output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability PVE-2023-54914 Advisory: Nltk 3.6 includes a fix for a REDoS vulnerability. https://github.com/nltk/nltk/pull/2597
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nltk version less then 3.6 have ### Response: Having vulnarability PVE-2023-54914 Advisory: Nltk 3.6 includes a fix for a REDoS vulnerability. https://github.com/nltk/nltk/pull/2597
what vulnarability does nltk version less then 3.6 have
Having vulnarability PVE-2022-45428 Advisory: Nmap-python is a typosquatting package. It installs malware in your system that leaks your data. https://github.com/rsc-dev/pypi_malware
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nmap-python version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45428 Advisory: Nmap-python is a typosquatting package. It installs malware in your system that leaks your data. https://github.com/rsc-dev/pypi_malware
what vulnarability does nmap-python version greather then 0,less then 0 have
Having vulnarability CVE-2019-10844 Advisory: nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0.14 relies on the HOME environment variable, which might be untrusted.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nnabla version greather then equal to 0,less then 1.0.15 have ### Response: Having vulnarability CVE-2019-10844 Advisory: nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0.14 relies on the HOME environment variable, which might be untrusted.
what vulnarability does nnabla version greather then equal to 0,less then 1.0.15 have
Having vulnarability CVE-2020-1747 Advisory: Nni 2.1 includes a fix for YAML's CVE-2020-1747. https://github.com/microsoft/nni/commit/0e8a9f8272affb1b41d576bc06c9eb59e763bbc3
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nni version less then 2.1 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Nni 2.1 includes a fix for YAML's CVE-2020-1747. https://github.com/microsoft/nni/commit/0e8a9f8272affb1b41d576bc06c9eb59e763bbc3
what vulnarability does nni version less then 2.1 have
Having vulnarability CVE-2021-28658 Advisory: Nobinobi-child 0.1.3.6 updates its dependency 'django' to v3.2.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nobinobi-child version less then 0.1.3.6 have ### Response: Having vulnarability CVE-2021-28658 Advisory: Nobinobi-child 0.1.3.6 updates its dependency 'django' to v3.2.0 to include a security fix.
what vulnarability does nobinobi-child version less then 0.1.3.6 have
Having vulnarability CVE-2021-33571 Advisory: Nobinobi-core 0.1.4.3 updates underlying 'Django' dependency to v3.2.7 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nobinobi-core version less then 0.1.4.3 have ### Response: Having vulnarability CVE-2021-33571 Advisory: Nobinobi-core 0.1.4.3 updates underlying 'Django' dependency to v3.2.7 to include security fixes.
what vulnarability does nobinobi-core version less then 0.1.4.3 have
Having vulnarability CVE-2021-33203 Advisory: Nobinobi-daily-follow-up 0.1.1.12 updates its dependency 'django' to v3.2.4 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nobinobi-daily-follow-up version less then 0.1.1.12 have ### Response: Having vulnarability CVE-2021-33203 Advisory: Nobinobi-daily-follow-up 0.1.1.12 updates its dependency 'django' to v3.2.4 to include security fixes.
what vulnarability does nobinobi-daily-follow-up version less then 0.1.1.12 have
Having vulnarability CVE-2021-31542 Advisory: Nobinobi-staff 0.1.6.2 updates its dependency 'Django' to v3.2.7 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nobinobi-staff version less then 0.1.6.2 have ### Response: Having vulnarability CVE-2021-31542 Advisory: Nobinobi-staff 0.1.6.2 updates its dependency 'Django' to v3.2.7 to include security fixes.
what vulnarability does nobinobi-staff version less then 0.1.6.2 have
Having vulnarability PVE-2022-45448 Advisory: Noblesse is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim". https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does noblesse version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45448 Advisory: Noblesse is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim". https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html
what vulnarability does noblesse version greather then 0,less then 0 have
Having vulnarability PVE-2022-45452 Advisory: Noblesse2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim". https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does noblesse2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45452 Advisory: Noblesse2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim". https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html
what vulnarability does noblesse2 version greather then 0,less then 0 have
Having vulnarability PVE-2022-45453 Advisory: Noblessev2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim". https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does noblessev2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45453 Advisory: Noblessev2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim". https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html
what vulnarability does noblessev2 version greather then 0,less then 0 have
Having vulnarability CVE-2017-3735 Advisory: Noiseprotocol 0.2.1 updates its dependency 'cryptography' to v2.1.3 to include a safe version of OpenSSL.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does noiseprotocol version less then 0.2.1 have ### Response: Having vulnarability CVE-2017-3735 Advisory: Noiseprotocol 0.2.1 updates its dependency 'cryptography' to v2.1.3 to include a safe version of OpenSSL.
what vulnarability does noiseprotocol version less then 0.2.1 have
Having vulnarability CVE-2024-21624 Advisory: nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. This security advisory pertains to a potential information leak (e.g., environment variables) in instances where developers utilize `MessageTemplate` and incorporate user-provided data into templates. The identified vulnerability has been remedied in pull request #2509 and will be included in versions released from 2.2.0. Users are strongly advised to upgrade to these patched versions to safeguard against the vulnerability. A temporary workaround involves filtering underscores before incorporating user input into the message template. See CVE-2024-21624.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nonebot2 version greather then equal to 2.0.0a16,less then equal to 2.1.3 have ### Response: Having vulnarability CVE-2024-21624 Advisory: nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. This security advisory pertains to a potential information leak (e.g., environment variables) in instances where developers utilize `MessageTemplate` and incorporate user-provided data into templates. The identified vulnerability has been remedied in pull request #2509 and will be included in versions released from 2.2.0. Users are strongly advised to upgrade to these patched versions to safeguard against the vulnerability. A temporary workaround involves filtering underscores before incorporating user input into the message template. See CVE-2024-21624.
what vulnarability does nonebot2 version greather then equal to 2.0.0a16,less then equal to 2.1.3 have
Having vulnarability CVE-2021-23437 Advisory: Norfair 0.4.0 updates its dependency 'pillow' to v9.0.1 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does norfair version less then 0.4.0 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Norfair 0.4.0 updates its dependency 'pillow' to v9.0.1 to include security fixes.
what vulnarability does norfair version less then 0.4.0 have
Having vulnarability CVE-2019-16784 Advisory: Normcap 0.1.1 pins its dependency 'PyInstaller' to a version >=3.6 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does normcap version less then 0.1.1 have ### Response: Having vulnarability CVE-2019-16784 Advisory: Normcap 0.1.1 pins its dependency 'PyInstaller' to a version >=3.6 to include a security fix.
what vulnarability does normcap version less then 0.1.1 have
Having vulnarability CVE-2021-20270 Advisory: Nornir 3.2.0 updates its dependency 'pygments' to v2.10.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nornir version less then 3.2.0 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Nornir 3.2.0 updates its dependency 'pygments' to v2.10.0 to include security fixes.
what vulnarability does nornir version less then 3.2.0 have
Having vulnarability PVE-2021-34447 Advisory: notable 0.0.6 fixes a security regression in the new BoltDB backend.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does notable version less then 0.0.6 have ### Response: Having vulnarability PVE-2021-34447 Advisory: notable 0.0.6 fixes a security regression in the new BoltDB backend.
what vulnarability does notable version less then 0.0.6 have
Having vulnarability PVE-2022-51747 Advisory: Notebok is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does notebok version greather then 0 have ### Response: Having vulnarability PVE-2022-51747 Advisory: Notebok is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
what vulnarability does notebok version greather then 0 have
Having vulnarability CVE-2015-7337 Advisory: Notebook 4.0.5 includes security fixes for maliciously crafted files (CVE-2015-7337).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does notebook version less then 4.0.5 have ### Response: Having vulnarability CVE-2015-7337 Advisory: Notebook 4.0.5 includes security fixes for maliciously crafted files (CVE-2015-7337).
what vulnarability does notebook version less then 4.0.5 have
Having vulnarability PVE-2021-35116 Advisory: notifications-python-client before 4.7.1 is vulnerable to a not further described security issue in PyJWT.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does notifications-python-client version less then 4.7.1 have ### Response: Having vulnarability PVE-2021-35116 Advisory: notifications-python-client before 4.7.1 is vulnerable to a not further described security issue in PyJWT.
what vulnarability does notifications-python-client version less then 4.7.1 have
Having vulnarability CVE-2015-5162 Advisory: The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nova version less then 12.0.4,equal to 13.0.0 have ### Response: Having vulnarability CVE-2015-5162 Advisory: The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image.
what vulnarability does nova version less then 12.0.4,equal to 13.0.0 have
Having vulnarability CVE-2017-5936 Advisory: OpenStack Nova-LXD before 13.1.1 uses the wrong name for the veth pairs when applying Neutron security group rules for instances, which allows remote attackers to bypass intended security restrictions.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nova-lxd version less then 13.1.1 have ### Response: Having vulnarability CVE-2017-5936 Advisory: OpenStack Nova-LXD before 13.1.1 uses the wrong name for the veth pairs when applying Neutron security group rules for instances, which allows remote attackers to bypass intended security restrictions.
what vulnarability does nova-lxd version less then 13.1.1 have
Having vulnarability CVE-2019-10138 Advisory: Novajoin 1.1.1 includes a fix for CVE-2019-10138: A flaw was discovered in the python-novajoin plugin, all versions up to, excluding 1.1.1, for Red Hat OpenStack Platform. The novajoin API lacked sufficient access control, allowing any keystone authenticated user to generate FreeIPA tokens.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does novajoin version less then 1.1.1 have ### Response: Having vulnarability CVE-2019-10138 Advisory: Novajoin 1.1.1 includes a fix for CVE-2019-10138: A flaw was discovered in the python-novajoin plugin, all versions up to, excluding 1.1.1, for Red Hat OpenStack Platform. The novajoin API lacked sufficient access control, allowing any keystone authenticated user to generate FreeIPA tokens.
what vulnarability does novajoin version less then 1.1.1 have
Having vulnarability PVE-2023-52919 Advisory: Nowsys is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nowsys version greather then 0 have ### Response: Having vulnarability PVE-2023-52919 Advisory: Nowsys is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
what vulnarability does nowsys version greather then 0 have
Having vulnarability CVE-2020-14343 Advisory: Nox-poetry 0.8.2 updates its dependency 'pyyaml' to v5.4.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nox-poetry version less then 0.8.2 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Nox-poetry 0.8.2 updates its dependency 'pyyaml' to v5.4.1 to include a security fix.
what vulnarability does nox-poetry version less then 0.8.2 have
Having vulnarability CVE-2021-45105 Advisory: Nphase 1.1.3 and prior include a version of 'Gatk' (4.0) affected by critical and severe vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nphase version less then equal to 1.1.3 have ### Response: Having vulnarability CVE-2021-45105 Advisory: Nphase 1.1.3 and prior include a version of 'Gatk' (4.0) affected by critical and severe vulnerabilities.
what vulnarability does nphase version less then equal to 1.1.3 have
Having vulnarability CVE-2019-25091 Advisory: A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file `src/nsupdate/settings/base.py` of the component `CSRF Cookie Handler`. The manipulation of the argument `CSRF_COOKIE_HTTPONLY` leads to cookie without `httponly` flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nsupdate version less then 0.12.0 have ### Response: Having vulnarability CVE-2019-25091 Advisory: A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file `src/nsupdate/settings/base.py` of the component `CSRF Cookie Handler`. The manipulation of the argument `CSRF_COOKIE_HTTPONLY` leads to cookie without `httponly` flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability.
what vulnarability does nsupdate version less then 0.12.0 have
Having vulnarability PVE-2022-52343 Advisory: Ntopng 3.0 includes a fix for a HTTP header injection vulnerability. https://github.com/ntop/ntopng/commit/9469e58f07e043da712e6d6c41244852a11bcaeb
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ntopng version less then 3.0 have ### Response: Having vulnarability PVE-2022-52343 Advisory: Ntopng 3.0 includes a fix for a HTTP header injection vulnerability. https://github.com/ntop/ntopng/commit/9469e58f07e043da712e6d6c41244852a11bcaeb
what vulnarability does ntopng version less then 3.0 have
Having vulnarability CVE-2023-4807 Advisory: Nucliadb 2.44.1 updates its cryptography dependency from 42.0.2 to 42.0.4 due to the CVE-2023-4807. https://github.com/nuclia/nucliadb/pull/1881/commits/bd2366f23f0388d1b02ced16b25e473ecf73744a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nucliadb version less then 2.44.1 have ### Response: Having vulnarability CVE-2023-4807 Advisory: Nucliadb 2.44.1 updates its cryptography dependency from 42.0.2 to 42.0.4 due to the CVE-2023-4807. https://github.com/nuclia/nucliadb/pull/1881/commits/bd2366f23f0388d1b02ced16b25e473ecf73744a
what vulnarability does nucliadb version less then 2.44.1 have
Having vulnarability CVE-2023-24816 Advisory: Nuclio-jupyter 0.9.9 updates its dependency 'ipython' requirement to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nuclio-jupyter version less then 0.9.9 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Nuclio-jupyter 0.9.9 updates its dependency 'ipython' requirement to include a security fix.
what vulnarability does nuclio-jupyter version less then 0.9.9 have
Having vulnarability PVE-2021-39648 Advisory: Nuitka 0.6.12 uses https URLs for downloading dependency walker, for it to be more secure.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nuitka version less then 0.6.12 have ### Response: Having vulnarability PVE-2021-39648 Advisory: Nuitka 0.6.12 uses https URLs for downloading dependency walker, for it to be more secure.
what vulnarability does nuitka version less then 0.6.12 have
Having vulnarability CVE-2023-41040 Advisory: Numato-gpio 0.11.1 updates its gitpython dependency to version 3.1.37 from 3.1.32 in response to the security vulnerability identified as CVE-2023-41040. https://github.com/clssn/numato-gpio/commit/b6b05d0868029db48ee45a9da6365d156e932e13
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does numato-gpio version less then 0.11.1 have ### Response: Having vulnarability CVE-2023-41040 Advisory: Numato-gpio 0.11.1 updates its gitpython dependency to version 3.1.37 from 3.1.32 in response to the security vulnerability identified as CVE-2023-41040. https://github.com/clssn/numato-gpio/commit/b6b05d0868029db48ee45a9da6365d156e932e13
what vulnarability does numato-gpio version less then 0.11.1 have
Having vulnarability PVE-2021-38983 Advisory: Numba 0.49.0 fixes a frame injection vulnerability in the dispatcher tracing path, that lead to DoS.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does numba version less then 0.49.0 have ### Response: Having vulnarability PVE-2021-38983 Advisory: Numba 0.49.0 fixes a frame injection vulnerability in the dispatcher tracing path, that lead to DoS.
what vulnarability does numba version less then 0.49.0 have
Having vulnarability CVE-2017-12852 Advisory: Numpy 1.13.2 includes a fix for CVE-2017-12852: The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack. https://github.com/numpy/numpy/issues/9560#issuecomment-322395292
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does numpy version less then 1.13.2 have ### Response: Having vulnarability CVE-2017-12852 Advisory: Numpy 1.13.2 includes a fix for CVE-2017-12852: The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack. https://github.com/numpy/numpy/issues/9560#issuecomment-322395292
what vulnarability does numpy version less then 1.13.2 have
Having vulnarability PVE-2022-49315 Advisory: Nuplone 2.1.0 adds CSRF auth token to paste url. https://github.com/euphorie/NuPlone/commit/f52e70928c03d1c92c6a6d10a26e3c294d029ae7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nuplone version less then 2.1.0 have ### Response: Having vulnarability PVE-2022-49315 Advisory: Nuplone 2.1.0 adds CSRF auth token to paste url. https://github.com/euphorie/NuPlone/commit/f52e70928c03d1c92c6a6d10a26e3c294d029ae7
what vulnarability does nuplone version less then 2.1.0 have
Having vulnarability CVE-2021-43818 Advisory: Nuts 3.1.0 updates its dependency 'lxml' to version '4.6.5' to include a fix for a Cross-Site Scripting vulnerability. https://github.com/network-unit-testing-system/nuts/pull/56
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nuts version less then 3.1.0 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Nuts 3.1.0 updates its dependency 'lxml' to version '4.6.5' to include a fix for a Cross-Site Scripting vulnerability. https://github.com/network-unit-testing-system/nuts/pull/56
what vulnarability does nuts version less then 3.1.0 have
Having vulnarability PVE-2022-49489 Advisory: Nvflare 2.1.1 signs and loads privilege yaml file by secure content service. https://github.com/NVIDIA/NVFlare/pull/403/commits/1fb8369826ca342122a187af5ac572acd7bb41b0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nvflare version less then 2.1.1 have ### Response: Having vulnarability PVE-2022-49489 Advisory: Nvflare 2.1.1 signs and loads privilege yaml file by secure content service. https://github.com/NVIDIA/NVFlare/pull/403/commits/1fb8369826ca342122a187af5ac572acd7bb41b0
what vulnarability does nvflare version less then 2.1.1 have
Having vulnarability CVE-2021-34141 Advisory: Nwb-conversion-tools 0.11.38 updates its dependency 'numpy' to v1.22.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does nwb-conversion-tools version less then 0.11.38 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Nwb-conversion-tools 0.11.38 updates its dependency 'numpy' to v1.22.0 to include security fixes.
what vulnarability does nwb-conversion-tools version less then 0.11.38 have
Having vulnarability PVE-2021-39077 Advisory: Oauth-pyzure 0.1.4 is based on OSS vulnerability reports.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oauth-pyzure version less then 0.1.4 have ### Response: Having vulnarability PVE-2021-39077 Advisory: Oauth-pyzure 0.1.4 is based on OSS vulnerability reports.
what vulnarability does oauth-pyzure version less then 0.1.4 have
Having vulnarability CVE-2013-4347 Advisory: Oauth2 1.9 includes a fix for CVE-2013-4347: It was found that python-oauth2 did not properly generate random values for use in nonces. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website. https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oauth2 version less then 1.9 have ### Response: Having vulnarability CVE-2013-4347 Advisory: Oauth2 1.9 includes a fix for CVE-2013-4347: It was found that python-oauth2 did not properly generate random values for use in nonces. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website. https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650
what vulnarability does oauth2 version less then 1.9 have
Having vulnarability CVE-2022-31027 Advisory: OAuthenticator is an OAuth token library for the JupyerHub login handler. CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub only to users of a given institute. The allowed_idps configuration trait of CILogonOAuthenticator is documented to be a list of domains that indicate the institutions whose users are authorized to access this JupyterHub. This authorization is validated by ensuring that the *email* field provided to us by CILogon has a *domain* that matches one of the domains listed in `allowed_idps`.If `allowed_idps` contains `berkeley.edu`, you might expect only users with valid current credentials provided by University of California, Berkeley to be able to access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider is used by the user to login, only the email address provided. So a user can login with a GitHub account that has email set to `<something>@berkeley.edu`, and that will be treated exactly the same as someone logging in using the UC Berkeley official Identity Provider. The patch fixing this issue makes a *breaking change* in how `allowed_idps` is interpreted. It's no longer a list of domains, but configuration representing the `EntityID` of the IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/). Users are advised to upgrade.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oauthenticator version greather then equal to 0,less then 15.0.0 have ### Response: Having vulnarability CVE-2022-31027 Advisory: OAuthenticator is an OAuth token library for the JupyerHub login handler. CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub only to users of a given institute. The allowed_idps configuration trait of CILogonOAuthenticator is documented to be a list of domains that indicate the institutions whose users are authorized to access this JupyterHub. This authorization is validated by ensuring that the *email* field provided to us by CILogon has a *domain* that matches one of the domains listed in `allowed_idps`.If `allowed_idps` contains `berkeley.edu`, you might expect only users with valid current credentials provided by University of California, Berkeley to be able to access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider is used by the user to login, only the email address provided. So a user can login with a GitHub account that has email set to `<something>@berkeley.edu`, and that will be treated exactly the same as someone logging in using the UC Berkeley official Identity Provider. The patch fixing this issue makes a *breaking change* in how `allowed_idps` is interpreted. It's no longer a list of domains, but configuration representing the `EntityID` of the IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/). Users are advised to upgrade.
what vulnarability does oauthenticator version greather then equal to 0,less then 15.0.0 have
Having vulnarability PVE-2021-25909 Advisory: oauthlib before 0.7.0 is not stripping client provided passwords from OAuth2 logs. https://github.com/oauthlib/oauthlib/commit/fef1f7987cc6298e744b7d4290e3fc9a9701831b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oauthlib version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-25909 Advisory: oauthlib before 0.7.0 is not stripping client provided passwords from OAuth2 logs. https://github.com/oauthlib/oauthlib/commit/fef1f7987cc6298e744b7d4290e3fc9a9701831b
what vulnarability does oauthlib version less then 0.7.0 have
Having vulnarability CVE-2019-14806 Advisory: Obasparql 2.0.1 updates 'WerkZeug' to versions '>=0.15.3' to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does obasparql version less then 2.0.1 have ### Response: Having vulnarability CVE-2019-14806 Advisory: Obasparql 2.0.1 updates 'WerkZeug' to versions '>=0.15.3' to include security fixes.
what vulnarability does obasparql version less then 2.0.1 have
Having vulnarability CVE-2023-37920 Advisory: Obiba-opal 5.2.1 updates its dependency 'certifi' to version '2023.7.22' include a fix. https://github.com/obiba/opal-python-client/pull/35
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does obiba-opal version less then 5.2.1 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Obiba-opal 5.2.1 updates its dependency 'certifi' to version '2023.7.22' include a fix. https://github.com/obiba/opal-python-client/pull/35
what vulnarability does obiba-opal version less then 5.2.1 have
Having vulnarability CVE-2021-43818 Advisory: Obsei 0.0.11 updates its dependency 'lxml' to v4.7.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does obsei version less then 0.0.11 have ### Response: Having vulnarability CVE-2021-43818 Advisory: Obsei 0.0.11 updates its dependency 'lxml' to v4.7.1 to include a security fix.
what vulnarability does obsei version less then 0.0.11 have
Having vulnarability PVE-2021-38088 Advisory: Obsplus 0.0.6 switched from MD5 hashing to SHA256 as the latter is more secure and the computational differences were negligible.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does obsplus version less then 0.0.6 have ### Response: Having vulnarability PVE-2021-38088 Advisory: Obsplus 0.0.6 switched from MD5 hashing to SHA256 as the latter is more secure and the computational differences were negligible.
what vulnarability does obsplus version less then 0.0.6 have
Having vulnarability PVE-2022-48122 Advisory: Ocean-contracts 1.0.0a1 avoids a potential attack when using infinite approvals. https://github.com/oceanprotocol/contracts/issues/375
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ocean-contracts version less then 1.0.0a1 have ### Response: Having vulnarability PVE-2022-48122 Advisory: Ocean-contracts 1.0.0a1 avoids a potential attack when using infinite approvals. https://github.com/oceanprotocol/contracts/issues/375
what vulnarability does ocean-contracts version less then 1.0.0a1 have
Having vulnarability CVE-2018-10903 Advisory: Oci version 2.0.2 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oci version less then 2.0.2 have ### Response: Having vulnarability CVE-2018-10903 Advisory: Oci version 2.0.2 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
what vulnarability does oci version less then 2.0.2 have
Having vulnarability CVE-2020-36242 Advisory: Oci-cli 2.24.0 updates its dependency 'cryptography' to v3.3.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oci-cli version less then 2.24.0 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Oci-cli 2.24.0 updates its dependency 'cryptography' to v3.3.2 to include a security fix.
what vulnarability does oci-cli version less then 2.24.0 have
Having vulnarability CVE-2010-4338 Advisory: Ocrodjvu 0.6.1 fixes insecure use of temporary files when using Cuneiform. https://bugs.debian.org/598134 https://github.com/jwilk/ocrodjvu/commit/5e72e5472dd47817f65ba19830b01aa4f2cb50f8
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ocrodjvu version less then 0.6.1 have ### Response: Having vulnarability CVE-2010-4338 Advisory: Ocrodjvu 0.6.1 fixes insecure use of temporary files when using Cuneiform. https://bugs.debian.org/598134 https://github.com/jwilk/ocrodjvu/commit/5e72e5472dd47817f65ba19830b01aa4f2cb50f8
what vulnarability does ocrodjvu version less then 0.6.1 have
Having vulnarability CVE-2019-3895 Advisory: An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. See: CVE-2019-3895.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octavia version less then 0.9.0 have ### Response: Having vulnarability CVE-2019-3895 Advisory: An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. See: CVE-2019-3895.
what vulnarability does octavia version less then 0.9.0 have
Having vulnarability CVE-2021-36711 Advisory: WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octobot version greather then equal to 0,less then 0.4.4 have ### Response: Having vulnarability CVE-2021-36711 Advisory: WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
what vulnarability does octobot version greather then equal to 0,less then 0.4.4 have
Having vulnarability CVE-2024-23637 Advisory: OctoPrint 1.10.0rc1 addresses the CVE-2024-23637. This vulnerability allowed unauthorized admins to alter the passwords of other admin accounts, potentially leading to account lockouts and loss of control over the OctoPrint instance. The update resolves this by enforcing proper authentication procedures. It is recommended that all OctoPrint administrators review their access controls to prevent potential exploitation of this vulnerability. https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-5626-pw9c-hmjr
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octoprint version less then 1.10.0rc1 have ### Response: Having vulnarability CVE-2024-23637 Advisory: OctoPrint 1.10.0rc1 addresses the CVE-2024-23637. This vulnerability allowed unauthorized admins to alter the passwords of other admin accounts, potentially leading to account lockouts and loss of control over the OctoPrint instance. The update resolves this by enforcing proper authentication procedures. It is recommended that all OctoPrint administrators review their access controls to prevent potential exploitation of this vulnerability. https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-5626-pw9c-hmjr
what vulnarability does octoprint version less then 1.10.0rc1 have
Having vulnarability PVE-2022-48252 Advisory: Octoprint-nanny 0.10.0 sends PrintNanny Cloud API requests via forward proxy as a security measure. Cross-origin requests from OctoPrint javascript are disallowed.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octoprint-nanny version less then 0.10.0 have ### Response: Having vulnarability PVE-2022-48252 Advisory: Octoprint-nanny 0.10.0 sends PrintNanny Cloud API requests via forward proxy as a security measure. Cross-origin requests from OctoPrint javascript are disallowed.
what vulnarability does octoprint-nanny version less then 0.10.0 have
Having vulnarability CVE-2021-33430 Advisory: Octue 0.10.4 updates its dependency 'numpy' to v1.21.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does octue version less then 0.10.4 have ### Response: Having vulnarability CVE-2021-33430 Advisory: Octue 0.10.4 updates its dependency 'numpy' to v1.21.0 to include a security fix.
what vulnarability does octue version less then 0.10.4 have
Having vulnarability PVE-2023-61861 Advisory: Odooghost 0.2.0 includes a security fix: Change ownership of /etc/odoo directory to odoo user. https://github.com/remyz17/odooghost/commit/ac616176a83f405eb4e195656e91240ccf05d360
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does odooghost version less then 0.2.0 have ### Response: Having vulnarability PVE-2023-61861 Advisory: Odooghost 0.2.0 includes a security fix: Change ownership of /etc/odoo directory to odoo user. https://github.com/remyz17/odooghost/commit/ac616176a83f405eb4e195656e91240ccf05d360
what vulnarability does odooghost version less then 0.2.0 have
Having vulnarability PVE-2021-37666 Advisory: Oe-geoutils 1.5.2 solves security vulnerabilities from external packages 101.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oe-geoutils version less then 1.5.2 have ### Response: Having vulnarability PVE-2021-37666 Advisory: Oe-geoutils 1.5.2 solves security vulnerabilities from external packages 101.
what vulnarability does oe-geoutils version less then 1.5.2 have
Having vulnarability CVE-2013-1665 Advisory: Oem 0.3.0 uses 'defusedxml' to handle XML-related vulnerabilities. https://github.com/bradsease/oem/issues/9
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oem version less then 0.3.0 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Oem 0.3.0 uses 'defusedxml' to handle XML-related vulnerabilities. https://github.com/bradsease/oem/issues/9
what vulnarability does oem version less then 0.3.0 have
Having vulnarability CVE-2010-4532 Advisory: offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does offlineimap version less then 6.3.2-rc1 have ### Response: Having vulnarability CVE-2010-4532 Advisory: offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks.
what vulnarability does offlineimap version less then 6.3.2-rc1 have
Having vulnarability PVE-2022-48031 Advisory: Oger 1.2 fixes a code injection vulnerability involving eval(). https://github.com/OntoGene/OGER/commit/454054dd5d44b7ebab0ec4e453e59822e3c08ca7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oger version less then 1.2 have ### Response: Having vulnarability PVE-2022-48031 Advisory: Oger 1.2 fixes a code injection vulnerability involving eval(). https://github.com/OntoGene/OGER/commit/454054dd5d44b7ebab0ec4e453e59822e3c08ca7
what vulnarability does oger version less then 1.2 have
Having vulnarability CVE-2020-26244 Advisory: In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library. The issues are: 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future). See CVE-2020-26244.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oic version less then 1.2.1 have ### Response: Having vulnarability CVE-2020-26244 Advisory: In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library. The issues are: 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future). See CVE-2020-26244.
what vulnarability does oic version less then 1.2.1 have
Having vulnarability PVE-2022-51695 Advisory: Oiu is a malicious package. It triggers the install of W4SP Stealer in your system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oiu version greather then 0 have ### Response: Having vulnarability PVE-2022-51695 Advisory: Oiu is a malicious package. It triggers the install of W4SP Stealer in your system.
what vulnarability does oiu version greather then 0 have
Having vulnarability CVE-2024-3651 Advisory: Okdata-aws version 4.1.0 has upgraded its idna dependency from version 3.3 to 3.7 in response to CVE-2024-3651.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does okdata-aws version less then 4.1.0 have ### Response: Having vulnarability CVE-2024-3651 Advisory: Okdata-aws version 4.1.0 has upgraded its idna dependency from version 3.3 to 3.7 in response to CVE-2024-3651.
what vulnarability does okdata-aws version less then 4.1.0 have
Having vulnarability CVE-2021-33503 Advisory: Okdata-cli version 0.12.1 updates its dependency "urlib3" to v1.26.5 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does okdata-cli version less then 0.12.1 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Okdata-cli version 0.12.1 updates its dependency "urlib3" to v1.26.5 to include a security fix.
what vulnarability does okdata-cli version less then 0.12.1 have
Having vulnarability CVE-2016-7036 Advisory: Okdata-sdk version 3.1.1 updates its dependency, upgrading python-keycloak to eliminate the use of python-jose. This change addresses the security vulnerability identified in CVE-2016-7036.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does okdata-sdk version less then 3.1.1 have ### Response: Having vulnarability CVE-2016-7036 Advisory: Okdata-sdk version 3.1.1 updates its dependency, upgrading python-keycloak to eliminate the use of python-jose. This change addresses the security vulnerability identified in CVE-2016-7036.
what vulnarability does okdata-sdk version less then 3.1.1 have
Having vulnarability PVE-2022-47998 Advisory: Oksana is a malicious package. It exfiltrates data from the host where it is installed. https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oksana version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47998 Advisory: Oksana is a malicious package. It exfiltrates data from the host where it is installed. https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e
what vulnarability does oksana version greather then 0,less then 0 have
Having vulnarability CVE-2021-33503 Advisory: Omegaml 0.15.2 updates its dependency 'urllib3' to v1.26.5 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omegaml version less then 0.15.2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Omegaml 0.15.2 updates its dependency 'urllib3' to v1.26.5 to include security fixes.
what vulnarability does omegaml version less then 0.15.2 have
Having vulnarability CVE-2021-41132 Advisory: Omero-figure 4.4.1 includes a fix for CVE-2021-41132, which also affects the related package 'OMERO.web'. https://www.openmicroscopy.org/security/advisories/2021-SV3
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omero-figure version less then 4.4.1 have ### Response: Having vulnarability CVE-2021-41132 Advisory: Omero-figure 4.4.1 includes a fix for CVE-2021-41132, which also affects the related package 'OMERO.web'. https://www.openmicroscopy.org/security/advisories/2021-SV3
what vulnarability does omero-figure version less then 4.4.1 have
Having vulnarability CVE-2021-41132 Advisory: Omero-web 5.11.0 includes a fix for CVE-2021-41132: In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of 'jQuery.html()', there are a whole of cross-site scripting possibilities with specially crafted input to a variety of fields. https://www.openmicroscopy.org/security/advisories/2021-SV3
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omero-web version less then 5.11.0 have ### Response: Having vulnarability CVE-2021-41132 Advisory: Omero-web 5.11.0 includes a fix for CVE-2021-41132: In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of 'jQuery.html()', there are a whole of cross-site scripting possibilities with specially crafted input to a variety of fields. https://www.openmicroscopy.org/security/advisories/2021-SV3
what vulnarability does omero-web version less then 5.11.0 have
Having vulnarability PVE-2023-99954 Advisory: It was found that versions of omise before 0.12.0 had a vulnerability involving the exposure of sensitive data in the logging system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omise version less then 0.12.0 have ### Response: Having vulnarability PVE-2023-99954 Advisory: It was found that versions of omise before 0.12.0 had a vulnerability involving the exposure of sensitive data in the logging system.
what vulnarability does omise version less then 0.12.0 have
Having vulnarability PVE-2022-44804 Advisory: Omni-api 0.4.1 includes a more secure handling of errors . https://github.com/hivesolutions/omni_api/commit/ae4a5179b4c8698b4b813e9ca2909fd8b299a307
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omni-api version less then 0.4.1 have ### Response: Having vulnarability PVE-2022-44804 Advisory: Omni-api 0.4.1 includes a more secure handling of errors . https://github.com/hivesolutions/omni_api/commit/ae4a5179b4c8698b4b813e9ca2909fd8b299a307
what vulnarability does omni-api version less then 0.4.1 have
Having vulnarability PVE-2021-43353 Advisory: Omnikdatalogger 1.10.4 uses secure connection (HTTPS) to interact with PVOutput website. https://github.com/jbouwh/omnikdatalogger/pull/56/commits/85eb0af91b5912295745a2ec074e71354374b8b6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omnikdatalogger version less then 1.10.4 have ### Response: Having vulnarability PVE-2021-43353 Advisory: Omnikdatalogger 1.10.4 uses secure connection (HTTPS) to interact with PVOutput website. https://github.com/jbouwh/omnikdatalogger/pull/56/commits/85eb0af91b5912295745a2ec074e71354374b8b6
what vulnarability does omnikdatalogger version less then 1.10.4 have
Having vulnarability CVE-2020-14343 Advisory: Omnizart 0.3.3 updates its dependency 'pyyaml' to v5.4.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omnizart version less then 0.3.3 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Omnizart 0.3.3 updates its dependency 'pyyaml' to v5.4.1 to include a security fix.
what vulnarability does omnizart version less then 0.3.3 have
Having vulnarability PVE-2022-49400 Advisory: Omorfi 0.9.9 fixes an injection vulnerability in python OOV handling. https://github.com/flammie/omorfi/commit/b4d7a5dba1768a7067fd6bd4e8c80cfe465556ce
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does omorfi version less then 0.9.9 have ### Response: Having vulnarability PVE-2022-49400 Advisory: Omorfi 0.9.9 fixes an injection vulnerability in python OOV handling. https://github.com/flammie/omorfi/commit/b4d7a5dba1768a7067fd6bd4e8c80cfe465556ce
what vulnarability does omorfi version less then 0.9.9 have
Having vulnarability CVE-2021-26722 Advisory: LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oncall version greather then equal to 0,less then 1.4.1 have ### Response: Having vulnarability CVE-2021-26722 Advisory: LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
what vulnarability does oncall version greather then equal to 0,less then 1.4.1 have
Having vulnarability CVE-2018-18074 Advisory: Onecodex 0.10.0 updates its dependency 'requests' to v2.27.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onecodex version less then 0.10.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Onecodex 0.10.0 updates its dependency 'requests' to v2.27.1 to include a security fix.
what vulnarability does onecodex version less then 0.10.0 have
Having vulnarability PVE-2023-59633 Advisory: Onefuzz 1.5.0 includes a fix for a Race Condition vulnerability. https://github.com/microsoft/onefuzz/pull/204
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onefuzz version less then 1.5.0 have ### Response: Having vulnarability PVE-2023-59633 Advisory: Onefuzz 1.5.0 includes a fix for a Race Condition vulnerability. https://github.com/microsoft/onefuzz/pull/204
what vulnarability does onefuzz version less then 1.5.0 have
Having vulnarability PVE-2021-42852 Advisory: Onegov.form before 0.16.1 is not escaping HTML labels in the dynamic formbuilder. https://github.com/OneGov/onegov.form/commit/abce4e1ca620de244460f005f9d2412683552f30
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onegov-form version less then 0.16.1 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Onegov.form before 0.16.1 is not escaping HTML labels in the dynamic formbuilder. https://github.com/OneGov/onegov.form/commit/abce4e1ca620de244460f005f9d2412683552f30
what vulnarability does onegov-form version less then 0.16.1 have
Having vulnarability PVE-2021-37158 Advisory: For security reasons, onelogin-aws-assume-role 1.3.0 removes the ability to provide the IP using a command line parameter and is instead able to provide the IP address at the onelogin.sdk.json file.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onelogin-aws-assume-role version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-37158 Advisory: For security reasons, onelogin-aws-assume-role 1.3.0 removes the ability to provide the IP using a command line parameter and is instead able to provide the IP address at the onelogin.sdk.json file.
what vulnarability does onelogin-aws-assume-role version less then 1.3.0 have
Having vulnarability PVE-2023-62978 Advisory: Onetl 0.10.0 includes a fix for a race condition vulnerability which could compromise availability. https://github.com/MobileTeleSystems/onetl/pull/189
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onetl version less then 0.10.0 have ### Response: Having vulnarability PVE-2023-62978 Advisory: Onetl 0.10.0 includes a fix for a race condition vulnerability which could compromise availability. https://github.com/MobileTeleSystems/onetl/pull/189
what vulnarability does onetl version less then 0.10.0 have
Having vulnarability CVE-2016-5026 Advisory: hs.py in OnionShare before 0.9.1 allows local users to modify the hiddenservice by pre-creating the /tmp/onionshare directory.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onionshare-cli version less then 0.9.1 have ### Response: Having vulnarability CVE-2016-5026 Advisory: hs.py in OnionShare before 0.9.1 allows local users to modify the hiddenservice by pre-creating the /tmp/onionshare directory.
what vulnarability does onionshare-cli version less then 0.9.1 have
Having vulnarability PVE-2021-25912 Advisory: onixcheck 0.8.0 adds secured XML-Parsing via defusedxml.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onixcheck version less then 0.8.0 have ### Response: Having vulnarability PVE-2021-25912 Advisory: onixcheck 0.8.0 adds secured XML-Parsing via defusedxml.
what vulnarability does onixcheck version less then 0.8.0 have
Having vulnarability CVE-2022-25882 Advisory: Onnx 1.13.0 includes a fix for CVE-2022-25882: Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onnx version less then 1.13.0 have ### Response: Having vulnarability CVE-2022-25882 Advisory: Onnx 1.13.0 includes a fix for CVE-2022-25882: Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory.
what vulnarability does onnx version less then 1.13.0 have
Having vulnarability CVE-2022-1941 Advisory: Onnxruntime 1.13.1 updates 'protobuf' to v3.18.3 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onnxruntime version less then 1.13.1 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Onnxruntime 1.13.1 updates 'protobuf' to v3.18.3 to include a security fix.
what vulnarability does onnxruntime version less then 1.13.1 have
Having vulnarability PVE-2023-54816 Advisory: Onyxproxy is a malicious package. It harvests and exfiltrates sensitive data. https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does onyxproxy version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-54816 Advisory: Onyxproxy is a malicious package. It harvests and exfiltrates sensitive data. https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection
what vulnarability does onyxproxy version greather then equal to 0 have
Having vulnarability CVE-2023-37276 Advisory: Oobabot 0.2.3 updates its dependency 'aiohttp' to v3.8.5 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oobabot version less then 0.2.3 have ### Response: Having vulnarability CVE-2023-37276 Advisory: Oobabot 0.2.3 updates its dependency 'aiohttp' to v3.8.5 to include a security fix.
what vulnarability does oobabot version less then 0.2.3 have
Having vulnarability CVE-2023-34239 Advisory: Oobabot-plugin 0.2.0 updates its dependency 'gradio' to version '3.34.0' to include a fix for an improper input validation vulnerability. https://github.com/chrisrude/oobabot-plugin/commit/b41a3b9006dbb24c6c6e2a5c7c0ecbc86a741f95
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oobabot-plugin version less then 0.2.0 have ### Response: Having vulnarability CVE-2023-34239 Advisory: Oobabot-plugin 0.2.0 updates its dependency 'gradio' to version '3.34.0' to include a fix for an improper input validation vulnerability. https://github.com/chrisrude/oobabot-plugin/commit/b41a3b9006dbb24c6c6e2a5c7c0ecbc86a741f95
what vulnarability does oobabot-plugin version less then 0.2.0 have
Having vulnarability PVE-2021-25913 Advisory: Oodt before 0.4 is vulnerable to XSS attacks via malformed query strings. https://issues.apache.org/jira/browse/OODT-364 https://github.com/apache/oodt/commit/cf6ff6b5437cee01792269cc16010e595547a64d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oodt version less then 0.4 have ### Response: Having vulnarability PVE-2021-25913 Advisory: Oodt before 0.4 is vulnerable to XSS attacks via malformed query strings. https://issues.apache.org/jira/browse/OODT-364 https://github.com/apache/oodt/commit/cf6ff6b5437cee01792269cc16010e595547a64d
what vulnarability does oodt version less then 0.4 have
Having vulnarability PVE-2021-25914 Advisory: ooniprobe before 1.0.2 is vulnerable to several undisclosed security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ooniprobe version less then 1.0.2 have ### Response: Having vulnarability PVE-2021-25914 Advisory: ooniprobe before 1.0.2 is vulnerable to several undisclosed security issues.
what vulnarability does ooniprobe version less then 1.0.2 have
Having vulnarability CVE-2020-28477 Advisory: Opacus 0.12.0 updates its dependency 'immer' to v8.0.1 to include a security fix. https://github.com/pytorch/opacus/commit/4e8c77f1fd909fcc97b752ac955f450a1e6d2f71
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opacus version less then 0.12.0 have ### Response: Having vulnarability CVE-2020-28477 Advisory: Opacus 0.12.0 updates its dependency 'immer' to v8.0.1 to include a security fix. https://github.com/pytorch/opacus/commit/4e8c77f1fd909fcc97b752ac955f450a1e6d2f71
what vulnarability does opacus version less then 0.12.0 have
Having vulnarability CVE-2022-25304 Advisory: All versions of package opcua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opcua version greather then 0 have ### Response: Having vulnarability CVE-2022-25304 Advisory: All versions of package opcua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.
what vulnarability does opcua version greather then 0 have
Having vulnarability PVE-2023-59676 Advisory: Open-aea 0.5.3 includes a fix for a Race Condition vulnerability. https://github.com/valory-xyz/open-aea/commit/4c5efa6c2268b2f4afe030de7172132bc001036d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does open-aea version less then 0.5.3 have ### Response: Having vulnarability PVE-2023-59676 Advisory: Open-aea 0.5.3 includes a fix for a Race Condition vulnerability. https://github.com/valory-xyz/open-aea/commit/4c5efa6c2268b2f4afe030de7172132bc001036d
what vulnarability does open-aea version less then 0.5.3 have
Having vulnarability CVE-2023-37920 Advisory: Open-source-insights-api 0.1.11 updates its dependency 'certifi' to v2023.7.22 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does open-source-insights-api version less then 0.1.11 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Open-source-insights-api 0.1.11 updates its dependency 'certifi' to v2023.7.22 to include a security fix.
what vulnarability does open-source-insights-api version less then 0.1.11 have
Having vulnarability PVE-2023-62826 Advisory: Openadapt 0.1.0 modifies export_sql to use paramerterized queries to prevent sql injection. https://github.com/OpenAdaptAI/OpenAdapt/commit/9dc1850918e81648b9885dd8a1be836d5e8d95ef
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openadapt version less then 0.1.0 have ### Response: Having vulnarability PVE-2023-62826 Advisory: Openadapt 0.1.0 modifies export_sql to use paramerterized queries to prevent sql injection. https://github.com/OpenAdaptAI/OpenAdapt/commit/9dc1850918e81648b9885dd8a1be836d5e8d95ef
what vulnarability does openadapt version less then 0.1.0 have
Having vulnarability CVE-2023-34541 Advisory: Openai-copilot 0.2.4 updates its dependency 'langchain' to v0.0.264 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openai-copilot version less then 0.2.4 have ### Response: Having vulnarability CVE-2023-34541 Advisory: Openai-copilot 0.2.4 updates its dependency 'langchain' to v0.0.264 to include a security fix.
what vulnarability does openai-copilot version less then 0.2.4 have
Having vulnarability CVE-2019-19844 Advisory: Openapi-core 0.13.0 includes a fix for CVE-2019-19844. It also introduces security validation with an API Key and support for HTTP security types. https://github.com/python-openapi/openapi-core/commit/745736b5c202ab9768bf4efb869934897d667647
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openapi-core version less then 0.13.0 have ### Response: Having vulnarability CVE-2019-19844 Advisory: Openapi-core 0.13.0 includes a fix for CVE-2019-19844. It also introduces security validation with an API Key and support for HTTP security types. https://github.com/python-openapi/openapi-core/commit/745736b5c202ab9768bf4efb869934897d667647
what vulnarability does openapi-core version less then 0.13.0 have
Having vulnarability CVE-2020-15141 Advisory: In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk. See: CVE-2020-15141.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openapi-python-client version less then 0.5.3 have ### Response: Having vulnarability CVE-2020-15141 Advisory: In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk. See: CVE-2020-15141.
what vulnarability does openapi-python-client version less then 0.5.3 have
Having vulnarability CVE-2017-16129 Advisory: Openapigenerator 3.2.1 updates its dependency 'superagent' to v3.7.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openapigenerator version less then 3.2.1 have ### Response: Having vulnarability CVE-2017-16129 Advisory: Openapigenerator 3.2.1 updates its dependency 'superagent' to v3.7.0 to include a security fix.
what vulnarability does openapigenerator version less then 3.2.1 have
Having vulnarability CVE-2022-3602 Advisory: Openbb 2.3.0 updates its dependency 'cryptography' to v39.0.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openbb version less then 2.3.0 have ### Response: Having vulnarability CVE-2022-3602 Advisory: Openbb 2.3.0 updates its dependency 'cryptography' to v39.0.0 to include security fixes.
what vulnarability does openbb version less then 2.3.0 have
Having vulnarability CVE-2023-30861 Advisory: Openbrokerapi 4.5.5 updates its dependency 'flask' to include a fix for a Use of Persistent Cookies Containing Sensitive Information vulnerability. https://github.com/eruvanos/openbrokerapi/commit/1057ef31830dc0a5dbcfaab2f3687a3097927f96
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openbrokerapi version less then 4.5.5 have ### Response: Having vulnarability CVE-2023-30861 Advisory: Openbrokerapi 4.5.5 updates its dependency 'flask' to include a fix for a Use of Persistent Cookies Containing Sensitive Information vulnerability. https://github.com/eruvanos/openbrokerapi/commit/1057ef31830dc0a5dbcfaab2f3687a3097927f96
what vulnarability does openbrokerapi version less then 4.5.5 have