output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability CVE-2020-14343 Advisory: Line-item-manager 0.2.2 updates its dependency 'pyyaml' requirements to >=5.4 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does line-item-manager version less then 0.2.2 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Line-item-manager 0.2.2 updates its dependency 'pyyaml' requirements to >=5.4 to include a security fix.
what vulnarability does line-item-manager version less then 0.2.2 have
Having vulnarability CVE-2023-40267 Advisory: Lingfo 0.2.4 updates its dependency 'gitpython' to version '3.1.32' to include a fix for a Remote Code Execution vulnerability. https://github.com/lingfo/lingfo/commit/4f571a7c3ded9b1775e5b741c48c49e6510b7a8f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lingfo version less then 0.2.4 have ### Response: Having vulnarability CVE-2023-40267 Advisory: Lingfo 0.2.4 updates its dependency 'gitpython' to version '3.1.32' to include a fix for a Remote Code Execution vulnerability. https://github.com/lingfo/lingfo/commit/4f571a7c3ded9b1775e5b741c48c49e6510b7a8f
what vulnarability does lingfo version less then 0.2.4 have
Having vulnarability PVE-2024-63769 Advisory: Linkml 1.5.2 introduces critical security enhancements to mitigate potential code injection vulnerabilities, specifically by refining the pydanticgen/pythongen modules. These improvements address the handling of quotes and multiline descriptions in enum fields, ensuring safer processing of descriptions and preventing malicious code execution. https://github.com/linkml/linkml/pull/1402
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does linkml version less then 1.5.2 have ### Response: Having vulnarability PVE-2024-63769 Advisory: Linkml 1.5.2 introduces critical security enhancements to mitigate potential code injection vulnerabilities, specifically by refining the pydanticgen/pythongen modules. These improvements address the handling of quotes and multiline descriptions in enum fields, ensuring safer processing of descriptions and preventing malicious code execution. https://github.com/linkml/linkml/pull/1402
what vulnarability does linkml version less then 1.5.2 have
Having vulnarability CVE-2019-12887 Advisory: KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does linotp version greather then equal to 0,less then 2.11.1 have ### Response: Having vulnarability CVE-2019-12887 Advisory: KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2).
what vulnarability does linotp version greather then equal to 0,less then 2.11.1 have
Having vulnarability CVE-2021-34141 Advisory: Lintegrate 0.1.11 updates its dependency 'numpy' to v>=1.21 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lintegrate version less then 0.1.11 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Lintegrate 0.1.11 updates its dependency 'numpy' to v>=1.21 to include security fixes.
what vulnarability does lintegrate version less then 0.1.11 have
Having vulnarability CVE-2023-49081 Advisory: Lionagi 0.0.102 updates its dependency package aiohttp version from 3.8.6 to 3.9.0 to include security fixes due to the CVE-2023-49081. https://github.com/lion-agi/lionagi/pull/41
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lionagi version less then 0.0.102 have ### Response: Having vulnarability CVE-2023-49081 Advisory: Lionagi 0.0.102 updates its dependency package aiohttp version from 3.8.6 to 3.9.0 to include security fixes due to the CVE-2023-49081. https://github.com/lion-agi/lionagi/pull/41
what vulnarability does lionagi version less then 0.0.102 have
Having vulnarability PVE-2024-67612 Advisory: Litellm version 1.35.1.dev1 introduces a low-severity security fix by disabling demo accounts on the Admin UI. Previously, the Proxy used a hardcoded demo account with no permissions, posing a potential security risk.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does litellm version less then 1.35.1.dev1 have ### Response: Having vulnarability PVE-2024-67612 Advisory: Litellm version 1.35.1.dev1 introduces a low-severity security fix by disabling demo accounts on the Admin UI. Previously, the Proxy used a hardcoded demo account with no permissions, posing a potential security risk.
what vulnarability does litellm version less then 1.35.1.dev1 have
Having vulnarability CVE-2018-1000656 Advisory: Lithops 1.0.1 fixes a flask security issue. See: CVE-2018-1000656.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lithops version less then 1.0.1 have ### Response: Having vulnarability CVE-2018-1000656 Advisory: Lithops 1.0.1 fixes a flask security issue. See: CVE-2018-1000656.
what vulnarability does lithops version less then 1.0.1 have
Having vulnarability PVE-2021-34170 Advisory: livefyre before 2.0.3 uses a release of a transitive dependency with known security vulnerabilities (PyJWT).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does livefyre version less then 2.0.3 have ### Response: Having vulnarability PVE-2021-34170 Advisory: livefyre before 2.0.3 uses a release of a transitive dependency with known security vulnerabilities (PyJWT).
what vulnarability does livefyre version less then 2.0.3 have
Having vulnarability CVE-2023-39662 Advisory: llama-agi 0.2.0 and prior versions ship with vulnerable dependencies (llama-index == 0.6.13).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does llama-agi version less then 0.2.0 have ### Response: Having vulnarability CVE-2023-39662 Advisory: llama-agi 0.2.0 and prior versions ship with vulnerable dependencies (llama-index == 0.6.13).
what vulnarability does llama-agi version less then 0.2.0 have
Having vulnarability PVE-2023-62135 Advisory: Llama-cpp-python 0.2.12 includes a fix for an Arbitrary Code Execution vulnerability. https://github.com/abetlen/llama-cpp-python/pull/854
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does llama-cpp-python version less then 0.2.12 have ### Response: Having vulnarability PVE-2023-62135 Advisory: Llama-cpp-python 0.2.12 includes a fix for an Arbitrary Code Execution vulnerability. https://github.com/abetlen/llama-cpp-python/pull/854
what vulnarability does llama-cpp-python version less then 0.2.12 have
Having vulnarability CVE-2024-23730 Advisory: The OpenAPI and ChatGPT plugin loaders in LlamaHub (aka llama-hub) before 0.0.67 allow attackers to execute arbitrary code because safe_load is not used for YAML.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does llama-hub version less then 0.0.67 have ### Response: Having vulnarability CVE-2024-23730 Advisory: The OpenAPI and ChatGPT plugin loaders in LlamaHub (aka llama-hub) before 0.0.67 allow attackers to execute arbitrary code because safe_load is not used for YAML.
what vulnarability does llama-hub version less then 0.0.67 have
Having vulnarability CVE-2023-39662 Advisory: An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does llama-index version less then equal to 0.7.13 have ### Response: Having vulnarability CVE-2023-39662 Advisory: An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function.
what vulnarability does llama-index version less then equal to 0.7.13 have
Having vulnarability CVE-2019-16225 Advisory: An issue was discovered in py-lmdb 0.97. For certain values of mp_flags, mdb_page_touch does not properly set up mc->mc_pg[mc->top], leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lmdb version greather then equal to 0,less then 0.98 have ### Response: Having vulnarability CVE-2019-16225 Advisory: An issue was discovered in py-lmdb 0.97. For certain values of mp_flags, mdb_page_touch does not properly set up mc->mc_pg[mc->top], leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
what vulnarability does lmdb version greather then equal to 0,less then 0.98 have
Having vulnarability PVE-2023-61437 Advisory: Lmdeploy 0.0.10 includes a fix for a potential race condition vulnerability. https://github.com/InternLM/lmdeploy/pull/460
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lmdeploy version less then 0.0.10 have ### Response: Having vulnarability PVE-2023-61437 Advisory: Lmdeploy 0.0.10 includes a fix for a potential race condition vulnerability. https://github.com/InternLM/lmdeploy/pull/460
what vulnarability does lmdeploy version less then 0.0.10 have
Having vulnarability PVE-2022-52465 Advisory: Localstack 0.12.14 fixes CORS setup to prevent CSRF attacks. https://github.com/localstack/localstack/commit/809235e3079a1060dae599ce83ed06c84b0e34a5
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does localstack version less then 0.12.14 have ### Response: Having vulnarability PVE-2022-52465 Advisory: Localstack 0.12.14 fixes CORS setup to prevent CSRF attacks. https://github.com/localstack/localstack/commit/809235e3079a1060dae599ce83ed06c84b0e34a5
what vulnarability does localstack version less then 0.12.14 have
Having vulnarability CVE-2017-18342 Advisory: Locopy 0.3.8 includes a security patch for the function 'read_config_yaml' in 'locopy/utility.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/capitalone/locopy/pull/105
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does locopy version less then 0.3.8 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Locopy 0.3.8 includes a security patch for the function 'read_config_yaml' in 'locopy/utility.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/capitalone/locopy/pull/105
what vulnarability does locopy version less then 0.3.8 have
Having vulnarability PVE-2022-50450 Advisory: Locust 1.3.2 includes a fix for a XSS vulnerability. https://github.com/locustio/locust/pull/1603/commits/0d118179709b4a60174810bae4db41d40e4c99ad
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does locust version less then 1.3.2 have ### Response: Having vulnarability PVE-2022-50450 Advisory: Locust 1.3.2 includes a fix for a XSS vulnerability. https://github.com/locustio/locust/pull/1603/commits/0d118179709b4a60174810bae4db41d40e4c99ad
what vulnarability does locust version less then 1.3.2 have
Having vulnarability PVE-2021-25878 Advisory: Locustio before 0.7 uses pickle, exposing to RCE.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does locustio version less then 0.7 have ### Response: Having vulnarability PVE-2021-25878 Advisory: Locustio before 0.7 uses pickle, exposing to RCE.
what vulnarability does locustio version less then 0.7 have
Having vulnarability CVE-2021-41227 Advisory: Logbesselk 0.8.5 updates its dependency 'tensorflow' to v2.8.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does logbesselk version less then 0.8.5 have ### Response: Having vulnarability CVE-2021-41227 Advisory: Logbesselk 0.8.5 updates its dependency 'tensorflow' to v2.8.0 to include security fixes.
what vulnarability does logbesselk version less then 0.8.5 have
Having vulnarability CVE-2011-0728 Advisory: Cross-site scripting (XSS) vulnerability in templatefunctions.py in Loggerhead before 1.18.1 allows remote authenticated users to inject arbitrary web script or HTML via a filename, which is not properly handled in a revision view.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does loggerhead version less then 1.18.1 have ### Response: Having vulnarability CVE-2011-0728 Advisory: Cross-site scripting (XSS) vulnerability in templatefunctions.py in Loggerhead before 1.18.1 allows remote authenticated users to inject arbitrary web script or HTML via a filename, which is not properly handled in a revision view.
what vulnarability does loggerhead version less then 1.18.1 have
Having vulnarability CVE-2014-1839 Advisory: The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does logilab-common version less then 0.61.0 have ### Response: Having vulnarability CVE-2014-1839 Advisory: The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.
what vulnarability does logilab-common version less then 0.61.0 have
Having vulnarability CVE-2023-37920 Advisory: Logprep 7.0.0 updates its dependency 'certifi' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does logprep version less then 7.0.0 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Logprep 7.0.0 updates its dependency 'certifi' to include a security fix.
what vulnarability does logprep version less then 7.0.0 have
Having vulnarability CVE-2022-0338 Advisory: Insertion of Sensitive Information into Log File in Conda loguru prior to 0.5.3.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does loguru version greather then equal to 0,less then 0.5.3 have ### Response: Having vulnarability CVE-2022-0338 Advisory: Insertion of Sensitive Information into Log File in Conda loguru prior to 0.5.3.
what vulnarability does loguru version greather then equal to 0,less then 0.5.3 have
Having vulnarability CVE-2020-15271 Advisory: In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically loaded the built-in "terminal" and "file_loader" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. This is fixed in version 2.3.0. As a workaround, the `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme. See CVE-2020-15271.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lookatme version less then 2.3.0 have ### Response: Having vulnarability CVE-2020-15271 Advisory: In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically loaded the built-in "terminal" and "file_loader" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. This is fixed in version 2.3.0. As a workaround, the `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme. See CVE-2020-15271.
what vulnarability does lookatme version less then 2.3.0 have
Having vulnarability CVE-2023-23611 Advisory: Lti-consumer-xblock 7.2.2 includes a fix for CVE-2023-23611: Any LTI tool that is integrated with on the Open edX platform can post a grade back for any LTI XBlock so long as it knows or can guess the block location for that XBlock. https://github.com/openedx/xblock-lti-consumer/security/advisories/GHSA-7j9p-67mm-5g87
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lti-consumer-xblock version greather then equal to 7.0.0,less then 7.2.2 have ### Response: Having vulnarability CVE-2023-23611 Advisory: Lti-consumer-xblock 7.2.2 includes a fix for CVE-2023-23611: Any LTI tool that is integrated with on the Open edX platform can post a grade back for any LTI XBlock so long as it knows or can guess the block location for that XBlock. https://github.com/openedx/xblock-lti-consumer/security/advisories/GHSA-7j9p-67mm-5g87
what vulnarability does lti-consumer-xblock version greather then equal to 7.0.0,less then 7.2.2 have
Having vulnarability PVE-2021-37144 Advisory: Luckycharms 0.5.2 upgrades some dependencies with security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does luckycharms version less then 0.5.2 have ### Response: Having vulnarability PVE-2021-37144 Advisory: Luckycharms 0.5.2 upgrades some dependencies with security vulnerabilities.
what vulnarability does luckycharms version less then 0.5.2 have
Having vulnarability PVE-2024-64244 Advisory: Ludwig 0.7 addresses a race condition that occurred during schema validation when running multiple threads of LudwigModel. This fix ensures thread safety and prevents potential AssertionErrors. https://github.com/ludwig-ai/ludwig/pull/2653/commits/92cc531456b45728b9267784e5beb37a8d184c1c
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ludwig version less then 0.7 have ### Response: Having vulnarability PVE-2024-64244 Advisory: Ludwig 0.7 addresses a race condition that occurred during schema validation when running multiple threads of LudwigModel. This fix ensures thread safety and prevents potential AssertionErrors. https://github.com/ludwig-ai/ludwig/pull/2653/commits/92cc531456b45728b9267784e5beb37a8d184c1c
what vulnarability does ludwig version less then 0.7 have
Having vulnarability PVE-2021-34671 Advisory: Luigi 2.1.1 fixes a security issue where malicious users can run arbitrary code if they have file system (even external mounts) and network access on the machine running luigid (executed by the user that you run luigid with). https://github.com/spotify/luigi/pull/1631
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does luigi version less then 2.1.1 have ### Response: Having vulnarability PVE-2021-34671 Advisory: Luigi 2.1.1 fixes a security issue where malicious users can run arbitrary code if they have file system (even external mounts) and network access on the machine running luigid (executed by the user that you run luigid with). https://github.com/spotify/luigi/pull/1631
what vulnarability does luigi version less then 2.1.1 have
Having vulnarability PVE-2023-60442 Advisory: Lunr 0.5.3 includes a fix for a Catastrophic Backtracking vulnerability. https://github.com/yeraydiazdiaz/lunr.py/commit/03c32809f12fb4d0b6699fc7f134ea015774ad65
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lunr version less then 0.5.3 have ### Response: Having vulnarability PVE-2023-60442 Advisory: Lunr 0.5.3 includes a fix for a Catastrophic Backtracking vulnerability. https://github.com/yeraydiazdiaz/lunr.py/commit/03c32809f12fb4d0b6699fc7f134ea015774ad65
what vulnarability does lunr version less then 0.5.3 have
Having vulnarability PVE-2021-38394 Advisory: Lurklite 0.4.9 includes a change that allows Discord administrators to be specified with user IDs as well as usernamediscriminator, improving security with username changes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lurklite version less then 0.4.9 have ### Response: Having vulnarability PVE-2021-38394 Advisory: Lurklite 0.4.9 includes a change that allows Discord administrators to be specified with user IDs as well as usernamediscriminator, improving security with username changes.
what vulnarability does lurklite version less then 0.4.9 have
Having vulnarability CVE-2021-40494 Advisory: A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lxdui version greather then equal to 0 have ### Response: Having vulnarability CVE-2021-40494 Advisory: A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.
what vulnarability does lxdui version greather then equal to 0 have
Having vulnarability PVE-2023-63015 Advisory: Lxml 2.3.4 fixes a crash due to race condition when errors (or user messages) occur during threaded XSLT processing. https://github.com/lxml/lxml/commit/26ae51c60462ba1567a123bc9701ff18f9c10789
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lxml version less then 2.3.4 have ### Response: Having vulnarability PVE-2023-63015 Advisory: Lxml 2.3.4 fixes a crash due to race condition when errors (or user messages) occur during threaded XSLT processing. https://github.com/lxml/lxml/commit/26ae51c60462ba1567a123bc9701ff18f9c10789
what vulnarability does lxml version less then 2.3.4 have
Having vulnarability CVE-2022-21699 Advisory: Lytekit 0.30.0 updates its dependency 'ipython' to v7.31.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does lytekit version less then 0.30.0 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Lytekit 0.30.0 updates its dependency 'ipython' to v7.31.1 to include a security fix.
what vulnarability does lytekit version less then 0.30.0 have
Having vulnarability CVE-2023-50781 Advisory: A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does m2crypto version less then equal to 0.40.1 have ### Response: Having vulnarability CVE-2023-50781 Advisory: A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
what vulnarability does m2crypto version less then equal to 0.40.1 have
Having vulnarability CVE-2021-31542 Advisory: Machado 0.4.0 updates its dependency 'Django' to v3.2.14 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does machado version less then 0.4.0 have ### Response: Having vulnarability CVE-2021-31542 Advisory: Machado 0.4.0 updates its dependency 'Django' to v3.2.14 to include security fixes.
what vulnarability does machado version less then 0.4.0 have
Having vulnarability PVE-2021-38383 Advisory: Mackup 0.8.28 includes a vulnerability fix. No details were given.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mackup version less then 0.8.28 have ### Response: Having vulnarability PVE-2021-38383 Advisory: Mackup 0.8.28 includes a vulnerability fix. No details were given.
what vulnarability does mackup version less then 0.8.28 have
Having vulnarability PVE-2021-37523 Advisory: Communication between the sync daemon and frontend (GUI or CLI) in maestral 0.4.1 is faster and more secure than in previous versions. Additionally, it uses Unix domain sockets instead of TCP/IP sockets for communication with daemon. This means that communication is lighter, faster and more secure (other users on the same PC can no longer connect to your sync daemon).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maestral version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-37523 Advisory: Communication between the sync daemon and frontend (GUI or CLI) in maestral 0.4.1 is faster and more secure than in previous versions. Additionally, it uses Unix domain sockets instead of TCP/IP sockets for communication with daemon. This means that communication is lighter, faster and more secure (other users on the same PC can no longer connect to your sync daemon).
what vulnarability does maestral version less then 0.4.1 have
Having vulnarability CVE-2022-3786 Advisory: Maestrowf version 1.1.10 upgrades its cryptography package from version 37.0.1 to 38.0.3 as a measure to tackle the security vulnerability CVE-2022-3786. https://github.com/LLNL/maestrowf/pull/410/commits/6768a29c2951d2e531dc1c7d0839a92f84bb4df0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maestrowf version less then 1.1.10 have ### Response: Having vulnarability CVE-2022-3786 Advisory: Maestrowf version 1.1.10 upgrades its cryptography package from version 37.0.1 to 38.0.3 as a measure to tackle the security vulnerability CVE-2022-3786. https://github.com/LLNL/maestrowf/pull/410/commits/6768a29c2951d2e531dc1c7d0839a92f84bb4df0
what vulnarability does maestrowf version less then 1.1.10 have
Having vulnarability PVE-2023-59622 Advisory: Mage-ai 0.8.58 includes a fix for a Race Condition vulnerability. https://github.com/mage-ai/mage-ai/pull/2462
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mage-ai version less then 0.8.58 have ### Response: Having vulnarability PVE-2023-59622 Advisory: Mage-ai 0.8.58 includes a fix for a Race Condition vulnerability. https://github.com/mage-ai/mage-ai/pull/2462
what vulnarability does mage-ai version less then 0.8.58 have
Having vulnarability CVE-2016-7404 Advisory: OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does magnum version less then 3.1.2 have ### Response: Having vulnarability CVE-2016-7404 Advisory: OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.
what vulnarability does magnum version less then 3.1.2 have
Having vulnarability PVE-2022-51744 Advisory: Mail-validator is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mail-validator version greather then 0 have ### Response: Having vulnarability PVE-2022-51744 Advisory: Mail-validator is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
what vulnarability does mail-validator version greather then 0 have
Having vulnarability CVE-2018-3721 Advisory: Mailchecker version 3.2.9 includes a security enhancement by forcing the lodash library to update to versions greater than 4.17.5. This update addresses the CVE-2018-3721.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mailchecker version less then 3.2.9 have ### Response: Having vulnarability CVE-2018-3721 Advisory: Mailchecker version 3.2.9 includes a security enhancement by forcing the lodash library to update to versions greater than 4.17.5. This update addresses the CVE-2018-3721.
what vulnarability does mailchecker version less then 3.2.9 have
Having vulnarability CVE-2011-0707 Advisory: Mailman 2.1.14 includes a fix for CVE-2011-0707: Three XSS flaws due improper escaping of the full name of the member.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mailman version less then 2.1.14 have ### Response: Having vulnarability CVE-2011-0707 Advisory: Mailman 2.1.14 includes a fix for CVE-2011-0707: Three XSS flaws due improper escaping of the full name of the member.
what vulnarability does mailman version less then 2.1.14 have
Having vulnarability CVE-2018-20954 Advisory: The "Security and Privacy" Encryption feature in Mailpile before 1.0.0rc4 does not exclude disabled, revoked, and expired keys.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mailpile version less then 1.0.0rc4 have ### Response: Having vulnarability CVE-2018-20954 Advisory: The "Security and Privacy" Encryption feature in Mailpile before 1.0.0rc4 does not exclude disabled, revoked, and expired keys.
what vulnarability does mailpile version less then 1.0.0rc4 have
Having vulnarability CVE-2010-2480 Advisory: Mako 0.3.4 includes a fix for CVE-2010-2480: Improper escaping of single quotes in escape.cgi (XSS).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mako version less then 0.3.4 have ### Response: Having vulnarability CVE-2010-2480 Advisory: Mako 0.3.4 includes a fix for CVE-2010-2480: Improper escaping of single quotes in escape.cgi (XSS).
what vulnarability does mako version less then 0.3.4 have
Having vulnarability PVE-2024-99775 Advisory: Malojaserver is susceptible to Cross-site Scripting (XSS) vulnerability through the error page mechanism. This exploit occurs when an attacker sends a crafted URL containing malicious HTML content, leading to unauthorized script execution within the user's browser context if the user visits the malicious link. Cross-site scripting attacks compromise web-based applications by escaping the security context, allowing attackers to inject malicious code. This type of exploit can lead to session hijackings, exposure of sensitive information, and malware distribution through various methods including stored, reflected, DOM-based, and mutated XSS. Mitigation strategies include sanitizing data input, encoding special characters, disabling client-side scripts, redirecting invalid requests, session management to prevent simultaneous logins, and implementing a Content Security Policy. https://github.com/krateng/maloja/commit/febaff97228b37a192f2630aa331cac5e5c3e98e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does malojaserver version greather then equal to 0,less then 3.2.2 have ### Response: Having vulnarability PVE-2024-99775 Advisory: Malojaserver is susceptible to Cross-site Scripting (XSS) vulnerability through the error page mechanism. This exploit occurs when an attacker sends a crafted URL containing malicious HTML content, leading to unauthorized script execution within the user's browser context if the user visits the malicious link. Cross-site scripting attacks compromise web-based applications by escaping the security context, allowing attackers to inject malicious code. This type of exploit can lead to session hijackings, exposure of sensitive information, and malware distribution through various methods including stored, reflected, DOM-based, and mutated XSS. Mitigation strategies include sanitizing data input, encoding special characters, disabling client-side scripts, redirecting invalid requests, session management to prevent simultaneous logins, and implementing a Content Security Policy. https://github.com/krateng/maloja/commit/febaff97228b37a192f2630aa331cac5e5c3e98e
what vulnarability does malojaserver version greather then equal to 0,less then 3.2.2 have
Having vulnarability CVE-2022-36082 Advisory: mangadex-downloader is a command-line tool to download manga from MangaDex. When using `file:<location>` command and `<location>` is a web URL location (http, https), mangadex-downloader between versions 1.3.0 and 1.7.2 will try to open and read a file in local disk for each line of website contents. Version 1.7.2 contains a patch for this issue.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mangadex-downloader version greather then equal to 1.3.0,less then 1.7.2 have ### Response: Having vulnarability CVE-2022-36082 Advisory: mangadex-downloader is a command-line tool to download manga from MangaDex. When using `file:<location>` command and `<location>` is a web URL location (http, https), mangadex-downloader between versions 1.3.0 and 1.7.2 will try to open and read a file in local disk for each line of website contents. Version 1.7.2 contains a patch for this issue.
what vulnarability does mangadex-downloader version greather then equal to 1.3.0,less then 1.7.2 have
Having vulnarability PVE-2021-38628 Advisory: Manifest-tool 2.0.0 adds an option to sign candidate image using update private key, allowing to implement secure boot on a device side.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does manifest-tool version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-38628 Advisory: Manifest-tool 2.0.0 adds an option to sign candidate image using update private key, allowing to implement secure boot on a device side.
what vulnarability does manifest-tool version less then 2.0.0 have
Having vulnarability CVE-2020-27781 Advisory: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does manila version less then 16.2.0 have ### Response: Having vulnarability CVE-2020-27781 Advisory: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.
what vulnarability does manila version less then 16.2.0 have
Having vulnarability PVE-2023-63061 Advisory: Manim-studio 0.6.8 prevents from running malicious code. https://github.com/MathItYT/manim-studio/commit/ec6dd80e54f6d9e4ed95001b43f23d310d9203af
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does manim-studio version less then 0.6.8 have ### Response: Having vulnarability PVE-2023-63061 Advisory: Manim-studio 0.6.8 prevents from running malicious code. https://github.com/MathItYT/manim-studio/commit/ec6dd80e54f6d9e4ed95001b43f23d310d9203af
what vulnarability does manim-studio version less then 0.6.8 have
Having vulnarability PVE-2021-25883 Advisory: mantissa before 0.6.14 in xmantissa.webtheme allows access to arbitrary filesystem contents.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mantissa version less then 0.6.14 have ### Response: Having vulnarability PVE-2021-25883 Advisory: mantissa before 0.6.14 in xmantissa.webtheme allows access to arbitrary filesystem contents.
what vulnarability does mantissa version less then 0.6.14 have
Having vulnarability CVE-2020-10812 Advisory: Mapchete 2022.11.0 updates its dependency 'rasterio' requirement to '>1.2.10' to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mapchete version less then 2022.11.0 have ### Response: Having vulnarability CVE-2020-10812 Advisory: Mapchete 2022.11.0 updates its dependency 'rasterio' requirement to '>1.2.10' to include security fixes.
what vulnarability does mapchete version less then 2022.11.0 have
Having vulnarability CVE-2017-1000426 Advisory: MapProxy version 1.10.3 and older is vulnerable to a Cross Site Scripting attack in the demo service resulting in possible information disclosure.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mapproxy version less then equal to 1.10.3 have ### Response: Having vulnarability CVE-2017-1000426 Advisory: MapProxy version 1.10.3 and older is vulnerable to a Cross Site Scripting attack in the demo service resulting in possible information disclosure.
what vulnarability does mapproxy version less then equal to 1.10.3 have
Having vulnarability CVE-2010-2539 Advisory: Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mapscript version less then 4.10.6,greather then 5.0,less then 5.6.4 have ### Response: Having vulnarability CVE-2010-2539 Advisory: Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.
what vulnarability does mapscript version less then 4.10.6,greather then 5.0,less then 5.6.4 have
Having vulnarability CVE-2013-1665 Advisory: Maptasker 1.3.3 uses 'defusedxml' to prevent XXE vulnerabilities. https://github.com/mctinker/Map-Tasker/commit/748dc69ed16053fff0b8bb54fb1a3b589300355c
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maptasker version less then 1.3.3 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Maptasker 1.3.3 uses 'defusedxml' to prevent XXE vulnerabilities. https://github.com/mctinker/Map-Tasker/commit/748dc69ed16053fff0b8bb54fb1a3b589300355c
what vulnarability does maptasker version less then 1.3.3 have
Having vulnarability PVE-2022-45472 Advisory: Maratlib is a malicious package, typosquatting. It installs cryptomining malware in your system. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maratlib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45472 Advisory: Maratlib is a malicious package, typosquatting. It installs cryptomining malware in your system. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/
what vulnarability does maratlib version greather then 0,less then 0 have
Having vulnarability PVE-2022-45473 Advisory: Maratlib1 is a malicious package, typosquatting. It installs cryptomining malware in your system. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maratlib1 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45473 Advisory: Maratlib1 is a malicious package, typosquatting. It installs cryptomining malware in your system. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/
what vulnarability does maratlib1 version greather then 0,less then 0 have
Having vulnarability CVE-2022-28470 Advisory: marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does marcador version greather then equal to 0.1,less then 0.14 have ### Response: Having vulnarability CVE-2022-28470 Advisory: marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
what vulnarability does marcador version greather then equal to 0.1,less then 0.14 have
Having vulnarability PVE-2022-51745 Advisory: Mariabd is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mariabd version greather then 0 have ### Response: Having vulnarability PVE-2022-51745 Advisory: Mariabd is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
what vulnarability does mariabd version greather then 0 have
Having vulnarability PVE-2023-63162 Advisory: Marimo 0.1.67 updates its fonttools dependency from version 4.38.0 to 4.43.0 to include a security fix for a XML External Entity (XXE) Injection vulnerability on fonttools versions before 4.43.0. https://github.com/marimo-team/marimo/pull/475
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does marimo version less then 0.1.67 have ### Response: Having vulnarability PVE-2023-63162 Advisory: Marimo 0.1.67 updates its fonttools dependency from version 4.38.0 to 4.43.0 to include a security fix for a XML External Entity (XXE) Injection vulnerability on fonttools versions before 4.43.0. https://github.com/marimo-team/marimo/pull/475
what vulnarability does marimo version less then 0.1.67 have
Having vulnarability CVE-2023-26303 Advisory: Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does markdown-it-py version greather then equal to 0,less then 2.2.0 have ### Response: Having vulnarability CVE-2023-26303 Advisory: Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.
what vulnarability does markdown-it-py version greather then equal to 0,less then 2.2.0 have
Having vulnarability PVE-2021-25884 Advisory: markdown2 before 1.0.1.14 has a security hole in the md5-hashing scheme for handling HTML chunks during processing.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does markdown2 version less then 1.0.1.14 have ### Response: Having vulnarability PVE-2021-25884 Advisory: markdown2 before 1.0.1.14 has a security hole in the md5-hashing scheme for handling HTML chunks during processing.
what vulnarability does markdown2 version less then 1.0.1.14 have
Having vulnarability CVE-2018-17175 Advisory: In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema "only" option treats an empty list as implying no "only" option, which allows a request that was intended to expose no fields to instead expose all fields (if the schema is being filtered dynamically using the "only" option, and there is a user role that produces an empty value for "only").
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does marshmallow version less then 2.15.1,greather then equal to 3.0.0a0,less then 3.0.0b9 have ### Response: Having vulnarability CVE-2018-17175 Advisory: In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema "only" option treats an empty list as implying no "only" option, which allows a request that was intended to expose no fields to instead expose all fields (if the schema is being filtered dynamically using the "only" option, and there is a user role that produces an empty value for "only").
what vulnarability does marshmallow version less then 2.15.1,greather then equal to 3.0.0a0,less then 3.0.0b9 have
Having vulnarability PVE-2021-36739 Advisory: martypy 1.2 requests security issues in `requests` and `urllib3` dependencies
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does martypy version less then 1.2 have ### Response: Having vulnarability PVE-2021-36739 Advisory: martypy 1.2 requests security issues in `requests` and `urllib3` dependencies
what vulnarability does martypy version less then 1.2 have
Having vulnarability PVE-2021-43626 Advisory: Masonite 2.3.25 improves requests checking to add CSRF headers. https://github.com/MasoniteFramework/masonite/commit/9f8b326a209be2b8cf5b0208dc8c69ebd5dd6a97
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does masonite version less then 2.3.25 have ### Response: Having vulnarability PVE-2021-43626 Advisory: Masonite 2.3.25 improves requests checking to add CSRF headers. https://github.com/MasoniteFramework/masonite/commit/9f8b326a209be2b8cf5b0208dc8c69ebd5dd6a97
what vulnarability does masonite version less then 2.3.25 have
Having vulnarability PVE-2023-62158 Advisory: Mastercard-oauth1-signer 1.4.0 includes a fix for an unsafe randomness vulnerability. https://github.com/Mastercard/oauth1-signer-python/commit/9492b61895de895c6fbf23b2cfcf21c6f70dd99f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mastercard-oauth1-signer version less then 1.4.0 have ### Response: Having vulnarability PVE-2023-62158 Advisory: Mastercard-oauth1-signer 1.4.0 includes a fix for an unsafe randomness vulnerability. https://github.com/Mastercard/oauth1-signer-python/commit/9492b61895de895c6fbf23b2cfcf21c6f70dd99f
what vulnarability does mastercard-oauth1-signer version less then 1.4.0 have
Having vulnarability CVE-2022-2166 Advisory: Mastodon.py 1.8.1 and prior supports 'mastodon' v3.5.5, which is affected by an Improper Restriction of Excessive Authentication Attempts addressed on the CVE-2022-2166. https://github.com/mastodon/mastodon/commit/21fd25a269cca742af431f0d13299e139f267346
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mastodon-py version less then equal to 1.8.1 have ### Response: Having vulnarability CVE-2022-2166 Advisory: Mastodon.py 1.8.1 and prior supports 'mastodon' v3.5.5, which is affected by an Improper Restriction of Excessive Authentication Attempts addressed on the CVE-2022-2166. https://github.com/mastodon/mastodon/commit/21fd25a269cca742af431f0d13299e139f267346
what vulnarability does mastodon-py version less then equal to 1.8.1 have
Having vulnarability PVE-2023-55125 Advisory: Mastodon.py 1.4.1 starts supporting 'mastodon' v2.8.2, which includes a fix for a XSS vulnerability. https://github.com/halcy/Mastodon.py/commit/08d808e2ace017ace45c4043ef9b414333051810 https://github.com/mastodon/mastodon/pull/8959/commits/1a3b1549cbe525e9fd2d57564ed46b0cd6f88589
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mastodon.py version less then 1.4.1 have ### Response: Having vulnarability PVE-2023-55125 Advisory: Mastodon.py 1.4.1 starts supporting 'mastodon' v2.8.2, which includes a fix for a XSS vulnerability. https://github.com/halcy/Mastodon.py/commit/08d808e2ace017ace45c4043ef9b414333051810 https://github.com/mastodon/mastodon/pull/8959/commits/1a3b1549cbe525e9fd2d57564ed46b0cd6f88589
what vulnarability does mastodon.py version less then 1.4.1 have
Having vulnarability CVE-2022-35410 Advisory: mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mat2 version greather then equal to 0,less then 0.13.0 have ### Response: Having vulnarability CVE-2022-35410 Advisory: mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.
what vulnarability does mat2 version greather then equal to 0,less then 0.13.0 have
Having vulnarability CVE-2023-46233 Advisory: Matlab-proxy 0.10.0 updates the crypto-js dependency from 4.1.1 to 4.2.0 due to the CVE-2023-46233.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matlab-proxy version less then 0.10.0 have ### Response: Having vulnarability CVE-2023-46233 Advisory: Matlab-proxy 0.10.0 updates the crypto-js dependency from 4.1.1 to 4.2.0 due to the CVE-2023-46233.
what vulnarability does matlab-proxy version less then 0.10.0 have
Having vulnarability CVE-2017-18342 Advisory: Matlabreport 0.6.0 includes a security patch for the function 'makeReport' in 'matlabreport/makereport.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/ahoetker/matlabreport/commit/31fccc6076457d0212b624a1da79515801ae39c2
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matlabreport version less then 0.6.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Matlabreport 0.6.0 includes a security patch for the function 'makeReport' in 'matlabreport/makereport.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/ahoetker/matlabreport/commit/31fccc6076457d0212b624a1da79515801ae39c2
what vulnarability does matlabreport version less then 0.6.0 have
Having vulnarability PVE-2022-45474 Advisory: Matplatlib-plus is a malicious package, typosquatting. It installs cryptomining malware in your system. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matplatlib-plus version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45474 Advisory: Matplatlib-plus is a malicious package, typosquatting. It installs cryptomining malware in your system. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/
what vulnarability does matplatlib-plus version greather then 0,less then 0 have
Having vulnarability CVE-2022-39254 Advisory: Matrix-nio 0.20 includes a fix for CVE-2022-39254: Prior to version 0.20, when a user requests a room key from their devices, the software correctly remember the request. Once they receive a forwarded room key, they accept it without checking who the room key came from. This allows homeservers to try to insert room keys of questionable validity, potentially mounting an impersonation attack.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-nio version less then 0.20 have ### Response: Having vulnarability CVE-2022-39254 Advisory: Matrix-nio 0.20 includes a fix for CVE-2022-39254: Prior to version 0.20, when a user requests a room key from their devices, the software correctly remember the request. Once they receive a forwarded room key, they accept it without checking who the room key came from. This allows homeservers to try to insert room keys of questionable validity, potentially mounting an impersonation attack.
what vulnarability does matrix-nio version less then 0.20 have
Having vulnarability CVE-2019-16789 Advisory: Matrix-registration 0.7.1 updates the waitress dependency because versions below 1.4.2 contain a vulnerability. See CVE-2019-16789.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-registration version less then 0.7.1 have ### Response: Having vulnarability CVE-2019-16789 Advisory: Matrix-registration 0.7.1 updates the waitress dependency because versions below 1.4.2 contain a vulnerability. See CVE-2019-16789.
what vulnarability does matrix-registration version less then 0.7.1 have
Having vulnarability CVE-2019-11340 Advisory: util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on user@bad.example.net@good.example.com returns the user@bad.example.net substring. See: CVE-2019-11340.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-sydent version less then 1.0.2 have ### Response: Having vulnarability CVE-2019-11340 Advisory: util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on user@bad.example.net@good.example.com returns the user@bad.example.net substring. See: CVE-2019-11340.
what vulnarability does matrix-sydent version less then 1.0.2 have
Having vulnarability CVE-2018-10657 Advisory: Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2^63 - 1 render rooms unusable, related to federation/federation_base.py and handlers/message.py, as exploited in the wild in April 2018.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-synapse version less then 0.28.1 have ### Response: Having vulnarability CVE-2018-10657 Advisory: Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2^63 - 1 render rooms unusable, related to federation/federation_base.py and handlers/message.py, as exploited in the wild in April 2018.
what vulnarability does matrix-synapse version less then 0.28.1 have
Having vulnarability CVE-2022-39335 Advisory: Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix Federation API allows remote homeservers to request the authorization events in a room. This is necessary so that a homeserver receiving some events can validate that those events are legitimate and permitted in their room. However, in versions of Synapse up to and including 1.68.0, a Synapse homeserver answering a query for authorization events does not sufficiently check that the requesting server should be able to access them. The issue was patched in Synapse 1.69.0. Homeserver administrators are advised to upgrade. Alias(es): GHSA-45cj-f97f-ggwv PYSEC-2023-65
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrix-synapse-testutils version less then 1.69.0 have ### Response: Having vulnarability CVE-2022-39335 Advisory: Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix Federation API allows remote homeservers to request the authorization events in a room. This is necessary so that a homeserver receiving some events can validate that those events are legitimate and permitted in their room. However, in versions of Synapse up to and including 1.68.0, a Synapse homeserver answering a query for authorization events does not sufficiently check that the requesting server should be able to access them. The issue was patched in Synapse 1.69.0. Homeserver administrators are advised to upgrade. Alias(es): GHSA-45cj-f97f-ggwv PYSEC-2023-65
what vulnarability does matrix-synapse-testutils version less then 1.69.0 have
Having vulnarability PVE-2021-40785 Advisory: Matrixctl 0.10.0 starts to use secure temporary directory for ansible_runner's private data. https://github.com/MichaelSasser/matrixctl/commit/efd2fae77537a1f3b050019540745f32057d781e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matrixctl version less then 0.10.0 have ### Response: Having vulnarability PVE-2021-40785 Advisory: Matrixctl 0.10.0 starts to use secure temporary directory for ansible_runner's private data. https://github.com/MichaelSasser/matrixctl/commit/efd2fae77537a1f3b050019540745f32057d781e
what vulnarability does matrixctl version less then 0.10.0 have
Having vulnarability PVE-2021-25886 Advisory: matthisk-httpsig before 1.0.0 allowed reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does matthisk-httpsig version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-25886 Advisory: matthisk-httpsig before 1.0.0 allowed reading keyfiles from disk as this is a huge security hole if this is used in a server framework like drf-httpsig.
what vulnarability does matthisk-httpsig version less then 1.0.0 have
Having vulnarability PVE-2021-37432 Advisory: Mautrix-telegram 0.6.0 fixes a vulnerability in event handling.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mautrix-telegram version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-37432 Advisory: Mautrix-telegram 0.6.0 fixes a vulnerability in event handling.
what vulnarability does mautrix-telegram version less then 0.6.0 have
Having vulnarability PVE-2021-25887 Advisory: maxminddb 1.1.2 includes a number of important security fixes. Among these fixes is improved validation of the database metadata. Unfortunately, MaxMind GeoIP2 and GeoLite2 databases created earlier than January 28, 2014 had an invalid data type for the `record_size` in the metadata. Previously these databases worked on little endian machines with libmaxminddb but did not work on big endian machines. Due to increased safety checks when reading the file, these databases will no longer work on any platform. If you are using one of these databases, we recommend that you upgrade to the latest GeoLite2 or GeoIP2 database
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does maxminddb version less then 1.1.2 have ### Response: Having vulnarability PVE-2021-25887 Advisory: maxminddb 1.1.2 includes a number of important security fixes. Among these fixes is improved validation of the database metadata. Unfortunately, MaxMind GeoIP2 and GeoLite2 databases created earlier than January 28, 2014 had an invalid data type for the `record_size` in the metadata. Previously these databases worked on little endian machines with libmaxminddb but did not work on big endian machines. Due to increased safety checks when reading the file, these databases will no longer work on any platform. If you are using one of these databases, we recommend that you upgrade to the latest GeoLite2 or GeoIP2 database
what vulnarability does maxminddb version less then 1.1.2 have
Having vulnarability CVE-2018-16406 Advisory: Mayan-edms versions before 3.0.2 are affected by CVE-2018-16406: The Cabinets app has XSS via a crafted cabinet label. https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst https://gitlab.com/mayan-edms/mayan-edms/commit/48dfc06e49c7f773749e063f8cc69c95509d1c32 https://gitlab.com/mayan-edms/mayan-edms/issues/495
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mayan-edms version less then 3.0.2 have ### Response: Having vulnarability CVE-2018-16406 Advisory: Mayan-edms versions before 3.0.2 are affected by CVE-2018-16406: The Cabinets app has XSS via a crafted cabinet label. https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst https://gitlab.com/mayan-edms/mayan-edms/commit/48dfc06e49c7f773749e063f8cc69c95509d1c32 https://gitlab.com/mayan-edms/mayan-edms/issues/495
what vulnarability does mayan-edms version less then 3.0.2 have
Having vulnarability CVE-2020-26148 Advisory: Md4c (Python bindings) v1.0.0 includes a fix for 'ISANYOF' macro, which is vulnerable in md4c main package versions before 0.4.6: The mentioned macro could provide unexpected results when encountering zero byte in the input text; in some cases leading to broken internal state of the parser. The bug could result in a denial of service and possibly also in other security implications. https://github.com/mity/md4c/issues/130
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does md4c version less then 1.0.0 have ### Response: Having vulnarability CVE-2020-26148 Advisory: Md4c (Python bindings) v1.0.0 includes a fix for 'ISANYOF' macro, which is vulnerable in md4c main package versions before 0.4.6: The mentioned macro could provide unexpected results when encountering zero byte in the input text; in some cases leading to broken internal state of the parser. The bug could result in a denial of service and possibly also in other security implications. https://github.com/mity/md4c/issues/130
what vulnarability does md4c version less then 1.0.0 have
Having vulnarability PVE-2021-37725 Advisory: Mdbackup 0.2.0 comes with some bug fixes that made the utility more secure. It introduces the ``Vault secret backend``, where important data (like passwords) can be stored, and the ``File secret backend`` (a fallback secret backend) where secrets are read from the file system directly.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mdbackup version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-37725 Advisory: Mdbackup 0.2.0 comes with some bug fixes that made the utility more secure. It introduces the ``Vault secret backend``, where important data (like passwords) can be stored, and the ``File secret backend`` (a fallback secret backend) where secrets are read from the file system directly.
what vulnarability does mdbackup version less then 0.2.0 have
Having vulnarability PVE-2021-38433 Advisory: Mdcatch 0.9.1 increases security by removing "shell=True". https://github.com/azazellochg/MDCatch/pull/14/commits/c4a6551cdd80d3f3bb9a76bc9e2ee08fcab2e818
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mdcatch version less then 0.9.1 have ### Response: Having vulnarability PVE-2021-38433 Advisory: Mdcatch 0.9.1 increases security by removing "shell=True". https://github.com/azazellochg/MDCatch/pull/14/commits/c4a6551cdd80d3f3bb9a76bc9e2ee08fcab2e818
what vulnarability does mdcatch version less then 0.9.1 have
Having vulnarability PVE-2022-50252 Advisory: Meapi 0.3.8 prevents changes in protected attrs. https://github.com/david-lev/meapi/commit/fb8a90c7050bb3b334e71c4592cf86ec196de289
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does meapi version less then 0.3.8 have ### Response: Having vulnarability PVE-2022-50252 Advisory: Meapi 0.3.8 prevents changes in protected attrs. https://github.com/david-lev/meapi/commit/fb8a90c7050bb3b334e71c4592cf86ec196de289
what vulnarability does meapi version less then 0.3.8 have
Having vulnarability CVE-2023-34457 Advisory: MechanicalSoup is a Python library for automating interaction with websites. Starting in version 0.2.0 and prior to version 1.3.0, a malicious web server can read arbitrary files on the client using a '<input type="file" ...>' inside HTML form. All users of MechanicalSoup's form submission are affected, unless they took very specific (and manual) steps to reset HTML form field values. Version 1.3.0 contains a patch for this issue.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mechanicalsoup version greather then equal to 0.2.0,less then 1.3.0 have ### Response: Having vulnarability CVE-2023-34457 Advisory: MechanicalSoup is a Python library for automating interaction with websites. Starting in version 0.2.0 and prior to version 1.3.0, a malicious web server can read arbitrary files on the client using a '<input type="file" ...>' inside HTML form. All users of MechanicalSoup's form submission are affected, unless they took very specific (and manual) steps to reset HTML form field values. Version 1.3.0 contains a patch for this issue.
what vulnarability does mechanicalsoup version greather then equal to 0.2.0,less then 1.3.0 have
Having vulnarability CVE-2021-32837 Advisory: Mechanize 0.4.6 includes a fix for CVE-2021-32837: Mechanize contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mechanize version less then 0.4.6 have ### Response: Having vulnarability CVE-2021-32837 Advisory: Mechanize 0.4.6 includes a fix for CVE-2021-32837: Mechanize contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize
what vulnarability does mechanize version less then 0.4.6 have
Having vulnarability CVE-2019-11324 Advisory: Megalib 0.9.5alpha updates its dependency 'urllib3' to v1.24.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does megalib version less then 0.9.5alpha have ### Response: Having vulnarability CVE-2019-11324 Advisory: Megalib 0.9.5alpha updates its dependency 'urllib3' to v1.24.2 to include a security fix.
what vulnarability does megalib version less then 0.9.5alpha have
Having vulnarability CVE-2022-37189 Advisory: DDMAL MEI2Volpiano 0.8.2 is vulnerable to XML External Entity (XXE), leading to a Denial of Service. This occurs due to the usage of the unsafe 'xml.etree' library to parse untrusted XML input.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mei2volpiano version less then equal to 0.8.2 have ### Response: Having vulnarability CVE-2022-37189 Advisory: DDMAL MEI2Volpiano 0.8.2 is vulnerable to XML External Entity (XXE), leading to a Denial of Service. This occurs due to the usage of the unsafe 'xml.etree' library to parse untrusted XML input.
what vulnarability does mei2volpiano version less then equal to 0.8.2 have
Having vulnarability PVE-2022-46406 Advisory: Meilisearch (python client) 0.18.3 is compatible with Meilisearch 0.27.0, that sets a limit to filters to avoid a stack overflow crash when using a huge list of filters. https://github.com/meilisearch/meilisearch/issues/1967
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does meilisearch version less then 0.18.3 have ### Response: Having vulnarability PVE-2022-46406 Advisory: Meilisearch (python client) 0.18.3 is compatible with Meilisearch 0.27.0, that sets a limit to filters to avoid a stack overflow crash when using a huge list of filters. https://github.com/meilisearch/meilisearch/issues/1967
what vulnarability does meilisearch version less then 0.18.3 have
Having vulnarability CVE-2020-7658 Advisory: Meinheld prior to 1.0.2 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. See: CVE-2020-7658.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does meinheld version less then 1.0.2 have ### Response: Having vulnarability CVE-2020-7658 Advisory: Meinheld prior to 1.0.2 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. See: CVE-2020-7658.
what vulnarability does meinheld version less then 1.0.2 have
Having vulnarability CVE-2022-24757 Advisory: Mendeleev 0.10.0 updates its dependency 'jupyter-server' to v1.18.1 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mendeleev version less then 0.10.0 have ### Response: Having vulnarability CVE-2022-24757 Advisory: Mendeleev 0.10.0 updates its dependency 'jupyter-server' to v1.18.1 to include security fixes.
what vulnarability does mendeleev version less then 0.10.0 have
Having vulnarability CVE-2023-41040 Advisory: Mentat 0.1.20 updates its dependency 'gitpython' to v3.1.35 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mentat version less then 0.1.20 have ### Response: Having vulnarability CVE-2023-41040 Advisory: Mentat 0.1.20 updates its dependency 'gitpython' to v3.1.35 to include a security fix.
what vulnarability does mentat version less then 0.1.20 have
Having vulnarability CVE-2023-49081 Advisory: Versions of aiohttp before 1.40.1, an asynchronous HTTP client/server framework for asyncio and Python, are susceptible to a vulnerability where improper validation allows an attacker to modify or create a new HTTP request by controlling the HTTP version of the request. This issue specifically affects environments where the attacker has the ability to control the HTTP version.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does meraki version less then 1.40.1 have ### Response: Having vulnarability CVE-2023-49081 Advisory: Versions of aiohttp before 1.40.1, an asynchronous HTTP client/server framework for asyncio and Python, are susceptible to a vulnerability where improper validation allows an attacker to modify or create a new HTTP request by controlling the HTTP version of the request. This issue specifically affects environments where the attacker has the ability to control the HTTP version.
what vulnarability does meraki version less then 1.40.1 have
Having vulnarability CVE-2010-4237 Advisory: Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mercurial version less then 1.6.4 have ### Response: Having vulnarability CVE-2010-4237 Advisory: Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack.
what vulnarability does mercurial version less then 1.6.4 have
Having vulnarability PVE-2021-25888 Advisory: metadataproxy before 1.1.1 has a flaw in the proxy functionality when used in passthrough mode that would expose the host's IAM role credentials when extra paths were added to the end of the security-credentials end-point. metadataproxy will now properly capture any call to iam/security-credentials/<role> and return the scoped credentials, rather than the host's credentials.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metadataproxy version less then 1.1.1 have ### Response: Having vulnarability PVE-2021-25888 Advisory: metadataproxy before 1.1.1 has a flaw in the proxy functionality when used in passthrough mode that would expose the host's IAM role credentials when extra paths were added to the end of the security-credentials end-point. metadataproxy will now properly capture any call to iam/security-credentials/<role> and return the scoped credentials, rather than the host's credentials.
what vulnarability does metadataproxy version less then 1.1.1 have
Having vulnarability CVE-2024-23750 Advisory: MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metagpt version less then 0.6.5 have ### Response: Having vulnarability CVE-2024-23750 Advisory: MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen.
what vulnarability does metagpt version less then 0.6.5 have
Having vulnarability CVE-2022-29217 Advisory: Metakb 1.1.0a8 updates its dependency 'pyjwt' to v2.4.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metakb version less then 1.1.0a8 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Metakb 1.1.0a8 updates its dependency 'pyjwt' to v2.4.0 to include a security fix.
what vulnarability does metakb version less then 1.1.0a8 have