output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2021-26052 Advisory: pyramid-weblayer before 0.12 does not protect AJAX requests through the CSRF machinery. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyramid-weblayer version less then 0.12 have ### Response: Having vulnarability PVE-2021-26052 Advisory: pyramid-weblayer before 0.12 does not protect AJAX requests through the CSRF machinery. | what vulnarability does pyramid-weblayer version less then 0.12 have | |
Having vulnarability CVE-2022-4396 Advisory: A vulnerability was found in RDFlib pyrdfa3 and classified as problematic. This issue affects the function _get_option of the file pyRdfa/__init__.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ffd1d62dd50d5f4190013b39cedcdfbd81f3ce3e. It is recommended to apply a patch to fix this issue. The identifier VDB-215249 was assigned to this vulnerability.
NOTE: RDFlib is no longer being developed and is looking for a new maintainer
https://github.com/RDFLib/pyrdfa3/issues/38 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyrdfa3 version greather then equal to 0 have ### Response: Having vulnarability CVE-2022-4396 Advisory: A vulnerability was found in RDFlib pyrdfa3 and classified as problematic. This issue affects the function _get_option of the file pyRdfa/__init__.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ffd1d62dd50d5f4190013b39cedcdfbd81f3ce3e. It is recommended to apply a patch to fix this issue. The identifier VDB-215249 was assigned to this vulnerability.
NOTE: RDFlib is no longer being developed and is looking for a new maintainer
https://github.com/RDFLib/pyrdfa3/issues/38 | what vulnarability does pyrdfa3 version greather then equal to 0 have | |
Having vulnarability CVE-2024-22421 Advisory: Pyrit version 0.1.0 has upgraded its notebook dependency to version 7.0.7 in response to the security issue outlined in CVE-2024-22421. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyrit version less then 0.1.0 have ### Response: Having vulnarability CVE-2024-22421 Advisory: Pyrit version 0.1.0 has upgraded its notebook dependency to version 7.0.7 in response to the security issue outlined in CVE-2024-22421. | what vulnarability does pyrit version less then 0.1.0 have | |
Having vulnarability CVE-2011-2765 Advisory: pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyro version less then 3.15 have ### Response: Having vulnarability CVE-2011-2765 Advisory: pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks. | what vulnarability does pyro version less then 3.15 have | |
Having vulnarability PVE-2021-34514 Advisory: Pyro4 4.44 secures HMAC comparison code against timing attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyro4 version less then 4.44 have ### Response: Having vulnarability PVE-2021-34514 Advisory: Pyro4 4.44 secures HMAC comparison code against timing attacks. | what vulnarability does pyro4 version less then 4.44 have | |
Having vulnarability PVE-2023-52934 Advisory: Pyrologin is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyrologin version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52934 Advisory: Pyrologin is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | what vulnarability does pyrologin version greather then equal to 0 have | |
Having vulnarability CVE-2019-11324 Advisory: Pyrotools 1.0.1 updates its dependency 'urllib3' to v1.24.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyrotools version less then 1.0.1 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Pyrotools 1.0.1 updates its dependency 'urllib3' to v1.24.2 to include a security fix. | what vulnarability does pyrotools version less then 1.0.1 have | |
Having vulnarability PVE-2021-34332 Advisory: pysam 0.11.2 wraps htslib/samtools/bcfools versions 1.4.1 in response to a security fix in these libraries | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysam version less then 0.11.2 have ### Response: Having vulnarability PVE-2021-34332 Advisory: pysam 0.11.2 wraps htslib/samtools/bcfools versions 1.4.1 in response to a security fix in these libraries | what vulnarability does pysam version less then 0.11.2 have | |
Having vulnarability CVE-2016-10127 Advisory: PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysaml2 version less then 4.4.0 have ### Response: Having vulnarability CVE-2016-10127 Advisory: PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response. | what vulnarability does pysaml2 version less then 4.4.0 have | |
Having vulnarability PVE-2021-26053 Advisory: pysandbox before 1.0.2 allows access to several dict methods. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysandbox version less then 1.0.2 have ### Response: Having vulnarability PVE-2021-26053 Advisory: pysandbox before 1.0.2 allows access to several dict methods. | what vulnarability does pysandbox version less then 1.0.2 have | |
Having vulnarability PVE-2021-38404 Advisory: Pysbd 0.3.0rc includes an upgrade of bleach to address a security vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysbd version less then 0.3.0rc have ### Response: Having vulnarability PVE-2021-38404 Advisory: Pysbd 0.3.0rc includes an upgrade of bleach to address a security vulnerability. | what vulnarability does pysbd version less then 0.3.0rc have | |
Having vulnarability CVE-2021-45046 Advisory: Pyserini 0.11.0.0 and prior includes a version of Anserini affected by critical and severe vulnerabilities, related to log4j. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyserini version less then equal to 0.11.0.0 have ### Response: Having vulnarability CVE-2021-45046 Advisory: Pyserini 0.11.0.0 and prior includes a version of Anserini affected by critical and severe vulnerabilities, related to log4j. | what vulnarability does pyserini version less then equal to 0.11.0.0 have | |
Having vulnarability CVE-2013-1630 Advisory: pyshop before 0.7.1 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a download operation. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyshop version less then 0.7.1 have ### Response: Having vulnarability CVE-2013-1630 Advisory: pyshop before 0.7.1 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a download operation. | what vulnarability does pyshop version less then 0.7.1 have | |
Having vulnarability CVE-2023-37920 Advisory: Pysigma 0.10.0 updates its dependency 'certifi' to version "2023.7.22" to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysigma version less then 0.10.0 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Pysigma 0.10.0 updates its dependency 'certifi' to version "2023.7.22" to include a security fix. | what vulnarability does pysigma version less then 0.10.0 have | |
Having vulnarability CVE-2023-37920 Advisory: Pysigma-backend-microsoft365defender 0.2.1 pins 'certifi' version to '2023.07.22' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysigma-backend-microsoft365defender version less then 0.2.1 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Pysigma-backend-microsoft365defender 0.2.1 pins 'certifi' version to '2023.07.22' to include a security fix. | what vulnarability does pysigma-backend-microsoft365defender version less then 0.2.1 have | |
Having vulnarability CVE-2022-42964 Advisory: Pysipfenn version 0.15.1 now mandates pymatgen version 2024.2.20, addressing a critical security flaw in pymatgen.io as per CVE-2022-42964.
https://github.com/PhasesResearchLab/pySIPFENN/commit/89131bf789c0f8ee4ed33eaa839d34bcc2c10be5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysipfenn version less then 0.15.1 have ### Response: Having vulnarability CVE-2022-42964 Advisory: Pysipfenn version 0.15.1 now mandates pymatgen version 2024.2.20, addressing a critical security flaw in pymatgen.io as per CVE-2022-42964.
https://github.com/PhasesResearchLab/pySIPFENN/commit/89131bf789c0f8ee4ed33eaa839d34bcc2c10be5 | what vulnarability does pysipfenn version less then 0.15.1 have | |
Having vulnarability PVE-2022-51691 Advisory: Pyslyte is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyslyte version greather then 0 have ### Response: Having vulnarability PVE-2022-51691 Advisory: Pyslyte is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does pyslyte version greather then 0 have | |
Having vulnarability CVE-2013-4477 Advisory: The LDAP backend in OpenStack Identity (Keystone) Grizzly and Havana, when removing a role on a tenant for a user who does not have that role, adds the role to the user, which allows local users to gain privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysmf version less then equal to 2013.2.1 have ### Response: Having vulnarability CVE-2013-4477 Advisory: The LDAP backend in OpenStack Identity (Keystone) Grizzly and Havana, when removing a role on a tenant for a user who does not have that role, adds the role to the user, which allows local users to gain privileges. | what vulnarability does pysmf version less then equal to 2013.2.1 have | |
Having vulnarability CVE-2023-37920 Advisory: Pysna 0.1.3 updates its dependency 'certifi' to version '2023.07.22' to include a fix for a vulnerability.
https://github.com/mathun3003/PySNA/commit/1aebdbf4806175723970187f57c09e4b1f7caf72 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysna version less then 0.1.3 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Pysna 0.1.3 updates its dependency 'certifi' to version '2023.07.22' to include a fix for a vulnerability.
https://github.com/mathun3003/PySNA/commit/1aebdbf4806175723970187f57c09e4b1f7caf72 | what vulnarability does pysna version less then 0.1.3 have | |
Having vulnarability CVE-2023-5752 Advisory: Pysnc version 1.1.6 upgrades its pip requirement to "^23.3.1" to address the security concerns outlined in CVE-2023-5752. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysnc version less then 1.1.6 have ### Response: Having vulnarability CVE-2023-5752 Advisory: Pysnc version 1.1.6 upgrades its pip requirement to "^23.3.1" to address the security concerns outlined in CVE-2023-5752. | what vulnarability does pysnc version less then 1.1.6 have | |
Having vulnarability CVE-2021-28363 Advisory: Pysnyk 0.7.0 updates its dependency 'urllib3' to v1.26.8 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysnyk version less then 0.7.0 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Pysnyk 0.7.0 updates its dependency 'urllib3' to v1.26.8 to include security fixes. | what vulnarability does pysnyk version less then 0.7.0 have | |
Having vulnarability PVE-2023-62827 Advisory: Pysodium 0.7.17 fixes the maximum message size that was a value larger than what is considered secure which could potentially lead to a buffer overflow attack.
https://github.com/stef/pysodium/commit/8d2c6d897b0fc6e20470d8e554679a5b693ae4e4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysodium version less then 0.7.17 have ### Response: Having vulnarability PVE-2023-62827 Advisory: Pysodium 0.7.17 fixes the maximum message size that was a value larger than what is considered secure which could potentially lead to a buffer overflow attack.
https://github.com/stef/pysodium/commit/8d2c6d897b0fc6e20470d8e554679a5b693ae4e4 | what vulnarability does pysodium version less then 0.7.17 have | |
Having vulnarability CVE-2019-10099 Advisory: Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyspark version less then 2.3.3 have ### Response: Having vulnarability CVE-2019-10099 Advisory: Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs. | what vulnarability does pyspark version less then 2.3.3 have | |
Having vulnarability CVE-2023-32681 Advisory: Pyspeedinsights 0.3.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/wjh18/pyspeedinsights/commit/3fe8d3b68097b5b83630d1e844b06d10931954c1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyspeedinsights version less then 0.3.2 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Pyspeedinsights 0.3.2 updates its dependency 'requests' to version '2.31.0' to include a security fix.
https://github.com/wjh18/pyspeedinsights/commit/3fe8d3b68097b5b83630d1e844b06d10931954c1 | what vulnarability does pyspeedinsights version less then 0.3.2 have | |
Having vulnarability PVE-2021-37431 Advisory: Pyspf 2.0.1 prevents cache poisoning attacks and malformed RR attacks.
https://github.com/sdgathman/pyspf/commit/5f5d4b081c41963e84083590faa41fa0f90877fa | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyspf version less then 2.0.1 have ### Response: Having vulnarability PVE-2021-37431 Advisory: Pyspf 2.0.1 prevents cache poisoning attacks and malformed RR attacks.
https://github.com/sdgathman/pyspf/commit/5f5d4b081c41963e84083590faa41fa0f90877fa | what vulnarability does pyspf version less then 2.0.1 have | |
Having vulnarability CVE-2022-45907 Advisory: Pyspi version 0.4.1 updates its Torch dependency from version 1.10.0 to 1.13.1 to address the security vulnerability identified as CVE-2022-45907.
https://github.com/DynamicsAndNeuralSystems/pyspi/commit/3b14ea11f4c43f2775beb8c701aaf827c230401d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyspi version less then 0.4.1 have ### Response: Having vulnarability CVE-2022-45907 Advisory: Pyspi version 0.4.1 updates its Torch dependency from version 1.10.0 to 1.13.1 to address the security vulnerability identified as CVE-2022-45907.
https://github.com/DynamicsAndNeuralSystems/pyspi/commit/3b14ea11f4c43f2775beb8c701aaf827c230401d | what vulnarability does pyspi version less then 0.4.1 have | |
Having vulnarability CVE-2021-25293 Advisory: Pysstv 0.5 updates its dependency 'pillow' from 4.3.0 to 8.1.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysstv version less then 0.5 have ### Response: Having vulnarability CVE-2021-25293 Advisory: Pysstv 0.5 updates its dependency 'pillow' from 4.3.0 to 8.1.1 to include security fixes. | what vulnarability does pysstv version less then 0.5 have | |
Having vulnarability PVE-2021-43093 Advisory: Pystache 0.5.4-2 fixes insecure HTTP urls.
https://github.com/sarnold/pystache/commit/5b482af8122f529859d0d0cfbb6b2d345458e166 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pystache version less then 0.5.4-2 have ### Response: Having vulnarability PVE-2021-43093 Advisory: Pystache 0.5.4-2 fixes insecure HTTP urls.
https://github.com/sarnold/pystache/commit/5b482af8122f529859d0d0cfbb6b2d345458e166 | what vulnarability does pystache version less then 0.5.4-2 have | |
Having vulnarability CVE-2020-10735 Advisory: Pysteps 1.6.0 drops support for Python 3.6 as it arrived to end-of-life and don't receive security updates anymore. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysteps version less then 1.6.0 have ### Response: Having vulnarability CVE-2020-10735 Advisory: Pysteps 1.6.0 drops support for Python 3.6 as it arrived to end-of-life and don't receive security updates anymore. | what vulnarability does pysteps version less then 1.6.0 have | |
Having vulnarability PVE-2021-42379 Advisory: Pyston 2.3.1 includes a fix coming from Python 3.8.12 release: multiple CRLF injection vulnerabilities in smtplib. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pyston version less then 2.3.1 have ### Response: Having vulnarability PVE-2021-42379 Advisory: Pyston 2.3.1 includes a fix coming from Python 3.8.12 release: multiple CRLF injection vulnerabilities in smtplib. | what vulnarability does pyston version less then 2.3.1 have | |
Having vulnarability PVE-2022-51692 Advisory: Pystyle is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pystyle version greather then 0 have ### Response: Having vulnarability PVE-2022-51692 Advisory: Pystyle is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does pystyle version greather then 0 have | |
Having vulnarability PVE-2022-51690 Advisory: Pystyte is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pystyte version greather then 0 have ### Response: Having vulnarability PVE-2022-51690 Advisory: Pystyte is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does pystyte version greather then 0 have | |
Having vulnarability CVE-2021-45046 Advisory: Pysys-java 0.1 and prior includes a version of 'log4j-core' affected by critical and severe vulnerabilities.
https://github.com/ben-spiller/pysysjava/pull/14 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pysys-java version less then equal to 0.1 have ### Response: Having vulnarability CVE-2021-45046 Advisory: Pysys-java 0.1 and prior includes a version of 'log4j-core' affected by critical and severe vulnerabilities.
https://github.com/ben-spiller/pysysjava/pull/14 | what vulnarability does pysys-java version less then equal to 0.1 have | |
Having vulnarability PVE-2021-41000 Advisory: Pytablewriter 0.47.0 prevents xslx formula injection.
https://github.com/thombashi/pytablewriter/issues/20 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytablewriter version less then 0.47.0 have ### Response: Having vulnarability PVE-2021-41000 Advisory: Pytablewriter 0.47.0 prevents xslx formula injection.
https://github.com/thombashi/pytablewriter/issues/20 | what vulnarability does pytablewriter version less then 0.47.0 have | |
Having vulnarability PVE-2022-45446 Advisory: Pytagora is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytagora version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45446 Advisory: Pytagora is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | what vulnarability does pytagora version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45447 Advisory: Pytagora2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytagora2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45447 Advisory: Pytagora2 is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | what vulnarability does pytagora2 version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-39658 Advisory: Pytask-latex 0.0.7 ensures that 'outputdirectory' is relative to the latex document to address security problems.
https://github.com/pytask-dev/pytask-latex/commit/634d70d0807c118cba2b2119122591c7988a1469 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytask-latex version less then 0.0.7 have ### Response: Having vulnarability PVE-2021-39658 Advisory: Pytask-latex 0.0.7 ensures that 'outputdirectory' is relative to the latex document to address security problems.
https://github.com/pytask-dev/pytask-latex/commit/634d70d0807c118cba2b2119122591c7988a1469 | what vulnarability does pytask-latex version less then 0.0.7 have | |
Having vulnarability PVE-2021-37267 Advisory: pytest-aoc 1.2a6 removes security misfeature: no cookies inside setup.cfg. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-aoc version less then 1.2a6 have ### Response: Having vulnarability PVE-2021-37267 Advisory: pytest-aoc 1.2a6 removes security misfeature: no cookies inside setup.cfg. | what vulnarability does pytest-aoc version less then 1.2a6 have | |
Having vulnarability PVE-2024-66922 Advisory: Pytest-cov 2.0.0 resolves a race condition issue experienced when utilizing xdist, where multiple workers attempted to combine files simultaneously, leading to potential conflicts. This update ensures coverage data isn't combined by the workers, mitigating the risk of race conditions due to the non-atomic nature of the combining process. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-cov version less then 2.0.0 have ### Response: Having vulnarability PVE-2024-66922 Advisory: Pytest-cov 2.0.0 resolves a race condition issue experienced when utilizing xdist, where multiple workers attempted to combine files simultaneously, leading to potential conflicts. This update ensures coverage data isn't combined by the workers, mitigating the risk of race conditions due to the non-atomic nature of the combining process. | what vulnarability does pytest-cov version less then 2.0.0 have | |
Having vulnarability PVE-2021-26059 Advisory: Pytest-devpi-server 1.1.0 changes default behavior of workspace.run() to not use a subshell for security reasons.
https://github.com/man-group/pytest-plugins/commit/ea6072a461edde63c07f7b7f4a4daffdc09fb116 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-devpi-server version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26059 Advisory: Pytest-devpi-server 1.1.0 changes default behavior of workspace.run() to not use a subshell for security reasons.
https://github.com/man-group/pytest-plugins/commit/ea6072a461edde63c07f7b7f4a4daffdc09fb116 | what vulnarability does pytest-devpi-server version less then 1.1.0 have | |
Having vulnarability PVE-2021-26060 Advisory: Pytest-git 1.1.0 changes default behavior of workspace.run() to not use a subshell for security reasons.
https://github.com/man-group/pytest-plugins/commit/ea6072a461edde63c07f7b7f4a4daffdc09fb116 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-git version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26060 Advisory: Pytest-git 1.1.0 changes default behavior of workspace.run() to not use a subshell for security reasons.
https://github.com/man-group/pytest-plugins/commit/ea6072a461edde63c07f7b7f4a4daffdc09fb116 | what vulnarability does pytest-git version less then 1.1.0 have | |
Having vulnarability CVE-2020-27619 Advisory: Pytest-httpserver 1.0.2 drops support for Python 3.4 and 3.5. These versions arrived to EOL and don't receive security fixes anymore. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-httpserver version less then 1.0.2 have ### Response: Having vulnarability CVE-2020-27619 Advisory: Pytest-httpserver 1.0.2 drops support for Python 3.4 and 3.5. These versions arrived to EOL and don't receive security fixes anymore. | what vulnarability does pytest-httpserver version less then 1.0.2 have | |
Having vulnarability PVE-2021-26061 Advisory: pytest-profiling before 1.1.0 uses a subshell in workspace.run. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-profiling version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26061 Advisory: pytest-profiling before 1.1.0 uses a subshell in workspace.run. | what vulnarability does pytest-profiling version less then 1.1.0 have | |
Having vulnarability PVE-2021-26062 Advisory: Pytest-qt-app 1.1.0 fixes a code injection vulnerability by using 'shell=False' in default workspace.
https://github.com/man-group/pytest-plugins/commit/ea6072a461edde63c07f7b7f4a4daffdc09fb116 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-qt-app version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26062 Advisory: Pytest-qt-app 1.1.0 fixes a code injection vulnerability by using 'shell=False' in default workspace.
https://github.com/man-group/pytest-plugins/commit/ea6072a461edde63c07f7b7f4a4daffdc09fb116 | what vulnarability does pytest-qt-app version less then 1.1.0 have | |
Having vulnarability PVE-2021-43313 Advisory: Pytest-runner depends on deprecated features of setuptools and relies on features that break security mechanisms in pip. For example ‘setup_requires’ and ‘tests_require’ bypass pip --require-hashes. See also pypa/setuptools#1684.
It is recommended that you:
- Remove 'pytest-runner' from your setup_requires, preferably removing the setup_requires option.
- Remove 'pytest' and any other testing requirements from tests_require, preferably removing the tests_requires option.
- Select a tool to bootstrap and then run tests such as tox.
https://github.com/pytest-dev/pytest-runner/blob/289a77b179535d8137118e3b8591d9e727130d6d/README.rst | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-runner version greather then 0 have ### Response: Having vulnarability PVE-2021-43313 Advisory: Pytest-runner depends on deprecated features of setuptools and relies on features that break security mechanisms in pip. For example ‘setup_requires’ and ‘tests_require’ bypass pip --require-hashes. See also pypa/setuptools#1684.
It is recommended that you:
- Remove 'pytest-runner' from your setup_requires, preferably removing the setup_requires option.
- Remove 'pytest' and any other testing requirements from tests_require, preferably removing the tests_requires option.
- Select a tool to bootstrap and then run tests such as tox.
https://github.com/pytest-dev/pytest-runner/blob/289a77b179535d8137118e3b8591d9e727130d6d/README.rst | what vulnarability does pytest-runner version greather then 0 have | |
Having vulnarability PVE-2021-26063 Advisory: Pytest-server-fixtures 1.1.0 changes default behavior of workspace.run() to not use a subshell for security reasons.
https://github.com/man-group/pytest-plugins/commit/ea6072a461edde63c07f7b7f4a4daffdc09fb116 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-server-fixtures version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26063 Advisory: Pytest-server-fixtures 1.1.0 changes default behavior of workspace.run() to not use a subshell for security reasons.
https://github.com/man-group/pytest-plugins/commit/ea6072a461edde63c07f7b7f4a4daffdc09fb116 | what vulnarability does pytest-server-fixtures version less then 1.1.0 have | |
Having vulnarability PVE-2021-26064 Advisory: pytest-shutil before 1.1.0 uses a subshell in workspace.run. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-shutil version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26064 Advisory: pytest-shutil before 1.1.0 uses a subshell in workspace.run. | what vulnarability does pytest-shutil version less then 1.1.0 have | |
Having vulnarability CVE-2023-29159 Advisory: Pytest-socket 0.7.0 updates its dependency on the Starlette library from version "^0.26.1" to "^0.27.0". This change addresses the security vulnerability CVE-2023-29159.
https://github.com/miketheman/pytest-socket/pull/219/commits/8d8bd41e56895a9114bce2ea93fb5b6fa6d2e123 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-socket version less then 0.7.0 have ### Response: Having vulnarability CVE-2023-29159 Advisory: Pytest-socket 0.7.0 updates its dependency on the Starlette library from version "^0.26.1" to "^0.27.0". This change addresses the security vulnerability CVE-2023-29159.
https://github.com/miketheman/pytest-socket/pull/219/commits/8d8bd41e56895a9114bce2ea93fb5b6fa6d2e123 | what vulnarability does pytest-socket version less then 0.7.0 have | |
Having vulnarability PVE-2021-26065 Advisory: pytest-verbose-parametrize before 1.1.0 uses a subshell in workspace.run. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-verbose-parametrize version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26065 Advisory: pytest-verbose-parametrize before 1.1.0 uses a subshell in workspace.run. | what vulnarability does pytest-verbose-parametrize version less then 1.1.0 have | |
Having vulnarability PVE-2023-62251 Advisory: Pytest-xdist 1.2 includes a fix for a potential race condition vulnerability when simultanous pickling/unpickling.
https://github.com/pytest-dev/pytest-xdist/commit/45f7787fe28c36d7699e69a62b0c6ba42fcf1d20 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-xdist version less then 1.2 have ### Response: Having vulnarability PVE-2023-62251 Advisory: Pytest-xdist 1.2 includes a fix for a potential race condition vulnerability when simultanous pickling/unpickling.
https://github.com/pytest-dev/pytest-xdist/commit/45f7787fe28c36d7699e69a62b0c6ba42fcf1d20 | what vulnarability does pytest-xdist version less then 1.2 have | |
Having vulnarability CVE-2017-18342 Advisory: Pytest-Yamltree 0.1.2 includes a security patch for the function 'init' in 'pytest_yamltree.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/MarSoft/pytest-yamltree/commit/d94031f134ab5803958aa8f33f965a30a241cf4b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does pytest-yamltree version less then 0.1.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Pytest-Yamltree 0.1.2 includes a security patch for the function 'init' in 'pytest_yamltree.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/MarSoft/pytest-yamltree/commit/d94031f134ab5803958aa8f33f965a30a241cf4b | what vulnarability does pytest-yamltree version less then 0.1.2 have | |
Having vulnarability CVE-2017-20052 Advisory: A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python version less then 2.17.14 have ### Response: Having vulnarability CVE-2017-20052 Advisory: A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | what vulnarability does python version less then 2.17.14 have | |
Having vulnarability PVE-2023-61860 Advisory: Python-amazon-ad-api 0.5.1 includes a security fix that could lead the application to crash.
https://github.com/denisneuf/python-amazon-ad-api/pull/172 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-amazon-ad-api version less then 0.5.1 have ### Response: Having vulnarability PVE-2023-61860 Advisory: Python-amazon-ad-api 0.5.1 includes a security fix that could lead the application to crash.
https://github.com/denisneuf/python-amazon-ad-api/pull/172 | what vulnarability does python-amazon-ad-api version less then 0.5.1 have | |
Having vulnarability CVE-2019-15795 Advisory: Python-apt up to and including version 0.7.8 is vulnerable to CVE-2019-15796: Python-apt doesn't check if hashes are signed in 'Version.fetch_binary()' and 'Version.fetch_source()' of apt/package.py or in '_fetch_archives()' of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn't be allowed and has been fixed in verisions 1.9.5, 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.
https://ubuntu.com/security/notices/USN-4247-1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-apt version less then equal to 0.7.8 have ### Response: Having vulnarability CVE-2019-15795 Advisory: Python-apt up to and including version 0.7.8 is vulnerable to CVE-2019-15796: Python-apt doesn't check if hashes are signed in 'Version.fetch_binary()' and 'Version.fetch_source()' of apt/package.py or in '_fetch_archives()' of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn't be allowed and has been fixed in verisions 1.9.5, 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.
https://ubuntu.com/security/notices/USN-4247-1 | what vulnarability does python-apt version less then equal to 0.7.8 have | |
Having vulnarability CVE-2012-0787 Advisory: The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-augeas version less then 1.0.0 have ### Response: Having vulnarability CVE-2012-0787 Advisory: The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option. | what vulnarability does python-augeas version less then 1.0.0 have | |
Having vulnarability PVE-2021-41821 Advisory: Python-base-app version 0.2.25 adds improved HTTP header options. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-base-app version less then 0.2.25 have ### Response: Having vulnarability PVE-2021-41821 Advisory: Python-base-app version 0.2.25 adds improved HTTP header options. | what vulnarability does python-base-app version less then 0.2.25 have | |
Having vulnarability CVE-2013-2191 Advisory: python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof Bugzilla servers via a crafted certificate. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-bugzilla version less then 0.9.0 have ### Response: Having vulnarability CVE-2013-2191 Advisory: python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof Bugzilla servers via a crafted certificate. | what vulnarability does python-bugzilla version less then 0.9.0 have | |
Having vulnarability CVE-2009-4924 Advisory: Dan Pascu python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-cjson version less then 1.0.5 have ### Response: Having vulnarability CVE-2009-4924 Advisory: Dan Pascu python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element. | what vulnarability does python-cjson version less then 1.0.5 have | |
Having vulnarability CVE-2019-19118 Advisory: Python-clu 0.5.1 removes an unsafe requirement (Django==2.2.5). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-clu version less then 0.5.1 have ### Response: Having vulnarability CVE-2019-19118 Advisory: Python-clu 0.5.1 removes an unsafe requirement (Django==2.2.5). | what vulnarability does python-clu version less then 0.5.1 have | |
Having vulnarability CVE-2017-18342 Advisory: Python-Coveralls 2.9.3 includes a security patch for the function 'parse_args' in 'coveralls/init.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/z4r/python-coveralls/commit/cb798698f3d6ef120e6d6ff87d4d4a0e239d8c85#diff-82a6c0a53e21b94154c2c4ec0c9c76370e6e9d4305c551b8e70c82add2030db1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-coveralls version less then 2.9.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Python-Coveralls 2.9.3 includes a security patch for the function 'parse_args' in 'coveralls/init.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/z4r/python-coveralls/commit/cb798698f3d6ef120e6d6ff87d4d4a0e239d8c85#diff-82a6c0a53e21b94154c2c4ec0c9c76370e6e9d4305c551b8e70c82add2030db1 | what vulnarability does python-coveralls version less then 2.9.3 have | |
Having vulnarability PVE-2022-51752 Advisory: Python-dateuti is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-dateuti version greather then 0 have ### Response: Having vulnarability PVE-2022-51752 Advisory: Python-dateuti is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does python-dateuti version greather then 0 have | |
Having vulnarability CVE-2015-1326 Advisory: Python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file. See CVE-2015-1326. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-dbusmock version less then 0.15.1 have ### Response: Having vulnarability CVE-2015-1326 Advisory: Python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file. See CVE-2015-1326. | what vulnarability does python-dbusmock version less then 0.15.1 have | |
Having vulnarability CVE-2016-5851 Advisory: Python-docx 0.8.6 includes a fix for CVE-2016-5851: context-dependent attackers were able to conduct XML External Entity (XXE) attacks via a crafted document. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-docx version less then 0.8.6 have ### Response: Having vulnarability CVE-2016-5851 Advisory: Python-docx 0.8.6 includes a fix for CVE-2016-5851: context-dependent attackers were able to conduct XML External Entity (XXE) attacks via a crafted document. | what vulnarability does python-docx version less then 0.8.6 have | |
Having vulnarability PVE-2021-37168 Advisory: Python-engineio 3.5.2 removes a security alert in the requirements. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-engineio version less then 3.5.2 have ### Response: Having vulnarability PVE-2021-37168 Advisory: Python-engineio 3.5.2 removes a security alert in the requirements. | what vulnarability does python-engineio version less then 3.5.2 have | |
Having vulnarability CVE-2017-1000126 Advisory: A stack out of bounds read vulnerability exists in Exiv2 library 0.26 within the webp parser. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-exiv2 version equal to 0.26 have ### Response: Having vulnarability CVE-2017-1000126 Advisory: A stack out of bounds read vulnerability exists in Exiv2 library 0.26 within the webp parser. | what vulnarability does python-exiv2 version equal to 0.26 have | |
Having vulnarability PVE-2021-34408 Advisory: Python-fedora 0.3.26 fixes faswho auth plugin to set session cookies as secure and httponly and sets the Django session cookies httponly. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-fedora version less then 0.3.26 have ### Response: Having vulnarability PVE-2021-34408 Advisory: Python-fedora 0.3.26 fixes faswho auth plugin to set session cookies as secure and httponly and sets the Django session cookies httponly. | what vulnarability does python-fedora version less then 0.3.26 have | |
Having vulnarability PVE-2022-51753 Advisory: Python-flask is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-flask version greather then 0 have ### Response: Having vulnarability PVE-2022-51753 Advisory: Python-flask is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does python-flask version greather then 0 have | |
Having vulnarability PVE-2022-46073 Advisory: Python-for-android 0.5.3 recognizes Password fields as secure passwords to avoid keyboards "remembering" these passwords in their dictionaries.
https://github.com/kivy/python-for-android/issues/138 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-for-android version less then 0.5.3 have ### Response: Having vulnarability PVE-2022-46073 Advisory: Python-for-android 0.5.3 recognizes Password fields as secure passwords to avoid keyboards "remembering" these passwords in their dictionaries.
https://github.com/kivy/python-for-android/issues/138 | what vulnarability does python-for-android version less then 0.5.3 have | |
Having vulnarability PVE-2022-48257 Advisory: Python-framework 0.3.69 avoids attacks that could arrive from specifying custom requestHeaders.
https://github.com/SamuelJansen/python-framework/commit/c674433a8ec729fb093bf57e4e5f589931d64406 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-framework version less then 0.3.69 have ### Response: Having vulnarability PVE-2022-48257 Advisory: Python-framework 0.3.69 avoids attacks that could arrive from specifying custom requestHeaders.
https://github.com/SamuelJansen/python-framework/commit/c674433a8ec729fb093bf57e4e5f589931d64406 | what vulnarability does python-framework version less then 0.3.69 have | |
Having vulnarability PVE-2022-45430 Advisory: Python-ftp is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-ftp version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45430 Advisory: Python-ftp is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does python-ftp version greather then 0,less then 0 have | |
Having vulnarability CVE-2018-18074 Advisory: Python-gitlab 2.0.0 updates its dependency 'requests' to versions '>=2.22.0' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-gitlab version less then 2.0.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Python-gitlab 2.0.0 updates its dependency 'requests' to versions '>=2.22.0' to include a security fix. | what vulnarability does python-gitlab version less then 2.0.0 have | |
Having vulnarability CVE-2013-4111 Advisory: The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-glanceclient version less then 0.10.0 have ### Response: Having vulnarability CVE-2013-4111 Advisory: The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | what vulnarability does python-glanceclient version less then 0.10.0 have | |
Having vulnarability CVE-2013-7323 Advisory: Python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-gnupg version less then 0.3.5 have ### Response: Having vulnarability CVE-2013-7323 Advisory: Python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors. | what vulnarability does python-gnupg version less then 0.3.5 have | |
Having vulnarability CVE-2023-43804 Advisory: Python-homewizard-energy 2.1.2 updates its dependency 'urllib3' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-homewizard-energy version less then 2.1.2 have ### Response: Having vulnarability CVE-2023-43804 Advisory: Python-homewizard-energy 2.1.2 updates its dependency 'urllib3' to include a security fix. | what vulnarability does python-homewizard-energy version less then 2.1.2 have | |
Having vulnarability CVE-2023-24538 Advisory: Python-hugo 0.114.0 fixes the upstream Go templates bug with reversed key/value assignment, in response to the identified CVE-2023-24538 vulnerability.
https://github.com/gohugoio/hugo/commit/ee359df172ece11989e9b1bf35c2d376f2608ac6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-hugo version less then 0.114.0 have ### Response: Having vulnarability CVE-2023-24538 Advisory: Python-hugo 0.114.0 fixes the upstream Go templates bug with reversed key/value assignment, in response to the identified CVE-2023-24538 vulnerability.
https://github.com/gohugoio/hugo/commit/ee359df172ece11989e9b1bf35c2d376f2608ac6 | what vulnarability does python-hugo version less then 0.114.0 have | |
Having vulnarability CVE-2021-41945 Advisory: Python-incidentio-client 0.10.0 updates its dependency 'httpx' to version '0.23.0' to include a fix for an Improper Input Validation vulnerability.
https://github.com/expobrain/python-incidentio-client/commit/3170dc08b80f82d729164d24fc36e2989ac0f6d0
https://github.com/advisories/GHSA-h8pj-cxx2-jfg2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-incidentio-client version less then 0.10.0 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Python-incidentio-client 0.10.0 updates its dependency 'httpx' to version '0.23.0' to include a fix for an Improper Input Validation vulnerability.
https://github.com/expobrain/python-incidentio-client/commit/3170dc08b80f82d729164d24fc36e2989ac0f6d0
https://github.com/advisories/GHSA-h8pj-cxx2-jfg2 | what vulnarability does python-incidentio-client version less then 0.10.0 have | |
Having vulnarability CVE-2016-7036 Advisory: python-jose before 1.3.2 allows attackers to have unspecified impact by leveraging failure to use a constant time comparison for HMAC keys. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-jose version less then 1.3.2 have ### Response: Having vulnarability CVE-2016-7036 Advisory: python-jose before 1.3.2 allows attackers to have unspecified impact by leveraging failure to use a constant time comparison for HMAC keys. | what vulnarability does python-jose version less then 1.3.2 have | |
Having vulnarability PVE-2024-66041 Advisory: Python-jsonlogic version 2.0.1 addresses a security issue where the operations object was vulnerable to exploitation, allowing the execution of arbitrary code.
https://security.snyk.io/vuln/SNYK-JS-JSONLOGICJS-674308 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-jsonlogic version less then 2.0.1 have ### Response: Having vulnarability PVE-2024-66041 Advisory: Python-jsonlogic version 2.0.1 addresses a security issue where the operations object was vulnerable to exploitation, allowing the execution of arbitrary code.
https://security.snyk.io/vuln/SNYK-JS-JSONLOGICJS-674308 | what vulnarability does python-jsonlogic version less then 2.0.1 have | |
Having vulnarability CVE-2019-11324 Advisory: Python-jss 2.1.0 updates its dependency 'urllib3' to v1.24.2 to mitigate a vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-jss version less then 2.1.0 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Python-jss 2.1.0 updates its dependency 'urllib3' to v1.24.2 to mitigate a vulnerability. | what vulnarability does python-jss version less then 2.1.0 have | |
Having vulnarability PVE-2021-42355 Advisory: Python-jwt 1.0.0 includes fixes for a security vulnerability where 'alg=None' header could bypass signature verification.
https://github.com/jpadilla/pyjwt/pull/109
https://github.com/jpadilla/pyjwt/pull/110 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-jwt version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-42355 Advisory: Python-jwt 1.0.0 includes fixes for a security vulnerability where 'alg=None' header could bypass signature verification.
https://github.com/jpadilla/pyjwt/pull/109
https://github.com/jpadilla/pyjwt/pull/110 | what vulnarability does python-jwt version less then 1.0.0 have | |
Having vulnarability CVE-2014-7144 Advisory: Python-keystoneclient versions 0.11.0 and 1.2.0 include a fix for CVE-2014-7144: OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
http://www.openwall.com/lists/oss-security/2014/09/25/51
https://bugs.launchpad.net/python-keystoneclient/+bug/1353315
http://rhn.redhat.com/errata/RHSA-2014-1783.html
http://rhn.redhat.com/errata/RHSA-2014-1784.html
http://rhn.redhat.com/errata/RHSA-2015-0020.html
http://www.ubuntu.com/usn/USN-2705-1
http://www.securityfocus.com/bid/69864
http://secunia.com/advisories/62709 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-keystoneclient version less then 0.11.0,greather then equal to 1.0.0,less then 1.2.0 have ### Response: Having vulnarability CVE-2014-7144 Advisory: Python-keystoneclient versions 0.11.0 and 1.2.0 include a fix for CVE-2014-7144: OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
http://www.openwall.com/lists/oss-security/2014/09/25/51
https://bugs.launchpad.net/python-keystoneclient/+bug/1353315
http://rhn.redhat.com/errata/RHSA-2014-1783.html
http://rhn.redhat.com/errata/RHSA-2014-1784.html
http://rhn.redhat.com/errata/RHSA-2015-0020.html
http://www.ubuntu.com/usn/USN-2705-1
http://www.securityfocus.com/bid/69864
http://secunia.com/advisories/62709 | what vulnarability does python-keystoneclient version less then 0.11.0,greather then equal to 1.0.0,less then 1.2.0 have | |
Having vulnarability PVE-2022-52052 Advisory: Python-kraken-sdk 0.7.1 secures protected and private properties and methods.
https://github.com/btschwertfeger/Python-Kraken-SDK/pull/26/commits/d4e14e457a6e34e530472db7a734a01e1534e329 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-kraken-sdk version less then 0.7.1 have ### Response: Having vulnarability PVE-2022-52052 Advisory: Python-kraken-sdk 0.7.1 secures protected and private properties and methods.
https://github.com/btschwertfeger/Python-Kraken-SDK/pull/26/commits/d4e14e457a6e34e530472db7a734a01e1534e329 | what vulnarability does python-kraken-sdk version less then 0.7.1 have | |
Having vulnarability CVE-2021-46823 Advisory: Python-ldap 3.4.0 includes a fix for CVE-2021-46823: versions before 3.4.0 are vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition.
https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-ldap version less then 3.4.0 have ### Response: Having vulnarability CVE-2021-46823 Advisory: Python-ldap 3.4.0 includes a fix for CVE-2021-46823: versions before 3.4.0 are vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition.
https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm | what vulnarability does python-ldap version less then 3.4.0 have | |
Having vulnarability PVE-2022-51245 Advisory: Python-levenshtein 0.12.1 fixes handling of numerous possible wraparounds in calculating the size of memory allocations. Incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-levenshtein version less then 0.12.1 have ### Response: Having vulnarability PVE-2022-51245 Advisory: Python-levenshtein 0.12.1 fixes handling of numerous possible wraparounds in calculating the size of memory allocations. Incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library. | what vulnarability does python-levenshtein version less then 0.12.1 have | |
Having vulnarability CVE-2019-1010017 Advisory: Python-libnmap 0.7.2 adds unittest for defusedxml to fix billionlaugh and external entities security issues. It also includes a fix for security issue on XXE (XML External Entities). See: CVE-2019-1010017. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-libnmap version less then 0.7.2 have ### Response: Having vulnarability CVE-2019-1010017 Advisory: Python-libnmap 0.7.2 adds unittest for defusedxml to fix billionlaugh and external entities security issues. It also includes a fix for security issue on XXE (XML External Entities). See: CVE-2019-1010017. | what vulnarability does python-libnmap version less then 0.7.2 have | |
Having vulnarability PVE-2021-26084 Advisory: python-libtorrent before 1.0.6 has several undisclosed vulnerabilities related to uTP. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-libtorrent version less then 1.0.6 have ### Response: Having vulnarability PVE-2021-26084 Advisory: python-libtorrent before 1.0.6 has several undisclosed vulnerabilities related to uTP. | what vulnarability does python-libtorrent version less then 1.0.6 have | |
Having vulnarability CVE-2022-40023 Advisory: Python-mf-data 0.2.6 updates its dependency 'mako' to v1.2.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-mf-data version less then 0.2.6 have ### Response: Having vulnarability CVE-2022-40023 Advisory: Python-mf-data 0.2.6 updates its dependency 'mako' to v1.2.2 to include a security fix. | what vulnarability does python-mf-data version less then 0.2.6 have | |
Having vulnarability PVE-2022-45432 Advisory: Python-mongo is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-mongo version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45432 Advisory: Python-mongo is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does python-mongo version greather then 0,less then 0 have | |
Having vulnarability PVE-2023-58825 Advisory: Python-ms 1.1.0 includes a fix for a ReDoS vulnerability.
https://github.com/Diapolo10/python-ms/commit/441c027b631d6652ccac09d358b77c061ebedc99 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-ms version less then 1.1.0 have ### Response: Having vulnarability PVE-2023-58825 Advisory: Python-ms 1.1.0 includes a fix for a ReDoS vulnerability.
https://github.com/Diapolo10/python-ms/commit/441c027b631d6652ccac09d358b77c061ebedc99 | what vulnarability does python-ms version less then 1.1.0 have | |
Having vulnarability PVE-2024-99762 Advisory: A vulnerability in versions of python-multipart before 0.0.7 involves a Regular Expression Denial of Service (ReDoS) triggered by custom Content-Type headers. This issue allows an attacker to cause a significant consumption of system resources while processing such headers, effectively preventing the processing of other requests. This ReDoS vulnerability stems from the way regular expressions evaluate certain input patterns, which can lead to extensive backtracking, thereby causing the application to slow down significantly, consuming a disproportionate amount of CPU time and facilitating a denial of service condition. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-multipart version greather then equal to 0,less then 0.0.7 have ### Response: Having vulnarability PVE-2024-99762 Advisory: A vulnerability in versions of python-multipart before 0.0.7 involves a Regular Expression Denial of Service (ReDoS) triggered by custom Content-Type headers. This issue allows an attacker to cause a significant consumption of system resources while processing such headers, effectively preventing the processing of other requests. This ReDoS vulnerability stems from the way regular expressions evaluate certain input patterns, which can lead to extensive backtracking, thereby causing the application to slow down significantly, consuming a disproportionate amount of CPU time and facilitating a denial of service condition. | what vulnarability does python-multipart version greather then equal to 0,less then 0.0.7 have | |
Having vulnarability CVE-2016-4972 Advisory: OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-muranoclient version less then 0.7.3,greather then equal to 0.8,less then 0.8.5 have ### Response: Having vulnarability CVE-2016-4972 Advisory: OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages. | what vulnarability does python-muranoclient version less then 0.7.3,greather then equal to 0.8,less then 0.8.5 have | |
Having vulnarability PVE-2022-45433 Advisory: Python-mysql is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-mysql version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45433 Advisory: Python-mysql is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does python-mysql version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45434 Advisory: Python-mysqldb is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-mysqldb version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45434 Advisory: Python-mysqldb is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does python-mysqldb version greather then 0,less then 0 have | |
Having vulnarability CVE-2023-40217 Advisory: Python-ndev-blizzardapi version 0.1.2 has been upgraded to Python 3.12 and includes minor security adjustments in response to CVE-2023-40217. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-ndev-blizzardapi version less then 0.1.2 have ### Response: Having vulnarability CVE-2023-40217 Advisory: Python-ndev-blizzardapi version 0.1.2 has been upgraded to Python 3.12 and includes minor security adjustments in response to CVE-2023-40217. | what vulnarability does python-ndev-blizzardapi version less then 0.1.2 have | |
Having vulnarability CVE-2018-18074 Advisory: Python-nomad 1.0.1 updates 'requests` to v2.20.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-nomad version less then 1.0.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Python-nomad 1.0.1 updates 'requests` to v2.20.0 to include a security fix. | what vulnarability does python-nomad version less then 1.0.1 have | |
Having vulnarability PVE-2022-50757 Advisory: Python-opencv isn't in PyPI. The package you may be looking for is "opencv-python". | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-opencv version greather then 0 have ### Response: Having vulnarability PVE-2022-50757 Advisory: Python-opencv isn't in PyPI. The package you may be looking for is "opencv-python". | what vulnarability does python-opencv version greather then 0 have | |
Having vulnarability PVE-2021-33282 Advisory: python-openflow 2016.1.a1 fixes a undisclosed security vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-openflow version less then 2016.1.a1 have ### Response: Having vulnarability PVE-2021-33282 Advisory: python-openflow 2016.1.a1 fixes a undisclosed security vulnerability. | what vulnarability does python-openflow version less then 2016.1.a1 have | |
Having vulnarability PVE-2022-45435 Advisory: Python-openssl is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-openssl version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45435 Advisory: Python-openssl is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does python-openssl version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-41378 Advisory: Python-openzwave version 0.4.19 includes a security patch for the function 'update_ozw_config' in 'openzwave/controller.py'. Previous versions contained an OS injection vulnerability: unsafe use of os.system().
https://github.com/OpenZWave/python-openzwave/commit/3ef3e4b2c68052cc1973e0bbf080048247c3aa89#diff-c804949ef4a7ac8d06368ac70d26e88b719a6e8affe926716e2ae02a24896326 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-openzwave version less then 0.4.19 have ### Response: Having vulnarability PVE-2021-41378 Advisory: Python-openzwave version 0.4.19 includes a security patch for the function 'update_ozw_config' in 'openzwave/controller.py'. Previous versions contained an OS injection vulnerability: unsafe use of os.system().
https://github.com/OpenZWave/python-openzwave/commit/3ef3e4b2c68052cc1973e0bbf080048247c3aa89#diff-c804949ef4a7ac8d06368ac70d26e88b719a6e8affe926716e2ae02a24896326 | what vulnarability does python-openzwave version less then 0.4.19 have | |
Having vulnarability PVE-2021-26086 Advisory: python-otr before 1.1.0 is vulnerable to man-in-the-middle attacks as it allows to restart the protocol.
https://github.com/AGProjects/python-otr/commit/8f3e291b172bb97272be077c67bce430dababcdb | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does python-otr version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26086 Advisory: python-otr before 1.1.0 is vulnerable to man-in-the-middle attacks as it allows to restart the protocol.
https://github.com/AGProjects/python-otr/commit/8f3e291b172bb97272be077c67bce430dababcdb | what vulnarability does python-otr version less then 1.1.0 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.