output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2023-54914 Advisory: Nltk 3.6 includes a fix for a REDoS vulnerability.
https://github.com/nltk/nltk/pull/2597 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nltk version less then 3.6 have ### Response: Having vulnarability PVE-2023-54914 Advisory: Nltk 3.6 includes a fix for a REDoS vulnerability.
https://github.com/nltk/nltk/pull/2597 | what vulnarability does nltk version less then 3.6 have | |
Having vulnarability PVE-2022-45428 Advisory: Nmap-python is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nmap-python version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45428 Advisory: Nmap-python is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does nmap-python version greather then 0,less then 0 have | |
Having vulnarability CVE-2019-10844 Advisory: nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0.14 relies on the HOME environment variable, which might be untrusted. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nnabla version greather then equal to 0,less then 1.0.15 have ### Response: Having vulnarability CVE-2019-10844 Advisory: nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0.14 relies on the HOME environment variable, which might be untrusted. | what vulnarability does nnabla version greather then equal to 0,less then 1.0.15 have | |
Having vulnarability CVE-2020-1747 Advisory: Nni 2.1 includes a fix for YAML's CVE-2020-1747.
https://github.com/microsoft/nni/commit/0e8a9f8272affb1b41d576bc06c9eb59e763bbc3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nni version less then 2.1 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Nni 2.1 includes a fix for YAML's CVE-2020-1747.
https://github.com/microsoft/nni/commit/0e8a9f8272affb1b41d576bc06c9eb59e763bbc3 | what vulnarability does nni version less then 2.1 have | |
Having vulnarability CVE-2021-28658 Advisory: Nobinobi-child 0.1.3.6 updates its dependency 'django' to v3.2.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nobinobi-child version less then 0.1.3.6 have ### Response: Having vulnarability CVE-2021-28658 Advisory: Nobinobi-child 0.1.3.6 updates its dependency 'django' to v3.2.0 to include a security fix. | what vulnarability does nobinobi-child version less then 0.1.3.6 have | |
Having vulnarability CVE-2021-33571 Advisory: Nobinobi-core 0.1.4.3 updates underlying 'Django' dependency to v3.2.7 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nobinobi-core version less then 0.1.4.3 have ### Response: Having vulnarability CVE-2021-33571 Advisory: Nobinobi-core 0.1.4.3 updates underlying 'Django' dependency to v3.2.7 to include security fixes. | what vulnarability does nobinobi-core version less then 0.1.4.3 have | |
Having vulnarability CVE-2021-33203 Advisory: Nobinobi-daily-follow-up 0.1.1.12 updates its dependency 'django' to v3.2.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nobinobi-daily-follow-up version less then 0.1.1.12 have ### Response: Having vulnarability CVE-2021-33203 Advisory: Nobinobi-daily-follow-up 0.1.1.12 updates its dependency 'django' to v3.2.4 to include security fixes. | what vulnarability does nobinobi-daily-follow-up version less then 0.1.1.12 have | |
Having vulnarability CVE-2021-31542 Advisory: Nobinobi-staff 0.1.6.2 updates its dependency 'Django' to v3.2.7 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nobinobi-staff version less then 0.1.6.2 have ### Response: Having vulnarability CVE-2021-31542 Advisory: Nobinobi-staff 0.1.6.2 updates its dependency 'Django' to v3.2.7 to include security fixes. | what vulnarability does nobinobi-staff version less then 0.1.6.2 have | |
Having vulnarability PVE-2022-45448 Advisory: Noblesse is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does noblesse version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45448 Advisory: Noblesse is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | what vulnarability does noblesse version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45452 Advisory: Noblesse2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does noblesse2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45452 Advisory: Noblesse2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | what vulnarability does noblesse2 version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45453 Advisory: Noblessev2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does noblessev2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45453 Advisory: Noblessev2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | what vulnarability does noblessev2 version greather then 0,less then 0 have | |
Having vulnarability CVE-2017-3735 Advisory: Noiseprotocol 0.2.1 updates its dependency 'cryptography' to v2.1.3 to include a safe version of OpenSSL. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does noiseprotocol version less then 0.2.1 have ### Response: Having vulnarability CVE-2017-3735 Advisory: Noiseprotocol 0.2.1 updates its dependency 'cryptography' to v2.1.3 to include a safe version of OpenSSL. | what vulnarability does noiseprotocol version less then 0.2.1 have | |
Having vulnarability CVE-2024-21624 Advisory: nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. This security advisory pertains to a potential information leak (e.g., environment variables) in instances where developers utilize `MessageTemplate` and incorporate user-provided data into templates. The identified vulnerability has been remedied in pull request #2509 and will be included in versions released from 2.2.0. Users are strongly advised to upgrade to these patched versions to safeguard against the vulnerability. A temporary workaround involves filtering underscores before incorporating user input into the message template. See CVE-2024-21624. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nonebot2 version greather then equal to 2.0.0a16,less then equal to 2.1.3 have ### Response: Having vulnarability CVE-2024-21624 Advisory: nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. This security advisory pertains to a potential information leak (e.g., environment variables) in instances where developers utilize `MessageTemplate` and incorporate user-provided data into templates. The identified vulnerability has been remedied in pull request #2509 and will be included in versions released from 2.2.0. Users are strongly advised to upgrade to these patched versions to safeguard against the vulnerability. A temporary workaround involves filtering underscores before incorporating user input into the message template. See CVE-2024-21624. | what vulnarability does nonebot2 version greather then equal to 2.0.0a16,less then equal to 2.1.3 have | |
Having vulnarability CVE-2021-23437 Advisory: Norfair 0.4.0 updates its dependency 'pillow' to v9.0.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does norfair version less then 0.4.0 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Norfair 0.4.0 updates its dependency 'pillow' to v9.0.1 to include security fixes. | what vulnarability does norfair version less then 0.4.0 have | |
Having vulnarability CVE-2019-16784 Advisory: Normcap 0.1.1 pins its dependency 'PyInstaller' to a version >=3.6 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does normcap version less then 0.1.1 have ### Response: Having vulnarability CVE-2019-16784 Advisory: Normcap 0.1.1 pins its dependency 'PyInstaller' to a version >=3.6 to include a security fix. | what vulnarability does normcap version less then 0.1.1 have | |
Having vulnarability CVE-2021-20270 Advisory: Nornir 3.2.0 updates its dependency 'pygments' to v2.10.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nornir version less then 3.2.0 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Nornir 3.2.0 updates its dependency 'pygments' to v2.10.0 to include security fixes. | what vulnarability does nornir version less then 3.2.0 have | |
Having vulnarability PVE-2021-34447 Advisory: notable 0.0.6 fixes a security regression in the new BoltDB backend. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does notable version less then 0.0.6 have ### Response: Having vulnarability PVE-2021-34447 Advisory: notable 0.0.6 fixes a security regression in the new BoltDB backend. | what vulnarability does notable version less then 0.0.6 have | |
Having vulnarability PVE-2022-51747 Advisory: Notebok is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does notebok version greather then 0 have ### Response: Having vulnarability PVE-2022-51747 Advisory: Notebok is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does notebok version greather then 0 have | |
Having vulnarability CVE-2015-7337 Advisory: Notebook 4.0.5 includes security fixes for maliciously crafted files (CVE-2015-7337). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does notebook version less then 4.0.5 have ### Response: Having vulnarability CVE-2015-7337 Advisory: Notebook 4.0.5 includes security fixes for maliciously crafted files (CVE-2015-7337). | what vulnarability does notebook version less then 4.0.5 have | |
Having vulnarability PVE-2021-35116 Advisory: notifications-python-client before 4.7.1 is vulnerable to a not further described security issue in PyJWT. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does notifications-python-client version less then 4.7.1 have ### Response: Having vulnarability PVE-2021-35116 Advisory: notifications-python-client before 4.7.1 is vulnerable to a not further described security issue in PyJWT. | what vulnarability does notifications-python-client version less then 4.7.1 have | |
Having vulnarability CVE-2015-5162 Advisory: The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nova version less then 12.0.4,equal to 13.0.0 have ### Response: Having vulnarability CVE-2015-5162 Advisory: The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image. | what vulnarability does nova version less then 12.0.4,equal to 13.0.0 have | |
Having vulnarability CVE-2017-5936 Advisory: OpenStack Nova-LXD before 13.1.1 uses the wrong name for the veth pairs when applying Neutron security group rules for instances, which allows remote attackers to bypass intended security restrictions. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nova-lxd version less then 13.1.1 have ### Response: Having vulnarability CVE-2017-5936 Advisory: OpenStack Nova-LXD before 13.1.1 uses the wrong name for the veth pairs when applying Neutron security group rules for instances, which allows remote attackers to bypass intended security restrictions. | what vulnarability does nova-lxd version less then 13.1.1 have | |
Having vulnarability CVE-2019-10138 Advisory: Novajoin 1.1.1 includes a fix for CVE-2019-10138: A flaw was discovered in the python-novajoin plugin, all versions up to, excluding 1.1.1, for Red Hat OpenStack Platform. The novajoin API lacked sufficient access control, allowing any keystone authenticated user to generate FreeIPA tokens. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does novajoin version less then 1.1.1 have ### Response: Having vulnarability CVE-2019-10138 Advisory: Novajoin 1.1.1 includes a fix for CVE-2019-10138: A flaw was discovered in the python-novajoin plugin, all versions up to, excluding 1.1.1, for Red Hat OpenStack Platform. The novajoin API lacked sufficient access control, allowing any keystone authenticated user to generate FreeIPA tokens. | what vulnarability does novajoin version less then 1.1.1 have | |
Having vulnarability PVE-2023-52919 Advisory: Nowsys is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nowsys version greather then 0 have ### Response: Having vulnarability PVE-2023-52919 Advisory: Nowsys is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does nowsys version greather then 0 have | |
Having vulnarability CVE-2020-14343 Advisory: Nox-poetry 0.8.2 updates its dependency 'pyyaml' to v5.4.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nox-poetry version less then 0.8.2 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Nox-poetry 0.8.2 updates its dependency 'pyyaml' to v5.4.1 to include a security fix. | what vulnarability does nox-poetry version less then 0.8.2 have | |
Having vulnarability CVE-2021-45105 Advisory: Nphase 1.1.3 and prior include a version of 'Gatk' (4.0) affected by critical and severe vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nphase version less then equal to 1.1.3 have ### Response: Having vulnarability CVE-2021-45105 Advisory: Nphase 1.1.3 and prior include a version of 'Gatk' (4.0) affected by critical and severe vulnerabilities. | what vulnarability does nphase version less then equal to 1.1.3 have | |
Having vulnarability CVE-2019-25091 Advisory: A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file `src/nsupdate/settings/base.py` of the component `CSRF Cookie Handler`. The manipulation of the argument `CSRF_COOKIE_HTTPONLY` leads to cookie without `httponly` flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nsupdate version less then 0.12.0 have ### Response: Having vulnarability CVE-2019-25091 Advisory: A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file `src/nsupdate/settings/base.py` of the component `CSRF Cookie Handler`. The manipulation of the argument `CSRF_COOKIE_HTTPONLY` leads to cookie without `httponly` flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability. | what vulnarability does nsupdate version less then 0.12.0 have | |
Having vulnarability PVE-2022-52343 Advisory: Ntopng 3.0 includes a fix for a HTTP header injection vulnerability.
https://github.com/ntop/ntopng/commit/9469e58f07e043da712e6d6c41244852a11bcaeb | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ntopng version less then 3.0 have ### Response: Having vulnarability PVE-2022-52343 Advisory: Ntopng 3.0 includes a fix for a HTTP header injection vulnerability.
https://github.com/ntop/ntopng/commit/9469e58f07e043da712e6d6c41244852a11bcaeb | what vulnarability does ntopng version less then 3.0 have | |
Having vulnarability CVE-2023-4807 Advisory: Nucliadb 2.44.1 updates its cryptography dependency from 42.0.2 to 42.0.4 due to the CVE-2023-4807.
https://github.com/nuclia/nucliadb/pull/1881/commits/bd2366f23f0388d1b02ced16b25e473ecf73744a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nucliadb version less then 2.44.1 have ### Response: Having vulnarability CVE-2023-4807 Advisory: Nucliadb 2.44.1 updates its cryptography dependency from 42.0.2 to 42.0.4 due to the CVE-2023-4807.
https://github.com/nuclia/nucliadb/pull/1881/commits/bd2366f23f0388d1b02ced16b25e473ecf73744a | what vulnarability does nucliadb version less then 2.44.1 have | |
Having vulnarability CVE-2023-24816 Advisory: Nuclio-jupyter 0.9.9 updates its dependency 'ipython' requirement to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nuclio-jupyter version less then 0.9.9 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Nuclio-jupyter 0.9.9 updates its dependency 'ipython' requirement to include a security fix. | what vulnarability does nuclio-jupyter version less then 0.9.9 have | |
Having vulnarability PVE-2021-39648 Advisory: Nuitka 0.6.12 uses https URLs for downloading dependency walker, for it to be more secure. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nuitka version less then 0.6.12 have ### Response: Having vulnarability PVE-2021-39648 Advisory: Nuitka 0.6.12 uses https URLs for downloading dependency walker, for it to be more secure. | what vulnarability does nuitka version less then 0.6.12 have | |
Having vulnarability CVE-2023-41040 Advisory: Numato-gpio 0.11.1 updates its gitpython dependency to version 3.1.37 from 3.1.32 in response to the security vulnerability identified as CVE-2023-41040.
https://github.com/clssn/numato-gpio/commit/b6b05d0868029db48ee45a9da6365d156e932e13 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does numato-gpio version less then 0.11.1 have ### Response: Having vulnarability CVE-2023-41040 Advisory: Numato-gpio 0.11.1 updates its gitpython dependency to version 3.1.37 from 3.1.32 in response to the security vulnerability identified as CVE-2023-41040.
https://github.com/clssn/numato-gpio/commit/b6b05d0868029db48ee45a9da6365d156e932e13 | what vulnarability does numato-gpio version less then 0.11.1 have | |
Having vulnarability PVE-2021-38983 Advisory: Numba 0.49.0 fixes a frame injection vulnerability in the dispatcher tracing path, that lead to DoS. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does numba version less then 0.49.0 have ### Response: Having vulnarability PVE-2021-38983 Advisory: Numba 0.49.0 fixes a frame injection vulnerability in the dispatcher tracing path, that lead to DoS. | what vulnarability does numba version less then 0.49.0 have | |
Having vulnarability CVE-2017-12852 Advisory: Numpy 1.13.2 includes a fix for CVE-2017-12852: The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack.
https://github.com/numpy/numpy/issues/9560#issuecomment-322395292 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does numpy version less then 1.13.2 have ### Response: Having vulnarability CVE-2017-12852 Advisory: Numpy 1.13.2 includes a fix for CVE-2017-12852: The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack.
https://github.com/numpy/numpy/issues/9560#issuecomment-322395292 | what vulnarability does numpy version less then 1.13.2 have | |
Having vulnarability PVE-2022-49315 Advisory: Nuplone 2.1.0 adds CSRF auth token to paste url.
https://github.com/euphorie/NuPlone/commit/f52e70928c03d1c92c6a6d10a26e3c294d029ae7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nuplone version less then 2.1.0 have ### Response: Having vulnarability PVE-2022-49315 Advisory: Nuplone 2.1.0 adds CSRF auth token to paste url.
https://github.com/euphorie/NuPlone/commit/f52e70928c03d1c92c6a6d10a26e3c294d029ae7 | what vulnarability does nuplone version less then 2.1.0 have | |
Having vulnarability CVE-2021-43818 Advisory: Nuts 3.1.0 updates its dependency 'lxml' to version '4.6.5' to include a fix for a Cross-Site Scripting vulnerability.
https://github.com/network-unit-testing-system/nuts/pull/56 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nuts version less then 3.1.0 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Nuts 3.1.0 updates its dependency 'lxml' to version '4.6.5' to include a fix for a Cross-Site Scripting vulnerability.
https://github.com/network-unit-testing-system/nuts/pull/56 | what vulnarability does nuts version less then 3.1.0 have | |
Having vulnarability PVE-2022-49489 Advisory: Nvflare 2.1.1 signs and loads privilege yaml file by secure content service.
https://github.com/NVIDIA/NVFlare/pull/403/commits/1fb8369826ca342122a187af5ac572acd7bb41b0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nvflare version less then 2.1.1 have ### Response: Having vulnarability PVE-2022-49489 Advisory: Nvflare 2.1.1 signs and loads privilege yaml file by secure content service.
https://github.com/NVIDIA/NVFlare/pull/403/commits/1fb8369826ca342122a187af5ac572acd7bb41b0 | what vulnarability does nvflare version less then 2.1.1 have | |
Having vulnarability CVE-2021-34141 Advisory: Nwb-conversion-tools 0.11.38 updates its dependency 'numpy' to v1.22.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nwb-conversion-tools version less then 0.11.38 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Nwb-conversion-tools 0.11.38 updates its dependency 'numpy' to v1.22.0 to include security fixes. | what vulnarability does nwb-conversion-tools version less then 0.11.38 have | |
Having vulnarability PVE-2021-39077 Advisory: Oauth-pyzure 0.1.4 is based on OSS vulnerability reports. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oauth-pyzure version less then 0.1.4 have ### Response: Having vulnarability PVE-2021-39077 Advisory: Oauth-pyzure 0.1.4 is based on OSS vulnerability reports. | what vulnarability does oauth-pyzure version less then 0.1.4 have | |
Having vulnarability CVE-2013-4347 Advisory: Oauth2 1.9 includes a fix for CVE-2013-4347: It was found that python-oauth2 did not properly generate random values for use in nonces. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website.
https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oauth2 version less then 1.9 have ### Response: Having vulnarability CVE-2013-4347 Advisory: Oauth2 1.9 includes a fix for CVE-2013-4347: It was found that python-oauth2 did not properly generate random values for use in nonces. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website.
https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650 | what vulnarability does oauth2 version less then 1.9 have | |
Having vulnarability CVE-2022-31027 Advisory: OAuthenticator is an OAuth token library for the JupyerHub login handler. CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub only to users of a given institute. The allowed_idps configuration trait of CILogonOAuthenticator is documented to be a list of domains that indicate the institutions whose users are authorized to access this JupyterHub. This authorization is validated by ensuring that the *email* field provided to us by CILogon has a *domain* that matches one of the domains listed in `allowed_idps`.If `allowed_idps` contains `berkeley.edu`, you might expect only users with valid current credentials provided by University of California, Berkeley to be able to access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider is used by the user to login, only the email address provided. So a user can login with a GitHub account that has email set to `<something>@berkeley.edu`, and that will be treated exactly the same as someone logging in using the UC Berkeley official Identity Provider. The patch fixing this issue makes a *breaking change* in how `allowed_idps` is interpreted. It's no longer a list of domains, but configuration representing the `EntityID` of the IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/). Users are advised to upgrade. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oauthenticator version greather then equal to 0,less then 15.0.0 have ### Response: Having vulnarability CVE-2022-31027 Advisory: OAuthenticator is an OAuth token library for the JupyerHub login handler. CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub only to users of a given institute. The allowed_idps configuration trait of CILogonOAuthenticator is documented to be a list of domains that indicate the institutions whose users are authorized to access this JupyterHub. This authorization is validated by ensuring that the *email* field provided to us by CILogon has a *domain* that matches one of the domains listed in `allowed_idps`.If `allowed_idps` contains `berkeley.edu`, you might expect only users with valid current credentials provided by University of California, Berkeley to be able to access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider is used by the user to login, only the email address provided. So a user can login with a GitHub account that has email set to `<something>@berkeley.edu`, and that will be treated exactly the same as someone logging in using the UC Berkeley official Identity Provider. The patch fixing this issue makes a *breaking change* in how `allowed_idps` is interpreted. It's no longer a list of domains, but configuration representing the `EntityID` of the IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/). Users are advised to upgrade. | what vulnarability does oauthenticator version greather then equal to 0,less then 15.0.0 have | |
Having vulnarability PVE-2021-25909 Advisory: oauthlib before 0.7.0 is not stripping client provided passwords from OAuth2 logs.
https://github.com/oauthlib/oauthlib/commit/fef1f7987cc6298e744b7d4290e3fc9a9701831b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oauthlib version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-25909 Advisory: oauthlib before 0.7.0 is not stripping client provided passwords from OAuth2 logs.
https://github.com/oauthlib/oauthlib/commit/fef1f7987cc6298e744b7d4290e3fc9a9701831b | what vulnarability does oauthlib version less then 0.7.0 have | |
Having vulnarability CVE-2019-14806 Advisory: Obasparql 2.0.1 updates 'WerkZeug' to versions '>=0.15.3' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does obasparql version less then 2.0.1 have ### Response: Having vulnarability CVE-2019-14806 Advisory: Obasparql 2.0.1 updates 'WerkZeug' to versions '>=0.15.3' to include security fixes. | what vulnarability does obasparql version less then 2.0.1 have | |
Having vulnarability CVE-2023-37920 Advisory: Obiba-opal 5.2.1 updates its dependency 'certifi' to version '2023.7.22' include a fix.
https://github.com/obiba/opal-python-client/pull/35 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does obiba-opal version less then 5.2.1 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Obiba-opal 5.2.1 updates its dependency 'certifi' to version '2023.7.22' include a fix.
https://github.com/obiba/opal-python-client/pull/35 | what vulnarability does obiba-opal version less then 5.2.1 have | |
Having vulnarability CVE-2021-43818 Advisory: Obsei 0.0.11 updates its dependency 'lxml' to v4.7.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does obsei version less then 0.0.11 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Obsei 0.0.11 updates its dependency 'lxml' to v4.7.1 to include a security fix. | what vulnarability does obsei version less then 0.0.11 have | |
Having vulnarability PVE-2021-38088 Advisory: Obsplus 0.0.6 switched from MD5 hashing to SHA256 as the latter is more secure and the computational differences were negligible. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does obsplus version less then 0.0.6 have ### Response: Having vulnarability PVE-2021-38088 Advisory: Obsplus 0.0.6 switched from MD5 hashing to SHA256 as the latter is more secure and the computational differences were negligible. | what vulnarability does obsplus version less then 0.0.6 have | |
Having vulnarability PVE-2022-48122 Advisory: Ocean-contracts 1.0.0a1 avoids a potential attack when using infinite approvals.
https://github.com/oceanprotocol/contracts/issues/375 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ocean-contracts version less then 1.0.0a1 have ### Response: Having vulnarability PVE-2022-48122 Advisory: Ocean-contracts 1.0.0a1 avoids a potential attack when using infinite approvals.
https://github.com/oceanprotocol/contracts/issues/375 | what vulnarability does ocean-contracts version less then 1.0.0a1 have | |
Having vulnarability CVE-2018-10903 Advisory: Oci version 2.0.2 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oci version less then 2.0.2 have ### Response: Having vulnarability CVE-2018-10903 Advisory: Oci version 2.0.2 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage. | what vulnarability does oci version less then 2.0.2 have | |
Having vulnarability CVE-2020-36242 Advisory: Oci-cli 2.24.0 updates its dependency 'cryptography' to v3.3.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oci-cli version less then 2.24.0 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Oci-cli 2.24.0 updates its dependency 'cryptography' to v3.3.2 to include a security fix. | what vulnarability does oci-cli version less then 2.24.0 have | |
Having vulnarability CVE-2010-4338 Advisory: Ocrodjvu 0.6.1 fixes insecure use of temporary files when using Cuneiform.
https://bugs.debian.org/598134
https://github.com/jwilk/ocrodjvu/commit/5e72e5472dd47817f65ba19830b01aa4f2cb50f8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ocrodjvu version less then 0.6.1 have ### Response: Having vulnarability CVE-2010-4338 Advisory: Ocrodjvu 0.6.1 fixes insecure use of temporary files when using Cuneiform.
https://bugs.debian.org/598134
https://github.com/jwilk/ocrodjvu/commit/5e72e5472dd47817f65ba19830b01aa4f2cb50f8 | what vulnarability does ocrodjvu version less then 0.6.1 have | |
Having vulnarability CVE-2019-3895 Advisory: An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. See: CVE-2019-3895. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octavia version less then 0.9.0 have ### Response: Having vulnarability CVE-2019-3895 Advisory: An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. See: CVE-2019-3895. | what vulnarability does octavia version less then 0.9.0 have | |
Having vulnarability CVE-2021-36711 Advisory: WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octobot version greather then equal to 0,less then 0.4.4 have ### Response: Having vulnarability CVE-2021-36711 Advisory: WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled. | what vulnarability does octobot version greather then equal to 0,less then 0.4.4 have | |
Having vulnarability CVE-2024-23637 Advisory: OctoPrint 1.10.0rc1 addresses the CVE-2024-23637. This vulnerability allowed unauthorized admins to alter the passwords of other admin accounts, potentially leading to account lockouts and loss of control over the OctoPrint instance. The update resolves this by enforcing proper authentication procedures. It is recommended that all OctoPrint administrators review their access controls to prevent potential exploitation of this vulnerability.
https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-5626-pw9c-hmjr | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octoprint version less then 1.10.0rc1 have ### Response: Having vulnarability CVE-2024-23637 Advisory: OctoPrint 1.10.0rc1 addresses the CVE-2024-23637. This vulnerability allowed unauthorized admins to alter the passwords of other admin accounts, potentially leading to account lockouts and loss of control over the OctoPrint instance. The update resolves this by enforcing proper authentication procedures. It is recommended that all OctoPrint administrators review their access controls to prevent potential exploitation of this vulnerability.
https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-5626-pw9c-hmjr | what vulnarability does octoprint version less then 1.10.0rc1 have | |
Having vulnarability PVE-2022-48252 Advisory: Octoprint-nanny 0.10.0 sends PrintNanny Cloud API requests via forward proxy as a security measure. Cross-origin requests from OctoPrint javascript are disallowed. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octoprint-nanny version less then 0.10.0 have ### Response: Having vulnarability PVE-2022-48252 Advisory: Octoprint-nanny 0.10.0 sends PrintNanny Cloud API requests via forward proxy as a security measure. Cross-origin requests from OctoPrint javascript are disallowed. | what vulnarability does octoprint-nanny version less then 0.10.0 have | |
Having vulnarability CVE-2021-33430 Advisory: Octue 0.10.4 updates its dependency 'numpy' to v1.21.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octue version less then 0.10.4 have ### Response: Having vulnarability CVE-2021-33430 Advisory: Octue 0.10.4 updates its dependency 'numpy' to v1.21.0 to include a security fix. | what vulnarability does octue version less then 0.10.4 have | |
Having vulnarability PVE-2023-61861 Advisory: Odooghost 0.2.0 includes a security fix: Change ownership of /etc/odoo directory to odoo user.
https://github.com/remyz17/odooghost/commit/ac616176a83f405eb4e195656e91240ccf05d360 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does odooghost version less then 0.2.0 have ### Response: Having vulnarability PVE-2023-61861 Advisory: Odooghost 0.2.0 includes a security fix: Change ownership of /etc/odoo directory to odoo user.
https://github.com/remyz17/odooghost/commit/ac616176a83f405eb4e195656e91240ccf05d360 | what vulnarability does odooghost version less then 0.2.0 have | |
Having vulnarability PVE-2021-37666 Advisory: Oe-geoutils 1.5.2 solves security vulnerabilities from external packages 101. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oe-geoutils version less then 1.5.2 have ### Response: Having vulnarability PVE-2021-37666 Advisory: Oe-geoutils 1.5.2 solves security vulnerabilities from external packages 101. | what vulnarability does oe-geoutils version less then 1.5.2 have | |
Having vulnarability CVE-2013-1665 Advisory: Oem 0.3.0 uses 'defusedxml' to handle XML-related vulnerabilities.
https://github.com/bradsease/oem/issues/9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oem version less then 0.3.0 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Oem 0.3.0 uses 'defusedxml' to handle XML-related vulnerabilities.
https://github.com/bradsease/oem/issues/9 | what vulnarability does oem version less then 0.3.0 have | |
Having vulnarability CVE-2010-4532 Advisory: offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does offlineimap version less then 6.3.2-rc1 have ### Response: Having vulnarability CVE-2010-4532 Advisory: offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks. | what vulnarability does offlineimap version less then 6.3.2-rc1 have | |
Having vulnarability PVE-2022-48031 Advisory: Oger 1.2 fixes a code injection vulnerability involving eval().
https://github.com/OntoGene/OGER/commit/454054dd5d44b7ebab0ec4e453e59822e3c08ca7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oger version less then 1.2 have ### Response: Having vulnarability PVE-2022-48031 Advisory: Oger 1.2 fixes a code injection vulnerability involving eval().
https://github.com/OntoGene/OGER/commit/454054dd5d44b7ebab0ec4e453e59822e3c08ca7 | what vulnarability does oger version less then 1.2 have | |
Having vulnarability CVE-2020-26244 Advisory: In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library.
The issues are:
1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg.
2) JWA `none` algorithm was allowed in all flows.
3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator.
4) iat claim was not checked for sanity (i.e. it could be in the future).
See CVE-2020-26244. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oic version less then 1.2.1 have ### Response: Having vulnarability CVE-2020-26244 Advisory: In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library.
The issues are:
1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg.
2) JWA `none` algorithm was allowed in all flows.
3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator.
4) iat claim was not checked for sanity (i.e. it could be in the future).
See CVE-2020-26244. | what vulnarability does oic version less then 1.2.1 have | |
Having vulnarability PVE-2022-51695 Advisory: Oiu is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oiu version greather then 0 have ### Response: Having vulnarability PVE-2022-51695 Advisory: Oiu is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does oiu version greather then 0 have | |
Having vulnarability CVE-2024-3651 Advisory: Okdata-aws version 4.1.0 has upgraded its idna dependency from version 3.3 to 3.7 in response to CVE-2024-3651. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does okdata-aws version less then 4.1.0 have ### Response: Having vulnarability CVE-2024-3651 Advisory: Okdata-aws version 4.1.0 has upgraded its idna dependency from version 3.3 to 3.7 in response to CVE-2024-3651. | what vulnarability does okdata-aws version less then 4.1.0 have | |
Having vulnarability CVE-2021-33503 Advisory: Okdata-cli version 0.12.1 updates its dependency "urlib3" to v1.26.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does okdata-cli version less then 0.12.1 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Okdata-cli version 0.12.1 updates its dependency "urlib3" to v1.26.5 to include a security fix. | what vulnarability does okdata-cli version less then 0.12.1 have | |
Having vulnarability CVE-2016-7036 Advisory: Okdata-sdk version 3.1.1 updates its dependency, upgrading python-keycloak to eliminate the use of python-jose. This change addresses the security vulnerability identified in CVE-2016-7036. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does okdata-sdk version less then 3.1.1 have ### Response: Having vulnarability CVE-2016-7036 Advisory: Okdata-sdk version 3.1.1 updates its dependency, upgrading python-keycloak to eliminate the use of python-jose. This change addresses the security vulnerability identified in CVE-2016-7036. | what vulnarability does okdata-sdk version less then 3.1.1 have | |
Having vulnarability PVE-2022-47998 Advisory: Oksana is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oksana version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47998 Advisory: Oksana is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | what vulnarability does oksana version greather then 0,less then 0 have | |
Having vulnarability CVE-2021-33503 Advisory: Omegaml 0.15.2 updates its dependency 'urllib3' to v1.26.5 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omegaml version less then 0.15.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Omegaml 0.15.2 updates its dependency 'urllib3' to v1.26.5 to include security fixes. | what vulnarability does omegaml version less then 0.15.2 have | |
Having vulnarability CVE-2021-41132 Advisory: Omero-figure 4.4.1 includes a fix for CVE-2021-41132, which also affects the related package 'OMERO.web'.
https://www.openmicroscopy.org/security/advisories/2021-SV3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omero-figure version less then 4.4.1 have ### Response: Having vulnarability CVE-2021-41132 Advisory: Omero-figure 4.4.1 includes a fix for CVE-2021-41132, which also affects the related package 'OMERO.web'.
https://www.openmicroscopy.org/security/advisories/2021-SV3 | what vulnarability does omero-figure version less then 4.4.1 have | |
Having vulnarability CVE-2021-41132 Advisory: Omero-web 5.11.0 includes a fix for CVE-2021-41132: In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of 'jQuery.html()', there are a whole of cross-site scripting possibilities with specially crafted input to a variety of fields.
https://www.openmicroscopy.org/security/advisories/2021-SV3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omero-web version less then 5.11.0 have ### Response: Having vulnarability CVE-2021-41132 Advisory: Omero-web 5.11.0 includes a fix for CVE-2021-41132: In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of 'jQuery.html()', there are a whole of cross-site scripting possibilities with specially crafted input to a variety of fields.
https://www.openmicroscopy.org/security/advisories/2021-SV3 | what vulnarability does omero-web version less then 5.11.0 have | |
Having vulnarability PVE-2023-99954 Advisory: It was found that versions of omise before 0.12.0 had a vulnerability involving the exposure of sensitive data in the logging system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omise version less then 0.12.0 have ### Response: Having vulnarability PVE-2023-99954 Advisory: It was found that versions of omise before 0.12.0 had a vulnerability involving the exposure of sensitive data in the logging system. | what vulnarability does omise version less then 0.12.0 have | |
Having vulnarability PVE-2022-44804 Advisory: Omni-api 0.4.1 includes a more secure handling of errors .
https://github.com/hivesolutions/omni_api/commit/ae4a5179b4c8698b4b813e9ca2909fd8b299a307 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omni-api version less then 0.4.1 have ### Response: Having vulnarability PVE-2022-44804 Advisory: Omni-api 0.4.1 includes a more secure handling of errors .
https://github.com/hivesolutions/omni_api/commit/ae4a5179b4c8698b4b813e9ca2909fd8b299a307 | what vulnarability does omni-api version less then 0.4.1 have | |
Having vulnarability PVE-2021-43353 Advisory: Omnikdatalogger 1.10.4 uses secure connection (HTTPS) to interact with PVOutput website.
https://github.com/jbouwh/omnikdatalogger/pull/56/commits/85eb0af91b5912295745a2ec074e71354374b8b6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omnikdatalogger version less then 1.10.4 have ### Response: Having vulnarability PVE-2021-43353 Advisory: Omnikdatalogger 1.10.4 uses secure connection (HTTPS) to interact with PVOutput website.
https://github.com/jbouwh/omnikdatalogger/pull/56/commits/85eb0af91b5912295745a2ec074e71354374b8b6 | what vulnarability does omnikdatalogger version less then 1.10.4 have | |
Having vulnarability CVE-2020-14343 Advisory: Omnizart 0.3.3 updates its dependency 'pyyaml' to v5.4.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omnizart version less then 0.3.3 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Omnizart 0.3.3 updates its dependency 'pyyaml' to v5.4.1 to include a security fix. | what vulnarability does omnizart version less then 0.3.3 have | |
Having vulnarability PVE-2022-49400 Advisory: Omorfi 0.9.9 fixes an injection vulnerability in python OOV handling.
https://github.com/flammie/omorfi/commit/b4d7a5dba1768a7067fd6bd4e8c80cfe465556ce | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omorfi version less then 0.9.9 have ### Response: Having vulnarability PVE-2022-49400 Advisory: Omorfi 0.9.9 fixes an injection vulnerability in python OOV handling.
https://github.com/flammie/omorfi/commit/b4d7a5dba1768a7067fd6bd4e8c80cfe465556ce | what vulnarability does omorfi version less then 0.9.9 have | |
Having vulnarability CVE-2021-26722 Advisory: LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oncall version greather then equal to 0,less then 1.4.1 have ### Response: Having vulnarability CVE-2021-26722 Advisory: LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar. | what vulnarability does oncall version greather then equal to 0,less then 1.4.1 have | |
Having vulnarability CVE-2018-18074 Advisory: Onecodex 0.10.0 updates its dependency 'requests' to v2.27.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onecodex version less then 0.10.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Onecodex 0.10.0 updates its dependency 'requests' to v2.27.1 to include a security fix. | what vulnarability does onecodex version less then 0.10.0 have | |
Having vulnarability PVE-2023-59633 Advisory: Onefuzz 1.5.0 includes a fix for a Race Condition vulnerability.
https://github.com/microsoft/onefuzz/pull/204 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onefuzz version less then 1.5.0 have ### Response: Having vulnarability PVE-2023-59633 Advisory: Onefuzz 1.5.0 includes a fix for a Race Condition vulnerability.
https://github.com/microsoft/onefuzz/pull/204 | what vulnarability does onefuzz version less then 1.5.0 have | |
Having vulnarability PVE-2021-42852 Advisory: Onegov.form before 0.16.1 is not escaping HTML labels in the dynamic formbuilder.
https://github.com/OneGov/onegov.form/commit/abce4e1ca620de244460f005f9d2412683552f30 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onegov-form version less then 0.16.1 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Onegov.form before 0.16.1 is not escaping HTML labels in the dynamic formbuilder.
https://github.com/OneGov/onegov.form/commit/abce4e1ca620de244460f005f9d2412683552f30 | what vulnarability does onegov-form version less then 0.16.1 have | |
Having vulnarability PVE-2021-37158 Advisory: For security reasons, onelogin-aws-assume-role 1.3.0 removes the ability to provide the IP using a command line parameter and is instead able to provide the IP address at the onelogin.sdk.json file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onelogin-aws-assume-role version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-37158 Advisory: For security reasons, onelogin-aws-assume-role 1.3.0 removes the ability to provide the IP using a command line parameter and is instead able to provide the IP address at the onelogin.sdk.json file. | what vulnarability does onelogin-aws-assume-role version less then 1.3.0 have | |
Having vulnarability PVE-2023-62978 Advisory: Onetl 0.10.0 includes a fix for a race condition vulnerability which could compromise availability.
https://github.com/MobileTeleSystems/onetl/pull/189 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onetl version less then 0.10.0 have ### Response: Having vulnarability PVE-2023-62978 Advisory: Onetl 0.10.0 includes a fix for a race condition vulnerability which could compromise availability.
https://github.com/MobileTeleSystems/onetl/pull/189 | what vulnarability does onetl version less then 0.10.0 have | |
Having vulnarability CVE-2016-5026 Advisory: hs.py in OnionShare before 0.9.1 allows local users to modify the hiddenservice by pre-creating the /tmp/onionshare directory. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onionshare-cli version less then 0.9.1 have ### Response: Having vulnarability CVE-2016-5026 Advisory: hs.py in OnionShare before 0.9.1 allows local users to modify the hiddenservice by pre-creating the /tmp/onionshare directory. | what vulnarability does onionshare-cli version less then 0.9.1 have | |
Having vulnarability PVE-2021-25912 Advisory: onixcheck 0.8.0 adds secured XML-Parsing via defusedxml. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onixcheck version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-25912 Advisory: onixcheck 0.8.0 adds secured XML-Parsing via defusedxml. | what vulnarability does onixcheck version less then 0.8.0 have | |
Having vulnarability CVE-2022-25882 Advisory: Onnx 1.13.0 includes a fix for CVE-2022-25882: Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onnx version less then 1.13.0 have ### Response: Having vulnarability CVE-2022-25882 Advisory: Onnx 1.13.0 includes a fix for CVE-2022-25882: Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. | what vulnarability does onnx version less then 1.13.0 have | |
Having vulnarability CVE-2022-1941 Advisory: Onnxruntime 1.13.1 updates 'protobuf' to v3.18.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onnxruntime version less then 1.13.1 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Onnxruntime 1.13.1 updates 'protobuf' to v3.18.3 to include a security fix. | what vulnarability does onnxruntime version less then 1.13.1 have | |
Having vulnarability PVE-2023-54816 Advisory: Onyxproxy is a malicious package. It harvests and exfiltrates sensitive data.
https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onyxproxy version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-54816 Advisory: Onyxproxy is a malicious package. It harvests and exfiltrates sensitive data.
https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection | what vulnarability does onyxproxy version greather then equal to 0 have | |
Having vulnarability CVE-2023-37276 Advisory: Oobabot 0.2.3 updates its dependency 'aiohttp' to v3.8.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oobabot version less then 0.2.3 have ### Response: Having vulnarability CVE-2023-37276 Advisory: Oobabot 0.2.3 updates its dependency 'aiohttp' to v3.8.5 to include a security fix. | what vulnarability does oobabot version less then 0.2.3 have | |
Having vulnarability CVE-2023-34239 Advisory: Oobabot-plugin 0.2.0 updates its dependency 'gradio' to version '3.34.0' to include a fix for an improper input validation vulnerability.
https://github.com/chrisrude/oobabot-plugin/commit/b41a3b9006dbb24c6c6e2a5c7c0ecbc86a741f95 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oobabot-plugin version less then 0.2.0 have ### Response: Having vulnarability CVE-2023-34239 Advisory: Oobabot-plugin 0.2.0 updates its dependency 'gradio' to version '3.34.0' to include a fix for an improper input validation vulnerability.
https://github.com/chrisrude/oobabot-plugin/commit/b41a3b9006dbb24c6c6e2a5c7c0ecbc86a741f95 | what vulnarability does oobabot-plugin version less then 0.2.0 have | |
Having vulnarability PVE-2021-25913 Advisory: Oodt before 0.4 is vulnerable to XSS attacks via malformed query strings.
https://issues.apache.org/jira/browse/OODT-364
https://github.com/apache/oodt/commit/cf6ff6b5437cee01792269cc16010e595547a64d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oodt version less then 0.4 have ### Response: Having vulnarability PVE-2021-25913 Advisory: Oodt before 0.4 is vulnerable to XSS attacks via malformed query strings.
https://issues.apache.org/jira/browse/OODT-364
https://github.com/apache/oodt/commit/cf6ff6b5437cee01792269cc16010e595547a64d | what vulnarability does oodt version less then 0.4 have | |
Having vulnarability PVE-2021-25914 Advisory: ooniprobe before 1.0.2 is vulnerable to several undisclosed security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ooniprobe version less then 1.0.2 have ### Response: Having vulnarability PVE-2021-25914 Advisory: ooniprobe before 1.0.2 is vulnerable to several undisclosed security issues. | what vulnarability does ooniprobe version less then 1.0.2 have | |
Having vulnarability CVE-2020-28477 Advisory: Opacus 0.12.0 updates its dependency 'immer' to v8.0.1 to include a security fix.
https://github.com/pytorch/opacus/commit/4e8c77f1fd909fcc97b752ac955f450a1e6d2f71 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opacus version less then 0.12.0 have ### Response: Having vulnarability CVE-2020-28477 Advisory: Opacus 0.12.0 updates its dependency 'immer' to v8.0.1 to include a security fix.
https://github.com/pytorch/opacus/commit/4e8c77f1fd909fcc97b752ac955f450a1e6d2f71 | what vulnarability does opacus version less then 0.12.0 have | |
Having vulnarability CVE-2022-25304 Advisory: All versions of package opcua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opcua version greather then 0 have ### Response: Having vulnarability CVE-2022-25304 Advisory: All versions of package opcua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk. | what vulnarability does opcua version greather then 0 have | |
Having vulnarability PVE-2023-59676 Advisory: Open-aea 0.5.3 includes a fix for a Race Condition vulnerability.
https://github.com/valory-xyz/open-aea/commit/4c5efa6c2268b2f4afe030de7172132bc001036d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does open-aea version less then 0.5.3 have ### Response: Having vulnarability PVE-2023-59676 Advisory: Open-aea 0.5.3 includes a fix for a Race Condition vulnerability.
https://github.com/valory-xyz/open-aea/commit/4c5efa6c2268b2f4afe030de7172132bc001036d | what vulnarability does open-aea version less then 0.5.3 have | |
Having vulnarability CVE-2023-37920 Advisory: Open-source-insights-api 0.1.11 updates its dependency 'certifi' to v2023.7.22 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does open-source-insights-api version less then 0.1.11 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Open-source-insights-api 0.1.11 updates its dependency 'certifi' to v2023.7.22 to include a security fix. | what vulnarability does open-source-insights-api version less then 0.1.11 have | |
Having vulnarability PVE-2023-62826 Advisory: Openadapt 0.1.0 modifies export_sql to use paramerterized queries to prevent sql injection.
https://github.com/OpenAdaptAI/OpenAdapt/commit/9dc1850918e81648b9885dd8a1be836d5e8d95ef | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openadapt version less then 0.1.0 have ### Response: Having vulnarability PVE-2023-62826 Advisory: Openadapt 0.1.0 modifies export_sql to use paramerterized queries to prevent sql injection.
https://github.com/OpenAdaptAI/OpenAdapt/commit/9dc1850918e81648b9885dd8a1be836d5e8d95ef | what vulnarability does openadapt version less then 0.1.0 have | |
Having vulnarability CVE-2023-34541 Advisory: Openai-copilot 0.2.4 updates its dependency 'langchain' to v0.0.264 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openai-copilot version less then 0.2.4 have ### Response: Having vulnarability CVE-2023-34541 Advisory: Openai-copilot 0.2.4 updates its dependency 'langchain' to v0.0.264 to include a security fix. | what vulnarability does openai-copilot version less then 0.2.4 have | |
Having vulnarability CVE-2019-19844 Advisory: Openapi-core 0.13.0 includes a fix for CVE-2019-19844. It also introduces security validation with an API Key and support for HTTP security types.
https://github.com/python-openapi/openapi-core/commit/745736b5c202ab9768bf4efb869934897d667647 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openapi-core version less then 0.13.0 have ### Response: Having vulnarability CVE-2019-19844 Advisory: Openapi-core 0.13.0 includes a fix for CVE-2019-19844. It also introduces security validation with an API Key and support for HTTP security types.
https://github.com/python-openapi/openapi-core/commit/745736b5c202ab9768bf4efb869934897d667647 | what vulnarability does openapi-core version less then 0.13.0 have | |
Having vulnarability CVE-2020-15141 Advisory: In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk. See: CVE-2020-15141. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openapi-python-client version less then 0.5.3 have ### Response: Having vulnarability CVE-2020-15141 Advisory: In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk. See: CVE-2020-15141. | what vulnarability does openapi-python-client version less then 0.5.3 have | |
Having vulnarability CVE-2017-16129 Advisory: Openapigenerator 3.2.1 updates its dependency 'superagent' to v3.7.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openapigenerator version less then 3.2.1 have ### Response: Having vulnarability CVE-2017-16129 Advisory: Openapigenerator 3.2.1 updates its dependency 'superagent' to v3.7.0 to include a security fix. | what vulnarability does openapigenerator version less then 3.2.1 have | |
Having vulnarability CVE-2022-3602 Advisory: Openbb 2.3.0 updates its dependency 'cryptography' to v39.0.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openbb version less then 2.3.0 have ### Response: Having vulnarability CVE-2022-3602 Advisory: Openbb 2.3.0 updates its dependency 'cryptography' to v39.0.0 to include security fixes. | what vulnarability does openbb version less then 2.3.0 have | |
Having vulnarability CVE-2023-30861 Advisory: Openbrokerapi 4.5.5 updates its dependency 'flask' to include a fix for a Use of Persistent Cookies Containing Sensitive Information vulnerability.
https://github.com/eruvanos/openbrokerapi/commit/1057ef31830dc0a5dbcfaab2f3687a3097927f96 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openbrokerapi version less then 4.5.5 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Openbrokerapi 4.5.5 updates its dependency 'flask' to include a fix for a Use of Persistent Cookies Containing Sensitive Information vulnerability.
https://github.com/eruvanos/openbrokerapi/commit/1057ef31830dc0a5dbcfaab2f3687a3097927f96 | what vulnarability does openbrokerapi version less then 4.5.5 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.