output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2022-49649 Advisory: Metarace 1.11.3 changes 'default_file' to remove a path traversal vulnerability. It discards any path components in file before searching CWD, DEFAULT_PATH and DB_PATH, in that order. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metarace version less then 1.11.3 have ### Response: Having vulnarability PVE-2022-49649 Advisory: Metarace 1.11.3 changes 'default_file' to remove a path traversal vulnerability. It discards any path components in file before searching CWD, DEFAULT_PATH and DB_PATH, in that order. | what vulnarability does metarace version less then 1.11.3 have | |
Having vulnarability PVE-2021-38182 Advisory: Metpx-sarracenia 2.20.4b2 removes recursion in the connection recovery, which was vulnerable to stack exhaustion on long failures.
https://github.com/MetPX/sarracenia/commit/b1b78e1a1fcfe08fe81dee2840aa29d71becda65 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metpx-sarracenia version less then 2.20.4b2 have ### Response: Having vulnarability PVE-2021-38182 Advisory: Metpx-sarracenia 2.20.4b2 removes recursion in the connection recovery, which was vulnerable to stack exhaustion on long failures.
https://github.com/MetPX/sarracenia/commit/b1b78e1a1fcfe08fe81dee2840aa29d71becda65 | what vulnarability does metpx-sarracenia version less then 2.20.4b2 have | |
Having vulnarability CVE-2021-41495 Advisory: Metricflow 0.100.0 updates its dependency 'numpy' to v1.22.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metricflow version less then 0.100.0 have ### Response: Having vulnarability CVE-2021-41495 Advisory: Metricflow 0.100.0 updates its dependency 'numpy' to v1.22.2 to include a security fix. | what vulnarability does metricflow version less then 0.100.0 have | |
Having vulnarability PVE-2021-38645 Advisory: Metron-tagger 1.0.7 uses a more secure SSL context. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does metron-tagger version less then 1.0.7 have ### Response: Having vulnarability PVE-2021-38645 Advisory: Metron-tagger 1.0.7 uses a more secure SSL context. | what vulnarability does metron-tagger version less then 1.0.7 have | |
Having vulnarability PVE-2021-42776 Advisory: Mezzanine 0.10.5 fixes Ajax in admin not using CSRF token for forms.
https://github.com/stephenmcd/mezzanine/commit/2cf8c388305c8121668c186b5a98aa0ec6046c3d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mezzanine version less then 0.10.5 have ### Response: Having vulnarability PVE-2021-42776 Advisory: Mezzanine 0.10.5 fixes Ajax in admin not using CSRF token for forms.
https://github.com/stephenmcd/mezzanine/commit/2cf8c388305c8121668c186b5a98aa0ec6046c3d | what vulnarability does mezzanine version less then 0.10.5 have | |
Having vulnarability PVE-2021-25889 Advisory: In mgp2pdf before 0.10 `%filter`` is enabled by default which is a security risk. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mgp2pdf version less then 0.10 have ### Response: Having vulnarability PVE-2021-25889 Advisory: In mgp2pdf before 0.10 `%filter`` is enabled by default which is a security risk. | what vulnarability does mgp2pdf version less then 0.10 have | |
Having vulnarability PVE-2021-37998 Advisory: Mi 0.2 adds ACL-based security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mi version less then 0.2 have ### Response: Having vulnarability PVE-2021-37998 Advisory: Mi 0.2 adds ACL-based security. | what vulnarability does mi version less then 0.2 have | |
Having vulnarability PVE-2023-58719 Advisory: Mia-accounting 1.5.4 adds safeguard to the next URI utilities to prevent Cross-Site Scripting (XSS) attacks.
https://github.com/imacat/mia-accounting/commit/482a0faa2387863de8201c4c44b8178d293c849f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mia-accounting version less then 1.5.4 have ### Response: Having vulnarability PVE-2023-58719 Advisory: Mia-accounting 1.5.4 adds safeguard to the next URI utilities to prevent Cross-Site Scripting (XSS) attacks.
https://github.com/imacat/mia-accounting/commit/482a0faa2387863de8201c4c44b8178d293c849f | what vulnarability does mia-accounting version less then 1.5.4 have | |
Having vulnarability PVE-2024-64487 Advisory: Miarec-ftpfs 2024.1.2 fixes a potential race condition that could cause connection leakage under certain conditions such as Read-Modify-Write and Check-Then-Act.
https://github.com/miarec/miarec_ftpfs/commit/eb03c3369e53c2ab27760d128be3b2f8b0423b7c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does miarec-ftpfs version less then 2024.1.2 have ### Response: Having vulnarability PVE-2024-64487 Advisory: Miarec-ftpfs 2024.1.2 fixes a potential race condition that could cause connection leakage under certain conditions such as Read-Modify-Write and Check-Then-Act.
https://github.com/miarec/miarec_ftpfs/commit/eb03c3369e53c2ab27760d128be3b2f8b0423b7c | what vulnarability does miarec-ftpfs version less then 2024.1.2 have | |
Having vulnarability PVE-2024-64186 Advisory: Miarec-s3fs 2024.1.1 addresses a race condition that occurred when S3FS was accessed concurrently by multiple threads. This update ensures stable and synchronized access to S3FS resources.
https://github.com/miarec/miarec_s3fs/commit/4508e6333e5aa1e3a8c8c0abe6910cd8881c7551 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does miarec-s3fs version less then 2024.1.1 have ### Response: Having vulnarability PVE-2024-64186 Advisory: Miarec-s3fs 2024.1.1 addresses a race condition that occurred when S3FS was accessed concurrently by multiple threads. This update ensures stable and synchronized access to S3FS resources.
https://github.com/miarec/miarec_s3fs/commit/4508e6333e5aa1e3a8c8c0abe6910cd8881c7551 | what vulnarability does miarec-s3fs version less then 2024.1.1 have | |
Having vulnarability PVE-2024-64486 Advisory: Miarec-sshfs 2024.1.5 fixes a potential race condition that could occur when the SSHFS object was accessed by multiple threads simultaneously. This issue could lead to inconsistent states or unexpected behavior due to simultaneous operations on the same resource.
https://github.com/miarec/miarec_sshfs/commit/fa428029191a4998a01329d1ff8c3a1d58b69cff | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does miarec-sshfs version less then 2024.1.5 have ### Response: Having vulnarability PVE-2024-64486 Advisory: Miarec-sshfs 2024.1.5 fixes a potential race condition that could occur when the SSHFS object was accessed by multiple threads simultaneously. This issue could lead to inconsistent states or unexpected behavior due to simultaneous operations on the same resource.
https://github.com/miarec/miarec_sshfs/commit/fa428029191a4998a01329d1ff8c3a1d58b69cff | what vulnarability does miarec-sshfs version less then 2024.1.5 have | |
Having vulnarability CVE-2023-7152 Advisory: A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does micropython-copy version less then 1.22.0 have ### Response: Having vulnarability CVE-2023-7152 Advisory: A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability. | what vulnarability does micropython-copy version less then 1.22.0 have | |
Having vulnarability CVE-2023-7152 Advisory: A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does micropython-io version less then 1.22.0 have ### Response: Having vulnarability CVE-2023-7152 Advisory: A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability. | what vulnarability does micropython-io version less then 1.22.0 have | |
Having vulnarability CVE-2022-40898 Advisory: Micropython-mdns 1.3.0 updates its dependency 'wheel' to v0.38.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does micropython-mdns version less then 1.3.0 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Micropython-mdns 1.3.0 updates its dependency 'wheel' to v0.38.0 to include a security fix. | what vulnarability does micropython-mdns version less then 1.3.0 have | |
Having vulnarability CVE-2021-41496 Advisory: Microstructpy 1.5.4 updates its dependency 'numpy' to v1.22.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does microstructpy version less then 1.5.4 have ### Response: Having vulnarability CVE-2021-41496 Advisory: Microstructpy 1.5.4 updates its dependency 'numpy' to v1.22.0 to include security fixes. | what vulnarability does microstructpy version less then 1.5.4 have | |
Having vulnarability PVE-2021-41348 Advisory: Mihifepe version 0.2.2 includes security patches for several functions. They contained OS injection vulnerabilities: subprocess call with shell=True.
https://github.com/Craven-Biostat-Lab/mihifepe/commit/b69847025764efc5c6b134c73e18fcfb11b42e0f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mihifepe version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-41348 Advisory: Mihifepe version 0.2.2 includes security patches for several functions. They contained OS injection vulnerabilities: subprocess call with shell=True.
https://github.com/Craven-Biostat-Lab/mihifepe/commit/b69847025764efc5c6b134c73e18fcfb11b42e0f | what vulnarability does mihifepe version less then 0.2.2 have | |
Having vulnarability PVE-2021-40159 Advisory: Mikado 2.1.0 removes unsafe calls to 'tempfile.mktemp' and other such files, for increased security according to CodeQL. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mikado version less then 2.1.0 have ### Response: Having vulnarability PVE-2021-40159 Advisory: Mikado 2.1.0 removes unsafe calls to 'tempfile.mktemp' and other such files, for increased security according to CodeQL. | what vulnarability does mikado version less then 2.1.0 have | |
Having vulnarability CVE-2023-28432 Advisory: Milvus 2.2.6 (lightweight version of Milvus) includes a binary of Milvus version 2.2.5, that includes a security fix.
https://github.com/milvus-io/milvus-lite/commit/4aa88881e44c91b6e1c5e89f3a88e61c80054eff
https://github.com/milvus-io/milvus/issues/22980 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does milvus version less then 2.2.6 have ### Response: Having vulnarability CVE-2023-28432 Advisory: Milvus 2.2.6 (lightweight version of Milvus) includes a binary of Milvus version 2.2.5, that includes a security fix.
https://github.com/milvus-io/milvus-lite/commit/4aa88881e44c91b6e1c5e89f3a88e61c80054eff
https://github.com/milvus-io/milvus/issues/22980 | what vulnarability does milvus version less then 2.2.6 have | |
Having vulnarability CVE-2022-24303 Advisory: Mindee 2.0.1 updates its dependency 'Pillow' to v9.0.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mindee version less then 2.0.1 have ### Response: Having vulnarability CVE-2022-24303 Advisory: Mindee 2.0.1 updates its dependency 'Pillow' to v9.0.1 to include security fixes. | what vulnarability does mindee version less then 2.0.1 have | |
Having vulnarability CVE-2022-23522 Advisory: MindsDB is an open source machine learning platform. An unsafe extraction is being performed using `shutil.unpack_archive()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. This vulnerability is sometimes called a **TarSlip** or a **ZipSlip variant**. Unpacking files using the high-level function `shutil.unpack_archive()` from a potentially malicious tarball without validating that the destination file path remained within the intended destination directory may cause files to be overwritten outside the destination directory. An attacker could craft a malicious tarball with a filename path and then serve the archive remotely using a personal bucket `s3`, thus, retrieve the tarball through **mindsdb** and overwrite the system files of the hosting server. This issue has been addressed in version 22.11.4.3. Users are advised to upgrade. Users unable to upgrade should avoid ingesting archives from untrusted sources.
Alias(es):
GHSA-7x45-phmr-9wqp
PYSEC-2023-26 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mindsdb version less then 22.11.4.3 have ### Response: Having vulnarability CVE-2022-23522 Advisory: MindsDB is an open source machine learning platform. An unsafe extraction is being performed using `shutil.unpack_archive()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. This vulnerability is sometimes called a **TarSlip** or a **ZipSlip variant**. Unpacking files using the high-level function `shutil.unpack_archive()` from a potentially malicious tarball without validating that the destination file path remained within the intended destination directory may cause files to be overwritten outside the destination directory. An attacker could craft a malicious tarball with a filename path and then serve the archive remotely using a personal bucket `s3`, thus, retrieve the tarball through **mindsdb** and overwrite the system files of the hosting server. This issue has been addressed in version 22.11.4.3. Users are advised to upgrade. Users unable to upgrade should avoid ingesting archives from untrusted sources.
Alias(es):
GHSA-7x45-phmr-9wqp
PYSEC-2023-26 | what vulnarability does mindsdb version less then 22.11.4.3 have | |
Having vulnarability CVE-2020-15358 Advisory: Mindspore 0.5.0-beta updates its dependency "Sqlite" to version 3.32.2, to handle CVE-2020-15358. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mindspore version less then 0.5.0-beta have ### Response: Having vulnarability CVE-2020-15358 Advisory: Mindspore 0.5.0-beta updates its dependency "Sqlite" to version 3.32.2, to handle CVE-2020-15358. | what vulnarability does mindspore version less then 0.5.0-beta have | |
Having vulnarability PVE-2021-33048 Advisory: mini-amf before 0.8 is vulnerable to XML entity attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mini-amf version less then 0.8 have ### Response: Having vulnarability PVE-2021-33048 Advisory: mini-amf before 0.8 is vulnerable to XML entity attacks. | what vulnarability does mini-amf version less then 0.8 have | |
Having vulnarability CVE-2020-15251 Advisory: Mirahezebot-plugins 9.0.2 includes a fix for CVE-2020-15251: In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2.
https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mirahezebot-plugins version greather then equal to 9.0.0,less then 9.0.2 have ### Response: Having vulnarability CVE-2020-15251 Advisory: Mirahezebot-plugins 9.0.2 includes a fix for CVE-2020-15251: In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2.
https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5 | what vulnarability does mirahezebot-plugins version greather then equal to 9.0.0,less then 9.0.2 have | |
Having vulnarability PVE-2022-45162 Advisory: Misago 0.14.0 handles maliciously constructed quasi urls sent to login view that passed 'is_safe_url' and crashed redirect().
https://github.com/rafalp/Misago/issues/943 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does misago version less then 0.14.0 have ### Response: Having vulnarability PVE-2022-45162 Advisory: Misago 0.14.0 handles maliciously constructed quasi urls sent to login view that passed 'is_safe_url' and crashed redirect().
https://github.com/rafalp/Misago/issues/943 | what vulnarability does misago version less then 0.14.0 have | |
Having vulnarability CVE-2017-18342 Advisory: mishmash 0.3b12 - Pyaml >= 4.2b1 for security alert. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mishmash version less then 0.3b12 have ### Response: Having vulnarability CVE-2017-18342 Advisory: mishmash 0.3b12 - Pyaml >= 4.2b1 for security alert. | what vulnarability does mishmash version less then 0.3b12 have | |
Having vulnarability CVE-2020-12889 Advisory: Misp-maltego 1.4.5 resolves an information disclosure vulnerability when using MISP-maltego as remote transform server. The transform server would cache the MISP credentials of the first user connected, and provide access to that MISP instance for any later user. See: CVE-2020-12889. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does misp-maltego version less then 1.4.5 have ### Response: Having vulnarability CVE-2020-12889 Advisory: Misp-maltego 1.4.5 resolves an information disclosure vulnerability when using MISP-maltego as remote transform server. The transform server would cache the MISP credentials of the first user connected, and provide access to that MISP instance for any later user. See: CVE-2020-12889. | what vulnarability does misp-maltego version less then 1.4.5 have | |
Having vulnarability CVE-2018-16849 Advisory: Mistral 7.0.1 includes a fix for CVE-2018-16849: By manipulating the SSH private key filename, the std.ssh action can be used to disclose the presence of arbitrary files within the filesystem of the executor running the action. Since std.ssh private_key_filename can take an absolute path, it can be used to assess whether or not a file exists on the executor's filesystem. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mistral version less then 7.0.1 have ### Response: Having vulnarability CVE-2018-16849 Advisory: Mistral 7.0.1 includes a fix for CVE-2018-16849: By manipulating the SSH private key filename, the std.ssh action can be used to disclose the presence of arbitrary files within the filesystem of the executor running the action. Since std.ssh private_key_filename can take an absolute path, it can be used to assess whether or not a file exists on the executor's filesystem. | what vulnarability does mistral version less then 7.0.1 have | |
Having vulnarability PVE-2021-25890 Advisory: Mistune before 0.7.2 is vulnerable to an XSS attack. It is possible to bypass the renderer's link security check.
https://github.com/lepture/mistune/issues/87 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mistune version less then 0.7.2 have ### Response: Having vulnarability PVE-2021-25890 Advisory: Mistune before 0.7.2 is vulnerable to an XSS attack. It is possible to bypass the renderer's link security check.
https://github.com/lepture/mistune/issues/87 | what vulnarability does mistune version less then 0.7.2 have | |
Having vulnarability CVE-2020-26215 Advisory: Mitiq 0.4.0 updates notebook version in requirements to resolve a vulnerability. See CVE-2020-26215.
https://github.com/unitaryfund/mitiq/pull/445 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitiq version less then 0.4.0 have ### Response: Having vulnarability CVE-2020-26215 Advisory: Mitiq 0.4.0 updates notebook version in requirements to resolve a vulnerability. See CVE-2020-26215.
https://github.com/unitaryfund/mitiq/pull/445 | what vulnarability does mitiq version less then 0.4.0 have | |
Having vulnarability PVE-2021-25891 Advisory: Mitmproxy before 0.17 has a XSS vulnerability in HTTP errors.
https://github.com/mitmproxy/mitmproxy/pull/1066 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitmproxy version less then 0.17 have ### Response: Having vulnarability PVE-2021-25891 Advisory: Mitmproxy before 0.17 has a XSS vulnerability in HTTP errors.
https://github.com/mitmproxy/mitmproxy/pull/1066 | what vulnarability does mitmproxy version less then 0.17 have | |
Having vulnarability PVE-2022-47801 Advisory: Mitmproxy-iframe is a malicious package, typosquatting. It contains an "artificially introduced" code execution vulnerability.
https://www.bleepingcomputer.com/news/security/pypi-removes-mitmproxy2-over-code-execution-concerns/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitmproxy-iframe version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47801 Advisory: Mitmproxy-iframe is a malicious package, typosquatting. It contains an "artificially introduced" code execution vulnerability.
https://www.bleepingcomputer.com/news/security/pypi-removes-mitmproxy2-over-code-execution-concerns/ | what vulnarability does mitmproxy-iframe version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45479 Advisory: Mitmproxy2 is a malicious package, typosquatting. It contains an "artificially introduced" code execution vulnerability.
https://www.bleepingcomputer.com/news/security/pypi-removes-mitmproxy2-over-code-execution-concerns/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitmproxy2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45479 Advisory: Mitmproxy2 is a malicious package, typosquatting. It contains an "artificially introduced" code execution vulnerability.
https://www.bleepingcomputer.com/news/security/pypi-removes-mitmproxy2-over-code-execution-concerns/ | what vulnarability does mitmproxy2 version greather then 0,less then 0 have | |
Having vulnarability CVE-2019-15149 Advisory: Mitogen 0.2.8 includes a fix for CVE-2019-15149: core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism.
https://github.com/mitogen-hq/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitogen version greather then equal to 0,less then 0.2.8 have ### Response: Having vulnarability CVE-2019-15149 Advisory: Mitogen 0.2.8 includes a fix for CVE-2019-15149: core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism.
https://github.com/mitogen-hq/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc | what vulnarability does mitogen version greather then equal to 0,less then 0.2.8 have | |
Having vulnarability PVE-2023-62797 Advisory: Mitsuba 0.4.0 fixes a race condition in `jit_sync_thread()` which can corrupt internal
nanothread data structures.
https://github.com/mitsuba-renderer/drjit-core/commit/6690923505cb4fca3fb7d75b2e1705008c0af738 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mitsuba version less then 0.4.0 have ### Response: Having vulnarability PVE-2023-62797 Advisory: Mitsuba 0.4.0 fixes a race condition in `jit_sync_thread()` which can corrupt internal
nanothread data structures.
https://github.com/mitsuba-renderer/drjit-core/commit/6690923505cb4fca3fb7d75b2e1705008c0af738 | what vulnarability does mitsuba version less then 0.4.0 have | |
Having vulnarability PVE-2021-25892 Advisory: mixminion before 0.0.2 is vulnerable to certain trivial DoS attacks. In particular, it's possible to send zlib bombs or flood a server with open connections. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mixminion version less then 0.0.2 have ### Response: Having vulnarability PVE-2021-25892 Advisory: mixminion before 0.0.2 is vulnerable to certain trivial DoS attacks. In particular, it's possible to send zlib bombs or flood a server with open connections. | what vulnarability does mixminion version less then 0.0.2 have | |
Having vulnarability CVE-2024-26151 Advisory: The `mjml` PyPI package, found at the `FelixSchwarz/mjml-python` GitHub repo, is an unofficial Python port of MJML, a markup language created by Mailjet. All users of `FelixSchwarz/mjml-python` who insert untrusted data into mjml templates unless that data is checked in a very strict manner. User input like `<script>` would be rendered as `<script>` in the final HTML output. The attacker must be able to control some data which is later injected in an mjml template which is then send out as email to other users. The attacker could control contents of email messages sent through the platform. The problem has been fixed in version 0.11.0 of this library. Versions before 0.10.0 are not affected by this security issue. As a workaround, ensure that potentially untrusted user input does not contain any sequences which could be rendered as HTML. See CVE-2024-26151. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mjml version greather then 0.10.0 ,less then 0.11.0 have ### Response: Having vulnarability CVE-2024-26151 Advisory: The `mjml` PyPI package, found at the `FelixSchwarz/mjml-python` GitHub repo, is an unofficial Python port of MJML, a markup language created by Mailjet. All users of `FelixSchwarz/mjml-python` who insert untrusted data into mjml templates unless that data is checked in a very strict manner. User input like `<script>` would be rendered as `<script>` in the final HTML output. The attacker must be able to control some data which is later injected in an mjml template which is then send out as email to other users. The attacker could control contents of email messages sent through the platform. The problem has been fixed in version 0.11.0 of this library. Versions before 0.10.0 are not affected by this security issue. As a workaround, ensure that potentially untrusted user input does not contain any sequences which could be rendered as HTML. See CVE-2024-26151. | what vulnarability does mjml version greather then 0.10.0 ,less then 0.11.0 have | |
Having vulnarability PVE-2022-47794 Advisory: Mkdocs 1.3.0 fixes an XSS vulnerability which was present when using the search function in built-in themes.
https://github.com/mkdocs/mkdocs/commit/5cf196361bb0f8364f667ed98888ffa064982efa | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mkdocs version less then 1.3.0 have ### Response: Having vulnarability PVE-2022-47794 Advisory: Mkdocs 1.3.0 fixes an XSS vulnerability which was present when using the search function in built-in themes.
https://github.com/mkdocs/mkdocs/commit/5cf196361bb0f8364f667ed98888ffa064982efa | what vulnarability does mkdocs version less then 1.3.0 have | |
Having vulnarability PVE-2021-32121 Advisory: mkdocs-material before 1.0.0 uses _blank targets on links which make it vulnerable to Cross Site Scripting attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mkdocs-material version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-32121 Advisory: mkdocs-material before 1.0.0 uses _blank targets on links which make it vulnerable to Cross Site Scripting attacks. | what vulnarability does mkdocs-material version less then 1.0.0 have | |
Having vulnarability CVE-2022-33000 Advisory: The ML-Scanner package in PyPI v0.1.0 to v0.1.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ml-scanner version greather then equal to 0.1.0,less then 0.1.7 have ### Response: Having vulnarability CVE-2022-33000 Advisory: The ML-Scanner package in PyPI v0.1.0 to v0.1.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does ml-scanner version greather then equal to 0.1.0,less then 0.1.7 have | |
Having vulnarability CVE-2017-18342 Advisory: Ml-Versioning-Tools 2.0.1 includes a security patch for the function 'get_dvc_meta' in 'mlvtools/mlv_dvc/dvc_parser.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/peopledoc/mlvtools/commit/8a18faaea26c0fc93dad15f03b8e9b81473a4120 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ml-versioning-tools version less then 2.0.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Ml-Versioning-Tools 2.0.1 includes a security patch for the function 'get_dvc_meta' in 'mlvtools/mlv_dvc/dvc_parser.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/peopledoc/mlvtools/commit/8a18faaea26c0fc93dad15f03b8e9b81473a4120 | what vulnarability does ml-versioning-tools version less then 2.0.1 have | |
Having vulnarability CVE-2017-16615 Advisory: An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mlalchemy version less then 0.2.2 have ### Response: Having vulnarability CVE-2017-16615 Advisory: An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability. | what vulnarability does mlalchemy version less then 0.2.2 have | |
Having vulnarability CVE-2020-14343 Advisory: Mlconjug3 3.7.16 updates its dependency "pyyaml" to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mlconjug3 version less then 3.7.16 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Mlconjug3 3.7.16 updates its dependency "pyyaml" to include a security fix. | what vulnarability does mlconjug3 version less then 3.7.16 have | |
Having vulnarability PVE-2021-39705 Advisory: Mlf-core 1.10.0 includes a fix for insecure MD5 (from Bandit report). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mlf-core version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-39705 Advisory: Mlf-core 1.10.0 includes a fix for insecure MD5 (from Bandit report). | what vulnarability does mlf-core version less then 1.10.0 have | |
Having vulnarability CVE-2023-30172 Advisory: Mlflow 2.0.0rc0 includes a fix for a Directory Traversal vulnerability. The directory traversal vulnerability in the /get-artifact API method allows attackers to read arbitrary files on the server via the path parameter.
https://github.com/advisories/GHSA-wc6j-5g83-xfm6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mlflow version less then 2.0.0rc0 have ### Response: Having vulnarability CVE-2023-30172 Advisory: Mlflow 2.0.0rc0 includes a fix for a Directory Traversal vulnerability. The directory traversal vulnerability in the /get-artifact API method allows attackers to read arbitrary files on the server via the path parameter.
https://github.com/advisories/GHSA-wc6j-5g83-xfm6 | what vulnarability does mlflow version less then 2.0.0rc0 have | |
Having vulnarability PVE-2022-45475 Advisory: Mllearnlib is a malicious package, typosquatting. It installs cryptomining malware in your system.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mllearnlib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45475 Advisory: Mllearnlib is a malicious package, typosquatting. It installs cryptomining malware in your system.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/ | what vulnarability does mllearnlib version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-42973 Advisory: Mlrun 0.9.0rc7 fixes the encoding of project secrets.
https://github.com/mlrun/mlrun/pull/1536 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mlrun version less then 0.9.0rc7 have ### Response: Having vulnarability PVE-2021-42973 Advisory: Mlrun 0.9.0rc7 fixes the encoding of project secrets.
https://github.com/mlrun/mlrun/pull/1536 | what vulnarability does mlrun version less then 0.9.0rc7 have | |
Having vulnarability CVE-2023-35625 Advisory: Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mltable version less then 1.5.0 have ### Response: Having vulnarability CVE-2023-35625 Advisory: Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability. | what vulnarability does mltable version less then 1.5.0 have | |
Having vulnarability CVE-2022-25882 Advisory: Mmdeploy 1.0.0 updates its dependency 'onnx' requirement to '>=1.13.0' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mmdeploy version less then 1.0.0 have ### Response: Having vulnarability CVE-2022-25882 Advisory: Mmdeploy 1.0.0 updates its dependency 'onnx' requirement to '>=1.13.0' to include a security fix. | what vulnarability does mmdeploy version less then 1.0.0 have | |
Having vulnarability PVE-2023-62494 Advisory: Mmgen-wallet 0.9.7 includes a security fix: An infected online MMGen installation could craft a special TX file to trick an offline signing MMGen into executing an arbitrary expression.
https://github.com/mmgen/mmgen-wallet/commit/6b9df0ea44bcc749fe26bb98b1098c81adf18c34 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mmgen-wallet version less then 0.9.7 have ### Response: Having vulnarability PVE-2023-62494 Advisory: Mmgen-wallet 0.9.7 includes a security fix: An infected online MMGen installation could craft a special TX file to trick an offline signing MMGen into executing an arbitrary expression.
https://github.com/mmgen/mmgen-wallet/commit/6b9df0ea44bcc749fe26bb98b1098c81adf18c34 | what vulnarability does mmgen-wallet version less then 0.9.7 have | |
Having vulnarability CVE-2017-12600 Advisory: Mmocr 0.6.1 restricts the minimum version of its requirement 'opencv-python' to '>=4.2.0.32' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mmocr version less then 0.6.1 have ### Response: Having vulnarability CVE-2017-12600 Advisory: Mmocr 0.6.1 restricts the minimum version of its requirement 'opencv-python' to '>=4.2.0.32' to include security fixes. | what vulnarability does mmocr version less then 0.6.1 have | |
Having vulnarability CVE-2021-27515 Advisory: Mmpm 2.13 updates its NPM dependency 'url-parse' to v1.5.10 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mmpm version less then 2.13 have ### Response: Having vulnarability CVE-2021-27515 Advisory: Mmpm 2.13 updates its NPM dependency 'url-parse' to v1.5.10 to include security fixes. | what vulnarability does mmpm version less then 2.13 have | |
Having vulnarability CVE-2007-4559 Advisory: Mobsf 3.6.0 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mobsf version less then 3.6.0 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Mobsf 3.6.0 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does mobsf version less then 3.6.0 have | |
Having vulnarability PVE-2021-39463 Advisory: Mockintosh 0.4 adds the ability to refer to external files (containing request and response bodies) and makes it secure by disallowing files outside the mock config hierarchy. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mockintosh version less then 0.4 have ### Response: Having vulnarability PVE-2021-39463 Advisory: Mockintosh 0.4 adds the ability to refer to external files (containing request and response bodies) and makes it secure by disallowing files outside the mock config hierarchy. | what vulnarability does mockintosh version less then 0.4 have | |
Having vulnarability PVE-2021-25893 Advisory: Mockup before 2.1.3 has a XSS vulnerability in structure and relateditem patterns.
https://github.com/plone/mockup/pull/629
https://github.com/plone/mockup/pull/627 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mockup version less then 2.1.3 have ### Response: Having vulnarability PVE-2021-25893 Advisory: Mockup before 2.1.3 has a XSS vulnerability in structure and relateditem patterns.
https://github.com/plone/mockup/pull/629
https://github.com/plone/mockup/pull/627 | what vulnarability does mockup version less then 2.1.3 have | |
Having vulnarability CVE-2014-0242 Advisory: mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mod-wsgi version less then 3.4 have ### Response: Having vulnarability CVE-2014-0242 Advisory: mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. | what vulnarability does mod-wsgi version less then 3.4 have | |
Having vulnarability CVE-2023-37920 Advisory: Modelsight 0.3.1 updates its dependency 'certifi' to v2023.7.22 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does modelsight version less then 0.3.1 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Modelsight 0.3.1 updates its dependency 'certifi' to v2023.7.22 to include a security fix. | what vulnarability does modelsight version less then 0.3.1 have | |
Having vulnarability CVE-2022-1941 Advisory: Modelstore 0.0.76 updates its dependency 'protobuf' to v3.19.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does modelstore version less then 0.0.76 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Modelstore 0.0.76 updates its dependency 'protobuf' to v3.19.5 to include a security fix. | what vulnarability does modelstore version less then 0.0.76 have | |
Having vulnarability PVE-2023-60612 Advisory: Modin 0.15.0 includes a fix for a Race Condition vulnerability.
https://github.com/modin-project/modin/pull/4533 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does modin version less then 0.15.0 have ### Response: Having vulnarability PVE-2023-60612 Advisory: Modin 0.15.0 includes a fix for a Race Condition vulnerability.
https://github.com/modin-project/modin/pull/4533 | what vulnarability does modin version less then 0.15.0 have | |
Having vulnarability CVE-2023-0777 Advisory: Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does modoboa version less then 2.0.4 have ### Response: Having vulnarability CVE-2023-0777 Advisory: Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4. | what vulnarability does modoboa version less then 2.0.4 have | |
Having vulnarability CVE-2019-19702 Advisory: The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this to perform a denial of service against the DMARC reporting functionality, such as by referencing the /dev/random file within XML documents that are emailed to the address in the rua field of the DMARC records of a domain. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does modoboa-dmarc version greather then equal to 0,less then 1.2.0 have ### Response: Having vulnarability CVE-2019-19702 Advisory: The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this to perform a denial of service against the DMARC reporting functionality, such as by referencing the /dev/random file within XML documents that are emailed to the address in the rua field of the DMARC records of a domain. | what vulnarability does modoboa-dmarc version greather then equal to 0,less then 1.2.0 have | |
Having vulnarability PVE-2023-53444 Advisory: Modoboa-webmail 1.7.2 fixes XSS vulnerabilities.
https://github.com/modoboa/modoboa-webmail/pull/245
https://github.com/modoboa/modoboa-webmail/pull/244 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does modoboa-webmail version less then 1.7.2 have ### Response: Having vulnarability PVE-2023-53444 Advisory: Modoboa-webmail 1.7.2 fixes XSS vulnerabilities.
https://github.com/modoboa/modoboa-webmail/pull/245
https://github.com/modoboa/modoboa-webmail/pull/244 | what vulnarability does modoboa-webmail version less then 1.7.2 have | |
Having vulnarability CVE-2017-1002157 Advisory: modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does modulemd version greather then equal to 0,less then 1.3.2 have ### Response: Having vulnarability CVE-2017-1002157 Advisory: modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution. | what vulnarability does modulemd version greather then equal to 0,less then 1.3.2 have | |
Having vulnarability PVE-2023-52907 Advisory: Modulesecurity is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does modulesecurity version greather then 0 have ### Response: Having vulnarability PVE-2023-52907 Advisory: Modulesecurity is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does modulesecurity version greather then 0 have | |
Having vulnarability CVE-2013-1664 Advisory: Mofh 1.0.1 includes a security fix: Improper Restriction of XML External Entity Reference in mofh.
https://github.com/Wallvon/mofh/security/advisories/GHSA-7r9x-qrpr-3cxw | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mofh version less then 1.0.1 have ### Response: Having vulnarability CVE-2013-1664 Advisory: Mofh 1.0.1 includes a security fix: Improper Restriction of XML External Entity Reference in mofh.
https://github.com/Wallvon/mofh/security/advisories/GHSA-7r9x-qrpr-3cxw | what vulnarability does mofh version less then 1.0.1 have | |
Having vulnarability CVE-2007-0857 Advisory: Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin before 1.5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the page info, or the page name in a (2) AttachFile, (3) RenamePage, or (4) LocalSiteMap action. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does moin version less then 1.5.7 have ### Response: Having vulnarability CVE-2007-0857 Advisory: Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin before 1.5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the page info, or the page name in a (2) AttachFile, (3) RenamePage, or (4) LocalSiteMap action. | what vulnarability does moin version less then 1.5.7 have | |
Having vulnarability CVE-2018-18074 Advisory: Mollie-api-python 2.0.4 updates requests to v2.20.0 because of a vulnerability in previous versions. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mollie-api-python version less then 2.0.4 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Mollie-api-python 2.0.4 updates requests to v2.20.0 because of a vulnerability in previous versions. | what vulnarability does mollie-api-python version less then 2.0.4 have | |
Having vulnarability CVE-2022-40897 Advisory: Monai-generative version 0.2.0 upgrades its setuptools requirement to versions greater than 65.5.0 but less than 66.0.0. This adjustment is in response to the security vulnerability CVE-2022-40897, moving away from the broader previous range of >=50.3.0 to <66.0.0, excluding version 60.6.0.
https://github.com/Project-MONAI/GenerativeModels/pull/360/commits/09a95e4a5b313b4854c837b675b240c7f39226c9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does monai-generative version less then 0.2.0 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Monai-generative version 0.2.0 upgrades its setuptools requirement to versions greater than 65.5.0 but less than 66.0.0. This adjustment is in response to the security vulnerability CVE-2022-40897, moving away from the broader previous range of >=50.3.0 to <66.0.0, excluding version 60.6.0.
https://github.com/Project-MONAI/GenerativeModels/pull/360/commits/09a95e4a5b313b4854c837b675b240c7f39226c9 | what vulnarability does monai-generative version less then 0.2.0 have | |
Having vulnarability PVE-2022-50984 Advisory: Monero 1.0.2 contains an urgent security update in the output recognition code. This affects users using the module for scanning transactions and identifying outputs using the secret view key. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does monero version less then 1.0.2 have ### Response: Having vulnarability PVE-2022-50984 Advisory: Monero 1.0.2 contains an urgent security update in the output recognition code. This affects users using the module for scanning transactions and identifying outputs using the secret view key. | what vulnarability does monero version less then 1.0.2 have | |
Having vulnarability CVE-2020-25659 Advisory: Money-to-prisoners-common version 12.0.1 updates its dependency "cryptography" minimum requirement to v3.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does money-to-prisoners-common version less then 12.0.1 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Money-to-prisoners-common version 12.0.1 updates its dependency "cryptography" minimum requirement to v3.2 to include a security fix. | what vulnarability does money-to-prisoners-common version less then 12.0.1 have | |
Having vulnarability CVE-2024-1135 Advisory: Monopyly 1.4.6 has updated its dependencies, including a significant security upgrade for gunicorn from version 21.2.0 to 22.0.0. This change addresses a security vulnerability detailed in CVE-2024-1135. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does monopyly version less then 1.4.6 have ### Response: Having vulnarability CVE-2024-1135 Advisory: Monopyly 1.4.6 has updated its dependencies, including a significant security upgrade for gunicorn from version 21.2.0 to 22.0.0. This change addresses a security vulnerability detailed in CVE-2024-1135. | what vulnarability does monopyly version less then 1.4.6 have | |
Having vulnarability CVE-2021-25288 Advisory: Monoshape 1.2 includes a vulnerable version of Pillow (6.2). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does monoshape version less then 1.2 have ### Response: Having vulnarability CVE-2021-25288 Advisory: Monoshape 1.2 includes a vulnerable version of Pillow (6.2). | what vulnarability does monoshape version less then 1.2 have | |
Having vulnarability PVE-2022-50622 Advisory: Monzo-api 0.1.5 removes secrets from log files for security reasons.
https://github.com/petermcd/monzo-api/commit/980b26f4556ef3a02f4a510198a605d24dbbda24 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does monzo-api version less then 0.1.5 have ### Response: Having vulnarability PVE-2022-50622 Advisory: Monzo-api 0.1.5 removes secrets from log files for security reasons.
https://github.com/petermcd/monzo-api/commit/980b26f4556ef3a02f4a510198a605d24dbbda24 | what vulnarability does monzo-api version less then 0.1.5 have | |
Having vulnarability PVE-2021-37281 Advisory: Mopidy-jellyfin 0.3.1 addresses a security vulnerability in one of its dependencies. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mopidy-jellyfin version less then 0.3.1 have ### Response: Having vulnarability PVE-2021-37281 Advisory: Mopidy-jellyfin 0.3.1 addresses a security vulnerability in one of its dependencies. | what vulnarability does mopidy-jellyfin version less then 0.3.1 have | |
Having vulnarability PVE-2022-49499 Advisory: More.jwtauth 0.9 passes algorithm explicit to 'jwt.decode()' to avoid access control bypass vulnerabilities.
https://github.com/morepath/more.jwtauth/commit/4e98a1417897f94195dc1a75ecfe3b5ec9fed905 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does more.jwtauth version less then 0.9 have ### Response: Having vulnarability PVE-2022-49499 Advisory: More.jwtauth 0.9 passes algorithm explicit to 'jwt.decode()' to avoid access control bypass vulnerabilities.
https://github.com/morepath/more.jwtauth/commit/4e98a1417897f94195dc1a75ecfe3b5ec9fed905 | what vulnarability does more.jwtauth version less then 0.9 have | |
Having vulnarability PVE-2021-25895 Advisory: morepath before 0.14 has no host header validation to protect against header poisoning attacks.
https://github.com/morepath/morepath/commit/5d94ce6e519670e82c5d03fc77d6292035793d9f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does morepath version less then 0.14 have ### Response: Having vulnarability PVE-2021-25895 Advisory: morepath before 0.14 has no host header validation to protect against header poisoning attacks.
https://github.com/morepath/morepath/commit/5d94ce6e519670e82c5d03fc77d6292035793d9f | what vulnarability does morepath version less then 0.14 have | |
Having vulnarability PVE-2021-38277 Advisory: Mortimer 0.4.5 further increases the data protection and data security through an improved handling of access to the alfred database from inside experiments. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mortimer version less then 0.4.5 have ### Response: Having vulnarability PVE-2021-38277 Advisory: Mortimer 0.4.5 further increases the data protection and data security through an improved handling of access to the alfred database from inside experiments. | what vulnarability does mortimer version less then 0.4.5 have | |
Having vulnarability PVE-2021-44525 Advisory: Mosaicml 0.13.0 updates its dependency 'pillow' to v9.0.0 in Dockerfile to include security fixes.
https://github.com/mosaicml/composer/pull/2007 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mosaicml version less then 0.13.0 have ### Response: Having vulnarability PVE-2021-44525 Advisory: Mosaicml 0.13.0 updates its dependency 'pillow' to v9.0.0 in Dockerfile to include security fixes.
https://github.com/mosaicml/composer/pull/2007 | what vulnarability does mosaicml version less then 0.13.0 have | |
Having vulnarability PVE-2023-62851 Advisory: Mosaicml-streaming 0.7.2 updates pyarrow explicitly installing versions over 14.0.0 to fix for CVE-2023-47248 which affects PyArrow versions below 14.0.0.
https://github.com/mosaicml/streaming/pull/504 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mosaicml-streaming version less then 0.7.2 have ### Response: Having vulnarability PVE-2023-62851 Advisory: Mosaicml-streaming 0.7.2 updates pyarrow explicitly installing versions over 14.0.0 to fix for CVE-2023-47248 which affects PyArrow versions below 14.0.0.
https://github.com/mosaicml/streaming/pull/504 | what vulnarability does mosaicml-streaming version less then 0.7.2 have | |
Having vulnarability PVE-2022-44921 Advisory: Mosec 0.3.2 updates its rust dependencies 'thread_local' and 'tracing-subscriber' to include security fixes.
https://github.com/mosecorg/mosec/issues/116 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mosec version less then 0.3.2 have ### Response: Having vulnarability PVE-2022-44921 Advisory: Mosec 0.3.2 updates its rust dependencies 'thread_local' and 'tracing-subscriber' to include security fixes.
https://github.com/mosecorg/mosec/issues/116 | what vulnarability does mosec version less then 0.3.2 have | |
Having vulnarability PVE-2022-45165 Advisory: Mosql 0.1.6 avoids injection attacks from identifier by delimiting it.
https://github.com/moskytw/mosql/commit/c4a591701bea1f27648bbda238e813c5aa3eec5c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mosql version less then 0.1.6 have ### Response: Having vulnarability PVE-2022-45165 Advisory: Mosql 0.1.6 avoids injection attacks from identifier by delimiting it.
https://github.com/moskytw/mosql/commit/c4a591701bea1f27648bbda238e813c5aa3eec5c | what vulnarability does mosql version less then 0.1.6 have | |
Having vulnarability PVE-2021-42718 Advisory: Motionblinds 0.5.7 hides sensitive information from logs.
https://github.com/starkillerOG/motion-blinds/commit/716af4bbfcbf8001b30629427e37d02c37e40233 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does motionblinds version less then 0.5.7 have ### Response: Having vulnarability PVE-2021-42718 Advisory: Motionblinds 0.5.7 hides sensitive information from logs.
https://github.com/starkillerOG/motion-blinds/commit/716af4bbfcbf8001b30629427e37d02c37e40233 | what vulnarability does motionblinds version less then 0.5.7 have | |
Having vulnarability CVE-2021-44255 Advisory: MotionEye 0.42.1 and prior are affected by CVE-2021-44255: Authenticated remote code execution in MotionEye<= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
https://github.com/ccrisan/motioneyeos/issues/2843 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does motioneye version less then equal to 0.42.1 have ### Response: Having vulnarability CVE-2021-44255 Advisory: MotionEye 0.42.1 and prior are affected by CVE-2021-44255: Authenticated remote code execution in MotionEye<= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
https://github.com/ccrisan/motioneyeos/issues/2843 | what vulnarability does motioneye version less then equal to 0.42.1 have | |
Having vulnarability CVE-2018-10903 Advisory: Moto 1.3.7 updates a dependency (cryptography) with a known security vulnerability (CVE-2018-10903).
https://github.com/spulec/moto/issues/1839 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does moto version less then 1.3.7 have ### Response: Having vulnarability CVE-2018-10903 Advisory: Moto 1.3.7 updates a dependency (cryptography) with a known security vulnerability (CVE-2018-10903).
https://github.com/spulec/moto/issues/1839 | what vulnarability does moto version less then 1.3.7 have | |
Having vulnarability CVE-2022-23491 Advisory: Mouser 0.1.5 updates its dependency 'certifi' to include a fix for a vulnerability.
https://github.com/sparkmicro/mouser-api/commit/55cc4cf246f314795dbc18202ecfe493d64888fe | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mouser version less then 0.1.5 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Mouser 0.1.5 updates its dependency 'certifi' to include a fix for a vulnerability.
https://github.com/sparkmicro/mouser-api/commit/55cc4cf246f314795dbc18202ecfe493d64888fe | what vulnarability does mouser version less then 0.1.5 have | |
Having vulnarability CVE-2022-2309 Advisory: Mpd-parser 0.0.5 updates its dependency 'lxml' to v4.9.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mpd-parser version less then 0.0.5 have ### Response: Having vulnarability CVE-2022-2309 Advisory: Mpd-parser 0.0.5 updates its dependency 'lxml' to v4.9.1 to include a security fix. | what vulnarability does mpd-parser version less then 0.0.5 have | |
Having vulnarability PVE-2022-45476 Advisory: Mplatlib is a malicious package, typosquatting. It installs cryptomining malware in your system.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mplatlib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45476 Advisory: Mplatlib is a malicious package, typosquatting. It installs cryptomining malware in your system.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-hijack-dev-devices-to-mine-cryptocurrency/ | what vulnarability does mplatlib version greather then 0,less then 0 have | |
Having vulnarability CVE-2021-29063 Advisory: Mpmath 1.3.0 includes a fix for CVE-2021-29063: Regular Expression Denial of Service (ReDOS) vulnerability when the mpmathify function is called.
https://github.com/fredrik-johansson/mpmath/commit/46d44c3c8f3244017fe1eb102d564eb4ab8ef750 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mpmath version greather then equal to 1.0.0,less then equal to 1.2.1 have ### Response: Having vulnarability CVE-2021-29063 Advisory: Mpmath 1.3.0 includes a fix for CVE-2021-29063: Regular Expression Denial of Service (ReDOS) vulnerability when the mpmathify function is called.
https://github.com/fredrik-johansson/mpmath/commit/46d44c3c8f3244017fe1eb102d564eb4ab8ef750 | what vulnarability does mpmath version greather then equal to 1.0.0,less then equal to 1.2.1 have | |
Having vulnarability PVE-2022-50433 Advisory: Mprov-jobserver 0.0.8 changes job server to NADS to fix a sensitive information exposure vulnerability.
https://github.com/mprov-ng/mprov_jobserver/issues/44 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mprov-jobserver version less then 0.0.8 have ### Response: Having vulnarability PVE-2022-50433 Advisory: Mprov-jobserver 0.0.8 changes job server to NADS to fix a sensitive information exposure vulnerability.
https://github.com/mprov-ng/mprov_jobserver/issues/44 | what vulnarability does mprov-jobserver version less then 0.0.8 have | |
Having vulnarability PVE-2021-39675 Advisory: Mpxj 5.0.0 fixes a XXE security vulnerability. See also <https://sourceforge.net/p/mpxj/bugs/267>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mpxj version less then 5.0.0 have ### Response: Having vulnarability PVE-2021-39675 Advisory: Mpxj 5.0.0 fixes a XXE security vulnerability. See also <https://sourceforge.net/p/mpxj/bugs/267>. | what vulnarability does mpxj version less then 5.0.0 have | |
Having vulnarability PVE-2021-38431 Advisory: Mpymodcore 0.0.12 hardens the WindUp security (user module), and secures router with a redirect/bad request response. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mpymodcore version less then 0.0.12 have ### Response: Having vulnarability PVE-2021-38431 Advisory: Mpymodcore 0.0.12 hardens the WindUp security (user module), and secures router with a redirect/bad request response. | what vulnarability does mpymodcore version less then 0.0.12 have | |
Having vulnarability CVE-2020-1747 Advisory: Mqtt-io 0.5.2 updates PyYAML to a version that doesn't suffer from CVE-2020-1747 vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mqtt-io version less then 0.5.2 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Mqtt-io 0.5.2 updates PyYAML to a version that doesn't suffer from CVE-2020-1747 vulnerability. | what vulnarability does mqtt-io version less then 0.5.2 have | |
Having vulnarability CVE-2016-7136 Advisory: Mr.migrator 1.2 fixes a form problem with security hotfix from its dependency package 'Plone'.
https://plone.org/security/hotfix/20160830 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mr-migrator version less then 1.2 have ### Response: Having vulnarability CVE-2016-7136 Advisory: Mr.migrator 1.2 fixes a form problem with security hotfix from its dependency package 'Plone'.
https://plone.org/security/hotfix/20160830 | what vulnarability does mr-migrator version less then 1.2 have | |
Having vulnarability PVE-2024-99774 Advisory: The Microsoft Authentication Library (MSAL) for Python before 1.24.1 is susceptible to a vulnerability in certain versions due to inadequate input sanitization within the authcode.py file. This flaw allows for the improper neutralization of special elements in data query logic.
https://github.com/AzureAD/microsoft-authentication-library-for-python/commit/3427c2577bb674196a59e58cbf5aa91ad92cba7d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does msal version greather then equal to 0,less then 1.24.1 have ### Response: Having vulnarability PVE-2024-99774 Advisory: The Microsoft Authentication Library (MSAL) for Python before 1.24.1 is susceptible to a vulnerability in certain versions due to inadequate input sanitization within the authcode.py file. This flaw allows for the improper neutralization of special elements in data query logic.
https://github.com/AzureAD/microsoft-authentication-library-for-python/commit/3427c2577bb674196a59e58cbf5aa91ad92cba7d | what vulnarability does msal version greather then equal to 0,less then 1.24.1 have | |
Having vulnarability PVE-2021-36700 Advisory: msgpack 0.6.0 contains some backward incompatible changes for security reason (DoS).
https://github.com/msgpack/msgpack-python/commit/3b80233592674d18c8db7a62fa56504a5a285296 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does msgpack version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-36700 Advisory: msgpack 0.6.0 contains some backward incompatible changes for security reason (DoS).
https://github.com/msgpack/msgpack-python/commit/3b80233592674d18c8db7a62fa56504a5a285296 | what vulnarability does msgpack version less then 0.6.0 have | |
Having vulnarability CVE-2021-28957 Advisory: Msnexport 0.2 updates its dependency 'lxml' to v4.9.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does msnexport version less then 0.2 have ### Response: Having vulnarability CVE-2021-28957 Advisory: Msnexport 0.2 updates its dependency 'lxml' to v4.9.1 to include security fixes. | what vulnarability does msnexport version less then 0.2 have | |
Having vulnarability PVE-2021-25898 Advisory: mss before 2.0.18 has a undisclosed security issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mss version less then 2.0.18 have ### Response: Having vulnarability PVE-2021-25898 Advisory: mss before 2.0.18 has a undisclosed security issue. | what vulnarability does mss version less then 2.0.18 have | |
Having vulnarability PVE-2021-39195 Advisory: Msticpy 1.1.0 updates its dependency 'lxml' to v4.6.3 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does msticpy version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-39195 Advisory: Msticpy 1.1.0 updates its dependency 'lxml' to v4.6.3 to include security fixes. | what vulnarability does msticpy version less then 1.1.0 have | |
Having vulnarability CVE-2021-42771 Advisory: Mstr-rest-requests 0.12.4 updates its dependency 'babel' to v2.9.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mstr-rest-requests version less then 0.12.4 have ### Response: Having vulnarability CVE-2021-42771 Advisory: Mstr-rest-requests 0.12.4 updates its dependency 'babel' to v2.9.1 to include security fixes. | what vulnarability does mstr-rest-requests version less then 0.12.4 have | |
Having vulnarability PVE-2024-70487 Advisory: Mtdata version 0.2.4 now implements file locking using portalocker to address race conditions encountered when multiple instances of `mtdata get` are run concurrently. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mtdata version less then 0.2.4 have ### Response: Having vulnarability PVE-2024-70487 Advisory: Mtdata version 0.2.4 now implements file locking using portalocker to address race conditions encountered when multiple instances of `mtdata get` are run concurrently. | what vulnarability does mtdata version less then 0.2.4 have | |
Having vulnarability PVE-2021-36317 Advisory: mtga 2.0.0beta includes API security improvements & fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mtga version less then 2.0.0beta have ### Response: Having vulnarability PVE-2021-36317 Advisory: mtga 2.0.0beta includes API security improvements & fixes. | what vulnarability does mtga version less then 2.0.0beta have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.