output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability CVE-2016-10745 Advisory: Pathfinder 0.5.4 stops relying in Jinja2 v2.6 to avoid security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pathfinder version less then 0.5.4 have ### Response: Having vulnarability CVE-2016-10745 Advisory: Pathfinder 0.5.4 stops relying in Jinja2 v2.6 to avoid security issues.
what vulnarability does pathfinder version less then 0.5.4 have
Having vulnarability PVE-2022-48586 Advisory: Patientmatcher 3.4 removes usage of unsafe HTTP protocol. https://github.com/Clinical-Genomics/patientMatcher/pull/293
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does patientmatcher version less then 3.4 have ### Response: Having vulnarability PVE-2022-48586 Advisory: Patientmatcher 3.4 removes usage of unsafe HTTP protocol. https://github.com/Clinical-Genomics/patientMatcher/pull/293
what vulnarability does patientmatcher version less then 3.4 have
Having vulnarability PVE-2021-42998 Advisory: Patroni 2.0.2 uses 'hmac.compare_digest()' instead of '==' for performing the REST API authentication. The previous was vulnerable to timing attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does patroni version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-42998 Advisory: Patroni 2.0.2 uses 'hmac.compare_digest()' instead of '==' for performing the REST API authentication. The previous was vulnerable to timing attacks.
what vulnarability does patroni version less then 2.0.2 have
Having vulnarability PVE-2021-40214 Advisory: payton 0.1.4 upgrades Pillow from 7.x, since it had a security issue. This version is just for upgrading Pillow up to a secure version.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does payton version less then 0.1.4 have ### Response: Having vulnarability PVE-2021-40214 Advisory: payton 0.1.4 upgrades Pillow from 7.x, since it had a security issue. This version is just for upgrading Pillow up to a secure version.
what vulnarability does payton version less then 0.1.4 have
Having vulnarability PVE-2024-66760 Advisory: Pcaspy version 0.7.1 addresses a race condition in the handling of client disconnections. This update prevents server crashes previously caused by simultaneous access to shared resources during client disconnection events. https://github.com/paulscherrerinstitute/pcaspy/pull/49/commits/f2865472f8b5996745c6e82105eab77c1637b62b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pcaspy version less then 0.7.1 have ### Response: Having vulnarability PVE-2024-66760 Advisory: Pcaspy version 0.7.1 addresses a race condition in the handling of client disconnections. This update prevents server crashes previously caused by simultaneous access to shared resources during client disconnection events. https://github.com/paulscherrerinstitute/pcaspy/pull/49/commits/f2865472f8b5996745c6e82105eab77c1637b62b
what vulnarability does pcaspy version less then 0.7.1 have
Having vulnarability CVE-2017-18342 Advisory: pconf before 1.3.3 is vulnerable to arbitrary code execution related to [CVE-2017-18342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342) because of YAML's `load`. This upgrades to use YAML `safe_load` instead of `load`.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pconf version less then 1.3.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: pconf before 1.3.3 is vulnerable to arbitrary code execution related to [CVE-2017-18342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342) because of YAML's `load`. This upgrades to use YAML `safe_load` instead of `load`.
what vulnarability does pconf version less then 1.3.3 have
Having vulnarability PVE-2021-25926 Advisory: pcp before 2.1.911 has a not further described vulnerability in pcp.spec.in.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pcp version less then 2.1.911 have ### Response: Having vulnarability PVE-2021-25926 Advisory: pcp before 2.1.911 has a not further described vulnerability in pcp.spec.in.
what vulnarability does pcp version less then 2.1.911 have
Having vulnarability CVE-2021-25292 Advisory: Pdfcropmargins 1.0.6 updates its dependency 'pillow' requirement to '>=9.0.0' to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdfcropmargins version less then 1.0.6 have ### Response: Having vulnarability CVE-2021-25292 Advisory: Pdfcropmargins 1.0.6 updates its dependency 'pillow' requirement to '>=9.0.0' to include security fixes.
what vulnarability does pdfcropmargins version less then 1.0.6 have
Having vulnarability PVE-2021-25927 Advisory: Pdfextract before 0.0.2 is using "eval" on filenames, leading to execution of arbitrary Python code.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdfextract version less then 0.0.2 have ### Response: Having vulnarability PVE-2021-25927 Advisory: Pdfextract before 0.0.2 is using "eval" on filenames, leading to execution of arbitrary Python code.
what vulnarability does pdfextract version less then 0.0.2 have
Having vulnarability CVE-2020-10378 Advisory: Pdfreader 0.1.6 updates its dependency 'pillow' to a version >= 7.1.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdfreader version less then 0.1.6 have ### Response: Having vulnarability CVE-2020-10378 Advisory: Pdfreader 0.1.6 updates its dependency 'pillow' to a version >= 7.1.0 to include security fixes.
what vulnarability does pdfreader version less then 0.1.6 have
Having vulnarability PVE-2023-53725 Advisory: Pdh 0.3.11 stops using root to run the container. https://github.com/mbovo/pdh/pull/33
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdh version less then 0.3.11 have ### Response: Having vulnarability PVE-2023-53725 Advisory: Pdh 0.3.11 stops using root to run the container. https://github.com/mbovo/pdh/pull/33
what vulnarability does pdh version less then 0.3.11 have
Having vulnarability PVE-2021-37793 Advisory: Pdkit 1.2.1 includes an unspecified security fix for included libraries.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdkit version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-37793 Advisory: Pdkit 1.2.1 includes an unspecified security fix for included libraries.
what vulnarability does pdkit version less then 1.2.1 have
Having vulnarability CVE-2023-45805 Advisory: Pdm 2.9.4 includes a fix for CVE-2023-45805: It's possible to craft a malicious pdm.lock file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project. https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9 https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdm version less then 2.9.4 have ### Response: Having vulnarability CVE-2023-45805 Advisory: Pdm 2.9.4 includes a fix for CVE-2023-45805: It's possible to craft a malicious pdm.lock file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project. https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9 https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831
what vulnarability does pdm version less then 2.9.4 have
Having vulnarability PVE-2022-45022 Advisory: Pdoc 10.0.0 defuses insecure 'repr()' calls for all templates. https://github.com/mitmproxy/pdoc/commit/b14d6bc3d515d58d20c8810b79ae8f4115efaa8c
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pdoc version less then 10.0.0 have ### Response: Having vulnarability PVE-2022-45022 Advisory: Pdoc 10.0.0 defuses insecure 'repr()' calls for all templates. https://github.com/mitmproxy/pdoc/commit/b14d6bc3d515d58d20c8810b79ae8f4115efaa8c
what vulnarability does pdoc version less then 10.0.0 have
Having vulnarability PVE-2024-64507 Advisory: Pds.registry-sweepers is affected by an unsafe defaults vulnerability. Default behavior was now switched to check host certs. https://github.com/NASA-PDS/registry-sweepers/pull/22
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pds.registry-sweepers version less then 1.2.0 have ### Response: Having vulnarability PVE-2024-64507 Advisory: Pds.registry-sweepers is affected by an unsafe defaults vulnerability. Default behavior was now switched to check host certs. https://github.com/NASA-PDS/registry-sweepers/pull/22
what vulnarability does pds.registry-sweepers version less then 1.2.0 have
Having vulnarability PVE-2022-48282 Advisory: Peekabooav 2.1 uses the 'schema' module for input validation. https://github.com/scVENUS/PeekabooAV/commit/cfd84d6b507ab4862efaa13c97e188e7327c76d4
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does peekabooav version less then 2.1 have ### Response: Having vulnarability PVE-2022-48282 Advisory: Peekabooav 2.1 uses the 'schema' module for input validation. https://github.com/scVENUS/PeekabooAV/commit/cfd84d6b507ab4862efaa13c97e188e7327c76d4
what vulnarability does peekabooav version less then 2.1 have
Having vulnarability PVE-2021-34337 Advisory: Peewee 2.10.0 removes 'AESEncryptedField'. The cryptographic implementation was unsafe. https://github.com/coleifer/peewee/commit/6aee106831eed8c214086a20b26f72f2abff8db5
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does peewee version less then 2.10.0 have ### Response: Having vulnarability PVE-2021-34337 Advisory: Peewee 2.10.0 removes 'AESEncryptedField'. The cryptographic implementation was unsafe. https://github.com/coleifer/peewee/commit/6aee106831eed8c214086a20b26f72f2abff8db5
what vulnarability does peewee version less then 2.10.0 have
Having vulnarability CVE-2021-27291 Advisory: Peltak 0.28.0 updates its dependency 'pygments' requirement to ">=2.7.4" to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does peltak version less then 0.28.0 have ### Response: Having vulnarability CVE-2021-27291 Advisory: Peltak 0.28.0 updates its dependency 'pygments' requirement to ">=2.7.4" to include security fixes.
what vulnarability does peltak version less then 0.28.0 have
Having vulnarability PVE-2021-42045 Advisory: Pelutils version 0.6.0 makes 'log.throw' private, as it could be exploited.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pelutils version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-42045 Advisory: Pelutils version 0.6.0 makes 'log.throw' private, as it could be exploited.
what vulnarability does pelutils version less then 0.6.0 have
Having vulnarability PVE-2021-25928 Advisory: peppercorn before 0.5 is vulnerable to DoS attacks due to the use of an iterative parser rather than a recursive parser. https://github.com/Pylons/peppercorn/commit/d07cb55cee4f9b47b71d9fb7280aee6ab0799baf
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does peppercorn version less then 0.5 have ### Response: Having vulnarability PVE-2021-25928 Advisory: peppercorn before 0.5 is vulnerable to DoS attacks due to the use of an iterative parser rather than a recursive parser. https://github.com/Pylons/peppercorn/commit/d07cb55cee4f9b47b71d9fb7280aee6ab0799baf
what vulnarability does peppercorn version less then 0.5 have
Having vulnarability PVE-2021-42403 Advisory: Perceval-zulip 0.2.0 drops support for Python < 3.7 as it arrived to End-of-Life in December 2021. https://github.com/vchrombie/grimoirelab-perceval-zulip/commit/328938531bb95c2407d75d94db452f5dceb73d16
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does perceval-zulip version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-42403 Advisory: Perceval-zulip 0.2.0 drops support for Python < 3.7 as it arrived to End-of-Life in December 2021. https://github.com/vchrombie/grimoirelab-perceval-zulip/commit/328938531bb95c2407d75d94db452f5dceb73d16
what vulnarability does perceval-zulip version less then 0.2.0 have
Having vulnarability CVE-2022-34054 Advisory: The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does perdido version greather then equal to 0.0.1,less then 0.0.3 have ### Response: Having vulnarability CVE-2022-34054 Advisory: The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
what vulnarability does perdido version greather then equal to 0.0.1,less then 0.0.3 have
Having vulnarability CVE-2019-14751 Advisory: Persephone 0.4.0 updates its dependency 'nltk' to v3.4.5 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does persephone version less then 0.4.0 have ### Response: Having vulnarability CVE-2019-14751 Advisory: Persephone 0.4.0 updates its dependency 'nltk' to v3.4.5 to include a security fix.
what vulnarability does persephone version less then 0.4.0 have
Having vulnarability PVE-2023-55206 Advisory: Personnummer 3.0.2 includes a security fix: The issue arrises from a regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. https://github.com/advisories/GHSA-rxq3-5249-8hgg
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does personnummer version greather then equal to 0,less then 3.0.2 have ### Response: Having vulnarability PVE-2023-55206 Advisory: Personnummer 3.0.2 includes a security fix: The issue arrises from a regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. https://github.com/advisories/GHSA-rxq3-5249-8hgg
what vulnarability does personnummer version greather then equal to 0,less then 3.0.2 have
Having vulnarability CVE-2023-37920 Advisory: Pesapal-py 0.1.3 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a vulnerability. https://github.com/twais/pesapal-py/commit/262a79e1f4485e08c439a230336ad806f562c9b1
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pesapal-py version less then 0.1.3 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Pesapal-py 0.1.3 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a vulnerability. https://github.com/twais/pesapal-py/commit/262a79e1f4485e08c439a230336ad806f562c9b1
what vulnarability does pesapal-py version less then 0.1.3 have
Having vulnarability PVE-2023-61009 Advisory: Petals 2.2.0 includes a fix for a race condition in MemoryCache. https://github.com/bigscience-workshop/petals/pull/487
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does petals version less then 2.2.0 have ### Response: Having vulnarability PVE-2023-61009 Advisory: Petals 2.2.0 includes a fix for a race condition in MemoryCache. https://github.com/bigscience-workshop/petals/pull/487
what vulnarability does petals version less then 2.2.0 have
Having vulnarability CVE-2023-29159 Advisory: Petisco 1.15.4 updates its dependency 'fastapi' to version '0.95.2' to include a security fix. https://github.com/alice-biometrics/petisco/pull/351
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does petisco version less then 1.15.4 have ### Response: Having vulnarability CVE-2023-29159 Advisory: Petisco 1.15.4 updates its dependency 'fastapi' to version '0.95.2' to include a security fix. https://github.com/alice-biometrics/petisco/pull/351
what vulnarability does petisco version less then 1.15.4 have
Having vulnarability CVE-2020-29128 Advisory: Petl before 1.68, in some configurations, allows resolution of entities in an XML document. https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does petl version less then 1.6.8 have ### Response: Having vulnarability CVE-2020-29128 Advisory: Petl before 1.68, in some configurations, allows resolution of entities in an XML document. https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347
what vulnarability does petl version less then 1.6.8 have
Having vulnarability PVE-2021-25929 Advisory: pex before 0.5.6 follows links which may lead to security issues: https://rbcommons.com/s/twitter/r/293/.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pex version less then 0.5.6 have ### Response: Having vulnarability PVE-2021-25929 Advisory: pex before 0.5.6 follows links which may lead to security issues: https://rbcommons.com/s/twitter/r/293/.
what vulnarability does pex version less then 0.5.6 have
Having vulnarability CVE-2021-21330 Advisory: Pfun 0.12.0 updates the 'aiohttp' dependency to 3.7.4 to avoid an open redirect vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pfun version less then 0.12.0 have ### Response: Having vulnarability CVE-2021-21330 Advisory: Pfun 0.12.0 updates the 'aiohttp' dependency to 3.7.4 to avoid an open redirect vulnerability.
what vulnarability does pfun version less then 0.12.0 have
Having vulnarability CVE-2023-45857 Advisory: Pg-bulk-ingest version 0.0.45 specifically pins its localtunnel dependency to mitigate the axios vulnerability identified as CVE-2023-45857. https://github.com/uktrade/pg-bulk-ingest/pull/169/commits/8a28a4e24361a99c610b499458b2e6b97f793377
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pg-bulk-ingest version less then 0.0.45 have ### Response: Having vulnarability CVE-2023-45857 Advisory: Pg-bulk-ingest version 0.0.45 specifically pins its localtunnel dependency to mitigate the axios vulnerability identified as CVE-2023-45857. https://github.com/uktrade/pg-bulk-ingest/pull/169/commits/8a28a4e24361a99c610b499458b2e6b97f793377
what vulnarability does pg-bulk-ingest version less then 0.0.45 have
Having vulnarability CVE-2023-0241 Advisory: PgAdmin4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database. Alias: GHSA-9crj-hpxh-f6qg
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pgadmin4 version less then 6.19 have ### Response: Having vulnarability CVE-2023-0241 Advisory: PgAdmin4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database. Alias: GHSA-9crj-hpxh-f6qg
what vulnarability does pgadmin4 version less then 6.19 have
Having vulnarability CVE-2017-18342 Advisory: Pgbedrock 0.4.2 includes a security patch for the function 'load_spec' in 'pgbedrock/spec_inspector.py'. It used the unsafe yaml.load() that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/Squarespace/pgbedrock/commit/a217fa419fbb88fd4949ea6db7ca2fa9869cf8e1
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pgbedrock version less then 0.4.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Pgbedrock 0.4.2 includes a security patch for the function 'load_spec' in 'pgbedrock/spec_inspector.py'. It used the unsafe yaml.load() that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/Squarespace/pgbedrock/commit/a217fa419fbb88fd4949ea6db7ca2fa9869cf8e1
what vulnarability does pgbedrock version less then 0.4.2 have
Having vulnarability CVE-2023-45139 Advisory: Pgscatalog-utils version 0.5.1 upgrades its fonttools dependency to 4.49.0 from the earlier 4.42.1 in response to addressing the security vulnerability CVE-2023-45139.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pgscatalog-utils version less then 0.5.1 have ### Response: Having vulnarability CVE-2023-45139 Advisory: Pgscatalog-utils version 0.5.1 upgrades its fonttools dependency to 4.49.0 from the earlier 4.42.1 in response to addressing the security vulnerability CVE-2023-45139.
what vulnarability does pgscatalog-utils version less then 0.5.1 have
Having vulnarability CVE-2015-0219 Advisory: Pheonix-waitress 1.0.0 includes a fix for CVE-2015-0219. https://www.djangoproject.com/weblog/2015/jan/13/security/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pheonix-waitress version less then 1.0.0 have ### Response: Having vulnarability CVE-2015-0219 Advisory: Pheonix-waitress 1.0.0 includes a fix for CVE-2015-0219. https://www.djangoproject.com/weblog/2015/jan/13/security/
what vulnarability does pheonix-waitress version less then 1.0.0 have
Having vulnarability PVE-2021-25930 Advisory: Phileo before 1.1 allows users to like anything and everything, which could potentially lead to security problems (ex. liking entries in permission tables, and thus seeing their content; liking administrative users and thus getting their username). https://github.com/pinax/pinax-likes/commit/2b906a4f85acc54c72d4a9f569da4ecf63a59eb3
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phileo version less then 1.1 have ### Response: Having vulnarability PVE-2021-25930 Advisory: Phileo before 1.1 allows users to like anything and everything, which could potentially lead to security problems (ex. liking entries in permission tables, and thus seeing their content; liking administrative users and thus getting their username). https://github.com/pinax/pinax-likes/commit/2b906a4f85acc54c72d4a9f569da4ecf63a59eb3
what vulnarability does phileo version less then 1.1 have
Having vulnarability PVE-2021-39438 Advisory: Phoenix-letter 0.2.0 adds the flag '--aws-keys' to securely ask for the AWS credentials to avoid keeping sensitive information accessible in plain text. Without this flag, it falls back to the Boto3 default credential search.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phoenix-letter version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-39438 Advisory: Phoenix-letter 0.2.0 adds the flag '--aws-keys' to securely ask for the AWS credentials to avoid keeping sensitive information accessible in plain text. Without this flag, it falls back to the Boto3 default credential search.
what vulnarability does phoenix-letter version less then 0.2.0 have
Having vulnarability PVE-2023-55195 Advisory: Phoenix-ws 1.0.6 includes a security fix: All of the source code, files, and folders in 'phoenix_files/extensions/' are available to end users through a simple HTTP GET request. https://github.com/NovaAndrom3da/Phoenix/commit/47952180a60a94ff1dfa2e0117fca9a5052bf193
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phoenix-ws version greather then equal to 0,less then 1.0.6 have ### Response: Having vulnarability PVE-2023-55195 Advisory: Phoenix-ws 1.0.6 includes a security fix: All of the source code, files, and folders in 'phoenix_files/extensions/' are available to end users through a simple HTTP GET request. https://github.com/NovaAndrom3da/Phoenix/commit/47952180a60a94ff1dfa2e0117fca9a5052bf193
what vulnarability does phoenix-ws version greather then equal to 0,less then 1.0.6 have
Having vulnarability CVE-2024-21503 Advisory: Phone-gen version 2.4.4 addresses a security issue where the Black library was vulnerable to Regular Expression Denial of Service (ReDoS), as identified in CVE-2024-21503.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phone-gen version less then 2.4.4 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Phone-gen version 2.4.4 addresses a security issue where the Black library was vulnerable to Regular Expression Denial of Service (ReDoS), as identified in CVE-2024-21503.
what vulnarability does phone-gen version less then 2.4.4 have
Having vulnarability PVE-2021-39441 Advisory: Phonenumbers 8.3.1 contains a security improvement of the getNationalSignificantNumber function to make it more robust against malicious input.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phonenumbers version less then 8.3.1 have ### Response: Having vulnarability PVE-2021-39441 Advisory: Phonenumbers 8.3.1 contains a security improvement of the getNationalSignificantNumber function to make it more robust against malicious input.
what vulnarability does phonenumbers version less then 8.3.1 have
Having vulnarability CVE-2021-23437 Advisory: Photocrawl 0.3.1 updates the minimum version requirement of "Pillow" to 8.3.2 to include security patches.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does photocrawl version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Photocrawl 0.3.1 updates the minimum version requirement of "Pillow" to 8.3.2 to include security patches.
what vulnarability does photocrawl version less then 0.3.1 have
Having vulnarability PVE-2022-51466 Advisory: Phylum 0.17.1 sanitizes user input to guard against possible cmd injection. https://github.com/phylum-dev/phylum-ci/pull/144
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does phylum version less then 0.17.1 have ### Response: Having vulnarability PVE-2022-51466 Advisory: Phylum 0.17.1 sanitizes user input to guard against possible cmd injection. https://github.com/phylum-dev/phylum-ci/pull/144
what vulnarability does phylum version less then 0.17.1 have
Having vulnarability CVE-2019-12410 Advisory: Physiofit 3.3.3 updates its pyarrow dependency to version ^14.0.1 in response to the security vulnerability identified as CVE-2019-12410. https://github.com/MetaSys-LISBP/PhysioFit/commit/187270cfc3372773785f3fe96b9616cdaf3f6d78
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does physiofit version less then 3.3.3 have ### Response: Having vulnarability CVE-2019-12410 Advisory: Physiofit 3.3.3 updates its pyarrow dependency to version ^14.0.1 in response to the security vulnerability identified as CVE-2019-12410. https://github.com/MetaSys-LISBP/PhysioFit/commit/187270cfc3372773785f3fe96b9616cdaf3f6d78
what vulnarability does physiofit version less then 3.3.3 have
Having vulnarability CVE-2020-1747 Advisory: Pi-mqtt-gpio 0.5.2 updates PyYAML to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pi-mqtt-gpio version less then 0.5.2 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Pi-mqtt-gpio 0.5.2 updates PyYAML to include a security fix.
what vulnarability does pi-mqtt-gpio version less then 0.5.2 have
Having vulnarability CVE-2021-34552 Advisory: Picamerax version 21.9.8 upgrades its Pillow dependency to address the security vulnerability identified in CVE-2021-34552.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does picamerax version less then 21.9.8 have ### Response: Having vulnarability CVE-2021-34552 Advisory: Picamerax version 21.9.8 upgrades its Pillow dependency to address the security vulnerability identified in CVE-2021-34552.
what vulnarability does picamerax version less then 21.9.8 have
Having vulnarability CVE-2023-41885 Advisory: Piccolo is an ORM and query builder which supports asyncio. In versions 0.120.0 and prior, the implementation of `BaseUser.login` leaks enough information to a malicious user such that they would be able to successfully generate a list of valid users on the platform. As Piccolo on its own does not also enforce strong passwords, these lists of valid accounts are likely to be used in a password spray attack with the outcome being attempted takeover of user accounts on the platform. The impact of this vulnerability is minor as it requires chaining with other attack vectors in order to gain more then simply a list of valid users on the underlying platform. The likelihood of this vulnerability is possible as it requires minimal skills to pull off, especially given the underlying login functionality for Piccolo based sites is open source. This issue has been patched in version 0.121.0.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piccolo version less then 0.121.0 have ### Response: Having vulnarability CVE-2023-41885 Advisory: Piccolo is an ORM and query builder which supports asyncio. In versions 0.120.0 and prior, the implementation of `BaseUser.login` leaks enough information to a malicious user such that they would be able to successfully generate a list of valid users on the platform. As Piccolo on its own does not also enforce strong passwords, these lists of valid accounts are likely to be used in a password spray attack with the outcome being attempted takeover of user accounts on the platform. The impact of this vulnerability is minor as it requires chaining with other attack vectors in order to gain more then simply a list of valid users on the underlying platform. The likelihood of this vulnerability is possible as it requires minimal skills to pull off, especially given the underlying login functionality for Piccolo based sites is open source. This issue has been patched in version 0.121.0.
what vulnarability does piccolo version less then 0.121.0 have
Having vulnarability CVE-2021-23386 Advisory: Piccolo-admin 0.13.1 updates its NPM dependency 'dns-packet' to v1.3.4 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piccolo-admin version less then 0.13.1 have ### Response: Having vulnarability CVE-2021-23386 Advisory: Piccolo-admin 0.13.1 updates its NPM dependency 'dns-packet' to v1.3.4 to include a security fix.
what vulnarability does piccolo-admin version less then 0.13.1 have
Having vulnarability PVE-2023-62974 Advisory: Picklescan 0.0.13 includes a security fix: The way picklescan handled memo didn't look at the argument, so it was possible to have a different memo and use STACK_GLOBAL to bypass allow-list checking. https://github.com/mmaitre314/picklescan/issues/22
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does picklescan version less then 0.0.13 have ### Response: Having vulnarability PVE-2023-62974 Advisory: Picklescan 0.0.13 includes a security fix: The way picklescan handled memo didn't look at the argument, so it was possible to have a different memo and use STACK_GLOBAL to bypass allow-list checking. https://github.com/mmaitre314/picklescan/issues/22
what vulnarability does picklescan version less then 0.0.13 have
Having vulnarability CVE-2018-18074 Advisory: Pigar 0.9.1 fixes some potential security vulnerabilities upgrading its dependency 'requests' to v2.21.0.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pigar version less then 0.9.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Pigar 0.9.1 fixes some potential security vulnerabilities upgrading its dependency 'requests' to v2.21.0.
what vulnarability does pigar version less then 0.9.1 have
Having vulnarability CVE-2020-25659 Advisory: Piicatcher 0.12.2 updates its dependency 'cryptography' to v3.2.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piicatcher version less then 0.12.2 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Piicatcher 0.12.2 updates its dependency 'cryptography' to v3.2.1 to include a security fix.
what vulnarability does piicatcher version less then 0.12.2 have
Having vulnarability CVE-2021-29421 Advisory: Pikepdf 1.3.0 throughout 2.9.2 allows XXE when parsing XMP metadata entries via models/metadata.py
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pikepdf version greather then equal to 1.3.0,less then equal to 2.9.2 have ### Response: Having vulnarability CVE-2021-29421 Advisory: Pikepdf 1.3.0 throughout 2.9.2 allows XXE when parsing XMP metadata entries via models/metadata.py
what vulnarability does pikepdf version greather then equal to 1.3.0,less then equal to 2.9.2 have
Having vulnarability CVE-2023-44271 Advisory: Pillow 10.0.0 includes a fix for CVE-2023-44271: Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. https://github.com/python-pillow/Pillow/pull/7244
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pillow version less then 10.0.0 have ### Response: Having vulnarability CVE-2023-44271 Advisory: Pillow 10.0.0 includes a fix for CVE-2023-44271: Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. https://github.com/python-pillow/Pillow/pull/7244
what vulnarability does pillow version less then 10.0.0 have
Having vulnarability CVE-2022-1253 Advisory: Pillow-heif 0.6.1 fixes HEIF decoder's CVEs.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pillow-heif version less then 0.6.1 have ### Response: Having vulnarability CVE-2022-1253 Advisory: Pillow-heif 0.6.1 fixes HEIF decoder's CVEs.
what vulnarability does pillow-heif version less then 0.6.1 have
Having vulnarability CVE-2014-1932 Advisory: Pillow-simd 2.3.1 includes a fix for CVE-2014-1932: The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pillow-simd version less then 2.3.1 have ### Response: Having vulnarability CVE-2014-1932 Advisory: Pillow-simd 2.3.1 includes a fix for CVE-2014-1932: The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
what vulnarability does pillow-simd version less then 2.3.1 have
Having vulnarability PVE-2022-51748 Advisory: Pillwo is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pillwo version greather then 0 have ### Response: Having vulnarability PVE-2022-51748 Advisory: Pillwo is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
what vulnarability does pillwo version greather then 0 have
Having vulnarability CVE-2021-45105 Advisory: Pims 0.6.1 and prior uses 'loci_tools.jar', which is affected by critical and severe vulnerabilities. https://github.com/soft-matter/pims/issues/400 https://github.com/soft-matter/pims/pull/403
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pims version less then equal to 0.6.1 have ### Response: Having vulnarability CVE-2021-45105 Advisory: Pims 0.6.1 and prior uses 'loci_tools.jar', which is affected by critical and severe vulnerabilities. https://github.com/soft-matter/pims/issues/400 https://github.com/soft-matter/pims/pull/403
what vulnarability does pims version less then equal to 0.6.1 have
Having vulnarability PVE-2021-25955 Advisory: Pinax-likes before 1.1 allows users to like anything and everything, which could potentially lead to security problems (ex. liking entries in permission tables, and thus seeing their content; liking administrative users and thus getting their username). https://github.com/pinax/pinax-likes/commit/2b906a4f85acc54c72d4a9f569da4ecf63a59eb3
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pinax-likes version less then 1.1 have ### Response: Having vulnarability PVE-2021-25955 Advisory: Pinax-likes before 1.1 allows users to like anything and everything, which could potentially lead to security problems (ex. liking entries in permission tables, and thus seeing their content; liking administrative users and thus getting their username). https://github.com/pinax/pinax-likes/commit/2b906a4f85acc54c72d4a9f569da4ecf63a59eb3
what vulnarability does pinax-likes version less then 1.1 have
Having vulnarability CVE-2022-1941 Advisory: Pinecone-client 2.2.2 updats its `protobuf` dependency from `3.19.3` to `~=3.19.5` to address [a potential denial-of-service vector] CVE-2022-1941.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pinecone-client version less then 2.2.2 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Pinecone-client 2.2.2 updats its `protobuf` dependency from `3.19.3` to `~=3.19.5` to address [a potential denial-of-service vector] CVE-2022-1941.
what vulnarability does pinecone-client version less then 2.2.2 have
Having vulnarability PVE-2023-62381 Advisory: Pioreactor 23.11.15rc0 includes a fix for a command injection vulnerability. https://github.com/Pioreactor/pioreactor/commit/c40d2c67a2e49c6d6a395c0789cb35711af2f70d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pioreactor version less then 23.11.15rc0 have ### Response: Having vulnarability PVE-2023-62381 Advisory: Pioreactor 23.11.15rc0 includes a fix for a command injection vulnerability. https://github.com/Pioreactor/pioreactor/commit/c40d2c67a2e49c6d6a395c0789cb35711af2f70d
what vulnarability does pioreactor version less then 23.11.15rc0 have
Having vulnarability CVE-2013-1629 Advisory: pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pip version less then 1.3 have ### Response: Having vulnarability CVE-2013-1629 Advisory: pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.
what vulnarability does pip version less then 1.3 have
Having vulnarability CVE-2019-10906 Advisory: Pipenv 2020.5.28 updates its dependency 'jinja2' to v2.11.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pipenv version less then 2020.5.28 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Pipenv 2020.5.28 updates its dependency 'jinja2' to v2.11.2 to include a security fix.
what vulnarability does pipenv version less then 2020.5.28 have
Having vulnarability CVE-2019-7548 Advisory: Pipenv-setup 3.1.4 updates its dependency 'sqlalchemy' to v1.3.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pipenv-setup version less then 3.1.4 have ### Response: Having vulnarability CVE-2019-7548 Advisory: Pipenv-setup 3.1.4 updates its dependency 'sqlalchemy' to v1.3.0 to include a security fix.
what vulnarability does pipenv-setup version less then 3.1.4 have
Having vulnarability PVE-2022-50292 Advisory: Piperider 0.5.0rc.4 # included
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piperider version less then 0.5.0rc.4 have ### Response: Having vulnarability PVE-2022-50292 Advisory: Piperider 0.5.0rc.4 # included
what vulnarability does piperider version less then 0.5.0rc.4 have
Having vulnarability CVE-2023-31543 Advisory: A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pipreqs version greather then equal to 0.3.0,less then 0.4.12 have ### Response: Having vulnarability CVE-2023-31543 Advisory: A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.
what vulnarability does pipreqs version greather then equal to 0.3.0,less then 0.4.12 have
Having vulnarability PVE-2023-59290 Advisory: Piqueserver 1.1.0 includes fixes for potential Denial of Service vulnerabilities. https://github.com/piqueserver/piqueserver/pull/722
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does piqueserver version less then 1.1.0 have ### Response: Having vulnarability PVE-2023-59290 Advisory: Piqueserver 1.1.0 includes fixes for potential Denial of Service vulnerabilities. https://github.com/piqueserver/piqueserver/pull/722
what vulnarability does piqueserver version less then 1.1.0 have
Having vulnarability PVE-2021-34168 Advisory: pirate-get before 0.2.8 is not properly validating torrent file names. - https://github.com/vikstrous/pirate-get/issues/73
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pirate-get version less then 0.2.8 have ### Response: Having vulnarability PVE-2021-34168 Advisory: pirate-get before 0.2.8 is not properly validating torrent file names. - https://github.com/vikstrous/pirate-get/issues/73
what vulnarability does pirate-get version less then 0.2.8 have
Having vulnarability PVE-2021-42378 Advisory: Pirxcypinger 3.2 includes a fix for preventing abuse of URLs. https://github.com/PirxcyFinal/PirxcyPinger/commit/bc318987c5e8bf72bf4994ff797f09acce815fba
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pirxcypinger version less then 3.2 have ### Response: Having vulnarability PVE-2021-42378 Advisory: Pirxcypinger 3.2 includes a fix for preventing abuse of URLs. https://github.com/PirxcyFinal/PirxcyPinger/commit/bc318987c5e8bf72bf4994ff797f09acce815fba
what vulnarability does pirxcypinger version less then 3.2 have
Having vulnarability CVE-2021-41945 Advisory: Pjrpc 1.6.0 updates its dependency 'httpx' requirement to '^0.23.0' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pjrpc version less then 1.6.0 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Pjrpc 1.6.0 updates its dependency 'httpx' requirement to '^0.23.0' to include a security fix.
what vulnarability does pjrpc version less then 1.6.0 have
Having vulnarability PVE-2021-25962 Advisory: pkgcore 0.4.7.12 includes a security fix; force cwd to something controlled for ebuild env. This blocks an attack detailed in glsa 200810-02; namely that an ebuild invoking python -c (which looks in cwd for modules to load) allows for an attacker to slip something in.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pkgcore version less then 0.4.7.12 have ### Response: Having vulnarability PVE-2021-25962 Advisory: pkgcore 0.4.7.12 includes a security fix; force cwd to something controlled for ebuild env. This blocks an attack detailed in glsa 200810-02; namely that an ebuild invoking python -c (which looks in cwd for modules to load) allows for an attacker to slip something in.
what vulnarability does pkgcore version less then 0.4.7.12 have
Having vulnarability PVE-2022-45418 Advisory: Pkgutil is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pkgutil version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45418 Advisory: Pkgutil is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
what vulnarability does pkgutil version greather then 0,less then 0 have
Having vulnarability CVE-2021-20270 Advisory: Plaid2qif 1.3.6 updates its dependency 'pygments' to v2.7.4 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plaid2qif version less then 1.3.6 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Plaid2qif 1.3.6 updates its dependency 'pygments' to v2.7.4 to include security fixes.
what vulnarability does plaid2qif version less then 1.3.6 have
Having vulnarability CVE-2023-32303 Advisory: Planet 2.0.1 fixes a security issue where a secret file was being created with read access for other users on the machine. https://github.com/planetlabs/planet-client-python/commit/d71415a83119c5e89d7b80d5f940d162376ee3b7 https://github.com/planetlabs/planet-client-python/security/advisories/GHSA-j5fj-rfh6-qj85
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does planet version less then 2.0.1 have ### Response: Having vulnarability CVE-2023-32303 Advisory: Planet 2.0.1 fixes a security issue where a secret file was being created with read access for other users on the machine. https://github.com/planetlabs/planet-client-python/commit/d71415a83119c5e89d7b80d5f940d162376ee3b7 https://github.com/planetlabs/planet-client-python/security/advisories/GHSA-j5fj-rfh6-qj85
what vulnarability does planet version less then 2.0.1 have
Having vulnarability CVE-2023-32681 Advisory: Planetmint 2.4.6 updates its dependency 'requests' to v2.31.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does planetmint version less then 2.4.6 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Planetmint 2.4.6 updates its dependency 'requests' to v2.31.0 to include a security fix.
what vulnarability does planetmint version less then 2.4.6 have
Having vulnarability CVE-2023-28370 Advisory: Planetmint-driver 0.18.3 updates its dependency 'tornado' to version '6.3.2' to include a security fix. https://github.com/planetmint/planetmint-driver-python/commit/b492f3fd61f8514e82b1c0f06d64dfc21dc762d6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does planetmint-driver version less then 0.18.3 have ### Response: Having vulnarability CVE-2023-28370 Advisory: Planetmint-driver 0.18.3 updates its dependency 'tornado' to version '6.3.2' to include a security fix. https://github.com/planetmint/planetmint-driver-python/commit/b492f3fd61f8514e82b1c0f06d64dfc21dc762d6
what vulnarability does planetmint-driver version less then 0.18.3 have
Having vulnarability CVE-2023-32681 Advisory: Planetmint-driver 0.18.3 updates its dependency 'requests' to version '2.31.0' to include a security fix. https://github.com/planetmint/planetmint-driver-python/commit/050332d4c4121b304af1309e95c484cc9ec71947
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does planetmint-driver-python version less then 0.18.3 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Planetmint-driver 0.18.3 updates its dependency 'requests' to version '2.31.0' to include a security fix. https://github.com/planetmint/planetmint-driver-python/commit/050332d4c4121b304af1309e95c484cc9ec71947
what vulnarability does planetmint-driver-python version less then 0.18.3 have
Having vulnarability PVE-2021-37869 Advisory: platformio 4.1.0 fixes a security issue when extracting items from TAR archive - see https://github.com/platformio/platformio-core/issues/2995
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does platformio version less then 4.1.0 have ### Response: Having vulnarability PVE-2021-37869 Advisory: platformio 4.1.0 fixes a security issue when extracting items from TAR archive - see https://github.com/platformio/platformio-core/issues/2995
what vulnarability does platformio version less then 4.1.0 have
Having vulnarability PVE-2021-42829 Advisory: Plex-mpv-shim 1.10.01 upgrades to a newer MPV build for security reasons.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plex-mpv-shim version less then 1.10.01 have ### Response: Having vulnarability PVE-2021-42829 Advisory: Plex-mpv-shim 1.10.01 upgrades to a newer MPV build for security reasons.
what vulnarability does plex-mpv-shim version less then 1.10.01 have
Having vulnarability PVE-2023-60087 Advisory: Plexapi 4.3.0 includes a fix for a Race Condition vulnerability. https://github.com/pkkid/python-plexapi/pull/625
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plexapi version less then 4.3.0 have ### Response: Having vulnarability PVE-2023-60087 Advisory: Plexapi 4.3.0 includes a fix for a Race Condition vulnerability. https://github.com/pkkid/python-plexapi/pull/625
what vulnarability does plexapi version less then 4.3.0 have
Having vulnarability PVE-2021-25963 Advisory: plomino before 1.18 has a major vulnerability in open_url (now, targeted sources must be declared safe from an local package).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plomino version less then 1.18 have ### Response: Having vulnarability PVE-2021-25963 Advisory: plomino before 1.18 has a major vulnerability in open_url (now, targeted sources must be declared safe from an local package).
what vulnarability does plomino version less then 1.18 have
Having vulnarability CVE-2011-1340 Advisory: Cross-site scripting (XSS) vulnerability in skins/plone_templates/default_error_message.pt in Plone before 2.5.3 allows remote attackers to inject arbitrary web script or HTML via the type_name parameter to Members/ipa/createObject.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone version less then 2.5.3 have ### Response: Having vulnarability CVE-2011-1340 Advisory: Cross-site scripting (XSS) vulnerability in skins/plone_templates/default_error_message.pt in Plone before 2.5.3 allows remote attackers to inject arbitrary web script or HTML via the type_name parameter to Members/ipa/createObject.
what vulnarability does plone version less then 2.5.3 have
Having vulnarability CVE-2016-7137 Advisory: Plone.app.content 3.3.1 includes security hotfix 20160830 for folder factories redirection.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-content version less then 3.3.1 have ### Response: Having vulnarability CVE-2016-7137 Advisory: Plone.app.content 3.3.1 includes security hotfix 20160830 for folder factories redirection.
what vulnarability does plone-app-content version less then 3.3.1 have
Having vulnarability CVE-2016-4042 Advisory: Plone.app.contentlisting 1.2.5 removes docstrings from some methods to avoid publishing them. https://plone.org/security/hotfix/20160419/unauthorized-disclosure-of-site-content
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-contentlisting version less then 1.2.5 have ### Response: Having vulnarability CVE-2016-4042 Advisory: Plone.app.contentlisting 1.2.5 removes docstrings from some methods to avoid publishing them. https://plone.org/security/hotfix/20160419/unauthorized-disclosure-of-site-content
what vulnarability does plone-app-contentlisting version less then 1.2.5 have
Having vulnarability PVE-2021-26001 Advisory: Plone.app.contentmenu 1.1.7 escapes the title of the defaultpage in the DisplayMenu. This fixes a potential XSS vulnerability. https://github.com/plone/plone.app.contentmenu/commit/6d7d5d51c12c82fc0eeaded0841fc57d2258e9af
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-contentmenu version less then 1.1.7 have ### Response: Having vulnarability PVE-2021-26001 Advisory: Plone.app.contentmenu 1.1.7 escapes the title of the defaultpage in the DisplayMenu. This fixes a potential XSS vulnerability. https://github.com/plone/plone.app.contentmenu/commit/6d7d5d51c12c82fc0eeaded0841fc57d2258e9af
what vulnarability does plone-app-contentmenu version less then 1.1.7 have
Having vulnarability PVE-2021-26002 Advisory: Plone.app.contenttypes 1.2.15 fixes a possible cross site scripting (XSS) attack in lead image caption. https://github.com/plone/plone.app.contenttypes/commit/16f2c31cada65f7c969e4d314c70d39d1db01f17
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-contenttypes version less then 1.2.15 have ### Response: Having vulnarability PVE-2021-26002 Advisory: Plone.app.contenttypes 1.2.15 fixes a possible cross site scripting (XSS) attack in lead image caption. https://github.com/plone/plone.app.contenttypes/commit/16f2c31cada65f7c969e4d314c70d39d1db01f17
what vulnarability does plone-app-contenttypes version less then 1.2.15 have
Having vulnarability PVE-2021-39143 Advisory: The modeleditor in plone.app.dexterity 2.6.8 no longer resolves entities, and it removes processing instructions.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-dexterity version less then 2.6.8 have ### Response: Having vulnarability PVE-2021-39143 Advisory: The modeleditor in plone.app.dexterity 2.6.8 no longer resolves entities, and it removes processing instructions.
what vulnarability does plone-app-dexterity version less then 2.6.8 have
Having vulnarability PVE-2021-35864 Advisory: plone-app-discussion 2.4.14 fixes a possible cross site scripting (XSS) attack on moderate comments page.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-discussion version less then 2.4.14 have ### Response: Having vulnarability PVE-2021-35864 Advisory: plone-app-discussion 2.4.14 fixes a possible cross site scripting (XSS) attack on moderate comments page.
what vulnarability does plone-app-discussion version less then 2.4.14 have
Having vulnarability PVE-2021-26005 Advisory: Plone.app.event 3.0 fixes a possible cross site scripting (XSS) attack in location field. https://github.com/plone/plone.app.event/pull/233
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-event version less then 3.0 have ### Response: Having vulnarability PVE-2021-26005 Advisory: Plone.app.event 3.0 fixes a possible cross site scripting (XSS) attack in location field. https://github.com/plone/plone.app.event/pull/233
what vulnarability does plone-app-event version less then 3.0 have
Having vulnarability PVE-2021-41878 Advisory: Plone-app-layout version 2.5.1 adds CSRF tokens automatically for contentview urls.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-layout version less then 2.5.1 have ### Response: Having vulnarability PVE-2021-41878 Advisory: Plone-app-layout version 2.5.1 adds CSRF tokens automatically for contentview urls.
what vulnarability does plone-app-layout version less then 2.5.1 have
Having vulnarability CVE-2007-5741 Advisory: Plone-app-linkintegrity 1.0.2 includes a fix for CVE-2007-5741: Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes. https://github.com/plone/plone.app.linkintegrity/commit/4be49548c4f1046a8204030f26a603c29f38d9dd
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-linkintegrity version less then 1.0.2 have ### Response: Having vulnarability CVE-2007-5741 Advisory: Plone-app-linkintegrity 1.0.2 includes a fix for CVE-2007-5741: Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes. https://github.com/plone/plone.app.linkintegrity/commit/4be49548c4f1046a8204030f26a603c29f38d9dd
what vulnarability does plone-app-linkintegrity version less then 1.0.2 have
Having vulnarability PVE-2021-41938 Advisory: Plone-app-theming 4.1.6 doesn't resolves entities and removes processing instructions to avoid XXE attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-theming version less then 4.1.6 have ### Response: Having vulnarability PVE-2021-41938 Advisory: Plone-app-theming 4.1.6 doesn't resolves entities and removes processing instructions to avoid XXE attacks.
what vulnarability does plone-app-theming version less then 4.1.6 have
Having vulnarability CVE-2011-1950 Advisory: Plone-app-users before 1.0.5 does not check for permission when editing other users' profiles. This fixes http://dev.plone.org/plone/ticket/11842 and http://plone.org/products/plone/security/advisories/CVE-2011-1950.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-users version less then 1.0.5 have ### Response: Having vulnarability CVE-2011-1950 Advisory: Plone-app-users before 1.0.5 does not check for permission when editing other users' profiles. This fixes http://dev.plone.org/plone/ticket/11842 and http://plone.org/products/plone/security/advisories/CVE-2011-1950.
what vulnarability does plone-app-users version less then 1.0.5 have
Having vulnarability PVE-2022-52116 Advisory: Plone.app.workflow 1.1.0 protects the "sharing" form against CSRF attacks. https://github.com/plone/plone.app.workflow/commit/c2e300e52bb7b3ffad03c09afb42f441d58eec15
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-workflow version less then 1.1.0 have ### Response: Having vulnarability PVE-2022-52116 Advisory: Plone.app.workflow 1.1.0 protects the "sharing" form against CSRF attacks. https://github.com/plone/plone.app.workflow/commit/c2e300e52bb7b3ffad03c09afb42f441d58eec15
what vulnarability does plone-app-workflow version less then 1.1.0 have
Having vulnarability PVE-2021-42026 Advisory: Plone-app-z3cform version 0.5.4 makes LookupErrors no longer visible to improve security.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-app-z3cform version less then 0.5.4 have ### Response: Having vulnarability PVE-2021-42026 Advisory: Plone-app-z3cform version 0.5.4 makes LookupErrors no longer visible to improve security.
what vulnarability does plone-app-z3cform version less then 0.5.4 have
Having vulnarability PVE-2021-26007 Advisory: plone.dexterity 2.3.0 fixes a security issue. Attribute access to schema fields can be protected. This worked for direct schemas, but was not implemented for permissions coming from behaviors.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-dexterity version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-26007 Advisory: plone.dexterity 2.3.0 fixes a security issue. Attribute access to schema fields can be protected. This worked for direct schemas, but was not implemented for permissions coming from behaviors.
what vulnarability does plone-dexterity version less then 2.3.0 have
Having vulnarability PVE-2021-37107 Advisory: Plone.memoize 1.0.3 no longer uses hash() when making cache keys. This is to avoid cache collisions, and to avoid a potential security problem where an attacker could manually craft collisions. Also, the use of hash() is no longer recommended in tests. https://github.com/plone/plone.memoize/commit/66648a2e9ff2932e3a1bc4b5da88160602653531
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-memoize version less then 1.0.3 have ### Response: Having vulnarability PVE-2021-37107 Advisory: Plone.memoize 1.0.3 no longer uses hash() when making cache keys. This is to avoid cache collisions, and to avoid a potential security problem where an attacker could manually craft collisions. Also, the use of hash() is no longer recommended in tests. https://github.com/plone/plone.memoize/commit/66648a2e9ff2932e3a1bc4b5da88160602653531
what vulnarability does plone-memoize version less then 1.0.3 have
Having vulnarability PVE-2021-26009 Advisory: Plone.mockup before 2.1.3 is vulnerable to a XSS attack in structure and relateditem pattern. https://github.com/plone/mockup/pull/627
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-mockup version less then 2.1.3 have ### Response: Having vulnarability PVE-2021-26009 Advisory: Plone.mockup before 2.1.3 is vulnerable to a XSS attack in structure and relateditem pattern. https://github.com/plone/mockup/pull/627
what vulnarability does plone-mockup version less then 2.1.3 have
Having vulnarability CVE-2021-33507 Advisory: Plone.namedfile 5.5.0 prevents stored XSS from file upload (svg, html) by implementing an allowlist of trusted mimetypes. https://github.com/plone/plone.namedfile/commit/37b9b7f29b0f804df622db9502abae28f3eccf38 https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-namedfile version less then 5.5.0 have ### Response: Having vulnarability CVE-2021-33507 Advisory: Plone.namedfile 5.5.0 prevents stored XSS from file upload (svg, html) by implementing an allowlist of trusted mimetypes. https://github.com/plone/plone.namedfile/commit/37b9b7f29b0f804df622db9502abae28f3eccf38 https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots
what vulnarability does plone-namedfile version less then 5.5.0 have
Having vulnarability CVE-2012-5508 Advisory: Plone.openid 2.0.2 uses system random when available to fix CVE-2012-5508.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-openid version less then 2.0.2 have ### Response: Having vulnarability CVE-2012-5508 Advisory: Plone.openid 2.0.2 uses system random when available to fix CVE-2012-5508.
what vulnarability does plone-openid version less then 2.0.2 have
Having vulnarability PVE-2017-47716 Advisory: Plone.portlet.collection 2.0.4 fixes a flaw that allowed users without view permissions for the collection to see the Portlet. https://github.com/plone/plone.portlet.collection/commit/acaef557bdd904aaccc9da71bd3febc2c28c5d19
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-portlet-collection version less then 2.0.4 have ### Response: Having vulnarability PVE-2017-47716 Advisory: Plone.portlet.collection 2.0.4 fixes a flaw that allowed users without view permissions for the collection to see the Portlet. https://github.com/plone/plone.portlet.collection/commit/acaef557bdd904aaccc9da71bd3febc2c28c5d19
what vulnarability does plone-portlet-collection version less then 2.0.4 have
Having vulnarability PVE-2021-40232 Advisory: Plone.portlet.static 1.2 starts to ensure that text output is passed through the 'safe-html' transform to protect against malicious text.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-portlet-static version less then 1.2 have ### Response: Having vulnarability PVE-2021-40232 Advisory: Plone.portlet.static 1.2 starts to ensure that text output is passed through the 'safe-html' transform to protect against malicious text.
what vulnarability does plone-portlet-static version less then 1.2 have