output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2022-40898 Advisory: Proxy-randomizer 1.3.4 updates its dependency 'wheel' to v0.38.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does proxy-randomizer version less then 1.3.4 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Proxy-randomizer 1.3.4 updates its dependency 'wheel' to v0.38.1 to include a security fix. | what vulnarability does proxy-randomizer version less then 1.3.4 have | |
Having vulnarability PVE-2023-52922 Advisory: Proxybooster is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does proxybooster version greather then 0 have ### Response: Having vulnarability PVE-2023-52922 Advisory: Proxybooster is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does proxybooster version greather then 0 have | |
Having vulnarability PVE-2023-52911 Advisory: Proxygeneratorbil is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does proxygeneratorbil version greather then 0 have ### Response: Having vulnarability PVE-2023-52911 Advisory: Proxygeneratorbil is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does proxygeneratorbil version greather then 0 have | |
Having vulnarability CVE-2023-23931 Advisory: Proxystore 0.4.1 updates its dependency 'cryptography' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does proxystore version less then 0.4.1 have ### Response: Having vulnarability CVE-2023-23931 Advisory: Proxystore 0.4.1 updates its dependency 'cryptography' to include a security fix. | what vulnarability does proxystore version less then 0.4.1 have | |
Having vulnarability CVE-2020-5310 Advisory: libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does psd-tools version less then equal to 1.9.18 have ### Response: Having vulnarability CVE-2020-5310 Advisory: libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. | what vulnarability does psd-tools version less then equal to 1.9.18 have | |
Having vulnarability CVE-2021-34552 Advisory: Psd-tools3 1.9.1 updates its dependency "pillow" to v8.3.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does psd-tools3 version less then 1.9.1 have ### Response: Having vulnarability CVE-2021-34552 Advisory: Psd-tools3 1.9.1 updates its dependency "pillow" to v8.3.2 to include security fixes. | what vulnarability does psd-tools3 version less then 1.9.1 have | |
Having vulnarability PVE-2022-45491 Advisory: Psiturk 3.2.1 fixes a SSTI (server side template injection) vulnerability in ad and consent pages.
https://github.com/NYUCCL/psiTurk/pull/517 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does psiturk version less then 3.2.1 have ### Response: Having vulnarability PVE-2022-45491 Advisory: Psiturk 3.2.1 fixes a SSTI (server side template injection) vulnerability in ad and consent pages.
https://github.com/NYUCCL/psiTurk/pull/517 | what vulnarability does psiturk version less then 3.2.1 have | |
Having vulnarability CVE-2020-15203 Advisory: Psiz 0.4.1 updates the 'TensorFlow' requirement to v2.3.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does psiz version less then 0.4.1 have ### Response: Having vulnarability CVE-2020-15203 Advisory: Psiz 0.4.1 updates the 'TensorFlow' requirement to v2.3.1 to include security fixes. | what vulnarability does psiz version less then 0.4.1 have | |
Having vulnarability PVE-2023-61842 Advisory: Psutil 0.5.1 includes a fix for a potential race condition vulnerability.
https://github.com/giampaolo/psutil/commit/163f29d25f4c5d573fbd436e658829afe95bc1d9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does psutil version less then 0.5.1 have ### Response: Having vulnarability PVE-2023-61842 Advisory: Psutil 0.5.1 includes a fix for a potential race condition vulnerability.
https://github.com/giampaolo/psutil/commit/163f29d25f4c5d573fbd436e658829afe95bc1d9 | what vulnarability does psutil version less then 0.5.1 have | |
Having vulnarability CVE-2021-23214 Advisory: Psycopg 3.0.4 updates its dependency 'libpq' to at least v14.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does psycopg version less then 3.0.4 have ### Response: Having vulnarability CVE-2021-23214 Advisory: Psycopg 3.0.4 updates its dependency 'libpq' to at least v14.1 to include a security fix. | what vulnarability does psycopg version less then 3.0.4 have | |
Having vulnarability PVE-2021-26028 Advisory: ptah before 0.3.3 is vulnerable to a undisclosed attack. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ptah version less then 0.3.3 have ### Response: Having vulnarability PVE-2021-26028 Advisory: ptah before 0.3.3 is vulnerable to a undisclosed attack. | what vulnarability does ptah version less then 0.3.3 have | |
Having vulnarability PVE-2023-62830 Advisory: Ptpython 3.0.17 fixes race condition during retrieval of signatures.
https://github.com/prompt-toolkit/ptpython/commit/7d116e84909d13832935ab4132eabfe316d26b74 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ptpython version less then 3.0.17 have ### Response: Having vulnarability PVE-2023-62830 Advisory: Ptpython 3.0.17 fixes race condition during retrieval of signatures.
https://github.com/prompt-toolkit/ptpython/commit/7d116e84909d13832935ab4132eabfe316d26b74 | what vulnarability does ptpython version less then 3.0.17 have | |
Having vulnarability CVE-2023-26154 Advisory: Several versions of the PubNub package, including those before 7.4.0, 6.19.0, 7.3.0, 6.1.0, 5.3.0, 0.4.0, and others, are vulnerable to Insufficient Entropy via the getKey function. This is due to an inefficient implementation of the AES-256-CBC cryptographic algorithm. The encrypt function is less secure when hex encoding and trimming are applied, leaving half of the bits in the key always the same for every encoded message or file. To exploit this vulnerability, the attacker needs to invest resources in preparing the attack and brute-force the encryption. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pubnub version less then 0.4.0,greather then equal to 3.6.4,less then 4.3.0,greather then equal to 4.3.1,less then 5.2.0,greather then equal to 6.0.0,less then 6.1.0,greather then equal to 6.2.0,less then 6.19.0,greather then equal to 7.0.0,less then 7.3.0,greather then equal to 7.3.1,less then 7.4.0 have ### Response: Having vulnarability CVE-2023-26154 Advisory: Several versions of the PubNub package, including those before 7.4.0, 6.19.0, 7.3.0, 6.1.0, 5.3.0, 0.4.0, and others, are vulnerable to Insufficient Entropy via the getKey function. This is due to an inefficient implementation of the AES-256-CBC cryptographic algorithm. The encrypt function is less secure when hex encoding and trimming are applied, leaving half of the bits in the key always the same for every encoded message or file. To exploit this vulnerability, the attacker needs to invest resources in preparing the attack and brute-force the encryption. | what vulnarability does pubnub version less then 0.4.0,greather then equal to 3.6.4,less then 4.3.0,greather then equal to 4.3.1,less then 5.2.0,greather then equal to 6.0.0,less then 6.1.0,greather then equal to 6.2.0,less then 6.19.0,greather then equal to 7.0.0,less then 7.3.0,greather then equal to 7.3.1,less then 7.4.0 have | |
Having vulnarability PVE-2023-60119 Advisory: Pubtools-quay 0.11.0 includes a fix for a Race Condition vulnerability.
https://github.com/release-engineering/pubtools-quay/pull/163
https://github.com/release-engineering/pubtools-quay/commit/65a27c4f1dee8158da528f644a2dd10625574727 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pubtools-quay version less then 0.11.0 have ### Response: Having vulnarability PVE-2023-60119 Advisory: Pubtools-quay 0.11.0 includes a fix for a Race Condition vulnerability.
https://github.com/release-engineering/pubtools-quay/pull/163
https://github.com/release-engineering/pubtools-quay/commit/65a27c4f1dee8158da528f644a2dd10625574727 | what vulnarability does pubtools-quay version less then 0.11.0 have | |
Having vulnarability PVE-2021-40026 Advisory: Puccini 0.3 improves file output security.
https://github.com/tliron/puccini/commit/c4181c99e1cff240bc3f8e0fdec0108188554bf5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does puccini version less then 0.3 have ### Response: Having vulnarability PVE-2021-40026 Advisory: Puccini 0.3 improves file output security.
https://github.com/tliron/puccini/commit/c4181c99e1cff240bc3f8e0fdec0108188554bf5 | what vulnarability does puccini version less then 0.3 have | |
Having vulnarability CVE-2022-3644 Advisory: Pulp-ansible 0.15.0 includes a fix for CVE-2022-3644: The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
https://github.com/pulp/pulp_ansible/pull/1222 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulp-ansible version greather then equal to 0,less then 0.15.0 have ### Response: Having vulnarability CVE-2022-3644 Advisory: Pulp-ansible 0.15.0 includes a fix for CVE-2022-3644: The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
https://github.com/pulp/pulp_ansible/pull/1222 | what vulnarability does pulp-ansible version greather then equal to 0,less then 0.15.0 have | |
Having vulnarability CVE-2024-23342 Advisory: Pulp-container version 2.19.0 eliminates the ecdsa dependency due to its vulnerability to Minerva timing attacks, as identified in CVE-2024-23342.
https://github.com/pulp/pulp_container/commit/59e06e591bd3e621401d83f417fd3fa2ecadbf0a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulp-container version less then 2.19.0 have ### Response: Having vulnarability CVE-2024-23342 Advisory: Pulp-container version 2.19.0 eliminates the ecdsa dependency due to its vulnerability to Minerva timing attacks, as identified in CVE-2024-23342.
https://github.com/pulp/pulp_container/commit/59e06e591bd3e621401d83f417fd3fa2ecadbf0a | what vulnarability does pulp-container version less then 2.19.0 have | |
Having vulnarability PVE-2021-40315 Advisory: Pulpcore 3.11.0 adds the 'ALLOWED_CONTENT_CHECKSUMS' setting to remove 'md5' and 'sha1' since they are not secure. Now, by default, the 'ALLOWED_CONTENT_CHECKSUMS' contain 'sha224', 'sha256', 'sha384', and 'sha512'. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulpcore version less then 3.11.0 have ### Response: Having vulnarability PVE-2021-40315 Advisory: Pulpcore 3.11.0 adds the 'ALLOWED_CONTENT_CHECKSUMS' setting to remove 'md5' and 'sha1' since they are not secure. Now, by default, the 'ALLOWED_CONTENT_CHECKSUMS' contain 'sha224', 'sha256', 'sha384', and 'sha512'. | what vulnarability does pulpcore version less then 3.11.0 have | |
Having vulnarability CVE-2022-33684 Advisory: Pulsar-client 2.7.5, 2.8.4, 2.9.3 and 2.10.2 include a fix for CVE-2022-33684: The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a man in the middle attack and intercept and/or modify the GET request that is sent to the ClientCredentialFlow 'issuer url'. The intercepted credentials can be used to acquire authentication data from the OAuth2.0 server to then authenticate with an Apache Pulsar cluster. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. Apache Pulsar Python Client wraps the C++ client, so it is also vulnerable in the same way. This issue affects Apache Pulsar C++ Client and Python Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0 to 2.10.1; 2.6.4 and earlier. Any users running affected versions of the C++ Client or the Python Client should rotate vulnerable OAuth2.0 credentials, including client_id and client_secret. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulsar-client version less then 2.7.5,greather then equal to 2.8.0,less then 2.8.4,greather then equal to 2.9.0,less then 2.9.3,greather then equal to 2.10.0,less then 2.10.2 have ### Response: Having vulnarability CVE-2022-33684 Advisory: Pulsar-client 2.7.5, 2.8.4, 2.9.3 and 2.10.2 include a fix for CVE-2022-33684: The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a man in the middle attack and intercept and/or modify the GET request that is sent to the ClientCredentialFlow 'issuer url'. The intercepted credentials can be used to acquire authentication data from the OAuth2.0 server to then authenticate with an Apache Pulsar cluster. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. Apache Pulsar Python Client wraps the C++ client, so it is also vulnerable in the same way. This issue affects Apache Pulsar C++ Client and Python Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0 to 2.10.1; 2.6.4 and earlier. Any users running affected versions of the C++ Client or the Python Client should rotate vulnerable OAuth2.0 credentials, including client_id and client_secret. | what vulnarability does pulsar-client version less then 2.7.5,greather then equal to 2.8.0,less then 2.8.4,greather then equal to 2.9.0,less then 2.9.3,greather then equal to 2.10.0,less then 2.10.2 have | |
Having vulnarability CVE-2017-0247 Advisory: Pulumi 3.33.1 updates versions of its DotNet dependencies 'semver' and 'OneOf' to fix vulnerabilities.
https://github.com/pulumi/pulumi/pull/9591 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulumi version less then 3.33.1 have ### Response: Having vulnarability CVE-2017-0247 Advisory: Pulumi 3.33.1 updates versions of its DotNet dependencies 'semver' and 'OneOf' to fix vulnerabilities.
https://github.com/pulumi/pulumi/pull/9591 | what vulnarability does pulumi version less then 3.33.1 have | |
Having vulnarability CVE-2022-27191 Advisory: Pulumi-aws 5.34.0 updates its GO dependency 'golang.org/x/crypto' to v0.7.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulumi-aws version less then 5.34.0 have ### Response: Having vulnarability CVE-2022-27191 Advisory: Pulumi-aws 5.34.0 updates its GO dependency 'golang.org/x/crypto' to v0.7.0 to include a security fix. | what vulnarability does pulumi-aws version less then 5.34.0 have | |
Having vulnarability CVE-2021-4238 Advisory: Pulumi-azuread 5.34.1 updates its GO dependency 'goutils' to v1.1.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulumi-azuread version less then 5.34.1 have ### Response: Having vulnarability CVE-2021-4238 Advisory: Pulumi-azuread 5.34.1 updates its GO dependency 'goutils' to v1.1.1 to include a security fix. | what vulnarability does pulumi-azuread version less then 5.34.1 have | |
Having vulnarability CVE-2021-3121 Advisory: Pulumi-gcp 6.53.0 updates its GO dependency 'gogo/protobuf' to v1.3.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulumi-gcp version less then 6.53.0 have ### Response: Having vulnarability CVE-2021-3121 Advisory: Pulumi-gcp 6.53.0 updates its GO dependency 'gogo/protobuf' to v1.3.2 to include a security fix. | what vulnarability does pulumi-gcp version less then 6.53.0 have | |
Having vulnarability CVE-2019-20477 Advisory: Pulumi-kubernetes 2.6.0 updates its dependency 'pyyaml' minimum version to v5.3.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulumi-kubernetes version less then 2.6.0 have ### Response: Having vulnarability CVE-2019-20477 Advisory: Pulumi-kubernetes 2.6.0 updates its dependency 'pyyaml' minimum version to v5.3.1 to include security fixes. | what vulnarability does pulumi-kubernetes version less then 2.6.0 have | |
Having vulnarability CVE-2022-25878 Advisory: Pulumi-policy 1.6.0 updates its dependency 'protobufjs' to version '6.11.3' to include a security fix.
https://github.com/pulumi/pulumi-policy/commit/adc5196b8519a7a2647254e51aac878588824086 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pulumi-policy version less then 1.6.0 have ### Response: Having vulnarability CVE-2022-25878 Advisory: Pulumi-policy 1.6.0 updates its dependency 'protobufjs' to version '6.11.3' to include a security fix.
https://github.com/pulumi/pulumi-policy/commit/adc5196b8519a7a2647254e51aac878588824086 | what vulnarability does pulumi-policy version less then 1.6.0 have | |
Having vulnarability CVE-2019-3498 Advisory: Puput 1.0.4 updates the Django version to greater than 2.1.6 to fix security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does puput version less then 1.0.4 have ### Response: Having vulnarability CVE-2019-3498 Advisory: Puput 1.0.4 updates the Django version to greater than 2.1.6 to fix security issues. | what vulnarability does puput version less then 1.0.4 have | |
Having vulnarability CVE-2020-15197 Advisory: Pupyl 0.10.4 updates its dependency 'tensorflow' to v2.3.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pupyl version less then 0.10.4 have ### Response: Having vulnarability CVE-2020-15197 Advisory: Pupyl 0.10.4 updates its dependency 'tensorflow' to v2.3.1 to include security fixes. | what vulnarability does pupyl version less then 0.10.4 have | |
Having vulnarability CVE-2021-20270 Advisory: Purdy 1.8.0 updates minimum dependency version for 'Pygments' to v2.9.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does purdy version less then 1.8.0 have ### Response: Having vulnarability CVE-2021-20270 Advisory: Purdy 1.8.0 updates minimum dependency version for 'Pygments' to v2.9.1 to include security fixes. | what vulnarability does purdy version less then 1.8.0 have | |
Having vulnarability PVE-2021-39630 Advisory: Pushradar 3.0.0alpha.2 includes a patch to make the channel authentication more secure. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pushradar version less then 3.0.0alpha.2,less then 3.0.0a2 have ### Response: Having vulnarability PVE-2021-39630 Advisory: Pushradar 3.0.0alpha.2 includes a patch to make the channel authentication more secure. | what vulnarability does pushradar version less then 3.0.0alpha.2,less then 3.0.0a2 have | |
Having vulnarability PVE-2021-34983 Advisory: pwd is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pwd version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34983 Advisory: pwd is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | what vulnarability does pwd version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-44893 Advisory: Pwdsphinx 0.5 uses a new protocol to execute mgt functions. The previous protocol had a number of security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pwdsphinx version less then 0.5 have ### Response: Having vulnarability PVE-2022-44893 Advisory: Pwdsphinx 0.5 uses a new protocol to execute mgt functions. The previous protocol had a number of security issues. | what vulnarability does pwdsphinx version less then 0.5 have | |
Having vulnarability PVE-2021-26029 Advisory: pwman3 before 0.4.0 uses cPickle.loads and cPickle.dumps. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pwman3 version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-26029 Advisory: pwman3 before 0.4.0 uses cPickle.loads and cPickle.dumps. | what vulnarability does pwman3 version less then 0.4.0 have | |
Having vulnarability CVE-2020-28468 Advisory: The shellcraft generator in pwntools before 4.3.1 is vulnerable to Server-Side Template Injection (SSTI), which can lead to remote code execution. See CVE-2020-28468. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pwntools version less then 4.3.1 have ### Response: Having vulnarability CVE-2020-28468 Advisory: The shellcraft generator in pwntools before 4.3.1 is vulnerable to Server-Side Template Injection (SSTI), which can lead to remote code execution. See CVE-2020-28468. | what vulnarability does pwntools version less then 4.3.1 have | |
Having vulnarability CVE-2022-42969 Advisory: Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.
https://github.com/pytest-dev/py/issues/287 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py version less then equal to 1.11.0 have ### Response: Having vulnarability CVE-2022-42969 Advisory: Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.
https://github.com/pytest-dev/py/issues/287 | what vulnarability does py version less then equal to 1.11.0 have | |
Having vulnarability CVE-2013-1895 Advisory: The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten. See: CVE-2013-1895. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-bcrypt version less then 0.3 have ### Response: Having vulnarability CVE-2013-1895 Advisory: The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten. See: CVE-2013-1895. | what vulnarability does py-bcrypt version less then 0.3 have | |
Having vulnarability PVE-2021-37333 Advisory: Py-ci 0.5.2 upgrades versions of requests and jinja2 due to security alerts. See: <https://github.com/iliapolo/pyci/commit/17a5162f0479ebfdf0d1047ab4016cede6b7c211>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-ci version less then 0.5.2 have ### Response: Having vulnarability PVE-2021-37333 Advisory: Py-ci 0.5.2 upgrades versions of requests and jinja2 due to security alerts. See: <https://github.com/iliapolo/pyci/commit/17a5162f0479ebfdf0d1047ab4016cede6b7c211>. | what vulnarability does py-ci version less then 0.5.2 have | |
Having vulnarability CVE-2022-36024 Advisory: Py-cord 2.0.1 includes a fix for CVE-2022-36024: This issue allows users to be able to remotely shutdown the bot running on py-cord, via adding it to a discord server with the 'application.commands' scope but not the 'bot' scope - then executing a command in that server. Currently, it appears that all public bots that use slash commands are affected.
https://github.com/Pycord-Development/pycord/security/advisories/GHSA-qmhj-m29v-gvmr | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-cord version less then 2.0.1 have ### Response: Having vulnarability CVE-2022-36024 Advisory: Py-cord 2.0.1 includes a fix for CVE-2022-36024: This issue allows users to be able to remotely shutdown the bot running on py-cord, via adding it to a discord server with the 'application.commands' scope but not the 'bot' scope - then executing a command in that server. Currently, it appears that all public bots that use slash commands are affected.
https://github.com/Pycord-Development/pycord/security/advisories/GHSA-qmhj-m29v-gvmr | what vulnarability does py-cord version less then 2.0.1 have | |
Having vulnarability PVE-2021-36322 Advisory: py-espeak-ng 1.49.0 fixes many logic and security issues reported by clang scan-build, Coverity and msvc /analyze. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-espeak-ng version less then 1.49.0 have ### Response: Having vulnarability PVE-2021-36322 Advisory: py-espeak-ng 1.49.0 fixes many logic and security issues reported by clang scan-build, Coverity and msvc /analyze. | what vulnarability does py-espeak-ng version less then 1.49.0 have | |
Having vulnarability CVE-2018-18920 Advisory: Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid." | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-evm version less then 0.2.0a33 have ### Response: Having vulnarability CVE-2018-18920 Advisory: Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid." | what vulnarability does py-evm version less then 0.2.0a33 have | |
Having vulnarability CVE-2007-4559 Advisory: Py-geth 3.10.0 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-geth version less then 3.10.0 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Py-geth 3.10.0 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does py-geth version less then 3.10.0 have | |
Having vulnarability PVE-2021-38621 Advisory: Py-gfm version 0.28.3.gfm.12 includes various security and bug fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-gfm version less then 0.28.3.gfm.12 have ### Response: Having vulnarability PVE-2021-38621 Advisory: Py-gfm version 0.28.3.gfm.12 includes various security and bug fixes. | what vulnarability does py-gfm version less then 0.28.3.gfm.12 have | |
Having vulnarability CVE-2018-1314 Advisory: Py-hiverunner 5.0.0 updates the default supported Hive version to 2.3.4 because version 2.3.3 has a vulnerability. See: CVE-2018-1314. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-hiverunner version less then 5.0.0 have ### Response: Having vulnarability CVE-2018-1314 Advisory: Py-hiverunner 5.0.0 updates the default supported Hive version to 2.3.4 because version 2.3.3 has a vulnerability. See: CVE-2018-1314. | what vulnarability does py-hiverunner version less then 5.0.0 have | |
Having vulnarability CVE-2020-25489 Advisory: A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-mini-racer version less then 0.3.0 have ### Response: Having vulnarability CVE-2020-25489 Advisory: A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption. | what vulnarability does py-mini-racer version less then 0.3.0 have | |
Having vulnarability PVE-2021-36875 Advisory: py-ms 1.0.1 replaces Jaeger with Lightstep - improved security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-ms version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-36875 Advisory: py-ms 1.0.1 replaces Jaeger with Lightstep - improved security. | what vulnarability does py-ms version less then 1.0.1 have | |
Having vulnarability CVE-2022-29217 Advisory: Py-pure-client 1.27.0 updates its dependency 'pyjwt' to version '2.4.0' to include a fix for a Use of a Broken or Risky Cryptographic Algorithm vulnerability.
https://github.com/PureStorage-OpenConnect/py-pure-client/commit/02a2f9d12b76ecbd57a951b9bedbe0cd77ba08ab | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-pure-client version less then 1.27.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Py-pure-client 1.27.0 updates its dependency 'pyjwt' to version '2.4.0' to include a fix for a Use of a Broken or Risky Cryptographic Algorithm vulnerability.
https://github.com/PureStorage-OpenConnect/py-pure-client/commit/02a2f9d12b76ecbd57a951b9bedbe0cd77ba08ab | what vulnarability does py-pure-client version less then 1.27.0 have | |
Having vulnarability CVE-2021-41495 Advisory: Py-quantaq 1.2.0a0 updates its dependency 'numpy' to v1.23.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-quantaq version less then 1.2.0a0 have ### Response: Having vulnarability CVE-2021-41495 Advisory: Py-quantaq 1.2.0a0 updates its dependency 'numpy' to v1.23.2 to include security fixes. | what vulnarability does py-quantaq version less then 1.2.0a0 have | |
Having vulnarability PVE-2021-37312 Advisory: The luigi functionality before py-rate 0.3.0 was reported as vulnerable. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-rate version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-37312 Advisory: The luigi functionality before py-rate 0.3.0 was reported as vulnerable. | what vulnarability does py-rate version less then 0.3.0 have | |
Having vulnarability CVE-2020-26235 Advisory: Py-scdb 0.1.1 updates its CARGO dependency 'clokwerk' to v0.4.0 to include a fix for a transitive vulnerability in 'time' package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-scdb version less then 0.1.1 have ### Response: Having vulnarability CVE-2020-26235 Advisory: Py-scdb 0.1.1 updates its CARGO dependency 'clokwerk' to v0.4.0 to include a fix for a transitive vulnerability in 'time' package. | what vulnarability does py-scdb version less then 0.1.1 have | |
Having vulnarability PVE-2023-53541 Advisory: Py-serializable 0.11.1 uses defusedxml to prevent XXE attacks.
https://github.com/madpah/serializable/pull/5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-serializable version less then 0.11.1 have ### Response: Having vulnarability PVE-2023-53541 Advisory: Py-serializable 0.11.1 uses defusedxml to prevent XXE attacks.
https://github.com/madpah/serializable/pull/5 | what vulnarability does py-serializable version less then 0.11.1 have | |
Having vulnarability CVE-2021-33503 Advisory: Py-steamcmd-wrapper 1.0.6 includes a security fix for the 'urllib3' underlying dependency.
https://github.com/wmellema/Py-SteamCMD-Wrapper/commit/8ee7e1144b9df570547a294638efcec464adb342 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-steamcmd-wrapper version less then 1.0.6 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Py-steamcmd-wrapper 1.0.6 includes a security fix for the 'urllib3' underlying dependency.
https://github.com/wmellema/Py-SteamCMD-Wrapper/commit/8ee7e1144b9df570547a294638efcec464adb342 | what vulnarability does py-steamcmd-wrapper version less then 1.0.6 have | |
Having vulnarability CVE-2021-46708 Advisory: Py-swagger-ui before 1.1.0 uses versions of 'swagger-ui' (2.2.10, 3.52.0) with a known vulnerability: including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances.
https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-swagger-ui version less then 1.1.0 have ### Response: Having vulnarability CVE-2021-46708 Advisory: Py-swagger-ui before 1.1.0 uses versions of 'swagger-ui' (2.2.10, 3.52.0) with a known vulnerability: including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances.
https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx | what vulnarability does py-swagger-ui version less then 1.1.0 have | |
Having vulnarability CVE-2023-6129 Advisory: Py-trello-api 0.4.2 introduces an optional PyOpenSSL import for versions of Python older than 2.7.9 and 3.2, aiming to address security concerns related to OpenSSL as highlighted by CVE-2023-6129. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-trello-api version less then 0.4.2 have ### Response: Having vulnarability CVE-2023-6129 Advisory: Py-trello-api 0.4.2 introduces an optional PyOpenSSL import for versions of Python older than 2.7.9 and 3.2, aiming to address security concerns related to OpenSSL as highlighted by CVE-2023-6129. | what vulnarability does py-trello-api version less then 0.4.2 have | |
Having vulnarability CVE-2020-26709 Advisory: py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py-xml version less then equal to 1.0 have ### Response: Having vulnarability CVE-2020-26709 Advisory: py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | what vulnarability does py-xml version less then equal to 1.0 have | |
Having vulnarability CVE-2005-2875 Advisory: Py2Play allows remote attackers to execute arbitrary Python code via pickled objects, which Py2Play unpickles and executes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py2play version greather then equal to 0,less then equal to 0.1.8 have ### Response: Having vulnarability CVE-2005-2875 Advisory: Py2Play allows remote attackers to execute arbitrary Python code via pickled objects, which Py2Play unpickles and executes. | what vulnarability does py2play version greather then equal to 0,less then equal to 0.1.8 have | |
Having vulnarability PVE-2022-49573 Advisory: Py2sambvca 1.3.1 fixes a possible directory traversal vulnerability.
https://github.com/JacksonBurns/py2sambvca/issues/17 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py2sambvca version less then 1.3.1 have ### Response: Having vulnarability PVE-2022-49573 Advisory: Py2sambvca 1.3.1 fixes a possible directory traversal vulnerability.
https://github.com/JacksonBurns/py2sambvca/issues/17 | what vulnarability does py2sambvca version less then 1.3.1 have | |
Having vulnarability PVE-2017-45642 Advisory: Py3web before 0.21 isn't checking for bad characters in headers. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py3web version less then 0.21 have ### Response: Having vulnarability PVE-2017-45642 Advisory: Py3web before 0.21 isn't checking for bad characters in headers. | what vulnarability does py3web version less then 0.21 have | |
Having vulnarability CVE-2021-23336 Advisory: Py42 drops support for Python versions 2.7 and 3.5, that no longer receive security updates. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py42 version less then 1.17.0 have ### Response: Having vulnarability CVE-2021-23336 Advisory: Py42 drops support for Python versions 2.7 and 3.5, that no longer receive security updates. | what vulnarability does py42 version less then 1.17.0 have | |
Having vulnarability PVE-2023-52916 Advisory: Py4sync is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py4sync version greather then 0 have ### Response: Having vulnarability PVE-2023-52916 Advisory: Py4sync is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does py4sync version greather then 0 have | |
Having vulnarability PVE-2022-44652 Advisory: Py7zr 0.17.3 protects against directory traversal attacks by checking file paths in ArchiveFile.
https://github.com/miurahr/py7zr/commit/2cb066688b05ee7427f236fd35f5598112e9d501 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does py7zr version less then 0.17.3 have ### Response: Having vulnarability PVE-2022-44652 Advisory: Py7zr 0.17.3 protects against directory traversal attacks by checking file paths in ArchiveFile.
https://github.com/miurahr/py7zr/commit/2cb066688b05ee7427f236fd35f5598112e9d501 | what vulnarability does py7zr version less then 0.17.3 have | |
Having vulnarability CVE-2015-8549 Advisory: Pyamf 0.8 wrappes all xml parsing in 'defusedxml' to protect against any XML entity attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyamf version less then 0.8 have ### Response: Having vulnarability CVE-2015-8549 Advisory: Pyamf 0.8 wrappes all xml parsing in 'defusedxml' to protect against any XML entity attacks. | what vulnarability does pyamf version less then 0.8 have | |
Having vulnarability CVE-2021-28957 Advisory: Pyanchor version 0.5.1 updates its dependency 'lxml' to v4.6.3 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyanchor version less then 0.5.1 have ### Response: Having vulnarability CVE-2021-28957 Advisory: Pyanchor version 0.5.1 updates its dependency 'lxml' to v4.6.3 to include security fixes. | what vulnarability does pyanchor version less then 0.5.1 have | |
Having vulnarability CVE-2022-30882 Advisory: Pyanxdns 0.2.5 and prior contain a backdoor due to the presence of the malicious 'request' dependency.
https://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyanxdns version less then 0.2.5 have ### Response: Having vulnarability CVE-2022-30882 Advisory: Pyanxdns 0.2.5 and prior contain a backdoor due to the presence of the malicious 'request' dependency.
https://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer/ | what vulnarability does pyanxdns version less then 0.2.5 have | |
Having vulnarability CVE-2017-16616 Advisory: An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyanyapi version less then 0.6.1 have ### Response: Having vulnarability CVE-2017-16616 Advisory: An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability. | what vulnarability does pyanyapi version less then 0.6.1 have | |
Having vulnarability PVE-2021-41227 Advisory: From pyapp version 4.5.0, TLS 1.2 is required by default for HTTPS connections to fetch remote configuration. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyapp version less then 4.5.0 have ### Response: Having vulnarability PVE-2021-41227 Advisory: From pyapp version 4.5.0, TLS 1.2 is required by default for HTTPS connections to fetch remote configuration. | what vulnarability does pyapp version less then 4.5.0 have | |
Having vulnarability CVE-2019-20008 Advisory: In Archery before 1.3, inserting an XSS payload into a project name (either by creating a new project or editing an existing one) will result in stored XSS on the vulnerability-scan scheduling page. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyarchery version greather then equal to 0,less then 1.3.0 have ### Response: Having vulnarability CVE-2019-20008 Advisory: In Archery before 1.3, inserting an XSS payload into a project name (either by creating a new project or editing an existing one) will result in stored XSS on the vulnerability-scan scheduling page. | what vulnarability does pyarchery version greather then equal to 0,less then 1.3.0 have | |
Having vulnarability PVE-2021-36853 Advisory: pyarmor 5.1.2 Improves the security of PyArmor self | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyarmor version less then 5.1.2 have ### Response: Having vulnarability PVE-2021-36853 Advisory: pyarmor 5.1.2 Improves the security of PyArmor self | what vulnarability does pyarmor version less then 5.1.2 have | |
Having vulnarability CVE-2019-12410 Advisory: While investigating UBSAN errors in https://github.com/apache/arrow/pull/5365 it was discovered Apache Arrow versions 0.12.0 to 0.14.1 left memory Array data uninitialized when reading RLE null data from parquet. This affected the C++, Python, Ruby and R implementations. The uninitialized memory could potentially be shared if are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyarrow version greather then equal to 0.12.0,less then equal to 0.14.1 have ### Response: Having vulnarability CVE-2019-12410 Advisory: While investigating UBSAN errors in https://github.com/apache/arrow/pull/5365 it was discovered Apache Arrow versions 0.12.0 to 0.14.1 left memory Array data uninitialized when reading RLE null data from parquet. This affected the C++, Python, Ruby and R implementations. The uninitialized memory could potentially be shared if are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats. | what vulnarability does pyarrow version greather then equal to 0.12.0,less then equal to 0.14.1 have | |
Having vulnarability PVE-2022-51749 Advisory: Pyautogiu is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyautogiu version greather then 0 have ### Response: Having vulnarability PVE-2022-51749 Advisory: Pyautogiu is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does pyautogiu version greather then 0 have | |
Having vulnarability PVE-2023-61575 Advisory: Pyav 9.0.1 updates bundled binary wheels to fix vulnerabilities in dependencies openjpeg, ffmpeg, gnutls, libgmp and wavpack.
https://github.com/PyAV-Org/PyAV/issues/901 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyav version less then 9.0.1 have ### Response: Having vulnarability PVE-2023-61575 Advisory: Pyav 9.0.1 updates bundled binary wheels to fix vulnerabilities in dependencies openjpeg, ffmpeg, gnutls, libgmp and wavpack.
https://github.com/PyAV-Org/PyAV/issues/901 | what vulnarability does pyav version less then 9.0.1 have | |
Having vulnarability CVE-2023-4863 Advisory: Pyb-utils 1.3.1 updates its dependency 'pillow' to v10.0.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyb-utils version less then 1.3.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Pyb-utils 1.3.1 updates its dependency 'pillow' to v10.0.1 to include a security fix. | what vulnarability does pyb-utils version less then 1.3.1 have | |
Having vulnarability CVE-2019-7548 Advisory: Pybald 0.5.6 updates its dependency 'SQLAlachemy' to v1.3.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pybald version less then 0.5.6 have ### Response: Having vulnarability CVE-2019-7548 Advisory: Pybald 0.5.6 updates its dependency 'SQLAlachemy' to v1.3.3 to include a security fix. | what vulnarability does pybald version less then 0.5.6 have | |
Having vulnarability CVE-2023-34249 Advisory: benjjvi/PyBB is an open source bulletin board. Prior to commit dcaeccd37198ecd3e41ea766d1099354b60d69c2, benjjvi/PyBB is vulnerable to SQL Injection. This vulnerability has been fixed as of commit dcaeccd37198ecd3e41ea766d1099354b60d69c2. As a workaround, a user may be able to update the software manually to avoid this problem by sanitizing user queries to `BulletinDatabaseModule.py`. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pybb version less then equal to 0.1.0 have ### Response: Having vulnarability CVE-2023-34249 Advisory: benjjvi/PyBB is an open source bulletin board. Prior to commit dcaeccd37198ecd3e41ea766d1099354b60d69c2, benjjvi/PyBB is vulnerable to SQL Injection. This vulnerability has been fixed as of commit dcaeccd37198ecd3e41ea766d1099354b60d69c2. As a workaround, a user may be able to update the software manually to avoid this problem by sanitizing user queries to `BulletinDatabaseModule.py`. | what vulnarability does pybb version less then equal to 0.1.0 have | |
Having vulnarability CVE-2020-6816 Advisory: Pybeerxml 1.0.8 updates its dependency 'bleach' to v3.1.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pybeerxml version less then 1.0.8 have ### Response: Having vulnarability CVE-2020-6816 Advisory: Pybeerxml 1.0.8 updates its dependency 'bleach' to v3.1.4 to include security fixes. | what vulnarability does pybeerxml version less then 1.0.8 have | |
Having vulnarability PVE-2021-38043 Advisory: Version 1.1.2: Bible pickle files have been replaced by JSON files for better performance and security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pybible-cli version less then 1.1.2 have ### Response: Having vulnarability PVE-2021-38043 Advisory: Version 1.1.2: Bible pickle files have been replaced by JSON files for better performance and security. | what vulnarability does pybible-cli version less then 1.1.2 have | |
Having vulnarability PVE-2023-62663 Advisory: Pybit-proxy 2.2.2rc1 includes a fix for a bug where, upon WSS disconnection, pybit rapidly tries to re-establish the connection, which results in being banned by the CDN for malicious activity
https://github.com/bybit-exchange/pybit/commit/6220d7e99716dad175c877ffde23aebeef2b3979 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pybit-proxy version less then 2.2.2rc1 have ### Response: Having vulnarability PVE-2023-62663 Advisory: Pybit-proxy 2.2.2rc1 includes a fix for a bug where, upon WSS disconnection, pybit rapidly tries to re-establish the connection, which results in being banned by the CDN for malicious activity
https://github.com/bybit-exchange/pybit/commit/6220d7e99716dad175c877ffde23aebeef2b3979 | what vulnarability does pybit-proxy version less then 2.2.2rc1 have | |
Having vulnarability PVE-2023-59604 Advisory: Pybluemonday 0.0.10 updates its GO dependency 'bluemonday' to version '1.0.23' to fix a vulnerability.
https://github.com/ColdHeat/pybluemonday/pull/36 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pybluemonday version less then 0.0.10 have ### Response: Having vulnarability PVE-2023-59604 Advisory: Pybluemonday 0.0.10 updates its GO dependency 'bluemonday' to version '1.0.23' to fix a vulnerability.
https://github.com/ColdHeat/pybluemonday/pull/36 | what vulnarability does pybluemonday version less then 0.0.10 have | |
Having vulnarability CVE-2019-7560 Advisory: In parser/btorsmt2.c in Boolector 3.0.0, opening a specially crafted input file leads to a use after free in get_failed_assumptions or btor_delete.
https://github.com/Boolector/boolector/commit/8d979d02e0482c7137c9f3a34e6d430dbfd1f5c5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyboolector version less then 3.1.0 have ### Response: Having vulnarability CVE-2019-7560 Advisory: In parser/btorsmt2.c in Boolector 3.0.0, opening a specially crafted input file leads to a use after free in get_failed_assumptions or btor_delete.
https://github.com/Boolector/boolector/commit/8d979d02e0482c7137c9f3a34e6d430dbfd1f5c5 | what vulnarability does pyboolector version less then 3.1.0 have | |
Having vulnarability PVE-2023-58713 Advisory: Pybotx 0.55.3 updates its dependency 'fastapy' to v0.95.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pybotx version less then 0.55.3 have ### Response: Having vulnarability PVE-2023-58713 Advisory: Pybotx 0.55.3 updates its dependency 'fastapy' to v0.95.2 to include a security fix. | what vulnarability does pybotx version less then 0.55.3 have | |
Having vulnarability PVE-2021-39215 Advisory: Pyca 3.3 includes a configurable, random delay for ingests to avoid accidental DDoS attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyca version less then 3.3 have ### Response: Having vulnarability PVE-2021-39215 Advisory: Pyca 3.3 includes a configurable, random delay for ingests to avoid accidental DDoS attacks. | what vulnarability does pyca version less then 3.3 have | |
Having vulnarability CVE-2022-4203 Advisory: Pycape 3.0.0 updates its dependency 'cryptography' to v39.0.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycape version less then 3.0.0 have ### Response: Having vulnarability CVE-2022-4203 Advisory: Pycape 3.0.0 updates its dependency 'cryptography' to v39.0.1 to include security fixes. | what vulnarability does pycape version less then 3.0.0 have | |
Having vulnarability CVE-2015-2313 Advisory: Pycapnp 0.5.5 updates its dependency libcapnp to version '0.5.1.2' to include a fix for an Uncontrolled Resource Consumption vulnerability.
https://github.com/capnproto/pycapnp/commit/2027bac43493fe4fa8bdfcf8a80ef67a3bdb085d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycapnp version less then 0.5.5 have ### Response: Having vulnarability CVE-2015-2313 Advisory: Pycapnp 0.5.5 updates its dependency libcapnp to version '0.5.1.2' to include a fix for an Uncontrolled Resource Consumption vulnerability.
https://github.com/capnproto/pycapnp/commit/2027bac43493fe4fa8bdfcf8a80ef67a3bdb085d | what vulnarability does pycapnp version less then 0.5.5 have | |
Having vulnarability CVE-2015-2310 Advisory: Pycapnp-async 0.5.4 updates the bundled C++ libcapnp to v0.5.1.1 security release. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycapnp-async version less then 0.5.4 have ### Response: Having vulnarability CVE-2015-2310 Advisory: Pycapnp-async 0.5.4 updates the bundled C++ libcapnp to v0.5.1.1 security release. | what vulnarability does pycapnp-async version less then 0.5.4 have | |
Having vulnarability CVE-2022-2309 Advisory: Pycaption 2.1.0 updates its dependency 'lxml' requirement to '>=4.9.1' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycaption version less then 2.1.0 have ### Response: Having vulnarability CVE-2022-2309 Advisory: Pycaption 2.1.0 updates its dependency 'lxml' requirement to '>=4.9.1' to include a security fix. | what vulnarability does pycaption version less then 2.1.0 have | |
Having vulnarability CVE-2016-5180 Advisory: Pycares before 2.1.1 is vulnerable to CVE-2016-5180.
https://github.com/saghul/pycares/commit/0115c819d9ed876999c4f116f8b155ec503e57bc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycares version less then 2.1.1 have ### Response: Having vulnarability CVE-2016-5180 Advisory: Pycares before 2.1.1 is vulnerable to CVE-2016-5180.
https://github.com/saghul/pycares/commit/0115c819d9ed876999c4f116f8b155ec503e57bc | what vulnarability does pycares version less then 2.1.1 have | |
Having vulnarability PVE-2024-65275 Advisory: Pyccel version 1.9.0 addresses a race condition issue within its `ndarrays` folder handling during the compilation process on macOS, enhancing the stability and reliability of the compilation.
#Note: It only affects macOS users.
https://github.com/pyccel/pyccel/pull/1445 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyccel version less then 1.9.0 have ### Response: Having vulnarability PVE-2024-65275 Advisory: Pyccel version 1.9.0 addresses a race condition issue within its `ndarrays` folder handling during the compilation process on macOS, enhancing the stability and reliability of the compilation.
#Note: It only affects macOS users.
https://github.com/pyccel/pyccel/pull/1445 | what vulnarability does pyccel version less then 1.9.0 have | |
Having vulnarability PVE-2021-38857 Advisory: Pycln 0.0.1alpha.3 mentions: "C wrapped modules import star expanding related vulnerability by hadialqattan" | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycln version less then 0.0.1alpha.3 have ### Response: Having vulnarability PVE-2021-38857 Advisory: Pycln 0.0.1alpha.3 mentions: "C wrapped modules import star expanding related vulnerability by hadialqattan" | what vulnarability does pycln version less then 0.0.1alpha.3 have | |
Having vulnarability CVE-2023-26485 Advisory: Pycmarkgfm 1.2.0 and prior versions rely on 'cmark-gfm' v0.29.0.gfm.6, which is vulnerable to a polynomial time complexity issue.
https://github.com/zopieux/pycmarkgfm/blob/2c31829e37b9d9be26d442e4a3cc0bbcdc9670a8/generated/cmark-gfm_version.h#L5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycmarkgfm version less then equal to 1.2.0 have ### Response: Having vulnarability CVE-2023-26485 Advisory: Pycmarkgfm 1.2.0 and prior versions rely on 'cmark-gfm' v0.29.0.gfm.6, which is vulnerable to a polynomial time complexity issue.
https://github.com/zopieux/pycmarkgfm/blob/2c31829e37b9d9be26d442e4a3cc0bbcdc9670a8/generated/cmark-gfm_version.h#L5 | what vulnarability does pycmarkgfm version less then equal to 1.2.0 have | |
Having vulnarability CVE-2023-4863 Advisory: Pycolmap 0.4.0 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/pycolmap/0.4.0/packages/4b/bb/90fb7e73617694c411c95f48dd51125f4eb6fa7baf16164ac730bd494809/pycolmap-0.4.0-cp310-cp310-manylinux2014_x86_64.whl | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycolmap version greather then equal to 0.2.0,less then equal to 0.4.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Pycolmap 0.4.0 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/pycolmap/0.4.0/packages/4b/bb/90fb7e73617694c411c95f48dd51125f4eb6fa7baf16164ac730bd494809/pycolmap-0.4.0-cp310-cp310-manylinux2014_x86_64.whl | what vulnarability does pycolmap version greather then equal to 0.2.0,less then equal to 0.4.0 have | |
Having vulnarability PVE-2023-53562 Advisory: Pycolorz is a malicious package. It downloads and executes obfuscated code.
https://inspector.pypi.io/project/pycolorz/0.0.6/packages/5c/3e/2db21b0e3f13f8930798b5e94a3018a76ce310eba4aeebfb5eed82f75880/pycolorz-0.0.6.tar.gz/pycolorz-0.0.6/setup.py#line.29 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycolorz version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53562 Advisory: Pycolorz is a malicious package. It downloads and executes obfuscated code.
https://inspector.pypi.io/project/pycolorz/0.0.6/packages/5c/3e/2db21b0e3f13f8930798b5e94a3018a76ce310eba4aeebfb5eed82f75880/pycolorz-0.0.6.tar.gz/pycolorz-0.0.6/setup.py#line.29 | what vulnarability does pycolorz version greather then equal to 0 have | |
Having vulnarability PVE-2022-45423 Advisory: Pyconau-funtimes is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyconau-funtimes version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45423 Advisory: Pyconau-funtimes is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does pyconau-funtimes version greather then 0,less then 0 have | |
Having vulnarability CVE-2018-18074 Advisory: Pyconll 1.1.0 updates 'requests' dependency to v2.20.0 due to a security flaw. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyconll version less then 1.1.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Pyconll 1.1.0 updates 'requests' dependency to v2.20.0 due to a security flaw. | what vulnarability does pyconll version less then 1.1.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Pycontw-Report-Generator version 1.5.0 includes a fix for the function 'read_yaml' in 'report_generator/io/yaml.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/pycontw/pycontw-postevent-report-generator/commit/f872f9f207e7a6f14e04ff77ca49922c6a0839b4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycontw-report-generator version less then 1.5.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Pycontw-Report-Generator version 1.5.0 includes a fix for the function 'read_yaml' in 'report_generator/io/yaml.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/pycontw/pycontw-postevent-report-generator/commit/f872f9f207e7a6f14e04ff77ca49922c6a0839b4 | what vulnarability does pycontw-report-generator version less then 1.5.0 have | |
Having vulnarability PVE-2021-26729 Advisory: Pycookiecheat 0.2.0 makes SQL query more secure by avoiding string formatting. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycookiecheat version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-26729 Advisory: Pycookiecheat 0.2.0 makes SQL query more secure by avoiding string formatting. | what vulnarability does pycookiecheat version less then 0.2.0 have | |
Having vulnarability CVE-2022-34981 Advisory: The PyCrowdTangle package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycrowdtangle version greather then equal to 0.0.1,less then 0.0.3 have ### Response: Having vulnarability CVE-2022-34981 Advisory: The PyCrowdTangle package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party. | what vulnarability does pycrowdtangle version greather then equal to 0.0.1,less then 0.0.3 have | |
Having vulnarability PVE-2021-40087 Advisory: Pycrtsh 0.3.4 upgrades the 'lxml' dependency from 4.5.1 to 4.6.2 following a security bug. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycrtsh version less then 0.3.4 have ### Response: Having vulnarability PVE-2021-40087 Advisory: Pycrtsh 0.3.4 upgrades the 'lxml' dependency from 4.5.1 to 4.6.2 following a security bug. | what vulnarability does pycrtsh version less then 0.3.4 have | |
Having vulnarability PVE-2021-39109 Advisory: Pycryptex 0.5.0 adds new config keys (***secure-deletion*** and ***secure-deletion-passes***) to set securely deletion of clear files in encryption operations. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycryptex version less then 0.5.0 have ### Response: Having vulnarability PVE-2021-39109 Advisory: Pycryptex 0.5.0 adds new config keys (***secure-deletion*** and ***secure-deletion-passes***) to set securely deletion of clear files in encryption operations. | what vulnarability does pycryptex version less then 0.5.0 have | |
Having vulnarability CVE-2012-2417 Advisory: Pycrypto version 2.6 includes a fix for CVE-2012-2417: PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycrypto version less then 2.6 have ### Response: Having vulnarability CVE-2012-2417 Advisory: Pycrypto version 2.6 includes a fix for CVE-2012-2417: PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2 | what vulnarability does pycrypto version less then 2.6 have | |
Having vulnarability PVE-2021-41775 Advisory: Pycryptodome 3.10.3 improves robustness of PKCS1v1.5 decryption against timing attacks.
https://github.com/Legrandin/pycryptodome/commit/853054937e29e6cd3dc61228be1dc768b688460b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycryptodome version less then 3.10.3 have ### Response: Having vulnarability PVE-2021-41775 Advisory: Pycryptodome 3.10.3 improves robustness of PKCS1v1.5 decryption against timing attacks.
https://github.com/Legrandin/pycryptodome/commit/853054937e29e6cd3dc61228be1dc768b688460b | what vulnarability does pycryptodome version less then 3.10.3 have | |
Having vulnarability PVE-2021-41775 Advisory: Pycryptodomex 3.10.3 improves robustness of PKCS1v1.5 decryption against timing attacks.
https://github.com/Legrandin/pycryptodome/commit/853054937e29e6cd3dc61228be1dc768b688460b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycryptodomex version less then 3.10.3 have ### Response: Having vulnarability PVE-2021-41775 Advisory: Pycryptodomex 3.10.3 improves robustness of PKCS1v1.5 decryption against timing attacks.
https://github.com/Legrandin/pycryptodome/commit/853054937e29e6cd3dc61228be1dc768b688460b | what vulnarability does pycryptodomex version less then 3.10.3 have | |
Having vulnarability CVE-2016-8640 Advisory: A SQL injection vulnerability in pycsw all versions before 2.0.2, 1.10.5 and 1.8.6 that leads to read and extract of any data from any table in the pycsw database that the database user has access to. Also on PostgreSQL (at least) it is possible to perform updates/inserts/deletes and database modifications to any table the database user has access to. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pycsw version less then 2.0.2 have ### Response: Having vulnarability CVE-2016-8640 Advisory: A SQL injection vulnerability in pycsw all versions before 2.0.2, 1.10.5 and 1.8.6 that leads to read and extract of any data from any table in the pycsw database that the database user has access to. Also on PostgreSQL (at least) it is possible to perform updates/inserts/deletes and database modifications to any table the database user has access to. | what vulnarability does pycsw version less then 2.0.2 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.