output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2021-36301 Advisory: Mtprotoproxy before 1.0.0 has the potential to allow for passive detection given known string lengths. V1.0.0 adds random paddings to prevent this.
https://github.com/alexbers/mtprotoproxy/commit/372861ac6e3dd3d1d4996282f0905c36c5163fba | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mtprotoproxy version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-36301 Advisory: Mtprotoproxy before 1.0.0 has the potential to allow for passive detection given known string lengths. V1.0.0 adds random paddings to prevent this.
https://github.com/alexbers/mtprotoproxy/commit/372861ac6e3dd3d1d4996282f0905c36c5163fba | what vulnarability does mtprotoproxy version less then 1.0.0 have | |
Having vulnarability CVE-2020-14343 Advisory: Mtr2mqtt 0.1.0 upgrades the pyYML version requirement due to the CVE-2020-14343.
https://github.com/tvallas/mtr2mqtt/commit/a7271be78ced193e29947c2174d8a751cc660cf4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mtr2mqtt version less then 0.1.0 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Mtr2mqtt 0.1.0 upgrades the pyYML version requirement due to the CVE-2020-14343.
https://github.com/tvallas/mtr2mqtt/commit/a7271be78ced193e29947c2174d8a751cc660cf4 | what vulnarability does mtr2mqtt version less then 0.1.0 have | |
Having vulnarability CVE-2019-9635 Advisory: Muffnn 2.3.1 increases the minimum version of tensorflow to v1.15.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does muffnn version less then 2.3.1 have ### Response: Having vulnarability CVE-2019-9635 Advisory: Muffnn 2.3.1 increases the minimum version of tensorflow to v1.15.2 to include security fixes. | what vulnarability does muffnn version less then 2.3.1 have | |
Having vulnarability PVE-2023-59731 Advisory: Mujoco 2.3.4 includes a fix for a Race Condition vulnerability.
https://github.com/deepmind/mujoco/issues/783
https://github.com/deepmind/mujoco/issues/790 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mujoco version less then 2.3.4 have ### Response: Having vulnarability PVE-2023-59731 Advisory: Mujoco 2.3.4 includes a fix for a Race Condition vulnerability.
https://github.com/deepmind/mujoco/issues/783
https://github.com/deepmind/mujoco/issues/790 | what vulnarability does mujoco version less then 2.3.4 have | |
Having vulnarability CVE-2022-25647 Advisory: Multi-model-server 1.1.10 updates its dependency 'gson' to v2.8.9 to include a security fix.
https://github.com/awslabs/multi-model-server/pull/1018
https://github.com/awslabs/multi-model-server/commit/2b8930070a4093555813a9fb28185b2c098da7ec | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does multi-model-server version less then 1.1.10 have ### Response: Having vulnarability CVE-2022-25647 Advisory: Multi-model-server 1.1.10 updates its dependency 'gson' to v2.8.9 to include a security fix.
https://github.com/awslabs/multi-model-server/pull/1018
https://github.com/awslabs/multi-model-server/commit/2b8930070a4093555813a9fb28185b2c098da7ec | what vulnarability does multi-model-server version less then 1.1.10 have | |
Having vulnarability CVE-2021-34141 Advisory: Multivar-horner 3.0.4 updates its dependency 'Numpy' requirement to "^1.22" to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does multivar-horner version less then 3.0.4 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Multivar-horner 3.0.4 updates its dependency 'Numpy' requirement to "^1.22" to include security fixes. | what vulnarability does multivar-horner version less then 3.0.4 have | |
Having vulnarability PVE-2022-45427 Advisory: Mumpy is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mumpy version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45427 Advisory: Mumpy is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does mumpy version greather then 0,less then 0 have | |
Having vulnarability CVE-2016-4972 Advisory: OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does murano-dashboard version greather then equal to 2.0,less then 2.0.1,less then 1.0.3 have ### Response: Having vulnarability CVE-2016-4972 Advisory: OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages. | what vulnarability does murano-dashboard version greather then equal to 2.0,less then 2.0.1,less then 1.0.3 have | |
Having vulnarability PVE-2023-59743 Advisory: Music-assistant 2.0.0b30 includes a fix for a Race Condition vulnerability.
https://github.com/music-assistant/server/pull/662 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does music-assistant version less then 2.0.0b30 have ### Response: Having vulnarability PVE-2023-59743 Advisory: Music-assistant 2.0.0b30 includes a fix for a Race Condition vulnerability.
https://github.com/music-assistant/server/pull/662 | what vulnarability does music-assistant version less then 2.0.0b30 have | |
Having vulnarability PVE-2021-38746 Advisory: Music21 6.1.0 is no longer packaged with external modules; these will be installed when installing music21 via pip (otherwise run `pip install -r requirements.txt`). Speed and security improvements come with this. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does music21 version less then 6.1.0 have ### Response: Having vulnarability PVE-2021-38746 Advisory: Music21 6.1.0 is no longer packaged with external modules; these will be installed when installing music21 via pip (otherwise run `pip install -r requirements.txt`). Speed and security improvements come with this. | what vulnarability does music21 version less then 6.1.0 have | |
Having vulnarability CVE-2022-22817 Advisory: Muttlib 1.4.19 updates its dependency 'pillow' requirement to ">=9.1.1" to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does muttlib version less then 1.4.19 have ### Response: Having vulnarability CVE-2022-22817 Advisory: Muttlib 1.4.19 updates its dependency 'pillow' requirement to ">=9.1.1" to include security fixes. | what vulnarability does muttlib version less then 1.4.19 have | |
Having vulnarability PVE-2023-59787 Advisory: Mwdb-core 2.6.0 includes a fix for a Race Condition vulnerability.
https://github.com/CERT-Polska/mwdb-core/pull/459 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mwdb-core version less then 2.6.0 have ### Response: Having vulnarability PVE-2023-59787 Advisory: Mwdb-core 2.6.0 includes a fix for a Race Condition vulnerability.
https://github.com/CERT-Polska/mwdb-core/pull/459 | what vulnarability does mwdb-core version less then 2.6.0 have | |
Having vulnarability CVE-2012-1109 Advisory: mwlib 0.13 through 0.13.4 has a denial of service vulnerability when parsing #iferror magic functions | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mwlib version less then 0.13.5 have ### Response: Having vulnarability CVE-2012-1109 Advisory: mwlib 0.13 through 0.13.4 has a denial of service vulnerability when parsing #iferror magic functions | what vulnarability does mwlib version less then 0.13.5 have | |
Having vulnarability CVE-2018-1281 Advisory: In mxnet before 1.0.0, mxnet listens on all available interfaces when running training in distributed mode. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mxnet version less then 1.0.0 have ### Response: Having vulnarability CVE-2018-1281 Advisory: In mxnet before 1.0.0, mxnet listens on all available interfaces when running training in distributed mode. | what vulnarability does mxnet version less then 1.0.0 have | |
Having vulnarability CVE-2022-45198 Advisory: My-weekly-schedule 0.1.2 updates its dependency 'pillow' to v9.3.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does my-weekly-schedule version less then 0.1.3 have ### Response: Having vulnarability CVE-2022-45198 Advisory: My-weekly-schedule 0.1.2 updates its dependency 'pillow' to v9.3.0 to include security fixes. | what vulnarability does my-weekly-schedule version less then 0.1.3 have | |
Having vulnarability PVE-2022-45416 Advisory: Mybiubiubiu is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mybiubiubiu version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45416 Advisory: Mybiubiubiu is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does mybiubiubiu version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-50876 Advisory: Mycli 1.26.0 change tests to always use databases prefixed with 'mycli_' for better security.
https://github.com/dbcli/mycli/pull/1060/commits/f86acc4f15774f88a87300a92d75df94ab39340c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mycli version less then 1.26.0 have ### Response: Having vulnarability PVE-2022-50876 Advisory: Mycli 1.26.0 change tests to always use databases prefixed with 'mycli_' for better security.
https://github.com/dbcli/mycli/pull/1060/commits/f86acc4f15774f88a87300a92d75df94ab39340c | what vulnarability does mycli version less then 1.26.0 have | |
Having vulnarability PVE-2022-51563 Advisory: Myprox 0.4.0 adds session security headers by default. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does myprox version less then 0.4.0 have ### Response: Having vulnarability PVE-2022-51563 Advisory: Myprox 0.4.0 adds session security headers by default. | what vulnarability does myprox version less then 0.4.0 have | |
Having vulnarability PVE-2021-41990 Advisory: Mypwd 0.4.0 includes security improvements related to data validation. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mypwd version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-41990 Advisory: Mypwd 0.4.0 includes security improvements related to data validation. | what vulnarability does mypwd version less then 0.4.0 have | |
Having vulnarability CVE-2016-5598 Advisory: Unspecified vulnerability in the MySQL Connector component 2.1.3 and earlier and 2.0.4 and earlier in Oracle MySQL allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Connector/Python. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mysql-connector version less then 2.1.3 have ### Response: Having vulnarability CVE-2016-5598 Advisory: Unspecified vulnerability in the MySQL Connector component 2.1.3 and earlier and 2.0.4 and earlier in Oracle MySQL allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Connector/Python. | what vulnarability does mysql-connector version less then 2.1.3 have | |
Having vulnarability PVE-2022-51746 Advisory: Mysql-connector-pyhton is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mysql-connector-pyhton version greather then 0 have ### Response: Having vulnarability PVE-2022-51746 Advisory: Mysql-connector-pyhton is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does mysql-connector-pyhton version greather then 0 have | |
Having vulnarability CVE-2016-5598 Advisory: Unspecified vulnerability in the MySQL Connector component 2.1.3 and earlier and 2.0.4 and earlier in Oracle MySQL allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Connector/Python. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mysql-connector-python version less then 2.0.4 have ### Response: Having vulnarability CVE-2016-5598 Advisory: Unspecified vulnerability in the MySQL Connector component 2.1.3 and earlier and 2.0.4 and earlier in Oracle MySQL allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Connector/Python. | what vulnarability does mysql-connector-python version less then 2.0.4 have | |
Having vulnarability PVE-2022-47931 Advisory: Mythril 0.22.43 uses a more secure approach to call docker.
https://github.com/ConsenSys/mythril/pull/1614/commits/60861a08c1816634940992a5d693a929901d3153 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does mythril version less then 0.22.43 have ### Response: Having vulnarability PVE-2022-47931 Advisory: Mythril 0.22.43 uses a more secure approach to call docker.
https://github.com/ConsenSys/mythril/pull/1614/commits/60861a08c1816634940992a5d693a929901d3153 | what vulnarability does mythril version less then 0.22.43 have | |
Having vulnarability PVE-2021-40076 Advisory: Naas 1.5.22 includes a security issue fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does naas version less then 1.5.22 have ### Response: Having vulnarability PVE-2021-40076 Advisory: Naas 1.5.22 includes a security issue fix. | what vulnarability does naas version less then 1.5.22 have | |
Having vulnarability CVE-2021-41078 Advisory: Nameko through 2.13.0 can be tricked into performing arbitrary code execution when deserializing the config file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nameko version greather then equal to 0,less then 2.14.0 have ### Response: Having vulnarability CVE-2021-41078 Advisory: Nameko through 2.13.0 can be tricked into performing arbitrary code execution when deserializing the config file. | what vulnarability does nameko version greather then equal to 0,less then 2.14.0 have | |
Having vulnarability PVE-2022-48051 Advisory: Nameko-keycloak 0.5.0 adds 'Secure=true' flag to all cookies, so all are served over HTTPS only. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nameko-keycloak version less then 0.5.0 have ### Response: Having vulnarability PVE-2022-48051 Advisory: Nameko-keycloak 0.5.0 adds 'Secure=true' flag to all cookies, so all are served over HTTPS only. | what vulnarability does nameko-keycloak version less then 0.5.0 have | |
Having vulnarability CVE-2023-25399 Advisory: Nanite 3.7.0 updates its dependency 'scipy' to version '1.10.0' to include a fix for a vulnerability.
https://github.com/AFM-analysis/nanite/commit/c259cf636c06091a02b4129dfb159eabbbb86fee | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nanite version less then 3.7.0 have ### Response: Having vulnarability CVE-2023-25399 Advisory: Nanite 3.7.0 updates its dependency 'scipy' to version '1.10.0' to include a fix for a vulnerability.
https://github.com/AFM-analysis/nanite/commit/c259cf636c06091a02b4129dfb159eabbbb86fee | what vulnarability does nanite version less then 3.7.0 have | |
Having vulnarability CVE-2022-39286 Advisory: Nannyml 0.8.4 updates its dependency 'jupyter-core' to v4.11.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nannyml version less then 0.8.4 have ### Response: Having vulnarability CVE-2022-39286 Advisory: Nannyml 0.8.4 updates its dependency 'jupyter-core' to v4.11.2 to include a security fix. | what vulnarability does nannyml version less then 0.8.4 have | |
Having vulnarability PVE-2021-37705 Advisory: Nanopb 0.2.8 fixes a security issue with PB_ENABLE_MALLOC. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nanopb version less then 0.2.8 have ### Response: Having vulnarability PVE-2021-37705 Advisory: Nanopb 0.2.8 fixes a security issue with PB_ENABLE_MALLOC. | what vulnarability does nanopb version less then 0.2.8 have | |
Having vulnarability CVE-2021-43818 Advisory: Napalm-panos 0.5.3 updates its dependency 'lxml' to v4.6.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does napalm-panos version less then 0.5.3 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Napalm-panos 0.5.3 updates its dependency 'lxml' to v4.6.5 to include a security fix. | what vulnarability does napalm-panos version less then 0.5.3 have | |
Having vulnarability CVE-2024-21503 Advisory: Napalm-s350 version 0.3.2 introduces security updates to address CVE-2024-21503 in the Black package. Prior versions to 24.3.0 were found vulnerable to ReDoS attacks through the lines_with_leading_tabs_expanded function. This vulnerability could lead to denial of service when Black processes malicious input or excessively tabbed docstrings, highlighting the importance of running Black on trusted inputs only. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does napalm-s350 version less then 0.3.2 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Napalm-s350 version 0.3.2 introduces security updates to address CVE-2024-21503 in the Black package. Prior versions to 24.3.0 were found vulnerable to ReDoS attacks through the lines_with_leading_tabs_expanded function. This vulnerability could lead to denial of service when Black processes malicious input or excessively tabbed docstrings, highlighting the importance of running Black on trusted inputs only. | what vulnarability does napalm-s350 version less then 0.3.2 have | |
Having vulnarability PVE-2023-53539 Advisory: Naruno 0.27.0 adds timestamp to sent data to avoid replay attacks.
https://github.com/Naruno/Naruno/pull/1058 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does naruno version less then 0.27.0 have ### Response: Having vulnarability PVE-2023-53539 Advisory: Naruno 0.27.0 adds timestamp to sent data to avoid replay attacks.
https://github.com/Naruno/Naruno/pull/1058 | what vulnarability does naruno version less then 0.27.0 have | |
Having vulnarability CVE-2019-18874 Advisory: Natcap.invest 3.8.1 bumps the psutil dependency requirement to psutil>=5.6.6 to address a double-free vulnerability documented in CVE-2019-18874. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does natcap-invest version less then 3.8.1 have ### Response: Having vulnarability CVE-2019-18874 Advisory: Natcap.invest 3.8.1 bumps the psutil dependency requirement to psutil>=5.6.6 to address a double-free vulnerability documented in CVE-2019-18874. | what vulnarability does natcap-invest version less then 3.8.1 have | |
Having vulnarability CVE-2007-4559 Advisory: Natcap.invest 3.12.1 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does natcap.invest version less then 3.12.1 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Natcap.invest 3.12.1 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does natcap.invest version less then 3.12.1 have | |
Having vulnarability CVE-2022-22815 Advisory: Nautilus-trader 1.137.1 updates its dependency 'pillow' to v9.0.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nautilus-trader version less then 1.137.1 have ### Response: Having vulnarability CVE-2022-22815 Advisory: Nautilus-trader 1.137.1 updates its dependency 'pillow' to v9.0.0 to include security fixes. | what vulnarability does nautilus-trader version less then 1.137.1 have | |
Having vulnarability PVE-2024-63451 Advisory: Nautobot 1.2.1 upgrades its `graphiql` dependency to 1.5.16 and its dependencies due to a reported XSS vulnerability in the GraphiQL JS package. This vulnerability was discovered during a security scan and although it was initially thought that Nautobot was not affected, it was advised to upgrade to mitigate potential risks.
https://github.com/nautobot/nautobot/pull/1179/commits/7d33f5e5b831bf8b0189e2eab51964eaf5fd63e8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nautobot version less then 1.2.1 have ### Response: Having vulnarability PVE-2024-63451 Advisory: Nautobot 1.2.1 upgrades its `graphiql` dependency to 1.5.16 and its dependencies due to a reported XSS vulnerability in the GraphiQL JS package. This vulnerability was discovered during a security scan and although it was initially thought that Nautobot was not affected, it was advised to upgrade to mitigate potential risks.
https://github.com/nautobot/nautobot/pull/1179/commits/7d33f5e5b831bf8b0189e2eab51964eaf5fd63e8 | what vulnarability does nautobot version less then 1.2.1 have | |
Having vulnarability CVE-2023-48700 Advisory: The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nautobot-device-onboarding version greather then equal to 2.0.3,less then 3.0.0 have ### Response: Having vulnarability CVE-2023-48700 Advisory: The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials. | what vulnarability does nautobot-device-onboarding version greather then equal to 2.0.3,less then 3.0.0 have | |
Having vulnarability CVE-2022-34265 Advisory: Nautobot-ssot-vsphere 0.1.2 updates its dependency 'django' to v3.2.14 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nautobot-ssot-vsphere version less then 0.1.2 have ### Response: Having vulnarability CVE-2022-34265 Advisory: Nautobot-ssot-vsphere 0.1.2 updates its dependency 'django' to v3.2.14 to include a security fix. | what vulnarability does nautobot-ssot-vsphere version less then 0.1.2 have | |
Having vulnarability CVE-2022-3786 Advisory: Navconfig 1.0.4 upgrades its cryptography dependency to version 38.0.4 from the earlier 38.0.2, in response to the security vulnerability CVE-2022-3786. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does navconfig version less then 1.0.4 have ### Response: Having vulnarability CVE-2022-3786 Advisory: Navconfig 1.0.4 upgrades its cryptography dependency to version 38.0.4 from the earlier 38.0.2, in response to the security vulnerability CVE-2022-3786. | what vulnarability does navconfig version less then 1.0.4 have | |
Having vulnarability PVE-2022-50445 Advisory: Navigator-api 2.1.0 removes insecure defaults.
https://github.com/phenobarbital/navigator-api/commit/739168596265451d7392ac3073efd8ef91babdd8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does navigator-api version less then 2.1.0 have ### Response: Having vulnarability PVE-2022-50445 Advisory: Navigator-api 2.1.0 removes insecure defaults.
https://github.com/phenobarbital/navigator-api/commit/739168596265451d7392ac3073efd8ef91babdd8 | what vulnarability does navigator-api version less then 2.1.0 have | |
Having vulnarability CVE-2021-34141 Advisory: Nba-api 1.1.14 updates its dependency 'numpy' to v1.22.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nba-api version less then 1.1.14 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Nba-api 1.1.14 updates its dependency 'numpy' to v1.22.2 to include a security fix. | what vulnarability does nba-api version less then 1.1.14 have | |
Having vulnarability PVE-2021-37142 Advisory: Nba-scraper 0.2.7 removes a security flaw where it wasn't verifying SSL certificates during testing. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nba-scraper version less then 0.2.7 have ### Response: Having vulnarability PVE-2021-37142 Advisory: Nba-scraper 0.2.7 removes a security flaw where it wasn't verifying SSL certificates during testing. | what vulnarability does nba-scraper version less then 0.2.7 have | |
Having vulnarability CVE-2021-32862 Advisory: The GitHub Security Lab discovered sixteen ways to exploit a cross-site scripting vulnerability in nbconvert. When using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to cross-site scripting (XSS) vulnerabilities if these HTML notebooks are served by a web server (eg: nbviewer).
https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nbconvert version less then 6.5.1 have ### Response: Having vulnarability CVE-2021-32862 Advisory: The GitHub Security Lab discovered sixteen ways to exploit a cross-site scripting vulnerability in nbconvert. When using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to cross-site scripting (XSS) vulnerabilities if these HTML notebooks are served by a web server (eg: nbviewer).
https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq | what vulnarability does nbconvert version less then 6.5.1 have | |
Having vulnarability CVE-2021-41134 Advisory: nbdime provides tools for diffing and merging of Jupyter Notebooks. In affected versions a stored cross-site scripting (XSS) issue exists within the Jupyter-owned nbdime project. It appears that when reading the file name and path from disk, the extension does not sanitize the string it constructs before returning it to be displayed. The diffNotebookCheckpoint function within nbdime causes this issue. When attempting to display the name of the local notebook (diffNotebookCheckpoint), nbdime appears to simply append .ipynb to the name of the input file. The NbdimeWidget is then created, and the base string is passed through to the request API function. From there, the frontend simply renders the HTML tag and anything along with it. Users are advised to patch to the most recent version of the affected product. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nbdime version greather then equal to 0,less then 1.1.1,greather then equal to 2.0.0,less then 2.1.1,greather then equal to 3.0.0,less then 3.1.1 have ### Response: Having vulnarability CVE-2021-41134 Advisory: nbdime provides tools for diffing and merging of Jupyter Notebooks. In affected versions a stored cross-site scripting (XSS) issue exists within the Jupyter-owned nbdime project. It appears that when reading the file name and path from disk, the extension does not sanitize the string it constructs before returning it to be displayed. The diffNotebookCheckpoint function within nbdime causes this issue. When attempting to display the name of the local notebook (diffNotebookCheckpoint), nbdime appears to simply append .ipynb to the name of the input file. The NbdimeWidget is then created, and the base string is passed through to the request API function. From there, the frontend simply renders the HTML tag and anything along with it. Users are advised to patch to the most recent version of the affected product. | what vulnarability does nbdime version greather then equal to 0,less then 1.1.1,greather then equal to 2.0.0,less then 2.1.1,greather then equal to 3.0.0,less then 3.1.1 have | |
Having vulnarability CVE-2021-39160 Advisory: Nbgitpuller version 0.10.2 includes a fix for CVE-2021-39160: Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. No workaround exists for users who can not upgrade. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nbgitpuller version less then 0.10.2 have ### Response: Having vulnarability CVE-2021-39160 Advisory: Nbgitpuller version 0.10.2 includes a fix for CVE-2021-39160: Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. No workaround exists for users who can not upgrade. | what vulnarability does nbgitpuller version less then 0.10.2 have | |
Having vulnarability CVE-2020-7760 Advisory: Nbsafety 0.0.69 updates its NPM dependency 'codemirror' to v5.58.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nbsafety version less then 0.0.69 have ### Response: Having vulnarability CVE-2020-7760 Advisory: Nbsafety 0.0.69 updates its NPM dependency 'codemirror' to v5.58.3 to include a security fix. | what vulnarability does nbsafety version less then 0.0.69 have | |
Having vulnarability PVE-2024-66761 Advisory: Nbwipers version 0.3.4 updates its mio dependency to version 0.8.11 from 0.8.9 in the lockfile, following a security alert.
https://github.com/felixgwilliams/nbwipers/pull/11/commits/e62c1359ec0c3950260aae1ca062f11a3921a5e1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nbwipers version less then 0.3.4 have ### Response: Having vulnarability PVE-2024-66761 Advisory: Nbwipers version 0.3.4 updates its mio dependency to version 0.8.11 from 0.8.9 in the lockfile, following a security alert.
https://github.com/felixgwilliams/nbwipers/pull/11/commits/e62c1359ec0c3950260aae1ca062f11a3921a5e1 | what vulnarability does nbwipers version less then 0.3.4 have | |
Having vulnarability CVE-2020-27783 Advisory: Ncbimeta 0.8.0 updates the 'lxml' dependency to v4.6.2 due to a security vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ncbimeta version less then 0.8.0 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Ncbimeta 0.8.0 updates the 'lxml' dependency to v4.6.2 due to a security vulnerability. | what vulnarability does ncbimeta version less then 0.8.0 have | |
Having vulnarability PVE-2022-44449 Advisory: Ndn-svs 0.3.13 starts signing/verifying balancer data packets to prevent forgery.
https://github.com/justincpresley/ndn-python-svs/commit/933d5d99e8d51d7c92a2fc7d1d176b8c03475ac0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ndn-svs version less then 0.3.13 have ### Response: Having vulnarability PVE-2022-44449 Advisory: Ndn-svs 0.3.13 starts signing/verifying balancer data packets to prevent forgery.
https://github.com/justincpresley/ndn-python-svs/commit/933d5d99e8d51d7c92a2fc7d1d176b8c03475ac0 | what vulnarability does ndn-svs version less then 0.3.13 have | |
Having vulnarability PVE-2021-37602 Advisory: Nearbeach 0.22.1 fixes several security issues in relation to Bandit, identified by Nearbeach as BUG491, BUG492, BUG493, BUG494, BUG495, BUG496, BUG497, and BUG498. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nearbeach version less then 0.22.1 have ### Response: Having vulnarability PVE-2021-37602 Advisory: Nearbeach 0.22.1 fixes several security issues in relation to Bandit, identified by Nearbeach as BUG491, BUG492, BUG493, BUG494, BUG495, BUG496, BUG497, and BUG498. | what vulnarability does nearbeach version less then 0.22.1 have | |
Having vulnarability CVE-2021-33503 Advisory: Nef-pipelines version 0.1.62 updates its strategy to use urllib3 version 1.26.15 to sidestep a security alert linked to CVE-2021-33503. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nef-pipelines version less then 0.1.62 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Nef-pipelines version 0.1.62 updates its strategy to use urllib3 version 1.26.15 to sidestep a security alert linked to CVE-2021-33503. | what vulnarability does nef-pipelines version less then 0.1.62 have | |
Having vulnarability CVE-2023-44271 Advisory: Negmas 0.10.2 updates its dependency 'pillow' to v10.0.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does negmas version less then 0.10.2 have ### Response: Having vulnarability CVE-2023-44271 Advisory: Negmas 0.10.2 updates its dependency 'pillow' to v10.0.1 to include security fixes. | what vulnarability does negmas version less then 0.10.2 have | |
Having vulnarability CVE-2019-3498 Advisory: Nemo 1.11.0 updates its dependency 'django' to v1.11.18 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nemo version less then 1.11.0 have ### Response: Having vulnarability CVE-2019-3498 Advisory: Nemo 1.11.0 updates its dependency 'django' to v1.11.18 to include a security fix. | what vulnarability does nemo version less then 1.11.0 have | |
Having vulnarability CVE-2022-22821 Advisory: NVIDIA NeMo before 1.6.0 contains a vulnerability in ASR WebApp, in which ../ Path Traversal may lead to deletion of any directory when admin privileges are available. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nemo-toolkit version greather then equal to 0,less then 1.6.0 have ### Response: Having vulnarability CVE-2022-22821 Advisory: NVIDIA NeMo before 1.6.0 contains a vulnerability in ASR WebApp, in which ../ Path Traversal may lead to deletion of any directory when admin privileges are available. | what vulnarability does nemo-toolkit version greather then equal to 0,less then 1.6.0 have | |
Having vulnarability PVE-2024-64722 Advisory: Nemoguardrails 0.7.0 addresses server security vulnerabilities. These issues were primarily associated with uncontrolled data being utilized within path expressions and potential information leakage via exceptions.
https://github.com/NVIDIA/NeMo-Guardrails/commit/21e2ffc37d806b7014654d280da76df4ded48c13 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nemoguardrails version less then 0.7.0 have ### Response: Having vulnarability PVE-2024-64722 Advisory: Nemoguardrails 0.7.0 addresses server security vulnerabilities. These issues were primarily associated with uncontrolled data being utilized within path expressions and potential information leakage via exceptions.
https://github.com/NVIDIA/NeMo-Guardrails/commit/21e2ffc37d806b7014654d280da76df4ded48c13 | what vulnarability does nemoguardrails version less then 0.7.0 have | |
Having vulnarability PVE-2023-62793 Advisory: Nempy 2.1.0 upgrades urllib3 from 2.0.4 to 2.0.7 which resolves a security issue in urllib.
https://github.com/UNSW-CEEM/nempy/pull/21/files
https://data.safetycli.com/packages/pypi/urllib3/versions | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nempy version less then 2.1.0 have ### Response: Having vulnarability PVE-2023-62793 Advisory: Nempy 2.1.0 upgrades urllib3 from 2.0.4 to 2.0.7 which resolves a security issue in urllib.
https://github.com/UNSW-CEEM/nempy/pull/21/files
https://data.safetycli.com/packages/pypi/urllib3/versions | what vulnarability does nempy version less then 2.1.0 have | |
Having vulnarability CVE-2023-32681 Advisory: Neo-fairy-client 3.4.0.2 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/Hecate2/neo-fairy-client/commit/4b84cf63095a6d92b42be41eb88485043e6cc019 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does neo-fairy-client version less then 3.4.0.2 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Neo-fairy-client 3.4.0.2 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/Hecate2/neo-fairy-client/commit/4b84cf63095a6d92b42be41eb88485043e6cc019 | what vulnarability does neo-fairy-client version less then 3.4.0.2 have | |
Having vulnarability CVE-2023-37276 Advisory: Neo-mamba 2.0.2 updates 'aiohttp' to 3.8.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does neo-mamba version less then 2.0.2 have ### Response: Having vulnarability CVE-2023-37276 Advisory: Neo-mamba 2.0.2 updates 'aiohttp' to 3.8.5 to include a security fix. | what vulnarability does neo-mamba version less then 2.0.2 have | |
Having vulnarability PVE-2021-36441 Advisory: Neo-python 0.7.8 fixes vulnerability in RPC invoke functionality that can lead to DoS.
https://github.com/CityOfZion/neo-python/commit/8e9c488bc0506f13424dc4208b64f250dff2818d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does neo-python version less then 0.7.8 have ### Response: Having vulnarability PVE-2021-36441 Advisory: Neo-python 0.7.8 fixes vulnerability in RPC invoke functionality that can lead to DoS.
https://github.com/CityOfZion/neo-python/commit/8e9c488bc0506f13424dc4208b64f250dff2818d | what vulnarability does neo-python version less then 0.7.8 have | |
Having vulnarability PVE-2021-41773 Advisory: Neomodel 4.0.5 fixes issue with enforcing secure URI scheme (+s). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does neomodel version less then 4.0.5 have ### Response: Having vulnarability PVE-2021-41773 Advisory: Neomodel 4.0.5 fixes issue with enforcing secure URI scheme (+s). | what vulnarability does neomodel version less then 4.0.5 have | |
Having vulnarability PVE-2021-40589 Advisory: Nepse-api 0.3 discontinues the use of a non-maintainable 'converter.py' in 'nepse/security', the response data is now directly kept in a dataclass using 'DataClassXyz(**data)'. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nepse-api version less then 0.3 have ### Response: Having vulnarability PVE-2021-40589 Advisory: Nepse-api 0.3 discontinues the use of a non-maintainable 'converter.py' in 'nepse/security', the response data is now directly kept in a dataclass using 'DataClassXyz(**data)'. | what vulnarability does nepse-api version less then 0.3 have | |
Having vulnarability CVE-2023-1176 Advisory: Nerblackbox 0.0.15 updates its dependency 'mlflow' to version '2.5.0' to include a fix for an Access Restriction Bypass vulnerability.
https://github.com/flxst/nerblackbox/commit/b84acf3fa45709066a4efd501c4bc6f8a5a3f58e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nerblackbox version less then 0.0.15 have ### Response: Having vulnarability CVE-2023-1176 Advisory: Nerblackbox 0.0.15 updates its dependency 'mlflow' to version '2.5.0' to include a fix for an Access Restriction Bypass vulnerability.
https://github.com/flxst/nerblackbox/commit/b84acf3fa45709066a4efd501c4bc6f8a5a3f58e | what vulnarability does nerblackbox version less then 0.0.15 have | |
Having vulnarability CVE-2023-25166 Advisory: Nerfstudio 0.2.2 updates its NPM dependency '@sideway/formula' to 3.0.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nerfstudio version less then 0.2.2 have ### Response: Having vulnarability CVE-2023-25166 Advisory: Nerfstudio 0.2.2 updates its NPM dependency '@sideway/formula' to 3.0.1 to include a security fix. | what vulnarability does nerfstudio version less then 0.2.2 have | |
Having vulnarability PVE-2022-48535 Advisory: Nervatura 2.1.0 validates content length. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nervatura version less then 2.1.0 have ### Response: Having vulnarability PVE-2022-48535 Advisory: Nervatura 2.1.0 validates content length. | what vulnarability does nervatura version less then 2.1.0 have | |
Having vulnarability PVE-2023-61483 Advisory: Nest-desktop 3.3.0b1 includes a fix for a lack of authorization vulnerability: Anyone who has access to the login node and who knows the port-number which a nest-desktop of any other user is using, can access nest-desktop and use it.
https://github.com/nest-desktop/nest-desktop/issues/576
https://github.com/nest-desktop/nest-desktop/pull/578 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nest-desktop version less then 3.3.0b1 have ### Response: Having vulnarability PVE-2023-61483 Advisory: Nest-desktop 3.3.0b1 includes a fix for a lack of authorization vulnerability: Anyone who has access to the login node and who knows the port-number which a nest-desktop of any other user is using, can access nest-desktop and use it.
https://github.com/nest-desktop/nest-desktop/issues/576
https://github.com/nest-desktop/nest-desktop/pull/578 | what vulnarability does nest-desktop version less then 3.3.0b1 have | |
Having vulnarability CVE-2021-41945 Advisory: Netdata version 1.0.3 enhances its security by updating the httpx dependency range to ">=0.23,<1," addressing CVE-2021-41945. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does netdata version less then 1.0.3 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Netdata version 1.0.3 enhances its security by updating the httpx dependency range to ">=0.23,<1," addressing CVE-2021-41945. | what vulnarability does netdata version less then 1.0.3 have | |
Having vulnarability CVE-2018-1000518 Advisory: Netdumplings 0.4.0 updates its 'websockets' dependency to v7.0.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does netdumplings version less then 0.4.0 have ### Response: Having vulnarability CVE-2018-1000518 Advisory: Netdumplings 0.4.0 updates its 'websockets' dependency to v7.0.0 to include a security fix. | what vulnarability does netdumplings version less then 0.4.0 have | |
Having vulnarability PVE-2021-39082 Advisory: Netfoundry 4.19.0 fixes a rake vulnerability in the `.gemspec` file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does netfoundry version less then 4.19.0 have ### Response: Having vulnarability PVE-2021-39082 Advisory: Netfoundry 4.19.0 fixes a rake vulnerability in the `.gemspec` file. | what vulnarability does netfoundry version less then 4.19.0 have | |
Having vulnarability CVE-2020-7655 Advisory: netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks. See: CVE-2020-7655. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does netius version less then 1.17.58 have ### Response: Having vulnarability CVE-2020-7655 Advisory: netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks. See: CVE-2020-7655. | what vulnarability does netius version less then 1.17.58 have | |
Having vulnarability CVE-2023-30861 Advisory: Nettacker 0.3.1a2 updates its dependency 'flask' to v2.2.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nettacker version less then 0.3.1 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Nettacker 0.3.1a2 updates its dependency 'flask' to v2.2.5 to include a security fix. | what vulnarability does nettacker version less then 0.3.1 have | |
Having vulnarability PVE-2022-47794 Advisory: Netts 0.2.1 updates its dependency 'mkdocs' to v1.3.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does netts version less then 0.2.1 have ### Response: Having vulnarability PVE-2022-47794 Advisory: Netts 0.2.1 updates its dependency 'mkdocs' to v1.3.0 to include a security fix. | what vulnarability does netts version less then 0.2.1 have | |
Having vulnarability PVE-2021-38366 Advisory: Netviel 0.2 includes a fix for an information exposure vulnerability: with CORS enabled any website could read all emails simply by fetching the API endpoint on 127.0.0.1.
https://github.com/DavidMStraub/netviel/pull/4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does netviel version less then 0.2 have ### Response: Having vulnarability PVE-2021-38366 Advisory: Netviel 0.2 includes a fix for an information exposure vulnerability: with CORS enabled any website could read all emails simply by fetching the API endpoint on 127.0.0.1.
https://github.com/DavidMStraub/netviel/pull/4 | what vulnarability does netviel version less then 0.2 have | |
Having vulnarability PVE-2022-52319 Advisory: Network-config-analyzer 1.8.1 starts running yum upgrade in Dockerfile.ubi file to resolve vulnerabilities.
https://github.com/IBM/network-config-analyzer/pull/380 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does network-config-analyzer version less then 1.8.1 have ### Response: Having vulnarability PVE-2022-52319 Advisory: Network-config-analyzer 1.8.1 starts running yum upgrade in Dockerfile.ubi file to resolve vulnerabilities.
https://github.com/IBM/network-config-analyzer/pull/380 | what vulnarability does network-config-analyzer version less then 1.8.1 have | |
Having vulnarability CVE-2023-32681 Advisory: Netznoe-smartmeter-portal-api version 1.0.2 updates its requests library from version 2.28.2 to 2.31.0 to address security issues detailed in CVE-2023-32681. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does netznoe-smartmeter-portal-api version less then 1.0.2 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Netznoe-smartmeter-portal-api version 1.0.2 updates its requests library from version 2.28.2 to 2.31.0 to address security issues detailed in CVE-2023-32681. | what vulnarability does netznoe-smartmeter-portal-api version less then 1.0.2 have | |
Having vulnarability PVE-2024-66942 Advisory: Neural-compressor 2.5 addresses a security vulnerability allowing SQL/CMD injection, which could let attackers manipulate database fields like q_model_path, enabling unauthorized downloads from the host system. This flaw also made the Neural Solution component susceptible to remote code execution (RCE) by exploiting unvalidated script_url parameters in POST requests. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does neural-compressor version less then 2.5 have ### Response: Having vulnarability PVE-2024-66942 Advisory: Neural-compressor 2.5 addresses a security vulnerability allowing SQL/CMD injection, which could let attackers manipulate database fields like q_model_path, enabling unauthorized downloads from the host system. This flaw also made the Neural Solution component susceptible to remote code execution (RCE) by exploiting unvalidated script_url parameters in POST requests. | what vulnarability does neural-compressor version less then 2.5 have | |
Having vulnarability CVE-2021-3807 Advisory: Neuromynerva version 0.2.12 updates its NPM dependency 'ansi-regex' to v5.0.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does neuromynerva version less then 0.2.12 have ### Response: Having vulnarability CVE-2021-3807 Advisory: Neuromynerva version 0.2.12 updates its NPM dependency 'ansi-regex' to v5.0.1 to include a security fix. | what vulnarability does neuromynerva version less then 0.2.12 have | |
Having vulnarability CVE-2019-9735 Advisory: Neutron 10.0.8, 11.0.7, 12.0.6 and 13.0.3 include a fix for CVE-2019-9735: An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. Only deployments using the iptables security group driver are affected.
https://launchpad.net/bugs/1818385 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does neutron version less then 10.0.8,greather then equal to 11.0.0.0b1,less then 11.0.7,greather then equal to 12.0.0.0b1,less then 12.0.6,greather then equal to 13.0.0.0b1,less then 13.0.3 have ### Response: Having vulnarability CVE-2019-9735 Advisory: Neutron 10.0.8, 11.0.7, 12.0.6 and 13.0.3 include a fix for CVE-2019-9735: An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. Only deployments using the iptables security group driver are affected.
https://launchpad.net/bugs/1818385 | what vulnarability does neutron version less then 10.0.8,greather then equal to 11.0.0.0b1,less then 11.0.7,greather then equal to 12.0.0.0b1,less then 12.0.6,greather then equal to 13.0.0.0b1,less then 13.0.3 have | |
Having vulnarability PVE-2021-35805 Advisory: New Relic agents run explain plans for Slow Transaction Traces and Slow SQL Queries. Previous versions of the agents would run an explain plan on the SQL query by prepending the query with explain. This may cause an issue when there are multiple statements separated by semicolons in a single query. The first statement in the string returns its explain plan, but any subsequent statement after that may execute as a general SQL statement. Depending on the language, library, and database, the agent may return the results of the additional statements to New Relic. It is also possible that the additional statements could execute an additional INSERT or UPDATE command. With this security update, New Relic agents will no longer run explain plans on any query that contains a semicolon as a statement separator. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does newrelic version greather then equal to 1.1.0.192,less then equal to 2.106.0.87 have ### Response: Having vulnarability PVE-2021-35805 Advisory: New Relic agents run explain plans for Slow Transaction Traces and Slow SQL Queries. Previous versions of the agents would run an explain plan on the SQL query by prepending the query with explain. This may cause an issue when there are multiple statements separated by semicolons in a single query. The first statement in the string returns its explain plan, but any subsequent statement after that may execute as a general SQL statement. Depending on the language, library, and database, the agent may return the results of the additional statements to New Relic. It is also possible that the additional statements could execute an additional INSERT or UPDATE command. With this security update, New Relic agents will no longer run explain plans on any query that contains a semicolon as a statement separator. | what vulnarability does newrelic version greather then equal to 1.1.0.192,less then equal to 2.106.0.87 have | |
Having vulnarability PVE-2021-25902 Advisory: newsletter 0.1.17pre in newsletterapp is now more secure by default. Does not setup default users for admin section. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does newsletter version less then 0.1.17pre have ### Response: Having vulnarability PVE-2021-25902 Advisory: newsletter 0.1.17pre in newsletterapp is now more secure by default. Does not setup default users for admin section. | what vulnarability does newsletter version less then 0.1.17pre have | |
Having vulnarability PVE-2024-64085 Advisory: Nextflow 23.04.4 resolves a vulnerability in the Google Batch script launcher by removing the -o allow_other mount option, which posed a shell injection risk. This update significantly enhances the security of batch job submissions to Google Cloud, ensuring safer and more secure operations.
https://github.com/nextflow-io/nextflow/pull/4332/files | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nextflow version less then 23.04.4 have ### Response: Having vulnarability PVE-2024-64085 Advisory: Nextflow 23.04.4 resolves a vulnerability in the Google Batch script launcher by removing the -o allow_other mount option, which posed a shell injection risk. This update significantly enhances the security of batch job submissions to Google Cloud, ensuring safer and more secure operations.
https://github.com/nextflow-io/nextflow/pull/4332/files | what vulnarability does nextflow version less then 23.04.4 have | |
Having vulnarability CVE-2017-18342 Advisory: Nf-core 1.7 uses yaml.safe_load() to fix a code execution vulnerability.
https://github.com/nf-core/tools/commit/8946dc988792c844f4018c993fdef5711705b67a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nf-core version less then 1.7 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Nf-core 1.7 uses yaml.safe_load() to fix a code execution vulnerability.
https://github.com/nf-core/tools/commit/8946dc988792c844f4018c993fdef5711705b67a | what vulnarability does nf-core version less then 1.7 have | |
Having vulnarability CVE-2020-25340 Advisory: An issue was discovered in NFStream 5.2.0. Because some allocated modules are not correctly freed, if the nfstream object is directly destroyed without being used after it is created, it will cause a memory leak that may result in a local denial of service (DoS). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nfstream version greather then equal to 0,less then 6.0.0 have ### Response: Having vulnarability CVE-2020-25340 Advisory: An issue was discovered in NFStream 5.2.0. Because some allocated modules are not correctly freed, if the nfstream object is directly destroyed without being used after it is created, it will cause a memory leak that may result in a local denial of service (DoS). | what vulnarability does nfstream version greather then equal to 0,less then 6.0.0 have | |
Having vulnarability CVE-2023-27476 Advisory: Ngr-services-spider 0.6.0 updates its dependency 'owslib' requirement to '>= 0.28.1' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ngr-services-spider version less then 0.6.0 have ### Response: Having vulnarability CVE-2023-27476 Advisory: Ngr-services-spider 0.6.0 updates its dependency 'owslib' requirement to '>= 0.28.1' to include a security fix. | what vulnarability does ngr-services-spider version less then 0.6.0 have | |
Having vulnarability PVE-2021-36701 Advisory: ngraph-mxnet 1.0.0 fixed a security bug that is causing MXNet to listen on all available interfaces when running training in distributed mode. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ngraph-mxnet version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-36701 Advisory: ngraph-mxnet 1.0.0 fixed a security bug that is causing MXNet to listen on all available interfaces when running training in distributed mode. | what vulnarability does ngraph-mxnet version less then 1.0.0 have | |
Having vulnarability CVE-2023-4570 Advisory: Ni-measurementlink-service 1.1.1 includes a fix for CVE-2023-4570: An improper access restriction in NI MeasurementLink Python services could allow an attacker on an adjacent network to reach services exposed on localhst. These services were previously thought to be unreachable outside of the node. This affects measurement plug-ins written in Python using version 1.1.0 of the ni-measurementlink-service Python package and all previous versions.
https://github.com/ni/measurementlink-python/security/advisories/GHSA-3f48-9j7q-q2gv | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ni-measurementlink-service version less then equal to 1.1.0 have ### Response: Having vulnarability CVE-2023-4570 Advisory: Ni-measurementlink-service 1.1.1 includes a fix for CVE-2023-4570: An improper access restriction in NI MeasurementLink Python services could allow an attacker on an adjacent network to reach services exposed on localhst. These services were previously thought to be unreachable outside of the node. This affects measurement plug-ins written in Python using version 1.1.0 of the ni-measurementlink-service Python package and all previous versions.
https://github.com/ni/measurementlink-python/security/advisories/GHSA-3f48-9j7q-q2gv | what vulnarability does ni-measurementlink-service version less then equal to 1.1.0 have | |
Having vulnarability PVE-2022-50625 Advisory: Nibiru-py 0.0.1 changes network default to secure (SSL).
https://github.com/NibiruChain/nibiru-py/pull/30 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nibiru-py version less then 0.0.1 have ### Response: Having vulnarability PVE-2022-50625 Advisory: Nibiru-py 0.0.1 changes network default to secure (SSL).
https://github.com/NibiruChain/nibiru-py/pull/30 | what vulnarability does nibiru-py version less then 0.0.1 have | |
Having vulnarability CVE-2022-22815 Advisory: Nicegui 0.7.2 updates its dependency 'pillow' to v9.0.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nicegui version less then 0.7.2 have ### Response: Having vulnarability CVE-2022-22815 Advisory: Nicegui 0.7.2 updates its dependency 'pillow' to v9.0.0 to include security fixes. | what vulnarability does nicegui version less then 0.7.2 have | |
Having vulnarability CVE-2023-4863 Advisory: Niceml 0.11.0 upgrades the pillow version to 10.1.0 to fix the CVE-2023-4863.
https://github.com/codecentric-oss/niceml/pull/89/commits/c36c28cc3b5721b19520057403b8241bae7a4fc8#diff-50c86b7ed8ac2cf95bd48334961bf0530cdc77b5a56f852c5c61b89d735fd711L47 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does niceml version less then 0.11.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Niceml 0.11.0 upgrades the pillow version to 10.1.0 to fix the CVE-2023-4863.
https://github.com/codecentric-oss/niceml/pull/89/commits/c36c28cc3b5721b19520057403b8241bae7a4fc8#diff-50c86b7ed8ac2cf95bd48334961bf0530cdc77b5a56f852c5c61b89d735fd711L47 | what vulnarability does niceml version less then 0.11.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Niche-Vlaanderen 1.1 includes a security patch for the function 'run_config_file' in 'niche_vlaanderen/niche.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/inbo/niche_vlaanderen/commit/cc1977d54a9267adf58bffbf0c275fb2c39bcfe8#diff-e87949fbb87229b550bad3c2ea146c46e0e1dc785be97a055eb067b3b3ec874b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does niche-vlaanderen version less then 1.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Niche-Vlaanderen 1.1 includes a security patch for the function 'run_config_file' in 'niche_vlaanderen/niche.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/inbo/niche_vlaanderen/commit/cc1977d54a9267adf58bffbf0c275fb2c39bcfe8#diff-e87949fbb87229b550bad3c2ea146c46e0e1dc785be97a055eb067b3b3ec874b | what vulnarability does niche-vlaanderen version less then 1.1 have | |
Having vulnarability PVE-2022-50466 Advisory: Nicotine-plus 1.0.0pre3 includes a fix for a DoS vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nicotine-plus version less then 1.0.0pre3 have ### Response: Having vulnarability PVE-2022-50466 Advisory: Nicotine-plus 1.0.0pre3 includes a fix for a DoS vulnerability. | what vulnarability does nicotine-plus version less then 1.0.0pre3 have | |
Having vulnarability CVE-2020-26137 Advisory: Nidaqmx 0.5.8 updates its dependency 'urllib3' to v1.25.9 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nidaqmx version less then 0.5.8 have ### Response: Having vulnarability CVE-2020-26137 Advisory: Nidaqmx 0.5.8 updates its dependency 'urllib3' to v1.25.9 to include security fixes. | what vulnarability does nidaqmx version less then 0.5.8 have | |
Having vulnarability CVE-2018-18074 Advisory: Nifcloud 0.1.7 updates its dependency 'requests' to v2.20.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nifcloud version less then 0.1.7 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Nifcloud 0.1.7 updates its dependency 'requests' to v2.20.0 to include a security fix. | what vulnarability does nifcloud version less then 0.1.7 have | |
Having vulnarability CVE-2021-23566 Advisory: Nikas 2.0.0 updates its NPM dependency 'nanoid' to v3.3.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nikas version less then 2.0.0 have ### Response: Having vulnarability CVE-2021-23566 Advisory: Nikas 2.0.0 updates its NPM dependency 'nanoid' to v3.3.1 to include a security fix. | what vulnarability does nikas version less then 2.0.0 have | |
Having vulnarability CVE-2024-23334 Advisory: Nikola version 8.3.1 addresses a directory traversal vulnerability within its nikola auto command, which stemmed from an issue in the aiottp library detailed in CVE-2024-23334. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nikola version less then 8.3.1 have ### Response: Having vulnarability CVE-2024-23334 Advisory: Nikola version 8.3.1 addresses a directory traversal vulnerability within its nikola auto command, which stemmed from an issue in the aiottp library detailed in CVE-2024-23334. | what vulnarability does nikola version less then 8.3.1 have | |
Having vulnarability PVE-2021-41725 Advisory: Nimview 0.1.2 adds a (weak) CSRF check.
https://github.com/marcomq/nimview/commit/e91ad0e656e75703c5101834c9fa86b12c1a22bf | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nimview version less then 0.1.2 have ### Response: Having vulnarability PVE-2021-41725 Advisory: Nimview 0.1.2 adds a (weak) CSRF check.
https://github.com/marcomq/nimview/commit/e91ad0e656e75703c5101834c9fa86b12c1a22bf | what vulnarability does nimview version less then 0.1.2 have | |
Having vulnarability CVE-2020-27783 Advisory: Nipyapi 0.16.2 updates its dependency 'lxml' minimum version to v4.6.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nipyapi version less then 0.16.2 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Nipyapi 0.16.2 updates its dependency 'lxml' minimum version to v4.6.2 to include a security fix. | what vulnarability does nipyapi version less then 0.16.2 have | |
Having vulnarability PVE-2024-63550 Advisory: Nitrokeyapp 1.0 addresses a critical security vulnerability present in earlier versions, where passwords were stored in plaintext in memory. This flaw posed a significant risk of unauthorized data access.
https://github.com/Nitrokey/nitrokey-app/commit/c1c00c0081083c9722ea890b1f6f3f1e5fd26bfb | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nitrokeyapp version less then 1.0 have ### Response: Having vulnarability PVE-2024-63550 Advisory: Nitrokeyapp 1.0 addresses a critical security vulnerability present in earlier versions, where passwords were stored in plaintext in memory. This flaw posed a significant risk of unauthorized data access.
https://github.com/Nitrokey/nitrokey-app/commit/c1c00c0081083c9722ea890b1f6f3f1e5fd26bfb | what vulnarability does nitrokeyapp version less then 1.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Njmls 0.0.3 includes a security patch for the function 'parse_row' in 'njmls.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/AlJohri/njmls/commit/a1b9aeca58512a4cba4262dc0233a6c8a14e26ab#diff-cc30712c59b1650a88a14f9c620608aaac65c3b1e35f006486ca7ec146f7f826 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does njmls version less then 0.0.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Njmls 0.0.3 includes a security patch for the function 'parse_row' in 'njmls.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/AlJohri/njmls/commit/a1b9aeca58512a4cba4262dc0233a6c8a14e26ab#diff-cc30712c59b1650a88a14f9c620608aaac65c3b1e35f006486ca7ec146f7f826 | what vulnarability does njmls version less then 0.0.3 have | |
Having vulnarability CVE-2021-27922 Advisory: Nkocr 2.0.0 updates its dependency 'pillow' to v8.1.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nkocr version less then 2.0.0 have ### Response: Having vulnarability CVE-2021-27922 Advisory: Nkocr 2.0.0 updates its dependency 'pillow' to v8.1.2 to include security fixes. | what vulnarability does nkocr version less then 2.0.0 have | |
Having vulnarability PVE-2024-64808 Advisory: Nlohmann-json 2.0.10 fixes a vulnerability discovered during continuous fuzz testing of the nlohmann JSON library by Google's OSS-Fuzz. It was identified as a heap-buffer-overflow error during the parsing of CBOR data.
https://github.com/nlohmann/json/commit/871cebaf84d4f896bc730a92937f8d02e09b0023 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nlohmann-json version less then 2.0.10 have ### Response: Having vulnarability PVE-2024-64808 Advisory: Nlohmann-json 2.0.10 fixes a vulnerability discovered during continuous fuzz testing of the nlohmann JSON library by Google's OSS-Fuzz. It was identified as a heap-buffer-overflow error during the parsing of CBOR data.
https://github.com/nlohmann/json/commit/871cebaf84d4f896bc730a92937f8d02e09b0023 | what vulnarability does nlohmann-json version less then 2.0.10 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.