output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2016-10745 Advisory: Pathfinder 0.5.4 stops relying in Jinja2 v2.6 to avoid security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pathfinder version less then 0.5.4 have ### Response: Having vulnarability CVE-2016-10745 Advisory: Pathfinder 0.5.4 stops relying in Jinja2 v2.6 to avoid security issues. | what vulnarability does pathfinder version less then 0.5.4 have | |
Having vulnarability PVE-2022-48586 Advisory: Patientmatcher 3.4 removes usage of unsafe HTTP protocol.
https://github.com/Clinical-Genomics/patientMatcher/pull/293 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does patientmatcher version less then 3.4 have ### Response: Having vulnarability PVE-2022-48586 Advisory: Patientmatcher 3.4 removes usage of unsafe HTTP protocol.
https://github.com/Clinical-Genomics/patientMatcher/pull/293 | what vulnarability does patientmatcher version less then 3.4 have | |
Having vulnarability PVE-2021-42998 Advisory: Patroni 2.0.2 uses 'hmac.compare_digest()' instead of '==' for performing the REST API authentication. The previous was vulnerable to timing attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does patroni version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-42998 Advisory: Patroni 2.0.2 uses 'hmac.compare_digest()' instead of '==' for performing the REST API authentication. The previous was vulnerable to timing attacks. | what vulnarability does patroni version less then 2.0.2 have | |
Having vulnarability PVE-2021-40214 Advisory: payton 0.1.4 upgrades Pillow from 7.x, since it had a security issue. This version is just for upgrading Pillow up to a secure version. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does payton version less then 0.1.4 have ### Response: Having vulnarability PVE-2021-40214 Advisory: payton 0.1.4 upgrades Pillow from 7.x, since it had a security issue. This version is just for upgrading Pillow up to a secure version. | what vulnarability does payton version less then 0.1.4 have | |
Having vulnarability PVE-2024-66760 Advisory: Pcaspy version 0.7.1 addresses a race condition in the handling of client disconnections. This update prevents server crashes previously caused by simultaneous access to shared resources during client disconnection events.
https://github.com/paulscherrerinstitute/pcaspy/pull/49/commits/f2865472f8b5996745c6e82105eab77c1637b62b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pcaspy version less then 0.7.1 have ### Response: Having vulnarability PVE-2024-66760 Advisory: Pcaspy version 0.7.1 addresses a race condition in the handling of client disconnections. This update prevents server crashes previously caused by simultaneous access to shared resources during client disconnection events.
https://github.com/paulscherrerinstitute/pcaspy/pull/49/commits/f2865472f8b5996745c6e82105eab77c1637b62b | what vulnarability does pcaspy version less then 0.7.1 have | |
Having vulnarability CVE-2017-18342 Advisory: pconf before 1.3.3 is vulnerable to arbitrary code execution related to [CVE-2017-18342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342) because of YAML's `load`.
This upgrades to use YAML `safe_load` instead of `load`. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pconf version less then 1.3.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: pconf before 1.3.3 is vulnerable to arbitrary code execution related to [CVE-2017-18342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342) because of YAML's `load`.
This upgrades to use YAML `safe_load` instead of `load`. | what vulnarability does pconf version less then 1.3.3 have | |
Having vulnarability PVE-2021-25926 Advisory: pcp before 2.1.911 has a not further described vulnerability in pcp.spec.in. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pcp version less then 2.1.911 have ### Response: Having vulnarability PVE-2021-25926 Advisory: pcp before 2.1.911 has a not further described vulnerability in pcp.spec.in. | what vulnarability does pcp version less then 2.1.911 have | |
Having vulnarability CVE-2021-25292 Advisory: Pdfcropmargins 1.0.6 updates its dependency 'pillow' requirement to '>=9.0.0' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdfcropmargins version less then 1.0.6 have ### Response: Having vulnarability CVE-2021-25292 Advisory: Pdfcropmargins 1.0.6 updates its dependency 'pillow' requirement to '>=9.0.0' to include security fixes. | what vulnarability does pdfcropmargins version less then 1.0.6 have | |
Having vulnarability PVE-2021-25927 Advisory: Pdfextract before 0.0.2 is using "eval" on filenames, leading to execution of arbitrary Python code. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdfextract version less then 0.0.2 have ### Response: Having vulnarability PVE-2021-25927 Advisory: Pdfextract before 0.0.2 is using "eval" on filenames, leading to execution of arbitrary Python code. | what vulnarability does pdfextract version less then 0.0.2 have | |
Having vulnarability CVE-2020-10378 Advisory: Pdfreader 0.1.6 updates its dependency 'pillow' to a version >= 7.1.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdfreader version less then 0.1.6 have ### Response: Having vulnarability CVE-2020-10378 Advisory: Pdfreader 0.1.6 updates its dependency 'pillow' to a version >= 7.1.0 to include security fixes. | what vulnarability does pdfreader version less then 0.1.6 have | |
Having vulnarability PVE-2023-53725 Advisory: Pdh 0.3.11 stops using root to run the container.
https://github.com/mbovo/pdh/pull/33 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdh version less then 0.3.11 have ### Response: Having vulnarability PVE-2023-53725 Advisory: Pdh 0.3.11 stops using root to run the container.
https://github.com/mbovo/pdh/pull/33 | what vulnarability does pdh version less then 0.3.11 have | |
Having vulnarability PVE-2021-37793 Advisory: Pdkit 1.2.1 includes an unspecified security fix for included libraries. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdkit version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-37793 Advisory: Pdkit 1.2.1 includes an unspecified security fix for included libraries. | what vulnarability does pdkit version less then 1.2.1 have | |
Having vulnarability CVE-2023-45805 Advisory: Pdm 2.9.4 includes a fix for CVE-2023-45805: It's possible to craft a malicious pdm.lock file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project.
https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9
https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdm version less then 2.9.4 have ### Response: Having vulnarability CVE-2023-45805 Advisory: Pdm 2.9.4 includes a fix for CVE-2023-45805: It's possible to craft a malicious pdm.lock file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project.
https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9
https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831 | what vulnarability does pdm version less then 2.9.4 have | |
Having vulnarability PVE-2022-45022 Advisory: Pdoc 10.0.0 defuses insecure 'repr()' calls for all templates.
https://github.com/mitmproxy/pdoc/commit/b14d6bc3d515d58d20c8810b79ae8f4115efaa8c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdoc version less then 10.0.0 have ### Response: Having vulnarability PVE-2022-45022 Advisory: Pdoc 10.0.0 defuses insecure 'repr()' calls for all templates.
https://github.com/mitmproxy/pdoc/commit/b14d6bc3d515d58d20c8810b79ae8f4115efaa8c | what vulnarability does pdoc version less then 10.0.0 have | |
Having vulnarability PVE-2024-64507 Advisory: Pds.registry-sweepers is affected by an unsafe defaults vulnerability. Default behavior was now switched to check host certs.
https://github.com/NASA-PDS/registry-sweepers/pull/22 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pds.registry-sweepers version less then 1.2.0 have ### Response: Having vulnarability PVE-2024-64507 Advisory: Pds.registry-sweepers is affected by an unsafe defaults vulnerability. Default behavior was now switched to check host certs.
https://github.com/NASA-PDS/registry-sweepers/pull/22 | what vulnarability does pds.registry-sweepers version less then 1.2.0 have | |
Having vulnarability PVE-2022-48282 Advisory: Peekabooav 2.1 uses the 'schema' module for input validation.
https://github.com/scVENUS/PeekabooAV/commit/cfd84d6b507ab4862efaa13c97e188e7327c76d4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does peekabooav version less then 2.1 have ### Response: Having vulnarability PVE-2022-48282 Advisory: Peekabooav 2.1 uses the 'schema' module for input validation.
https://github.com/scVENUS/PeekabooAV/commit/cfd84d6b507ab4862efaa13c97e188e7327c76d4 | what vulnarability does peekabooav version less then 2.1 have | |
Having vulnarability PVE-2021-34337 Advisory: Peewee 2.10.0 removes 'AESEncryptedField'. The cryptographic implementation was unsafe.
https://github.com/coleifer/peewee/commit/6aee106831eed8c214086a20b26f72f2abff8db5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does peewee version less then 2.10.0 have ### Response: Having vulnarability PVE-2021-34337 Advisory: Peewee 2.10.0 removes 'AESEncryptedField'. The cryptographic implementation was unsafe.
https://github.com/coleifer/peewee/commit/6aee106831eed8c214086a20b26f72f2abff8db5 | what vulnarability does peewee version less then 2.10.0 have | |
Having vulnarability CVE-2021-27291 Advisory: Peltak 0.28.0 updates its dependency 'pygments' requirement to ">=2.7.4" to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does peltak version less then 0.28.0 have ### Response: Having vulnarability CVE-2021-27291 Advisory: Peltak 0.28.0 updates its dependency 'pygments' requirement to ">=2.7.4" to include security fixes. | what vulnarability does peltak version less then 0.28.0 have | |
Having vulnarability PVE-2021-42045 Advisory: Pelutils version 0.6.0 makes 'log.throw' private, as it could be exploited. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pelutils version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-42045 Advisory: Pelutils version 0.6.0 makes 'log.throw' private, as it could be exploited. | what vulnarability does pelutils version less then 0.6.0 have | |
Having vulnarability PVE-2021-25928 Advisory: peppercorn before 0.5 is vulnerable to DoS attacks due to the use of an iterative parser rather than a recursive parser.
https://github.com/Pylons/peppercorn/commit/d07cb55cee4f9b47b71d9fb7280aee6ab0799baf | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does peppercorn version less then 0.5 have ### Response: Having vulnarability PVE-2021-25928 Advisory: peppercorn before 0.5 is vulnerable to DoS attacks due to the use of an iterative parser rather than a recursive parser.
https://github.com/Pylons/peppercorn/commit/d07cb55cee4f9b47b71d9fb7280aee6ab0799baf | what vulnarability does peppercorn version less then 0.5 have | |
Having vulnarability PVE-2021-42403 Advisory: Perceval-zulip 0.2.0 drops support for Python < 3.7 as it arrived to End-of-Life in December 2021.
https://github.com/vchrombie/grimoirelab-perceval-zulip/commit/328938531bb95c2407d75d94db452f5dceb73d16 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does perceval-zulip version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-42403 Advisory: Perceval-zulip 0.2.0 drops support for Python < 3.7 as it arrived to End-of-Life in December 2021.
https://github.com/vchrombie/grimoirelab-perceval-zulip/commit/328938531bb95c2407d75d94db452f5dceb73d16 | what vulnarability does perceval-zulip version less then 0.2.0 have | |
Having vulnarability CVE-2022-34054 Advisory: The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does perdido version greather then equal to 0.0.1,less then 0.0.3 have ### Response: Having vulnarability CVE-2022-34054 Advisory: The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does perdido version greather then equal to 0.0.1,less then 0.0.3 have | |
Having vulnarability CVE-2019-14751 Advisory: Persephone 0.4.0 updates its dependency 'nltk' to v3.4.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does persephone version less then 0.4.0 have ### Response: Having vulnarability CVE-2019-14751 Advisory: Persephone 0.4.0 updates its dependency 'nltk' to v3.4.5 to include a security fix. | what vulnarability does persephone version less then 0.4.0 have | |
Having vulnarability PVE-2023-55206 Advisory: Personnummer 3.0.2 includes a security fix: The issue arrises from a regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x.
https://github.com/advisories/GHSA-rxq3-5249-8hgg | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does personnummer version greather then equal to 0,less then 3.0.2 have ### Response: Having vulnarability PVE-2023-55206 Advisory: Personnummer 3.0.2 includes a security fix: The issue arrises from a regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x.
https://github.com/advisories/GHSA-rxq3-5249-8hgg | what vulnarability does personnummer version greather then equal to 0,less then 3.0.2 have | |
Having vulnarability CVE-2023-37920 Advisory: Pesapal-py 0.1.3 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a vulnerability.
https://github.com/twais/pesapal-py/commit/262a79e1f4485e08c439a230336ad806f562c9b1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pesapal-py version less then 0.1.3 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Pesapal-py 0.1.3 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a vulnerability.
https://github.com/twais/pesapal-py/commit/262a79e1f4485e08c439a230336ad806f562c9b1 | what vulnarability does pesapal-py version less then 0.1.3 have | |
Having vulnarability PVE-2023-61009 Advisory: Petals 2.2.0 includes a fix for a race condition in MemoryCache.
https://github.com/bigscience-workshop/petals/pull/487 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does petals version less then 2.2.0 have ### Response: Having vulnarability PVE-2023-61009 Advisory: Petals 2.2.0 includes a fix for a race condition in MemoryCache.
https://github.com/bigscience-workshop/petals/pull/487 | what vulnarability does petals version less then 2.2.0 have | |
Having vulnarability CVE-2023-29159 Advisory: Petisco 1.15.4 updates its dependency 'fastapi' to version '0.95.2' to include a security fix.
https://github.com/alice-biometrics/petisco/pull/351 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does petisco version less then 1.15.4 have ### Response: Having vulnarability CVE-2023-29159 Advisory: Petisco 1.15.4 updates its dependency 'fastapi' to version '0.95.2' to include a security fix.
https://github.com/alice-biometrics/petisco/pull/351 | what vulnarability does petisco version less then 1.15.4 have | |
Having vulnarability CVE-2020-29128 Advisory: Petl before 1.68, in some configurations, allows resolution of entities in an XML document.
https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does petl version less then 1.6.8 have ### Response: Having vulnarability CVE-2020-29128 Advisory: Petl before 1.68, in some configurations, allows resolution of entities in an XML document.
https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347 | what vulnarability does petl version less then 1.6.8 have | |
Having vulnarability PVE-2021-25929 Advisory: pex before 0.5.6 follows links which may lead to security issues: https://rbcommons.com/s/twitter/r/293/. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pex version less then 0.5.6 have ### Response: Having vulnarability PVE-2021-25929 Advisory: pex before 0.5.6 follows links which may lead to security issues: https://rbcommons.com/s/twitter/r/293/. | what vulnarability does pex version less then 0.5.6 have | |
Having vulnarability CVE-2021-21330 Advisory: Pfun 0.12.0 updates the 'aiohttp' dependency to 3.7.4 to avoid an open redirect vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pfun version less then 0.12.0 have ### Response: Having vulnarability CVE-2021-21330 Advisory: Pfun 0.12.0 updates the 'aiohttp' dependency to 3.7.4 to avoid an open redirect vulnerability. | what vulnarability does pfun version less then 0.12.0 have | |
Having vulnarability CVE-2023-45857 Advisory: Pg-bulk-ingest version 0.0.45 specifically pins its localtunnel dependency to mitigate the axios vulnerability identified as CVE-2023-45857.
https://github.com/uktrade/pg-bulk-ingest/pull/169/commits/8a28a4e24361a99c610b499458b2e6b97f793377 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pg-bulk-ingest version less then 0.0.45 have ### Response: Having vulnarability CVE-2023-45857 Advisory: Pg-bulk-ingest version 0.0.45 specifically pins its localtunnel dependency to mitigate the axios vulnerability identified as CVE-2023-45857.
https://github.com/uktrade/pg-bulk-ingest/pull/169/commits/8a28a4e24361a99c610b499458b2e6b97f793377 | what vulnarability does pg-bulk-ingest version less then 0.0.45 have | |
Having vulnarability CVE-2023-0241 Advisory: PgAdmin4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.
Alias:
GHSA-9crj-hpxh-f6qg | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pgadmin4 version less then 6.19 have ### Response: Having vulnarability CVE-2023-0241 Advisory: PgAdmin4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.
Alias:
GHSA-9crj-hpxh-f6qg | what vulnarability does pgadmin4 version less then 6.19 have | |
Having vulnarability CVE-2017-18342 Advisory: Pgbedrock 0.4.2 includes a security patch for the function 'load_spec' in 'pgbedrock/spec_inspector.py'. It used the unsafe yaml.load() that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/Squarespace/pgbedrock/commit/a217fa419fbb88fd4949ea6db7ca2fa9869cf8e1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pgbedrock version less then 0.4.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Pgbedrock 0.4.2 includes a security patch for the function 'load_spec' in 'pgbedrock/spec_inspector.py'. It used the unsafe yaml.load() that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/Squarespace/pgbedrock/commit/a217fa419fbb88fd4949ea6db7ca2fa9869cf8e1 | what vulnarability does pgbedrock version less then 0.4.2 have | |
Having vulnarability CVE-2023-45139 Advisory: Pgscatalog-utils version 0.5.1 upgrades its fonttools dependency to 4.49.0 from the earlier 4.42.1 in response to addressing the security vulnerability CVE-2023-45139. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pgscatalog-utils version less then 0.5.1 have ### Response: Having vulnarability CVE-2023-45139 Advisory: Pgscatalog-utils version 0.5.1 upgrades its fonttools dependency to 4.49.0 from the earlier 4.42.1 in response to addressing the security vulnerability CVE-2023-45139. | what vulnarability does pgscatalog-utils version less then 0.5.1 have | |
Having vulnarability CVE-2015-0219 Advisory: Pheonix-waitress 1.0.0 includes a fix for CVE-2015-0219.
https://www.djangoproject.com/weblog/2015/jan/13/security/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pheonix-waitress version less then 1.0.0 have ### Response: Having vulnarability CVE-2015-0219 Advisory: Pheonix-waitress 1.0.0 includes a fix for CVE-2015-0219.
https://www.djangoproject.com/weblog/2015/jan/13/security/ | what vulnarability does pheonix-waitress version less then 1.0.0 have | |
Having vulnarability PVE-2021-25930 Advisory: Phileo before 1.1 allows users to like anything and everything, which could potentially lead to security problems (ex. liking entries in permission tables, and thus seeing their content; liking administrative users and thus getting their username).
https://github.com/pinax/pinax-likes/commit/2b906a4f85acc54c72d4a9f569da4ecf63a59eb3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phileo version less then 1.1 have ### Response: Having vulnarability PVE-2021-25930 Advisory: Phileo before 1.1 allows users to like anything and everything, which could potentially lead to security problems (ex. liking entries in permission tables, and thus seeing their content; liking administrative users and thus getting their username).
https://github.com/pinax/pinax-likes/commit/2b906a4f85acc54c72d4a9f569da4ecf63a59eb3 | what vulnarability does phileo version less then 1.1 have | |
Having vulnarability PVE-2021-39438 Advisory: Phoenix-letter 0.2.0 adds the flag '--aws-keys' to securely ask for the AWS credentials to avoid keeping sensitive information accessible in plain text. Without this flag, it falls back to the Boto3 default credential search. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phoenix-letter version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-39438 Advisory: Phoenix-letter 0.2.0 adds the flag '--aws-keys' to securely ask for the AWS credentials to avoid keeping sensitive information accessible in plain text. Without this flag, it falls back to the Boto3 default credential search. | what vulnarability does phoenix-letter version less then 0.2.0 have | |
Having vulnarability PVE-2023-55195 Advisory: Phoenix-ws 1.0.6 includes a security fix: All of the source code, files, and folders in 'phoenix_files/extensions/' are available to end users through a simple HTTP GET request.
https://github.com/NovaAndrom3da/Phoenix/commit/47952180a60a94ff1dfa2e0117fca9a5052bf193 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phoenix-ws version greather then equal to 0,less then 1.0.6 have ### Response: Having vulnarability PVE-2023-55195 Advisory: Phoenix-ws 1.0.6 includes a security fix: All of the source code, files, and folders in 'phoenix_files/extensions/' are available to end users through a simple HTTP GET request.
https://github.com/NovaAndrom3da/Phoenix/commit/47952180a60a94ff1dfa2e0117fca9a5052bf193 | what vulnarability does phoenix-ws version greather then equal to 0,less then 1.0.6 have | |
Having vulnarability CVE-2024-21503 Advisory: Phone-gen version 2.4.4 addresses a security issue where the Black library was vulnerable to Regular Expression Denial of Service (ReDoS), as identified in CVE-2024-21503. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phone-gen version less then 2.4.4 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Phone-gen version 2.4.4 addresses a security issue where the Black library was vulnerable to Regular Expression Denial of Service (ReDoS), as identified in CVE-2024-21503. | what vulnarability does phone-gen version less then 2.4.4 have | |
Having vulnarability PVE-2021-39441 Advisory: Phonenumbers 8.3.1 contains a security improvement of the getNationalSignificantNumber function to make it more robust against malicious input. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phonenumbers version less then 8.3.1 have ### Response: Having vulnarability PVE-2021-39441 Advisory: Phonenumbers 8.3.1 contains a security improvement of the getNationalSignificantNumber function to make it more robust against malicious input. | what vulnarability does phonenumbers version less then 8.3.1 have | |
Having vulnarability CVE-2021-23437 Advisory: Photocrawl 0.3.1 updates the minimum version requirement of "Pillow" to 8.3.2 to include security patches. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does photocrawl version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Photocrawl 0.3.1 updates the minimum version requirement of "Pillow" to 8.3.2 to include security patches. | what vulnarability does photocrawl version less then 0.3.1 have | |
Having vulnarability PVE-2022-51466 Advisory: Phylum 0.17.1 sanitizes user input to guard against possible cmd injection.
https://github.com/phylum-dev/phylum-ci/pull/144 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phylum version less then 0.17.1 have ### Response: Having vulnarability PVE-2022-51466 Advisory: Phylum 0.17.1 sanitizes user input to guard against possible cmd injection.
https://github.com/phylum-dev/phylum-ci/pull/144 | what vulnarability does phylum version less then 0.17.1 have | |
Having vulnarability CVE-2019-12410 Advisory: Physiofit 3.3.3 updates its pyarrow dependency to version ^14.0.1 in response to the security vulnerability identified as CVE-2019-12410.
https://github.com/MetaSys-LISBP/PhysioFit/commit/187270cfc3372773785f3fe96b9616cdaf3f6d78 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does physiofit version less then 3.3.3 have ### Response: Having vulnarability CVE-2019-12410 Advisory: Physiofit 3.3.3 updates its pyarrow dependency to version ^14.0.1 in response to the security vulnerability identified as CVE-2019-12410.
https://github.com/MetaSys-LISBP/PhysioFit/commit/187270cfc3372773785f3fe96b9616cdaf3f6d78 | what vulnarability does physiofit version less then 3.3.3 have | |
Having vulnarability CVE-2020-1747 Advisory: Pi-mqtt-gpio 0.5.2 updates PyYAML to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pi-mqtt-gpio version less then 0.5.2 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Pi-mqtt-gpio 0.5.2 updates PyYAML to include a security fix. | what vulnarability does pi-mqtt-gpio version less then 0.5.2 have | |
Having vulnarability CVE-2021-34552 Advisory: Picamerax version 21.9.8 upgrades its Pillow dependency to address the security vulnerability identified in CVE-2021-34552. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does picamerax version less then 21.9.8 have ### Response: Having vulnarability CVE-2021-34552 Advisory: Picamerax version 21.9.8 upgrades its Pillow dependency to address the security vulnerability identified in CVE-2021-34552. | what vulnarability does picamerax version less then 21.9.8 have | |
Having vulnarability CVE-2023-41885 Advisory: Piccolo is an ORM and query builder which supports asyncio. In versions 0.120.0 and prior, the implementation of `BaseUser.login` leaks enough information to a malicious user such that they would be able to successfully generate a list of valid users on the platform. As Piccolo on its own does not also enforce strong passwords, these lists of valid accounts are likely to be used in a password spray attack with the outcome being attempted takeover of user accounts on the platform. The impact of this vulnerability is minor as it requires chaining with other attack vectors in order to gain more then simply a list of valid users on the underlying platform. The likelihood of this vulnerability is possible as it requires minimal skills to pull off, especially given the underlying login functionality for Piccolo based sites is open source. This issue has been patched in version 0.121.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piccolo version less then 0.121.0 have ### Response: Having vulnarability CVE-2023-41885 Advisory: Piccolo is an ORM and query builder which supports asyncio. In versions 0.120.0 and prior, the implementation of `BaseUser.login` leaks enough information to a malicious user such that they would be able to successfully generate a list of valid users on the platform. As Piccolo on its own does not also enforce strong passwords, these lists of valid accounts are likely to be used in a password spray attack with the outcome being attempted takeover of user accounts on the platform. The impact of this vulnerability is minor as it requires chaining with other attack vectors in order to gain more then simply a list of valid users on the underlying platform. The likelihood of this vulnerability is possible as it requires minimal skills to pull off, especially given the underlying login functionality for Piccolo based sites is open source. This issue has been patched in version 0.121.0. | what vulnarability does piccolo version less then 0.121.0 have | |
Having vulnarability CVE-2021-23386 Advisory: Piccolo-admin 0.13.1 updates its NPM dependency 'dns-packet' to v1.3.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piccolo-admin version less then 0.13.1 have ### Response: Having vulnarability CVE-2021-23386 Advisory: Piccolo-admin 0.13.1 updates its NPM dependency 'dns-packet' to v1.3.4 to include a security fix. | what vulnarability does piccolo-admin version less then 0.13.1 have | |
Having vulnarability PVE-2023-62974 Advisory: Picklescan 0.0.13 includes a security fix: The way picklescan handled memo didn't look at the argument, so it was possible to have a different memo and use STACK_GLOBAL to bypass allow-list checking.
https://github.com/mmaitre314/picklescan/issues/22 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does picklescan version less then 0.0.13 have ### Response: Having vulnarability PVE-2023-62974 Advisory: Picklescan 0.0.13 includes a security fix: The way picklescan handled memo didn't look at the argument, so it was possible to have a different memo and use STACK_GLOBAL to bypass allow-list checking.
https://github.com/mmaitre314/picklescan/issues/22 | what vulnarability does picklescan version less then 0.0.13 have | |
Having vulnarability CVE-2018-18074 Advisory: Pigar 0.9.1 fixes some potential security vulnerabilities upgrading its dependency 'requests' to v2.21.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pigar version less then 0.9.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Pigar 0.9.1 fixes some potential security vulnerabilities upgrading its dependency 'requests' to v2.21.0. | what vulnarability does pigar version less then 0.9.1 have | |
Having vulnarability CVE-2020-25659 Advisory: Piicatcher 0.12.2 updates its dependency 'cryptography' to v3.2.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piicatcher version less then 0.12.2 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Piicatcher 0.12.2 updates its dependency 'cryptography' to v3.2.1 to include a security fix. | what vulnarability does piicatcher version less then 0.12.2 have | |
Having vulnarability CVE-2021-29421 Advisory: Pikepdf 1.3.0 throughout 2.9.2 allows XXE when parsing XMP metadata entries via models/metadata.py | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pikepdf version greather then equal to 1.3.0,less then equal to 2.9.2 have ### Response: Having vulnarability CVE-2021-29421 Advisory: Pikepdf 1.3.0 throughout 2.9.2 allows XXE when parsing XMP metadata entries via models/metadata.py | what vulnarability does pikepdf version greather then equal to 1.3.0,less then equal to 2.9.2 have | |
Having vulnarability CVE-2023-44271 Advisory: Pillow 10.0.0 includes a fix for CVE-2023-44271: Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.
https://github.com/python-pillow/Pillow/pull/7244 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pillow version less then 10.0.0 have ### Response: Having vulnarability CVE-2023-44271 Advisory: Pillow 10.0.0 includes a fix for CVE-2023-44271: Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.
https://github.com/python-pillow/Pillow/pull/7244 | what vulnarability does pillow version less then 10.0.0 have | |
Having vulnarability CVE-2022-1253 Advisory: Pillow-heif 0.6.1 fixes HEIF decoder's CVEs. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pillow-heif version less then 0.6.1 have ### Response: Having vulnarability CVE-2022-1253 Advisory: Pillow-heif 0.6.1 fixes HEIF decoder's CVEs. | what vulnarability does pillow-heif version less then 0.6.1 have | |
Having vulnarability CVE-2014-1932 Advisory: Pillow-simd 2.3.1 includes a fix for CVE-2014-1932: The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pillow-simd version less then 2.3.1 have ### Response: Having vulnarability CVE-2014-1932 Advisory: Pillow-simd 2.3.1 includes a fix for CVE-2014-1932: The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file. | what vulnarability does pillow-simd version less then 2.3.1 have | |
Having vulnarability PVE-2022-51748 Advisory: Pillwo is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pillwo version greather then 0 have ### Response: Having vulnarability PVE-2022-51748 Advisory: Pillwo is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does pillwo version greather then 0 have | |
Having vulnarability CVE-2021-45105 Advisory: Pims 0.6.1 and prior uses 'loci_tools.jar', which is affected by critical and severe vulnerabilities.
https://github.com/soft-matter/pims/issues/400
https://github.com/soft-matter/pims/pull/403 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pims version less then equal to 0.6.1 have ### Response: Having vulnarability CVE-2021-45105 Advisory: Pims 0.6.1 and prior uses 'loci_tools.jar', which is affected by critical and severe vulnerabilities.
https://github.com/soft-matter/pims/issues/400
https://github.com/soft-matter/pims/pull/403 | what vulnarability does pims version less then equal to 0.6.1 have | |
Having vulnarability PVE-2021-25955 Advisory: Pinax-likes before 1.1 allows users to like anything and everything, which could potentially lead to security problems (ex. liking entries in permission tables, and thus seeing their content; liking administrative users and thus getting their username).
https://github.com/pinax/pinax-likes/commit/2b906a4f85acc54c72d4a9f569da4ecf63a59eb3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pinax-likes version less then 1.1 have ### Response: Having vulnarability PVE-2021-25955 Advisory: Pinax-likes before 1.1 allows users to like anything and everything, which could potentially lead to security problems (ex. liking entries in permission tables, and thus seeing their content; liking administrative users and thus getting their username).
https://github.com/pinax/pinax-likes/commit/2b906a4f85acc54c72d4a9f569da4ecf63a59eb3 | what vulnarability does pinax-likes version less then 1.1 have | |
Having vulnarability CVE-2022-1941 Advisory: Pinecone-client 2.2.2 updats its `protobuf` dependency from `3.19.3` to `~=3.19.5` to address [a potential denial-of-service vector] CVE-2022-1941. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pinecone-client version less then 2.2.2 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Pinecone-client 2.2.2 updats its `protobuf` dependency from `3.19.3` to `~=3.19.5` to address [a potential denial-of-service vector] CVE-2022-1941. | what vulnarability does pinecone-client version less then 2.2.2 have | |
Having vulnarability PVE-2023-62381 Advisory: Pioreactor 23.11.15rc0 includes a fix for a command injection vulnerability.
https://github.com/Pioreactor/pioreactor/commit/c40d2c67a2e49c6d6a395c0789cb35711af2f70d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pioreactor version less then 23.11.15rc0 have ### Response: Having vulnarability PVE-2023-62381 Advisory: Pioreactor 23.11.15rc0 includes a fix for a command injection vulnerability.
https://github.com/Pioreactor/pioreactor/commit/c40d2c67a2e49c6d6a395c0789cb35711af2f70d | what vulnarability does pioreactor version less then 23.11.15rc0 have | |
Having vulnarability CVE-2013-1629 Advisory: pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pip version less then 1.3 have ### Response: Having vulnarability CVE-2013-1629 Advisory: pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation. | what vulnarability does pip version less then 1.3 have | |
Having vulnarability CVE-2019-10906 Advisory: Pipenv 2020.5.28 updates its dependency 'jinja2' to v2.11.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pipenv version less then 2020.5.28 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Pipenv 2020.5.28 updates its dependency 'jinja2' to v2.11.2 to include a security fix. | what vulnarability does pipenv version less then 2020.5.28 have | |
Having vulnarability CVE-2019-7548 Advisory: Pipenv-setup 3.1.4 updates its dependency 'sqlalchemy' to v1.3.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pipenv-setup version less then 3.1.4 have ### Response: Having vulnarability CVE-2019-7548 Advisory: Pipenv-setup 3.1.4 updates its dependency 'sqlalchemy' to v1.3.0 to include a security fix. | what vulnarability does pipenv-setup version less then 3.1.4 have | |
Having vulnarability PVE-2022-50292 Advisory: Piperider 0.5.0rc.4
# included | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piperider version less then 0.5.0rc.4 have ### Response: Having vulnarability PVE-2022-50292 Advisory: Piperider 0.5.0rc.4
# included | what vulnarability does piperider version less then 0.5.0rc.4 have | |
Having vulnarability CVE-2023-31543 Advisory: A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pipreqs version greather then equal to 0.3.0,less then 0.4.12 have ### Response: Having vulnarability CVE-2023-31543 Advisory: A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server. | what vulnarability does pipreqs version greather then equal to 0.3.0,less then 0.4.12 have | |
Having vulnarability PVE-2023-59290 Advisory: Piqueserver 1.1.0 includes fixes for potential Denial of Service vulnerabilities.
https://github.com/piqueserver/piqueserver/pull/722 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piqueserver version less then 1.1.0 have ### Response: Having vulnarability PVE-2023-59290 Advisory: Piqueserver 1.1.0 includes fixes for potential Denial of Service vulnerabilities.
https://github.com/piqueserver/piqueserver/pull/722 | what vulnarability does piqueserver version less then 1.1.0 have | |
Having vulnarability PVE-2021-34168 Advisory: pirate-get before 0.2.8 is not properly validating torrent file names.
- https://github.com/vikstrous/pirate-get/issues/73 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pirate-get version less then 0.2.8 have ### Response: Having vulnarability PVE-2021-34168 Advisory: pirate-get before 0.2.8 is not properly validating torrent file names.
- https://github.com/vikstrous/pirate-get/issues/73 | what vulnarability does pirate-get version less then 0.2.8 have | |
Having vulnarability PVE-2021-42378 Advisory: Pirxcypinger 3.2 includes a fix for preventing abuse of URLs.
https://github.com/PirxcyFinal/PirxcyPinger/commit/bc318987c5e8bf72bf4994ff797f09acce815fba | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pirxcypinger version less then 3.2 have ### Response: Having vulnarability PVE-2021-42378 Advisory: Pirxcypinger 3.2 includes a fix for preventing abuse of URLs.
https://github.com/PirxcyFinal/PirxcyPinger/commit/bc318987c5e8bf72bf4994ff797f09acce815fba | what vulnarability does pirxcypinger version less then 3.2 have | |
Having vulnarability CVE-2021-41945 Advisory: Pjrpc 1.6.0 updates its dependency 'httpx' requirement to '^0.23.0' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pjrpc version less then 1.6.0 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Pjrpc 1.6.0 updates its dependency 'httpx' requirement to '^0.23.0' to include a security fix. | what vulnarability does pjrpc version less then 1.6.0 have | |
Having vulnarability PVE-2021-25962 Advisory: pkgcore 0.4.7.12 includes a security fix; force cwd to something controlled for ebuild env. This blocks an attack detailed in glsa 200810-02; namely that an ebuild invoking python -c (which looks in cwd for modules to load) allows for an attacker to slip something in. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pkgcore version less then 0.4.7.12 have ### Response: Having vulnarability PVE-2021-25962 Advisory: pkgcore 0.4.7.12 includes a security fix; force cwd to something controlled for ebuild env. This blocks an attack detailed in glsa 200810-02; namely that an ebuild invoking python -c (which looks in cwd for modules to load) allows for an attacker to slip something in. | what vulnarability does pkgcore version less then 0.4.7.12 have | |
Having vulnarability PVE-2022-45418 Advisory: Pkgutil is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pkgutil version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45418 Advisory: Pkgutil is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does pkgutil version greather then 0,less then 0 have | |
Having vulnarability CVE-2021-20270 Advisory: Plaid2qif 1.3.6 updates its dependency 'pygments' to v2.7.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plaid2qif version less then 1.3.6 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Plaid2qif 1.3.6 updates its dependency 'pygments' to v2.7.4 to include security fixes. | what vulnarability does plaid2qif version less then 1.3.6 have | |
Having vulnarability CVE-2023-32303 Advisory: Planet 2.0.1 fixes a security issue where a secret file was being created with read access for other users on the machine.
https://github.com/planetlabs/planet-client-python/commit/d71415a83119c5e89d7b80d5f940d162376ee3b7
https://github.com/planetlabs/planet-client-python/security/advisories/GHSA-j5fj-rfh6-qj85 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does planet version less then 2.0.1 have ### Response: Having vulnarability CVE-2023-32303 Advisory: Planet 2.0.1 fixes a security issue where a secret file was being created with read access for other users on the machine.
https://github.com/planetlabs/planet-client-python/commit/d71415a83119c5e89d7b80d5f940d162376ee3b7
https://github.com/planetlabs/planet-client-python/security/advisories/GHSA-j5fj-rfh6-qj85 | what vulnarability does planet version less then 2.0.1 have | |
Having vulnarability CVE-2023-32681 Advisory: Planetmint 2.4.6 updates its dependency 'requests' to v2.31.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does planetmint version less then 2.4.6 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Planetmint 2.4.6 updates its dependency 'requests' to v2.31.0 to include a security fix. | what vulnarability does planetmint version less then 2.4.6 have | |
Having vulnarability CVE-2023-28370 Advisory: Planetmint-driver 0.18.3 updates its dependency 'tornado' to version '6.3.2' to include a security fix.
https://github.com/planetmint/planetmint-driver-python/commit/b492f3fd61f8514e82b1c0f06d64dfc21dc762d6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does planetmint-driver version less then 0.18.3 have ### Response: Having vulnarability CVE-2023-28370 Advisory: Planetmint-driver 0.18.3 updates its dependency 'tornado' to version '6.3.2' to include a security fix.
https://github.com/planetmint/planetmint-driver-python/commit/b492f3fd61f8514e82b1c0f06d64dfc21dc762d6 | what vulnarability does planetmint-driver version less then 0.18.3 have | |
Having vulnarability CVE-2023-32681 Advisory: Planetmint-driver 0.18.3 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/planetmint/planetmint-driver-python/commit/050332d4c4121b304af1309e95c484cc9ec71947 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does planetmint-driver-python version less then 0.18.3 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Planetmint-driver 0.18.3 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/planetmint/planetmint-driver-python/commit/050332d4c4121b304af1309e95c484cc9ec71947 | what vulnarability does planetmint-driver-python version less then 0.18.3 have | |
Having vulnarability PVE-2021-37869 Advisory: platformio 4.1.0 fixes a security issue when extracting items from TAR archive - see https://github.com/platformio/platformio-core/issues/2995 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does platformio version less then 4.1.0 have ### Response: Having vulnarability PVE-2021-37869 Advisory: platformio 4.1.0 fixes a security issue when extracting items from TAR archive - see https://github.com/platformio/platformio-core/issues/2995 | what vulnarability does platformio version less then 4.1.0 have | |
Having vulnarability PVE-2021-42829 Advisory: Plex-mpv-shim 1.10.01 upgrades to a newer MPV build for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plex-mpv-shim version less then 1.10.01 have ### Response: Having vulnarability PVE-2021-42829 Advisory: Plex-mpv-shim 1.10.01 upgrades to a newer MPV build for security reasons. | what vulnarability does plex-mpv-shim version less then 1.10.01 have | |
Having vulnarability PVE-2023-60087 Advisory: Plexapi 4.3.0 includes a fix for a Race Condition vulnerability.
https://github.com/pkkid/python-plexapi/pull/625 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plexapi version less then 4.3.0 have ### Response: Having vulnarability PVE-2023-60087 Advisory: Plexapi 4.3.0 includes a fix for a Race Condition vulnerability.
https://github.com/pkkid/python-plexapi/pull/625 | what vulnarability does plexapi version less then 4.3.0 have | |
Having vulnarability PVE-2021-25963 Advisory: plomino before 1.18 has a major vulnerability in open_url (now, targeted sources must be declared safe from an local package). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plomino version less then 1.18 have ### Response: Having vulnarability PVE-2021-25963 Advisory: plomino before 1.18 has a major vulnerability in open_url (now, targeted sources must be declared safe from an local package). | what vulnarability does plomino version less then 1.18 have | |
Having vulnarability CVE-2011-1340 Advisory: Cross-site scripting (XSS) vulnerability in skins/plone_templates/default_error_message.pt in Plone before 2.5.3 allows remote attackers to inject arbitrary web script or HTML via the type_name parameter to Members/ipa/createObject. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone version less then 2.5.3 have ### Response: Having vulnarability CVE-2011-1340 Advisory: Cross-site scripting (XSS) vulnerability in skins/plone_templates/default_error_message.pt in Plone before 2.5.3 allows remote attackers to inject arbitrary web script or HTML via the type_name parameter to Members/ipa/createObject. | what vulnarability does plone version less then 2.5.3 have | |
Having vulnarability CVE-2016-7137 Advisory: Plone.app.content 3.3.1 includes security hotfix 20160830 for folder factories redirection. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-content version less then 3.3.1 have ### Response: Having vulnarability CVE-2016-7137 Advisory: Plone.app.content 3.3.1 includes security hotfix 20160830 for folder factories redirection. | what vulnarability does plone-app-content version less then 3.3.1 have | |
Having vulnarability CVE-2016-4042 Advisory: Plone.app.contentlisting 1.2.5 removes docstrings from some methods to avoid publishing them.
https://plone.org/security/hotfix/20160419/unauthorized-disclosure-of-site-content | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-contentlisting version less then 1.2.5 have ### Response: Having vulnarability CVE-2016-4042 Advisory: Plone.app.contentlisting 1.2.5 removes docstrings from some methods to avoid publishing them.
https://plone.org/security/hotfix/20160419/unauthorized-disclosure-of-site-content | what vulnarability does plone-app-contentlisting version less then 1.2.5 have | |
Having vulnarability PVE-2021-26001 Advisory: Plone.app.contentmenu 1.1.7 escapes the title of the defaultpage in the DisplayMenu. This fixes a potential XSS vulnerability.
https://github.com/plone/plone.app.contentmenu/commit/6d7d5d51c12c82fc0eeaded0841fc57d2258e9af | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-contentmenu version less then 1.1.7 have ### Response: Having vulnarability PVE-2021-26001 Advisory: Plone.app.contentmenu 1.1.7 escapes the title of the defaultpage in the DisplayMenu. This fixes a potential XSS vulnerability.
https://github.com/plone/plone.app.contentmenu/commit/6d7d5d51c12c82fc0eeaded0841fc57d2258e9af | what vulnarability does plone-app-contentmenu version less then 1.1.7 have | |
Having vulnarability PVE-2021-26002 Advisory: Plone.app.contenttypes 1.2.15 fixes a possible cross site scripting (XSS) attack in lead image caption.
https://github.com/plone/plone.app.contenttypes/commit/16f2c31cada65f7c969e4d314c70d39d1db01f17 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-contenttypes version less then 1.2.15 have ### Response: Having vulnarability PVE-2021-26002 Advisory: Plone.app.contenttypes 1.2.15 fixes a possible cross site scripting (XSS) attack in lead image caption.
https://github.com/plone/plone.app.contenttypes/commit/16f2c31cada65f7c969e4d314c70d39d1db01f17 | what vulnarability does plone-app-contenttypes version less then 1.2.15 have | |
Having vulnarability PVE-2021-39143 Advisory: The modeleditor in plone.app.dexterity 2.6.8 no longer resolves entities, and it removes processing instructions. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-dexterity version less then 2.6.8 have ### Response: Having vulnarability PVE-2021-39143 Advisory: The modeleditor in plone.app.dexterity 2.6.8 no longer resolves entities, and it removes processing instructions. | what vulnarability does plone-app-dexterity version less then 2.6.8 have | |
Having vulnarability PVE-2021-35864 Advisory: plone-app-discussion 2.4.14 fixes a possible cross site scripting (XSS) attack on moderate comments page. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-discussion version less then 2.4.14 have ### Response: Having vulnarability PVE-2021-35864 Advisory: plone-app-discussion 2.4.14 fixes a possible cross site scripting (XSS) attack on moderate comments page. | what vulnarability does plone-app-discussion version less then 2.4.14 have | |
Having vulnarability PVE-2021-26005 Advisory: Plone.app.event 3.0 fixes a possible cross site scripting (XSS) attack in location field.
https://github.com/plone/plone.app.event/pull/233 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-event version less then 3.0 have ### Response: Having vulnarability PVE-2021-26005 Advisory: Plone.app.event 3.0 fixes a possible cross site scripting (XSS) attack in location field.
https://github.com/plone/plone.app.event/pull/233 | what vulnarability does plone-app-event version less then 3.0 have | |
Having vulnarability PVE-2021-41878 Advisory: Plone-app-layout version 2.5.1 adds CSRF tokens automatically for contentview urls. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-layout version less then 2.5.1 have ### Response: Having vulnarability PVE-2021-41878 Advisory: Plone-app-layout version 2.5.1 adds CSRF tokens automatically for contentview urls. | what vulnarability does plone-app-layout version less then 2.5.1 have | |
Having vulnarability CVE-2007-5741 Advisory: Plone-app-linkintegrity 1.0.2 includes a fix for CVE-2007-5741: Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.
https://github.com/plone/plone.app.linkintegrity/commit/4be49548c4f1046a8204030f26a603c29f38d9dd | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-linkintegrity version less then 1.0.2 have ### Response: Having vulnarability CVE-2007-5741 Advisory: Plone-app-linkintegrity 1.0.2 includes a fix for CVE-2007-5741: Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.
https://github.com/plone/plone.app.linkintegrity/commit/4be49548c4f1046a8204030f26a603c29f38d9dd | what vulnarability does plone-app-linkintegrity version less then 1.0.2 have | |
Having vulnarability PVE-2021-41938 Advisory: Plone-app-theming 4.1.6 doesn't resolves entities and removes processing instructions to avoid XXE attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-theming version less then 4.1.6 have ### Response: Having vulnarability PVE-2021-41938 Advisory: Plone-app-theming 4.1.6 doesn't resolves entities and removes processing instructions to avoid XXE attacks. | what vulnarability does plone-app-theming version less then 4.1.6 have | |
Having vulnarability CVE-2011-1950 Advisory: Plone-app-users before 1.0.5 does not check for permission when editing other users' profiles. This fixes http://dev.plone.org/plone/ticket/11842 and http://plone.org/products/plone/security/advisories/CVE-2011-1950. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-users version less then 1.0.5 have ### Response: Having vulnarability CVE-2011-1950 Advisory: Plone-app-users before 1.0.5 does not check for permission when editing other users' profiles. This fixes http://dev.plone.org/plone/ticket/11842 and http://plone.org/products/plone/security/advisories/CVE-2011-1950. | what vulnarability does plone-app-users version less then 1.0.5 have | |
Having vulnarability PVE-2022-52116 Advisory: Plone.app.workflow 1.1.0 protects the "sharing" form against CSRF attacks.
https://github.com/plone/plone.app.workflow/commit/c2e300e52bb7b3ffad03c09afb42f441d58eec15 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-workflow version less then 1.1.0 have ### Response: Having vulnarability PVE-2022-52116 Advisory: Plone.app.workflow 1.1.0 protects the "sharing" form against CSRF attacks.
https://github.com/plone/plone.app.workflow/commit/c2e300e52bb7b3ffad03c09afb42f441d58eec15 | what vulnarability does plone-app-workflow version less then 1.1.0 have | |
Having vulnarability PVE-2021-42026 Advisory: Plone-app-z3cform version 0.5.4 makes LookupErrors no longer visible to improve security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-z3cform version less then 0.5.4 have ### Response: Having vulnarability PVE-2021-42026 Advisory: Plone-app-z3cform version 0.5.4 makes LookupErrors no longer visible to improve security. | what vulnarability does plone-app-z3cform version less then 0.5.4 have | |
Having vulnarability PVE-2021-26007 Advisory: plone.dexterity 2.3.0 fixes a security issue. Attribute access to schema fields can be protected. This worked for direct schemas, but was not implemented for permissions coming from behaviors. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-dexterity version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-26007 Advisory: plone.dexterity 2.3.0 fixes a security issue. Attribute access to schema fields can be protected. This worked for direct schemas, but was not implemented for permissions coming from behaviors. | what vulnarability does plone-dexterity version less then 2.3.0 have | |
Having vulnarability PVE-2021-37107 Advisory: Plone.memoize 1.0.3 no longer uses hash() when making cache keys. This is to avoid cache collisions, and to avoid a potential security problem where an attacker could manually craft collisions. Also, the use of hash() is no longer recommended in tests.
https://github.com/plone/plone.memoize/commit/66648a2e9ff2932e3a1bc4b5da88160602653531 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-memoize version less then 1.0.3 have ### Response: Having vulnarability PVE-2021-37107 Advisory: Plone.memoize 1.0.3 no longer uses hash() when making cache keys. This is to avoid cache collisions, and to avoid a potential security problem where an attacker could manually craft collisions. Also, the use of hash() is no longer recommended in tests.
https://github.com/plone/plone.memoize/commit/66648a2e9ff2932e3a1bc4b5da88160602653531 | what vulnarability does plone-memoize version less then 1.0.3 have | |
Having vulnarability PVE-2021-26009 Advisory: Plone.mockup before 2.1.3 is vulnerable to a XSS attack in structure and relateditem pattern.
https://github.com/plone/mockup/pull/627 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-mockup version less then 2.1.3 have ### Response: Having vulnarability PVE-2021-26009 Advisory: Plone.mockup before 2.1.3 is vulnerable to a XSS attack in structure and relateditem pattern.
https://github.com/plone/mockup/pull/627 | what vulnarability does plone-mockup version less then 2.1.3 have | |
Having vulnarability CVE-2021-33507 Advisory: Plone.namedfile 5.5.0 prevents stored XSS from file upload (svg, html) by implementing an allowlist of trusted mimetypes.
https://github.com/plone/plone.namedfile/commit/37b9b7f29b0f804df622db9502abae28f3eccf38
https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-namedfile version less then 5.5.0 have ### Response: Having vulnarability CVE-2021-33507 Advisory: Plone.namedfile 5.5.0 prevents stored XSS from file upload (svg, html) by implementing an allowlist of trusted mimetypes.
https://github.com/plone/plone.namedfile/commit/37b9b7f29b0f804df622db9502abae28f3eccf38
https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots | what vulnarability does plone-namedfile version less then 5.5.0 have | |
Having vulnarability CVE-2012-5508 Advisory: Plone.openid 2.0.2 uses system random when available to fix CVE-2012-5508. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-openid version less then 2.0.2 have ### Response: Having vulnarability CVE-2012-5508 Advisory: Plone.openid 2.0.2 uses system random when available to fix CVE-2012-5508. | what vulnarability does plone-openid version less then 2.0.2 have | |
Having vulnarability PVE-2017-47716 Advisory: Plone.portlet.collection 2.0.4 fixes a flaw that allowed users without view permissions for the collection to see the Portlet.
https://github.com/plone/plone.portlet.collection/commit/acaef557bdd904aaccc9da71bd3febc2c28c5d19 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-portlet-collection version less then 2.0.4 have ### Response: Having vulnarability PVE-2017-47716 Advisory: Plone.portlet.collection 2.0.4 fixes a flaw that allowed users without view permissions for the collection to see the Portlet.
https://github.com/plone/plone.portlet.collection/commit/acaef557bdd904aaccc9da71bd3febc2c28c5d19 | what vulnarability does plone-portlet-collection version less then 2.0.4 have | |
Having vulnarability PVE-2021-40232 Advisory: Plone.portlet.static 1.2 starts to ensure that text output is passed through the 'safe-html' transform to protect against malicious text. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-portlet-static version less then 1.2 have ### Response: Having vulnarability PVE-2021-40232 Advisory: Plone.portlet.static 1.2 starts to ensure that text output is passed through the 'safe-html' transform to protect against malicious text. | what vulnarability does plone-portlet-static version less then 1.2 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.