output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability CVE-2018-16982 Advisory: Open Chinese Convert (OpenCC) 1.0.5 allows attackers to cause a denial of service (segmentation fault) because BinaryDict::NewFromFile in BinaryDict.cpp may have out-of-bounds keyOffset and valueOffset values via a crafted .ocd file.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opencc version greather then equal to 0,less then 1.1.2 have ### Response: Having vulnarability CVE-2018-16982 Advisory: Open Chinese Convert (OpenCC) 1.0.5 allows attackers to cause a denial of service (segmentation fault) because BinaryDict::NewFromFile in BinaryDict.cpp may have out-of-bounds keyOffset and valueOffset values via a crafted .ocd file.
what vulnarability does opencc version greather then equal to 0,less then 1.1.2 have
Having vulnarability CVE-2022-26032 Advisory: Opencl-rt 2022.1 includes a fix for CVE-2022-26032: Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opencl-rt version less then 2022.1 have ### Response: Having vulnarability CVE-2022-26032 Advisory: Opencl-rt 2022.1 includes a fix for CVE-2022-26032: Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
what vulnarability does opencl-rt version less then 2022.1 have
Having vulnarability CVE-2017-14136 Advisory: OpenCV (Open Source Computer Vision Library) 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12597.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opencv-contrib-python version greather then equal to 0,less then 3.3.1.11 have ### Response: Having vulnarability CVE-2017-14136 Advisory: OpenCV (Open Source Computer Vision Library) 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12597.
what vulnarability does opencv-contrib-python version greather then equal to 0,less then 3.3.1.11 have
Having vulnarability CVE-2019-14493 Advisory: An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opencv-contrib-python-headless version greather then equal to 0,less then 4.1.1.26 have ### Response: Having vulnarability CVE-2019-14493 Advisory: An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.
what vulnarability does opencv-contrib-python-headless version greather then equal to 0,less then 4.1.1.26 have
Having vulnarability CVE-2017-12603 Advisory: Opencv-python 3.3.1.11 includes a fix for CVE-2017-12603: OpenCV through 3.3 has an invalid write in the cv::RLByteStream::getBytes function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 2-opencv-heapoverflow-fseek test case.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opencv-python version less then 3.3.1.11 have ### Response: Having vulnarability CVE-2017-12603 Advisory: Opencv-python 3.3.1.11 includes a fix for CVE-2017-12603: OpenCV through 3.3 has an invalid write in the cv::RLByteStream::getBytes function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 2-opencv-heapoverflow-fseek test case.
what vulnarability does opencv-python version less then 3.3.1.11 have
Having vulnarability CVE-2019-14493 Advisory: An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opencv-python-headless version greather then equal to 0,less then 4.1.1.26 have ### Response: Having vulnarability CVE-2019-14493 Advisory: An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.
what vulnarability does opencv-python-headless version greather then equal to 0,less then 4.1.1.26 have
Having vulnarability CVE-2022-31506 Advisory: Opendiamond throughout 10.1.1 allows absolute path traversal because the Flask send_file function is used unsafely. See CVE-2022-31506.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opendiamond version less then equal to 10.1.1 have ### Response: Having vulnarability CVE-2022-31506 Advisory: Opendiamond throughout 10.1.1 allows absolute path traversal because the Flask send_file function is used unsafely. See CVE-2022-31506.
what vulnarability does opendiamond version less then equal to 10.1.1 have
Having vulnarability PVE-2022-50829 Advisory: Opendp 0.5.0 hardens samplers to handle some privacy violation cases. https://github.com/opendp/opendp/pull/481
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opendp version less then 0.5.0 have ### Response: Having vulnarability PVE-2022-50829 Advisory: Opendp 0.5.0 hardens samplers to handle some privacy violation cases. https://github.com/opendp/opendp/pull/481
what vulnarability does opendp version less then 0.5.0 have
Having vulnarability PVE-2022-44443 Advisory: Opendp-smartnoise-core 0.1.1 enables 'protect_floating_point' by default, to protect better real-valued queries.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opendp-smartnoise-core version less then 0.1.1 have ### Response: Having vulnarability PVE-2022-44443 Advisory: Opendp-smartnoise-core 0.1.1 enables 'protect_floating_point' by default, to protect better real-valued queries.
what vulnarability does opendp-smartnoise-core version less then 0.1.1 have
Having vulnarability PVE-2023-61374 Advisory: Openedx-django-wiki 0.0.21 includes a fix for a XSS vulnerability. https://github.com/openedx/django-wiki/commit/0904b1453e19580210049dbfd96dd503fb39831e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openedx-django-wiki version less then 0.0.21 have ### Response: Having vulnarability PVE-2023-61374 Advisory: Openedx-django-wiki 0.0.21 includes a fix for a XSS vulnerability. https://github.com/openedx/django-wiki/commit/0904b1453e19580210049dbfd96dd503fb39831e
what vulnarability does openedx-django-wiki version less then 0.0.21 have
Having vulnarability PVE-2024-64977 Advisory: Openfeature-sdk version 0.0.2 updates its wheel dependency on the python-sdk from version 0.37.1 to 0.38.0, due to security enhancements. https://github.com/open-feature/python-sdk/pull/37/commits/0e5f5854ec7f9db6363515c705a2e21472f16352
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openfeature-sdk version less then 0.0.2 have ### Response: Having vulnarability PVE-2024-64977 Advisory: Openfeature-sdk version 0.0.2 updates its wheel dependency on the python-sdk from version 0.37.1 to 0.38.0, due to security enhancements. https://github.com/open-feature/python-sdk/pull/37/commits/0e5f5854ec7f9db6363515c705a2e21472f16352
what vulnarability does openfeature-sdk version less then 0.0.2 have
Having vulnarability CVE-2023-47627 Advisory: Openimis-be-api-fhir-r4 version 23.10 has upgraded its aiohttp library from version 3.8.1 to 3.8.5 to address security vulnerabilities and ensure compatibility as noted in CVE-2023-47627.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openimis-be-api-fhir-r4 version less then 23.10 have ### Response: Having vulnarability CVE-2023-47627 Advisory: Openimis-be-api-fhir-r4 version 23.10 has upgraded its aiohttp library from version 3.8.1 to 3.8.5 to address security vulnerabilities and ensure compatibility as noted in CVE-2023-47627.
what vulnarability does openimis-be-api-fhir-r4 version less then 23.10 have
Having vulnarability CVE-2017-5992 Advisory: Openpyxl 2.4.1 resolves external entities by default, which allows remote attackers to conduct XXE attacks via a crafted .xlsx document.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openpyxl version greather then equal to 0,less then 2.4.1 have ### Response: Having vulnarability CVE-2017-5992 Advisory: Openpyxl 2.4.1 resolves external entities by default, which allows remote attackers to conduct XXE attacks via a crafted .xlsx document.
what vulnarability does openpyxl version greather then equal to 0,less then 2.4.1 have
Having vulnarability CVE-2021-45115 Advisory: Openquake.engine 3.14.0 updates its dependency 'django' to v3.2.12 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openquake-engine version less then 3.14.0 have ### Response: Having vulnarability CVE-2021-45115 Advisory: Openquake.engine 3.14.0 updates its dependency 'django' to v3.2.12 to include security fixes.
what vulnarability does openquake-engine version less then 3.14.0 have
Having vulnarability CVE-2022-23491 Advisory: Opensearch-py 2.3.0 updates its dependency 'certifi' to version '2022.12.07' to include a fix for a vulnerability. https://github.com/opensearch-project/opensearch-py/pull/295
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opensearch-py version less then 2.3.0 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Opensearch-py 2.3.0 updates its dependency 'certifi' to version '2022.12.07' to include a fix for a vulnerability. https://github.com/opensearch-project/opensearch-py/pull/295
what vulnarability does opensearch-py version less then 2.3.0 have
Having vulnarability CVE-2022-45907 Advisory: Opensearch-py-ml 1.0.0 requires 'torch>=1.13.0' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opensearch-py-ml version less then 1.0.0 have ### Response: Having vulnarability CVE-2022-45907 Advisory: Opensearch-py-ml 1.0.0 requires 'torch>=1.13.0' to include a security fix.
what vulnarability does opensearch-py-ml version less then 1.0.0 have
Having vulnarability PVE-2021-42733 Advisory: Openslides 2.1 fixes an issue in which comments were shown for unprivileged users. https://github.com/OpenSlides/OpenSlides/pull/2872
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openslides version less then 2.1 have ### Response: Having vulnarability PVE-2021-42733 Advisory: Openslides 2.1 fixes an issue in which comments were shown for unprivileged users. https://github.com/OpenSlides/OpenSlides/pull/2872
what vulnarability does openslides version less then 2.1 have
Having vulnarability CVE-2022-31124 Advisory: Openssh-key-parser 0.0.6 includes a fix for CVE-2022-31124: Possible leak of key's raw field if declared length is incorrect. https://github.com/scottcwang/openssh_key_parser/security/advisories/GHSA-hm37-9xh2-q499
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openssh-key-parser version less then 0.0.6 have ### Response: Having vulnarability CVE-2022-31124 Advisory: Openssh-key-parser 0.0.6 includes a fix for CVE-2022-31124: Possible leak of key's raw field if declared length is incorrect. https://github.com/scottcwang/openssh_key_parser/security/advisories/GHSA-hm37-9xh2-q499
what vulnarability does openssh-key-parser version less then 0.0.6 have
Having vulnarability CVE-2023-1625 Advisory: Openstack-heat 20.0.0 includes a fix for CVE-2023-1625: An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system. https://github.com/openstack/heat/commit/a49526c278e52823080c7f3fcb72785b93fd4dcb
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openstack-heat version less then 20.0.0 have ### Response: Having vulnarability CVE-2023-1625 Advisory: Openstack-heat 20.0.0 includes a fix for CVE-2023-1625: An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system. https://github.com/openstack/heat/commit/a49526c278e52823080c7f3fcb72785b93fd4dcb
what vulnarability does openstack-heat version less then 20.0.0 have
Having vulnarability CVE-2020-12690 Advisory: An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access. See: CVE-2020-12690.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openstack-keystone version less then 15.0.1,equal to 16.0.0 have ### Response: Having vulnarability CVE-2020-12690 Advisory: An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access. See: CVE-2020-12690.
what vulnarability does openstack-keystone version less then 15.0.1,equal to 16.0.0 have
Having vulnarability CVE-2016-7404 Advisory: OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openstack-magnum version less then 5.0.0 have ### Response: Having vulnarability CVE-2016-7404 Advisory: OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.
what vulnarability does openstack-magnum version less then 5.0.0 have
Having vulnarability CVE-2023-1176 Advisory: Openstef 3.1.1 upgrades its mlflow dependency, moving from the compatible release version of approximately 1.22.0 (=1.22.0) to approximately 1.24.0 (=1.24.0), in response to the security vulnerability CVE-2023-1176.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openstef version less then 3.1.1 have ### Response: Having vulnarability CVE-2023-1176 Advisory: Openstef 3.1.1 upgrades its mlflow dependency, moving from the compatible release version of approximately 1.22.0 (=1.22.0) to approximately 1.24.0 (=1.24.0), in response to the security vulnerability CVE-2023-1176.
what vulnarability does openstef version less then 3.1.1 have
Having vulnarability PVE-2021-36897 Advisory: opentaxii 0.1.11 requires recent version of `lxml` for security reasons.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opentaxii version less then 0.1.11 have ### Response: Having vulnarability PVE-2021-36897 Advisory: opentaxii 0.1.11 requires recent version of `lxml` for security reasons.
what vulnarability does opentaxii version less then 0.1.11 have
Having vulnarability CVE-2023-43810 Advisory: Opentelemetry-instrumentation 0.41b0 includes a fix for CVE-2023-43810: Autoinstrumentation out of the box adds the label 'http_method' that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. https://github.com/open-telemetry/opentelemetry-python-contrib/security/advisories/GHSA-5rv5-6h4r-h22v
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opentelemetry-instrumentation version less then 0.41b0 have ### Response: Having vulnarability CVE-2023-43810 Advisory: Opentelemetry-instrumentation 0.41b0 includes a fix for CVE-2023-43810: Autoinstrumentation out of the box adds the label 'http_method' that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. https://github.com/open-telemetry/opentelemetry-python-contrib/security/advisories/GHSA-5rv5-6h4r-h22v
what vulnarability does opentelemetry-instrumentation version less then 0.41b0 have
Having vulnarability PVE-2021-42960 Advisory: Opentera 1.0.9 adds missing service access checks to the Service API. https://github.com/introlab/opentera/commit/4aa0361f6cd3faa395df6a43755fd197677c5528
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opentera version less then 1.0.9 have ### Response: Having vulnarability PVE-2021-42960 Advisory: Opentera 1.0.9 adds missing service access checks to the Service API. https://github.com/introlab/opentera/commit/4aa0361f6cd3faa395df6a43755fd197677c5528
what vulnarability does opentera version less then 1.0.9 have
Having vulnarability PVE-2022-45429 Advisory: Openvc is a typosquatting package. It installs malware in your system that leaks your data. https://github.com/rsc-dev/pypi_malware
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openvc version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45429 Advisory: Openvc is a typosquatting package. It installs malware in your system that leaks your data. https://github.com/rsc-dev/pypi_malware
what vulnarability does openvc version greather then 0,less then 0 have
Having vulnarability PVE-2021-40082 Advisory: Openvino 2020.3.1 includes security and functionality bug fixes, and minor capability changes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openvino version less then 2020.3.1 have ### Response: Having vulnarability PVE-2021-40082 Advisory: Openvino 2020.3.1 includes security and functionality bug fixes, and minor capability changes.
what vulnarability does openvino version less then 2020.3.1 have
Having vulnarability CVE-2021-37663 Advisory: Openvino-tensorflow 1.0.0 updates its dependency 'tensorflow' to v2.5.1 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openvino-tensorflow version less then 1.0.0 have ### Response: Having vulnarability CVE-2021-37663 Advisory: Openvino-tensorflow 1.0.0 updates its dependency 'tensorflow' to v2.5.1 to include security fixes.
what vulnarability does openvino-tensorflow version less then 1.0.0 have
Having vulnarability CVE-2023-4863 Advisory: Openvisus 1.2.85 throughout 1.2.178 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only Windows wheels on PyPI were affected. https://inspector.pypi.io/project/openvisus/1.2.178/packages/1f/f6/c799259c9c61521db3824856f42d01cc7c6ccfd05b91b4a249f7261046a3/OpenVisus-1.2.178-cp36-none-win_amd64.whl
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openvisus version greather then equal to 1.2.85,less then equal to 1.2.178 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Openvisus 1.2.85 throughout 1.2.178 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only Windows wheels on PyPI were affected. https://inspector.pypi.io/project/openvisus/1.2.178/packages/1f/f6/c799259c9c61521db3824856f42d01cc7c6ccfd05b91b4a249f7261046a3/OpenVisus-1.2.178-cp36-none-win_amd64.whl
what vulnarability does openvisus version greather then equal to 1.2.85,less then equal to 1.2.178 have
Having vulnarability PVE-2024-67455 Advisory: Openvpn-ldap-auth version 0.1.7 updates its dependencies to include pytest version 4.3.0 or higher to address a known security vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openvpn-ldap-auth version less then 0.1.7 have ### Response: Having vulnarability PVE-2024-67455 Advisory: Openvpn-ldap-auth version 0.1.7 updates its dependencies to include pytest version 4.3.0 or higher to address a known security vulnerability.
what vulnarability does openvpn-ldap-auth version less then 0.1.7 have
Having vulnarability CVE-2021-31606 Advisory: Openvpn-monitor throughout 1.1.3 is affected by CVE-2021-31606: Authorization Bypass to disconnect arbitrary clients. A fix is available in openvpn-monitor GH repository. https://github.com/furlongm/openvpn-monitor/commit/ddb9d31ef0ec56f578bdacf99ebe9d68455ed8ca
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openvpn-monitor version less then equal to 1.1.3 have ### Response: Having vulnarability CVE-2021-31606 Advisory: Openvpn-monitor throughout 1.1.3 is affected by CVE-2021-31606: Authorization Bypass to disconnect arbitrary clients. A fix is available in openvpn-monitor GH repository. https://github.com/furlongm/openvpn-monitor/commit/ddb9d31ef0ec56f578bdacf99ebe9d68455ed8ca
what vulnarability does openvpn-monitor version less then equal to 1.1.3 have
Having vulnarability PVE-2022-48396 Advisory: Openwisp-controller 0.8.4 patches security bugs in internal HTTP endpoints which allowed to obtain UUID of other organizations and other sensitive information.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openwisp-controller version less then 0.8.4 have ### Response: Having vulnarability PVE-2022-48396 Advisory: Openwisp-controller 0.8.4 patches security bugs in internal HTTP endpoints which allowed to obtain UUID of other organizations and other sensitive information.
what vulnarability does openwisp-controller version less then 0.8.4 have
Having vulnarability PVE-2021-43274 Advisory: Openwisp-users 1.0.2 updates its dependency 'django-allauth' to v0.51.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openwisp-users version less then 1.0.2 have ### Response: Having vulnarability PVE-2021-43274 Advisory: Openwisp-users 1.0.2 updates its dependency 'django-allauth' to v0.51.0 to include a security fix.
what vulnarability does openwisp-users version less then 1.0.2 have
Having vulnarability CVE-2018-18074 Advisory: Openxc 0.14.0 updates its dependency 'requests' to v2.20.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openxc version less then 0.14.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Openxc 0.14.0 updates its dependency 'requests' to v2.20.0 to include security fixes.
what vulnarability does openxc version less then 0.14.0 have
Having vulnarability CVE-2023-4863 Advisory: Openxlab 0.0.13 throughout 0.0.23 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. https://inspector.pypi.io/project/openxlab/0.0.23/packages/b0/5a/815beb4f6220b5165666a0dd93c240646b0dc6ccca730e5b7aa659377a00/openxlab-0.0.23.tar.gz
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openxlab version greather then equal to 0.0.13,less then 0.0.24 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Openxlab 0.0.13 throughout 0.0.23 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. https://inspector.pypi.io/project/openxlab/0.0.23/packages/b0/5a/815beb4f6220b5165666a0dd93c240646b0dc6ccca730e5b7aa659377a00/openxlab-0.0.23.tar.gz
what vulnarability does openxlab version greather then equal to 0.0.13,less then 0.0.24 have
Having vulnarability CVE-2022-31153 Advisory: ### Impact This vulnerability affects all accounts (vanilla and ethereum flavors) in the [v0.2.0 release of OpenZeppelin Contracts for Cairo](https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.0), which are not whitelisted on StarkNet mainnet, so only goerli deployments of v0.2.0 accounts are affected. This faulty behavior is not observed in [StarkNet's testing framework](https://github.com/starkware-libs/cairo-lang/blob/master/src/starkware/starknet/testing/starknet.py), so don't rely on it passing to detect this issue on custom accounts. ### Patches This bug has been patched in [v0.2.1](https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.1). ### References The issue is detailed in https://github.com/OpenZeppelin/cairo-contracts/issues/386. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Contracts for Cairo repo](https://github.com/OpenZeppelin/cairo-contracts/issues/new/choose) * Email us at [security@openzeppelin.com](mailto:security@openzeppelin.com)
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does openzeppelin-cairo-contracts version greather then equal to 0,less then 0.2.1 have ### Response: Having vulnarability CVE-2022-31153 Advisory: ### Impact This vulnerability affects all accounts (vanilla and ethereum flavors) in the [v0.2.0 release of OpenZeppelin Contracts for Cairo](https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.0), which are not whitelisted on StarkNet mainnet, so only goerli deployments of v0.2.0 accounts are affected. This faulty behavior is not observed in [StarkNet's testing framework](https://github.com/starkware-libs/cairo-lang/blob/master/src/starkware/starknet/testing/starknet.py), so don't rely on it passing to detect this issue on custom accounts. ### Patches This bug has been patched in [v0.2.1](https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.1). ### References The issue is detailed in https://github.com/OpenZeppelin/cairo-contracts/issues/386. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Contracts for Cairo repo](https://github.com/OpenZeppelin/cairo-contracts/issues/new/choose) * Email us at [security@openzeppelin.com](mailto:security@openzeppelin.com)
what vulnarability does openzeppelin-cairo-contracts version greather then equal to 0,less then 0.2.1 have
Having vulnarability CVE-2021-40720 Advisory: Ops CLI version 2.0.4 (and earlier) is affected by a Deserialization of Untrusted Data vulnerability to achieve arbitrary code execution when the checkout_repo function is called on a maliciously crafted file. An attacker can leverage this to execute arbitrary code on the victim machine.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ops-cli version greather then equal to 0,less then 2.0.5 have ### Response: Having vulnarability CVE-2021-40720 Advisory: Ops CLI version 2.0.4 (and earlier) is affected by a Deserialization of Untrusted Data vulnerability to achieve arbitrary code execution when the checkout_repo function is called on a maliciously crafted file. An attacker can leverage this to execute arbitrary code on the victim machine.
what vulnarability does ops-cli version greather then equal to 0,less then 2.0.5 have
Having vulnarability CVE-2023-25669 Advisory: Opsml 0.3.0 updates its dependency 'tensorflow' to v2.11.1 to include several security fixes affecting Confidentiality, Integrity and Availability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does opsml version less then 0.3.0 have ### Response: Having vulnarability CVE-2023-25669 Advisory: Opsml 0.3.0 updates its dependency 'tensorflow' to v2.11.1 to include several security fixes affecting Confidentiality, Integrity and Availability.
what vulnarability does opsml version less then 0.3.0 have
Having vulnarability CVE-2021-45046 Advisory: Optimade 0.16.9 updates its dependency 'Elasticsearch' to v7.16.2 to avoid any log4j related vulnerability. https://github.com/Materials-Consortia/optimade-python-tools/issues/1040
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does optimade version less then 0.16.9 have ### Response: Having vulnarability CVE-2021-45046 Advisory: Optimade 0.16.9 updates its dependency 'Elasticsearch' to v7.16.2 to avoid any log4j related vulnerability. https://github.com/Materials-Consortia/optimade-python-tools/issues/1040
what vulnarability does optimade version less then 0.16.9 have
Having vulnarability CVE-2020-1747 Advisory: Optimizely-sdk 4.0.0 stops requiring PyYaml==5.2 as a dependency to resolve security vulnerabilities. https://github.com/optimizely/python-sdk/pull/366/files
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does optimizely-sdk version less then 4.0.0 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Optimizely-sdk 4.0.0 stops requiring PyYaml==5.2 as a dependency to resolve security vulnerabilities. https://github.com/optimizely/python-sdk/pull/366/files
what vulnarability does optimizely-sdk version less then 4.0.0 have
Having vulnarability PVE-2021-38958 Advisory: Orange3-bioinformatics 4.2.0 adds the Orange.widgets.credentials.CredentialManager to securely store user password.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does orange3-bioinformatics version less then 4.2.0 have ### Response: Having vulnarability PVE-2021-38958 Advisory: Orange3-bioinformatics 4.2.0 adds the Orange.widgets.credentials.CredentialManager to securely store user password.
what vulnarability does orange3-bioinformatics version less then 4.2.0 have
Having vulnarability PVE-2021-43649 Advisory: Ores 1.3.1 changes pickle for JSON as celery serializer to avoid security issues. https://github.com/wikimedia/ores/commit/817915caf495c031a232071c27e25cb7c7e7696d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ores version less then 1.3.1 have ### Response: Having vulnarability PVE-2021-43649 Advisory: Ores 1.3.1 changes pickle for JSON as celery serializer to avoid security issues. https://github.com/wikimedia/ores/commit/817915caf495c031a232071c27e25cb7c7e7696d
what vulnarability does ores version less then 1.3.1 have
Having vulnarability CVE-2024-27454 Advisory: orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does orjson version less then equal to 3.9.15 have ### Response: Having vulnarability CVE-2024-27454 Advisory: orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents.
what vulnarability does orjson version less then equal to 3.9.15 have
Having vulnarability CVE-2021-29510 Advisory: Ormar 0.10.9 updates the 'pydantic' library to fix a security vulnerability (CVE-2021-29510).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ormar version less then 0.10.9 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Ormar 0.10.9 updates the 'pydantic' library to fix a security vulnerability (CVE-2021-29510).
what vulnarability does ormar version less then 0.10.9 have
Having vulnarability CVE-2017-18342 Advisory: Ortec.scientific.benchmarks.loadbuilding 1.0.1 includes a security patch for the function 'safeFindRoot' in 'ortec/scientific/benchmarks/loadbuilding/solution/read/YAMLtoThreeDsolution.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/ORTECScientificBenchmarks/ortec-scientific-benchmarks-loadbuilding/commit/81b5f1ad38bc25ddf8ce1e988cb540a8d7f43482
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ortec-scientific-benchmarks-loadbuilding version less then 1.0.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Ortec.scientific.benchmarks.loadbuilding 1.0.1 includes a security patch for the function 'safeFindRoot' in 'ortec/scientific/benchmarks/loadbuilding/solution/read/YAMLtoThreeDsolution.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/ORTECScientificBenchmarks/ortec-scientific-benchmarks-loadbuilding/commit/81b5f1ad38bc25ddf8ce1e988cb540a8d7f43482
what vulnarability does ortec-scientific-benchmarks-loadbuilding version less then 1.0.1 have
Having vulnarability PVE-2021-37874 Advisory: Osc 0.123 is the first release that performs SSL certificate checks to prevent man-in-the-middle-attacks. Python-m2crypto is needed to make this work. Certificate checks can be turned off per server via 'sslcertck = 0' in .oscrc.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does osc version less then 0.123 have ### Response: Having vulnarability PVE-2021-37874 Advisory: Osc 0.123 is the first release that performs SSL certificate checks to prevent man-in-the-middle-attacks. Python-m2crypto is needed to make this work. Certificate checks can be turned off per server via 'sslcertck = 0' in .oscrc.
what vulnarability does osc version less then 0.123 have
Having vulnarability PVE-2017-47673 Advisory: Osha.oira 8.1.0 fixes XSS vulnerabilities in several views.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does osha-oira version less then 8.1.0 have ### Response: Having vulnarability PVE-2017-47673 Advisory: Osha.oira 8.1.0 fixes XSS vulnerabilities in several views.
what vulnarability does osha-oira version less then 8.1.0 have
Having vulnarability CVE-2022-38065 Advisory: Oslo.privsep is vulnerable to CVE-2022-38065: A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oslo-privsep version less then equal to 3.1.0 have ### Response: Having vulnarability CVE-2022-38065 Advisory: Oslo.privsep is vulnerable to CVE-2022-38065: A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599
what vulnarability does oslo-privsep version less then equal to 3.1.0 have
Having vulnarability CVE-2022-0718 Advisory: Oslo-utils 4.12.1 includes a fix for CVE-2022-0718: Due to improper parsing, passwords with a double quote ( " ) in them cause incorrect masking in debug logs, causing any part of the password after the double quote to be plaintext.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oslo-utils version less then 4.12.1 have ### Response: Having vulnarability CVE-2022-0718 Advisory: Oslo-utils 4.12.1 includes a fix for CVE-2022-0718: Due to improper parsing, passwords with a double quote ( " ) in them cause incorrect masking in debug logs, causing any part of the password after the double quote to be plaintext.
what vulnarability does oslo-utils version less then 4.12.1 have
Having vulnarability CVE-2017-2592 Advisory: Oslo.middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does oslo.middleware version less then 3.8.1,greather then equal to 3.9.0,less then 3.19.1,greather then equal to 3.20.0,less then 3.23.1 have ### Response: Having vulnarability CVE-2017-2592 Advisory: Oslo.middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
what vulnarability does oslo.middleware version less then 3.8.1,greather then equal to 3.9.0,less then 3.19.1,greather then equal to 3.20.0,less then 3.23.1 have
Having vulnarability PVE-2024-67449 Advisory: Ostorlab version 1.0.5 updates its base image to python:3.10.14-alpine3.19 from python:3.9-bullseye to address vulnerabilities, enhancing the security and reliability of the docker environment.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ostorlab version less then 1.0.5 have ### Response: Having vulnarability PVE-2024-67449 Advisory: Ostorlab version 1.0.5 updates its base image to python:3.10.14-alpine3.19 from python:3.9-bullseye to address vulnerabilities, enhancing the security and reliability of the docker environment.
what vulnarability does ostorlab version less then 1.0.5 have
Having vulnarability CVE-2018-10406 Advisory: An issue was discovered in Yelp OSXCollector. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does osxcollector version greather then equal to 0,less then 1.10 have ### Response: Having vulnarability CVE-2018-10406 Advisory: An issue was discovered in Yelp OSXCollector. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
what vulnarability does osxcollector version greather then equal to 0,less then 1.10 have
Having vulnarability CVE-2017-18342 Advisory: Osxcollector-output-filters before 1.1.1 uses yaml.load() instead of yaml.safe_load(), allowing a code execution vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does osxcollector-output-filters version less then 1.1.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Osxcollector-output-filters before 1.1.1 uses yaml.load() instead of yaml.safe_load(), allowing a code execution vulnerability.
what vulnarability does osxcollector-output-filters version less then 1.1.1 have
Having vulnarability CVE-2022-40023 Advisory: Osxphotos 0.51.8 updates its dependency 'mako' to v1.2.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does osxphotos version less then 0.51.8 have ### Response: Having vulnarability CVE-2022-40023 Advisory: Osxphotos 0.51.8 updates its dependency 'mako' to v1.2.2 to include a security fix.
what vulnarability does osxphotos version less then 0.51.8 have
Having vulnarability PVE-2023-52770 Advisory: Otio-cdl-adapter 0.8 starts using 'secure_filename' function based on werkzeug's library to ensure filnames of exported CDL's are safe and valid. https://github.com/josh-mission/otio-cdl-adapter/commit/130597e2c7e53147a0e66f4a9bf8d90f5fbfb6e2
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does otio-cdl-adapter version less then 0.8 have ### Response: Having vulnarability PVE-2023-52770 Advisory: Otio-cdl-adapter 0.8 starts using 'secure_filename' function based on werkzeug's library to ensure filnames of exported CDL's are safe and valid. https://github.com/josh-mission/otio-cdl-adapter/commit/130597e2c7e53147a0e66f4a9bf8d90f5fbfb6e2
what vulnarability does otio-cdl-adapter version less then 0.8 have
Having vulnarability PVE-2021-25915 Advisory: otpauth before 1.0.1 is vulnerable to timing attacks. https://github.com/authlib/otpauth/commit/4186a22d7daa7685b09b6e70ad0eb6ff79439f2d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does otpauth version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-25915 Advisory: otpauth before 1.0.1 is vulnerable to timing attacks. https://github.com/authlib/otpauth/commit/4186a22d7daa7685b09b6e70ad0eb6ff79439f2d
what vulnarability does otpauth version less then 1.0.1 have
Having vulnarability PVE-2017-47049 Advisory: Outbit 0.0.6 changes SSL options to be secure by default.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does outbit version less then 0.0.6 have ### Response: Having vulnarability PVE-2017-47049 Advisory: Outbit 0.0.6 changes SSL options to be secure by default.
what vulnarability does outbit version less then 0.0.6 have
Having vulnarability PVE-2024-66040 Advisory: Outlines 0.0.35 addresses a bug encountered during JSON generation with the FSM.next_state needing to handle a specific case, improving stability and functionality. This fix enhances how the final state is managed, ensuring smoother operation and data processing. https://github.com/outlines-dev/outlines/pull/718
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does outlines version less then 0.0.35 have ### Response: Having vulnarability PVE-2024-66040 Advisory: Outlines 0.0.35 addresses a bug encountered during JSON generation with the FSM.next_state needing to handle a specific case, improving stability and functionality. This fix enhances how the final state is managed, ensuring smoother operation and data processing. https://github.com/outlines-dev/outlines/pull/718
what vulnarability does outlines version less then 0.0.35 have
Having vulnarability CVE-2012-3533 Advisory: The python SDK before 3.1.0.6 and CLI before 3.1.0.8 for oVirt 3.1 does not check the server SSL certificate against the client keys, which allows remote attackers to spoof a server via a man-in-the-middle (MITM) attack.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ovirt-engine-sdk-python version less then 3.1.0.8 have ### Response: Having vulnarability CVE-2012-3533 Advisory: The python SDK before 3.1.0.6 and CLI before 3.1.0.8 for oVirt 3.1 does not check the server SSL certificate against the client keys, which allows remote attackers to spoof a server via a man-in-the-middle (MITM) attack.
what vulnarability does ovirt-engine-sdk-python version less then 3.1.0.8 have
Having vulnarability PVE-2021-25917 Advisory: ovs 1.3.0 includes a fix that flow setups are now processed in a round-robin manner across ports to prevent any single client from monopolizing the CPU and conducting a denial of service attack. https://github.com/openvswitch/ovs/commit/17411ecf2b4d02cfced5f69e567c17673d7d4462
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ovs version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-25917 Advisory: ovs 1.3.0 includes a fix that flow setups are now processed in a round-robin manner across ports to prevent any single client from monopolizing the CPU and conducting a denial of service attack. https://github.com/openvswitch/ovs/commit/17411ecf2b4d02cfced5f69e567c17673d7d4462
what vulnarability does ovs version less then 1.3.0 have
Having vulnarability CVE-2017-16618 Advisory: An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does owlmixin version less then 2.0.0a12 have ### Response: Having vulnarability CVE-2017-16618 Advisory: An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
what vulnarability does owlmixin version less then 2.0.0a12 have
Having vulnarability PVE-2022-45458 Advisory: Owlmoon is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does owlmoon version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45458 Advisory: Owlmoon is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
what vulnarability does owlmoon version greather then 0,less then 0 have
Having vulnarability CVE-2023-27476 Advisory: OWSLib is a Python package for client programming with Open Geospatial Consortium (OGC) web service interface standards, and their related content models. OWSLib's XML parser (which supports both 'lxml' and 'xml.etree') does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. This issue has been addressed in version 0.28.1. The only known workaround is to patch the library manually. See 'GHSA-8h9c-r582-mggc' for details.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does owslib version less then 0.28.1 have ### Response: Having vulnarability CVE-2023-27476 Advisory: OWSLib is a Python package for client programming with Open Geospatial Consortium (OGC) web service interface standards, and their related content models. OWSLib's XML parser (which supports both 'lxml' and 'xml.etree') does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. This issue has been addressed in version 0.28.1. The only known workaround is to patch the library manually. See 'GHSA-8h9c-r582-mggc' for details.
what vulnarability does owslib version less then 0.28.1 have
Having vulnarability CVE-2024-21503 Advisory: Ozi version 0.0.302 updates its dependency on Black to version 24.3 or higher. This adjustment is made to address the ReDoS (Regular Expression Denial of Service) vulnerability identified in CVE-2024-21503.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ozi version less then 0.0.302 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Ozi version 0.0.302 updates its dependency on Black to version 24.3 or higher. This adjustment is made to address the ReDoS (Regular Expression Denial of Service) vulnerability identified in CVE-2024-21503.
what vulnarability does ozi version less then 0.0.302 have
Having vulnarability CVE-2013-0261 Advisory: Packstack 2012.2.3 includes a fix for CVE-2013-0261: (1) installer/basedefs.py and (2) modules/ospluginutils.py in PackStack allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp. https://opendev.org/x/packstack/commit/624d49a0e8305e6613a9637437f7cdfb8a7852e9
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does packstack version greather then equal to 2011.12.0,less then 2012.2.3 have ### Response: Having vulnarability CVE-2013-0261 Advisory: Packstack 2012.2.3 includes a fix for CVE-2013-0261: (1) installer/basedefs.py and (2) modules/ospluginutils.py in PackStack allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp. https://opendev.org/x/packstack/commit/624d49a0e8305e6613a9637437f7cdfb8a7852e9
what vulnarability does packstack version greather then equal to 2011.12.0,less then 2012.2.3 have
Having vulnarability PVE-2022-48279 Advisory: Pacparser 1.4.0 fixes a possible memory overwrite vulnerability. https://github.com/manugarg/pacparser/commit/853e8f45607cb07b877ffd270c63dbcdd5201ad9
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pacparser version less then 1.4.0 have ### Response: Having vulnarability PVE-2022-48279 Advisory: Pacparser 1.4.0 fixes a possible memory overwrite vulnerability. https://github.com/manugarg/pacparser/commit/853e8f45607cb07b877ffd270c63dbcdd5201ad9
what vulnarability does pacparser version less then 1.4.0 have
Having vulnarability PVE-2021-40235 Advisory: Pact-python 1.3.6 includes several vulnerability fixes for Dockerfile(s).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pact-python version less then 1.3.6 have ### Response: Having vulnarability PVE-2021-40235 Advisory: Pact-python 1.3.6 includes several vulnerability fixes for Dockerfile(s).
what vulnarability does pact-python version less then 1.3.6 have
Having vulnarability CVE-2017-18342 Advisory: Pacyam 1.1.1 includes a security patch for the function '_yaml_block_to_dict' in 'pacyam/pacyam.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/dstarner/pacyam/commit/0640b259c0e5909c1010b6780e10b88f8fdd1c17#diff-8b9ae2192ea7474817342a2e0d103b63f28618bd1e495bc8227f711757ea91eb
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pacyam version less then 1.1.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Pacyam 1.1.1 includes a security patch for the function '_yaml_block_to_dict' in 'pacyam/pacyam.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/dstarner/pacyam/commit/0640b259c0e5909c1010b6780e10b88f8fdd1c17#diff-8b9ae2192ea7474817342a2e0d103b63f28618bd1e495bc8227f711757ea91eb
what vulnarability does pacyam version less then 1.1.1 have
Having vulnarability CVE-2023-38670 Advisory: Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a runtime crash and denial of service.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does paddlepaddle version less then 2.5.0 have ### Response: Having vulnarability CVE-2023-38670 Advisory: Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a runtime crash and denial of service.
what vulnarability does paddlepaddle version less then 2.5.0 have
Having vulnarability PVE-2020-47192 Advisory: Pag 0.8 and prior versions use yaml.load() together with untrusted input, which could lead to malicious code execution. https://pagure.io/pag/blob/24fd8723a3685f175f656e8c37473fc85ed98ddf/f/pag/utils.py#_134
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pag version less then equal to 0.8 have ### Response: Having vulnarability PVE-2020-47192 Advisory: Pag 0.8 and prior versions use yaml.load() together with untrusted input, which could lead to malicious code execution. https://pagure.io/pag/blob/24fd8723a3685f175f656e8c37473fc85ed98ddf/f/pag/utils.py#_134
what vulnarability does pag version less then equal to 0.8 have
Having vulnarability PVE-2024-65106 Advisory: Paho-mqtt version 1.0.2 addresses a potential race condition that could occur when initiating a TLS connection and publishing simultaneously. This fix ensures that PUBLISH data is not sent prematurely and unencrypted, maintaining the intended message order and encryption for security. https://github.com/eclipse/paho.mqtt.python/commit/4643ecaf54f293ac2913b66d35b5e082d7a2a344
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does paho-mqtt version less then 1.0.2 have ### Response: Having vulnarability PVE-2024-65106 Advisory: Paho-mqtt version 1.0.2 addresses a potential race condition that could occur when initiating a TLS connection and publishing simultaneously. This fix ensures that PUBLISH data is not sent prematurely and unencrypted, maintaining the intended message order and encryption for security. https://github.com/eclipse/paho.mqtt.python/commit/4643ecaf54f293ac2913b66d35b5e082d7a2a344
what vulnarability does paho-mqtt version less then 1.0.2 have
Having vulnarability PVE-2021-36779 Advisory: pakettikauppa 0.1.2 fixes Pip files and requirement files for fixing security issue in pyyaml module
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pakettikauppa version less then 0.1.2 have ### Response: Having vulnarability PVE-2021-36779 Advisory: pakettikauppa 0.1.2 fixes Pip files and requirement files for fixing security issue in pyyaml module
what vulnarability does pakettikauppa version less then 0.1.2 have
Having vulnarability CVE-2019-7164 Advisory: Palladium 1.2.2 updates its dependency 'SQLAlchemy' to v1.3.6 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does palladium version less then 1.2.2 have ### Response: Having vulnarability CVE-2019-7164 Advisory: Palladium 1.2.2 updates its dependency 'SQLAlchemy' to v1.3.6 to include a security fix.
what vulnarability does palladium version less then 1.2.2 have
Having vulnarability PVE-2022-49339 Advisory: Palm 2.4.1 fixes a potential security vulnerability when upgrading plugins via 'palm plugin update'. https://github.com/palmetto/palm-cli/commit/00da09251c2c4a80d7c908cbd60ac2ac536cca56
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does palm version less then 2.4.1 have ### Response: Having vulnarability PVE-2022-49339 Advisory: Palm 2.4.1 fixes a potential security vulnerability when upgrading plugins via 'palm plugin update'. https://github.com/palmetto/palm-cli/commit/00da09251c2c4a80d7c908cbd60ac2ac536cca56
what vulnarability does palm version less then 2.4.1 have
Having vulnarability PVE-2024-63309 Advisory: Panda3d 1.9.3 addresses a race condition that could lead to inconsistent data in the cache during concurrent operations, and potentially cause bugs or crashes in the software. https://github.com/panda3d/panda3d/commit/69f15258e4394f8df680f4a6a71de2cbca7bf770
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does panda3d version less then 1.9.3 have ### Response: Having vulnarability PVE-2024-63309 Advisory: Panda3d 1.9.3 addresses a race condition that could lead to inconsistent data in the cache during concurrent operations, and potentially cause bugs or crashes in the software. https://github.com/panda3d/panda3d/commit/69f15258e4394f8df680f4a6a71de2cbca7bf770
what vulnarability does panda3d version less then 1.9.3 have
Having vulnarability PVE-2023-99975 Advisory: Prior to version v0.16.0rc1, Pandas had a SQL injection vulnerability that could let attackers carry out any SQL commands they wished.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pandas version less then 0.16.0rc1 have ### Response: Having vulnarability PVE-2023-99975 Advisory: Prior to version v0.16.0rc1, Pandas had a SQL injection vulnerability that could let attackers carry out any SQL commands they wished.
what vulnarability does pandas version less then 0.16.0rc1 have
Having vulnarability PVE-2021-38627 Advisory: Pandas-zmq 0.0.2 adds a signature to reduce the risk of code injection. https://github.com/rritoch/pandas_zmq/commit/5d61bdde3788931838a8bd7a5a872c4fdd7e01bb
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pandas-zmq version less then 0.0.2 have ### Response: Having vulnarability PVE-2021-38627 Advisory: Pandas-zmq 0.0.2 adds a signature to reduce the risk of code injection. https://github.com/rritoch/pandas_zmq/commit/5d61bdde3788931838a8bd7a5a872c4fdd7e01bb
what vulnarability does pandas-zmq version less then 0.0.2 have
Having vulnarability PVE-2023-60066 Advisory: Pandasai 0.8.1 includes a fix for a Prompt Injection vulnerability. https://github.com/gventuri/pandas-ai/pull/409 https://github.com/gventuri/pandas-ai/issues/399
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pandasai version less then 0.8.1 have ### Response: Having vulnarability PVE-2023-60066 Advisory: Pandasai 0.8.1 includes a fix for a Prompt Injection vulnerability. https://github.com/gventuri/pandas-ai/pull/409 https://github.com/gventuri/pandas-ai/issues/399
what vulnarability does pandasai version less then 0.8.1 have
Having vulnarability PVE-2021-37198 Advisory: Pandevice 0.11.0 adds `uuid` params for security and NAT rules.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pandevice version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-37198 Advisory: Pandevice 0.11.0 adds `uuid` params for security and NAT rules.
what vulnarability does pandevice version less then 0.11.0 have
Having vulnarability PVE-2021-25918 Advisory: Pando before 0.26 is vulnerable to CRLF injection. https://github.com/AspenWeb/pando.py/commit/ab126d323e0784a75f084e6683e89ae457bccd5a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pando version less then 0.26 have ### Response: Having vulnarability PVE-2021-25918 Advisory: Pando before 0.26 is vulnerable to CRLF injection. https://github.com/AspenWeb/pando.py/commit/ab126d323e0784a75f084e6683e89ae457bccd5a
what vulnarability does pando version less then 0.26 have
Having vulnarability PVE-2023-59597 Advisory: Panel 0.12.0 includes a fix for a Race Condition vulnerability in the autoreload argument. https://github.com/holoviz/panel/issues/2531 https://github.com/holoviz/panel/pull/2539
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does panel version less then 0.12.0 have ### Response: Having vulnarability PVE-2023-59597 Advisory: Panel 0.12.0 includes a fix for a Race Condition vulnerability in the autoreload argument. https://github.com/holoviz/panel/issues/2531 https://github.com/holoviz/panel/pull/2539
what vulnarability does panel version less then 0.12.0 have
Having vulnarability PVE-2021-39284 Advisory: Pangres 2.1 was released with the claim that it became completely SQL injection safe. Everything is escaped or parameterized including schema, table and column names.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pangres version less then 2.1 have ### Response: Having vulnarability PVE-2021-39284 Advisory: Pangres 2.1 was released with the claim that it became completely SQL injection safe. Everything is escaped or parameterized including schema, table and column names.
what vulnarability does pangres version less then 2.1 have
Having vulnarability CVE-2020-1747 Advisory: Panoptes-utils 0.2.21 updates its dependency 'PyYaml' to v5.3.1 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does panoptes-utils version less then 0.2.21 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Panoptes-utils 0.2.21 updates its dependency 'PyYaml' to v5.3.1 to include security fixes.
what vulnarability does panoptes-utils version less then 0.2.21 have
Having vulnarability CVE-2020-13948 Advisory: Panoramix (now renamed apache-superset) 0.8.0 is vulnerable to CVE-2020-13948: While investigating a bug report on Apache Superset, it was determined that an authenticated user could craft requests via a number of templated text fields in the product that would allow arbitrary access to Python’s 'os' package in the web application process in versions < 0.37.1. It was thus possible for an authenticated user to list and access files, environment variables, and process information. Additionally it was possible to set environment variables for the current process, create and update files in folders writable by the web process, and execute arbitrary programs accessible by the web process. All other operations available to the 'os' package in Python were also available, even if not explicitly enumerated in this CVE.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does panoramix version less then equal to 0.8.0 have ### Response: Having vulnarability CVE-2020-13948 Advisory: Panoramix (now renamed apache-superset) 0.8.0 is vulnerable to CVE-2020-13948: While investigating a bug report on Apache Superset, it was determined that an authenticated user could craft requests via a number of templated text fields in the product that would allow arbitrary access to Python’s 'os' package in the web application process in versions < 0.37.1. It was thus possible for an authenticated user to list and access files, environment variables, and process information. Additionally it was possible to set environment variables for the current process, create and update files in folders writable by the web process, and execute arbitrary programs accessible by the web process. All other operations available to the 'os' package in Python were also available, even if not explicitly enumerated in this CVE.
what vulnarability does panoramix version less then equal to 0.8.0 have
Having vulnarability CVE-2022-40897 Advisory: Panther-analysis-tool version 0.45.0 has updated its setuptools dependency to version 65.5.1 from 40.5.0, in response to the security vulnerability identified as CVE-2022-40897..
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does panther-analysis-tool version less then 0.45.0 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Panther-analysis-tool version 0.45.0 has updated its setuptools dependency to version 65.5.1 from 40.5.0, in response to the security vulnerability identified as CVE-2022-40897..
what vulnarability does panther-analysis-tool version less then 0.45.0 have
Having vulnarability PVE-2023-99953 Advisory: Papermerge 1.5.5 includes a fix for a stored XSS vulnerability on tags. https://github.com/ciur/papermerge/issues/271
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does papermerge version less then 1.5.5 have ### Response: Having vulnarability PVE-2023-99953 Advisory: Papermerge 1.5.5 includes a fix for a stored XSS vulnerability on tags. https://github.com/ciur/papermerge/issues/271
what vulnarability does papermerge version less then 1.5.5 have
Having vulnarability PVE-2023-99953 Advisory: Papermerge-core 1.5.5 includes a fix for a stored XSS vulnerability on tags. https://github.com/ciur/papermerge/issues/271
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does papermerge-core version less then 1.5.5 have ### Response: Having vulnarability PVE-2023-99953 Advisory: Papermerge-core 1.5.5 includes a fix for a stored XSS vulnerability on tags. https://github.com/ciur/papermerge/issues/271
what vulnarability does papermerge-core version less then 1.5.5 have
Having vulnarability PVE-2021-37491 Advisory: Paradrop 0.10.0 supports more WiFi encryption settings, including properly supporting CCMP for better security.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does paradrop version less then 0.10.0 have ### Response: Having vulnarability PVE-2021-37491 Advisory: Paradrop 0.10.0 supports more WiFi encryption settings, including properly supporting CCMP for better security.
what vulnarability does paradrop version less then 0.10.0 have
Having vulnarability CVE-2021-32862 Advisory: Parameterspace 0.7.18 updates its dependency 'nbconvert' to v6.5.3 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does parameterspace version less then 0.7.18 have ### Response: Having vulnarability CVE-2021-32862 Advisory: Parameterspace 0.7.18 updates its dependency 'nbconvert' to v6.5.3 to include a security fix.
what vulnarability does parameterspace version less then 0.7.18 have
Having vulnarability CVE-2018-7750 Advisory: transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does paramiko version less then 1.17.6,greather then equal to 2.0.0,less then 2.0.8,greather then equal to 2.1.0,less then 2.1.5,greather then equal to 2.2.0,less then 2.2.3,greather then equal to 2.3.0,less then 2.3.2,equal to 2.4.0,greather then equal to 1.18.0,less then 1.18.5 have ### Response: Having vulnarability CVE-2018-7750 Advisory: transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
what vulnarability does paramiko version less then 1.17.6,greather then equal to 2.0.0,less then 2.0.8,greather then equal to 2.1.0,less then 2.1.5,greather then equal to 2.2.0,less then 2.2.3,greather then equal to 2.3.0,less then 2.3.2,equal to 2.4.0,greather then equal to 1.18.0,less then 1.18.5 have
Having vulnarability CVE-2021-39207 Advisory: parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does parlai version greather then equal to 0,less then 1.1.0 have ### Response: Having vulnarability CVE-2021-39207 Advisory: parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.
what vulnarability does parlai version greather then equal to 0,less then 1.1.0 have
Having vulnarability PVE-2023-59179 Advisory: Parsita 2.0.0 includes a fix for a ReDoS vulnerability. https://github.com/drhagen/parsita/pull/91/files
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does parsita version less then 2.0.0 have ### Response: Having vulnarability PVE-2023-59179 Advisory: Parsita 2.0.0 includes a fix for a ReDoS vulnerability. https://github.com/drhagen/parsita/pull/91/files
what vulnarability does parsita version less then 2.0.0 have
Having vulnarability None Advisory: A deserialization vulnerability has been identified in various versions of parso up to 0.4.0, stemming from how grammar parsing from the cache is handled. It involves the potential for arbitrary code execution if a maliciously crafted pickle file is written to a cache grammar file and subsequently parsed. It's important to note that exploitation of this vulnerability hinges on the attacker's ability to write to the cache directory, a scenario considered unlikely in common configurations.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does parso version greather then equal to 0,less then 0.5.0 have ### Response: Having vulnarability None Advisory: A deserialization vulnerability has been identified in various versions of parso up to 0.4.0, stemming from how grammar parsing from the cache is handled. It involves the potential for arbitrary code execution if a maliciously crafted pickle file is written to a cache grammar file and subsequently parsed. It's important to note that exploitation of this vulnerability hinges on the attacker's ability to write to the cache directory, a scenario considered unlikely in common configurations.
what vulnarability does parso version greather then equal to 0,less then 0.5.0 have
Having vulnarability CVE-2020-11078 Advisory: Parsons 0.13.2 updates its dependency 'httplib2' from v0.12.0 to v0.18.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does parsons version less then 0.13.2 have ### Response: Having vulnarability CVE-2020-11078 Advisory: Parsons 0.13.2 updates its dependency 'httplib2' from v0.12.0 to v0.18.0 to include a security fix.
what vulnarability does parsons version less then 0.13.2 have
Having vulnarability PVE-2022-50670 Advisory: Partseg 0.14.3 cleans potential vulnerabilities. https://github.com/4DNucleome/PartSeg/commit/14530514e0f58efd779ab6049fbd7311b25b5652
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does partseg version less then 0.14.3 have ### Response: Having vulnarability PVE-2022-50670 Advisory: Partseg 0.14.3 cleans potential vulnerabilities. https://github.com/4DNucleome/PartSeg/commit/14530514e0f58efd779ab6049fbd7311b25b5652
what vulnarability does partseg version less then 0.14.3 have
Having vulnarability CVE-2022-23472 Advisory: Passeo 1.0.5 includes a fix for CVE-2022-23472: Versions prior to 1.0.5 rely on the python 'random' library for random value selection. The python 'random' library warns that it should not be used for security purposes due to its reliance on a non-cryptographically secure random number generator. As a result a motivated attacker may be able to guess generated passwords. https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does passeo version less then 1.0.5 have ### Response: Having vulnarability CVE-2022-23472 Advisory: Passeo 1.0.5 includes a fix for CVE-2022-23472: Versions prior to 1.0.5 rely on the python 'random' library for random value selection. The python 'random' library warns that it should not be used for security purposes due to its reliance on a non-cryptographically secure random number generator. As a result a motivated attacker may be able to guess generated passwords. https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h
what vulnarability does passeo version less then 1.0.5 have
Having vulnarability PVE-2021-25921 Advisory: Passlib 1.4 disables unix_fallback’s “wildcard password” support unless explicitly enabled by user.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does passlib version less then 1.4 have ### Response: Having vulnarability PVE-2021-25921 Advisory: Passlib 1.4 disables unix_fallback’s “wildcard password” support unless explicitly enabled by user.
what vulnarability does passlib version less then 1.4 have
Having vulnarability PVE-2021-38703 Advisory: Password-safe-box 0.2 adds Fast Convert (which provides slightly better security than a normal hash).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does password-safe-box version less then 0.2 have ### Response: Having vulnarability PVE-2021-38703 Advisory: Password-safe-box 0.2 adds Fast Convert (which provides slightly better security than a normal hash).
what vulnarability does password-safe-box version less then 0.2 have
Having vulnarability PVE-2021-25922 Advisory: Paste before 0.9.5 has a security vulnerability in "paste.urlparser"'s StaticURLParser and PkgResourcesParser where, with some servers, you could escape the document root.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does paste version less then 0.9.5 have ### Response: Having vulnarability PVE-2021-25922 Advisory: Paste before 0.9.5 has a security vulnerability in "paste.urlparser"'s StaticURLParser and PkgResourcesParser where, with some servers, you could escape the document root.
what vulnarability does paste version less then 0.9.5 have
Having vulnarability CVE-2012-0878 Advisory: Paste Script 1.7.5 and earlier does not properly set group memberships during execution with root privileges, which might allow remote attackers to bypass intended file-access restrictions by leveraging a web application that uses the local filesystem.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pastescript version less then 1.7.5 have ### Response: Having vulnarability CVE-2012-0878 Advisory: Paste Script 1.7.5 and earlier does not properly set group memberships during execution with root privileges, which might allow remote attackers to bypass intended file-access restrictions by leveraging a web application that uses the local filesystem.
what vulnarability does pastescript version less then 1.7.5 have