output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2014-1604 Advisory: The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rply version less then 0.7.1 have ### Response: Having vulnarability CVE-2014-1604 Advisory: The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name. | what vulnarability does rply version less then 0.7.1 have | |
Having vulnarability CVE-2019-16328 Advisory: Rpyc 4.1.2 includes a fix for CVE-2019-16328: a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rpyc version less then 4.1.2 have ### Response: Having vulnarability CVE-2019-16328 Advisory: Rpyc 4.1.2 includes a fix for CVE-2019-16328: a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings. | what vulnarability does rpyc version less then 4.1.2 have | |
Having vulnarability PVE-2024-65651 Advisory: Rq 0.7.1 resolves a race condition that prevented the proper setting of job statuses under high-load conditions, ensuring accurate status updates and job management.
https://github.com/rq/rq/pull/742 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rq version less then 0.7.1 have ### Response: Having vulnarability PVE-2024-65651 Advisory: Rq 0.7.1 resolves a race condition that prevented the proper setting of job statuses under high-load conditions, ensuring accurate status updates and job management.
https://github.com/rq/rq/pull/742 | what vulnarability does rq version less then 0.7.1 have | |
Having vulnarability PVE-2022-51756 Advisory: Rqeuests is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rqeuests version greather then 0 have ### Response: Having vulnarability PVE-2022-51756 Advisory: Rqeuests is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does rqeuests version greather then 0 have | |
Having vulnarability PVE-2023-52903 Advisory: Rrquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rrquests version greather then 0 have ### Response: Having vulnarability PVE-2023-52903 Advisory: Rrquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does rrquests version greather then 0 have | |
Having vulnarability PVE-2021-36903 Advisory: Rs-django-jet 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.
https://github.com/reckonsys/rs-django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rs-django-jet version less then 1.0.4 have ### Response: Having vulnarability PVE-2021-36903 Advisory: Rs-django-jet 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.
https://github.com/reckonsys/rs-django-jet/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9 | what vulnarability does rs-django-jet version less then 1.0.4 have | |
Having vulnarability PVE-2021-26109 Advisory: Rsa 2.0 includes a security fix: Make sure p and q are different and phi_n is not divisible by 256. Any of the previous conditions would make breaking encryption trivial.
https://github.com/sybrenstuvel/python-rsa/commit/f2fec9090cc4220e12b9b6f3102114bcc6aa9575 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rsa version less then 2.0 have ### Response: Having vulnarability PVE-2021-26109 Advisory: Rsa 2.0 includes a security fix: Make sure p and q are different and phi_n is not divisible by 256. Any of the previous conditions would make breaking encryption trivial.
https://github.com/sybrenstuvel/python-rsa/commit/f2fec9090cc4220e12b9b6f3102114bcc6aa9575 | what vulnarability does rsa version less then 2.0 have | |
Having vulnarability PVE-2021-33007 Advisory: rsanic before 0.2.2 is vulnerable to XSS attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rsanic version less then 0.2.2 have ### Response: Having vulnarability PVE-2021-33007 Advisory: rsanic before 0.2.2 is vulnerable to XSS attacks. | what vulnarability does rsanic version less then 0.2.2 have | |
Having vulnarability PVE-2021-38119 Advisory: In addition to disabling TLS checking entirely, users in rsconnect-jupyter 1.3.0 have the option of uploading their own self-signed certificate bundle as a more secure TLS alternative. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rsconnect-jupyter version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-38119 Advisory: In addition to disabling TLS checking entirely, users in rsconnect-jupyter 1.3.0 have the option of uploading their own self-signed certificate bundle as a more secure TLS alternative. | what vulnarability does rsconnect-jupyter version less then 1.3.0 have | |
Having vulnarability PVE-2021-37430 Advisory: Rss2email 3.10 fixes SMTP security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rss2email version less then 3.10 have ### Response: Having vulnarability PVE-2021-37430 Advisory: Rss2email 3.10 fixes SMTP security issues. | what vulnarability does rss2email version less then 3.10 have | |
Having vulnarability CVE-2020-14019 Advisory: Rtslib-fb 2.1.73 includes a fix for CVE-2020-14019. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rtslib-fb version less then 2.1.73 have ### Response: Having vulnarability CVE-2020-14019 Advisory: Rtslib-fb 2.1.73 includes a fix for CVE-2020-14019. | what vulnarability does rtslib-fb version less then 2.1.73 have | |
Having vulnarability PVE-2021-26113 Advisory: rtv before 1.12.1 has a security vulnerability where malicious URLs could inject python code. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rtv version less then 1.12.1 have ### Response: Having vulnarability PVE-2021-26113 Advisory: rtv before 1.12.1 has a security vulnerability where malicious URLs could inject python code. | what vulnarability does rtv version less then 1.12.1 have | |
Having vulnarability CVE-2019-20478 Advisory: In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ruamel-yaml version less then 0.16.7 have ### Response: Having vulnarability CVE-2019-20478 Advisory: In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases. | what vulnarability does ruamel-yaml version less then 0.16.7 have | |
Having vulnarability PVE-2021-41017 Advisory: Rubicon-ml 0.2.6 includes a fix to address a whitesource vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rubicon-ml version less then 0.2.6 have ### Response: Having vulnarability PVE-2021-41017 Advisory: Rubicon-ml 0.2.6 includes a fix to address a whitesource vulnerability. | what vulnarability does rubicon-ml version less then 0.2.6 have | |
Having vulnarability CVE-2019-18799 Advisory: Rubrix 0.13.0 replaces vulnerable 'node-sass' v3.5.5 with 'sass' package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rubrix version less then 0.13.0 have ### Response: Having vulnarability CVE-2019-18799 Advisory: Rubrix 0.13.0 replaces vulnerable 'node-sass' v3.5.5 with 'sass' package. | what vulnarability does rubrix version less then 0.13.0 have | |
Having vulnarability CVE-2018-1000805 Advisory: Rucio 1.19.0.post2 upgrades its Paramiko dependency from version 2.4.1 to 2.4.2, addressing the security vulnerability CVE-2018-1000805.
https://github.com/rucio/rucio/pull/1649/commits/0077bb6c80f5f8e49e47294375b41e6af051fc0b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rucio version less then 1.19.0.post2 have ### Response: Having vulnarability CVE-2018-1000805 Advisory: Rucio 1.19.0.post2 upgrades its Paramiko dependency from version 2.4.1 to 2.4.2, addressing the security vulnerability CVE-2018-1000805.
https://github.com/rucio/rucio/pull/1649/commits/0077bb6c80f5f8e49e47294375b41e6af051fc0b | what vulnarability does rucio version less then 1.19.0.post2 have | |
Having vulnarability PVE-2023-55207 Advisory: Rucio-webui 1.26.7 includes a security fix: Potentially leak of the contents of cookies to other sessions within a wsgi container. Impact is that Rucio authentication tokens are leaked to other users accessing the 'webui' within a close timeframe, thus allowing users to access the `webui` with the leaked authentication token. Privileges are therefore also escalated. Rucio server / daemons are not affected by this issue, it is isolated to the webui.
https://github.com/rucio/rucio/issues/4928 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rucio-webui version greather then equal to 1.26.0,less then 1.26.7 have ### Response: Having vulnarability PVE-2023-55207 Advisory: Rucio-webui 1.26.7 includes a security fix: Potentially leak of the contents of cookies to other sessions within a wsgi container. Impact is that Rucio authentication tokens are leaked to other users accessing the 'webui' within a close timeframe, thus allowing users to access the `webui` with the leaked authentication token. Privileges are therefore also escalated. Rucio server / daemons are not affected by this issue, it is isolated to the webui.
https://github.com/rucio/rucio/issues/4928 | what vulnarability does rucio-webui version greather then equal to 1.26.0,less then 1.26.7 have | |
Having vulnarability CVE-2015-2296 Advisory: ruffruffs 2.6.0 fixes handling of cookies on redirect. Previously a cookie without a host value set would use the hostname for the redirected URL exposing requests users to session fixation attacks and potentially cookie stealing. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ruffruffs version less then 2.6.0 have ### Response: Having vulnarability CVE-2015-2296 Advisory: ruffruffs 2.6.0 fixes handling of cookies on redirect. Previously a cookie without a host value set would use the hostname for the redirected URL exposing requests users to session fixation attacks and potentially cookie stealing. | what vulnarability does ruffruffs version less then 2.6.0 have | |
Having vulnarability PVE-2021-39085 Advisory: Runway 1.16.0 has enhanced security via nonce signing (Static Site AuthEdge). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does runway version less then 1.16.0 have ### Response: Having vulnarability PVE-2021-39085 Advisory: Runway 1.16.0 has enhanced security via nonce signing (Static Site AuthEdge). | what vulnarability does runway version less then 1.16.0 have | |
Having vulnarability PVE-2023-52904 Advisory: Rwquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rwquests version greather then 0 have ### Response: Having vulnarability PVE-2023-52904 Advisory: Rwquests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server.
https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html | what vulnarability does rwquests version greather then 0 have | |
Having vulnarability CVE-2023-37920 Advisory: Rwslib 1.2.10 updates its dependency 'certifi' to v2023.7.22 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does rwslib version less then 1.2.10 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Rwslib 1.2.10 updates its dependency 'certifi' to v2023.7.22 to include a security fix. | what vulnarability does rwslib version less then 1.2.10 have | |
Having vulnarability CVE-2020-35139 Advisory: An issue was discovered in OFPBundleCtrlMsg in parser.py in Faucet SDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ryu version less then equal to 4.34 have ### Response: Having vulnarability CVE-2020-35139 Advisory: An issue was discovered in OFPBundleCtrlMsg in parser.py in Faucet SDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop). | what vulnarability does ryu version less then equal to 4.34 have | |
Having vulnarability CVE-2021-32061 Advisory: S3scanner 2.0.2 includes a fix for CVE-2021-32061: S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element.
https://github.com/sa7mon/S3Scanner/issues/122 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s3scanner version less then 2.0.2 have ### Response: Having vulnarability CVE-2021-32061 Advisory: S3scanner 2.0.2 includes a fix for CVE-2021-32061: S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element.
https://github.com/sa7mon/S3Scanner/issues/122 | what vulnarability does s3scanner version less then 2.0.2 have | |
Having vulnarability PVE-2023-53262 Advisory: S3transfere is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s3transfere version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53262 Advisory: S3transfere is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information. | what vulnarability does s3transfere version greather then equal to 0 have | |
Having vulnarability PVE-2023-53263 Advisory: S3transferr is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s3transferr version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53263 Advisory: S3transferr is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information. | what vulnarability does s3transferr version greather then equal to 0 have | |
Having vulnarability PVE-2023-53264 Advisory: S3transferss is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s3transferss version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53264 Advisory: S3transferss is a malicious package, pytosquatting the popular package 's3transfer'. It contains a base64 encoded payload in '__init__.py' file that retrieves your current username, platform and IP information. | what vulnarability does s3transferss version greather then equal to 0 have | |
Having vulnarability PVE-2021-37119 Advisory: S4 0.4.2 upgrades boto3 to minimum requirement to fix a vulnerability in a urllib3 dependency. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does s4 version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-37119 Advisory: S4 0.4.2 upgrades boto3 to minimum requirement to fix a vulnerability in a urllib3 dependency. | what vulnarability does s4 version less then 0.4.2 have | |
Having vulnarability CVE-2018-10903 Advisory: Safety 1.8.4 updates its dependency 'cryptography' to v2.3 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does safety version less then 1.8.4 have ### Response: Having vulnarability CVE-2018-10903 Advisory: Safety 1.8.4 updates its dependency 'cryptography' to v2.3 to include security fixes. | what vulnarability does safety version less then 1.8.4 have | |
Having vulnarability CVE-2023-24622 Advisory: Safeurl-python 1.2 includes a fix for CVE-2023-24622: isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF.
https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does safeurl-python version less then 1.2 have ### Response: Having vulnarability CVE-2023-24622 Advisory: Safeurl-python 1.2 includes a fix for CVE-2023-24622: isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF.
https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7 | what vulnarability does safeurl-python version less then 1.2 have | |
Having vulnarability CVE-2022-40754 Advisory: Sagemaker 2.111.0 updates its dependency 'apache-airflow' to v2.4.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sagemaker version less then 2.111.0 have ### Response: Having vulnarability CVE-2022-40754 Advisory: Sagemaker 2.111.0 updates its dependency 'apache-airflow' to v2.4.0 to include a security fix. | what vulnarability does sagemaker version less then 2.111.0 have | |
Having vulnarability CVE-2019-18874 Advisory: Sagemaker-containers 2.8.2 updates its dependency 'psutil' to v5.6.7 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sagemaker-containers version less then 2.8.2 have ### Response: Having vulnarability CVE-2019-18874 Advisory: Sagemaker-containers 2.8.2 updates its dependency 'psutil' to v5.6.7 to include a security fix. | what vulnarability does sagemaker-containers version less then 2.8.2 have | |
Having vulnarability CVE-2019-19911 Advisory: Sagemaker-pytorch-inference 1.4.1 updates its dependency 'pillow' to v7.1.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sagemaker-pytorch-inference version less then 1.4.1 have ### Response: Having vulnarability CVE-2019-19911 Advisory: Sagemaker-pytorch-inference 1.4.1 updates its dependency 'pillow' to v7.1.0 to include security fixes. | what vulnarability does sagemaker-pytorch-inference version less then 1.4.1 have | |
Having vulnarability CVE-2020-15085 Advisory: In Saleor Storefront before version 2.10.3, request data used to authenticate customers was inadvertently cached in the browser's local storage mechanism, including credentials. A malicious user with direct access to the browser could extract the email and password. In versions prior to 2.10.0 persisted the cache even after the user logged out. This is fixed in version 2.10.3. A workaround is to manually clear application data (browser's local storage) after logging into Saleor Storefront. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does saleor version less then 2.10.3 have ### Response: Having vulnarability CVE-2020-15085 Advisory: In Saleor Storefront before version 2.10.3, request data used to authenticate customers was inadvertently cached in the browser's local storage mechanism, including credentials. A malicious user with direct access to the browser could extract the email and password. In versions prior to 2.10.0 persisted the cache even after the user logged out. This is fixed in version 2.10.3. A workaround is to manually clear application data (browser's local storage) after logging into Saleor Storefront. | what vulnarability does saleor version less then 2.10.3 have | |
Having vulnarability CVE-2013-2228 Advisory: SaltStack RSA Key Generation allows remote users to decrypt communications | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does salt version less then 0.15.0 have ### Response: Having vulnarability CVE-2013-2228 Advisory: SaltStack RSA Key Generation allows remote users to decrypt communications | what vulnarability does salt version less then 0.15.0 have | |
Having vulnarability CVE-2020-27783 Advisory: Salted 0.5.4 requires lxml version >= 4.6.2 as it fixes a vulnerability and works with Python 3.9. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does salted version less then 0.5.4 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Salted 0.5.4 requires lxml version >= 4.6.2 as it fixes a vulnerability and works with Python 3.9. | what vulnarability does salted version less then 0.5.4 have | |
Having vulnarability PVE-2024-63561 Advisory: Sanic 0.5.1 addresses a vulnerability that allowed for directory traversal through improperly handled static file URIs. This issue, identified in the sanic/sanic/static.py file, made it possible for attackers to access arbitrary files on the server via URL encoding.
https://github.com/sanic-org/sanic/pull/635/commits/ae09dec05e10816b37eed425c87e193d230c5a73
https://github.com/sanic-org/sanic/pull/635/commits/afd51e0823524eec683b226a20f40d958253064f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sanic version less then 0.5.1 have ### Response: Having vulnarability PVE-2024-63561 Advisory: Sanic 0.5.1 addresses a vulnerability that allowed for directory traversal through improperly handled static file URIs. This issue, identified in the sanic/sanic/static.py file, made it possible for attackers to access arbitrary files on the server via URL encoding.
https://github.com/sanic-org/sanic/pull/635/commits/ae09dec05e10816b37eed425c87e193d230c5a73
https://github.com/sanic-org/sanic/pull/635/commits/afd51e0823524eec683b226a20f40d958253064f | what vulnarability does sanic version less then 0.5.1 have | |
Having vulnarability PVE-2023-99923 Advisory: The official compatibility of Sanic includes Python versions 3.6, 3.7, 3.8, and 3.9, but not version 3.10. Mistakenly running it with Python 3.10 can potentially cause your server to crash upon receiving a web request. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sanic-ext version greather then equal to 0.1.7,less then 20.12.6 have ### Response: Having vulnarability PVE-2023-99923 Advisory: The official compatibility of Sanic includes Python versions 3.6, 3.7, 3.8, and 3.9, but not version 3.10. Mistakenly running it with Python 3.10 can potentially cause your server to crash upon receiving a web request. | what vulnarability does sanic-ext version greather then equal to 0.1.7,less then 20.12.6 have | |
Having vulnarability PVE-2021-38524 Advisory: Sanic-oauthlib 0.5.0 mentions "**Security bug** for access token via `#92`". No other information was provided. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sanic-oauthlib version less then 0.5.0 have ### Response: Having vulnarability PVE-2021-38524 Advisory: Sanic-oauthlib 0.5.0 mentions "**Security bug** for access token via `#92`". No other information was provided. | what vulnarability does sanic-oauthlib version less then 0.5.0 have | |
Having vulnarability CVE-2020-36242 Advisory: Sanic-security version 0.6.8.1 updates its dependency "cryptography" to v3.3.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sanic-security version less then 0.6.8.1 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Sanic-security version 0.6.8.1 updates its dependency "cryptography" to v3.3.2 to include a security fix. | what vulnarability does sanic-security version less then 0.6.8.1 have | |
Having vulnarability CVE-2023-50423 Advisory: Sap-xssec 4.1.0 includes a fix for CVE-2023-50423: Versions <4.1.0 allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
https://github.com/SAP/cloud-pysec/security/advisories/GHSA-6mjg-37cp-42x5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sap-xssec version less then 4.1.0 have ### Response: Having vulnarability CVE-2023-50423 Advisory: Sap-xssec 4.1.0 includes a fix for CVE-2023-50423: Versions <4.1.0 allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
https://github.com/SAP/cloud-pysec/security/advisories/GHSA-6mjg-37cp-42x5 | what vulnarability does sap-xssec version less then 4.1.0 have | |
Having vulnarability CVE-2021-32798 Advisory: Sapsan 0.4.0 includes updated requirements (notebook >= 6.4.3) that fixes security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sapsan version less then 0.4.0 have ### Response: Having vulnarability CVE-2021-32798 Advisory: Sapsan 0.4.0 includes updated requirements (notebook >= 6.4.3) that fixes security vulnerabilities. | what vulnarability does sapsan version less then 0.4.0 have | |
Having vulnarability PVE-2021-41098 Advisory: Saspy version 3.7.3 has upgraded log4j.jar (included in the Java IOM client) to version 2.12 because version 1.2 raised flags on some security scans. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does saspy version less then 3.7.3 have ### Response: Having vulnarability PVE-2021-41098 Advisory: Saspy version 3.7.3 has upgraded log4j.jar (included in the Java IOM client) to version 2.12 because version 1.2 raised flags on some security scans. | what vulnarability does saspy version less then 3.7.3 have | |
Having vulnarability CVE-2018-6594 Advisory: Satosa 0.6.1 switches dependencies from 'pycrypto' to 'pycryptodome' for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does satosa version less then 0.6.1 have ### Response: Having vulnarability CVE-2018-6594 Advisory: Satosa 0.6.1 switches dependencies from 'pycrypto' to 'pycryptodome' for security reasons. | what vulnarability does satosa version less then 0.6.1 have | |
Having vulnarability CVE-2017-16042 Advisory: Sbp 2.4.2 updates its NPM dependency 'mocha' to fix a transitive vulnerability in 'growl' package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sbp version less then 2.4.2 have ### Response: Having vulnarability CVE-2017-16042 Advisory: Sbp 2.4.2 updates its NPM dependency 'mocha' to fix a transitive vulnerability in 'growl' package. | what vulnarability does sbp version less then 2.4.2 have | |
Having vulnarability CVE-2020-24715 Advisory: Scalyr-agent-2 version 2.1.10 includes a fix for CVE-2020-24715: The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation because, in some circumstances, native Python code is used that lacks a comparison of the hostname to commonName and subjectAltName. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scalyr-agent-2 version less then 2.1.10 have ### Response: Having vulnarability CVE-2020-24715 Advisory: Scalyr-agent-2 version 2.1.10 includes a fix for CVE-2020-24715: The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation because, in some circumstances, native Python code is used that lacks a comparison of the hostname to commonName and subjectAltName. | what vulnarability does scalyr-agent-2 version less then 2.1.10 have | |
Having vulnarability CVE-2020-27783 Advisory: Scancode-toolkit 21.2.9 updates its dependency 'lxml' to v4.6.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scancode-toolkit version less then 21.2.9 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Scancode-toolkit 21.2.9 updates its dependency 'lxml' to v4.6.2 to include a security fix. | what vulnarability does scancode-toolkit version less then 21.2.9 have | |
Having vulnarability CVE-2023-39523 Advisory: Scancodeio 32.5.1 includes a fix for a Command Injection vulnerability in the fetch process of the Docker image.
https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scancodeio version less then 32.5.1 have ### Response: Having vulnarability CVE-2023-39523 Advisory: Scancodeio 32.5.1 includes a fix for a Command Injection vulnerability in the fetch process of the Docker image.
https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f | what vulnarability does scancodeio version less then 32.5.1 have | |
Having vulnarability PVE-2024-66052 Advisory: Scandeval 12.3.0 enhances its outlines dependency to versions >=0.0.36,<0.1 to resolve a race condition encountered in NER dataset evaluations and integrates with the transformers library, replacing the previously hardcoded setup. This update streamlines integration and improves evaluation processes.
https://github.com/ScandEval/ScandEval/commit/a1decdc084a924560823c62148fe7600f1b35f5a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scandeval version less then 12.3.0 have ### Response: Having vulnarability PVE-2024-66052 Advisory: Scandeval 12.3.0 enhances its outlines dependency to versions >=0.0.36,<0.1 to resolve a race condition encountered in NER dataset evaluations and integrates with the transformers library, replacing the previously hardcoded setup. This update streamlines integration and improves evaluation processes.
https://github.com/ScandEval/ScandEval/commit/a1decdc084a924560823c62148fe7600f1b35f5a | what vulnarability does scandeval version less then 12.3.0 have | |
Having vulnarability CVE-2019-1010142 Advisory: Scapy 2.4.1 includes a fix for CVE-2019-1010142: Denial of Service. The impact is infinite loop, resource consumption and program unresponsive. The component affected component is '_RADIUSAttrPacketListField.getfield(self..)'. The attack vector is over the network or a malicious pcap.
https://github.com/secdev/scapy/pull/1409/commits/0d7ae2b039f650a40e511d09eb961c782da025d9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scapy version less then 2.4.1 have ### Response: Having vulnarability CVE-2019-1010142 Advisory: Scapy 2.4.1 includes a fix for CVE-2019-1010142: Denial of Service. The impact is infinite loop, resource consumption and program unresponsive. The component affected component is '_RADIUSAttrPacketListField.getfield(self..)'. The attack vector is over the network or a malicious pcap.
https://github.com/secdev/scapy/pull/1409/commits/0d7ae2b039f650a40e511d09eb961c782da025d9 | what vulnarability does scapy version less then 2.4.1 have | |
Having vulnarability PVE-2023-60055 Advisory: Scarletio 1.0.33 includes a fix for a Race Condition vulnerability.
https://github.com/HuyaneMatsu/scarletio/commit/9a1498a96cd5def8ad668ac76f1049df1329fd38 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scarletio version less then 1.0.33 have ### Response: Having vulnarability PVE-2023-60055 Advisory: Scarletio 1.0.33 includes a fix for a Race Condition vulnerability.
https://github.com/HuyaneMatsu/scarletio/commit/9a1498a96cd5def8ad668ac76f1049df1329fd38 | what vulnarability does scarletio version less then 1.0.33 have | |
Having vulnarability CVE-2021-44906 Advisory: Scenepic 1.0.8 updates its NPM dependency 'minimist' to v1.2.6 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scenepic version less then 1.0.8 have ### Response: Having vulnarability CVE-2021-44906 Advisory: Scenepic 1.0.8 updates its NPM dependency 'minimist' to v1.2.6 to include a security fix. | what vulnarability does scenepic version less then 1.0.8 have | |
Having vulnarability PVE-2021-37821 Advisory: Sceptre 2.3.0 fixes a XSS vulnerability.
https://github.com/Sceptre/sceptre/commit/6d4124bdc9d4d5277c3f5cdc5eb7d6db9696b667 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sceptre version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-37821 Advisory: Sceptre 2.3.0 fixes a XSS vulnerability.
https://github.com/Sceptre/sceptre/commit/6d4124bdc9d4d5277c3f5cdc5eb7d6db9696b667 | what vulnarability does sceptre version less then 2.3.0 have | |
Having vulnarability CVE-2022-34749 Advisory: Schema-salad 8.3.20221209165047 stops using its NPM dependency 'mistune' 0.8.x for HTML generation to avoid a vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does schema-salad version less then 8.3.20221209165047 have ### Response: Having vulnarability CVE-2022-34749 Advisory: Schema-salad 8.3.20221209165047 stops using its NPM dependency 'mistune' 0.8.x for HTML generation to avoid a vulnerability. | what vulnarability does schema-salad version less then 8.3.20221209165047 have | |
Having vulnarability PVE-2021-42518 Advisory: Schemachange 3.3.2 configures Jinja to escape inputs to templates (using autoescape=True). This helps protect rendered templates against XSS and other vulnerabilities.
https://github.com/Snowflake-Labs/schemachange/commit/f006a4c550365f872fad396e87b797114eb1dc5d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does schemachange version less then 3.3.2 have ### Response: Having vulnarability PVE-2021-42518 Advisory: Schemachange 3.3.2 configures Jinja to escape inputs to templates (using autoescape=True). This helps protect rendered templates against XSS and other vulnerabilities.
https://github.com/Snowflake-Labs/schemachange/commit/f006a4c550365f872fad396e87b797114eb1dc5d | what vulnarability does schemachange version less then 3.3.2 have | |
Having vulnarability CVE-2023-25577 Advisory: Schemathesis 3.18.4 updates its dependency 'werkzeug' to version '2.3.7' to include a fix for a Denial of Service vulnerability.
https://github.com/schemathesis/schemathesis/pull/1696 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does schemathesis version less then 3.18.4 have ### Response: Having vulnarability CVE-2023-25577 Advisory: Schemathesis 3.18.4 updates its dependency 'werkzeug' to version '2.3.7' to include a fix for a Denial of Service vulnerability.
https://github.com/schemathesis/schemathesis/pull/1696 | what vulnarability does schemathesis version less then 3.18.4 have | |
Having vulnarability PVE-2022-52255 Advisory: Scikit-learn 0.24.2 includes a fix for a ReDoS vulnerability.
https://github.com/scikit-learn/scikit-learn/issues/19522 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scikit-learn version less then 0.24.2 have ### Response: Having vulnarability PVE-2022-52255 Advisory: Scikit-learn 0.24.2 includes a fix for a ReDoS vulnerability.
https://github.com/scikit-learn/scikit-learn/issues/19522 | what vulnarability does scikit-learn version less then 0.24.2 have | |
Having vulnarability CVE-2023-24816 Advisory: Scikit-network 0.29.0 updates its dependency 'ipython' to v8.10.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scikit-network version less then 0.29.0 have ### Response: Having vulnarability CVE-2023-24816 Advisory: Scikit-network 0.29.0 updates its dependency 'ipython' to v8.10.0 to include a security fix. | what vulnarability does scikit-network version less then 0.29.0 have | |
Having vulnarability CVE-2023-29824 Advisory: Scikit-rmt 0.7.0 updates its dependency 'scipy' to version '1.11.1' to include a security fix.
https://github.com/AlejandroSantorum/scikit-rmt/commit/ced51769bf275174be271af820c196df7a6144fc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scikit-rmt version less then 0.7.0 have ### Response: Having vulnarability CVE-2023-29824 Advisory: Scikit-rmt 0.7.0 updates its dependency 'scipy' to version '1.11.1' to include a security fix.
https://github.com/AlejandroSantorum/scikit-rmt/commit/ced51769bf275174be271af820c196df7a6144fc | what vulnarability does scikit-rmt version less then 0.7.0 have | |
Having vulnarability CVE-2022-29238 Advisory: Scipp 0.15.0 updates its dependency 'notebook' to v6.4.12 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scipp version less then 0.15.0 have ### Response: Having vulnarability CVE-2022-29238 Advisory: Scipp 0.15.0 updates its dependency 'notebook' to v6.4.12 to include a security fix. | what vulnarability does scipp version less then 0.15.0 have | |
Having vulnarability CVE-2023-25399 Advisory: Scipy 1.10.0rc1 includes a fix for a Denial of Service vulnerability.
https://github.com/scipy/scipy/issues/16235 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scipy version less then 1.10.0rc1 have ### Response: Having vulnarability CVE-2023-25399 Advisory: Scipy 1.10.0rc1 includes a fix for a Denial of Service vulnerability.
https://github.com/scipy/scipy/issues/16235 | what vulnarability does scipy version less then 1.10.0rc1 have | |
Having vulnarability CVE-2017-16876 Advisory: Scml 0.5.1 pins a transitive dependency (mistune>=2.0.1) to include a fix for an XSS vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scml version less then 0.5.1 have ### Response: Having vulnarability CVE-2017-16876 Advisory: Scml 0.5.1 pins a transitive dependency (mistune>=2.0.1) to include a fix for an XSS vulnerability. | what vulnarability does scml version less then 0.5.1 have | |
Having vulnarability PVE-2021-38489 Advisory: Scons 4.0.0 converts the remaining uses of an insecure/deprecated mktemp method. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scons version less then 4.0.0 have ### Response: Having vulnarability PVE-2021-38489 Advisory: Scons 4.0.0 converts the remaining uses of an insecure/deprecated mktemp method. | what vulnarability does scons version less then 4.0.0 have | |
Having vulnarability CVE-2022-34057 Advisory: The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scoptrial version equal to 0.0.5 have ### Response: Having vulnarability CVE-2022-34057 Advisory: The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does scoptrial version equal to 0.0.5 have | |
Having vulnarability CVE-2022-1554 Advisory: Scout is a Variant Call Format (VCF) visualization interface. The Pypi package `scout-browser` is vulnerable to path traversal due to `send_file` call in versions prior to 4.52. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scout-browser version greather then equal to 0,less then 4.52 have ### Response: Having vulnarability CVE-2022-1554 Advisory: Scout is a Variant Call Format (VCF) visualization interface. The Pypi package `scout-browser` is vulnerable to path traversal due to `send_file` call in versions prior to 4.52. | what vulnarability does scout-browser version greather then equal to 0,less then 4.52 have | |
Having vulnarability PVE-2022-48004 Advisory: Scoutsuite 5.11.0 fixes a DOM XSS.
https://github.com/nccgroup/ScoutSuite/commit/1b72ab61ec3062b833f8c046e6f57fd64fe24274 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scoutsuite version less then 5.11.0 have ### Response: Having vulnarability PVE-2022-48004 Advisory: Scoutsuite 5.11.0 fixes a DOM XSS.
https://github.com/nccgroup/ScoutSuite/commit/1b72ab61ec3062b833f8c046e6f57fd64fe24274 | what vulnarability does scoutsuite version less then 5.11.0 have | |
Having vulnarability PVE-2021-39195 Advisory: Scrape 0.10.2 updates the 'lxml' dependency from 4.3.0 to 4.6.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrape version less then 0.10.2 have ### Response: Having vulnarability PVE-2021-39195 Advisory: Scrape 0.10.2 updates the 'lxml' dependency from 4.3.0 to 4.6.2 to include security fixes. | what vulnarability does scrape version less then 0.10.2 have | |
Having vulnarability CVE-2023-32681 Advisory: Scrappo 1.1.1 updates its dependency 'requests' minimum requirement to 2.31.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrappo version less then 1.1.1 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Scrappo 1.1.1 updates its dependency 'requests' minimum requirement to 2.31.0 to include a security fix. | what vulnarability does scrappo version less then 1.1.1 have | |
Having vulnarability CVE-2021-41125 Advisory: Scrapy versions 1.8.1 and 2.5.1 include a fix for CVE-2021-41125: If you use "HttpAuthMiddleware" (i.e. the "http_user" and "http_pass" spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as "robots.txt" requests sent by Scrapy when the "ROBOTSTXT_OBEY" setting is set to "True", or as requests reached through redirects. It's advised upgrading and using the new "http_auth_domain" spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you cannot upgrade to a secure version, set your HTTP authentication credentials on a per-request basis, using for example the "w3lib.http.basic_auth_header" function to convert your credentials into a value that you can assign to the "Authorization" header of your request, instead of defining them globally using "HttpAuthMiddleware".
https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498
http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth
https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6
https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrapy version less then 1.8.1,greather then equal to 2.0.0,less then 2.5.1 have ### Response: Having vulnarability CVE-2021-41125 Advisory: Scrapy versions 1.8.1 and 2.5.1 include a fix for CVE-2021-41125: If you use "HttpAuthMiddleware" (i.e. the "http_user" and "http_pass" spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as "robots.txt" requests sent by Scrapy when the "ROBOTSTXT_OBEY" setting is set to "True", or as requests reached through redirects. It's advised upgrading and using the new "http_auth_domain" spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you cannot upgrade to a secure version, set your HTTP authentication credentials on a per-request basis, using for example the "w3lib.http.basic_auth_header" function to convert your credentials into a value that you can assign to the "Authorization" header of your request, instead of defining them globally using "HttpAuthMiddleware".
https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498
http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth
https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6
https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header | what vulnarability does scrapy version less then 1.8.1,greather then equal to 2.0.0,less then 2.5.1 have | |
Having vulnarability CVE-2021-41124 Advisory: Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrapy-splash version greather then equal to 0,less then 0.8.0 have ### Response: Having vulnarability CVE-2021-41124 Advisory: Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots). | what vulnarability does scrapy-splash version greather then equal to 0,less then 0.8.0 have | |
Having vulnarability PVE-2021-37457 Advisory: Scrapydd 0.6.3 enhances the security by adding protection against cross-site request forgery. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scrapydd version less then 0.6.3 have ### Response: Having vulnarability PVE-2021-37457 Advisory: Scrapydd 0.6.3 enhances the security by adding protection against cross-site request forgery. | what vulnarability does scrapydd version less then 0.6.3 have | |
Having vulnarability CVE-2022-34983 Advisory: The scu-captcha package in PyPI v0.0.1 to v0.0.4 included a code execution backdoor inserted by a third party. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scu-captcha version greather then equal to 0.0.1,less then equal to 0.0.4 have ### Response: Having vulnarability CVE-2022-34983 Advisory: The scu-captcha package in PyPI v0.0.1 to v0.0.4 included a code execution backdoor inserted by a third party. | what vulnarability does scu-captcha version greather then equal to 0.0.1,less then equal to 0.0.4 have | |
Having vulnarability CVE-2020-5215 Advisory: Scvae 2.1.1 updates TensorFlow to v1.15.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does scvae version less then 2.1.1 have ### Response: Having vulnarability CVE-2020-5215 Advisory: Scvae 2.1.1 updates TensorFlow to v1.15.2 to include security fixes. | what vulnarability does scvae version less then 2.1.1 have | |
Having vulnarability CVE-2020-25659 Advisory: Sdc-cryptography 1.0.0 updates its dependency 'cryptography' to v3.4.5 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sdc-cryptography version less then 1.0.0 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Sdc-cryptography 1.0.0 updates its dependency 'cryptography' to v3.4.5 to include security fixes. | what vulnarability does sdc-cryptography version less then 1.0.0 have | |
Having vulnarability PVE-2021-37050 Advisory: Sdcclient 0.7.0 adds support for secure commands audit. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sdcclient version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-37050 Advisory: Sdcclient 0.7.0 adds support for secure commands audit. | what vulnarability does sdcclient version less then 0.7.0 have | |
Having vulnarability PVE-2022-47813 Advisory: Sdk-cli-v2 is a malicious package, typosquatting. It aims at targeting Azure environments.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sdk-cli-v2 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47813 Advisory: Sdk-cli-v2 is a malicious package, typosquatting. It aims at targeting Azure environments.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | what vulnarability does sdk-cli-v2 version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-47812 Advisory: Sdk-cli-v2-public is a malicious package, typosquatting. It aims at targeting Azure environments.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sdk-cli-v2-public version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47812 Advisory: Sdk-cli-v2-public is a malicious package, typosquatting. It aims at targeting Azure environments.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | what vulnarability does sdk-cli-v2-public version greather then 0,less then 0 have | |
Having vulnarability CVE-2023-43364 Advisory: main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does searchor version less then 2.4.2 have ### Response: Having vulnarability CVE-2023-43364 Advisory: main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution. | what vulnarability does searchor version less then 2.4.2 have | |
Having vulnarability PVE-2022-47803 Advisory: Secbg is a malicious package. It contains a backdoor.
https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secbg version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47803 Advisory: Secbg is a malicious package. It contains a backdoor.
https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages | what vulnarability does secbg version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-49725 Advisory: Secretflow 0.6.7 uses a "more secure" random. No further information was found in the Github repository. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secretflow version less then 0.6.7 have ### Response: Having vulnarability PVE-2022-49725 Advisory: Secretflow 0.6.7 uses a "more secure" random. No further information was found in the Github repository. | what vulnarability does secretflow version less then 0.6.7 have | |
Having vulnarability CVE-2017-18342 Advisory: Secrets2env 0.1.4 includes a security patch for the function 'init' in 'secrets2env.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/eguven/secrets2env/commit/d6c98573d8d2e2296720b6e2298d5db47a17b2d7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secrets2env version less then 0.1.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Secrets2env 0.1.4 includes a security patch for the function 'init' in 'secrets2env.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/eguven/secrets2env/commit/d6c98573d8d2e2296720b6e2298d5db47a17b2d7 | what vulnarability does secrets2env version less then 0.1.4 have | |
Having vulnarability PVE-2022-47804 Advisory: Secrevtwo is a malicious package. It contains a backdoor.
https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secrevtwo version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47804 Advisory: Secrevtwo is a malicious package. It contains a backdoor.
https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages | what vulnarability does secrevtwo version greather then 0,less then 0 have | |
Having vulnarability CVE-2023-26115 Advisory: Secsend 1.1.0 updates the NPM package word-wrap to version 1.2.5 to address CVE-2023-26115. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does secsend version less then 1.1.0 have ### Response: Having vulnarability CVE-2023-26115 Advisory: Secsend 1.1.0 updates the NPM package word-wrap to version 1.2.5 to address CVE-2023-26115. | what vulnarability does secsend version less then 1.1.0 have | |
Having vulnarability CVE-2021-23336 Advisory: Securesystemslib 0.20.1 drops support for Python 2.7, as it arrived to EOL in January 2020. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does securesystemslib version less then 0.20.1 have ### Response: Having vulnarability CVE-2021-23336 Advisory: Securesystemslib 0.20.1 drops support for Python 2.7, as it arrived to EOL in January 2020. | what vulnarability does securesystemslib version less then 0.20.1 have | |
Having vulnarability CVE-2017-7266 Advisory: Netflix Security Monkey before 0.8.0 has an Open Redirect. The logout functionality accepted the "next" parameter which then redirects to any domain irrespective of the Host header. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does security-monkey version less then 0.8.0 have ### Response: Having vulnarability CVE-2017-7266 Advisory: Netflix Security Monkey before 0.8.0 has an Open Redirect. The logout functionality accepted the "next" parameter which then redirects to any domain irrespective of the Host header. | what vulnarability does security-monkey version less then 0.8.0 have | |
Having vulnarability PVE-2021-37441 Advisory: Seed-auth-api 0.9.3 includes upgrades of dependencies with security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-auth-api version less then 0.9.3 have ### Response: Having vulnarability PVE-2021-37441 Advisory: Seed-auth-api 0.9.3 includes upgrades of dependencies with security vulnerabilities. | what vulnarability does seed-auth-api version less then 0.9.3 have | |
Having vulnarability PVE-2021-37440 Advisory: Seed-control-interface-service 0.9.16 includes upgrades of dependencies with security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-control-interface version less then 0.9.16 have ### Response: Having vulnarability PVE-2021-37440 Advisory: Seed-control-interface-service 0.9.16 includes upgrades of dependencies with security vulnerabilities. | what vulnarability does seed-control-interface version less then 0.9.16 have | |
Having vulnarability PVE-2021-37442 Advisory: Seed-control-interface-service 0.9.6 includes upgrades of dependencies with security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-control-interface-service version less then 0.9.6 have ### Response: Having vulnarability PVE-2021-37442 Advisory: Seed-control-interface-service 0.9.6 includes upgrades of dependencies with security vulnerabilities. | what vulnarability does seed-control-interface-service version less then 0.9.6 have | |
Having vulnarability CVE-2023-37920 Advisory: Seed-farmer 2.10.3 updates its dependency 'certifi' to versions ~=2023.7.22 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-farmer version less then 2.10.3 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Seed-farmer 2.10.3 updates its dependency 'certifi' to versions ~=2023.7.22 to include a security fix. | what vulnarability does seed-farmer version less then 2.10.3 have | |
Having vulnarability PVE-2021-37437 Advisory: Seed-identity-store 0.10.2 includes upgrades of dependencies with security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-identity-store version less then 0.10.2 have ### Response: Having vulnarability PVE-2021-37437 Advisory: Seed-identity-store 0.10.2 includes upgrades of dependencies with security vulnerabilities. | what vulnarability does seed-identity-store version less then 0.10.2 have | |
Having vulnarability PVE-2021-37436 Advisory: Seed-message-sender 0.10.9 includes upgrades of dependencies with security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-message-sender version less then 0.10.9 have ### Response: Having vulnarability PVE-2021-37436 Advisory: Seed-message-sender 0.10.9 includes upgrades of dependencies with security vulnerabilities. | what vulnarability does seed-message-sender version less then 0.10.9 have | |
Having vulnarability PVE-2021-37439 Advisory: Seed-scheduler 0.10.2 includes upgrades of dependencies with security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-scheduler version less then 0.10.2 have ### Response: Having vulnarability PVE-2021-37439 Advisory: Seed-scheduler 0.10.2 includes upgrades of dependencies with security vulnerabilities. | what vulnarability does seed-scheduler version less then 0.10.2 have | |
Having vulnarability PVE-2021-36653 Advisory: seed-stage-based-messaging 0.11.0 upgrades requests to fix security vulnerability | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seed-stage-based-messaging version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-36653 Advisory: seed-stage-based-messaging 0.11.0 upgrades requests to fix security vulnerability | what vulnarability does seed-stage-based-messaging version less then 0.11.0 have | |
Having vulnarability CVE-2023-25399 Advisory: Segmentationmetrics 1.0.1 updates its dependency 'scipy' to v1.11.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does segmentationmetrics version less then 1.0.1 have ### Response: Having vulnarability CVE-2023-25399 Advisory: Segmentationmetrics 1.0.1 updates its dependency 'scipy' to v1.11.2 to include a security fix. | what vulnarability does segmentationmetrics version less then 1.0.1 have | |
Having vulnarability CVE-2020-5313 Advisory: Seldon-core 1.0.1 updates its dependency 'pillow' from 6.2.0 to 7.0.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seldon-core version less then 1.0.1 have ### Response: Having vulnarability CVE-2020-5313 Advisory: Seldon-core 1.0.1 updates its dependency 'pillow' from 6.2.0 to 7.0.0 to include security fixes. | what vulnarability does seldon-core version less then 1.0.1 have | |
Having vulnarability CVE-2017-18342 Advisory: Selenible version 0.0.4 includes a security patch for the function 'Base_var_from' in 'selenible/modules/ctrl.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/wtnb75/selenible/commit/4e53114278475d94dd0c98fd6dbf41806b2c1c98 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does selenible version less then 0.0.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Selenible version 0.0.4 includes a security patch for the function 'Base_var_from' in 'selenible/modules/ctrl.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/wtnb75/selenible/commit/4e53114278475d94dd0c98fd6dbf41806b2c1c98 | what vulnarability does selenible version less then 0.0.4 have | |
Having vulnarability CVE-2023-5590 Advisory: Selenium 4.15.1 (Python bindings) include a fix for CVE-2023-5590: NULL Pointer Dereference.
https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does selenium version greather then equal to 0, less then 4.15.1 have ### Response: Having vulnarability CVE-2023-5590 Advisory: Selenium 4.15.1 (Python bindings) include a fix for CVE-2023-5590: NULL Pointer Dereference.
https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6 | what vulnarability does selenium version greather then equal to 0, less then 4.15.1 have | |
Having vulnarability CVE-2023-5590 Advisory: Selenium 4.15.1 (Python bindings) include a fix for CVE-2023-5590: NULL Pointer Dereference.
https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does selenium-duration-50ms version greather then equal to 0, less then 4.15.1 have ### Response: Having vulnarability CVE-2023-5590 Advisory: Selenium 4.15.1 (Python bindings) include a fix for CVE-2023-5590: NULL Pointer Dereference.
https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6 | what vulnarability does selenium-duration-50ms version greather then equal to 0, less then 4.15.1 have | |
Having vulnarability PVE-2021-38396 Advisory: Selenium-wire 1.2.1 uses SHA256 digest when creating site certificates to fix Chrome HSTS security errors. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does selenium-wire version less then 1.2.1 have ### Response: Having vulnarability PVE-2021-38396 Advisory: Selenium-wire 1.2.1 uses SHA256 digest when creating site certificates to fix Chrome HSTS security errors. | what vulnarability does selenium-wire version less then 1.2.1 have | |
Having vulnarability CVE-2023-32758 Advisory: Semgrep 1.25.0 includes a fix for CVE-2023-32758: Giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does semgrep version greather then equal to 1.5.2,less then 1.25.0 have ### Response: Having vulnarability CVE-2023-32758 Advisory: Semgrep 1.25.0 includes a fix for CVE-2023-32758: Giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package. | what vulnarability does semgrep version greather then equal to 1.5.2,less then 1.25.0 have | |
Having vulnarability PVE-2023-62086 Advisory: In Seml versions before 0.3.5, a potential vulnerability exists related to the creation of temporary directories. The changelog for version 0.3.5 mentions the use of UUIDs to fix race conditions during temporary directory creation.
https://github.com/TUM-DAML/seml/commit/d52bf495fd4d3ce1de4644b9a8d70de1615d21c6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does seml version less then 0.3.5 have ### Response: Having vulnarability PVE-2023-62086 Advisory: In Seml versions before 0.3.5, a potential vulnerability exists related to the creation of temporary directories. The changelog for version 0.3.5 mentions the use of UUIDs to fix race conditions during temporary directory creation.
https://github.com/TUM-DAML/seml/commit/d52bf495fd4d3ce1de4644b9a8d70de1615d21c6 | what vulnarability does seml version less then 0.3.5 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.