 0.6.0 and prior versions (wheels for Windows) include a version of 'libwebp-7.dll', which is affected by a high-risk vulnerability. | what vulnarability does kivy-deps.sdl2 version less then equal to 0.6.0 have | |
Having vulnarability CVE-2021-45115 Advisory: Kiwitcms 11.1 updates its dependency 'Django' to v4.0.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kiwitcms version less then 11.1 have ### Response: Having vulnarability CVE-2021-45115 Advisory: Kiwitcms 11.1 updates its dependency 'Django' to v4.0.2 to include security fixes. | what vulnarability does kiwitcms version less then 11.1 have | |
Having vulnarability PVE-2022-45025 Advisory: Klayout 0.27.6 restricts evaluation of expressions in string to numeric conversion. This will fix a potential vulnerability which allows someone to sneak in expression code through malicious configuration, technology or layer properties files. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does klayout version less then 0.27.6 have ### Response: Having vulnarability PVE-2022-45025 Advisory: Klayout 0.27.6 restricts evaluation of expressions in string to numeric conversion. This will fix a potential vulnerability which allows someone to sneak in expression code through malicious configuration, technology or layer properties files. | what vulnarability does klayout version less then 0.27.6 have | |
Having vulnarability CVE-2017-18342 Advisory: Klocmod 0.2.1 updates its dependency 'pyyaml' to v5.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does klocmod version less then 0.2.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Klocmod 0.2.1 updates its dependency 'pyyaml' to v5.1 to include a security fix. | what vulnarability does klocmod version less then 0.2.1 have | |
Having vulnarability PVE-2021-36510 Advisory: Knowledge-repo 0.8.0 removed two security vulnerabilities associated with arbitrary code execution from code stored in knowledge repositories on both clients and servers via knowledge repository configuration and embedded tooling.
https://github.com/airbnb/knowledge-repo/pull/382 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does knowledge-repo version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-36510 Advisory: Knowledge-repo 0.8.0 removed two security vulnerabilities associated with arbitrary code execution from code stored in knowledge repositories on both clients and servers via knowledge repository configuration and embedded tooling.
https://github.com/airbnb/knowledge-repo/pull/382 | what vulnarability does knowledge-repo version less then 0.8.0 have | |
Having vulnarability CVE-2017-1002153 Advisory: Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does koji version equal to 1.13.0 have ### Response: Having vulnarability CVE-2017-1002153 Advisory: Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission. | what vulnarability does koji version equal to 1.13.0 have | |
Having vulnarability CVE-2023-4863 Advisory: Kolena 0.94.1 updates its dependency 'pillow' to version '^10.0.1' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolena version less then 0.94.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Kolena 0.94.1 updates its dependency 'pillow' to version '^10.0.1' to include security fixes. | what vulnarability does kolena version less then 0.94.1 have | |
Having vulnarability PVE-2022-49589 Advisory: Kolibri 0.15.4 sanitizes exported CSVs to avoid CSV injection.
https://github.com/learningequality/kolibri/pull/9523/commits/95609c11f4497a64f24a3949779969e0badcd55c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolibri version less then 0.15.4 have ### Response: Having vulnarability PVE-2022-49589 Advisory: Kolibri 0.15.4 sanitizes exported CSVs to avoid CSV injection.
https://github.com/learningequality/kolibri/pull/9523/commits/95609c11f4497a64f24a3949779969e0badcd55c | what vulnarability does kolibri version less then 0.15.4 have | |
Having vulnarability CVE-2022-0639 Advisory: Kolibri-explore-plugin 2.0.12 updates its NPM dependency 'url-parse' to v1.5.7 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolibri-explore-plugin version less then 2.0.12 have ### Response: Having vulnarability CVE-2022-0639 Advisory: Kolibri-explore-plugin 2.0.12 updates its NPM dependency 'url-parse' to v1.5.7 to include security fixes. | what vulnarability does kolibri-explore-plugin version less then 2.0.12 have | |
Having vulnarability CVE-2022-38060 Advisory: Kolla 12.6.0, 13.5.0 and 14.5.0 include a fix for CVE-2022-38060: A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges.
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolla version less then 12.6.0,greather then equal to 13.0.0.0rc1,less then 13.5.0,greather then equal to 14.0.0.0rc1,less then 14.5.0 have ### Response: Having vulnarability CVE-2022-38060 Advisory: Kolla 12.6.0, 13.5.0 and 14.5.0 include a fix for CVE-2022-38060: A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges.
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589 | what vulnarability does kolla version less then 12.6.0,greather then equal to 13.0.0.0rc1,less then 13.5.0,greather then equal to 14.0.0.0rc1,less then 14.5.0 have | |
Having vulnarability CVE-2023-2088 Advisory: Kolla-ansible 16.0.0.0rc1 includes a fix for CVE-2023-2088: A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality.
https://opendev.org/openstack/kolla-ansible/commit/a77ea13ef1991543df29b7eea14b1f91ef26f858 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kolla-ansible version less then equal to 15.1.0 have ### Response: Having vulnarability CVE-2023-2088 Advisory: Kolla-ansible 16.0.0.0rc1 includes a fix for CVE-2023-2088: A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality.
https://opendev.org/openstack/kolla-ansible/commit/a77ea13ef1991543df29b7eea14b1f91ef26f858 | what vulnarability does kolla-ansible version less then equal to 15.1.0 have | |
Having vulnarability PVE-2023-60847 Advisory: Kombu 3.0.13 includes a fix for a Race Condition vulnerability.
https://github.com/celery/kombu/commit/b24697ee29b063ade45b1850bb8c27658ee31dff | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kombu version less then 3.0.13 have ### Response: Having vulnarability PVE-2023-60847 Advisory: Kombu 3.0.13 includes a fix for a Race Condition vulnerability.
https://github.com/celery/kombu/commit/b24697ee29b063ade45b1850bb8c27658ee31dff | what vulnarability does kombu version less then 3.0.13 have | |
Having vulnarability CVE-2018-9856 Advisory: Kotti 1.3.2 and 2.0.0b2 include a fix for CVE-2018-9856: Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request.
https://github.com/advisories/GHSA-3hq4-f2v6-q338 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kotti version less then 1.3.2,greather then equal to 2.0.0a1,less then 2.0.0b2 have ### Response: Having vulnarability CVE-2018-9856 Advisory: Kotti 1.3.2 and 2.0.0b2 include a fix for CVE-2018-9856: Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request.
https://github.com/advisories/GHSA-3hq4-f2v6-q338 | what vulnarability does kotti version less then 1.3.2,greather then equal to 2.0.0a1,less then 2.0.0b2 have | |
Having vulnarability PVE-2017-47613 Advisory: Kploy 0.7.0 adds support for passing secrets securely via environmental variables. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kploy version less then 0.7.0 have ### Response: Having vulnarability PVE-2017-47613 Advisory: Kploy 0.7.0 adds support for passing secrets securely via environmental variables. | what vulnarability does kploy version less then 0.7.0 have | |
Having vulnarability PVE-2023-54815 Advisory: Krptn 0.5.5 mitigates the risk of severe memory corruption by adding simple type-checking.
https://github.com/krptn/krypton/commit/aa950a900c3e9d3336bf78dd6b4887e03b041175 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does krptn version less then 0.5.5 have ### Response: Having vulnarability PVE-2023-54815 Advisory: Krptn 0.5.5 mitigates the risk of severe memory corruption by adding simple type-checking.
https://github.com/krptn/krypton/commit/aa950a900c3e9d3336bf78dd6b4887e03b041175 | what vulnarability does krptn version less then 0.5.5 have | |
Having vulnarability CVE-2021-44228 Advisory: Kserve 0.10.0 updates its dependency 'ray' to v1.10.0 to include a fix for a critical vulnerability.
https://github.com/kserve/kserve/issues/2190 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kserve version less then 0.10.0 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Kserve 0.10.0 updates its dependency 'ray' to v1.10.0 to include a fix for a critical vulnerability.
https://github.com/kserve/kserve/issues/2190 | what vulnarability does kserve version less then 0.10.0 have | |
Having vulnarability CVE-2023-36189 Advisory: Kube-copilot 0.1.21 updates its dependency 'langchain' to v0.0.278 to include a security fix.
https://github.com/feiskyer/kube-copilot/pull/43 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kube-copilot version less then 0.1.21 have ### Response: Having vulnarability CVE-2023-36189 Advisory: Kube-copilot 0.1.21 updates its dependency 'langchain' to v0.0.278 to include a security fix.
https://github.com/feiskyer/kube-copilot/pull/43 | what vulnarability does kube-copilot version less then 0.1.21 have | |
Having vulnarability CVE-2019-11324 Advisory: Kubernetes 10.0.1 updates its dependency 'urllib3' to include a security fix.
https://github.com/kubernetes-client/python/pull/897 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubernetes version less then 10.0.1 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Kubernetes 10.0.1 updates its dependency 'urllib3' to include a security fix.
https://github.com/kubernetes-client/python/pull/897 | what vulnarability does kubernetes version less then 10.0.1 have | |
Having vulnarability CVE-2021-3121 Advisory: Kubernetes-asyncio 19.15.0 updates gogo/protobuf to v1.3.2 to include a security fix.
https://github.com/kubernetes/kubernetes/pull/100515 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubernetes-asyncio version less then 19.15.0 have ### Response: Having vulnarability CVE-2021-3121 Advisory: Kubernetes-asyncio 19.15.0 updates gogo/protobuf to v1.3.2 to include a security fix.
https://github.com/kubernetes/kubernetes/pull/100515 | what vulnarability does kubernetes-asyncio version less then 19.15.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Kubetest 0.1.0 updates the pyyaml version for security reasons. See: CVE-2017-18342. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kubetest version less then 0.1.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Kubetest 0.1.0 updates the pyyaml version for security reasons. See: CVE-2017-18342. | what vulnarability does kubetest version less then 0.1.0 have | |
Having vulnarability PVE-2023-58920 Advisory: Kuzu 0.0.3 includes a fix for a format string vulnerability.
https://github.com/kuzudb/kuzu/pull/1335/commits/b6267047c6d9c3d316330c745946368b27c3e823 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kuzu version less then 0.0.3 have ### Response: Having vulnarability PVE-2023-58920 Advisory: Kuzu 0.0.3 includes a fix for a format string vulnerability.
https://github.com/kuzudb/kuzu/pull/1335/commits/b6267047c6d9c3d316330c745946368b27c3e823 | what vulnarability does kuzu version less then 0.0.3 have | |
Having vulnarability CVE-2017-18342 Advisory: Kvm48 1.3.600 includes a security patch for the function 'load' in 'kvm48/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/SNH48Live/KVM48/commit/1cd560899b8bbb10de64ce5a4f6e88fd61f4199d#diff-ebd9623cdd31ae084d3bdeb718bdcf42de239f8b24a1170581c4c6f89dedeaae | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kvm48 version less then 1.3.600 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Kvm48 1.3.600 includes a security patch for the function 'load' in 'kvm48/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/SNH48Live/KVM48/commit/1cd560899b8bbb10de64ce5a4f6e88fd61f4199d#diff-ebd9623cdd31ae084d3bdeb718bdcf42de239f8b24a1170581c4c6f89dedeaae | what vulnarability does kvm48 version less then 1.3.600 have | |
Having vulnarability CVE-2018-18074 Advisory: Kytos 2019.1b1 updates its dependency 'requests' to v2.21.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kytos version less then 2019.1b1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kytos 2019.1b1 updates its dependency 'requests' to v2.21.0 to include a security fix. | what vulnarability does kytos version less then 2019.1b1 have | |
Having vulnarability CVE-2018-18074 Advisory: Kytos-utils 2019.1b3 updates its dependency 'requests' to '>=2.20.0' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does kytos-utils version less then 2019.1b3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Kytos-utils 2019.1b3 updates its dependency 'requests' to '>=2.20.0' to include a security fix. | what vulnarability does kytos-utils version less then 2019.1b3 have | |
Having vulnarability CVE-2022-31015 Advisory: Label-sleuth 0.11.6 updates its dependency 'waitress' to v2.1.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-sleuth version less then 0.11.6 have ### Response: Having vulnarability CVE-2022-31015 Advisory: Label-sleuth 0.11.6 updates its dependency 'waitress' to v2.1.2 to include a security fix. | what vulnarability does label-sleuth version less then 0.11.6 have | |
Having vulnarability CVE-2021-34552 Advisory: Label-studio version 0.0.45 has updated its Pillow library dependency to version 8.3.1, moving from a previous specification of versions greater than or equal to 8 and less than or equal to 8.3. This change addresses the security issue identified as CVE-2021-34552.
https://github.com/HumanSignal/label-studio-converter/pull/44/commits/51edb4ddda8035a6215ccd92746488df720ef25b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-studio version less then 0.0.45 have ### Response: Having vulnarability CVE-2021-34552 Advisory: Label-studio version 0.0.45 has updated its Pillow library dependency to version 8.3.1, moving from a previous specification of versions greater than or equal to 8 and less than or equal to 8.3. This change addresses the security issue identified as CVE-2021-34552.
https://github.com/HumanSignal/label-studio-converter/pull/44/commits/51edb4ddda8035a6215ccd92746488df720ef25b | what vulnarability does label-studio version less then 0.0.45 have | |
Having vulnarability CVE-2021-28676 Advisory: Label-studio-converter 0.0.43 updates its dependency 'pillow' to v8.3.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does label-studio-converter version less then 0.0.43 have ### Response: Having vulnarability CVE-2021-28676 Advisory: Label-studio-converter 0.0.43 updates its dependency 'pillow' to v8.3.1 to include security fixes. | what vulnarability does label-studio-converter version less then 0.0.43 have | |
Having vulnarability PVE-2024-64091 Advisory: Labgrid 23.0.2 fixes a race condition that previously occurred in the handling of USBSDMuxDevice/USBSDWireDevice paths. This issue arose particularly during USB resets or fast replugging events. It potentially led to the incorrect assignment of control and disk paths for the USBSDMuxDevice and USBSDWireDevice, impacting their accurate and reliable operation.
https://github.com/labgrid-project/labgrid/compare/v23.0.1...v23.0.2#diff-bc256bde0e401738303653d85da6e6a1a1a937880d1eb6f9c423a9970eb349d2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does labgrid version less then 23.0.2 have ### Response: Having vulnarability PVE-2024-64091 Advisory: Labgrid 23.0.2 fixes a race condition that previously occurred in the handling of USBSDMuxDevice/USBSDWireDevice paths. This issue arose particularly during USB resets or fast replugging events. It potentially led to the incorrect assignment of control and disk paths for the USBSDMuxDevice and USBSDWireDevice, impacting their accurate and reliable operation.
https://github.com/labgrid-project/labgrid/compare/v23.0.1...v23.0.2#diff-bc256bde0e401738303653d85da6e6a1a1a937880d1eb6f9c423a9970eb349d2 | what vulnarability does labgrid version less then 23.0.2 have | |
Having vulnarability CVE-2022-40896 Advisory: Ladok3 4.2 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability.
https://github.com/dbosk/ladok3/commit/685f2fca6d38960a650060b1bdd13ca88f30b13f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladok3 version less then 4.2 have ### Response: Having vulnarability CVE-2022-40896 Advisory: Ladok3 4.2 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability.
https://github.com/dbosk/ladok3/commit/685f2fca6d38960a650060b1bdd13ca88f30b13f | what vulnarability does ladok3 version less then 4.2 have | |
Having vulnarability CVE-2019-1010268 Advisory: Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladon version greather then equal to 0.6.1,less then equal to 0.9.40 have ### Response: Having vulnarability CVE-2019-1010268 Advisory: Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call. | what vulnarability does ladon version greather then equal to 0.6.1,less then equal to 0.9.40 have | |
Having vulnarability CVE-2022-40897 Advisory: Ladybug-comfort 0.16.18 updates its dependency 'setuptools' to v65.5.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ladybug-comfort version less then 0.16.18 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Ladybug-comfort 0.16.18 updates its dependency 'setuptools' to v65.5.1 to include a security fix. | what vulnarability does ladybug-comfort version less then 0.16.18 have | |
Having vulnarability CVE-2019-6446 Advisory: Lagmat 0.3.3 updates its dependency 'numpy' to v1.19.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lagmat version less then 0.3.3 have ### Response: Having vulnarability CVE-2019-6446 Advisory: Lagmat 0.3.3 updates its dependency 'numpy' to v1.19.5 to include a security fix. | what vulnarability does lagmat version less then 0.3.3 have | |
Having vulnarability PVE-2023-62784 Advisory: Lakefs 1.3.1 fixes a bug that allows an user with permission to write actions can impersonate another user when auth token is configured in environment variable.
https://github.com/treeverse/lakeFS/security/advisories/GHSA-26hr-q2wp-rvc5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lakefs version less then 1.3.1 have ### Response: Having vulnarability PVE-2023-62784 Advisory: Lakefs 1.3.1 fixes a bug that allows an user with permission to write actions can impersonate another user when auth token is configured in environment variable.
https://github.com/treeverse/lakeFS/security/advisories/GHSA-26hr-q2wp-rvc5 | what vulnarability does lakefs version less then 1.3.1 have | |
Having vulnarability PVE-2021-35209 Advisory: lambda-tools before 0.1.2 used an unsafe way to load untrusted lambda definitions via `yaml.load`. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lambda-tools version less then 0.1.2 have ### Response: Having vulnarability PVE-2021-35209 Advisory: lambda-tools before 0.1.2 used an unsafe way to load untrusted lambda definitions via `yaml.load`. | what vulnarability does lambda-tools version less then 0.1.2 have | |
Having vulnarability PVE-2021-25874 Advisory: lambdajson 0.1.5 includes a security fix. Using ast.literal_eval as eval. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lambdajson version less then 0.1.5 have ### Response: Having vulnarability PVE-2021-25874 Advisory: lambdajson 0.1.5 includes a security fix. Using ast.literal_eval as eval. | what vulnarability does lambdajson version less then 0.1.5 have | |
Having vulnarability CVE-2018-18074 Advisory: Lander 0.1.15 updates 'requests' to 2.20.0 for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lander version less then 0.1.15 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Lander 0.1.15 updates 'requests' to 2.20.0 for security reasons. | what vulnarability does lander version less then 0.1.15 have | |
Having vulnarability PVE-2021-37414 Advisory: Lando 0.11.3 adds `cluster_api_settings .ssl_ca_cert` config flag to allow secure k8s connections. See <https://github.com/Duke-GCB/lando/pull/209>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lando version less then 0.11.3 have ### Response: Having vulnarability PVE-2021-37414 Advisory: Lando 0.11.3 adds `cluster_api_settings .ssl_ca_cert` config flag to allow secure k8s connections. See <https://github.com/Duke-GCB/lando/pull/209>. | what vulnarability does lando version less then 0.11.3 have | |
Having vulnarability CVE-2023-29374 Advisory: LangChain 0.0.142 includes a fix for CVE-2023-29374: The LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.
https://github.com/hwchase17/langchain/pull/1119
https://github.com/langchain-ai/langchain/commit/5ca7ce77cd536991d04f476e420446a3b21d2a7b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langchain version less then 0.0.142 have ### Response: Having vulnarability CVE-2023-29374 Advisory: LangChain 0.0.142 includes a fix for CVE-2023-29374: The LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.
https://github.com/hwchase17/langchain/pull/1119
https://github.com/langchain-ai/langchain/commit/5ca7ce77cd536991d04f476e420446a3b21d2a7b | what vulnarability does langchain version less then 0.0.142 have | |
Having vulnarability CVE-2023-45920 Advisory: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langchain-experimental version less then 0.0.52 have ### Response: Having vulnarability CVE-2023-45920 Advisory: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py. | what vulnarability does langchain-experimental version less then 0.0.52 have | |
Having vulnarability PVE-2024-65269 Advisory: Langfuse version 2.1.0 updates its nodemailer dependency to 6.9.9 from 6.9.8, prompted by security considerations.
https://github.com/langfuse/langfuse/pull/1027 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does langfuse version less then 2.1.0 have ### Response: Having vulnarability PVE-2024-65269 Advisory: Langfuse version 2.1.0 updates its nodemailer dependency to 6.9.9 from 6.9.8, prompted by security considerations.
https://github.com/langfuse/langfuse/pull/1027 | what vulnarability does langfuse version less then 2.1.0 have | |
Having vulnarability PVE-2021-38926 Advisory: Language-formatters-pre-commit-hooks 1.6.0 enhances its security in commands execution to prevent shell-injection.
https://github.com/macisamuele/language-formatters-pre-commit-hooks/pull/38/files | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does language-formatters-pre-commit-hooks version less then 1.6.0 have ### Response: Having vulnarability PVE-2021-38926 Advisory: Language-formatters-pre-commit-hooks 1.6.0 enhances its security in commands execution to prevent shell-injection.
https://github.com/macisamuele/language-formatters-pre-commit-hooks/pull/38/files | what vulnarability does language-formatters-pre-commit-hooks version less then 1.6.0 have | |
Having vulnarability PVE-2021-37597 Advisory: Lapdog 0.18.7 improves API security by switching to custom Lapdog OAuth tokens. Currently this is only supported by Broad accounts. Non-broad accounts will continue to use standard Google application-default credentials when authenticating through the Lapdog API. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lapdog version less then 0.18.7 have ### Response: Having vulnarability PVE-2021-37597 Advisory: Lapdog 0.18.7 improves API security by switching to custom Lapdog OAuth tokens. Currently this is only supported by Broad accounts. Non-broad accounts will continue to use standard Google application-default credentials when authenticating through the Lapdog API. | what vulnarability does lapdog version less then 0.18.7 have | |
Having vulnarability CVE-2017-18342 Advisory: Laporte-Mqtt 0.2.2 includes a security patch for the function 'load_config' in 'laporte_mqtt/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/vinklat/laporte-mqtt/commit/db24ded1c1ed0232c42bb826b9c1dc30fb925f2e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does laporte-mqtt version less then 0.2.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Laporte-Mqtt 0.2.2 includes a security patch for the function 'load_config' in 'laporte_mqtt/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/vinklat/laporte-mqtt/commit/db24ded1c1ed0232c42bb826b9c1dc30fb925f2e | what vulnarability does laporte-mqtt version less then 0.2.2 have | |
Having vulnarability PVE-2022-52518 Advisory: Lattice 0.1.2 replaces its dependency 'GitPython' with 'pygit2' to avoid security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lattice version less then 0.1.2 have ### Response: Having vulnarability PVE-2022-52518 Advisory: Lattice 0.1.2 replaces its dependency 'GitPython' with 'pygit2' to avoid security issues. | what vulnarability does lattice version less then 0.1.2 have | |
Having vulnarability PVE-2023-58696 Advisory: Launchable 1.38.10 includes a fix for a OS command injection vulnerability.
https://github.com/launchableinc/cli/pull/393 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchable version less then 1.38.10 have ### Response: Having vulnarability PVE-2023-58696 Advisory: Launchable 1.38.10 includes a fix for a OS command injection vulnerability.
https://github.com/launchableinc/cli/pull/393 | what vulnarability does launchable version less then 1.38.10 have | |
Having vulnarability CVE-2017-18342 Advisory: Launchdarkly-server-sdk 6.11.2 uses 'yaml.safe_load()' instead of 'yaml.load()' for YAML/JSON test data parsing to fix an arbitrary code execution vulnerability.
https://github.com/launchdarkly/python-server-sdk/issues/136 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchdarkly-server-sdk version less then 6.11.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Launchdarkly-server-sdk 6.11.2 uses 'yaml.safe_load()' instead of 'yaml.load()' for YAML/JSON test data parsing to fix an arbitrary code execution vulnerability.
https://github.com/launchdarkly/python-server-sdk/issues/136 | what vulnarability does launchdarkly-server-sdk version less then 6.11.2 have | |
Having vulnarability CVE-2020-28493 Advisory: Launchkey 3.9.1 updates its dependency 'jinja2' to v2.11.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does launchkey version less then 3.9.1 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Launchkey 3.9.1 updates its dependency 'jinja2' to v2.11.3 to include a security fix. | what vulnarability does launchkey version less then 3.9.1 have | |
Having vulnarability CVE-2020-35653 Advisory: layeredimage 2021.2.1 updates its dependency 'pillow' to versions >= 8.1.1 to imclude security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does layeredimage version less then 2021.2.1 have ### Response: Having vulnarability CVE-2020-35653 Advisory: layeredimage 2021.2.1 updates its dependency 'pillow' to versions >= 8.1.1 to imclude security fixes. | what vulnarability does layeredimage version less then 2021.2.1 have | |
Having vulnarability CVE-2021-22570 Advisory: Lazuli 2.2.2 pins its dependency 'protobuf' to v3.20.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lazuli version less then 2.2.2 have ### Response: Having vulnarability CVE-2021-22570 Advisory: Lazuli 2.2.2 pins its dependency 'protobuf' to v3.20.1 to include a security fix. | what vulnarability does lazuli version less then 2.2.2 have | |
Having vulnarability CVE-2022-40898 Advisory: Lbt-dragonfly 0.9.404 updates its dependency 'wheel' to v0.38.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lbt-dragonfly version less then 0.9.404 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Lbt-dragonfly 0.9.404 updates its dependency 'wheel' to v0.38.1 to include a security fix. | what vulnarability does lbt-dragonfly version less then 0.9.404 have | |
Having vulnarability CVE-2022-40897 Advisory: Lbt-honeybee 0.7.125 updates its dependency 'setuptools' to v65.5.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lbt-honeybee version less then 0.7.125 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Lbt-honeybee 0.7.125 updates its dependency 'setuptools' to v65.5.1 to include a security fix. | what vulnarability does lbt-honeybee version less then 0.7.125 have | |
Having vulnarability CVE-2021-41945 Advisory: Lc-sdk-python 0.3.1 updates 'httpx' dependency to v0.23.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lc-sdk-python version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Lc-sdk-python 0.3.1 updates 'httpx' dependency to v0.23.0 to include a security fix. | what vulnarability does lc-sdk-python version less then 0.3.1 have | |
Having vulnarability PVE-2021-25875 Advisory: ldap3 before 0.9.5.4 has several security issues in lazy connections. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldap3 version less then 0.9.5.4 have ### Response: Having vulnarability PVE-2021-25875 Advisory: ldap3 before 0.9.5.4 has several security issues in lazy connections. | what vulnarability does ldap3 version less then 0.9.5.4 have | |
Having vulnarability PVE-2022-52390 Advisory: Ldap3-ad-leavers 1.2.0 includes a fix for a code injection vulnerability.
https://github.com/mervinhemaraju/ldap3-ad-leavers/commit/0e8351c3b6df679423e3cd8fa847487a55f85687 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldap3-ad-leavers version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-52390 Advisory: Ldap3-ad-leavers 1.2.0 includes a fix for a code injection vulnerability.
https://github.com/mervinhemaraju/ldap3-ad-leavers/commit/0e8351c3b6df679423e3cd8fa847487a55f85687 | what vulnarability does ldap3-ad-leavers version less then 1.2.0 have | |
Having vulnarability CVE-2019-25095 Advisory: A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ldapcherry version greather then equal to 0,less then 1.0.0 have ### Response: Having vulnarability CVE-2019-25095 Advisory: A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability. | what vulnarability does ldapcherry version greather then equal to 0,less then 1.0.0 have | |
Having vulnarability PVE-2017-47230 Advisory: Leap.bitmask 0.9.0 stops including 3rd party libs logs. These logs could include, for example, exported PGP private keys.
https://github.com/leapcode/bitmask-dev/commit/fc65820f9e9a9a39434bbef3f5e9251436d9b458 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does leap-bitmask version less then 0.9 have ### Response: Having vulnarability PVE-2017-47230 Advisory: Leap.bitmask 0.9.0 stops including 3rd party libs logs. These logs could include, for example, exported PGP private keys.
https://github.com/leapcode/bitmask-dev/commit/fc65820f9e9a9a39434bbef3f5e9251436d9b458 | what vulnarability does leap-bitmask version less then 0.9 have | |
Having vulnarability PVE-2022-45477 Advisory: Learninglib is a malicious package, typosquatting. It installs cryptomining malware in your system.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does learninglib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45477 Advisory: Learninglib is a malicious package, typosquatting. It installs cryptomining malware in your system.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/ | what vulnarability does learninglib version greather then 0,less then 0 have | |
Having vulnarability PVE-2024-67135 Advisory: Ledfx 2.0.70 addresses and resolves a critical issue that could cause crashes due to a race condition and the presence of empty virtual data. The race condition could potentially be exploited to cause a denial of service (DoS). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ledfx version less then 2.0.70 have ### Response: Having vulnarability PVE-2024-67135 Advisory: Ledfx 2.0.70 addresses and resolves a critical issue that could cause crashes due to a race condition and the presence of empty virtual data. The race condition could potentially be exploited to cause a denial of service (DoS). | what vulnarability does ledfx version less then 2.0.70 have | |
Having vulnarability PVE-2022-51649 Advisory: Lekt 14.0.13 updates Open EDX image version to 14.2.1, which includes a security fix for a XSS vulnerability in edx-platform.
https://github.com/lektorium-tutor/lekt/commit/b46a7b0fa806604eddaed8646a2a8712a8508c79 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lekt version less then 14.0.13 have ### Response: Having vulnarability PVE-2022-51649 Advisory: Lekt 14.0.13 updates Open EDX image version to 14.2.1, which includes a security fix for a XSS vulnerability in edx-platform.
https://github.com/lektorium-tutor/lekt/commit/b46a7b0fa806604eddaed8646a2a8712a8508c79 | what vulnarability does lekt version less then 14.0.13 have | |
Having vulnarability CVE-2015-7764 Advisory: Lemur 0.1.5 includes a fix for CVE-2015-7764: Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode.
http://www.openwall.com/lists/oss-security/2015/10/20/3
https://github.com/Netflix/lemur/issues/117
https://github.com/kvesteri/sqlalchemy-utils/issues/166 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lemur version less then 0.1.5 have ### Response: Having vulnarability CVE-2015-7764 Advisory: Lemur 0.1.5 includes a fix for CVE-2015-7764: Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode.
http://www.openwall.com/lists/oss-security/2015/10/20/3
https://github.com/Netflix/lemur/issues/117
https://github.com/kvesteri/sqlalchemy-utils/issues/166 | what vulnarability does lemur version less then 0.1.5 have | |
Having vulnarability CVE-2020-23478 Advisory: Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does leo version greather then equal to 0,less then 6.3 have ### Response: Having vulnarability CVE-2020-23478 Advisory: Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py. | what vulnarability does leo version greather then equal to 0,less then 6.3 have | |
Having vulnarability PVE-2022-44654 Advisory: Levenshtein 0.12.1 fixes handling of numerous possible wraparounds in calculating the size of memory allocations; incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library.
https://github.com/ztane/python-Levenshtein/issues/62 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does levenshtein version less then 0.12.1 have ### Response: Having vulnarability PVE-2022-44654 Advisory: Levenshtein 0.12.1 fixes handling of numerous possible wraparounds in calculating the size of memory allocations; incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library.
https://github.com/ztane/python-Levenshtein/issues/62 | what vulnarability does levenshtein version less then 0.12.1 have | |
Having vulnarability PVE-2021-34612 Advisory: Lfm 2.0 uses tempfile secure versions mkdtemp() and mkstemp(). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lfm version less then 2.0 have ### Response: Having vulnarability PVE-2021-34612 Advisory: Lfm 2.0 uses tempfile secure versions mkdtemp() and mkstemp(). | what vulnarability does lfm version less then 2.0 have | |
Having vulnarability CVE-2021-28676 Advisory: Lg-rez version 2.1.4 updates its dependency 'pillow' to v8.2.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lg-rez version less then 2.1.4 have ### Response: Having vulnarability CVE-2021-28676 Advisory: Lg-rez version 2.1.4 updates its dependency 'pillow' to v8.2.0 to include security fixes. | what vulnarability does lg-rez version less then 2.1.4 have | |
Having vulnarability PVE-2023-59300 Advisory: Libarchive-c 4.0 includes a fix for an unsafe defaults vulnerability that could have lead to path traversal.
https://github.com/Changaco/python-libarchive-c/commit/98c14d296a7f3ab04dd0a4c8c9c2920f88537fa7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libarchive-c version less then 4.0 have ### Response: Having vulnarability PVE-2023-59300 Advisory: Libarchive-c 4.0 includes a fix for an unsafe defaults vulnerability that could have lead to path traversal.
https://github.com/Changaco/python-libarchive-c/commit/98c14d296a7f3ab04dd0a4c8c9c2920f88537fa7 | what vulnarability does libarchive-c version less then 4.0 have | |
Having vulnarability PVE-2022-45410 Advisory: Libari is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.
https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libari version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45410 Advisory: Libari is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.
https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/ | what vulnarability does libari version greather then 0,less then 0 have | |
Having vulnarability CVE-2020-27783 Advisory: Libgenesis 0.1.8 updates its dependency 'lxml' minimum version to v4.6.5 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libgenesis version less then 0.1.8 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Libgenesis 0.1.8 updates its dependency 'lxml' minimum version to v4.6.5 to include security fixes. | what vulnarability does libgenesis version less then 0.1.8 have | |
Having vulnarability PVE-2023-52926 Advisory: Libhttps is a malicious package. It installs info-stealing Malware.
https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libhttps version greather then 0 have ### Response: Having vulnarability PVE-2023-52926 Advisory: Libhttps is a malicious package. It installs info-stealing Malware.
https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware | what vulnarability does libhttps version greather then 0 have | |
Having vulnarability PVE-2021-39450 Advisory: For web-security reasons, libhxl 4.21.3 blocks the fetching of datasets from localhost, *.localdomain (or any dotted quad) unless allow_local is True. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libhxl version less then 4.21.3 have ### Response: Having vulnarability PVE-2021-39450 Advisory: For web-security reasons, libhxl 4.21.3 blocks the fetching of datasets from localhost, *.localdomain (or any dotted quad) unless allow_local is True. | what vulnarability does libhxl version less then 4.21.3 have | |
Having vulnarability PVE-2023-62431 Advisory: Libosdp 1.3.0 includes a fix for a CWE-1392: Use of Default Credentials.
https://github.com/goToMain/libosdp/commit/cb918c29ca672375cc4bdcef84e2c8d21a8df3e8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libosdp version less then 1.3.0 have ### Response: Having vulnarability PVE-2023-62431 Advisory: Libosdp 1.3.0 includes a fix for a CWE-1392: Use of Default Credentials.
https://github.com/goToMain/libosdp/commit/cb918c29ca672375cc4bdcef84e2c8d21a8df3e8 | what vulnarability does libosdp version less then 1.3.0 have | |
Having vulnarability PVE-2022-45409 Advisory: Libpesh is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.
https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpesh version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45409 Advisory: Libpesh is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.
https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/ | what vulnarability does libpesh version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45415 Advisory: Libpeshka is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpeshka version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45415 Advisory: Libpeshka is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does libpeshka version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45408 Advisory: Libpeshnx is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.
https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libpeshnx version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45408 Advisory: Libpeshnx is a malicious package, typosquatting. It contains a hidden backdoor which activates when installed on Linux systems.
https://www.zdnet.com/article/malicious-python-libraries-targeting-linux-servers-removed-from-pypi/ | what vulnarability does libpeshnx version greather then 0,less then 0 have | |
Having vulnarability CVE-2023-2650 Advisory: Libre-fastapi-jwt 0.20.3 updates its dependency 'cryptography' to version '41.0.1' to include a security fix.
https://github.com/LibreNZ/libre-fastapi-jwt/commit/fa128ea36cf021e104f564d3c7bc3874f83461fe | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libre-fastapi-jwt version less then 0.20.3 have ### Response: Having vulnarability CVE-2023-2650 Advisory: Libre-fastapi-jwt 0.20.3 updates its dependency 'cryptography' to version '41.0.1' to include a security fix.
https://github.com/LibreNZ/libre-fastapi-jwt/commit/fa128ea36cf021e104f564d3c7bc3874f83461fe | what vulnarability does libre-fastapi-jwt version less then 0.20.3 have | |
Having vulnarability CVE-2023-25577 Advisory: Libretranslate 1.5.4 updates its Werkzeug dependency from 2.2.2 to 2.3.8. This upgrade addresses the vulnerability identified as CVE-2023-25577.
https://github.com/LibreTranslate/LibreTranslate/pull/570/commits/51341d92ade55e47d94ac2f6dd095fcc226e62d0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libretranslate version less then 1.5.4 have ### Response: Having vulnarability CVE-2023-25577 Advisory: Libretranslate 1.5.4 updates its Werkzeug dependency from 2.2.2 to 2.3.8. This upgrade addresses the vulnerability identified as CVE-2023-25577.
https://github.com/LibreTranslate/LibreTranslate/pull/570/commits/51341d92ade55e47d94ac2f6dd095fcc226e62d0 | what vulnarability does libretranslate version less then 1.5.4 have | |
Having vulnarability PVE-2021-25877 Advisory: libtaxii before 1.1.105 has multiple XML parsing related vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtaxii version less then 1.1.105 have ### Response: Having vulnarability PVE-2021-25877 Advisory: libtaxii before 1.1.105 has multiple XML parsing related vulnerabilities. | what vulnarability does libtaxii version less then 1.1.105 have | |
Having vulnarability CVE-2020-8927 Advisory: Libtmux 0.11.0 updates its dependency 'brotly' to versions >=1.0.9 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtmux version less then 0.11.0 have ### Response: Having vulnarability CVE-2020-8927 Advisory: Libtmux 0.11.0 updates its dependency 'brotly' to versions >=1.0.9 to include a security fix. | what vulnarability does libtmux version less then 0.11.0 have | |
Having vulnarability PVE-2021-43049 Advisory: Libtorrent 2.0.3 (the underlying core dependency of the Python bindings) fixes an integer overflow in hash_picker and properly restricts max file sizes in torrents.
https://github.com/arvidn/libtorrent/commit/58a489332ca05303e8001c24478f27338309c858 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libtorrent version less then 2.0.3 have ### Response: Having vulnarability PVE-2021-43049 Advisory: Libtorrent 2.0.3 (the underlying core dependency of the Python bindings) fixes an integer overflow in hash_picker and properly restricts max file sizes in torrents.
https://github.com/arvidn/libtorrent/commit/58a489332ca05303e8001c24478f27338309c858 | what vulnarability does libtorrent version less then 2.0.3 have | |
Having vulnarability CVE-2022-21187 Advisory: Libvcs before 0.11.1 is vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libvcs version less then 0.11.1 have ### Response: Having vulnarability CVE-2022-21187 Advisory: Libvcs before 0.11.1 is vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution. | what vulnarability does libvcs version less then 0.11.1 have | |
Having vulnarability CVE-2021-28902 Advisory: In function read_yin_container() in libyang <= v1.0.225 or possibly <= 1.0.240 doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does libyang version less then 1.0.240 have ### Response: Having vulnarability CVE-2021-28902 Advisory: In function read_yin_container() in libyang <= v1.0.225 or possibly <= 1.0.240 doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash. | what vulnarability does libyang version less then 1.0.240 have | |
Having vulnarability CVE-2022-25236 Advisory: Licenseware 2.0.0 updates its dependency 'libexpat1' in the Dockerfile to include security fixes.
https://github.com/licenseware/licenseware-sdk-v2/pull/59 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does licenseware version less then 2.0.0 have ### Response: Having vulnarability CVE-2022-25236 Advisory: Licenseware 2.0.0 updates its dependency 'libexpat1' in the Dockerfile to include security fixes.
https://github.com/licenseware/licenseware-sdk-v2/pull/59 | what vulnarability does licenseware version less then 2.0.0 have | |
Having vulnarability CVE-2021-32297 Advisory: A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution.
https://github.com/lief-project/LIEF/commit/19e06755e8ce1ecf136360a5c36cded3701ac253 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lief version less then 0.11.0 have ### Response: Having vulnarability CVE-2021-32297 Advisory: A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution.
https://github.com/lief-project/LIEF/commit/19e06755e8ce1ecf136360a5c36cded3701ac253 | what vulnarability does lief version less then 0.11.0 have | |
Having vulnarability PVE-2021-37424 Advisory: Lifx-control-panel 1.5.4 fixes a pretty major security exploit. It adds safe-scopes to all 'eval()' calls.
https://github.com/samclane/LIFX-Control-Panel/commit/3f95fd5362b52144b44e47102ab386baa511f143 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lifx-control-panel version less then 1.5.4 have ### Response: Having vulnarability PVE-2021-37424 Advisory: Lifx-control-panel 1.5.4 fixes a pretty major security exploit. It adds safe-scopes to all 'eval()' calls.
https://github.com/samclane/LIFX-Control-Panel/commit/3f95fd5362b52144b44e47102ab386baa511f143 | what vulnarability does lifx-control-panel version less then 1.5.4 have | |
Having vulnarability PVE-2023-52882 Advisory: Light-the-torch 0.7.0 mitigates the risk of supply chain attacks.
https://github.com/pmeier/light-the-torch/pull/115
https://github.com/pmeier/light-the-torch/pull/118 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does light-the-torch version less then 0.7.0 have ### Response: Having vulnarability PVE-2023-52882 Advisory: Light-the-torch 0.7.0 mitigates the risk of supply chain attacks.
https://github.com/pmeier/light-the-torch/pull/115
https://github.com/pmeier/light-the-torch/pull/118 | what vulnarability does light-the-torch version less then 0.7.0 have | |
Having vulnarability CVE-2023-34092 Advisory: Lightning 2.0.4 updates its dependency 'vite' to version '2.9.16' to include a security fix.
https://github.com/Lightning-AI/lightning/commit/7d2a46efa9834c3bb0bc1069df0a2e3a6e855d01 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lightning version less then 2.0.4 have ### Response: Having vulnarability CVE-2023-34092 Advisory: Lightning 2.0.4 updates its dependency 'vite' to version '2.9.16' to include a security fix.
https://github.com/Lightning-AI/lightning/commit/7d2a46efa9834c3bb0bc1069df0a2e3a6e855d01 | what vulnarability does lightning version less then 2.0.4 have | |
Having vulnarability CVE-2023-47248 Advisory: Lilac 0.3.7 upgrades its pyarrow dependency to version ^13.0.0 from ^14.0.1 in response to CVE-2023-47248.
https://github.com/lilacai/lilac/pull/1191/commits/493dd721e01019185fa62beb0c162286d24dbbbe | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lilac version less then 0.3.7 have ### Response: Having vulnarability CVE-2023-47248 Advisory: Lilac 0.3.7 upgrades its pyarrow dependency to version ^13.0.0 from ^14.0.1 in response to CVE-2023-47248.
https://github.com/lilacai/lilac/pull/1191/commits/493dd721e01019185fa62beb0c162286d24dbbbe | what vulnarability does lilac version less then 0.3.7 have | |
Having vulnarability PVE-2024-66762 Advisory: Liminal-sdk-python 2024.03.0 fixes a race condition when refreshing the access token.
https://github.com/liminal-ai-security/liminal-sdk-python/pull/66/commits/866a018f704d2947e62ab037c94771f47d14c8b0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does liminal-sdk-python version less then 2024.03.0 have ### Response: Having vulnarability PVE-2024-66762 Advisory: Liminal-sdk-python 2024.03.0 fixes a race condition when refreshing the access token.
https://github.com/liminal-ai-security/liminal-sdk-python/pull/66/commits/866a018f704d2947e62ab037c94771f47d14c8b0 | what vulnarability does liminal-sdk-python version less then 2024.03.0 have | |
Having vulnarability CVE-2019-19010 Advisory: Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does limnoria version less then 2019.11.09 have ### Response: Having vulnarability CVE-2019-19010 Advisory: Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands. | what vulnarability does limnoria version less then 2019.11.09 have | |
Having vulnarability CVE-2020-18699 Advisory: Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arbitrary code by entering scripts in the 'Username' parameter of the in component 'app/api/cms/user.py' (https://github.com/TaleLin/lin-cms-flask/issues/28). See CVE-2020-18699. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lin-cms version less then 0.2.0b1 have ### Response: Having vulnarability CVE-2020-18699 Advisory: Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arbitrary code by entering scripts in the 'Username' parameter of the in component 'app/api/cms/user.py' (https://github.com/TaleLin/lin-cms-flask/issues/28). See CVE-2020-18699. | what vulnarability does lin-cms version less then 0.2.0b1 have | |
Having vulnarability CVE-2020-18698 Advisory: Lin-CMS-flask allows remote attackers to launch brute force login attempts without restriction via the 'login' function in the component 'app/api/cms/user.py'.
https://github.com/TaleLin/lin-cms-flask/issues/27 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lin-cms-flask version greather then 0 have ### Response: Having vulnarability CVE-2020-18698 Advisory: Lin-CMS-flask allows remote attackers to launch brute force login attempts without restriction via the 'login' function in the component 'app/api/cms/user.py'.
https://github.com/TaleLin/lin-cms-flask/issues/27 | what vulnarability does lin-cms-flask version greather then 0 have | |
Having vulnarability CVE-2023-37276 Advisory: Line-bot-sdk 3.2.0 updates its dependency 'aiohttp' to version '3.8.5' to include a fix for an HTTP Request Smuggling vulnerability.
https://github.com/line/line-bot-sdk-python/pull/491 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does line-bot-sdk version less then 3.2.0 have ### Response: Having vulnarability CVE-2023-37276 Advisory: Line-bot-sdk 3.2.0 updates its dependency 'aiohttp' to version '3.8.5' to include a fix for an HTTP Request Smuggling vulnerability.
https://github.com/line/line-bot-sdk-python/pull/491 | what vulnarability does line-bot-sdk version less then 3.2.0 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.