output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2020-28493 Advisory: Semversioner 0.13.0 updates its dependency 'jinja2' to v2.11.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does semversioner version less then 0.13.0 have ### Response: Having vulnarability CVE-2020-28493 Advisory: Semversioner 0.13.0 updates its dependency 'jinja2' to v2.11.3 to include a security fix. | what vulnarability does semversioner version less then 0.13.0 have | |
Having vulnarability PVE-2021-41916 Advisory: Senaite-core version 1.3.0 prevents users without privileges to create reports.
https://github.com/senaite/senaite.core/issues/896 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does senaite-core version less then 1.3.0 have ### Response: Having vulnarability PVE-2021-41916 Advisory: Senaite-core version 1.3.0 prevents users without privileges to create reports.
https://github.com/senaite/senaite.core/issues/896 | what vulnarability does senaite-core version less then 1.3.0 have | |
Having vulnarability PVE-2021-41940 Advisory: Senaite-queue version 1.0.3 improves the reindex security objects process. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does senaite-queue version less then 1.0.3 have ### Response: Having vulnarability PVE-2021-41940 Advisory: Senaite-queue version 1.0.3 improves the reindex security objects process. | what vulnarability does senaite-queue version less then 1.0.3 have | |
Having vulnarability CVE-2021-43572 Advisory: Sendgrid 6.9.1 updates its dependency minimum 'starbank-ecdsa' to v2.0.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sendgrid version greather then equal to 6.4.1,less then 6.9.1 have ### Response: Having vulnarability CVE-2021-43572 Advisory: Sendgrid 6.9.1 updates its dependency minimum 'starbank-ecdsa' to v2.0.1 to include a security fix. | what vulnarability does sendgrid version greather then equal to 6.4.1,less then 6.9.1 have | |
Having vulnarability PVE-2023-52927 Advisory: Sentinelone is a malicious package. It steals developer-related data.
https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sentinelone version greather then 0 have ### Response: Having vulnarability PVE-2023-52927 Advisory: Sentinelone is a malicious package. It steals developer-related data.
https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers | what vulnarability does sentinelone version greather then 0 have | |
Having vulnarability PVE-2023-52927 Advisory: Sentinelone is a malicious package. It steals developer-related data.
https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sentinelone-sdk version greather then 0 have ### Response: Having vulnarability PVE-2023-52927 Advisory: Sentinelone is a malicious package. It steals developer-related data.
https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers | what vulnarability does sentinelone-sdk version greather then 0 have | |
Having vulnarability PVE-2023-52927 Advisory: Sentinelone is a malicious package. It steals developer-related data.
https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sentinelonesdk version greather then 0 have ### Response: Having vulnarability PVE-2023-52927 Advisory: Sentinelone is a malicious package. It steals developer-related data.
https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers | what vulnarability does sentinelonesdk version greather then 0 have | |
Having vulnarability CVE-2018-14732 Advisory: Sentry 10.0.0 includes a security update for its dependency "webpack-dev-server". | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sentry version less then 10.0.0 have ### Response: Having vulnarability CVE-2018-14732 Advisory: Sentry 10.0.0 includes a security update for its dependency "webpack-dev-server". | what vulnarability does sentry version less then 10.0.0 have | |
Having vulnarability PVE-2023-53525 Advisory: Sentry-cli 1.47.0 trims whitespaces in header values to prevent potential header injections through the auth token header. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sentry-cli version less then 1.47.0 have ### Response: Having vulnarability PVE-2023-53525 Advisory: Sentry-cli 1.47.0 trims whitespaces in header values to prevent potential header injections through the auth token header. | what vulnarability does sentry-cli version less then 1.47.0 have | |
Having vulnarability CVE-2023-28117 Advisory: Sentry-sdk 1.14.0 includes a fix for CVE-2023-28117: When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have 'sendDefaultPII' set to 'True'; one must use a custom name for either 'SESSION_COOKIE_NAME' or 'CSRF_COOKIE_NAME' in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the 'sentry-sdk' will detect the custom cookie names based on one's Django settings and will remove the values from the payload before sending the data to Sentry. As a workaround, use the SDK's filtering mechanism to remove the cookies from the payload that is sent to Sentry. For error events, this can be done with the 'before_send' callback method and for performance related events (transactions) one can use the 'before_send_transaction' callback method. Those who want to handle filtering of these values on the server-side can also use Sentry's advanced data scrubbing feature to account for the custom cookie names. Look for the '$http.cookies', '$http.headers', '$request.cookies', or '$request.headers' fields to target with a scrubbing rule.
https://github.com/getsentry/sentry-python/security/advisories/GHSA-29pr-6jr8-q5jm | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sentry-sdk version less then 1.14.0 have ### Response: Having vulnarability CVE-2023-28117 Advisory: Sentry-sdk 1.14.0 includes a fix for CVE-2023-28117: When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have 'sendDefaultPII' set to 'True'; one must use a custom name for either 'SESSION_COOKIE_NAME' or 'CSRF_COOKIE_NAME' in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the 'sentry-sdk' will detect the custom cookie names based on one's Django settings and will remove the values from the payload before sending the data to Sentry. As a workaround, use the SDK's filtering mechanism to remove the cookies from the payload that is sent to Sentry. For error events, this can be done with the 'before_send' callback method and for performance related events (transactions) one can use the 'before_send_transaction' callback method. Those who want to handle filtering of these values on the server-side can also use Sentry's advanced data scrubbing feature to account for the custom cookie names. Look for the '$http.cookies', '$http.headers', '$request.cookies', or '$request.headers' fields to target with a scrubbing rule.
https://github.com/getsentry/sentry-python/security/advisories/GHSA-29pr-6jr8-q5jm | what vulnarability does sentry-sdk version less then 1.14.0 have | |
Having vulnarability PVE-2021-36949 Advisory: sequoia-client-sdk 1.2.0 upgrades libraries `urllib3` and `requests` upgraded to solve security issues: | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sequoia-client-sdk version less then 1.2.0 have ### Response: Having vulnarability PVE-2021-36949 Advisory: sequoia-client-sdk 1.2.0 upgrades libraries `urllib3` and `requests` upgraded to solve security issues: | what vulnarability does sequoia-client-sdk version less then 1.2.0 have | |
Having vulnarability PVE-2022-45391 Advisory: Serialix 2.1.1a1 sanitizes some properties in .core.BaseLang.
https://github.com/maximilionus/serialix/commit/c64170419b1eeb09e1b5433baa18783c5e3c90bd | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does serialix version less then 2.1.1a1 have ### Response: Having vulnarability PVE-2022-45391 Advisory: Serialix 2.1.1a1 sanitizes some properties in .core.BaseLang.
https://github.com/maximilionus/serialix/commit/c64170419b1eeb09e1b5433baa18783c5e3c90bd | what vulnarability does serialix version less then 2.1.1a1 have | |
Having vulnarability CVE-2018-17461 Advisory: Serpscrap 0.13.0 updates its dependency 'chromedriver' to a version >= 76.0.3809.68 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does serpscrap version less then 0.13.0 have ### Response: Having vulnarability CVE-2018-17461 Advisory: Serpscrap 0.13.0 updates its dependency 'chromedriver' to a version >= 76.0.3809.68 to include security fixes. | what vulnarability does serpscrap version less then 0.13.0 have | |
Having vulnarability PVE-2021-41954 Advisory: Serverlla version 1.23 uses HTTPS when connecting to a website to obtain the public IP. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does serverlla version less then 1.23 have ### Response: Having vulnarability PVE-2021-41954 Advisory: Serverlla version 1.23 uses HTTPS when connecting to a website to obtain the public IP. | what vulnarability does serverlla version less then 1.23 have | |
Having vulnarability PVE-2021-26128 Advisory: sesame 0.3.0 is using a secure extraction/decryption using tempfile. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sesame version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-26128 Advisory: sesame 0.3.0 is using a secure extraction/decryption using tempfile. | what vulnarability does sesame version less then 0.3.0 have | |
Having vulnarability CVE-2020-26226 Advisory: Setriq 1.0.0 updates its dependency 'semantic-release' to v17.2.3 to include a security fix.
https://github.com/BenTenmann/setriq/commit/c1d4f380568933fb6e5b2c70a5e42ad36dbc103a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does setriq version less then 1.0.0 have ### Response: Having vulnarability CVE-2020-26226 Advisory: Setriq 1.0.0 updates its dependency 'semantic-release' to v17.2.3 to include a security fix.
https://github.com/BenTenmann/setriq/commit/c1d4f380568933fb6e5b2c70a5e42ad36dbc103a | what vulnarability does setriq version less then 1.0.0 have | |
Having vulnarability PVE-2021-34984 Advisory: setup-tools is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does setup-tools version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34984 Advisory: setup-tools is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | what vulnarability does setup-tools version greather then 0,less then 0 have | |
Having vulnarability CVE-2022-31543 Advisory: SetupBox throughout 1.0 allows absolute path traversal because the Flask send_file function is used unsafely. See CVE-2022-31543. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does setupbox version less then equal to 1.0 have ### Response: Having vulnarability CVE-2022-31543 Advisory: SetupBox throughout 1.0 allows absolute path traversal because the Flask send_file function is used unsafely. See CVE-2022-31543. | what vulnarability does setupbox version less then equal to 1.0 have | |
Having vulnarability CVE-2013-1633 Advisory: Setuptools version 0.7 includes a fix for CVE-2013-1633: Easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does setuptools version less then 0.7 have ### Response: Having vulnarability CVE-2013-1633 Advisory: Setuptools version 0.7 includes a fix for CVE-2013-1633: Easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product. | what vulnarability does setuptools version less then 0.7 have | |
Having vulnarability PVE-2021-26134 Advisory: sevabot before 1.1 allows arbitrary commands to be executed. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sevabot version less then 1.1 have ### Response: Having vulnarability PVE-2021-26134 Advisory: sevabot before 1.1 allows arbitrary commands to be executed. | what vulnarability does sevabot version less then 1.1 have | |
Having vulnarability CVE-2017-18342 Advisory: Sfmergeutility version 0.1.6 includes a security patch for the function 'load_and_merge_partial_documents' in 'sfmergeutility/sf_merge_utility.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/Azure/azure-cli-extensions/commit/4c14ac3599c7eddb8a9d9647cd5b6979847f4493#diff-ab3f8debc85e8d89ef9c6ab747f3c92153d4f8d7f0f7eb80580b7c0066df1e99 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sfmergeutility version less then 0.1.6 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Sfmergeutility version 0.1.6 includes a security patch for the function 'load_and_merge_partial_documents' in 'sfmergeutility/sf_merge_utility.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/Azure/azure-cli-extensions/commit/4c14ac3599c7eddb8a9d9647cd5b6979847f4493#diff-ab3f8debc85e8d89ef9c6ab747f3c92153d4f8d7f0f7eb80580b7c0066df1e99 | what vulnarability does sfmergeutility version less then 0.1.6 have | |
Having vulnarability PVE-2023-54977 Advisory: sftp-cloudfs before 0.13.1 is using an insecure transitive dependency (ftp-cloudfs<=0.26.1).
https://github.com/Memset/sftpcloudfs/commit/a1d8855c576fc3830880e2f200acd205be772da6
https://github.com/Memset/sftpcloudfs/issues/13#issuecomment-40093908 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sftp-cloudfs version less then 0.13.1 have ### Response: Having vulnarability PVE-2023-54977 Advisory: sftp-cloudfs before 0.13.1 is using an insecure transitive dependency (ftp-cloudfs<=0.26.1).
https://github.com/Memset/sftpcloudfs/commit/a1d8855c576fc3830880e2f200acd205be772da6
https://github.com/Memset/sftpcloudfs/issues/13#issuecomment-40093908 | what vulnarability does sftp-cloudfs version less then 0.13.1 have | |
Having vulnarability CVE-2022-2309 Advisory: Sgraph 0.0.7 updates its dependency 'lxml' to versions '~=4.9.1' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sgraph version less then 0.0.7 have ### Response: Having vulnarability CVE-2022-2309 Advisory: Sgraph 0.0.7 updates its dependency 'lxml' to versions '~=4.9.1' to include a security fix. | what vulnarability does sgraph version less then 0.0.7 have | |
Having vulnarability CVE-2023-0286 Advisory: Sgx-dcap-quote-verify-python 0.0.3 includes a statically linked copy of OpenSSL. The version of OpenSSL included in sgx-dcap-quote-verify-python 0.0.1..0.0.2 is vulnerable to a security issue. More details about the OpenSSL vulnerabilities themselves can be found at https://www.openssl.org/news/secadv/20230207.txt
https://github.com/advisories/GHSA-344m-qcjq-xgrf | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sgx-dcap-quote-verify-python version less then 0.0.3 have ### Response: Having vulnarability CVE-2023-0286 Advisory: Sgx-dcap-quote-verify-python 0.0.3 includes a statically linked copy of OpenSSL. The version of OpenSSL included in sgx-dcap-quote-verify-python 0.0.1..0.0.2 is vulnerable to a security issue. More details about the OpenSSL vulnerabilities themselves can be found at https://www.openssl.org/news/secadv/20230207.txt
https://github.com/advisories/GHSA-344m-qcjq-xgrf | what vulnarability does sgx-dcap-quote-verify-python version less then 0.0.3 have | |
Having vulnarability CVE-2022-29217 Advisory: Shaarli-client 0.5.0 updates its dependency 'pyjwt' to v2.4.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shaarli-client version less then 0.5.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Shaarli-client 0.5.0 updates its dependency 'pyjwt' to v2.4.0 to include a security fix. | what vulnarability does shaarli-client version less then 0.5.0 have | |
Having vulnarability PVE-2022-51686 Advisory: Shaasigma is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shaasigma version greather then 0 have ### Response: Having vulnarability PVE-2022-51686 Advisory: Shaasigma is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does shaasigma version greather then 0 have | |
Having vulnarability PVE-2021-37578 Advisory: Shaka-streamer 0.3.0 fixes the PyYAML deprecation warning and YAML loading vulnerability - see: https://github.com/google/shaka-streamer/issues/35 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shaka-streamer version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-37578 Advisory: Shaka-streamer 0.3.0 fixes the PyYAML deprecation warning and YAML loading vulnerability - see: https://github.com/google/shaka-streamer/issues/35 | what vulnarability does shaka-streamer version less then 0.3.0 have | |
Having vulnarability PVE-2021-36542 Advisory: shiftboiler before 0.6.5 included a minor security issue: If google login did not return an id, user can takeover another user's account. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shiftboiler version less then 0.6.5 have ### Response: Having vulnarability PVE-2021-36542 Advisory: shiftboiler before 0.6.5 included a minor security issue: If google login did not return an id, user can takeover another user's account. | what vulnarability does shiftboiler version less then 0.6.5 have | |
Having vulnarability CVE-2022-37298 Advisory: Shinken Solutions Shinken Monitoring Version 2.4.3 and before are vulnerable to Incorrect Access Control. The SafeUnpickler class found in shinken/safepickle.py implements a weak authentication scheme when unserializing objects passed from monitoring nodes to the Shinken monitoring server. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shinken version greather then equal to 0,less then equal to 2.4.3 have ### Response: Having vulnarability CVE-2022-37298 Advisory: Shinken Solutions Shinken Monitoring Version 2.4.3 and before are vulnerable to Incorrect Access Control. The SafeUnpickler class found in shinken/safepickle.py implements a weak authentication scheme when unserializing objects passed from monitoring nodes to the Shinken monitoring server. | what vulnarability does shinken version greather then equal to 0,less then equal to 2.4.3 have | |
Having vulnarability CVE-2007-4559 Advisory: Shinylive 0.0.8 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shinylive version less then 0.0.8 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Shinylive 0.0.8 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does shinylive version less then 0.0.8 have | |
Having vulnarability CVE-2022-31558 Advisory: Shiva throughout 0.10.0 allows absolute path traversal because the Flask send_file function is used unsafely. See CVE-2022-31558. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shiva version less then equal to 0.10.0 have ### Response: Having vulnarability CVE-2022-31558 Advisory: Shiva throughout 0.10.0 allows absolute path traversal because the Flask send_file function is used unsafely. See CVE-2022-31558. | what vulnarability does shiva version less then equal to 0.10.0 have | |
Having vulnarability PVE-2024-67520 Advisory: Affected versions of Shopyo are vulnerable to a Improper Authorization flaw. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shopyo version less then 4.9.1 have ### Response: Having vulnarability PVE-2024-67520 Advisory: Affected versions of Shopyo are vulnerable to a Improper Authorization flaw. | what vulnarability does shopyo version less then 4.9.1 have | |
Having vulnarability CVE-2018-18074 Advisory: Shub 2.10.0 upgrades its pyyaml dependency from version 3.12 to 5.1.1, addressing the security vulnerability CVE-2018-18074.
https://github.com/scrapinghub/shub/pull/353/commits/0ba5d4aeefe11044f5d218ddcf85511fcde29633 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shub version less then 2.10.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Shub 2.10.0 upgrades its pyyaml dependency from version 3.12 to 5.1.1, addressing the security vulnerability CVE-2018-18074.
https://github.com/scrapinghub/shub/pull/353/commits/0ba5d4aeefe11044f5d218ddcf85511fcde29633 | what vulnarability does shub version less then 2.10.0 have | |
Having vulnarability PVE-2017-47062 Advisory: Shuup 1.1.0 uses the more secure get_random_string to generate order keys.
https://github.com/shuup/shuup/commit/e3861a0b710212ed0d5a9497452ed223bbe83162 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does shuup version less then 1.1.0 have ### Response: Having vulnarability PVE-2017-47062 Advisory: Shuup 1.1.0 uses the more secure get_random_string to generate order keys.
https://github.com/shuup/shuup/commit/e3861a0b710212ed0d5a9497452ed223bbe83162 | what vulnarability does shuup version less then 1.1.0 have | |
Having vulnarability PVE-2023-99948 Advisory: SiCKRAGE versions before 6.0.22 are susceptible to Full Path Disclosure (FPD) due to a returned WEB_ROOT present in get_update_url(). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sickrage version less then 6.0.22 have ### Response: Having vulnarability PVE-2023-99948 Advisory: SiCKRAGE versions before 6.0.22 are susceptible to Full Path Disclosure (FPD) due to a returned WEB_ROOT present in get_update_url(). | what vulnarability does sickrage version less then 6.0.22 have | |
Having vulnarability CVE-2023-37920 Advisory: Sigmaiq 0.2.1 updates its dependency 'certifi' to version '2023.07.22' to include a fix for a vulnerability.
https://github.com/AttackIQ/SigmAIQ/commit/9e9c4376c220af03448e0d3d98c81048d3740cc4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sigmaiq version less then 0.2.1 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Sigmaiq 0.2.1 updates its dependency 'certifi' to version '2023.07.22' to include a fix for a vulnerability.
https://github.com/AttackIQ/SigmAIQ/commit/9e9c4376c220af03448e0d3d98c81048d3740cc4 | what vulnarability does sigmaiq version less then 0.2.1 have | |
Having vulnarability PVE-2022-52399 Advisory: Signac-dashboard 0.4.0 requires login to view job and project data.
https://github.com/glotzerlab/signac-dashboard/pull/158 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does signac-dashboard version less then 0.4.0 have ### Response: Having vulnarability PVE-2022-52399 Advisory: Signac-dashboard 0.4.0 requires login to view job and project data.
https://github.com/glotzerlab/signac-dashboard/pull/158 | what vulnarability does signac-dashboard version less then 0.4.0 have | |
Having vulnarability PVE-2024-66988 Advisory: Siliconcompiler 0.21.6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does siliconcompiler version less then 0.21.6 have ### Response: Having vulnarability PVE-2024-66988 Advisory: Siliconcompiler 0.21.6 | what vulnarability does siliconcompiler version less then 0.21.6 have | |
Having vulnarability CVE-2020-19000 Advisory: Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simiki version greather then equal to 0,less then 1.6.2.2 have ### Response: Having vulnarability CVE-2020-19000 Advisory: Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'. | what vulnarability does simiki version greather then equal to 0,less then 1.6.2.2 have | |
Having vulnarability CVE-2022-1365 Advisory: Simpl-cloud 1.2.1 updates its NPM dependency 'node-fetch' to v2.6.7 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simpl-cloud version less then 1.2.1 have ### Response: Having vulnarability CVE-2022-1365 Advisory: Simpl-cloud 1.2.1 updates its NPM dependency 'node-fetch' to v2.6.7 to include security fixes. | what vulnarability does simpl-cloud version less then 1.2.1 have | |
Having vulnarability CVE-2021-23980 Advisory: Simple-api-client 1.0.6 updates its dependency 'Bleach' to v3.3.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simple-api-client version less then 1.0.6 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Simple-api-client 1.0.6 updates its dependency 'Bleach' to v3.3.0 to include a security fix. | what vulnarability does simple-api-client version less then 1.0.6 have | |
Having vulnarability PVE-2022-51326 Advisory: Simple-otp 0.1.1 uses hmac.compare_digest to avoid timing attacks.
https://github.com/nogoodusername/simple-otp/pull/3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simple-otp version less then 0.1.1 have ### Response: Having vulnarability PVE-2022-51326 Advisory: Simple-otp 0.1.1 uses hmac.compare_digest to avoid timing attacks.
https://github.com/nogoodusername/simple-otp/pull/3 | what vulnarability does simple-otp version less then 0.1.1 have | |
Having vulnarability PVE-2021-40180 Advisory: Simple-swagger 0.1.0 adds basic security support with credentials. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simple-swagger version less then 0.1.0 have ### Response: Having vulnarability PVE-2021-40180 Advisory: Simple-swagger 0.1.0 adds basic security support with credentials. | what vulnarability does simple-swagger version less then 0.1.0 have | |
Having vulnarability PVE-2023-61626 Advisory: Simple-websocket 0.8.1 includes a fix for a potential race condition vulnerability.
https://github.com/miguelgrinberg/simple-websocket/issues/18 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simple-websocket version less then 0.8.1 have ### Response: Having vulnarability PVE-2023-61626 Advisory: Simple-websocket 0.8.1 includes a fix for a potential race condition vulnerability.
https://github.com/miguelgrinberg/simple-websocket/issues/18 | what vulnarability does simple-websocket version less then 0.8.1 have | |
Having vulnarability CVE-2014-4616 Advisory: Simplejson 2.6.1 includes a fix for CVE-2014-4616: Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.
https://bugs.python.org/issue21529 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simplejson version less then 2.6.1 have ### Response: Having vulnarability CVE-2014-4616 Advisory: Simplejson 2.6.1 includes a fix for CVE-2014-4616: Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.
https://bugs.python.org/issue21529 | what vulnarability does simplejson version less then 2.6.1 have | |
Having vulnarability PVE-2022-45407 Advisory: Simplematrixbotlib 2.6.2 fixes a possible code injection vulnerability.
https://github.com/i10b/simplematrixbotlib/commit/4a6eea5a3eaa5cf0f06b7087a5b1e851e9d021a8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simplematrixbotlib version less then 2.6.2 have ### Response: Having vulnarability PVE-2022-45407 Advisory: Simplematrixbotlib 2.6.2 fixes a possible code injection vulnerability.
https://github.com/i10b/simplematrixbotlib/commit/4a6eea5a3eaa5cf0f06b7087a5b1e851e9d021a8 | what vulnarability does simplematrixbotlib version less then 2.6.2 have | |
Having vulnarability PVE-2021-37886 Advisory: simplemonitor 2.7 changes the remote monitor protocol and uses the JSON format for remote monitor protocol (more secure than pickle) | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simplemonitor version less then 2.7 have ### Response: Having vulnarability PVE-2021-37886 Advisory: simplemonitor 2.7 changes the remote monitor protocol and uses the JSON format for remote monitor protocol (more secure than pickle) | what vulnarability does simplemonitor version less then 2.7 have | |
Having vulnarability PVE-2021-40604 Advisory: Simplesockets 0.1.0 improves security in the self-made secure socket. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simplesockets version less then 0.1.0 have ### Response: Having vulnarability PVE-2021-40604 Advisory: Simplesockets 0.1.0 improves security in the self-made secure socket. | what vulnarability does simplesockets version less then 0.1.0 have | |
Having vulnarability CVE-2019-12387 Advisory: Simulaqron 3.0.7 updates its dependency 'twisted' minimum requirement to v19.7 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does simulaqron version less then 3.0.7 have ### Response: Having vulnarability CVE-2019-12387 Advisory: Simulaqron 3.0.7 updates its dependency 'twisted' minimum requirement to v19.7 to include security fixes. | what vulnarability does simulaqron version less then 3.0.7 have | |
Having vulnarability PVE-2022-51365 Advisory: Siwe 2.0.3-beta uses 'verify(params, opts)' instead of 'validate(...)'. This includes the param 'nonce' that prevents replay attacks.
https://github.com/djungle-io/django-djet2/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does siwe version less then 2.0.3-beta have ### Response: Having vulnarability PVE-2022-51365 Advisory: Siwe 2.0.3-beta uses 'verify(params, opts)' instead of 'validate(...)'. This includes the param 'nonce' that prevents replay attacks.
https://github.com/djungle-io/django-djet2/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9 | what vulnarability does siwe version less then 2.0.3-beta have | |
Having vulnarability CVE-2022-34059 Advisory: The Sixfab-Tool in PyPI v0.0.2 to v0.0.3 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sixfab-tool version greather then equal to 0.0.2,less then equal to 0.0.3 have ### Response: Having vulnarability CVE-2022-34059 Advisory: The Sixfab-Tool in PyPI v0.0.2 to v0.0.3 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does sixfab-tool version greather then equal to 0.0.2,less then equal to 0.0.3 have | |
Having vulnarability PVE-2022-47819 Advisory: Skale-allocator-cli is a malicious package, typosquatting.
https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does skale-allocator-cli version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47819 Advisory: Skale-allocator-cli is a malicious package, typosquatting.
https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library | what vulnarability does skale-allocator-cli version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-39692 Advisory: Skill-sdk 0.10.5 makes its underlying dependency 'Tornado' optional due to a security issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does skill-sdk version less then 0.10.5 have ### Response: Having vulnarability PVE-2021-39692 Advisory: Skill-sdk 0.10.5 makes its underlying dependency 'Tornado' optional due to a security issue. | what vulnarability does skill-sdk version less then 0.10.5 have | |
Having vulnarability PVE-2023-54838 Advisory: Skops 0.6 includes a fix for the persisting :class:'numpy.random.Generator': using the skops format the object could be loaded correctly but security could not be checked.
https://github.com/skops-dev/skops/commit/deaf6e275e4f9f0ad8e84cf5b4def5e7a7b118f6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does skops version less then 0.6 have ### Response: Having vulnarability PVE-2023-54838 Advisory: Skops 0.6 includes a fix for the persisting :class:'numpy.random.Generator': using the skops format the object could be loaded correctly but security could not be checked.
https://github.com/skops-dev/skops/commit/deaf6e275e4f9f0ad8e84cf5b4def5e7a7b118f6 | what vulnarability does skops version less then 0.6 have | |
Having vulnarability CVE-2019-20916 Advisory: Sl-pip 8.2.1.2 and prior are vulnerable to CVE-2019-20916: Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have dir in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sl-pip version less then equal to 8.2.1.2 have ### Response: Having vulnarability CVE-2019-20916 Advisory: Sl-pip 8.2.1.2 and prior are vulnerable to CVE-2019-20916: Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have dir in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. | what vulnarability does sl-pip version less then equal to 8.2.1.2 have | |
Having vulnarability CVE-2018-1000656 Advisory: Slackeventsapi 2.1.0 updates minimum Flask version to address security vulnerability.
https://github.com/slackapi/python-slack-events-api/pull/45/commits/bdc6abfbb5f6ae50be16750988fc5adddd9a4a80 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does slackeventsapi version less then 2.1.0 have ### Response: Having vulnarability CVE-2018-1000656 Advisory: Slackeventsapi 2.1.0 updates minimum Flask version to address security vulnerability.
https://github.com/slackapi/python-slack-events-api/pull/45/commits/bdc6abfbb5f6ae50be16750988fc5adddd9a4a80 | what vulnarability does slackeventsapi version less then 2.1.0 have | |
Having vulnarability CVE-2020-15202 Advisory: Sleap 1.0.10 updates TensorFlow to v2.1.2 for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sleap version less then 1.0.10 have ### Response: Having vulnarability CVE-2020-15202 Advisory: Sleap 1.0.10 updates TensorFlow to v2.1.2 for security reasons. | what vulnarability does sleap version less then 1.0.10 have | |
Having vulnarability CVE-2017-5591 Advisory: An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for SleekXMPP up to 1.3.1 and Slixmpp all versions up to 1.2.3, as bundled in poezio (0.8 - 0.10) and other products. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sleekxmpp version greather then equal to 0,less then 1.3.2 have ### Response: Having vulnarability CVE-2017-5591 Advisory: An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for SleekXMPP up to 1.3.1 and Slixmpp all versions up to 1.2.3, as bundled in poezio (0.8 - 0.10) and other products. | what vulnarability does sleekxmpp version greather then equal to 0,less then 1.3.2 have | |
Having vulnarability PVE-2022-51757 Advisory: Slenium is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does slenium version greather then 0 have ### Response: Having vulnarability PVE-2022-51757 Advisory: Slenium is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does slenium version greather then 0 have | |
Having vulnarability CVE-2017-5591 Advisory: An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for SleekXMPP up to 1.3.1 and Slixmpp all versions up to 1.2.3, as bundled in poezio (0.8 - 0.10) and other products. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does slixmpp version greather then equal to 0,less then 1.2.4 have ### Response: Having vulnarability CVE-2017-5591 Advisory: An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for SleekXMPP up to 1.3.1 and Slixmpp all versions up to 1.2.3, as bundled in poezio (0.8 - 0.10) and other products. | what vulnarability does slixmpp version greather then equal to 0,less then 1.2.4 have | |
Having vulnarability CVE-2021-22557 Advisory: SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does slo-generator version greather then equal to 0,less then 2.0.1 have ### Response: Having vulnarability CVE-2021-22557 Advisory: SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173 | what vulnarability does slo-generator version greather then equal to 0,less then 2.0.1 have | |
Having vulnarability CVE-2020-14343 Advisory: Smart-app-framework 2.3.0rc5 updates its dependency 'PyYAML' to version '6.0.1' to include a fix for an Arbitrary Code Execution vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smart-app-framework version less then 2.3.0rc5 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Smart-app-framework 2.3.0rc5 updates its dependency 'PyYAML' to version '6.0.1' to include a fix for an Arbitrary Code Execution vulnerability. | what vulnarability does smart-app-framework version less then 2.3.0rc5 have | |
Having vulnarability PVE-2022-45437 Advisory: Smb is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smb version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45437 Advisory: Smb is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does smb version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-40415 Advisory: Smbprotocol 1.4.0 adds few important security improvements. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smbprotocol version less then 1.4.0 have ### Response: Having vulnarability PVE-2021-40415 Advisory: Smbprotocol 1.4.0 adds few important security improvements. | what vulnarability does smbprotocol version less then 1.4.0 have | |
Having vulnarability PVE-2021-34818 Advisory: Smeagol has several known bugs and security issues that need to be addressed before it can be used in production. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smeagol version less then equal to 0.1.4 have ### Response: Having vulnarability PVE-2021-34818 Advisory: Smeagol has several known bugs and security issues that need to be addressed before it can be used in production. | what vulnarability does smeagol version less then equal to 0.1.4 have | |
Having vulnarability PVE-2022-52432 Advisory: Smok 0.20.1 includes a fix for a code injection vulnerability.
https://github.com/smok-serwis/smok-client/commit/a97b3dac454569f55a8a28a1cac44ae04e3e9cde | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smok version less then 0.20.1 have ### Response: Having vulnarability PVE-2022-52432 Advisory: Smok 0.20.1 includes a fix for a code injection vulnerability.
https://github.com/smok-serwis/smok-client/commit/a97b3dac454569f55a8a28a1cac44ae04e3e9cde | what vulnarability does smok version less then 0.20.1 have | |
Having vulnarability PVE-2022-45417 Advisory: Smplejson is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smplejson version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45417 Advisory: Smplejson is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does smplejson version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-38777 Advisory: Smqtk 0.11.0 includes a number of security and stability fixes for algorithms and the IQR demo web application. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smqtk version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-38777 Advisory: Smqtk 0.11.0 includes a number of security and stability fixes for algorithms and the IQR demo web application. | what vulnarability does smqtk version less then 0.11.0 have | |
Having vulnarability CVE-2022-21699 Advisory: Smqtk-core 0.18.2 updates its dependency 'ipython' to v7.16.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smqtk-core version less then 0.18.2 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Smqtk-core 0.18.2 updates its dependency 'ipython' to v7.16.3 to include a security fix. | what vulnarability does smqtk-core version less then 0.18.2 have | |
Having vulnarability CVE-2022-21699 Advisory: Smqtk-dataprovider 0.17.0 updates its dependency 'ipython' to v7.16.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smqtk-dataprovider version less then 0.17.0 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Smqtk-dataprovider 0.17.0 updates its dependency 'ipython' to v7.16.3 to include a security fix. | what vulnarability does smqtk-dataprovider version less then 0.17.0 have | |
Having vulnarability CVE-2021-25922 Advisory: Smqtk-descriptors 0.19.0 updates its dependency 'pillow' to version '8.3.2' to include a security fix.
https://github.com/Kitware/SMQTK-Descriptors/commit/805be76a831b33802b6ebd9ac90496fd93d60a9f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smqtk-descriptors version less then 0.19.0 have ### Response: Having vulnarability CVE-2021-25922 Advisory: Smqtk-descriptors 0.19.0 updates its dependency 'pillow' to version '8.3.2' to include a security fix.
https://github.com/Kitware/SMQTK-Descriptors/commit/805be76a831b33802b6ebd9ac90496fd93d60a9f | what vulnarability does smqtk-descriptors version less then 0.19.0 have | |
Having vulnarability CVE-2021-23437 Advisory: Smqtk-detection 0.17.0 updates its dependency 'pillow' to v8.3.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smqtk-detection version less then 0.17.0 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Smqtk-detection 0.17.0 updates its dependency 'pillow' to v8.3.2 to include security fixes. | what vulnarability does smqtk-detection version less then 0.17.0 have | |
Having vulnarability CVE-2020-11022 Advisory: Smriprep 0.12.0 includes fixes for XSS vulnerabilities in its dependency 'JQuery'.
https://github.com/nipreps/smriprep/pull/332 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smriprep version less then 0.12.0 have ### Response: Having vulnarability CVE-2020-11022 Advisory: Smriprep 0.12.0 includes fixes for XSS vulnerabilities in its dependency 'JQuery'.
https://github.com/nipreps/smriprep/pull/332 | what vulnarability does smriprep version less then 0.12.0 have | |
Having vulnarability CVE-2020-36242 Advisory: Smtpdfix 0.2.9 requires a 'cryptography' dependency version 3.4.4 in response to security reports. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does smtpdfix version less then 0.2.9 have ### Response: Having vulnarability CVE-2020-36242 Advisory: Smtpdfix 0.2.9 requires a 'cryptography' dependency version 3.4.4 in response to security reports. | what vulnarability does smtpdfix version less then 0.2.9 have | |
Having vulnarability CVE-2022-24065 Advisory: Snakebids 0.6.1 updates its dependency 'cookiecutter' to versions '^2.1.1' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does snakebids version less then 0.6.1 have ### Response: Having vulnarability CVE-2022-24065 Advisory: Snakebids 0.6.1 updates its dependency 'cookiecutter' to versions '^2.1.1' to include a security fix. | what vulnarability does snakebids version less then 0.6.1 have | |
Having vulnarability PVE-2021-39106 Advisory: Snakemake 5.28.0 parses values more securely when using --config. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does snakemake version less then 5.28.0 have ### Response: Having vulnarability PVE-2021-39106 Advisory: Snakemake 5.28.0 parses values more securely when using --config. | what vulnarability does snakemake version less then 5.28.0 have | |
Having vulnarability CVE-2020-27348 Advisory: In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does snapcraft version less then 4.4.4 have ### Response: Having vulnarability CVE-2020-27348 Advisory: In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1. | what vulnarability does snapcraft version less then 4.4.4 have | |
Having vulnarability CVE-2018-10903 Advisory: Snappass 1.4.1 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does snappass version less then 1.4.1 have ### Response: Having vulnarability CVE-2018-10903 Advisory: Snappass 1.4.1 includes a fix for CVE-2018-10903: A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage. | what vulnarability does snappass version less then 1.4.1 have | |
Having vulnarability PVE-2021-37302 Advisory: Sncli 0.4.0 contains a security fix for an arbitrary code execution bug. Copying text from notes to the clipboard was being performed by building a shell command to execute. This resulted in the line being copied substituted directly into the shell command. A carefully crafted line could run any arbitrary shell command, and some lines could crash the process causing the line to fail to copy. This fixes the issue by not using a shell to interpret the command, and passing the text to be copied directly to stdin.
https://github.com/insanum/sncli/commit/ecc410f8f55e7adbbfbec1b14176568ac2a39da5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sncli version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-37302 Advisory: Sncli 0.4.0 contains a security fix for an arbitrary code execution bug. Copying text from notes to the clipboard was being performed by building a shell command to execute. This resulted in the line being copied substituted directly into the shell command. A carefully crafted line could run any arbitrary shell command, and some lines could crash the process causing the line to fail to copy. This fixes the issue by not using a shell to interpret the command, and passing the text to be copied directly to stdin.
https://github.com/insanum/sncli/commit/ecc410f8f55e7adbbfbec1b14176568ac2a39da5 | what vulnarability does sncli version less then 0.4.0 have | |
Having vulnarability CVE-2022-42965 Advisory: Snowflake-connector-python 2.8.2 includes a fix for CVE-2022-42965: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the snowflake-connector-python PyPI package, when an attacker is able to supply arbitrary input to the undocumented get_file_transfer_type method. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does snowflake-connector-python version less then 2.8.2 have ### Response: Having vulnarability CVE-2022-42965 Advisory: Snowflake-connector-python 2.8.2 includes a fix for CVE-2022-42965: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the snowflake-connector-python PyPI package, when an attacker is able to supply arbitrary input to the undocumented get_file_transfer_type method. | what vulnarability does snowflake-connector-python version less then 2.8.2 have | |
Having vulnarability CVE-2021-41168 Advisory: Snudown 1.7.0 includes a fix for CVE-2021-41168: In affected versions snudown was found to be vulnerable to denial of service attacks to its reference table implementation. References written in markdown " [reference_name]: https://www.example.com" are inserted into a hash table which was found to have a weak hash function, meaning that an attacker can reliably generate a large number of collisions for it. This makes the hash table vulnerable to a hash-collision DoS attack, a type of algorithmic complexity attack. Further, the hash table allows for duplicate entries resulting in long retrieval times. Proofs of concept and further discussion of the hash collision issue are discussed on the snudown GHSA (https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6).
https://github.com/reddit/snudown/commit/1ac2c130b210539ee1e5d67a7bac93f9d8007c0e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does snudown version less then 1.7.0 have ### Response: Having vulnarability CVE-2021-41168 Advisory: Snudown 1.7.0 includes a fix for CVE-2021-41168: In affected versions snudown was found to be vulnerable to denial of service attacks to its reference table implementation. References written in markdown " [reference_name]: https://www.example.com" are inserted into a hash table which was found to have a weak hash function, meaning that an attacker can reliably generate a large number of collisions for it. This makes the hash table vulnerable to a hash-collision DoS attack, a type of algorithmic complexity attack. Further, the hash table allows for duplicate entries resulting in long retrieval times. Proofs of concept and further discussion of the hash collision issue are discussed on the snudown GHSA (https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6).
https://github.com/reddit/snudown/commit/1ac2c130b210539ee1e5d67a7bac93f9d8007c0e | what vulnarability does snudown version less then 1.7.0 have | |
Having vulnarability CVE-2021-41945 Advisory: Snyk-tags 0.4.2 updates its dependency 'httpx' to v0.23.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does snyk-tags version less then 0.4.2 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Snyk-tags 0.4.2 updates its dependency 'httpx' to v0.23.0 to include a security fix. | what vulnarability does snyk-tags version less then 0.4.2 have | |
Having vulnarability PVE-2021-26136 Advisory: soapfish before 0.6.0 has a potential security issue - pattern restrictions were not applied correctly. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does soapfish version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-26136 Advisory: soapfish before 0.6.0 has a potential security issue - pattern restrictions were not applied correctly. | what vulnarability does soapfish version less then 0.6.0 have | |
Having vulnarability CVE-2014-3242 Advisory: soappy before 0.12.6 allows remote attackers to read arbitrary files via a SOAP request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does soappy version less then 0.12.6 have ### Response: Having vulnarability CVE-2014-3242 Advisory: soappy before 0.12.6 allows remote attackers to read arbitrary files via a SOAP request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | what vulnarability does soappy version less then 0.12.6 have | |
Having vulnarability PVE-2021-26138 Advisory: soappy-py3 before 0.12.6 allows remote attackers to read arbitrary files via a SOAP request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does soappy-py3 version less then 0.12.6 have ### Response: Having vulnarability PVE-2021-26138 Advisory: soappy-py3 before 0.12.6 allows remote attackers to read arbitrary files via a SOAP request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | what vulnarability does soappy-py3 version less then 0.12.6 have | |
Having vulnarability PVE-2022-52315 Advisory: Socketshark 0.2.2 includes a fix for a sensitive information exposure vulnerability.
https://github.com/closeio/socketshark/pull/42 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does socketshark version less then 0.2.2 have ### Response: Having vulnarability PVE-2022-52315 Advisory: Socketshark 0.2.2 includes a fix for a sensitive information exposure vulnerability.
https://github.com/closeio/socketshark/pull/42 | what vulnarability does socketshark version less then 0.2.2 have | |
Having vulnarability CVE-2021-43811 Advisory: Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sockeye version greather then equal to 0,less then 2.3.24 have ### Response: Having vulnarability CVE-2021-43811 Advisory: Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24. | what vulnarability does sockeye version greather then equal to 0,less then 2.3.24 have | |
Having vulnarability PVE-2021-38215 Advisory: Sockjs-tornado 1.0.7 includes a fix for a XSS vulnerability. The fix issued for the XSS vuln in 1.0.6 was incomplete.
https://github.com/mrjoes/sockjs-tornado/commit/902b19c4a2015f20e1e2be42c8451e971db41a61 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sockjs-tornado version less then 1.0.7 have ### Response: Having vulnarability PVE-2021-38215 Advisory: Sockjs-tornado 1.0.7 includes a fix for a XSS vulnerability. The fix issued for the XSS vuln in 1.0.6 was incomplete.
https://github.com/mrjoes/sockjs-tornado/commit/902b19c4a2015f20e1e2be42c8451e971db41a61 | what vulnarability does sockjs-tornado version less then 1.0.7 have | |
Having vulnarability PVE-2022-48320 Advisory: Softlayer-zeep 0.4.0 adds defusedxml module to prevent XML injection vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does softlayer-zeep version less then 0.4.0 have ### Response: Having vulnarability PVE-2022-48320 Advisory: Softlayer-zeep 0.4.0 adds defusedxml module to prevent XML injection vulnerabilities. | what vulnarability does softlayer-zeep version less then 0.4.0 have | |
Having vulnarability CVE-2021-41945 Advisory: Solana 0.25.0 updates its dependency 'httpx' requirement to '^0.23' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does solana version less then 0.25.0 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Solana 0.25.0 updates its dependency 'httpx' requirement to '^0.23' to include a security fix. | what vulnarability does solana version less then 0.25.0 have | |
Having vulnarability PVE-2021-26139 Advisory: A security issue involving an improperly named channel logs was fixed in Sopel 4.4.0. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sopel version less then 4.4.0 have ### Response: Having vulnarability PVE-2021-26139 Advisory: A security issue involving an improperly named channel logs was fixed in Sopel 4.4.0. | what vulnarability does sopel version less then 4.4.0 have | |
Having vulnarability PVE-2023-55190 Advisory: Sopel-modules-weather 1.2.4 includes a security fix: If a user is actively blackholing the location or weather APIs, or those APIs become otherwise unavailable, it is possible for the API keys to get leaked to the active IRC channel.
https://github.com/sopel-irc/sopel-weather/security/advisories/GHSA-63rq-p8fp-524q | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sopel-modules-weather version greather then equal to 0,less then 1.2.4 have ### Response: Having vulnarability PVE-2023-55190 Advisory: Sopel-modules-weather 1.2.4 includes a security fix: If a user is actively blackholing the location or weather APIs, or those APIs become otherwise unavailable, it is possible for the API keys to get leaked to the active IRC channel.
https://github.com/sopel-irc/sopel-weather/security/advisories/GHSA-63rq-p8fp-524q | what vulnarability does sopel-modules-weather version greather then equal to 0,less then 1.2.4 have | |
Having vulnarability CVE-2020-15251 Advisory: Sopel-plugins-channelmgnt v1.0.3 includes a fix for CVE-2020-15251: In the Channelmgnt plugin for Sopel before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability.
https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5
https://github.com/MirahezeBots/sopel-channelmgnt/pull/3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sopel-plugins-channelmgnt version less then 1.0.3 have ### Response: Having vulnarability CVE-2020-15251 Advisory: Sopel-plugins-channelmgnt v1.0.3 includes a fix for CVE-2020-15251: In the Channelmgnt plugin for Sopel before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability.
https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5
https://github.com/MirahezeBots/sopel-channelmgnt/pull/3 | what vulnarability does sopel-plugins-channelmgnt version less then 1.0.3 have | |
Having vulnarability CVE-2022-2806 Advisory: It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sosreport version less then 4.2-20.el8_6 have ### Response: Having vulnarability CVE-2022-2806 Advisory: It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev | what vulnarability does sosreport version less then 4.2-20.el8_6 have | |
Having vulnarability PVE-2023-60661 Advisory: Sosse 1.4.0 includes a fix for a Race Condition vulnerability.
https://github.com/biolds/sosse/commit/5fa9d5f8fbed4ef5119f1527479b1a02faf76b40 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sosse version less then 1.4.0 have ### Response: Having vulnarability PVE-2023-60661 Advisory: Sosse 1.4.0 includes a fix for a Race Condition vulnerability.
https://github.com/biolds/sosse/commit/5fa9d5f8fbed4ef5119f1527479b1a02faf76b40 | what vulnarability does sosse version less then 1.4.0 have | |
Having vulnarability PVE-2021-37388 Advisory: HTTPS has been re-enabled in spacepy-x 1.0.1 for secure API goodness. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spacepy-x version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-37388 Advisory: HTTPS has been re-enabled in spacepy-x 1.0.1 for secure API goodness. | what vulnarability does spacepy-x version less then 1.0.1 have | |
Having vulnarability PVE-2023-55208 Advisory: The spam project on PyPI was taken over via user account compromise via a phishing attack and new malicious releases made (2.0.2 and 4.0.2) which contained code which some environment variables and downloaded and ran malware at install time. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spam version equal to 2.0.2,equal to 4.0.2 have ### Response: Having vulnarability PVE-2023-55208 Advisory: The spam project on PyPI was taken over via user account compromise via a phishing attack and new malicious releases made (2.0.2 and 4.0.2) which contained code which some environment variables and downloaded and ran malware at install time. | what vulnarability does spam version equal to 2.0.2,equal to 4.0.2 have | |
Having vulnarability PVE-2023-59634 Advisory: Spark-nlp 3.4.0 includes a fix for a Race Condition vulnerability.
https://github.com/JohnSnowLabs/spark-nlp/pull/6575 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spark-nlp version less then 3.4.0 have ### Response: Having vulnarability PVE-2023-59634 Advisory: Spark-nlp 3.4.0 includes a fix for a Race Condition vulnerability.
https://github.com/JohnSnowLabs/spark-nlp/pull/6575 | what vulnarability does spark-nlp version less then 3.4.0 have | |
Having vulnarability CVE-2024-23829 Advisory: Version 0.2.0 of Spark-on-k8s updates its `aiohttp` dependency to require version 3.9.2 or newer. This change aims to protect against the potential security risks outlined in CVE-2024-23829. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spark-on-k8s version less then 0.2.0 have ### Response: Having vulnarability CVE-2024-23829 Advisory: Version 0.2.0 of Spark-on-k8s updates its `aiohttp` dependency to require version 3.9.2 or newer. This change aims to protect against the potential security risks outlined in CVE-2024-23829. | what vulnarability does spark-on-k8s version less then 0.2.0 have | |
Having vulnarability CVE-2017-14158 Advisory: Sparkpipelineframework 1.0.26 removed any webcrawling features and dependency on Scrapy to fix a transitive vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sparkpipelineframework version less then 1.0.26 have ### Response: Having vulnarability CVE-2017-14158 Advisory: Sparkpipelineframework 1.0.26 removed any webcrawling features and dependency on Scrapy to fix a transitive vulnerability. | what vulnarability does sparkpipelineframework version less then 1.0.26 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.