output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability CVE-2014-1604 Advisory: The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rply version less then 0.7.1 have ### Response: Having vulnarability CVE-2014-1604 Advisory: The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
what vulnarability does rply version less then 0.7.1 have
Having vulnarability CVE-2019-16328 Advisory: Rpyc 4.1.2 includes a fix for CVE-2019-16328: a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rpyc version less then 4.1.2 have ### Response: Having vulnarability CVE-2019-16328 Advisory: Rpyc 4.1.2 includes a fix for CVE-2019-16328: a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
what vulnarability does rpyc version less then 4.1.2 have
Having vulnarability PVE-2024-65651 Advisory: Rq 0.7.1 resolves a race condition that prevented the proper setting of job statuses under high-load conditions, ensuring accurate status updates and job management. https://github.com/rq/rq/pull/742
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rq version less then 0.7.1 have ### Response: Having vulnarability PVE-2024-65651 Advisory: Rq 0.7.1 resolves a race condition that prevented the proper setting of job statuses under high-load conditions, ensuring accurate status updates and job management. https://github.com/rq/rq/pull/742
what vulnarability does rq version less then 0.7.1 have
Having vulnarability PVE-2022-51756 Advisory: Rqeuests is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rqeuests version greather then 0 have ### Response: Having vulnarability PVE-2022-51756 Advisory: Rqeuests is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards.
what vulnarability does rqeuests version greather then 0 have
Having vulnarability PVE-2023-52903 Advisory: Rrquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server. https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rrquests version greather then 0 have ### Response: Having vulnarability PVE-2023-52903 Advisory: Rrquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server. https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
what vulnarability does rrquests version greather then 0 have
Having vulnarability PVE-2021-36903 Advisory: Rs-django-jet 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions. https://github.com/reckonsys/rs-django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rs-django-jet version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-36903 Advisory: Rs-django-jet 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions. https://github.com/reckonsys/rs-django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9
what vulnarability does rs-django-jet version less then 1.0.4 have
Having vulnarability PVE-2021-26109 Advisory: Rsa 2.0 includes a security fix: Make sure p and q are different and phi_n is not divisible by 256. Any of the previous conditions would make breaking encryption trivial. https://github.com/sybrenstuvel/python-rsa/commit/f2fec9090cc4220e12b9b6f3102114bcc6aa9575
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rsa version less then 2.0 have ### Response: Having vulnarability PVE-2021-26109 Advisory: Rsa 2.0 includes a security fix: Make sure p and q are different and phi_n is not divisible by 256. Any of the previous conditions would make breaking encryption trivial. https://github.com/sybrenstuvel/python-rsa/commit/f2fec9090cc4220e12b9b6f3102114bcc6aa9575
what vulnarability does rsa version less then 2.0 have
Having vulnarability PVE-2021-33007 Advisory: rsanic before 0.2.2 is vulnerable to XSS attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rsanic version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-33007 Advisory: rsanic before 0.2.2 is vulnerable to XSS attacks.
what vulnarability does rsanic version less then 0.2.2 have
Having vulnarability PVE-2021-38119 Advisory: In addition to disabling TLS checking entirely, users in rsconnect-jupyter 1.3.0 have the option of uploading their own self-signed certificate bundle as a more secure TLS alternative.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rsconnect-jupyter version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-38119 Advisory: In addition to disabling TLS checking entirely, users in rsconnect-jupyter 1.3.0 have the option of uploading their own self-signed certificate bundle as a more secure TLS alternative.
what vulnarability does rsconnect-jupyter version less then 1.3.0 have
Having vulnarability PVE-2021-37430 Advisory: Rss2email 3.10 fixes SMTP security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rss2email version less then 3.10 have ### Response: Having vulnarability PVE-2021-37430 Advisory: Rss2email 3.10 fixes SMTP security issues.
what vulnarability does rss2email version less then 3.10 have
Having vulnarability CVE-2020-14019 Advisory: Rtslib-fb 2.1.73 includes a fix for CVE-2020-14019.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rtslib-fb version less then 2.1.73 have ### Response: Having vulnarability CVE-2020-14019 Advisory: Rtslib-fb 2.1.73 includes a fix for CVE-2020-14019.
what vulnarability does rtslib-fb version less then 2.1.73 have
Having vulnarability PVE-2021-26113 Advisory: rtv before 1.12.1 has a security vulnerability where malicious URLs could inject python code.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rtv version less then 1.12.1 have ### Response: Having vulnarability PVE-2021-26113 Advisory: rtv before 1.12.1 has a security vulnerability where malicious URLs could inject python code.
what vulnarability does rtv version less then 1.12.1 have
Having vulnarability CVE-2019-20478 Advisory: In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ruamel-yaml version less then 0.16.7 have ### Response: Having vulnarability CVE-2019-20478 Advisory: In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
what vulnarability does ruamel-yaml version less then 0.16.7 have
Having vulnarability PVE-2021-41017 Advisory: Rubicon-ml 0.2.6 includes a fix to address a whitesource vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rubicon-ml version less then 0.2.6 have ### Response: Having vulnarability PVE-2021-41017 Advisory: Rubicon-ml 0.2.6 includes a fix to address a whitesource vulnerability.
what vulnarability does rubicon-ml version less then 0.2.6 have
Having vulnarability CVE-2019-18799 Advisory: Rubrix 0.13.0 replaces vulnerable 'node-sass' v3.5.5 with 'sass' package.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rubrix version less then 0.13.0 have ### Response: Having vulnarability CVE-2019-18799 Advisory: Rubrix 0.13.0 replaces vulnerable 'node-sass' v3.5.5 with 'sass' package.
what vulnarability does rubrix version less then 0.13.0 have
Having vulnarability CVE-2018-1000805 Advisory: Rucio 1.19.0.post2 upgrades its Paramiko dependency from version 2.4.1 to 2.4.2, addressing the security vulnerability CVE-2018-1000805. https://github.com/rucio/rucio/pull/1649/commits/0077bb6c80f5f8e49e47294375b41e6af051fc0b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rucio version less then 1.19.0.post2 have ### Response: Having vulnarability CVE-2018-1000805 Advisory: Rucio 1.19.0.post2 upgrades its Paramiko dependency from version 2.4.1 to 2.4.2, addressing the security vulnerability CVE-2018-1000805. https://github.com/rucio/rucio/pull/1649/commits/0077bb6c80f5f8e49e47294375b41e6af051fc0b
what vulnarability does rucio version less then 1.19.0.post2 have
Having vulnarability PVE-2023-55207 Advisory: Rucio-webui 1.26.7 includes a security fix: Potentially leak of the contents of cookies to other sessions within a wsgi container. Impact is that Rucio authentication tokens are leaked to other users accessing the 'webui' within a close timeframe, thus allowing users to access the `webui` with the leaked authentication token. Privileges are therefore also escalated. Rucio server / daemons are not affected by this issue, it is isolated to the webui. https://github.com/rucio/rucio/issues/4928
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rucio-webui version greather then equal to 1.26.0,less then 1.26.7 have ### Response: Having vulnarability PVE-2023-55207 Advisory: Rucio-webui 1.26.7 includes a security fix: Potentially leak of the contents of cookies to other sessions within a wsgi container. Impact is that Rucio authentication tokens are leaked to other users accessing the 'webui' within a close timeframe, thus allowing users to access the `webui` with the leaked authentication token. Privileges are therefore also escalated. Rucio server / daemons are not affected by this issue, it is isolated to the webui. https://github.com/rucio/rucio/issues/4928
what vulnarability does rucio-webui version greather then equal to 1.26.0,less then 1.26.7 have
Having vulnarability CVE-2015-2296 Advisory: ruffruffs 2.6.0 fixes handling of cookies on redirect. Previously a cookie without a host value set would use the hostname for the redirected URL exposing requests users to session fixation attacks and potentially cookie stealing.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ruffruffs version less then 2.6.0 have ### Response: Having vulnarability CVE-2015-2296 Advisory: ruffruffs 2.6.0 fixes handling of cookies on redirect. Previously a cookie without a host value set would use the hostname for the redirected URL exposing requests users to session fixation attacks and potentially cookie stealing.
what vulnarability does ruffruffs version less then 2.6.0 have
Having vulnarability PVE-2021-39085 Advisory: Runway 1.16.0 has enhanced security via nonce signing (Static Site AuthEdge).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does runway version less then 1.16.0 have ### Response: Having vulnarability PVE-2021-39085 Advisory: Runway 1.16.0 has enhanced security via nonce signing (Static Site AuthEdge).
what vulnarability does runway version less then 1.16.0 have
Having vulnarability PVE-2023-52904 Advisory: Rwquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server. https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rwquests version greather then 0 have ### Response: Having vulnarability PVE-2023-52904 Advisory: Rwquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server. https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
what vulnarability does rwquests version greather then 0 have
Having vulnarability CVE-2023-37920 Advisory: Rwslib 1.2.10 updates its dependency 'certifi' to v2023.7.22 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rwslib version less then 1.2.10 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Rwslib 1.2.10 updates its dependency 'certifi' to v2023.7.22 to include a security fix.
what vulnarability does rwslib version less then 1.2.10 have
Having vulnarability CVE-2020-35139 Advisory: An issue was discovered in OFPBundleCtrlMsg in parser.py in Faucet SDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ryu version less then equal to 4.34 have ### Response: Having vulnarability CVE-2020-35139 Advisory: An issue was discovered in OFPBundleCtrlMsg in parser.py in Faucet SDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop).
what vulnarability does ryu version less then equal to 4.34 have
Having vulnarability CVE-2021-32061 Advisory: S3scanner 2.0.2 includes a fix for CVE-2021-32061: S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element. https://github.com/sa7mon/S3Scanner/issues/122
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s3scanner version less then 2.0.2 have ### Response: Having vulnarability CVE-2021-32061 Advisory: S3scanner 2.0.2 includes a fix for CVE-2021-32061: S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element. https://github.com/sa7mon/S3Scanner/issues/122
what vulnarability does s3scanner version less then 2.0.2 have
Having vulnarability PVE-2023-53262 Advisory: S3transfere is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s3transfere version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53262 Advisory: S3transfere is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.
what vulnarability does s3transfere version greather then equal to 0 have
Having vulnarability PVE-2023-53263 Advisory: S3transferr is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s3transferr version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53263 Advisory: S3transferr is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.
what vulnarability does s3transferr version greather then equal to 0 have
Having vulnarability PVE-2023-53264 Advisory: S3transferss is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s3transferss version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53264 Advisory: S3transferss is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information.
what vulnarability does s3transferss version greather then equal to 0 have
Having vulnarability PVE-2021-37119 Advisory: S4 0.4.2 upgrades boto3 to minimum requirement to fix a vulnerability in a urllib3 dependency.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s4 version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-37119 Advisory: S4 0.4.2 upgrades boto3 to minimum requirement to fix a vulnerability in a urllib3 dependency.
what vulnarability does s4 version less then 0.4.2 have
Having vulnarability CVE-2018-10903 Advisory: Safety 1.8.4 updates its dependency 'cryptography' to v2.3 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does safety version less then 1.8.4 have ### Response: Having vulnarability CVE-2018-10903 Advisory: Safety 1.8.4 updates its dependency 'cryptography' to v2.3 to include security fixes.
what vulnarability does safety version less then 1.8.4 have
Having vulnarability CVE-2023-24622 Advisory: Safeurl-python 1.2 includes a fix for CVE-2023-24622: isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF. https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does safeurl-python version less then 1.2 have ### Response: Having vulnarability CVE-2023-24622 Advisory: Safeurl-python 1.2 includes a fix for CVE-2023-24622: isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF. https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7
what vulnarability does safeurl-python version less then 1.2 have
Having vulnarability CVE-2022-40754 Advisory: Sagemaker 2.111.0 updates its dependency 'apache-airflow' to v2.4.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sagemaker version less then 2.111.0 have ### Response: Having vulnarability CVE-2022-40754 Advisory: Sagemaker 2.111.0 updates its dependency 'apache-airflow' to v2.4.0 to include a security fix.
what vulnarability does sagemaker version less then 2.111.0 have
Having vulnarability CVE-2019-18874 Advisory: Sagemaker-containers 2.8.2 updates its dependency 'psutil' to v5.6.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sagemaker-containers version less then 2.8.2 have ### Response: Having vulnarability CVE-2019-18874 Advisory: Sagemaker-containers 2.8.2 updates its dependency 'psutil' to v5.6.7 to include a security fix.
what vulnarability does sagemaker-containers version less then 2.8.2 have
Having vulnarability CVE-2019-19911 Advisory: Sagemaker-pytorch-inference 1.4.1 updates its dependency 'pillow' to v7.1.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sagemaker-pytorch-inference version less then 1.4.1 have ### Response: Having vulnarability CVE-2019-19911 Advisory: Sagemaker-pytorch-inference 1.4.1 updates its dependency 'pillow' to v7.1.0 to include security fixes.
what vulnarability does sagemaker-pytorch-inference version less then 1.4.1 have
Having vulnarability CVE-2020-15085 Advisory: In Saleor Storefront before version 2.10.3, request data used to authenticate customers was inadvertently cached in the browser's local storage mechanism, including credentials. A malicious user with direct access to the browser could extract the email and password. In versions prior to 2.10.0 persisted the cache even after the user logged out. This is fixed in version 2.10.3. A workaround is to manually clear application data (browser's local storage) after logging into Saleor Storefront.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does saleor version less then 2.10.3 have ### Response: Having vulnarability CVE-2020-15085 Advisory: In Saleor Storefront before version 2.10.3, request data used to authenticate customers was inadvertently cached in the browser's local storage mechanism, including credentials. A malicious user with direct access to the browser could extract the email and password. In versions prior to 2.10.0 persisted the cache even after the user logged out. This is fixed in version 2.10.3. A workaround is to manually clear application data (browser's local storage) after logging into Saleor Storefront.
what vulnarability does saleor version less then 2.10.3 have
Having vulnarability CVE-2013-2228 Advisory: SaltStack RSA Key Generation allows remote users to decrypt communications
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does salt version less then 0.15.0 have ### Response: Having vulnarability CVE-2013-2228 Advisory: SaltStack RSA Key Generation allows remote users to decrypt communications
what vulnarability does salt version less then 0.15.0 have
Having vulnarability CVE-2020-27783 Advisory: Salted 0.5.4 requires lxml version >= 4.6.2 as it fixes a vulnerability and works with Python 3.9.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does salted version less then 0.5.4 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Salted 0.5.4 requires lxml version >= 4.6.2 as it fixes a vulnerability and works with Python 3.9.
what vulnarability does salted version less then 0.5.4 have
Having vulnarability PVE-2024-63561 Advisory: Sanic 0.5.1 addresses a vulnerability that allowed for directory traversal through improperly handled static file URIs. This issue, identified in the sanic/sanic/static.py file, made it possible for attackers to access arbitrary files on the server via URL encoding. https://github.com/sanic-org/sanic/pull/635/commits/ae09dec05e10816b37eed425c87e193d230c5a73 https://github.com/sanic-org/sanic/pull/635/commits/afd51e0823524eec683b226a20f40d958253064f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sanic version less then 0.5.1 have ### Response: Having vulnarability PVE-2024-63561 Advisory: Sanic 0.5.1 addresses a vulnerability that allowed for directory traversal through improperly handled static file URIs. This issue, identified in the sanic/sanic/static.py file, made it possible for attackers to access arbitrary files on the server via URL encoding. https://github.com/sanic-org/sanic/pull/635/commits/ae09dec05e10816b37eed425c87e193d230c5a73 https://github.com/sanic-org/sanic/pull/635/commits/afd51e0823524eec683b226a20f40d958253064f
what vulnarability does sanic version less then 0.5.1 have
Having vulnarability PVE-2023-99923 Advisory: The official compatibility of Sanic includes Python versions 3.6, 3.7, 3.8, and 3.9, but not version 3.10. Mistakenly running it with Python 3.10 can potentially cause your server to crash upon receiving a web request.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sanic-ext version greather then equal to 0.1.7,less then 20.12.6 have ### Response: Having vulnarability PVE-2023-99923 Advisory: The official compatibility of Sanic includes Python versions 3.6, 3.7, 3.8, and 3.9, but not version 3.10. Mistakenly running it with Python 3.10 can potentially cause your server to crash upon receiving a web request.
what vulnarability does sanic-ext version greather then equal to 0.1.7,less then 20.12.6 have
Having vulnarability PVE-2021-38524 Advisory: Sanic-oauthlib 0.5.0 mentions "**Security bug** for access token via `#92`". No other information was provided.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sanic-oauthlib version less then 0.5.0 have ### Response: Having vulnarability PVE-2021-38524 Advisory: Sanic-oauthlib 0.5.0 mentions "**Security bug** for access token via `#92`". No other information was provided.
what vulnarability does sanic-oauthlib version less then 0.5.0 have
Having vulnarability CVE-2020-36242 Advisory: Sanic-security version 0.6.8.1 updates its dependency "cryptography" to v3.3.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sanic-security version less then 0.6.8.1 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Sanic-security version 0.6.8.1 updates its dependency "cryptography" to v3.3.2 to include a security fix.
what vulnarability does sanic-security version less then 0.6.8.1 have
Having vulnarability CVE-2023-50423 Advisory: Sap-xssec 4.1.0 includes a fix for CVE-2023-50423: Versions <4.1.0 allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application. https://github.com/SAP/cloud-pysec/security/advisories/GHSA-6mjg-37cp-42x5
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sap-xssec version less then 4.1.0 have ### Response: Having vulnarability CVE-2023-50423 Advisory: Sap-xssec 4.1.0 includes a fix for CVE-2023-50423: Versions <4.1.0 allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application. https://github.com/SAP/cloud-pysec/security/advisories/GHSA-6mjg-37cp-42x5
what vulnarability does sap-xssec version less then 4.1.0 have
Having vulnarability CVE-2021-32798 Advisory: Sapsan 0.4.0 includes updated requirements (notebook >= 6.4.3) that fixes security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sapsan version less then 0.4.0 have ### Response: Having vulnarability CVE-2021-32798 Advisory: Sapsan 0.4.0 includes updated requirements (notebook >= 6.4.3) that fixes security vulnerabilities.
what vulnarability does sapsan version less then 0.4.0 have
Having vulnarability PVE-2021-41098 Advisory: Saspy version 3.7.3 has upgraded log4j.jar (included in the Java IOM client) to version 2.12 because version 1.2 raised flags on some security scans.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does saspy version less then 3.7.3 have ### Response: Having vulnarability PVE-2021-41098 Advisory: Saspy version 3.7.3 has upgraded log4j.jar (included in the Java IOM client) to version 2.12 because version 1.2 raised flags on some security scans.
what vulnarability does saspy version less then 3.7.3 have
Having vulnarability CVE-2018-6594 Advisory: Satosa 0.6.1 switches dependencies from 'pycrypto' to 'pycryptodome' for security reasons.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does satosa version less then 0.6.1 have ### Response: Having vulnarability CVE-2018-6594 Advisory: Satosa 0.6.1 switches dependencies from 'pycrypto' to 'pycryptodome' for security reasons.
what vulnarability does satosa version less then 0.6.1 have
Having vulnarability CVE-2017-16042 Advisory: Sbp 2.4.2 updates its NPM dependency 'mocha' to fix a transitive vulnerability in 'growl' package.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sbp version less then 2.4.2 have ### Response: Having vulnarability CVE-2017-16042 Advisory: Sbp 2.4.2 updates its NPM dependency 'mocha' to fix a transitive vulnerability in 'growl' package.
what vulnarability does sbp version less then 2.4.2 have
Having vulnarability CVE-2020-24715 Advisory: Scalyr-agent-2 version 2.1.10 includes a fix for CVE-2020-24715: The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation because, in some circumstances, native Python code is used that lacks a comparison of the hostname to commonName and subjectAltName.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scalyr-agent-2 version less then 2.1.10 have ### Response: Having vulnarability CVE-2020-24715 Advisory: Scalyr-agent-2 version 2.1.10 includes a fix for CVE-2020-24715: The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation because, in some circumstances, native Python code is used that lacks a comparison of the hostname to commonName and subjectAltName.
what vulnarability does scalyr-agent-2 version less then 2.1.10 have
Having vulnarability CVE-2020-27783 Advisory: Scancode-toolkit 21.2.9 updates its dependency 'lxml' to v4.6.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scancode-toolkit version less then 21.2.9 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Scancode-toolkit 21.2.9 updates its dependency 'lxml' to v4.6.2 to include a security fix.
what vulnarability does scancode-toolkit version less then 21.2.9 have
Having vulnarability CVE-2023-39523 Advisory: Scancodeio 32.5.1 includes a fix for a Command Injection vulnerability in the fetch process of the Docker image. https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scancodeio version less then 32.5.1 have ### Response: Having vulnarability CVE-2023-39523 Advisory: Scancodeio 32.5.1 includes a fix for a Command Injection vulnerability in the fetch process of the Docker image. https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f
what vulnarability does scancodeio version less then 32.5.1 have
Having vulnarability PVE-2024-66052 Advisory: Scandeval 12.3.0 enhances its outlines dependency to versions >=0.0.36,<0.1 to resolve a race condition encountered in NER dataset evaluations and integrates with the transformers library, replacing the previously hardcoded setup. This update streamlines integration and improves evaluation processes. https://github.com/ScandEval/ScandEval/commit/a1decdc084a924560823c62148fe7600f1b35f5a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scandeval version less then 12.3.0 have ### Response: Having vulnarability PVE-2024-66052 Advisory: Scandeval 12.3.0 enhances its outlines dependency to versions >=0.0.36,<0.1 to resolve a race condition encountered in NER dataset evaluations and integrates with the transformers library, replacing the previously hardcoded setup. This update streamlines integration and improves evaluation processes. https://github.com/ScandEval/ScandEval/commit/a1decdc084a924560823c62148fe7600f1b35f5a
what vulnarability does scandeval version less then 12.3.0 have
Having vulnarability CVE-2019-1010142 Advisory: Scapy 2.4.1 includes a fix for CVE-2019-1010142: Denial of Service. The impact is infinite loop, resource consumption and program unresponsive. The component affected component is '_RADIUSAttrPacketListField.getfield(self..)'. The attack vector is over the network or a malicious pcap. https://github.com/secdev/scapy/pull/1409/commits/0d7ae2b039f650a40e511d09eb961c782da025d9
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scapy version less then 2.4.1 have ### Response: Having vulnarability CVE-2019-1010142 Advisory: Scapy 2.4.1 includes a fix for CVE-2019-1010142: Denial of Service. The impact is infinite loop, resource consumption and program unresponsive. The component affected component is '_RADIUSAttrPacketListField.getfield(self..)'. The attack vector is over the network or a malicious pcap. https://github.com/secdev/scapy/pull/1409/commits/0d7ae2b039f650a40e511d09eb961c782da025d9
what vulnarability does scapy version less then 2.4.1 have
Having vulnarability PVE-2023-60055 Advisory: Scarletio 1.0.33 includes a fix for a Race Condition vulnerability. https://github.com/HuyaneMatsu/scarletio/commit/9a1498a96cd5def8ad668ac76f1049df1329fd38
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scarletio version less then 1.0.33 have ### Response: Having vulnarability PVE-2023-60055 Advisory: Scarletio 1.0.33 includes a fix for a Race Condition vulnerability. https://github.com/HuyaneMatsu/scarletio/commit/9a1498a96cd5def8ad668ac76f1049df1329fd38
what vulnarability does scarletio version less then 1.0.33 have
Having vulnarability CVE-2021-44906 Advisory: Scenepic 1.0.8 updates its NPM dependency 'minimist' to v1.2.6 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scenepic version less then 1.0.8 have ### Response: Having vulnarability CVE-2021-44906 Advisory: Scenepic 1.0.8 updates its NPM dependency 'minimist' to v1.2.6 to include a security fix.
what vulnarability does scenepic version less then 1.0.8 have
Having vulnarability PVE-2021-37821 Advisory: Sceptre 2.3.0 fixes a XSS vulnerability. https://github.com/Sceptre/sceptre/commit/6d4124bdc9d4d5277c3f5cdc5eb7d6db9696b667
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sceptre version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-37821 Advisory: Sceptre 2.3.0 fixes a XSS vulnerability. https://github.com/Sceptre/sceptre/commit/6d4124bdc9d4d5277c3f5cdc5eb7d6db9696b667
what vulnarability does sceptre version less then 2.3.0 have
Having vulnarability CVE-2022-34749 Advisory: Schema-salad 8.3.20221209165047 stops using its NPM dependency 'mistune' 0.8.x for HTML generation to avoid a vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does schema-salad version less then 8.3.20221209165047 have ### Response: Having vulnarability CVE-2022-34749 Advisory: Schema-salad 8.3.20221209165047 stops using its NPM dependency 'mistune' 0.8.x for HTML generation to avoid a vulnerability.
what vulnarability does schema-salad version less then 8.3.20221209165047 have
Having vulnarability PVE-2021-42518 Advisory: Schemachange 3.3.2 configures Jinja to escape inputs to templates (using autoescape=True). This helps protect rendered templates against XSS and other vulnerabilities. https://github.com/Snowflake-Labs/schemachange/commit/f006a4c550365f872fad396e87b797114eb1dc5d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does schemachange version less then 3.3.2 have ### Response: Having vulnarability PVE-2021-42518 Advisory: Schemachange 3.3.2 configures Jinja to escape inputs to templates (using autoescape=True). This helps protect rendered templates against XSS and other vulnerabilities. https://github.com/Snowflake-Labs/schemachange/commit/f006a4c550365f872fad396e87b797114eb1dc5d
what vulnarability does schemachange version less then 3.3.2 have
Having vulnarability CVE-2023-25577 Advisory: Schemathesis 3.18.4 updates its dependency 'werkzeug' to version '2.3.7' to include a fix for a Denial of Service vulnerability. https://github.com/schemathesis/schemathesis/pull/1696
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does schemathesis version less then 3.18.4 have ### Response: Having vulnarability CVE-2023-25577 Advisory: Schemathesis 3.18.4 updates its dependency 'werkzeug' to version '2.3.7' to include a fix for a Denial of Service vulnerability. https://github.com/schemathesis/schemathesis/pull/1696
what vulnarability does schemathesis version less then 3.18.4 have
Having vulnarability PVE-2022-52255 Advisory: Scikit-learn 0.24.2 includes a fix for a ReDoS vulnerability. https://github.com/scikit-learn/scikit-learn/issues/19522
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scikit-learn version less then 0.24.2 have ### Response: Having vulnarability PVE-2022-52255 Advisory: Scikit-learn 0.24.2 includes a fix for a ReDoS vulnerability. https://github.com/scikit-learn/scikit-learn/issues/19522
what vulnarability does scikit-learn version less then 0.24.2 have
Having vulnarability CVE-2023-24816 Advisory: Scikit-network 0.29.0 updates its dependency 'ipython' to v8.10.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scikit-network version less then 0.29.0 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Scikit-network 0.29.0 updates its dependency 'ipython' to v8.10.0 to include a security fix.
what vulnarability does scikit-network version less then 0.29.0 have
Having vulnarability CVE-2023-29824 Advisory: Scikit-rmt 0.7.0 updates its dependency 'scipy' to version '1.11.1' to include a security fix. https://github.com/AlejandroSantorum/scikit-rmt/commit/ced51769bf275174be271af820c196df7a6144fc
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scikit-rmt version less then 0.7.0 have ### Response: Having vulnarability CVE-2023-29824 Advisory: Scikit-rmt 0.7.0 updates its dependency 'scipy' to version '1.11.1' to include a security fix. https://github.com/AlejandroSantorum/scikit-rmt/commit/ced51769bf275174be271af820c196df7a6144fc
what vulnarability does scikit-rmt version less then 0.7.0 have
Having vulnarability CVE-2022-29238 Advisory: Scipp 0.15.0 updates its dependency 'notebook' to v6.4.12 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scipp version less then 0.15.0 have ### Response: Having vulnarability CVE-2022-29238 Advisory: Scipp 0.15.0 updates its dependency 'notebook' to v6.4.12 to include a security fix.
what vulnarability does scipp version less then 0.15.0 have
Having vulnarability CVE-2023-25399 Advisory: Scipy 1.10.0rc1 includes a fix for a Denial of Service vulnerability. https://github.com/scipy/scipy/issues/16235
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scipy version less then 1.10.0rc1 have ### Response: Having vulnarability CVE-2023-25399 Advisory: Scipy 1.10.0rc1 includes a fix for a Denial of Service vulnerability. https://github.com/scipy/scipy/issues/16235
what vulnarability does scipy version less then 1.10.0rc1 have
Having vulnarability CVE-2017-16876 Advisory: Scml 0.5.1 pins a transitive dependency (mistune>=2.0.1) to include a fix for an XSS vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scml version less then 0.5.1 have ### Response: Having vulnarability CVE-2017-16876 Advisory: Scml 0.5.1 pins a transitive dependency (mistune>=2.0.1) to include a fix for an XSS vulnerability.
what vulnarability does scml version less then 0.5.1 have
Having vulnarability PVE-2021-38489 Advisory: Scons 4.0.0 converts the remaining uses of an insecure/deprecated mktemp method.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scons version less then 4.0.0 have ### Response: Having vulnarability PVE-2021-38489 Advisory: Scons 4.0.0 converts the remaining uses of an insecure/deprecated mktemp method.
what vulnarability does scons version less then 4.0.0 have
Having vulnarability CVE-2022-34057 Advisory: The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scoptrial version equal to 0.0.5 have ### Response: Having vulnarability CVE-2022-34057 Advisory: The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
what vulnarability does scoptrial version equal to 0.0.5 have
Having vulnarability CVE-2022-1554 Advisory: Scout is a Variant Call Format (VCF) visualization interface. The Pypi package `scout-browser` is vulnerable to path traversal due to `send_file` call in versions prior to 4.52.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scout-browser version greather then equal to 0,less then 4.52 have ### Response: Having vulnarability CVE-2022-1554 Advisory: Scout is a Variant Call Format (VCF) visualization interface. The Pypi package `scout-browser` is vulnerable to path traversal due to `send_file` call in versions prior to 4.52.
what vulnarability does scout-browser version greather then equal to 0,less then 4.52 have
Having vulnarability PVE-2022-48004 Advisory: Scoutsuite 5.11.0 fixes a DOM XSS. https://github.com/nccgroup/ScoutSuite/commit/1b72ab61ec3062b833f8c046e6f57fd64fe24274
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scoutsuite version less then 5.11.0 have ### Response: Having vulnarability PVE-2022-48004 Advisory: Scoutsuite 5.11.0 fixes a DOM XSS. https://github.com/nccgroup/ScoutSuite/commit/1b72ab61ec3062b833f8c046e6f57fd64fe24274
what vulnarability does scoutsuite version less then 5.11.0 have
Having vulnarability PVE-2021-39195 Advisory: Scrape 0.10.2 updates the 'lxml' dependency from 4.3.0 to 4.6.2 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrape version less then 0.10.2 have ### Response: Having vulnarability PVE-2021-39195 Advisory: Scrape 0.10.2 updates the 'lxml' dependency from 4.3.0 to 4.6.2 to include security fixes.
what vulnarability does scrape version less then 0.10.2 have
Having vulnarability CVE-2023-32681 Advisory: Scrappo 1.1.1 updates its dependency 'requests' minimum requirement to 2.31.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrappo version less then 1.1.1 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Scrappo 1.1.1 updates its dependency 'requests' minimum requirement to 2.31.0 to include a security fix.
what vulnarability does scrappo version less then 1.1.1 have
Having vulnarability CVE-2021-41125 Advisory: Scrapy versions 1.8.1 and 2.5.1 include a fix for CVE-2021-41125: If you use "HttpAuthMiddleware" (i.e. the "http_user" and "http_pass" spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as "robots.txt" requests sent by Scrapy when the "ROBOTSTXT_OBEY" setting is set to "True", or as requests reached through redirects. It's advised upgrading and using the new "http_auth_domain" spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you cannot upgrade to a secure version, set your HTTP authentication credentials on a per-request basis, using for example the "w3lib.http.basic_auth_header" function to convert your credentials into a value that you can assign to the "Authorization" header of your request, instead of defining them globally using "HttpAuthMiddleware". https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498 http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6 https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrapy version less then 1.8.1,greather then equal to 2.0.0,less then 2.5.1 have ### Response: Having vulnarability CVE-2021-41125 Advisory: Scrapy versions 1.8.1 and 2.5.1 include a fix for CVE-2021-41125: If you use "HttpAuthMiddleware" (i.e. the "http_user" and "http_pass" spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as "robots.txt" requests sent by Scrapy when the "ROBOTSTXT_OBEY" setting is set to "True", or as requests reached through redirects. It's advised upgrading and using the new "http_auth_domain" spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you cannot upgrade to a secure version, set your HTTP authentication credentials on a per-request basis, using for example the "w3lib.http.basic_auth_header" function to convert your credentials into a value that you can assign to the "Authorization" header of your request, instead of defining them globally using "HttpAuthMiddleware". https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498 http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6 https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header
what vulnarability does scrapy version less then 1.8.1,greather then equal to 2.0.0,less then 2.5.1 have
Having vulnarability CVE-2021-41124 Advisory: Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrapy-splash version greather then equal to 0,less then 0.8.0 have ### Response: Having vulnarability CVE-2021-41124 Advisory: Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots).
what vulnarability does scrapy-splash version greather then equal to 0,less then 0.8.0 have
Having vulnarability PVE-2021-37457 Advisory: Scrapydd 0.6.3 enhances the security by adding protection against cross-site request forgery.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrapydd version less then 0.6.3 have ### Response: Having vulnarability PVE-2021-37457 Advisory: Scrapydd 0.6.3 enhances the security by adding protection against cross-site request forgery.
what vulnarability does scrapydd version less then 0.6.3 have
Having vulnarability CVE-2022-34983 Advisory: The scu-captcha package in PyPI v0.0.1 to v0.0.4 included a code execution backdoor inserted by a third party.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scu-captcha version greather then equal to 0.0.1,less then equal to 0.0.4 have ### Response: Having vulnarability CVE-2022-34983 Advisory: The scu-captcha package in PyPI v0.0.1 to v0.0.4 included a code execution backdoor inserted by a third party.
what vulnarability does scu-captcha version greather then equal to 0.0.1,less then equal to 0.0.4 have
Having vulnarability CVE-2020-5215 Advisory: Scvae 2.1.1 updates TensorFlow to v1.15.2 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scvae version less then 2.1.1 have ### Response: Having vulnarability CVE-2020-5215 Advisory: Scvae 2.1.1 updates TensorFlow to v1.15.2 to include security fixes.
what vulnarability does scvae version less then 2.1.1 have
Having vulnarability CVE-2020-25659 Advisory: Sdc-cryptography 1.0.0 updates its dependency 'cryptography' to v3.4.5 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sdc-cryptography version less then 1.0.0 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Sdc-cryptography 1.0.0 updates its dependency 'cryptography' to v3.4.5 to include security fixes.
what vulnarability does sdc-cryptography version less then 1.0.0 have
Having vulnarability PVE-2021-37050 Advisory: Sdcclient 0.7.0 adds support for secure commands audit.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sdcclient version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-37050 Advisory: Sdcclient 0.7.0 adds support for secure commands audit.
what vulnarability does sdcclient version less then 0.7.0 have
Having vulnarability PVE-2022-47813 Advisory: Sdk-cli-v2 is a malicious package, typosquatting. It aims at targeting Azure environments. https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sdk-cli-v2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47813 Advisory: Sdk-cli-v2 is a malicious package, typosquatting. It aims at targeting Azure environments. https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick
what vulnarability does sdk-cli-v2 version greather then 0,less then 0 have
Having vulnarability PVE-2022-47812 Advisory: Sdk-cli-v2-public is a malicious package, typosquatting. It aims at targeting Azure environments. https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sdk-cli-v2-public version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47812 Advisory: Sdk-cli-v2-public is a malicious package, typosquatting. It aims at targeting Azure environments. https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick
what vulnarability does sdk-cli-v2-public version greather then 0,less then 0 have
Having vulnarability CVE-2023-43364 Advisory: main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does searchor version less then 2.4.2 have ### Response: Having vulnarability CVE-2023-43364 Advisory: main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution.
what vulnarability does searchor version less then 2.4.2 have
Having vulnarability PVE-2022-47803 Advisory: Secbg is a malicious package. It contains a backdoor. https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secbg version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47803 Advisory: Secbg is a malicious package. It contains a backdoor. https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages
what vulnarability does secbg version greather then 0,less then 0 have
Having vulnarability PVE-2022-49725 Advisory: Secretflow 0.6.7 uses a "more secure" random. No further information was found in the Github repository.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secretflow version less then 0.6.7 have ### Response: Having vulnarability PVE-2022-49725 Advisory: Secretflow 0.6.7 uses a "more secure" random. No further information was found in the Github repository.
what vulnarability does secretflow version less then 0.6.7 have
Having vulnarability CVE-2017-18342 Advisory: Secrets2env 0.1.4 includes a security patch for the function 'init' in 'secrets2env.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/eguven/secrets2env/commit/d6c98573d8d2e2296720b6e2298d5db47a17b2d7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secrets2env version less then 0.1.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Secrets2env 0.1.4 includes a security patch for the function 'init' in 'secrets2env.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/eguven/secrets2env/commit/d6c98573d8d2e2296720b6e2298d5db47a17b2d7
what vulnarability does secrets2env version less then 0.1.4 have
Having vulnarability PVE-2022-47804 Advisory: Secrevtwo is a malicious package. It contains a backdoor. https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secrevtwo version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47804 Advisory: Secrevtwo is a malicious package. It contains a backdoor. https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages
what vulnarability does secrevtwo version greather then 0,less then 0 have
Having vulnarability CVE-2023-26115 Advisory: Secsend 1.1.0 updates the NPM package word-wrap to version 1.2.5 to address CVE-2023-26115.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secsend version less then 1.1.0 have ### Response: Having vulnarability CVE-2023-26115 Advisory: Secsend 1.1.0 updates the NPM package word-wrap to version 1.2.5 to address CVE-2023-26115.
what vulnarability does secsend version less then 1.1.0 have
Having vulnarability CVE-2021-23336 Advisory: Securesystemslib 0.20.1 drops support for Python 2.7, as it arrived to EOL in January 2020.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does securesystemslib version less then 0.20.1 have ### Response: Having vulnarability CVE-2021-23336 Advisory: Securesystemslib 0.20.1 drops support for Python 2.7, as it arrived to EOL in January 2020.
what vulnarability does securesystemslib version less then 0.20.1 have
Having vulnarability CVE-2017-7266 Advisory: Netflix Security Monkey before 0.8.0 has an Open Redirect. The logout functionality accepted the "next" parameter which then redirects to any domain irrespective of the Host header.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does security-monkey version less then 0.8.0 have ### Response: Having vulnarability CVE-2017-7266 Advisory: Netflix Security Monkey before 0.8.0 has an Open Redirect. The logout functionality accepted the "next" parameter which then redirects to any domain irrespective of the Host header.
what vulnarability does security-monkey version less then 0.8.0 have
Having vulnarability PVE-2021-37441 Advisory: Seed-auth-api 0.9.3 includes upgrades of dependencies with security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-auth-api version less then 0.9.3 have ### Response: Having vulnarability PVE-2021-37441 Advisory: Seed-auth-api 0.9.3 includes upgrades of dependencies with security vulnerabilities.
what vulnarability does seed-auth-api version less then 0.9.3 have
Having vulnarability PVE-2021-37440 Advisory: Seed-control-interface-service 0.9.16 includes upgrades of dependencies with security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-control-interface version less then 0.9.16 have ### Response: Having vulnarability PVE-2021-37440 Advisory: Seed-control-interface-service 0.9.16 includes upgrades of dependencies with security vulnerabilities.
what vulnarability does seed-control-interface version less then 0.9.16 have
Having vulnarability PVE-2021-37442 Advisory: Seed-control-interface-service 0.9.6 includes upgrades of dependencies with security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-control-interface-service version less then 0.9.6 have ### Response: Having vulnarability PVE-2021-37442 Advisory: Seed-control-interface-service 0.9.6 includes upgrades of dependencies with security vulnerabilities.
what vulnarability does seed-control-interface-service version less then 0.9.6 have
Having vulnarability CVE-2023-37920 Advisory: Seed-farmer 2.10.3 updates its dependency 'certifi' to versions ~=2023.7.22 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-farmer version less then 2.10.3 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Seed-farmer 2.10.3 updates its dependency 'certifi' to versions ~=2023.7.22 to include a security fix.
what vulnarability does seed-farmer version less then 2.10.3 have
Having vulnarability PVE-2021-37437 Advisory: Seed-identity-store 0.10.2 includes upgrades of dependencies with security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-identity-store version less then 0.10.2 have ### Response: Having vulnarability PVE-2021-37437 Advisory: Seed-identity-store 0.10.2 includes upgrades of dependencies with security vulnerabilities.
what vulnarability does seed-identity-store version less then 0.10.2 have
Having vulnarability PVE-2021-37436 Advisory: Seed-message-sender 0.10.9 includes upgrades of dependencies with security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-message-sender version less then 0.10.9 have ### Response: Having vulnarability PVE-2021-37436 Advisory: Seed-message-sender 0.10.9 includes upgrades of dependencies with security vulnerabilities.
what vulnarability does seed-message-sender version less then 0.10.9 have
Having vulnarability PVE-2021-37439 Advisory: Seed-scheduler 0.10.2 includes upgrades of dependencies with security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-scheduler version less then 0.10.2 have ### Response: Having vulnarability PVE-2021-37439 Advisory: Seed-scheduler 0.10.2 includes upgrades of dependencies with security vulnerabilities.
what vulnarability does seed-scheduler version less then 0.10.2 have
Having vulnarability PVE-2021-36653 Advisory: seed-stage-based-messaging 0.11.0 upgrades requests to fix security vulnerability
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-stage-based-messaging version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-36653 Advisory: seed-stage-based-messaging 0.11.0 upgrades requests to fix security vulnerability
what vulnarability does seed-stage-based-messaging version less then 0.11.0 have
Having vulnarability CVE-2023-25399 Advisory: Segmentationmetrics 1.0.1 updates its dependency 'scipy' to v1.11.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does segmentationmetrics version less then 1.0.1 have ### Response: Having vulnarability CVE-2023-25399 Advisory: Segmentationmetrics 1.0.1 updates its dependency 'scipy' to v1.11.2 to include a security fix.
what vulnarability does segmentationmetrics version less then 1.0.1 have
Having vulnarability CVE-2020-5313 Advisory: Seldon-core 1.0.1 updates its dependency 'pillow' from 6.2.0 to 7.0.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seldon-core version less then 1.0.1 have ### Response: Having vulnarability CVE-2020-5313 Advisory: Seldon-core 1.0.1 updates its dependency 'pillow' from 6.2.0 to 7.0.0 to include security fixes.
what vulnarability does seldon-core version less then 1.0.1 have
Having vulnarability CVE-2017-18342 Advisory: Selenible version 0.0.4 includes a security patch for the function 'Base_var_from' in 'selenible/modules/ctrl.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/wtnb75/selenible/commit/4e53114278475d94dd0c98fd6dbf41806b2c1c98
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does selenible version less then 0.0.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Selenible version 0.0.4 includes a security patch for the function 'Base_var_from' in 'selenible/modules/ctrl.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/wtnb75/selenible/commit/4e53114278475d94dd0c98fd6dbf41806b2c1c98
what vulnarability does selenible version less then 0.0.4 have
Having vulnarability CVE-2023-5590 Advisory: Selenium 4.15.1 (Python bindings) include a fix for CVE-2023-5590: NULL Pointer Dereference. https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does selenium version greather then equal to 0, less then 4.15.1 have ### Response: Having vulnarability CVE-2023-5590 Advisory: Selenium 4.15.1 (Python bindings) include a fix for CVE-2023-5590: NULL Pointer Dereference. https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6
what vulnarability does selenium version greather then equal to 0, less then 4.15.1 have
Having vulnarability CVE-2023-5590 Advisory: Selenium 4.15.1 (Python bindings) include a fix for CVE-2023-5590: NULL Pointer Dereference. https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does selenium-duration-50ms version greather then equal to 0, less then 4.15.1 have ### Response: Having vulnarability CVE-2023-5590 Advisory: Selenium 4.15.1 (Python bindings) include a fix for CVE-2023-5590: NULL Pointer Dereference. https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6
what vulnarability does selenium-duration-50ms version greather then equal to 0, less then 4.15.1 have
Having vulnarability PVE-2021-38396 Advisory: Selenium-wire 1.2.1 uses SHA256 digest when creating site certificates to fix Chrome HSTS security errors.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does selenium-wire version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-38396 Advisory: Selenium-wire 1.2.1 uses SHA256 digest when creating site certificates to fix Chrome HSTS security errors.
what vulnarability does selenium-wire version less then 1.2.1 have
Having vulnarability CVE-2023-32758 Advisory: Semgrep 1.25.0 includes a fix for CVE-2023-32758: Giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does semgrep version greather then equal to 1.5.2,less then 1.25.0 have ### Response: Having vulnarability CVE-2023-32758 Advisory: Semgrep 1.25.0 includes a fix for CVE-2023-32758: Giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package.
what vulnarability does semgrep version greather then equal to 1.5.2,less then 1.25.0 have
Having vulnarability PVE-2023-62086 Advisory: In Seml versions before 0.3.5, a potential vulnerability exists related to the creation of temporary directories. The changelog for version 0.3.5 mentions the use of UUIDs to fix race conditions during temporary directory creation. https://github.com/TUM-DAML/seml/commit/d52bf495fd4d3ce1de4644b9a8d70de1615d21c6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seml version less then 0.3.5 have ### Response: Having vulnarability PVE-2023-62086 Advisory: In Seml versions before 0.3.5, a potential vulnerability exists related to the creation of temporary directories. The changelog for version 0.3.5 mentions the use of UUIDs to fix race conditions during temporary directory creation. https://github.com/TUM-DAML/seml/commit/d52bf495fd4d3ce1de4644b9a8d70de1615d21c6
what vulnarability does seml version less then 0.3.5 have