output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2023-4863 Advisory: Realcugan-ncnn-vulkan-python 1.0.2 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/realcugan-ncnn-vulkan-python/1.0.2/packages/64/8f/a97b3fac5e2123e4652a122f1df50846e4721056964003890edc20f24fbf/realcugan-ncnn-vulkan-python-1.0.2.tar.gz/realcugan-ncnn-vulkan-python-1.0.2/realcugan_ncnn_vulkan_python/realcugan-ncnn-vulkan/src/libwebp/ChangeLog | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does realcugan-ncnn-vulkan-python version less then equal to 1.0.2 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Realcugan-ncnn-vulkan-python 1.0.2 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/realcugan-ncnn-vulkan-python/1.0.2/packages/64/8f/a97b3fac5e2123e4652a122f1df50846e4721056964003890edc20f24fbf/realcugan-ncnn-vulkan-python-1.0.2.tar.gz/realcugan-ncnn-vulkan-python-1.0.2/realcugan_ncnn_vulkan_python/realcugan-ncnn-vulkan/src/libwebp/ChangeLog | what vulnarability does realcugan-ncnn-vulkan-python version less then equal to 1.0.2 have | |
Having vulnarability PVE-2022-45489 Advisory: Reallysimpledb 1.2 fixes possible SQL injection vector through string-based query construction.
https://github.com/truethari/ReallySimpleDB/commit/918cba5fcea7ca5a95647e3d47f744bb9dfc3704 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reallysimpledb version less then 1.2 have ### Response: Having vulnarability PVE-2022-45489 Advisory: Reallysimpledb 1.2 fixes possible SQL injection vector through string-based query construction.
https://github.com/truethari/ReallySimpleDB/commit/918cba5fcea7ca5a95647e3d47f744bb9dfc3704 | what vulnarability does reallysimpledb version less then 1.2 have | |
Having vulnarability CVE-2023-4863 Advisory: Realsr-ncnn-vulkan-python 1.0.2 throughout 1.0.6 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/realsr-ncnn-vulkan-python/1.0.6/packages/75/17/03e75d9498a43e9770a3043cc8b587e868bf6d4f2a60fda3305ffac8b2b5/realsr-ncnn-vulkan-python-1.0.6.tar.gz/realsr-ncnn-vulkan-python-1.0.6/realsr_ncnn_vulkan_python/realsr-ncnn-vulkan/src/libwebp/ChangeLog | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does realsr-ncnn-vulkan-python version greather then 1.0.1,less then equal to 1.0.6 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Realsr-ncnn-vulkan-python 1.0.2 throughout 1.0.6 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/realsr-ncnn-vulkan-python/1.0.6/packages/75/17/03e75d9498a43e9770a3043cc8b587e868bf6d4f2a60fda3305ffac8b2b5/realsr-ncnn-vulkan-python-1.0.6.tar.gz/realsr-ncnn-vulkan-python-1.0.6/realsr_ncnn_vulkan_python/realsr-ncnn-vulkan/src/libwebp/ChangeLog | what vulnarability does realsr-ncnn-vulkan-python version greather then 1.0.1,less then equal to 1.0.6 have | |
Having vulnarability PVE-2022-45384 Advisory: Reana-server 0.6.0 improves security by allowing requests only with 'REANA_URL' in the host header, avoiding host header injection attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reana-server version less then 0.6.0 have ### Response: Having vulnarability PVE-2022-45384 Advisory: Reana-server 0.6.0 improves security by allowing requests only with 'REANA_URL' in the host header, avoiding host header injection attacks. | what vulnarability does reana-server version less then 0.6.0 have | |
Having vulnarability PVE-2023-52887 Advisory: Reauests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reauests version greather then 0 have ### Response: Having vulnarability PVE-2023-52887 Advisory: Reauests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does reauests version greather then 0 have | |
Having vulnarability CVE-2019-11236 Advisory: Recline 2022.5 updates its dependency 'urllib3' to v1.26.9 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does recline version less then 2022.5 have ### Response: Having vulnarability CVE-2019-11236 Advisory: Recline 2022.5 updates its dependency 'urllib3' to v1.26.9 to include security fixes. | what vulnarability does recline version less then 2022.5 have | |
Having vulnarability CVE-2018-20858 Advisory: Recommender before 1.3.1 allows XSS. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does recommender-xblock version greather then equal to 0,less then 1.3.1 have ### Response: Having vulnarability CVE-2018-20858 Advisory: Recommender before 1.3.1 allows XSS. | what vulnarability does recommender-xblock version greather then equal to 0,less then 1.3.1 have | |
Having vulnarability CVE-2017-0906 Advisory: The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource.get" method that could result in compromise of API keys or other critical resources. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does recurly version less then equal to 2.6.2 have ### Response: Having vulnarability CVE-2017-0906 Advisory: The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource.get" method that could result in compromise of API keys or other critical resources. | what vulnarability does recurly version less then equal to 2.6.2 have | |
Having vulnarability CVE-2020-26249 Advisory: Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Redbot. In Red Discord Bot before version 0.1.7a an RCE exploit has been discovered. This exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This high severity exploit has been fixed on version 0.1.7a. There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does red-dashboard version less then 0.1.7a0 have ### Response: Having vulnarability CVE-2020-26249 Advisory: Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Redbot. In Red Discord Bot before version 0.1.7a an RCE exploit has been discovered. This exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This high severity exploit has been fixed on version 0.1.7a. There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue. | what vulnarability does red-dashboard version less then 0.1.7a0 have | |
Having vulnarability PVE-2024-67132 Advisory: Red-discordbot 3.0.0rc3 addresses a race condition issue, ensuring stability by preventing changes to dictionaries during serialization, thus safeguarding against data corruption or errors during this process. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does red-discordbot version less then 3.0.0rc3 have ### Response: Having vulnarability PVE-2024-67132 Advisory: Red-discordbot 3.0.0rc3 addresses a race condition issue, ensuring stability by preventing changes to dictionaries during serialization, thus safeguarding against data corruption or errors during this process. | what vulnarability does red-discordbot version less then 3.0.0rc3 have | |
Having vulnarability CVE-2023-28858 Advisory: An Off-by-one flaw was found in Redis. Affected versions leave a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner.
NOTE: this CVE Record was initially created in response to reports about ChatGPT, however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does redis version greather then equal to 4.5.0,less then 4.5.3,greather then equal to 4.4.0rc1,less then 4.4.3,greather then equal to 4.2.0rc1,less then 4.3.6 have ### Response: Having vulnarability CVE-2023-28858 Advisory: An Off-by-one flaw was found in Redis. Affected versions leave a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner.
NOTE: this CVE Record was initially created in response to reports about ChatGPT, however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general. | what vulnarability does redis version greather then equal to 4.5.0,less then 4.5.3,greather then equal to 4.4.0rc1,less then 4.4.3,greather then equal to 4.2.0rc1,less then 4.3.6 have | |
Having vulnarability CVE-2023-28859 Advisory: Redis-dict 2.0.2 updates its dependency 'redis' to v4.5.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does redis-dict version less then 2.0.2 have ### Response: Having vulnarability CVE-2023-28859 Advisory: Redis-dict 2.0.2 updates its dependency 'redis' to v4.5.4 to include a security fix. | what vulnarability does redis-dict version less then 2.0.2 have | |
Having vulnarability CVE-2020-35668 Advisory: RedisGraph 2.x through 2.2.11 has a NULL Pointer Dereference that leads to a server crash because it mishandles an unquoted string, such as an alias that has not yet been introduced. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does redisgraph version less then 2.4.0 have ### Response: Having vulnarability CVE-2020-35668 Advisory: RedisGraph 2.x through 2.2.11 has a NULL Pointer Dereference that leads to a server crash because it mishandles an unquoted string, such as an alias that has not yet been introduced. | what vulnarability does redisgraph version less then 2.4.0 have | |
Having vulnarability CVE-2019-17206 Advisory: Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rediswrapper version less then 0.3.0 have ### Response: Having vulnarability CVE-2019-17206 Advisory: Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts. | what vulnarability does rediswrapper version less then 0.3.0 have | |
Having vulnarability PVE-2023-52891 Advisory: Reduests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reduests version greather then 0 have ### Response: Having vulnarability PVE-2023-52891 Advisory: Reduests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does reduests version greather then 0 have | |
Having vulnarability PVE-2023-52892 Advisory: Reeuests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reeuests version greather then 0 have ### Response: Having vulnarability PVE-2023-52892 Advisory: Reeuests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does reeuests version greather then 0 have | |
Having vulnarability PVE-2022-47833 Advisory: Refitt 0.16.5 updates its dependency 'click' to v8.0.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does refitt version less then 0.16.5 have ### Response: Having vulnarability PVE-2022-47833 Advisory: Refitt 0.16.5 updates its dependency 'click' to v8.0.1 to include a security fix. | what vulnarability does refitt version less then 0.16.5 have | |
Having vulnarability PVE-2023-59560 Advisory: Reflex 0.1.13 includes a fix for a Race Condition vulnerability in the websocket.
https://github.com/reflex-dev/reflex/pull/261 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reflex version less then 0.1.13 have ### Response: Having vulnarability PVE-2023-59560 Advisory: Reflex 0.1.13 includes a fix for a Race Condition vulnerability in the websocket.
https://github.com/reflex-dev/reflex/pull/261 | what vulnarability does reflex version less then 0.1.13 have | |
Having vulnarability PVE-2023-60277 Advisory: Regex 2018.11.22 includes a fix for a Catastrophic Backtracking vulnerability.
https://github.com/mrabarnett/mrab-regex/issues/304 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does regex version less then 2018.11.22 have ### Response: Having vulnarability PVE-2023-60277 Advisory: Regex 2018.11.22 includes a fix for a Catastrophic Backtracking vulnerability.
https://github.com/mrabarnett/mrab-regex/issues/304 | what vulnarability does regex version less then 2018.11.22 have | |
Having vulnarability CVE-2020-14343 Advisory: Regex4ocr version 1.0.2 updates its dependency "Pyyaml" to v4.2b1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does regex4ocr version less then 1.0.2 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Regex4ocr version 1.0.2 updates its dependency "Pyyaml" to v4.2b1 to include security fixes. | what vulnarability does regex4ocr version less then 1.0.2 have | |
Having vulnarability CVE-2019-20477 Advisory: Rejected 3.20.7 updates its dependency 'pyyaml' to v5.3.1 to include security fixes.
https://github.com/gmr/rejected/commit/3d0d600f2fec041d84f0255af51c8b46ea98815b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rejected version less then 3.20.7 have ### Response: Having vulnarability CVE-2019-20477 Advisory: Rejected 3.20.7 updates its dependency 'pyyaml' to v5.3.1 to include security fixes.
https://github.com/gmr/rejected/commit/3d0d600f2fec041d84f0255af51c8b46ea98815b | what vulnarability does rejected version less then 3.20.7 have | |
Having vulnarability CVE-2018-18074 Advisory: Rekall 1.7.2rc1 and prior uses a version of 'requests' with known vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rekall version less then equal to 1.7.2rc1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Rekall 1.7.2rc1 and prior uses a version of 'requests' with known vulnerabilities. | what vulnarability does rekall version less then equal to 1.7.2rc1 have | |
Having vulnarability PVE-2023-59580 Advisory: Relstorage 3.0a11 includes a fix for a Race Condition vulnerability.
https://github.com/zodb/relstorage/issues/325
https://github.com/zodb/relstorage/pull/348 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does relstorage version less then 3.0a11 have ### Response: Having vulnarability PVE-2023-59580 Advisory: Relstorage 3.0a11 includes a fix for a Race Condition vulnerability.
https://github.com/zodb/relstorage/issues/325
https://github.com/zodb/relstorage/pull/348 | what vulnarability does relstorage version less then 3.0a11 have | |
Having vulnarability PVE-2023-60980 Advisory: Remarshal 0.17.1 prevents a billion laughs attack carried out with YAML anchors.
https://github.com/remarshal-project/remarshal/commit/fd6ac799a02f533c3fc243b49cdd6d21aa7ee494 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does remarshal version less then 0.17.1 have ### Response: Having vulnarability PVE-2023-60980 Advisory: Remarshal 0.17.1 prevents a billion laughs attack carried out with YAML anchors.
https://github.com/remarshal-project/remarshal/commit/fd6ac799a02f533c3fc243b49cdd6d21aa7ee494 | what vulnarability does remarshal version less then 0.17.1 have | |
Having vulnarability CVE-2023-44271 Advisory: Renate 0.5.1 upgrades its Pillow dependency, moving from version range >=9.0, <10.1.1 to a new range of >=10.2, <10.2.1. This update addresses the security vulnerability identified in CVE-2023-44271. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does renate version less then 0.5.1 have ### Response: Having vulnarability CVE-2023-44271 Advisory: Renate 0.5.1 upgrades its Pillow dependency, moving from version range >=9.0, <10.1.1 to a new range of >=10.2, <10.2.1. This update addresses the security vulnerability identified in CVE-2023-44271. | what vulnarability does renate version less then 0.5.1 have | |
Having vulnarability CVE-2021-40839 Advisory: The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
https://seclists.org/fulldisclosure/2021/Sep/16 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rencode version less then equal to 1.0.6 have ### Response: Having vulnarability CVE-2021-40839 Advisory: The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
https://seclists.org/fulldisclosure/2021/Sep/16 | what vulnarability does rencode version less then equal to 1.0.6 have | |
Having vulnarability CVE-2017-18342 Advisory: Renderj2 version 1.1.1 includes a security patch for the function 'cmd' in 'renderj2/renderj2.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/mypaceshun/renderj2/commit/307fbb7d4225d77006170234d9285d2d78202833 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does renderj2 version less then 1.1.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Renderj2 version 1.1.1 includes a security patch for the function 'cmd' in 'renderj2/renderj2.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/mypaceshun/renderj2/commit/307fbb7d4225d77006170234d9285d2d78202833 | what vulnarability does renderj2 version less then 1.1.1 have | |
Having vulnarability PVE-2021-38571 Advisory: Rendertron 3.0.0 fixes a security issue with AppEngine deployments. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rendertron version less then 3.0.0 have ### Response: Having vulnarability PVE-2021-38571 Advisory: Rendertron 3.0.0 fixes a security issue with AppEngine deployments. | what vulnarability does rendertron version less then 3.0.0 have | |
Having vulnarability CVE-2017-18342 Advisory: Renku version 0.4.0 fixes CVE-2017-18342. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does renku version less then 0.4.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Renku version 0.4.0 fixes CVE-2017-18342. | what vulnarability does renku version less then 0.4.0 have | |
Having vulnarability CVE-2022-40898 Advisory: Repairwheel 0.2.6 vendors 'auditwheel' from unreleased commit to include a fix for a ReDOS vulnerability.
https://github.com/jvolkman/repairwheel/pull/17 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does repairwheel version less then 0.2.6 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Repairwheel 0.2.6 vendors 'auditwheel' from unreleased commit to include a fix for a ReDOS vulnerability.
https://github.com/jvolkman/repairwheel/pull/17 | what vulnarability does repairwheel version less then 0.2.6 have | |
Having vulnarability PVE-2021-38523 Advisory: Repobee 0.4.0 adds a strict security policy to prevent malicious code from executing. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does repobee version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-38523 Advisory: Repobee 0.4.0 adds a strict security policy to prevent malicious code from executing. | what vulnarability does repobee version less then 0.4.0 have | |
Having vulnarability PVE-2021-42041 Advisory: Repobee-junit4 version 0.4.0 adds a strict security policy to prevent malicious code from executing.
https://github.com/repobee/repobee-junit4/commit/eaa14a6642eea7cb71d27d8003a8cc1de1ea6406 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does repobee-junit4 version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-42041 Advisory: Repobee-junit4 version 0.4.0 adds a strict security policy to prevent malicious code from executing.
https://github.com/repobee/repobee-junit4/commit/eaa14a6642eea7cb71d27d8003a8cc1de1ea6406 | what vulnarability does repobee-junit4 version less then 0.4.0 have | |
Having vulnarability PVE-2021-42032 Advisory: Repomate-junit4 version 0.4.0 adds a strict security policy to prevent malicious code from executing.
https://github.com/repobee/repobee-junit4/commit/eaa14a6642eea7cb71d27d8003a8cc1de1ea6406 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does repomate-junit4 version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-42032 Advisory: Repomate-junit4 version 0.4.0 adds a strict security policy to prevent malicious code from executing.
https://github.com/repobee/repobee-junit4/commit/eaa14a6642eea7cb71d27d8003a8cc1de1ea6406 | what vulnarability does repomate-junit4 version less then 0.4.0 have | |
Having vulnarability CVE-2019-19450 Advisory: ReportLab 3.5.31 includes a fix for CVE-2019-19450: Paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md#release-353115102019 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reportlab version less then 3.5.31 have ### Response: Having vulnarability CVE-2019-19450 Advisory: ReportLab 3.5.31 includes a fix for CVE-2019-19450: Paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md#release-353115102019 | what vulnarability does reportlab version less then 3.5.31 have | |
Having vulnarability PVE-2017-47623 Advisory: Repoze.who 2.0a4 fixes 'auth_tkt' plugin to add "secure" and "HttpOnly" to cookies when configured with 'secure=True'. These attributes prevent the browser from sending cookies over insecure channels, which could expose to different attacks like XSS. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does repoze-who version less then 2.0a4 have ### Response: Having vulnarability PVE-2017-47623 Advisory: Repoze.who 2.0a4 fixes 'auth_tkt' plugin to add "secure" and "HttpOnly" to cookies when configured with 'secure=True'. These attributes prevent the browser from sending cookies over insecure channels, which could expose to different attacks like XSS. | what vulnarability does repoze-who version less then 2.0a4 have | |
Having vulnarability CVE-2007-4559 Advisory: Reprozip 1.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reprozip version less then 1.2 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Reprozip 1.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does reprozip version less then 1.2 have | |
Having vulnarability PVE-2023-52893 Advisory: Reqhests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reqhests version greather then 0 have ### Response: Having vulnarability PVE-2023-52893 Advisory: Reqhests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does reqhests version greather then 0 have | |
Having vulnarability PVE-2023-52894 Advisory: Reqkests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reqkests version greather then 0 have ### Response: Having vulnarability PVE-2023-52894 Advisory: Reqkests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does reqkests version greather then 0 have | |
Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reqmgr2 version greather then equal to 1.4.0rc2,less then 2.0.4 have ### Response: Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | what vulnarability does reqmgr2 version greather then equal to 1.4.0rc2,less then 2.0.4 have | |
Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reqmon version greather then equal to 1.4.1rc5,less then 2.0.4 have ### Response: Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | what vulnarability does reqmon version greather then equal to 1.4.1rc5,less then 2.0.4 have | |
Having vulnarability PVE-2023-52895 Advisory: Requesfs is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requesfs version greather then 0 have ### Response: Having vulnarability PVE-2023-52895 Advisory: Requesfs is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does requesfs version greather then 0 have | |
Having vulnarability CVE-2014-1830 Advisory: Requesocks (a fork of requests package, working with socks proxy) is vulnerable to CVE-2014-1830. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requesocks version equal to 0.10.8 have ### Response: Having vulnarability CVE-2014-1830 Advisory: Requesocks (a fork of requests package, working with socks proxy) is vulnerable to CVE-2014-1830. | what vulnarability does requesocks version equal to 0.10.8 have | |
Having vulnarability PVE-2022-47817 Advisory: Request.request is a malicious package, typosquatting.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does request-request version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47817 Advisory: Request.request is a malicious package, typosquatting.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | what vulnarability does request-request version greather then 0,less then 0 have | |
Having vulnarability PVE-2023-52896 Advisory: Requesta is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requesta version greather then 0 have ### Response: Having vulnarability PVE-2023-52896 Advisory: Requesta is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does requesta version greather then 0 have | |
Having vulnarability PVE-2023-52897 Advisory: Requeste is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requeste version greather then 0 have ### Response: Having vulnarability PVE-2023-52897 Advisory: Requeste is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does requeste version greather then 0 have | |
Having vulnarability CVE-2014-1829 Advisory: Requests before 2.3.0 exposes Authorization or Proxy-Authorization headers on redirect. See: CVE-2014-1829. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requests version less then 2.3.0 have ### Response: Having vulnarability CVE-2014-1829 Advisory: Requests before 2.3.0 exposes Authorization or Proxy-Authorization headers on redirect. See: CVE-2014-1829. | what vulnarability does requests version less then 2.3.0 have | |
Having vulnarability PVE-2021-40100 Advisory: Requests-cache 0.6.0 includes a fix for a code execution vulnerability.
https://github.com/requests-cache/requests-cache/issues/105 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requests-cache version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-40100 Advisory: Requests-cache 0.6.0 includes a fix for a code execution vulnerability.
https://github.com/requests-cache/requests-cache/issues/105 | what vulnarability does requests-cache version less then 0.6.0 have | |
Having vulnarability CVE-2023-32681 Advisory: In version 0.3.1 of Requests-doh, the dependency on the requests library has been updated from version 2.28.2 to 2.31.0, as a measure to address CVE-2023-3268.
https://github.com/mansuf/requests-doh/commit/84a9c708c0ac0f68797e1241eed0cccacfb5d92a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requests-doh version less then 0.3.1 have ### Response: Having vulnarability CVE-2023-32681 Advisory: In version 0.3.1 of Requests-doh, the dependency on the requests library has been updated from version 2.28.2 to 2.31.0, as a measure to address CVE-2023-3268.
https://github.com/mansuf/requests-doh/commit/84a9c708c0ac0f68797e1241eed0cccacfb5d92a | what vulnarability does requests-doh version less then 0.3.1 have | |
Having vulnarability PVE-2022-51684 Advisory: Requests-httpx is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requests-httpx version greather then 0 have ### Response: Having vulnarability PVE-2022-51684 Advisory: Requests-httpx is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does requests-httpx version greather then 0 have | |
Having vulnarability CVE-2014-8650 Advisory: Python-requests-Kerberos through 0.5 does not handle mutual authentication correctly. See: CVE-2014-8650 and <https://www.openwall.com/lists/oss-security/2014/11/07/1>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requests-kerberos version less then equal to 0.5 have ### Response: Having vulnarability CVE-2014-8650 Advisory: Python-requests-Kerberos through 0.5 does not handle mutual authentication correctly. See: CVE-2014-8650 and <https://www.openwall.com/lists/oss-security/2014/11/07/1>. | what vulnarability does requests-kerberos version less then equal to 0.5 have | |
Having vulnarability CVE-2014-1829 Advisory: Requests-netdna (kennethreitz/requests fork) 0.13.6 and prior are vulnerable to CVE-2014-1829. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requests-netdna version less then equal to 0.13.6 have ### Response: Having vulnarability CVE-2014-1829 Advisory: Requests-netdna (kennethreitz/requests fork) 0.13.6 and prior are vulnerable to CVE-2014-1829. | what vulnarability does requests-netdna version less then equal to 0.13.6 have | |
Having vulnarability CVE-2020-26708 Advisory: requests-xml v0.2.3 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requests-xml version less then equal to 0.2.3 have ### Response: Having vulnarability CVE-2020-26708 Advisory: requests-xml v0.2.3 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | what vulnarability does requests-xml version less then equal to 0.2.3 have | |
Having vulnarability PVE-2023-52898 Advisory: Requestw is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requestw version greather then 0 have ### Response: Having vulnarability PVE-2023-52898 Advisory: Requestw is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does requestw version greather then 0 have | |
Having vulnarability PVE-2023-52899 Advisory: Requfsts is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does requfsts version greather then 0 have ### Response: Having vulnarability PVE-2023-52899 Advisory: Requfsts is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does requfsts version greather then 0 have | |
Having vulnarability CVE-2020-4636 Advisory: IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503. See CVE-2020-4636. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does resilient version greather then equal to 38,less then 39 have ### Response: Having vulnarability CVE-2020-4636 Advisory: IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503. See CVE-2020-4636. | what vulnarability does resilient version greather then equal to 38,less then 39 have | |
Having vulnarability CVE-2021-44906 Advisory: Responsibleai 0.18.0 updates its NPM dependency 'minimist' to v1.2.6 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does responsibleai version less then 0.18.0 have ### Response: Having vulnarability CVE-2021-44906 Advisory: Responsibleai 0.18.0 updates its NPM dependency 'minimist' to v1.2.6 to include a security fix. | what vulnarability does responsibleai version less then 0.18.0 have | |
Having vulnarability CVE-2018-21030 Advisory: Responsibly 0.0.3 pins its dependency 'notebook' to versions >=5.7.8 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does responsibly version less then 0.0.3 have ### Response: Having vulnarability CVE-2018-21030 Advisory: Responsibly 0.0.3 pins its dependency 'notebook' to versions >=5.7.8 to include security fixes. | what vulnarability does responsibly version less then 0.0.3 have | |
Having vulnarability PVE-2021-26105 Advisory: restauth before 0.6.3 did not verify passwords for services when using SECURE_CACHE = True. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does restauth version less then 0.6.3 have ### Response: Having vulnarability PVE-2021-26105 Advisory: restauth before 0.6.3 did not verify passwords for services when using SECURE_CACHE = True. | what vulnarability does restauth version less then 0.6.3 have | |
Having vulnarability PVE-2023-61675 Advisory: Restful-client2 1.0.0 enables SSL verification by default.
https://github.com/johnbrandborg/restful-client2/commit/6b359a709cf40212b99f2001c639210a12e575f7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does restful-client2 version less then 1.0.0 have ### Response: Having vulnarability PVE-2023-61675 Advisory: Restful-client2 1.0.0 enables SSL verification by default.
https://github.com/johnbrandborg/restful-client2/commit/6b359a709cf40212b99f2001c639210a12e575f7 | what vulnarability does restful-client2 version less then 1.0.0 have | |
Having vulnarability CVE-2015-2674 Advisory: Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does restkit version less then equal to 4.2.2 have ### Response: Having vulnarability CVE-2015-2674 Advisory: Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument. | what vulnarability does restkit version less then equal to 4.2.2 have | |
Having vulnarability PVE-2021-37433 Advisory: Restrictedpython 4.0 ships with a default implementation for ``_getattr_`` which prevents from using the ``format()`` method on str/unicode as it is not safe. See <http://lucumr.pocoo.org/2016/12/29/careful-with-str-format/>.
**Caution:** If you do not already have secured the access to this ``format()`` method in your ``_getattr_`` implementation use ``RestrictedPython.Guards.safer_getattr()`` in your implementation to benefit from this fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does restrictedpython version less then 4.0 have ### Response: Having vulnarability PVE-2021-37433 Advisory: Restrictedpython 4.0 ships with a default implementation for ``_getattr_`` which prevents from using the ``format()`` method on str/unicode as it is not safe. See <http://lucumr.pocoo.org/2016/12/29/careful-with-str-format/>.
**Caution:** If you do not already have secured the access to this ``format()`` method in your ``_getattr_`` implementation use ``RestrictedPython.Guards.safer_getattr()`` in your implementation to benefit from this fix. | what vulnarability does restrictedpython version less then 4.0 have | |
Having vulnarability PVE-2021-35166 Advisory: restview before 2.8.1 isn't properly checking the host header in HTTP requests, leading to possible DNS rebinding attacks. More info: https://github.com/mgedmin/restview/issues/51 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does restview version less then 2.8.1 have ### Response: Having vulnarability PVE-2021-35166 Advisory: restview before 2.8.1 isn't properly checking the host header in HTTP requests, leading to possible DNS rebinding attacks. More info: https://github.com/mgedmin/restview/issues/51 | what vulnarability does restview version less then 2.8.1 have | |
Having vulnarability PVE-2023-52900 Advisory: Resuests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does resuests version greather then 0 have ### Response: Having vulnarability PVE-2023-52900 Advisory: Resuests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does resuests version greather then 0 have | |
Having vulnarability PVE-2021-34518 Advisory: Rethinkdb 2.0.2 fixes a XSS vulnerability in the HTTP admin interface. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rethinkdb version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-34518 Advisory: Rethinkdb 2.0.2 fixes a XSS vulnerability in the HTTP admin interface. | what vulnarability does rethinkdb version less then 2.0.2 have | |
Having vulnarability CVE-2021-31330 Advisory: A Cross-Site Scripting (XSS) vulnerability exists within Review Board versions 3.0.20 and 4.0 RC1 and earlier. An authenticated attacker may inject malicious Javascript code when using Markdown editing within the application which remains persistent. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does reviewboard version less then equal to 3.0.20,greather then 3.0.25,less then equal to 4.0rc1 have ### Response: Having vulnarability CVE-2021-31330 Advisory: A Cross-Site Scripting (XSS) vulnerability exists within Review Board versions 3.0.20 and 4.0 RC1 and earlier. An authenticated attacker may inject malicious Javascript code when using Markdown editing within the application which remains persistent. | what vulnarability does reviewboard version less then equal to 3.0.20,greather then 3.0.25,less then equal to 4.0rc1 have | |
Having vulnarability PVE-2023-52901 Advisory: Rewuests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rewuests version greather then 0 have ### Response: Having vulnarability PVE-2023-52901 Advisory: Rewuests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does rewuests version greather then 0 have | |
Having vulnarability PVE-2021-43088 Advisory: Rez 2.100.1 fixes an insecure usage of tempfile.mktemp() vulnerability.
https://github.com/nerdvegas/rez/pull/1165/commits/7008594bef61c0061f3fc4ce2363d83681a88663 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rez version less then 2.100.1 have ### Response: Having vulnarability PVE-2021-43088 Advisory: Rez 2.100.1 fixes an insecure usage of tempfile.mktemp() vulnerability.
https://github.com/nerdvegas/rez/pull/1165/commits/7008594bef61c0061f3fc4ce2363d83681a88663 | what vulnarability does rez version less then 2.100.1 have | |
Having vulnarability PVE-2023-52902 Advisory: Rfquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rfquests version greather then 0 have ### Response: Having vulnarability PVE-2023-52902 Advisory: Rfquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does rfquests version greather then 0 have | |
Having vulnarability CVE-2015-0260 Advisory: RhodeCode before 2.2.7 and Kallithea 0.1 allows remote authenticated users to obtain API keys and other sensitive information via the get_repo API method. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rhodecode version greather then equal to 0,less then 2.2.7 have ### Response: Having vulnarability CVE-2015-0260 Advisory: RhodeCode before 2.2.7 and Kallithea 0.1 allows remote authenticated users to obtain API keys and other sensitive information via the get_repo API method. | what vulnarability does rhodecode version greather then equal to 0,less then 2.2.7 have | |
Having vulnarability PVE-2024-64439 Advisory: Richie 1.5.1 updates its NPM dependency 'handlebars' to v4.1.2 to include a security fix.
https://github.com/advisories/GHSA-q42p-pg8m-cqh6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does richie version less then 1.5.1 have ### Response: Having vulnarability PVE-2024-64439 Advisory: Richie 1.5.1 updates its NPM dependency 'handlebars' to v4.1.2 to include a security fix.
https://github.com/advisories/GHSA-q42p-pg8m-cqh6 | what vulnarability does richie version less then 1.5.1 have | |
Having vulnarability CVE-2018-18074 Advisory: Ricloud 2.3.8 updates 'requests' in requirements to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ricloud version less then 2.3.8 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Ricloud 2.3.8 updates 'requests' in requirements to include a security fix. | what vulnarability does ricloud version less then 2.3.8 have | |
Having vulnarability CVE-2023-4863 Advisory: Rife-ncnn-vulkan-python 1.2.1 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/rife-ncnn-vulkan-python/1.2.1/packages/7d/eb/95529e003ac6a7de01d10601957320ee6af1fcd6195b762269e81b730fde/rife-ncnn-vulkan-python-1.2.1.tar.gz/rife-ncnn-vulkan-python-1.2.1/rife_ncnn_vulkan_python/rife-ncnn-vulkan/src/libwebp/ChangeLog | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rife-ncnn-vulkan-python version less then equal to 1.2.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Rife-ncnn-vulkan-python 1.2.1 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/rife-ncnn-vulkan-python/1.2.1/packages/7d/eb/95529e003ac6a7de01d10601957320ee6af1fcd6195b762269e81b730fde/rife-ncnn-vulkan-python-1.2.1.tar.gz/rife-ncnn-vulkan-python-1.2.1/rife_ncnn_vulkan_python/rife-ncnn-vulkan/src/libwebp/ChangeLog | what vulnarability does rife-ncnn-vulkan-python version less then equal to 1.2.1 have | |
Having vulnarability PVE-2021-36895 Advisory: rinzler 2.0.5 includes a PyYAML vulnerability correction | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rinzler version less then 2.0.5 have ### Response: Having vulnarability PVE-2021-36895 Advisory: rinzler 2.0.5 includes a PyYAML vulnerability correction | what vulnarability does rinzler version less then 2.0.5 have | |
Having vulnarability PVE-2023-60165 Advisory: Risingwave 0.1.10 includes a fix for a Race Condition vulnerability.
https://github.com/risingwavelabs/risingwave/pull/3651 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does risingwave version less then 0.1.10 have ### Response: Having vulnarability PVE-2023-60165 Advisory: Risingwave 0.1.10 includes a fix for a Race Condition vulnerability.
https://github.com/risingwavelabs/risingwave/pull/3651 | what vulnarability does risingwave version less then 0.1.10 have | |
Having vulnarability PVE-2021-37698 Advisory: River-admin 0.5.2 fixes a vulnerability issue with `serialize-javascript` dependency. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does river-admin version less then 0.5.2 have ### Response: Having vulnarability PVE-2021-37698 Advisory: River-admin 0.5.2 fixes a vulnerability issue with `serialize-javascript` dependency. | what vulnarability does river-admin version less then 0.5.2 have | |
Having vulnarability CVE-2015-2296 Advisory: Rkrizzle 2.6.0 includes a fix for CVE-2015-2296: The resolve_redirects function in sessions.py in rkrizzle (as it is a fork of requests library) 2.1.0 throughout 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rkrizzle version greather then equal to 2.1.0,less then 2.6.0 have ### Response: Having vulnarability CVE-2015-2296 Advisory: Rkrizzle 2.6.0 includes a fix for CVE-2015-2296: The resolve_redirects function in sessions.py in rkrizzle (as it is a fork of requests library) 2.1.0 throughout 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect. | what vulnarability does rkrizzle version greather then equal to 2.1.0,less then 2.6.0 have | |
Having vulnarability CVE-2020-28493 Advisory: Rmapy 0.2.4 updates Jinja2 to v2.11.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rmapy version less then 0.2.4 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Rmapy 0.2.4 updates Jinja2 to v2.11.3 to include a security fix. | what vulnarability does rmapy version less then 0.2.4 have | |
Having vulnarability CVE-2019-20916 Advisory: Rnalysis 1.3.6 updates its dependency 'pip' to v19.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rnalysis version less then 1.3.6 have ### Response: Having vulnarability CVE-2019-20916 Advisory: Rnalysis 1.3.6 updates its dependency 'pip' to v19.2 to include a security fix. | what vulnarability does rnalysis version less then 1.3.6 have | |
Having vulnarability CVE-2021-28957 Advisory: Rnc 0.6.5 updates its dependency 'lxml' to v4.6.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rnc version less then 0.6.5 have ### Response: Having vulnarability CVE-2021-28957 Advisory: Rnc 0.6.5 updates its dependency 'lxml' to v4.6.3 to include a security fix. | what vulnarability does rnc version less then 0.6.5 have | |
Having vulnarability PVE-2021-34576 Advisory: Rngatherd 2.0 matches version 2 of RandPi which uses a more secure protocol. IVs are not reused anymore and the client sends a nonce to prevent replay-attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rngatherd version less then 2.0 have ### Response: Having vulnarability PVE-2021-34576 Advisory: Rngatherd 2.0 matches version 2 of RandPi which uses a more secure protocol. IVs are not reused anymore and the client sends a nonce to prevent replay-attacks. | what vulnarability does rngatherd version less then 2.0 have | |
Having vulnarability PVE-2023-60402 Advisory: Rns 0.0.8 inlcudes a fix for a Race Condition vulnerability.
https://github.com/acehoss/rnsh/commit/27664df0b315d15699d956ae2b3af8e65a6b438e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rns version less then 0.0.8 have ### Response: Having vulnarability PVE-2023-60402 Advisory: Rns 0.0.8 inlcudes a fix for a Race Condition vulnerability.
https://github.com/acehoss/rnsh/commit/27664df0b315d15699d956ae2b3af8e65a6b438e | what vulnarability does rns version less then 0.0.8 have | |
Having vulnarability CVE-2023-4863 Advisory: Robomaster 0.1.1.44 and 0.1.1.61 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.
https://inspector.pypi.io/project/robomaster/0.1.1.61/packages/bf/bf/56b4b4f971f001e9753c52a35a58ecf8fae7ca2c28fc124f5a51ba7d3ff5/robomaster-0.1.1.61-cp36-cp36m-macosx_10_13_x86_64.whl | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does robomaster version equal to 0.1.1.44,equal to 0.1.1.61 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Robomaster 0.1.1.44 and 0.1.1.61 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected.
https://inspector.pypi.io/project/robomaster/0.1.1.61/packages/bf/bf/56b4b4f971f001e9753c52a35a58ecf8fae7ca2c28fc124f5a51ba7d3ff5/robomaster-0.1.1.61-cp36-cp36m-macosx_10_13_x86_64.whl | what vulnarability does robomaster version equal to 0.1.1.44,equal to 0.1.1.61 have | |
Having vulnarability CVE-2022-1941 Advisory: Robotframework-browser 14.2.0 updates its dependency 'protobuf' to v4.21.9 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does robotframework-browser version less then 14.2.0 have ### Response: Having vulnarability CVE-2022-1941 Advisory: Robotframework-browser 14.2.0 updates its dependency 'protobuf' to v4.21.9 to include a security fix. | what vulnarability does robotframework-browser version less then 14.2.0 have | |
Having vulnarability CVE-2023-32681 Advisory: Robotframework-openapi-libcore 1.9.1 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/MarketSquare/robotframework-openapi-libcore/commit/dc8cb2ec97951c9e3a15a509b2a17c835114efcf | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does robotframework-openapi-libcore version less then 1.9.1 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Robotframework-openapi-libcore 1.9.1 updates its dependency 'requests' to v2.31.0 to include a security fix.
https://github.com/MarketSquare/robotframework-openapi-libcore/commit/dc8cb2ec97951c9e3a15a509b2a17c835114efcf | what vulnarability does robotframework-openapi-libcore version less then 1.9.1 have | |
Having vulnarability PVE-2023-55151 Advisory: Robotframework-templateddata 1.4.0 escapes HTML and XML files by default to avoid XSS attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does robotframework-templateddata version less then 1.4.0 have ### Response: Having vulnarability PVE-2023-55151 Advisory: Robotframework-templateddata 1.4.0 escapes HTML and XML files by default to avoid XSS attacks. | what vulnarability does robotframework-templateddata version less then 1.4.0 have | |
Having vulnarability PVE-2021-37221 Advisory: robotraconteur 0.9.0 changes: The `LocalTransport` file handle locations have been moved for increased security | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does robotraconteur version less then 0.9.0 have ### Response: Having vulnarability PVE-2021-37221 Advisory: robotraconteur 0.9.0 changes: The `LocalTransport` file handle locations have been moved for increased security | what vulnarability does robotraconteur version less then 0.9.0 have | |
Having vulnarability CVE-2023-45803 Advisory: Robyn-rate-limits 0.2.0 updates its dependency 'urllib3' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does robyn-rate-limits version less then 0.2.0 have ### Response: Having vulnarability CVE-2023-45803 Advisory: Robyn-rate-limits 0.2.0 updates its dependency 'urllib3' to include a security fix. | what vulnarability does robyn-rate-limits version less then 0.2.0 have | |
Having vulnarability CVE-2022-46175 Advisory: Rocketlogger 2.1.1 updates its dependency 'json5' to version '2.2.3' to fix a Prototype Pollution vulnerability.
https://github.com/ETHZ-TEC/RocketLogger/commit/3d017bb8d91f3fadcb7b9cf7038510cc5ec41ce5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rocketlogger version less then 2.1.1 have ### Response: Having vulnarability CVE-2022-46175 Advisory: Rocketlogger 2.1.1 updates its dependency 'json5' to version '2.2.3' to fix a Prototype Pollution vulnerability.
https://github.com/ETHZ-TEC/RocketLogger/commit/3d017bb8d91f3fadcb7b9cf7038510cc5ec41ce5 | what vulnarability does rocketlogger version less then 2.1.1 have | |
Having vulnarability PVE-2022-49718 Advisory: Rockhopper 0.2.0 fixes a potential security exploit in RaggedArray.loads(buffer, ldtype=np.uint64).
https://github.com/bwoodsend/rockhopper/commit/1a15fad5e06ae693eb9b8908363d2c8ef455104e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rockhopper version less then 0.2.0 have ### Response: Having vulnarability PVE-2022-49718 Advisory: Rockhopper 0.2.0 fixes a potential security exploit in RaggedArray.loads(buffer, ldtype=np.uint64).
https://github.com/bwoodsend/rockhopper/commit/1a15fad5e06ae693eb9b8908363d2c8ef455104e | what vulnarability does rockhopper version less then 0.2.0 have | |
Having vulnarability PVE-2022-44616 Advisory: Rolls-blockchain 1.0beta14 adds peers gossiping to partially protect from eclipse attacks.
https://github.com/strandedathome/rolls-blockchain/commit/5b17e1cf237247c767173c7c6f08ba70a22449b3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rolls-blockchain version less then 1.0beta14 have ### Response: Having vulnarability PVE-2022-44616 Advisory: Rolls-blockchain 1.0beta14 adds peers gossiping to partially protect from eclipse attacks.
https://github.com/strandedathome/rolls-blockchain/commit/5b17e1cf237247c767173c7c6f08ba70a22449b3 | what vulnarability does rolls-blockchain version less then 1.0beta14 have | |
Having vulnarability PVE-2023-59656 Advisory: Rom 0.37.3 includes a fix for a Race Condition vulnerability.
https://github.com/josiahcarlson/rom/commit/d4fef79fef2baf8e2c35dc90356bc50a0e6b65ee | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rom version less then 0.37.3 have ### Response: Having vulnarability PVE-2023-59656 Advisory: Rom 0.37.3 includes a fix for a Race Condition vulnerability.
https://github.com/josiahcarlson/rom/commit/d4fef79fef2baf8e2c35dc90356bc50a0e6b65ee | what vulnarability does rom version less then 0.37.3 have | |
Having vulnarability CVE-2022-34065 Advisory: The Rondolu-YT-Concate package in PyPI v0.1.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rondolu-yt-concate version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-34065 Advisory: The Rondolu-YT-Concate package in PyPI v0.1.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does rondolu-yt-concate version equal to 0.1.0 have | |
Having vulnarability CVE-2022-32997 Advisory: The RootInteractive package in PyPI v0.0.5 to v0.0.19b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rootinteractive version greather then equal to 0.0.5,less then 0.0.19 have ### Response: Having vulnarability CVE-2022-32997 Advisory: The RootInteractive package in PyPI v0.0.5 to v0.0.19b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does rootinteractive version greather then equal to 0.0.5,less then 0.0.19 have | |
Having vulnarability CVE-2014-3539 Advisory: base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rope version less then 0.10 have ### Response: Having vulnarability CVE-2014-3539 Advisory: base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load. | what vulnarability does rope version less then 0.10 have | |
Having vulnarability PVE-2021-39115 Advisory: Rosdep 0.15.2 migrates to yaml.safe_load() to avoid a RCE vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rosdep version less then 0.15.2 have ### Response: Having vulnarability PVE-2021-39115 Advisory: Rosdep 0.15.2 migrates to yaml.safe_load() to avoid a RCE vulnerability. | what vulnarability does rosdep version less then 0.15.2 have | |
Having vulnarability CVE-2018-18074 Advisory: Rotten-tomatoes-cli 0.0.2 updates its dependency 'requests' to >=2.20.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rotten-tomatoes-cli version less then 0.0.2 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Rotten-tomatoes-cli 0.0.2 updates its dependency 'requests' to >=2.20.0 to include a security fix. | what vulnarability does rotten-tomatoes-cli version less then 0.0.2 have | |
Having vulnarability PVE-2023-58882 Advisory: Roundup 0.6.0b4 includes a fix for a XSS vulnerability.
https://github.com/roundup-tracker/roundup/commit/e4a893248de986ae5d4217a5ba5af3d10b8f9b01 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does roundup version less then 0.6.0b4 have ### Response: Having vulnarability PVE-2023-58882 Advisory: Roundup 0.6.0b4 includes a fix for a XSS vulnerability.
https://github.com/roundup-tracker/roundup/commit/e4a893248de986ae5d4217a5ba5af3d10b8f9b01 | what vulnarability does roundup version less then 0.6.0b4 have | |
Having vulnarability CVE-2023-38325 Advisory: Rozetka-api 1.1.6 updates its dependency 'cryptography' to version '41.0.3' to include a fix for a vulnerability.
https://github.com/ALERTua/rozetka_api/commit/ec51dcf627aa00cf67e40b89793a6b0a39615a5a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rozetka-api version less then 1.1.6 have ### Response: Having vulnarability CVE-2023-38325 Advisory: Rozetka-api 1.1.6 updates its dependency 'cryptography' to version '41.0.3' to include a fix for a vulnerability.
https://github.com/ALERTua/rozetka_api/commit/ec51dcf627aa00cf67e40b89793a6b0a39615a5a | what vulnarability does rozetka-api version less then 1.1.6 have | |
Having vulnarability CVE-2022-35411 Advisory: Rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
A fix for this issue is on master branch of the project's Github repository.
https://github.com/abersheeran/rpc.py/commit/491e7a841ed9a754796d6ab047a9fb16e23bf8bd | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rpc-py version greather then equal to 0 have ### Response: Having vulnarability CVE-2022-35411 Advisory: Rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
A fix for this issue is on master branch of the project's Github repository.
https://github.com/abersheeran/rpc.py/commit/491e7a841ed9a754796d6ab047a9fb16e23bf8bd | what vulnarability does rpc-py version greather then equal to 0 have | |
Having vulnarability PVE-2021-26108 Advisory: rpc4django before 0.2.3 is vulnerable to billion laughs denial of service attack. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rpc4django version less then 0.2.3 have ### Response: Having vulnarability PVE-2021-26108 Advisory: rpc4django before 0.2.3 is vulnerable to billion laughs denial of service attack. | what vulnarability does rpc4django version less then 0.2.3 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.