output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability CVE-2017-8807 Advisory: Plone.recipe.varnish 6.0.0b1 sets as default version Varnish Cache 6.0.4. It includes several security fixes compared to Varnish Cache 5.x versions. https://github.com/collective/plone.recipe.varnish/pull/75/files
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-recipe-varnish version less then 6.0.0b1 have ### Response: Having vulnarability CVE-2017-8807 Advisory: Plone.recipe.varnish 6.0.0b1 sets as default version Varnish Cache 6.0.4. It includes several security fixes compared to Varnish Cache 5.x versions. https://github.com/collective/plone.recipe.varnish/pull/75/files
what vulnarability does plone-recipe-varnish version less then 6.0.0b1 have
Having vulnarability PVE-2024-69616 Advisory: Some versions of Plone suffer from a stored cross-site scripting (XSS) vulnerability specifically associated with the upload and use of SVG images as user portraits. This flaw doesn't affect pages using SVG images within image tags; the vulnerability only manifests when an attacker uploads a malicious SVG file as a user portrait and then persuades another user to click a link directing to this portrait. While a remedy will be included in a forthcoming update for `plone.restapi`, which applies to certain versions of Plone, for earlier versions not supporting a specific endpoint, there's a related fix linking to a different component. To mitigate the risk temporarily, one option includes removing the portrait field from user profiles and deleting any existing portraits in the database, although this approach may be considered somewhat extreme.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-restapi version greather then equal to 8.0.0,less then 8.43.3 have ### Response: Having vulnarability PVE-2024-69616 Advisory: Some versions of Plone suffer from a stored cross-site scripting (XSS) vulnerability specifically associated with the upload and use of SVG images as user portraits. This flaw doesn't affect pages using SVG images within image tags; the vulnerability only manifests when an attacker uploads a malicious SVG file as a user portrait and then persuades another user to click a link directing to this portrait. While a remedy will be included in a forthcoming update for `plone.restapi`, which applies to certain versions of Plone, for earlier versions not supporting a specific endpoint, there's a related fix linking to a different component. To mitigate the risk temporarily, one option includes removing the portrait field from user profiles and deleting any existing portraits in the database, although this approach may be considered somewhat extreme.
what vulnarability does plone-restapi version greather then equal to 8.0.0,less then 8.43.3 have
Having vulnarability PVE-2022-45180 Advisory: Plone.session 2.1 protects the setupSession call with the ManageUsers permission to fix a possible privilege escalation. https://github.com/plone/plone.session/commit/66b97c7402c10a8ab2131b69b7ba85ab7b4f9592
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-session version less then 2.1 have ### Response: Having vulnarability PVE-2022-45180 Advisory: Plone.session 2.1 protects the setupSession call with the ManageUsers permission to fix a possible privilege escalation. https://github.com/plone/plone.session/commit/66b97c7402c10a8ab2131b69b7ba85ab7b4f9592
what vulnarability does plone-session version less then 2.1 have
Having vulnarability PVE-2021-39141 Advisory: Plone.supermodel 1.6.3 no longer resolves entities in the xml parser. It also removes processing instructions. These are both security enhancements.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-supermodel version less then 1.6.3 have ### Response: Having vulnarability PVE-2021-39141 Advisory: Plone.supermodel 1.6.3 no longer resolves entities in the xml parser. It also removes processing instructions. These are both security enhancements.
what vulnarability does plone-supermodel version less then 1.6.3 have
Having vulnarability PVE-2021-37035 Advisory: Plone.z3cform 0.5.9 fixes a security problem in the "widget" namespace. https://github.com/plone/plone.z3cform/commit/a4eadb65b1db0b91bbeea808fed0da8fde069f05
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone-z3cform version less then 0.5.9 have ### Response: Having vulnarability PVE-2021-37035 Advisory: Plone.z3cform 0.5.9 fixes a security problem in the "widget" namespace. https://github.com/plone/plone.z3cform/commit/a4eadb65b1db0b91bbeea808fed0da8fde069f05
what vulnarability does plone-z3cform version less then 0.5.9 have
Having vulnarability PVE-2023-57538 Advisory: Plone.app.portlets 5.0.0a2 and 4.4.7 include a security fix: Blind SSRF via feedparser accessing an internal URL. https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url https://github.com/plone/plone.app.portlets/pull/150
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone.app.portlets version equal to 5.0.0a1,less then 4.4.7 have ### Response: Having vulnarability PVE-2023-57538 Advisory: Plone.app.portlets 5.0.0a2 and 4.4.7 include a security fix: Blind SSRF via feedparser accessing an internal URL. https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url https://github.com/plone/plone.app.portlets/pull/150
what vulnarability does plone.app.portlets version equal to 5.0.0a1,less then 4.4.7 have
Having vulnarability CVE-2023-41048 Advisory: Plone.namedfile 5.6.1, 6.0.3, 6.1.3 and 6.2.1 include a fix for CVE-2023-41048: Stored Cross Site Scripting with SVG images. https://github.com/plone/plone.namedfile/security/advisories/GHSA-jj7c-jrv4-c65x
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone.namedfile version less then 5.6.1,greather then equal to 6.0.0a1,less then 6.0.3,greather then equal to 6.1.0a1,less then 6.1.3,greather then equal to 6.2.0a1,less then 6.2.1 have ### Response: Having vulnarability CVE-2023-41048 Advisory: Plone.namedfile 5.6.1, 6.0.3, 6.1.3 and 6.2.1 include a fix for CVE-2023-41048: Stored Cross Site Scripting with SVG images. https://github.com/plone/plone.namedfile/security/advisories/GHSA-jj7c-jrv4-c65x
what vulnarability does plone.namedfile version less then 5.6.1,greather then equal to 6.0.0a1,less then 6.0.3,greather then equal to 6.1.0a1,less then 6.1.3,greather then equal to 6.2.0a1,less then 6.2.1 have
Having vulnarability CVE-2023-42457 Advisory: Plone.rest 2.0.1 and 3.0.1 include a fix for CVE-2023-42457: Denial of Service when ++api++ is used many times. https://github.com/plone/plone.rest/security/advisories/GHSA-h6rp-mprm-xgcq
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone.rest version greather then equal to 2.0.0a1,less then 2.0.1,equal to 3.0.0 have ### Response: Having vulnarability CVE-2023-42457 Advisory: Plone.rest 2.0.1 and 3.0.1 include a fix for CVE-2023-42457: Denial of Service when ++api++ is used many times. https://github.com/plone/plone.rest/security/advisories/GHSA-h6rp-mprm-xgcq
what vulnarability does plone.rest version greather then equal to 2.0.0a1,less then 2.0.1,equal to 3.0.0 have
Having vulnarability CVE-2023-42458 Advisory: Plone.restapi 8.43.3 includes a fix for CVE-2023-42458: Stored Cross Site Scripting with SVG image in user portrait. https://github.com/plone/plone.restapi/security/advisories/GHSA-hc5c-r8m5-2gfh
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone.restapi version less then 8.43.3 have ### Response: Having vulnarability CVE-2023-42458 Advisory: Plone.restapi 8.43.3 includes a fix for CVE-2023-42458: Stored Cross Site Scripting with SVG image in user portrait. https://github.com/plone/plone.restapi/security/advisories/GHSA-hc5c-r8m5-2gfh
what vulnarability does plone.restapi version less then 8.43.3 have
Having vulnarability CVE-2015-9251 Advisory: Plone.staticresources 1.3.0 adds jQuery workaround for XSS vulnerability. https://github.com/plone/plone.staticresources/commit/bcd286de96d1f1431299f603ef273189a58db379
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plone.staticresources version less then 1.3.0 have ### Response: Having vulnarability CVE-2015-9251 Advisory: Plone.staticresources 1.3.0 adds jQuery workaround for XSS vulnerability. https://github.com/plone/plone.staticresources/commit/bcd286de96d1f1431299f603ef273189a58db379
what vulnarability does plone.staticresources version less then 1.3.0 have
Having vulnarability CVE-2017-1000006 Advisory: Plotly 1.12.6 includes Plotly.js v1.16.2, which fixes a potential XSS vulnerability in 'text' fields. https://github.com/plotly/plotly.js/pull/736 https://plotly.com/chart-studio-help/security-advisories/2016-08-08-plotlyjs-xss-advisory/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plotly version less then 1.12.6 have ### Response: Having vulnarability CVE-2017-1000006 Advisory: Plotly 1.12.6 includes Plotly.js v1.16.2, which fixes a potential XSS vulnerability in 'text' fields. https://github.com/plotly/plotly.js/pull/736 https://plotly.com/chart-studio-help/security-advisories/2016-08-08-plotlyjs-xss-advisory/
what vulnarability does plotly version less then 1.12.6 have
Having vulnarability PVE-2021-39026 Advisory: Plugwise 0.8.2 improves the security by switching from lxml to defusedxml.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plugwise version less then 0.8.2 have ### Response: Having vulnarability PVE-2021-39026 Advisory: Plugwise 0.8.2 improves the security by switching from lxml to defusedxml.
what vulnarability does plugwise version less then 0.8.2 have
Having vulnarability CVE-2011-1949 Advisory: Plumi.app 4.2 includes security hotfix 20110531. It contains patches for XSS and privilege escalation vulnerabilities. https://plone.org/security/hotfix/20110531
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plumi-app version less then 4.2 have ### Response: Having vulnarability CVE-2011-1949 Advisory: Plumi.app 4.2 includes security hotfix 20110531. It contains patches for XSS and privilege escalation vulnerabilities. https://plone.org/security/hotfix/20110531
what vulnarability does plumi-app version less then 4.2 have
Having vulnarability CVE-2020-14343 Advisory: Plumpy 0.20.0 updates its dependency "Pyyaml" to a secure version (>=5.4).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plumpy version less then 0.20.0 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Plumpy 0.20.0 updates its dependency "Pyyaml" to a secure version (>=5.4).
what vulnarability does plumpy version less then 0.20.0 have
Having vulnarability PVE-2021-38323 Advisory: Plusminus 0.3.0 has been hardened against some possible attacks, using deep expression nesting or formula references.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does plusminus version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-38323 Advisory: Plusminus 0.3.0 has been hardened against some possible attacks, using deep expression nesting or formula references.
what vulnarability does plusminus version less then 0.3.0 have
Having vulnarability CVE-2021-23437 Advisory: Pm4py 2.2.13.1 updates its dependency 'pillow' to v8.3.2 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pm4py version less then 2.2.13.1 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Pm4py 2.2.13.1 updates its dependency 'pillow' to v8.3.2 to include security fixes.
what vulnarability does pm4py version less then 2.2.13.1 have
Having vulnarability PVE-2022-47820 Advisory: Pmpo is a malicious package, typosquatting. https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pmpo version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47820 Advisory: Pmpo is a malicious package, typosquatting. https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library
what vulnarability does pmpo version greather then 0,less then 0 have
Having vulnarability PVE-2021-26014 Advisory: pmr2.oauth before 0.4.2 is vulnerable to CSRF attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pmr2-oauth version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-26014 Advisory: pmr2.oauth before 0.4.2 is vulnerable to CSRF attacks.
what vulnarability does pmr2-oauth version less then 0.4.2 have
Having vulnarability CVE-2021-28363 Advisory: Pocketsnack 3.2.1 updates its dependency 'urllib3' to v1.26.5 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pocketsnack version less then 3.2.1 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Pocketsnack 3.2.1 updates its dependency 'urllib3' to v1.26.5 to include security fixes.
what vulnarability does pocketsnack version less then 3.2.1 have
Having vulnarability PVE-2023-55077 Advisory: Pod5 0.1.19 includes a version of pod5 core that fixes a crash when uploading malicious files. https://github.com/nanoporetech/pod5-file-format/commit/c57e978badc670b6c918a0f8b5ebf480ba813284
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pod5 version less then 0.1.19 have ### Response: Having vulnarability PVE-2023-55077 Advisory: Pod5 0.1.19 includes a version of pod5 core that fixes a crash when uploading malicious files. https://github.com/nanoporetech/pod5-file-format/commit/c57e978badc670b6c918a0f8b5ebf480ba813284
what vulnarability does pod5 version less then 0.1.19 have
Having vulnarability CVE-2019-7548 Advisory: Podder-task-base 0.4.0 updates its dependency 'SQLAlchemy' to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does podder-task-base version less then 0.4.0 have ### Response: Having vulnarability CVE-2019-7548 Advisory: Podder-task-base 0.4.0 updates its dependency 'SQLAlchemy' to include security fixes.
what vulnarability does podder-task-base version less then 0.4.0 have
Having vulnarability CVE-2022-36070 Advisory: Poetry 1.1.9 includes a fix for CVE-2022-36070: To handle dependencies that come from a Git repository, Poetry executes various commands, e.g. 'git config'. These commands are being executed using the executable’s name and not its absolute path. This can lead to the execution of untrusted code due to the way Windows resolves executable names to paths. Unlike Linux-based operating systems, Windows searches for the executable in the current directory first and looks in the paths that are defined in the 'PATH' environment variable afterward. This vulnerability can lead to Arbitrary Code Execution, which would lead to the takeover of the system. If a developer is exploited, the attacker could steal credentials or persist their access. If the exploit happens on a server, the attackers could use their access to attack other internal systems. Since this vulnerability requires a fair amount of user interaction, it is not as dangerous as a remotely exploitable one. However, it still puts developers at risk when dealing with untrusted files in a way they think is safe. The victim could also not protect themself by vetting any Git or Poetry config files that might be present in the directory, because the behavior is undocumented. https://github.com/python-poetry/poetry/security/advisories/GHSA-j4j9-7hg9-97g6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does poetry version less then 1.1.9 have ### Response: Having vulnarability CVE-2022-36070 Advisory: Poetry 1.1.9 includes a fix for CVE-2022-36070: To handle dependencies that come from a Git repository, Poetry executes various commands, e.g. 'git config'. These commands are being executed using the executable’s name and not its absolute path. This can lead to the execution of untrusted code due to the way Windows resolves executable names to paths. Unlike Linux-based operating systems, Windows searches for the executable in the current directory first and looks in the paths that are defined in the 'PATH' environment variable afterward. This vulnerability can lead to Arbitrary Code Execution, which would lead to the takeover of the system. If a developer is exploited, the attacker could steal credentials or persist their access. If the exploit happens on a server, the attackers could use their access to attack other internal systems. Since this vulnerability requires a fair amount of user interaction, it is not as dangerous as a remotely exploitable one. However, it still puts developers at risk when dealing with untrusted files in a way they think is safe. The victim could also not protect themself by vetting any Git or Poetry config files that might be present in the directory, because the behavior is undocumented. https://github.com/python-poetry/poetry/security/advisories/GHSA-j4j9-7hg9-97g6
what vulnarability does poetry version less then 1.1.9 have
Having vulnarability CVE-2018-18074 Advisory: Pokedex.py 1.1.2 updates 'requests' package to version >=2.20.0 to fix an information exposure vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pokedex-py version less then 1.1.2 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Pokedex.py 1.1.2 updates 'requests' package to version >=2.20.0 to fix an information exposure vulnerability.
what vulnarability does pokedex-py version less then 1.1.2 have
Having vulnarability CVE-2020-11888 Advisory: Polemarch 1.7.4 updates its dependency 'markdown2' to version '2.3.9' to include a fix for a XSS vulnerability. https://github.com/vstconsulting/polemarch/commit/0f4c7171447a2cdd41a9cb3c272135e5767e4309 https://github.com/advisories/GHSA-fv3h-8x5j-pvgq
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does polemarch version less then 1.7.4 have ### Response: Having vulnarability CVE-2020-11888 Advisory: Polemarch 1.7.4 updates its dependency 'markdown2' to version '2.3.9' to include a fix for a XSS vulnerability. https://github.com/vstconsulting/polemarch/commit/0f4c7171447a2cdd41a9cb3c272135e5767e4309 https://github.com/advisories/GHSA-fv3h-8x5j-pvgq
what vulnarability does polemarch version less then 1.7.4 have
Having vulnarability CVE-2021-21354 Advisory: Pollbot is open source software which "frees its human masters from the toilsome task of polling for the state of things during the Firefox release process." In Pollbot before version 1.4.4 there is an open redirection vulnerability in the path of "https://pollbot.services.mozilla.com/". An attacker can redirect anyone to malicious sites. To Reproduce type in this URL: "https://pollbot.services.mozilla.com//evil.com/". Affected versions will redirect to that website when you inject a payload like "//evil.com/". This is fixed in version 1.4.4.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pollbot version less then 1.4.4 have ### Response: Having vulnarability CVE-2021-21354 Advisory: Pollbot is open source software which "frees its human masters from the toilsome task of polling for the state of things during the Firefox release process." In Pollbot before version 1.4.4 there is an open redirection vulnerability in the path of "https://pollbot.services.mozilla.com/". An attacker can redirect anyone to malicious sites. To Reproduce type in this URL: "https://pollbot.services.mozilla.com//evil.com/". Affected versions will redirect to that website when you inject a payload like "//evil.com/". This is fixed in version 1.4.4.
what vulnarability does pollbot version less then 1.4.4 have
Having vulnarability CVE-2018-16487 Advisory: Polyaxon 0.4.1 updates its NPM dependency 'lodash' to v4.17.11 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does polyaxon version less then 0.4.1 have ### Response: Having vulnarability CVE-2018-16487 Advisory: Polyaxon 0.4.1 updates its NPM dependency 'lodash' to v4.17.11 to include security fixes.
what vulnarability does polyaxon version less then 0.4.1 have
Having vulnarability CVE-2019-17514 Advisory: Polylatlib version 1.0.2 updates its required Python version to ^3.9, moving from the previously required ^3.8, in response to the security issue CVE-2019-17514. https://github.com/RexGreenway/PolyLatLib/commit/ca181eca306b1d6c1ad3d6a87fa94878ab52a43b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does polylatlib version less then 1.0.2 have ### Response: Having vulnarability CVE-2019-17514 Advisory: Polylatlib version 1.0.2 updates its required Python version to ^3.9, moving from the previously required ^3.8, in response to the security issue CVE-2019-17514. https://github.com/RexGreenway/PolyLatLib/commit/ca181eca306b1d6c1ad3d6a87fa94878ab52a43b
what vulnarability does polylatlib version less then 1.0.2 have
Having vulnarability CVE-2021-20270 Advisory: Polymatheia 0.3.1 updates its dependency 'pygments' to v2.7.4 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does polymatheia version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Polymatheia 0.3.1 updates its dependency 'pygments' to v2.7.4 to include security fixes.
what vulnarability does polymatheia version less then 0.3.1 have
Having vulnarability CVE-2021-21330 Advisory: Polyswarm-client 2.11.7 updates its dependency 'aiohttp' to v3.7.4 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does polyswarm-client version less then 2.11.7 have ### Response: Having vulnarability CVE-2021-21330 Advisory: Polyswarm-client 2.11.7 updates its dependency 'aiohttp' to v3.7.4 to include a security fix.
what vulnarability does polyswarm-client version less then 2.11.7 have
Having vulnarability PVE-2021-26015 Advisory: poorwsgi 1.0.2 includes several security related enhancements related to secret key generation.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does poorwsgi version less then 1.0.2 have ### Response: Having vulnarability PVE-2021-26015 Advisory: poorwsgi 1.0.2 includes several security related enhancements related to secret key generation.
what vulnarability does poorwsgi version less then 1.0.2 have
Having vulnarability PVE-2021-34890 Advisory: Pootle 2.8.0 fixes several XSS vulnerabilities. https://github.com/translate/pootle/pull/4686
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pootle version less then 2.8.0 have ### Response: Having vulnarability PVE-2021-34890 Advisory: Pootle 2.8.0 fixes several XSS vulnerabilities. https://github.com/translate/pootle/pull/4686
what vulnarability does pootle version less then 2.8.0 have
Having vulnarability CVE-2021-44228 Advisory: Portablemc 2.2.0 fixes indirectly a Log4j related vulnerability with changes on the version manifest management. https://github.com/mindstorm38/portablemc/issues/52
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does portablemc version less then 2.2.0 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Portablemc 2.2.0 fixes indirectly a Log4j related vulnerability with changes on the version manifest management. https://github.com/mindstorm38/portablemc/issues/52
what vulnarability does portablemc version less then 2.2.0 have
Having vulnarability CVE-2023-37920 Advisory: Portabletab version 0.3.3.post1 has updated its certifi dependency from version 2022.12.7 to 2024.2 in response to CVE-2023-37920.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does portabletab version less then 0.3.3.post1 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Portabletab version 0.3.3.post1 has updated its certifi dependency from version 2022.12.7 to 2024.2 in response to CVE-2023-37920.
what vulnarability does portabletab version less then 0.3.3.post1 have
Having vulnarability CVE-2013-2100 Advisory: The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a crafted certificate.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does portage version less then 2.1.12 have ### Response: Having vulnarability CVE-2013-2100 Advisory: The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a crafted certificate.
what vulnarability does portage version less then 2.1.12 have
Having vulnarability CVE-2020-7788 Advisory: Portray 1.6.0 updates the minimum version of the 'mkdocs-material' to 7.0.0 to address a security concerns in earlier versions.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does portray version less then 1.6.0 have ### Response: Having vulnarability CVE-2020-7788 Advisory: Portray 1.6.0 updates the minimum version of the 'mkdocs-material' to 7.0.0 to address a security concerns in earlier versions.
what vulnarability does portray version less then 1.6.0 have
Having vulnarability CVE-2019-16791 Advisory: In postfix-mta-sts-resolver before 0.5.1, All users can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does postfix-mta-sts-resolver version less then 0.5.1 have ### Response: Having vulnarability CVE-2019-16791 Advisory: In postfix-mta-sts-resolver before 0.5.1, All users can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.
what vulnarability does postfix-mta-sts-resolver version less then 0.5.1 have
Having vulnarability CVE-2018-25088 Advisory: A vulnerability, which was classified as critical, was found in Blue Yonder postgraas_server up to 2.0.0b2. Affected is the function _create_pg_connection/create_postgres_db of the file postgraas_server/backends/postgres_cluster/postgres_cluster_driver.py of the component PostgreSQL Backend Handler. The manipulation leads to sql injection. Upgrading to version 2.0.0 can address this issue. The patch is identified as 7cd8d016edc74a78af0d81c948bfafbcc93c937c. It is recommended to upgrade the affected component. VDB-234246 is the identifier assigned to this vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does postgraas-server version less then 2.0.0 have ### Response: Having vulnarability CVE-2018-25088 Advisory: A vulnerability, which was classified as critical, was found in Blue Yonder postgraas_server up to 2.0.0b2. Affected is the function _create_pg_connection/create_postgres_db of the file postgraas_server/backends/postgres_cluster/postgres_cluster_driver.py of the component PostgreSQL Backend Handler. The manipulation leads to sql injection. Upgrading to version 2.0.0 can address this issue. The patch is identified as 7cd8d016edc74a78af0d81c948bfafbcc93c937c. It is recommended to upgrade the affected component. VDB-234246 is the identifier assigned to this vulnerability.
what vulnarability does postgraas-server version less then 2.0.0 have
Having vulnarability CVE-2021-40347 Advisory: An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does postorius version less then 1.3.5 have ### Response: Having vulnarability CVE-2021-40347 Advisory: An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place.
what vulnarability does postorius version less then 1.3.5 have
Having vulnarability CVE-2017-18342 Advisory: Posty 2.1.0 includes a security patch for the function 'from_yaml' in 'posty/post.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/nickpegg/posty/commit/d2f3fbd15cc685c425aaa3edc4a113c4218674ef
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does posty version less then 2.1.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Posty 2.1.0 includes a security patch for the function 'from_yaml' in 'posty/post.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/nickpegg/posty/commit/d2f3fbd15cc685c425aaa3edc4a113c4218674ef
what vulnarability does posty version less then 2.1.0 have
Having vulnarability PVE-2024-63525 Advisory: Power-grid-model 1.2.50 addresses a critical security vulnerability linked to the use of regular expressions for parsing node references. It could have led to an exponential increase in computational complexity, potentially exposing the system to Denial of Service (DoS) attacks. The update discontinues the use of regex for node reference parsing and replaces it with Python functions, ensuring uniformity and readability throughout the codebase. This change significantly reduces the risk of ReDoS attacks and enhances the overall security of the system. https://github.com/PowerGridModel/power-grid-model-io/pull/201
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does power-grid-model version less then 1.2.50 have ### Response: Having vulnarability PVE-2024-63525 Advisory: Power-grid-model 1.2.50 addresses a critical security vulnerability linked to the use of regular expressions for parsing node references. It could have led to an exponential increase in computational complexity, potentially exposing the system to Denial of Service (DoS) attacks. The update discontinues the use of regex for node reference parsing and replaces it with Python functions, ensuring uniformity and readability throughout the codebase. This change significantly reduces the risk of ReDoS attacks and enhances the overall security of the system. https://github.com/PowerGridModel/power-grid-model-io/pull/201
what vulnarability does power-grid-model version less then 1.2.50 have
Having vulnarability PVE-2023-61694 Advisory: Power-grid-model-io 1.2.50 includes a fix for a potential ReDOS vulnerability. https://github.com/PowerGridModel/power-grid-model-io/pull/201
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does power-grid-model-io version less then 1.2.50 have ### Response: Having vulnarability PVE-2023-61694 Advisory: Power-grid-model-io 1.2.50 includes a fix for a potential ReDOS vulnerability. https://github.com/PowerGridModel/power-grid-model-io/pull/201
what vulnarability does power-grid-model-io version less then 1.2.50 have
Having vulnarability CVE-2022-42906 Advisory: powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001. Affected functions: powerline_gitstatus.segments.GitStatusSegment.get_base_command
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does powerline-gitstatus version greather then equal to 0,less then 1.3.2 have ### Response: Having vulnarability CVE-2022-42906 Advisory: powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001. Affected functions: powerline_gitstatus.segments.GitStatusSegment.get_base_command
what vulnarability does powerline-gitstatus version greather then equal to 0,less then 1.3.2 have
Having vulnarability CVE-2022-23491 Advisory: Powermolecli 1.0.10 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does powermolecli version less then 1.0.10 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Powermolecli 1.0.10 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
what vulnarability does powermolecli version less then 1.0.10 have
Having vulnarability CVE-2022-23491 Advisory: Powermolegui 0.2.10 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does powermolegui version less then 0.2.10 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Powermolegui 0.2.10 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
what vulnarability does powermolegui version less then 0.2.10 have
Having vulnarability CVE-2022-23491 Advisory: Powermolelib 3.4.3 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does powermolelib version less then 3.4.3 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Powermolelib 3.4.3 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
what vulnarability does powermolelib version less then 3.4.3 have
Having vulnarability CVE-2017-18342 Advisory: Ppgan 0.1.3 includes a security patch for the function 'init' in 'ppgan/apps/first_order_predictor.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/PaddlePaddle/PaddleGAN/commit/b4f066016ba664b84a55d7894e554db771995187#diff-ea93fd79db0cbeaf277ce407386f1a8a5b7446fd0955294d922165b739eb2e52
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ppgan version less then 0.1.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Ppgan 0.1.3 includes a security patch for the function 'init' in 'ppgan/apps/first_order_predictor.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/PaddlePaddle/PaddleGAN/commit/b4f066016ba664b84a55d7894e554db771995187#diff-ea93fd79db0cbeaf277ce407386f1a8a5b7446fd0955294d922165b739eb2e52
what vulnarability does ppgan version less then 0.1.3 have
Having vulnarability PVE-2022-45456 Advisory: Pptest is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pptest version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45456 Advisory: Pptest is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
what vulnarability does pptest version greather then 0,less then 0 have
Having vulnarability CVE-2023-35934 Advisory: Pragy-dl version 2023.07.06 introduces changes due to CVE-2023-35934: The `--add-header Cookie:` option is deprecated and automatically restricted to the domains of input URLs. Additionally, cookies passed to external downloaders are now scoped, and the `cookies` field has been added to info.json. The `http_headers.Cookie` field is now deprecated to enhance security and compliance.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pragy-dl version less then 2023.07.06 have ### Response: Having vulnarability CVE-2023-35934 Advisory: Pragy-dl version 2023.07.06 introduces changes due to CVE-2023-35934: The `--add-header Cookie:` option is deprecated and automatically restricted to the domains of input URLs. Additionally, cookies passed to external downloaders are now scoped, and the `cookies` field has been added to info.json. The `http_headers.Cookie` field is now deprecated to enhance security and compliance.
what vulnarability does pragy-dl version less then 2023.07.06 have
Having vulnarability CVE-2017-18342 Advisory: Pre-commit 1.10.4 replaces 'yaml.load' with safe alternative to avoid a remote code execution vulnerability. https://github.com/pre-commit/pre-commit/commit/6853f4aa4c8d7e411839bacc66876baea443186a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pre-commit version less then 1.10.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Pre-commit 1.10.4 replaces 'yaml.load' with safe alternative to avoid a remote code execution vulnerability. https://github.com/pre-commit/pre-commit/commit/6853f4aa4c8d7e411839bacc66876baea443186a
what vulnarability does pre-commit version less then 1.10.4 have
Having vulnarability PVE-2022-51811 Advisory: Prefect 0.12.5 removes passwords from Postgres tasks' initialization methods to avoid sensitive information exposure. https://github.com/PrefectHQ/prefect/issues/1345
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prefect version less then 0.12.5 have ### Response: Having vulnarability PVE-2022-51811 Advisory: Prefect 0.12.5 removes passwords from Postgres tasks' initialization methods to avoid sensitive information exposure. https://github.com/PrefectHQ/prefect/issues/1345
what vulnarability does prefect version less then 0.12.5 have
Having vulnarability PVE-2022-52186 Advisory: Prefect-azure 0.2.3 uses secure ACI environment variable for PREFECT_API_KEY to avoid a sensitive information disclosure vulnerability. https://github.com/PrefectHQ/prefect-azure/pull/57
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prefect-azure version less then 0.2.3 have ### Response: Having vulnarability PVE-2022-52186 Advisory: Prefect-azure 0.2.3 uses secure ACI environment variable for PREFECT_API_KEY to avoid a sensitive information disclosure vulnerability. https://github.com/PrefectHQ/prefect-azure/pull/57
what vulnarability does prefect-azure version less then 0.2.3 have
Having vulnarability CVE-2017-18342 Advisory: Press 0.5.8 includes a fix for the function 'configuration_from_yaml' in 'press/configuration/util.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/jr0d/press/commit/c641f54ed39d1c3a335cd967954760ede9454052#diff-482d133cd7fc1e6dde3facc3af875192a5f8397fa3054ff21956c05e1138f26f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does press version less then 0.5.8 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Press 0.5.8 includes a fix for the function 'configuration_from_yaml' in 'press/configuration/util.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/jr0d/press/commit/c641f54ed39d1c3a335cd967954760ede9454052#diff-482d133cd7fc1e6dde3facc3af875192a5f8397fa3054ff21956c05e1138f26f
what vulnarability does press version less then 0.5.8 have
Having vulnarability PVE-2023-60818 Advisory: Pretalx 2.3.2 includes a fix for a Path Traversal vulnerability. https://github.com/pretalx/pretalx/commit/1f58cdd6b200db2418991928936e4dfcdd3d882e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pretalx version less then 2.3.2 have ### Response: Having vulnarability PVE-2023-60818 Advisory: Pretalx 2.3.2 includes a fix for a Path Traversal vulnerability. https://github.com/pretalx/pretalx/commit/1f58cdd6b200db2418991928936e4dfcdd3d882e
what vulnarability does pretalx version less then 2.3.2 have
Having vulnarability PVE-2021-26016 Advisory: Pretaweb.healthcheck before 1.0 is vulnerable to DoS attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pretaweb.healthcheck version less then 1.0 have ### Response: Having vulnarability PVE-2021-26016 Advisory: Pretaweb.healthcheck before 1.0 is vulnerable to DoS attacks.
what vulnarability does pretaweb.healthcheck version less then 1.0 have
Having vulnarability CVE-2023-52228 Advisory: pretix before 2024.1.1 mishandles file validation.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pretix version less then 2024.1.1 have ### Response: Having vulnarability CVE-2023-52228 Advisory: pretix before 2024.1.1 mishandles file validation.
what vulnarability does pretix version less then 2024.1.1 have
Having vulnarability PVE-2023-54889 Advisory: Primerdriver 1.1.1 updates its NPM dependency 'lodash' to v4.17.19 to include a security fix. https://hackerone.com/reports/864701
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does primerdriver version less then 1.1.1 have ### Response: Having vulnarability PVE-2023-54889 Advisory: Primerdriver 1.1.1 updates its NPM dependency 'lodash' to v4.17.19 to include a security fix. https://hackerone.com/reports/864701
what vulnarability does primerdriver version less then 1.1.1 have
Having vulnarability CVE-2016-6580 Advisory: Priority 1.2.0 includes a fix for CVE-2016-6580: A HTTP/2 implementation built using any version of the python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does priority version less then 1.2.0 have ### Response: Having vulnarability CVE-2016-6580 Advisory: Priority 1.2.0 includes a fix for CVE-2016-6580: A HTTP/2 implementation built using any version of the python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.
what vulnarability does priority version less then 1.2.0 have
Having vulnarability PVE-2022-48515 Advisory: Prisma 0.6.5 types raw queries as LiteralString to prevent SQLi attacks. https://github.com/RobertCraigie/prisma-client-py/commit/18e68b79f0b376c017c67770d349341bb8902e1a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prisma version less then 0.6.5 have ### Response: Having vulnarability PVE-2022-48515 Advisory: Prisma 0.6.5 types raw queries as LiteralString to prevent SQLi attacks. https://github.com/RobertCraigie/prisma-client-py/commit/18e68b79f0b376c017c67770d349341bb8902e1a
what vulnarability does prisma version less then 0.6.5 have
Having vulnarability CVE-2020-14343 Advisory: Prisma-cloud-pipeline 0.1.3 updates pyyaml to v5.4.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prisma-cloud-pipeline version less then 0.1.3 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Prisma-cloud-pipeline 0.1.3 updates pyyaml to v5.4.1 to include a security fix.
what vulnarability does prisma-cloud-pipeline version less then 0.1.3 have
Having vulnarability CVE-2020-25200 Advisory: Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pritunl version equal to 1.29.2145.25 have ### Response: Having vulnarability CVE-2020-25200 Advisory: Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design.
what vulnarability does pritunl version equal to 1.29.2145.25 have
Having vulnarability PVE-2021-39341 Advisory: Privacyidea 3.4.1 uses a secure way to compare strings to avoid theoretical side channel attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does privacyidea version less then 3.4.1 have ### Response: Having vulnarability PVE-2021-39341 Advisory: Privacyidea 3.4.1 uses a secure way to compare strings to avoid theoretical side channel attacks.
what vulnarability does privacyidea version less then 3.4.1 have
Having vulnarability PVE-2024-63785 Advisory: Procrastinate 0.11.0 addresses a database race condition vulnerability, where tasks with identical locks were executed in an incorrect sequence. It poses a risk in scenarios requiring strict task execution orders, potentially leading to data inconsistencies and operational disruptions. https://github.com/procrastinate-org/procrastinate/issues/212 https://github.com/procrastinate-org/procrastinate/pull/231
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does procrastinate version less then 0.11.0 have ### Response: Having vulnarability PVE-2024-63785 Advisory: Procrastinate 0.11.0 addresses a database race condition vulnerability, where tasks with identical locks were executed in an incorrect sequence. It poses a risk in scenarios requiring strict task execution orders, potentially leading to data inconsistencies and operational disruptions. https://github.com/procrastinate-org/procrastinate/issues/212 https://github.com/procrastinate-org/procrastinate/pull/231
what vulnarability does procrastinate version less then 0.11.0 have
Having vulnarability PVE-2022-48116 Advisory: Products.atcontenttypes 0.2 fixes security of HistoryAwareMixin.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-atcontenttypes version less then 0.2 have ### Response: Having vulnarability PVE-2022-48116 Advisory: Products.atcontenttypes 0.2 fixes security of HistoryAwareMixin.
what vulnarability does products-atcontenttypes version less then 0.2 have
Having vulnarability PVE-2021-42029 Advisory: Products-btreefolder2 version 2.13.4 includes a security declaration for 'BTreeFolder2Base.hasObject' method.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-btreefolder2 version less then 2.13.4 have ### Response: Having vulnarability PVE-2021-42029 Advisory: Products-btreefolder2 version 2.13.4 includes a security declaration for 'BTreeFolder2Base.hasObject' method.
what vulnarability does products-btreefolder2 version less then 2.13.4 have
Having vulnarability PVE-2021-26020 Advisory: products.cmfcontentpanels before 1.4.1 has two not disclosed security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-cmfcontentpanels version less then 1.4.1 have ### Response: Having vulnarability PVE-2021-26020 Advisory: products.cmfcontentpanels before 1.4.1 has two not disclosed security issues.
what vulnarability does products-cmfcontentpanels version less then 1.4.1 have
Having vulnarability CVE-2007-0240 Advisory: Products-cmfcore before 2.1.0beta2 has a vulnerability because it includes the Zope dependency version <2.10.2, which has an injection vulnerability. See: CVE-2007-0240.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-cmfcore version less then 2.1.0beta2 have ### Response: Having vulnarability CVE-2007-0240 Advisory: Products-cmfcore before 2.1.0beta2 has a vulnerability because it includes the Zope dependency version <2.10.2, which has an injection vulnerability. See: CVE-2007-0240.
what vulnarability does products-cmfcore version less then 2.1.0beta2 have
Having vulnarability PVE-2017-47577 Advisory: Products.cmfdifftool 3.3.3 includes a fix for a XSS vulnerability. https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-cmfdifftool version less then 3.3.3 have ### Response: Having vulnarability PVE-2017-47577 Advisory: Products.cmfdifftool 3.3.3 includes a fix for a XSS vulnerability. https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool
what vulnarability does products-cmfdifftool version less then 3.3.3 have
Having vulnarability CVE-2016-7137 Advisory: Products.cmfformcontroller 3.1.3 applies security hotfix 20160830 for redirect_to. This action refuses to redirect to unknown external sites. https://plone.org/security/hotfix/20160830/open-redirection-in-plone
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-cmfformcontroller version less then 3.1.3 have ### Response: Having vulnarability CVE-2016-7137 Advisory: Products.cmfformcontroller 3.1.3 applies security hotfix 20160830 for redirect_to. This action refuses to redirect to unknown external sites. https://plone.org/security/hotfix/20160830/open-redirection-in-plone
what vulnarability does products-cmfformcontroller version less then 3.1.3 have
Having vulnarability PVE-2017-47686 Advisory: Products.cmfplomino 1.13.1 escapes usernames and passwords to avoid injection attacks. https://github.com/plomino/Plomino/commit/2bde844b94b019d0938e43e3123540a10fd7bd60
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-cmfplomino version less then 1.13.1 have ### Response: Having vulnarability PVE-2017-47686 Advisory: Products.cmfplomino 1.13.1 escapes usernames and passwords to avoid injection attacks. https://github.com/plomino/Plomino/commit/2bde844b94b019d0938e43e3123540a10fd7bd60
what vulnarability does products-cmfplomino version less then 1.13.1 have
Having vulnarability PVE-2023-53489 Advisory: Products-cmfplone 4.3.10 and 5.0.5 include a minor fix for an information disclosure vulnerability. https://plone.org/news-and-events/news/2016/minor-plone-security-fixes
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-cmfplone version less then 4.3.10,greather then equal to 5.0a1,less then 5.0.5 have ### Response: Having vulnarability PVE-2023-53489 Advisory: Products-cmfplone 4.3.10 and 5.0.5 include a minor fix for an information disclosure vulnerability. https://plone.org/news-and-events/news/2016/minor-plone-security-fixes
what vulnarability does products-cmfplone version less then 4.3.10,greather then equal to 5.0a1,less then 5.0.5 have
Having vulnarability CVE-2016-7138 Advisory: Products.cmfquickinstallertool before 3.0.14 is vulnerable to several cross site scripting (XSS) attacks. https://github.com/plone/Products.CMFQuickInstallerTool/commit/1cd430b74353ac023493e2dd19613a2e390c451d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-cmfquickinstallertool version less then 3.0.14 have ### Response: Having vulnarability CVE-2016-7138 Advisory: Products.cmfquickinstallertool before 3.0.14 is vulnerable to several cross site scripting (XSS) attacks. https://github.com/plone/Products.CMFQuickInstallerTool/commit/1cd430b74353ac023493e2dd19613a2e390c451d
what vulnarability does products-cmfquickinstallertool version less then 3.0.14 have
Having vulnarability CVE-2007-0240 Advisory: Products.cmfuid before 2.1.0beta2 has a vulnerability because it includes the Zope dependency version <2.10.2, which has an injection vulnerability. See: CVE-2007-0240.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-cmfuid version less then 2.1.0beta2 have ### Response: Having vulnarability CVE-2007-0240 Advisory: Products.cmfuid before 2.1.0beta2 has a vulnerability because it includes the Zope dependency version <2.10.2, which has an injection vulnerability. See: CVE-2007-0240.
what vulnarability does products-cmfuid version less then 2.1.0beta2 have
Having vulnarability CVE-2007-0240 Advisory: Products.dcworkflow before 2.1.0beta2 has a vulnerability because it includes the Zope dependency version <2.10.2, which has an injection vulnerability. See: CVE-2007-0240.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-dcworkflow version less then 2.1.0beta2 have ### Response: Having vulnarability CVE-2007-0240 Advisory: Products.dcworkflow before 2.1.0beta2 has a vulnerability because it includes the Zope dependency version <2.10.2, which has an injection vulnerability. See: CVE-2007-0240.
what vulnarability does products-dcworkflow version less then 2.1.0beta2 have
Having vulnarability CVE-2021-21360 Advisory: Products.genericsetup 2.1.1 includes a fix for CVE-2021-21360: Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install "Products.GenericSetup>=2.1.1". https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-genericsetup version less then 2.1.1 have ### Response: Having vulnarability CVE-2021-21360 Advisory: Products.genericsetup 2.1.1 includes a fix for CVE-2021-21360: Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install "Products.GenericSetup>=2.1.1". https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw
what vulnarability does products-genericsetup version less then 2.1.1 have
Having vulnarability CVE-2021-32806 Advisory: Products.isurlinportal version 1.2.0 includes a fix for CVE-2021-32806: Versions of products.isurlinportal prior to 1.2.0 have an open redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like "https://example.org" is not in the portal. The url "https:example.org" without slashes is considered to be in the portal. When redirecting, some browsers go to "https://example.org", others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-isurlinportal version less then 1.2.0 have ### Response: Having vulnarability CVE-2021-32806 Advisory: Products.isurlinportal version 1.2.0 includes a fix for CVE-2021-32806: Versions of products.isurlinportal prior to 1.2.0 have an open redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like "https://example.org" is not in the portal. The url "https:example.org" without slashes is considered to be in the portal. When redirecting, some browsers go to "https://example.org", others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba
what vulnarability does products-isurlinportal version less then 1.2.0 have
Having vulnarability PVE-2021-33148 Advisory: The authenticate function in LDAPUserFolder/LDAPUserFolder.py in zope-ldapuserfolder 2.9-1 does not verify the password for the emergency account, which allows remote attackers to gain privileges.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-ldapuserfolder version less then 2.19 have ### Response: Having vulnarability PVE-2021-33148 Advisory: The authenticate function in LDAPUserFolder/LDAPUserFolder.py in zope-ldapuserfolder 2.9-1 does not verify the password for the emergency account, which allows remote attackers to gain privileges.
what vulnarability does products-ldapuserfolder version less then 2.19 have
Having vulnarability PVE-2017-47611 Advisory: Products.linguaplone 4.0 fixes a possible XSS security issue in the 'translationbrowser_popup' caused by displaying unfiltered content from the 'Description' string field as HTML.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-linguaplone version less then 4.0 have ### Response: Having vulnarability PVE-2017-47611 Advisory: Products.linguaplone 4.0 fixes a possible XSS security issue in the 'translationbrowser_popup' caused by displaying unfiltered content from the 'Description' string field as HTML.
what vulnarability does products-linguaplone version less then 4.0 have
Having vulnarability CVE-2012-5508 Advisory: Products-passwordresettool 2.0.10 uses system random when available to fix CVE-2012-5508.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-passwordresettool version less then 2.0.10 have ### Response: Having vulnarability CVE-2012-5508 Advisory: Products-passwordresettool 2.0.10 uses system random when available to fix CVE-2012-5508.
what vulnarability does products-passwordresettool version less then 2.0.10 have
Having vulnarability PVE-2021-26024 Advisory: Products.ploneformgen 1.7.19 and 1.8.1 include a fix for a XSS vulnerability that could be exploited by users with the ability to create forms. https://github.com/smcmahon/Products.PloneFormGen/commit/b9590e5573660ee6b8d151430ca2b459f05388ca
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-ploneformgen version less then 1.7.19,greather then equal to 1.8.0.alpha1,less then 1.8.1 have ### Response: Having vulnarability PVE-2021-26024 Advisory: Products.ploneformgen 1.7.19 and 1.8.1 include a fix for a XSS vulnerability that could be exploited by users with the ability to create forms. https://github.com/smcmahon/Products.PloneFormGen/commit/b9590e5573660ee6b8d151430ca2b459f05388ca
what vulnarability does products-ploneformgen version less then 1.7.19,greather then equal to 1.8.0.alpha1,less then 1.8.1 have
Having vulnarability CVE-2009-0662 Advisory: Products-plonepas 3.9 fixes the cookie plugin's login handler to not trust the username from the request. Instead, now it's used the login name of the currently authenticated user. This fixes CVE-2009-0662.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-plonepas version less then 3.9 have ### Response: Having vulnarability CVE-2009-0662 Advisory: Products-plonepas 3.9 fixes the cookie plugin's login handler to not trust the username from the request. Instead, now it's used the login name of the currently authenticated user. This fixes CVE-2009-0662.
what vulnarability does products-plonepas version less then 3.9 have
Having vulnarability CVE-2021-21336 Advisory: Products.PluggableAuthService 2.6.0 includes a fix for CVE-2021-21336: In Products.PluggableAuthService before version 2.6.0 there is an information disclosure vulnerability - everyone can list the names of roles defined in the ZODB Role Manager plugin if the site uses this plugin.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-pluggableauthservice version less then 2.6.0 have ### Response: Having vulnarability CVE-2021-21336 Advisory: Products.PluggableAuthService 2.6.0 includes a fix for CVE-2021-21336: In Products.PluggableAuthService before version 2.6.0 there is an information disclosure vulnerability - everyone can list the names of roles defined in the ZODB Role Manager plugin if the site uses this plugin.
what vulnarability does products-pluggableauthservice version less then 2.6.0 have
Having vulnarability PVE-2021-26027 Advisory: products.poi before 2.2.3 allows anonymous users to see issues inside private folders.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-poi version less then 2.2.3 have ### Response: Having vulnarability PVE-2021-26027 Advisory: products.poi before 2.2.3 allows anonymous users to see issues inside private folders.
what vulnarability does products-poi version less then 2.2.3 have
Having vulnarability PVE-2021-37726 Advisory: Products-zopetree 1.3 fixes a security hole in the tree state decompressing mechanism. Previous versions were vulnerable to a denial of service attack using large tree states.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-zopetree version less then 1.3 have ### Response: Having vulnarability PVE-2021-37726 Advisory: Products-zopetree 1.3 fixes a security hole in the tree state decompressing mechanism. Previous versions were vulnerable to a denial of service attack using large tree states.
what vulnarability does products-zopetree version less then 1.3 have
Having vulnarability PVE-2022-50120 Advisory: Products.zopeversioncontrol 1.1.3 adds missing security declarations. https://github.com/zopefoundation/Products.ZopeVersionControl/commit/4f862cbcd5fcf76b53c863fcedb1157a7af17720
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products-zopeversioncontrol version less then 1.1.3 have ### Response: Having vulnarability PVE-2022-50120 Advisory: Products.zopeversioncontrol 1.1.3 adds missing security declarations. https://github.com/zopefoundation/Products.ZopeVersionControl/commit/4f862cbcd5fcf76b53c863fcedb1157a7af17720
what vulnarability does products-zopeversioncontrol version less then 1.1.3 have
Having vulnarability CVE-2023-36814 Advisory: Products.CMFCore 3.2 includes a fix for a denial of service vulnerability: The use of Python's marshal module to handle unchecked input in a public method on PortalFolder objects can lead to an unauthenticated denial of service and a crash situation. https://github.com/zopefoundation/Products.CMFCore/security/advisories/GHSA-4hpj-8rhv-9x87 https://github.com/zopefoundation/Products.CMFCore/commit/40f03f43a60f28ca9485c8ef429efef729be54e5
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products.cmfcore version less then 3.2 have ### Response: Having vulnarability CVE-2023-36814 Advisory: Products.CMFCore 3.2 includes a fix for a denial of service vulnerability: The use of Python's marshal module to handle unchecked input in a public method on PortalFolder objects can lead to an unauthenticated denial of service and a crash situation. https://github.com/zopefoundation/Products.CMFCore/security/advisories/GHSA-4hpj-8rhv-9x87 https://github.com/zopefoundation/Products.CMFCore/commit/40f03f43a60f28ca9485c8ef429efef729be54e5
what vulnarability does products.cmfcore version less then 3.2 have
Having vulnarability CVE-2021-33513 Advisory: Products.cmfdifftool 3.3.3 includes a fix for a XSS vulnerability. https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products.cmfdifftool version less then 3.3.3 have ### Response: Having vulnarability CVE-2021-33513 Advisory: Products.cmfdifftool 3.3.3 includes a fix for a XSS vulnerability. https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool
what vulnarability does products.cmfdifftool version less then 3.3.3 have
Having vulnarability PVE-2022-49453 Advisory: Products.formulator 0.9.2 adds missing security declarations.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products.formulator version less then 0.9.2 have ### Response: Having vulnarability PVE-2022-49453 Advisory: Products.formulator 0.9.2 adds missing security declarations.
what vulnarability does products.formulator version less then 0.9.2 have
Having vulnarability CVE-2024-24811 Advisory: SQLAlchemyDA is a generic database adapter for ZSQL methods. A vulnerability found in versions prior to 2.2 allows unauthenticated execution of arbitrary SQL statements on the database to which the SQLAlchemyDA instance is connected. All users are affected. The problem has been patched in version 2.2. There is no workaround for the problem. See CVE-2024-24811.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does products.sqlalchemyda version less then 2.2 have ### Response: Having vulnarability CVE-2024-24811 Advisory: SQLAlchemyDA is a generic database adapter for ZSQL methods. A vulnerability found in versions prior to 2.2 allows unauthenticated execution of arbitrary SQL statements on the database to which the SQLAlchemyDA instance is connected. All users are affected. The problem has been patched in version 2.2. There is no workaround for the problem. See CVE-2024-24811.
what vulnarability does products.sqlalchemyda version less then 2.2 have
Having vulnarability CVE-2017-18342 Advisory: Project-Manager version 0.2.0 includes a fix for the function 'load_config' in 'project_manager/utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/kpj/project_manager/commit/07aef0e023f07563ae9141674e1de3508e178358#diff-03ec8dd0ad6683512ebfb1545fbf01618075f2118c80cc4878cd76ff5bf26aeb
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does project-manager version less then 0.2.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Project-Manager version 0.2.0 includes a fix for the function 'load_config' in 'project_manager/utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/kpj/project_manager/commit/07aef0e023f07563ae9141674e1de3508e178358#diff-03ec8dd0ad6683512ebfb1545fbf01618075f2118c80cc4878cd76ff5bf26aeb
what vulnarability does project-manager version less then 0.2.0 have
Having vulnarability PVE-2021-39416 Advisory: Projen 0.3.1 addresses a security issue with its NPM dependency 'standard-version' v8.0.1. https://github.com/projen/projen/commit/722ed05ace94270bff0cb93a38948c1a2c7c9142 https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does projen version less then 0.3.1 have ### Response: Having vulnarability PVE-2021-39416 Advisory: Projen 0.3.1 addresses a security issue with its NPM dependency 'standard-version' v8.0.1. https://github.com/projen/projen/commit/722ed05ace94270bff0cb93a38948c1a2c7c9142 https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2
what vulnarability does projen version less then 0.3.1 have
Having vulnarability CVE-2023-32681 Advisory: Prometheus-pve-sd 2.5.18 updates its dependency 'requests' to v2.31.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prometheus-pve-sd version less then 2.5.18 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Prometheus-pve-sd 2.5.18 updates its dependency 'requests' to v2.31.0 to include a security fix.
what vulnarability does prometheus-pve-sd version less then 2.5.18 have
Having vulnarability PVE-2023-62817 Advisory: Prompt-toolkit 3.0.13 fixes a race condition in `ThreadedHistory` which could lead to a deadlock. https://github.com/prompt-toolkit/python-prompt-toolkit/commit/99092a8c6d4b411645ac4b84d504e5226e7eebb8#diff-48c0ff10dc3990285d19b3f54e6bfec763089ba1229dc6f9e88463a1046adad7R163
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prompt-toolkit version less then 3.0.13 have ### Response: Having vulnarability PVE-2023-62817 Advisory: Prompt-toolkit 3.0.13 fixes a race condition in `ThreadedHistory` which could lead to a deadlock. https://github.com/prompt-toolkit/python-prompt-toolkit/commit/99092a8c6d4b411645ac4b84d504e5226e7eebb8#diff-48c0ff10dc3990285d19b3f54e6bfec763089ba1229dc6f9e88463a1046adad7R163
what vulnarability does prompt-toolkit version less then 3.0.13 have
Having vulnarability CVE-2023-37920 Advisory: Promql-http-api 0.3.1 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a Improper Following of a Certificate's Chain of Trust vulnerability. https://github.com/nir-arad/promql-http-api/commit/c02b5c36478fef347de8ac9f954e5d22257565bb
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does promql-http-api version less then 0.3.1 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Promql-http-api 0.3.1 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a Improper Following of a Certificate's Chain of Trust vulnerability. https://github.com/nir-arad/promql-http-api/commit/c02b5c36478fef347de8ac9f954e5d22257565bb
what vulnarability does promql-http-api version less then 0.3.1 have
Having vulnarability CVE-2023-49083 Advisory: Prosper-api 0.6.7 updates its dependency 'cryptography' to v41.0.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prosper-api version less then 0.6.7 have ### Response: Having vulnarability CVE-2023-49083 Advisory: Prosper-api 0.6.7 updates its dependency 'cryptography' to v41.0.7 to include a security fix.
what vulnarability does prosper-api version less then 0.6.7 have
Having vulnarability CVE-2023-49083 Advisory: Prosper-bot 0.1.17 updates its dependency 'cryptography' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prosper-bot version less then 0.1.17 have ### Response: Having vulnarability CVE-2023-49083 Advisory: Prosper-bot 0.1.17 updates its dependency 'cryptography' to include a security fix.
what vulnarability does prosper-bot version less then 0.1.17 have
Having vulnarability CVE-2022-26661 Advisory: An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does proteus version greather then equal to 5.0.0,less then 5.0.12,greather then equal to 6.0.0,less then 6.0.5,greather then equal to 6.1.0,less then 6.2.2 have ### Response: Having vulnarability CVE-2022-26661 Advisory: An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
what vulnarability does proteus version greather then equal to 5.0.0,less then 5.0.12,greather then equal to 6.0.0,less then 6.0.5,greather then equal to 6.1.0,less then 6.2.2 have
Having vulnarability CVE-2021-22570 Advisory: Protobuf 3.15.0 includes a fix for CVE-2021-22570: Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does protobuf version less then 3.15.0 have ### Response: Having vulnarability CVE-2021-22570 Advisory: Protobuf 3.15.0 includes a fix for CVE-2021-22570: Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr.
what vulnarability does protobuf version less then 3.15.0 have
Having vulnarability PVE-2024-69613 Advisory: Prowler version 3.16.3 includes a fix that addresses privilege escalation vulnerabilities within its AWS configurations.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prowler version less then 3.16.3 have ### Response: Having vulnarability PVE-2024-69613 Advisory: Prowler version 3.16.3 includes a fix that addresses privilege escalation vulnerabilities within its AWS configurations.
what vulnarability does prowler version less then 3.16.3 have
Having vulnarability CVE-2022-24439 Advisory: Prowler-cloud 3.0.2 updates its dependency 'GitPython' to v3.1.30 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does prowler-cloud version less then 3.0.2 have ### Response: Having vulnarability CVE-2022-24439 Advisory: Prowler-cloud 3.0.2 updates its dependency 'GitPython' to v3.1.30 to include a security fix.
what vulnarability does prowler-cloud version less then 3.0.2 have
Having vulnarability CVE-2021-3116 Advisory: before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does proxy-py version less then 2.3.1 have ### Response: Having vulnarability CVE-2021-3116 Advisory: before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or).
what vulnarability does proxy-py version less then 2.3.1 have