output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2021-37929 Advisory: sparselandtools 1.0.1 requires newer versions of third party packages for security reasons in some cases | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sparselandtools version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-37929 Advisory: sparselandtools 1.0.1 requires newer versions of third party packages for security reasons in some cases | what vulnarability does sparselandtools version less then 1.0.1 have | |
Having vulnarability CVE-2020-28168 Advisory: Sparsify 0.1.1 updates its NPM dependency 'axios' to 0.21.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sparsify version less then 0.1.1 have ### Response: Having vulnarability CVE-2020-28168 Advisory: Sparsify 0.1.1 updates its NPM dependency 'axios' to 0.21.1 to include a security fix. | what vulnarability does sparsify version less then 0.1.1 have | |
Having vulnarability PVE-2021-43025 Advisory: Spartan2 0.1.1 adds a security check in FlowScope to prevent data overflow.
https://github.com/BGT-M/spartan2/pull/20 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spartan2 version less then 0.1.1 have ### Response: Having vulnarability PVE-2021-43025 Advisory: Spartan2 0.1.1 adds a security check in FlowScope to prevent data overflow.
https://github.com/BGT-M/spartan2/pull/20 | what vulnarability does spartan2 version less then 0.1.1 have | |
Having vulnarability CVE-2013-1665 Advisory: Speach 0.1a13 uses 'defusedxml' automatically instead of Python's default parser to avoid XML injection.
https://github.com/neocl/speach/commit/b992031fa2c0acc7924cd2442d9f77da1cfdf4a3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does speach version less then 0.1a13 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Speach 0.1a13 uses 'defusedxml' automatically instead of Python's default parser to avoid XML injection.
https://github.com/neocl/speach/commit/b992031fa2c0acc7924cd2442d9f77da1cfdf4a3 | what vulnarability does speach version less then 0.1a13 have | |
Having vulnarability CVE-2022-29692 Advisory: A use-after-free vulnerability was identified in the Unicorn Engine v1.0.3, which is employed in speakeasy-emulator versions 1.5.15 and lower. This vulnerability is triggered through the hook function. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does speakeasy-emulator version less then 1.5.15 have ### Response: Having vulnarability CVE-2022-29692 Advisory: A use-after-free vulnerability was identified in the Unicorn Engine v1.0.3, which is employed in speakeasy-emulator versions 1.5.15 and lower. This vulnerability is triggered through the hook function. | what vulnarability does speakeasy-emulator version less then 1.5.15 have | |
Having vulnarability PVE-2023-62019 Advisory: Specmatic 0.24.0 upgrades its dependency Werkzeug to 2.3.8 to resolve vulnerability issues.
https://github.com/znsio/specmatic-python-extensions/commit/c2233710e6195d9392258f68ad5d4cb13436c7a6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does specmatic version less then 0.24.0 have ### Response: Having vulnarability PVE-2023-62019 Advisory: Specmatic 0.24.0 upgrades its dependency Werkzeug to 2.3.8 to resolve vulnerability issues.
https://github.com/znsio/specmatic-python-extensions/commit/c2233710e6195d9392258f68ad5d4cb13436c7a6 | what vulnarability does specmatic version less then 0.24.0 have | |
Having vulnarability CVE-2022-2068 Advisory: Spectrafit 0.11.0 updates python in Dockerfile from '3.8-slim' to '3.9-slim' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spectrafit version less then 0.11.0 have ### Response: Having vulnarability CVE-2022-2068 Advisory: Spectrafit 0.11.0 updates python in Dockerfile from '3.8-slim' to '3.9-slim' to include security fixes. | what vulnarability does spectrafit version less then 0.11.0 have | |
Having vulnarability CVE-2020-11022 Advisory: Sphinx 3.0.4 updates jQuery version from 3.4.1 to 3.5.1 for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sphinx version less then 3.0.4 have ### Response: Having vulnarability CVE-2020-11022 Advisory: Sphinx 3.0.4 updates jQuery version from 3.4.1 to 3.5.1 for security reasons. | what vulnarability does sphinx version less then 3.0.4 have | |
Having vulnarability PVE-2021-42377 Advisory: Sphinx-bulma 0.1.0 updates all NPM dev dependencies to versions without security issues. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sphinx-bulma version less then 0.1.0 have ### Response: Having vulnarability PVE-2021-42377 Advisory: Sphinx-bulma 0.1.0 updates all NPM dev dependencies to versions without security issues. | what vulnarability does sphinx-bulma version less then 0.1.0 have | |
Having vulnarability CVE-2018-18074 Advisory: Sphinx-paragraph-extractor 1.0.4 updates its dependency 'requests' to v2.21.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sphinx-paragraph-extractor version less then 1.0.4 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Sphinx-paragraph-extractor 1.0.4 updates its dependency 'requests' to v2.21.0 to include a security fix. | what vulnarability does sphinx-paragraph-extractor version less then 1.0.4 have | |
Having vulnarability CVE-2020-7663 Advisory: Sphinx-typo3-theme version 4.3.0 updates its NPM dependency 'websocket-extensions' to v0.1.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sphinx-typo3-theme version less then 4.3.0 have ### Response: Having vulnarability CVE-2020-7663 Advisory: Sphinx-typo3-theme version 4.3.0 updates its NPM dependency 'websocket-extensions' to v0.1.4 to include security fixes. | what vulnarability does sphinx-typo3-theme version less then 4.3.0 have | |
Having vulnarability CVE-2020-7662 Advisory: Sphinx-wagtail-theme 4.3.0 updates its NPM dependency 'websocket-extensions' to v0.1.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sphinx-wagtail-theme version less then 4.3.0 have ### Response: Having vulnarability CVE-2020-7662 Advisory: Sphinx-wagtail-theme 4.3.0 updates its NPM dependency 'websocket-extensions' to v0.1.4 to include security fixes. | what vulnarability does sphinx-wagtail-theme version less then 4.3.0 have | |
Having vulnarability CVE-2023-37920 Advisory: Sphractal version 0.18.4 updates its certifi dependency to version 2023.7.22 from the previous 2023.5.7, in response to addressing the security concern CVE-2023-37920.
https://github.com/Jon-Ting/sphractal/commit/216b0d301c71c9af5bfc716064e46eae090f7775 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sphractal version less then 0.18.4 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Sphractal version 0.18.4 updates its certifi dependency to version 2023.7.22 from the previous 2023.5.7, in response to addressing the security concern CVE-2023-37920.
https://github.com/Jon-Ting/sphractal/commit/216b0d301c71c9af5bfc716064e46eae090f7775 | what vulnarability does sphractal version less then 0.18.4 have | |
Having vulnarability PVE-2022-49332 Advisory: Spid-cie-oidc 0.7.1 adds mixups attacks prevention for the CIE profile.
https://github.com/italia/spid-cie-oidc-django/commit/c9c0167a19dbfb0ccc912878137bd6ba6c2b1827 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spid-cie-oidc version less then 0.7.1 have ### Response: Having vulnarability PVE-2022-49332 Advisory: Spid-cie-oidc 0.7.1 adds mixups attacks prevention for the CIE profile.
https://github.com/italia/spid-cie-oidc-django/commit/c9c0167a19dbfb0ccc912878137bd6ba6c2b1827 | what vulnarability does spid-cie-oidc version less then 0.7.1 have | |
Having vulnarability PVE-2023-58815 Advisory: Spiffworkflow 1.1.7 drops 'pickle' in the JSON serializer to avoid potential code execution vulnerabilities.
https://github.com/sartography/SpiffWorkflow/pull/174 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spiffworkflow version less then 1.1.7 have ### Response: Having vulnarability PVE-2023-58815 Advisory: Spiffworkflow 1.1.7 drops 'pickle' in the JSON serializer to avoid potential code execution vulnerabilities.
https://github.com/sartography/SpiffWorkflow/pull/174 | what vulnarability does spiffworkflow version less then 1.1.7 have | |
Having vulnarability CVE-2021-33503 Advisory: Spinetoolbox 0.6.0 updates its dependency 'urllib3' to v1.26.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spinetoolbox version less then 0.6.0 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Spinetoolbox 0.6.0 updates its dependency 'urllib3' to v1.26.5 to include a security fix. | what vulnarability does spinetoolbox version less then 0.6.0 have | |
Having vulnarability PVE-2021-37859 Advisory: spintest 0.2.0 renders the UUID Token invisible in the log to avoid security violation, when spintest is used during the CI/CD tools | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spintest version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-37859 Advisory: spintest 0.2.0 renders the UUID Token invisible in the log to avoid security violation, when spintest is used during the CI/CD tools | what vulnarability does spintest version less then 0.2.0 have | |
Having vulnarability PVE-2021-26140 Advisory: Splash before 2.0.1 is vulnerable to a XSS attack in HTTP UI.
https://github.com/scrapinghub/splash/commit/9bdb9d1b5b07eab10674852088016e97b63b9c43 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does splash version less then 2.0.1 have ### Response: Having vulnarability PVE-2021-26140 Advisory: Splash before 2.0.1 is vulnerable to a XSS attack in HTTP UI.
https://github.com/scrapinghub/splash/commit/9bdb9d1b5b07eab10674852088016e97b63b9c43 | what vulnarability does splash version less then 2.0.1 have | |
Having vulnarability CVE-2020-1747 Advisory: Splitio-client 9.1.2 updates its dependency 'pyyaml' minimum requirement to v5.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does splitio-client version less then 9.1.2 have ### Response: Having vulnarability CVE-2020-1747 Advisory: Splitio-client 9.1.2 updates its dependency 'pyyaml' minimum requirement to v5.4 to include security fixes. | what vulnarability does splitio-client version less then 9.1.2 have | |
Having vulnarability PVE-2023-59733 Advisory: Splunk-sdk 1.6.16 includes a fix for a ReDoS vulnerability.
https://github.com/splunk/splunk-sdk-python/pull/312 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does splunk-sdk version less then 1.6.16 have ### Response: Having vulnarability PVE-2023-59733 Advisory: Splunk-sdk 1.6.16 includes a fix for a ReDoS vulnerability.
https://github.com/splunk/splunk-sdk-python/pull/312 | what vulnarability does splunk-sdk version less then 1.6.16 have | |
Having vulnarability PVE-2021-40550 Advisory: Spotdl 3.6.0 includes a security fix for the 'xnetcat' dependency. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spotdl version less then 3.6.0 have ### Response: Having vulnarability PVE-2021-40550 Advisory: Spotdl 3.6.0 includes a security fix for the 'xnetcat' dependency. | what vulnarability does spotdl version less then 3.6.0 have | |
Having vulnarability PVE-2021-40817 Advisory: Spotify-gender-ex 2.4.0 adds certificate validation of the Spotify 'APK' file to prevent malicious apps from being processed and re-signed. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spotify-gender-ex version less then 2.4.0 have ### Response: Having vulnarability PVE-2021-40817 Advisory: Spotify-gender-ex 2.4.0 adds certificate validation of the Spotify 'APK' file to prevent malicious apps from being processed and re-signed. | what vulnarability does spotify-gender-ex version less then 2.4.0 have | |
Having vulnarability CVE-2023-23608 Advisory: Spotipy 2.22.1 includes a fix for CVE-2023-23608: Path traversal vulnerability that may lead to type confusion in URI handling code.
https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spotipy version less then 2.22.1 have ### Response: Having vulnarability CVE-2023-23608 Advisory: Spotipy 2.22.1 includes a fix for CVE-2023-23608: Path traversal vulnerability that may lead to type confusion in URI handling code.
https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v | what vulnarability does spotipy version less then 2.22.1 have | |
Having vulnarability PVE-2021-26141 Advisory: spud before 0.8 doesn't check permissions. Anybody could edit photos. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spud version less then 0.8 have ### Response: Having vulnarability PVE-2021-26141 Advisory: spud before 0.8 doesn't check permissions. Anybody could edit photos. | what vulnarability does spud version less then 0.8 have | |
Having vulnarability PVE-2021-39132 Advisory: Spyder-terminal 0.3.1 resolves several vulnerabilities. See: <https://github.com/spyder-ide/spyder-terminal/pull/188>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spyder-terminal version less then 0.3.1 have ### Response: Having vulnarability PVE-2021-39132 Advisory: Spyder-terminal 0.3.1 resolves several vulnerabilities. See: <https://github.com/spyder-ide/spyder-terminal/pull/188>. | what vulnarability does spyder-terminal version less then 0.3.1 have | |
Having vulnarability PVE-2022-44769 Advisory: Spyne 2.14.0 includes a fix for a ReDoS vulnerability.
https://github.com/arskom/spyne/commit/12374b4cca64b5ff3aad8aebbeecbc801dcfe8c5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spyne version less then 2.14.0 have ### Response: Having vulnarability PVE-2022-44769 Advisory: Spyne 2.14.0 includes a fix for a ReDoS vulnerability.
https://github.com/arskom/spyne/commit/12374b4cca64b5ff3aad8aebbeecbc801dcfe8c5 | what vulnarability does spyne version less then 2.14.0 have | |
Having vulnarability PVE-2021-41062 Advisory: Spyse-python 2.0.0 includes fixes for email and vulnerabilities scrolling. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does spyse-python version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-41062 Advisory: Spyse-python 2.0.0 includes fixes for email and vulnerabilities scrolling. | what vulnarability does spyse-python version less then 2.0.0 have | |
Having vulnarability CVE-2019-3575 Advisory: Sqla_yaml_fixtures 0.9.1 is affected by CVE-2019-3575: It allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
https://github.com/schettino72/sqla_yaml_fixtures/issues/20 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqla-yaml-fixtures version equal to 0.9.1 have ### Response: Having vulnarability CVE-2019-3575 Advisory: Sqla_yaml_fixtures 0.9.1 is affected by CVE-2019-3575: It allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
https://github.com/schettino72/sqla_yaml_fixtures/issues/20 | what vulnarability does sqla-yaml-fixtures version equal to 0.9.1 have | |
Having vulnarability PVE-2022-51758 Advisory: Sqlachemy is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlachemy version greather then 0 have ### Response: Having vulnarability PVE-2022-51758 Advisory: Sqlachemy is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does sqlachemy version greather then 0 have | |
Having vulnarability PVE-2022-51759 Advisory: Sqlalcemy is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlalcemy version greather then 0 have ### Response: Having vulnarability PVE-2022-51759 Advisory: Sqlalcemy is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does sqlalcemy version greather then 0 have | |
Having vulnarability CVE-2012-0805 Advisory: Sqlalchemy 0.7.0 includes a fix for CVE-2012-0805: Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function.
https://docs.sqlalchemy.org/en/20/changelog/changelog_07.html#change-0.7.0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlalchemy version less then 0.7.0 have ### Response: Having vulnarability CVE-2012-0805 Advisory: Sqlalchemy 0.7.0 includes a fix for CVE-2012-0805: Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function.
https://docs.sqlalchemy.org/en/20/changelog/changelog_07.html#change-0.7.0 | what vulnarability does sqlalchemy version less then 0.7.0 have | |
Having vulnarability CVE-2019-11236 Advisory: Sqlalchemy-cockroachdb 1.3.0 updates 'urllib3' to v1.25.3 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlalchemy-cockroachdb version less then 1.3.0 have ### Response: Having vulnarability CVE-2019-11236 Advisory: Sqlalchemy-cockroachdb 1.3.0 updates 'urllib3' to v1.25.3 to include security fixes. | what vulnarability does sqlalchemy-cockroachdb version less then 1.3.0 have | |
Having vulnarability PVE-2021-42194 Advisory: Sqlalchemy-utils from version 0.27.0 'EncryptedType' uses by default AES with CBC mode. The IV that it uses is not random though.
https://github.com/kvesteri/sqlalchemy-utils/issues/166
https://github.com/kvesteri/sqlalchemy-utils/pull/499 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlalchemy-utils version greather then equal to 0.27.0 have ### Response: Having vulnarability PVE-2021-42194 Advisory: Sqlalchemy-utils from version 0.27.0 'EncryptedType' uses by default AES with CBC mode. The IV that it uses is not random though.
https://github.com/kvesteri/sqlalchemy-utils/issues/166
https://github.com/kvesteri/sqlalchemy-utils/pull/499 | what vulnarability does sqlalchemy-utils version greather then equal to 0.27.0 have | |
Having vulnarability CVE-2019-11324 Advisory: Sqlathanor 0.5.0 updates its dependency 'urllib3' to v1.24.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlathanor version less then 0.5.0 have ### Response: Having vulnarability CVE-2019-11324 Advisory: Sqlathanor 0.5.0 updates its dependency 'urllib3' to v1.24.2 to include a security fix. | what vulnarability does sqlathanor version less then 0.5.0 have | |
Having vulnarability PVE-2023-61367 Advisory: Sqlean.py 0.21.8 updates the 'define' extension with fixes from sqlite-statement-vtab, including a potential vulnerability on platforms with uncommon integer sizes.
https://github.com/0x09/sqlite-statement-vtab/commit/400bea16a314bb3994c3912a6639f488af98e9e0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlean.py version less then 0.21.8 have ### Response: Having vulnarability PVE-2023-61367 Advisory: Sqlean.py 0.21.8 updates the 'define' extension with fixes from sqlite-statement-vtab, including a potential vulnerability on platforms with uncommon integer sizes.
https://github.com/0x09/sqlite-statement-vtab/commit/400bea16a314bb3994c3912a6639f488af98e9e0 | what vulnarability does sqlean.py version less then 0.21.8 have | |
Having vulnarability PVE-2021-38270 Advisory: Sqlfluff 0.3.2 moves to `SandboxedEnvironment` rather than `Environment` for jinja templating for security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlfluff version less then 0.3.2 have ### Response: Having vulnarability PVE-2021-38270 Advisory: Sqlfluff 0.3.2 moves to `SandboxedEnvironment` rather than `Environment` for jinja templating for security. | what vulnarability does sqlfluff version less then 0.3.2 have | |
Having vulnarability PVE-2023-99925 Advisory: Sqlite-rx 1.2.0 updates its dependency 'tornado' to v6.3.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlite-rx version less then 1.2.0 have ### Response: Having vulnarability PVE-2023-99925 Advisory: Sqlite-rx 1.2.0 updates its dependency 'tornado' to v6.3.3 to include a security fix. | what vulnarability does sqlite-rx version less then 1.2.0 have | |
Having vulnarability CVE-2021-23404 Advisory: This affects all versions of the package sqlite-web. The SQL dashboard area allows sensitive actions to be performed without validating that the request originated from the application. This could enable an attacker to trick a user into performing these actions unknowingly through a Cross Site Request Forgery (CSRF) attack. See CVE-2021-23404.
https://github.com/coleifer/sqlite-web/blob/2e7c85da3d37f80074ed3ae39b5851069b4f301c/sqlite_web/__main__.py%23L1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlite-web version greather then equal to 0 have ### Response: Having vulnarability CVE-2021-23404 Advisory: This affects all versions of the package sqlite-web. The SQL dashboard area allows sensitive actions to be performed without validating that the request originated from the application. This could enable an attacker to trick a user into performing these actions unknowingly through a Cross Site Request Forgery (CSRF) attack. See CVE-2021-23404.
https://github.com/coleifer/sqlite-web/blob/2e7c85da3d37f80074ed3ae39b5851069b4f301c/sqlite_web/__main__.py%23L1 | what vulnarability does sqlite-web version greather then equal to 0 have | |
Having vulnarability PVE-2023-59534 Advisory: Sqlmesh 0.1.0 includes a fix for a Race Condition vulnerability that happens during SQLMesh schema creation in the Airflow plugin.
https://github.com/TobikoData/sqlmesh/pull/332 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlmesh version less then 0.1.0 have ### Response: Having vulnarability PVE-2023-59534 Advisory: Sqlmesh 0.1.0 includes a fix for a Race Condition vulnerability that happens during SQLMesh schema creation in the Airflow plugin.
https://github.com/TobikoData/sqlmesh/pull/332 | what vulnarability does sqlmesh version less then 0.1.0 have | |
Having vulnarability PVE-2024-67887 Advisory: Sqlparse 0.5.0 addresses a potential denial of service (DoS) vulnerability related to recursion errors in deeply nested SQL statements. To mitigate this issue, the update replaces recursion errors with a general SQLParseError, improving the resilience and stability of the parsing process. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sqlparse version less then 0.5.0 have ### Response: Having vulnarability PVE-2024-67887 Advisory: Sqlparse 0.5.0 addresses a potential denial of service (DoS) vulnerability related to recursion errors in deeply nested SQL statements. To mitigate this issue, the update replaces recursion errors with a general SQLParseError, improving the resilience and stability of the parsing process. | what vulnarability does sqlparse version less then 0.5.0 have | |
Having vulnarability CVE-2023-4863 Advisory: Srmd-ncnn-vulkan-python 1.0.1 throughout 1.0.2 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/srmd-ncnn-vulkan-python/1.0.2/packages/1d/25/a626ad22548228cc72ad12f8b00bca017998783b6c3bbd4f62a253815707/srmd-ncnn-vulkan-python-1.0.2.tar.gz/srmd-ncnn-vulkan-python-1.0.2/srmd_ncnn_vulkan_python/srmd-ncnn-vulkan/src/libwebp/ChangeLog | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does srmd-ncnn-vulkan-python version greather then 1.0.0,less then equal to 1.0.2 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Srmd-ncnn-vulkan-python 1.0.1 throughout 1.0.2 ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/srmd-ncnn-vulkan-python/1.0.2/packages/1d/25/a626ad22548228cc72ad12f8b00bca017998783b6c3bbd4f62a253815707/srmd-ncnn-vulkan-python-1.0.2.tar.gz/srmd-ncnn-vulkan-python-1.0.2/srmd_ncnn_vulkan_python/srmd-ncnn-vulkan/src/libwebp/ChangeLog | what vulnarability does srmd-ncnn-vulkan-python version greather then 1.0.0,less then equal to 1.0.2 have | |
Having vulnarability CVE-2021-4286 Advisory: A vulnerability, which was classified as problematic, has been found in cocagne pysrp up to 1.0.16. This issue affects the function calculate_x of the file srp/_ctsrp.py. The manipulation leads to information exposure through discrepancy. Upgrading to version 1.0.17 can address this issue. The name of the patch is dba52642f5e95d3da7af1780561213ee6053195f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216875. Alias: PYSEC-2022-43014 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does srp version greather then equal to 0,less then 1.0.17 have ### Response: Having vulnarability CVE-2021-4286 Advisory: A vulnerability, which was classified as problematic, has been found in cocagne pysrp up to 1.0.16. This issue affects the function calculate_x of the file srp/_ctsrp.py. The manipulation leads to information exposure through discrepancy. Upgrading to version 1.0.17 can address this issue. The name of the patch is dba52642f5e95d3da7af1780561213ee6053195f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216875. Alias: PYSEC-2022-43014 | what vulnarability does srp version greather then equal to 0,less then 1.0.17 have | |
Having vulnarability CVE-2021-45958 Advisory: Srsly 2.4.3 includes a fix for a CVE-2021-45958.
https://github.com/advisories/GHSA-fh56-85cw-5pq6
https://github.com/explosion/srsly/commit/6479497df8b7f4f92bf05399a0bc4548dc2eaacc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does srsly version less then 2.4.3 have ### Response: Having vulnarability CVE-2021-45958 Advisory: Srsly 2.4.3 includes a fix for a CVE-2021-45958.
https://github.com/advisories/GHSA-fh56-85cw-5pq6
https://github.com/explosion/srsly/commit/6479497df8b7f4f92bf05399a0bc4548dc2eaacc | what vulnarability does srsly version less then 2.4.3 have | |
Having vulnarability PVE-2021-38046 Advisory: Ssh-audit 2.2.0 re-classifies the very common `ssh-rsa` host key type as weak, due to practical SHA-1 attacks - see https://eprint.iacr.org/2020/014.pdf | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ssh-audit version less then 2.2.0 have ### Response: Having vulnarability PVE-2021-38046 Advisory: Ssh-audit 2.2.0 re-classifies the very common `ssh-rsa` host key type as weak, due to practical SHA-1 attacks - see https://eprint.iacr.org/2020/014.pdf | what vulnarability does ssh-audit version less then 2.2.0 have | |
Having vulnarability PVE-2022-45471 Advisory: Ssh-decorate was compromised. Versions 0.28 through 0.31 were backdoored to steal SSH Credentials.
https://www.bleepingcomputer.com/news/security/backdoored-python-library-caught-stealing-ssh-credentials/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ssh-decorate version greather then equal to 0.28,less then equal to 0.31 have ### Response: Having vulnarability PVE-2022-45471 Advisory: Ssh-decorate was compromised. Versions 0.28 through 0.31 were backdoored to steal SSH Credentials.
https://www.bleepingcomputer.com/news/security/backdoored-python-library-caught-stealing-ssh-credentials/ | what vulnarability does ssh-decorate version greather then equal to 0.28,less then equal to 0.31 have | |
Having vulnarability PVE-2021-39436 Advisory: ssh-mitm before 0.3.11 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ssh-mitm version less then 0.3.11 have ### Response: Having vulnarability PVE-2021-39436 Advisory: ssh-mitm before 0.3.11 | what vulnarability does ssh-mitm version less then 0.3.11 have | |
Having vulnarability PVE-2021-38197 Advisory: Sslyze 3.0.2 improves the check for HTTP security headers by adding support for HTTP redirections. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sslyze version less then 3.0.2 have ### Response: Having vulnarability PVE-2021-38197 Advisory: Sslyze 3.0.2 improves the check for HTTP security headers by adding support for HTTP redirections. | what vulnarability does sslyze version less then 3.0.2 have | |
Having vulnarability CVE-2021-28667 Advisory: StackStorm before 3.4.1, in some situations, has an infinite loop that consumes all available memory and disk space. This can occur if Python 3.x is used, the locale is not utf-8, and there is an attempt to log Unicode data (from an action or rule name). See CVE-2021-28667. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does st2client version less then 3.4.1 have ### Response: Having vulnarability CVE-2021-28667 Advisory: StackStorm before 3.4.1, in some situations, has an infinite loop that consumes all available memory and disk space. This can occur if Python 3.x is used, the locale is not utf-8, and there is an attempt to log Unicode data (from an action or rule name). See CVE-2021-28667. | what vulnarability does st2client version less then 3.4.1 have | |
Having vulnarability PVE-2023-61073 Advisory: Stanza 1.4.1 includes a fix for a catastrophic backtracking vulnerability.
https://github.com/stanfordnlp/stanza/pull/1056 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stanza version less then 1.4.1 have ### Response: Having vulnarability PVE-2023-61073 Advisory: Stanza 1.4.1 includes a fix for a catastrophic backtracking vulnerability.
https://github.com/stanfordnlp/stanza/pull/1056 | what vulnarability does stanza version less then 1.4.1 have | |
Having vulnarability PVE-2021-26967 Advisory: Starcluster-openstack | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does starcluster-openstack version less then 0.94.7 have ### Response: Having vulnarability PVE-2021-26967 Advisory: Starcluster-openstack | what vulnarability does starcluster-openstack version less then 0.94.7 have | |
Having vulnarability PVE-2021-26143 Advisory: stargate before 0.4 has several undisclosed security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stargate version less then 0.4 have ### Response: Having vulnarability PVE-2021-26143 Advisory: stargate before 0.4 has several undisclosed security vulnerabilities. | what vulnarability does stargate version less then 0.4 have | |
Having vulnarability CVE-2021-43572 Advisory: The verify function in the Stark Bank Python ECDSA library (aka starkbank-escada or ecdsa-python) before 2.0.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does starkbank-ecdsa version less then 2.0.1 have ### Response: Having vulnarability CVE-2021-43572 Advisory: The verify function in the Stark Bank Python ECDSA library (aka starkbank-escada or ecdsa-python) before 2.0.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | what vulnarability does starkbank-ecdsa version less then 2.0.1 have | |
Having vulnarability PVE-2022-51030 Advisory: Starknet-py 0.3.1alpha adds compiled OZ contract with patched security hole (reentrancy).
https://github.com/OpenZeppelin/cairo-contracts/issues/344
https://github.com/software-mansion/starknet.py/pull/195 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does starknet-py version less then 0.3.1alpha have ### Response: Having vulnarability PVE-2022-51030 Advisory: Starknet-py 0.3.1alpha adds compiled OZ contract with patched security hole (reentrancy).
https://github.com/OpenZeppelin/cairo-contracts/issues/344
https://github.com/software-mansion/starknet.py/pull/195 | what vulnarability does starknet-py version less then 0.3.1alpha have | |
Having vulnarability PVE-2023-59444 Advisory: Starlette 0.13.5 includes a fix for a Path Traversal vulnerability.
#NOTE: This vulnerability affects only users of Windows.
https://github.com/encode/starlette/issues/981 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does starlette version less then 0.13.5 have ### Response: Having vulnarability PVE-2023-59444 Advisory: Starlette 0.13.5 includes a fix for a Path Traversal vulnerability.
#NOTE: This vulnerability affects only users of Windows.
https://github.com/encode/starlette/issues/981 | what vulnarability does starlette version less then 0.13.5 have | |
Having vulnarability PVE-2023-58713 Advisory: Starlette-bridge 0.2.0 updates its dependency 'Starlette' to versions '>=0.27.0' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does starlette-bridge version less then 0.2.0 have ### Response: Having vulnarability PVE-2023-58713 Advisory: Starlette-bridge 0.2.0 updates its dependency 'Starlette' to versions '>=0.27.0' to include a security fix. | what vulnarability does starlette-bridge version less then 0.2.0 have | |
Having vulnarability PVE-2022-51456 Advisory: Starlite 1.28.0 adds CSRF protection to templates.
https://github.com/starlite-api/starlite/pull/598 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does starlite version less then 1.28.0 have ### Response: Having vulnarability PVE-2022-51456 Advisory: Starlite 1.28.0 adds CSRF protection to templates.
https://github.com/starlite-api/starlite/pull/598 | what vulnarability does starlite version less then 1.28.0 have | |
Having vulnarability CVE-2007-4559 Advisory: Starwhale 0.3.1 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does starwhale version less then 0.3.1 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Starwhale 0.3.1 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. | what vulnarability does starwhale version less then 0.3.1 have | |
Having vulnarability PVE-2022-49624 Advisory: Statsservice 0.5.0 prevents the creation of new admin users (even by an admin).
https://github.com/monarc-project/stats-service/commit/257c16fed890bda8974594238a743f8afda0ff5a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does statsservice version less then 0.5.0 have ### Response: Having vulnarability PVE-2022-49624 Advisory: Statsservice 0.5.0 prevents the creation of new admin users (even by an admin).
https://github.com/monarc-project/stats-service/commit/257c16fed890bda8974594238a743f8afda0ff5a | what vulnarability does statsservice version less then 0.5.0 have | |
Having vulnarability CVE-2019-10906 Advisory: Staty 1.2.3 updates its dependency 'jinja2' to v2.10.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does staty version less then 1.2.3 have ### Response: Having vulnarability CVE-2019-10906 Advisory: Staty 1.2.3 updates its dependency 'jinja2' to v2.10.1 to include a security fix. | what vulnarability does staty version less then 1.2.3 have | |
Having vulnarability CVE-2019-17180 Advisory: Valve Steam Client before 2019-09-12 allows placing or appending partially controlled filesystem content, as demonstrated by file modifications on Windows in the context of NT AUTHORITY\SYSTEM. This could lead to denial of service, elevation of privilege, or unspecified other impact. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does steam version greather then equal to 0,less then 2019-09-12 have ### Response: Having vulnarability CVE-2019-17180 Advisory: Valve Steam Client before 2019-09-12 allows placing or appending partially controlled filesystem content, as demonstrated by file modifications on Windows in the context of NT AUTHORITY\SYSTEM. This could lead to denial of service, elevation of privilege, or unspecified other impact. | what vulnarability does steam version greather then equal to 0,less then 2019-09-12 have | |
Having vulnarability CVE-2018-18074 Advisory: Stegano 0.8.6 updates 'requests' version due to a vulnerability found in versions 2.19 and below. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stegano version less then 0.8.6 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Stegano 0.8.6 updates 'requests' version due to a vulnerability found in versions 2.19 and below. | what vulnarability does stegano version less then 0.8.6 have | |
Having vulnarability CVE-2022-45907 Advisory: Stepcount 2.1.1 updates its dependency 'torch' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stepcount version less then 2.1.1 have ### Response: Having vulnarability CVE-2022-45907 Advisory: Stepcount 2.1.1 updates its dependency 'torch' to include a security fix. | what vulnarability does stepcount version less then 2.1.1 have | |
Having vulnarability PVE-2021-37046 Advisory: Stomp.py 4.1.22 reduces verbosity in logging to not include headers unless debug level is turned on. This is a potential Information Disclosure vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stomp-py version less then 4.1.22 have ### Response: Having vulnarability PVE-2021-37046 Advisory: Stomp.py 4.1.22 reduces verbosity in logging to not include headers unless debug level is turned on. This is a potential Information Disclosure vulnerability. | what vulnarability does stomp-py version less then 4.1.22 have | |
Having vulnarability CVE-2021-21330 Advisory: Storey 0.10.1 updates its dependency 'aiohttp' to v3.7.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does storey version less then 0.10.1 have ### Response: Having vulnarability CVE-2021-21330 Advisory: Storey 0.10.1 updates its dependency 'aiohttp' to v3.7.4 to include a security fix. | what vulnarability does storey version less then 0.10.1 have | |
Having vulnarability PVE-2021-38611 Advisory: Stork 3.0.1 includes re-compiled dependencies to fix a security issue in a pinned dependency. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stork version less then 3.0.1 have ### Response: Having vulnarability PVE-2021-38611 Advisory: Stork 3.0.1 includes re-compiled dependencies to fix a security issue in a pinned dependency. | what vulnarability does stork version less then 3.0.1 have | |
Having vulnarability PVE-2021-26145 Advisory: Stormpath before 2.5.0 doesn't validate JWT correctly.
https://github.com/stormpath/stormpath-sdk-python/commit/1289135cd5bb73705297bf64cb7897c6f6e457b0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stormpath version less then 2.5.0 have ### Response: Having vulnarability PVE-2021-26145 Advisory: Stormpath before 2.5.0 doesn't validate JWT correctly.
https://github.com/stormpath/stormpath-sdk-python/commit/1289135cd5bb73705297bf64cb7897c6f6e457b0 | what vulnarability does stormpath version less then 2.5.0 have | |
Having vulnarability PVE-2021-26146 Advisory: Stormpath-sdk before 2.5.0 doesn't validate JWT correctly.
https://github.com/stormpath/stormpath-sdk-python/commit/1289135cd5bb73705297bf64cb7897c6f6e457b0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stormpath-sdk version less then 2.5.0 have ### Response: Having vulnarability PVE-2021-26146 Advisory: Stormpath-sdk before 2.5.0 doesn't validate JWT correctly.
https://github.com/stormpath/stormpath-sdk-python/commit/1289135cd5bb73705297bf64cb7897c6f6e457b0 | what vulnarability does stormpath-sdk version less then 2.5.0 have | |
Having vulnarability PVE-2022-51116 Advisory: Strawberry-django-auth 0.3.4.2 removes 'users' query due to security concerns. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does strawberry-django-auth version less then 0.3.4.2 have ### Response: Having vulnarability PVE-2022-51116 Advisory: Strawberry-django-auth 0.3.4.2 removes 'users' query due to security concerns. | what vulnarability does strawberry-django-auth version less then 0.3.4.2 have | |
Having vulnarability PVE-2023-59592 Advisory: Strawberry-graphql 0.193.0 includes a fix for a Race Condition vulnerability.
https://github.com/strawberry-graphql/strawberry/pull/2856 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does strawberry-graphql version less then 0.193.0 have ### Response: Having vulnarability PVE-2023-59592 Advisory: Strawberry-graphql 0.193.0 includes a fix for a Race Condition vulnerability.
https://github.com/strawberry-graphql/strawberry/pull/2856 | what vulnarability does strawberry-graphql version less then 0.193.0 have | |
Having vulnarability CVE-2021-3749 Advisory: Stream-unzip 0.0.90 fixes its dependency version for localtunnel at 2.0.2 specifically to mitigate the security risk posed by the axios vulnerability, designated as CVE-2021-3749.
https://github.com/uktrade/stream-unzip/pull/75/commits/1e75270050a1752ceb82ec26accc0a10e6cf4a0a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stream-unzip version less then 0.0.90 have ### Response: Having vulnarability CVE-2021-3749 Advisory: Stream-unzip 0.0.90 fixes its dependency version for localtunnel at 2.0.2 specifically to mitigate the security risk posed by the axios vulnerability, designated as CVE-2021-3749.
https://github.com/uktrade/stream-unzip/pull/75/commits/1e75270050a1752ceb82ec26accc0a10e6cf4a0a | what vulnarability does stream-unzip version less then 0.0.90 have | |
Having vulnarability CVE-2023-45857 Advisory: Stream-zip version 0.0.71 updates its localtunnel dependency to version 2.0.2. This change is implemented to mitigate the security risks associated with the axios vulnerability CVE-2023-45857.
https://github.com/uktrade/stream-zip/pull/107/commits/4ac7d1037ed62f0095d7a91937a48e30bcc6acb2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stream-zip version less then 0.0.71 have ### Response: Having vulnarability CVE-2023-45857 Advisory: Stream-zip version 0.0.71 updates its localtunnel dependency to version 2.0.2. This change is implemented to mitigate the security risks associated with the axios vulnerability CVE-2023-45857.
https://github.com/uktrade/stream-zip/pull/107/commits/4ac7d1037ed62f0095d7a91937a48e30bcc6acb2 | what vulnarability does stream-zip version less then 0.0.71 have | |
Having vulnarability PVE-2024-64310 Advisory: Streamlink 5.3.0 fixes a race condition that was present in the DASH stream implementation, where queued segments were being downloaded even after the stream had been closed. This was addressed by ensuring that the downloading of segments is properly stopped when a stream is closed, preventing unnecessary network traffic and potential errors.
https://github.com/streamlink/streamlink/commit/498efd523c10672d3c2224b71bb513e0907bbe6e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does streamlink version less then 5.3.0 have ### Response: Having vulnarability PVE-2024-64310 Advisory: Streamlink 5.3.0 fixes a race condition that was present in the DASH stream implementation, where queued segments were being downloaded even after the stream had been closed. This was addressed by ensuring that the downloading of segments is properly stopped when a stream is closed, preventing unnecessary network traffic and potential errors.
https://github.com/streamlink/streamlink/commit/498efd523c10672d3c2224b71bb513e0907bbe6e | what vulnarability does streamlink version less then 5.3.0 have | |
Having vulnarability PVE-2021-38121 Advisory: The `server.address` config option in streamlit 0.57.0 binds the server to that address for added security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does streamlit version less then 0.57.0 have ### Response: Having vulnarability PVE-2021-38121 Advisory: The `server.address` config option in streamlit 0.57.0 binds the server to that address for added security. | what vulnarability does streamlit version less then 0.57.0 have | |
Having vulnarability CVE-2022-46175 Advisory: Streamlit-webrtc 0.44.2 updates its NPM dependency 'json5' to v1.0.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does streamlit-webrtc version less then 0.44.2 have ### Response: Having vulnarability CVE-2022-46175 Advisory: Streamlit-webrtc 0.44.2 updates its NPM dependency 'json5' to v1.0.2 to include a security fix. | what vulnarability does streamlit-webrtc version less then 0.44.2 have | |
Having vulnarability PVE-2021-36807 Advisory: streamsx-kafka 1.5.1 - resolves security vulnerabilities in third-party libs | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does streamsx-kafka version less then 1.5.1 have ### Response: Having vulnarability PVE-2021-36807 Advisory: streamsx-kafka 1.5.1 - resolves security vulnerabilities in third-party libs | what vulnarability does streamsx-kafka version less then 1.5.1 have | |
Having vulnarability CVE-2018-10237 Advisory: Streamsx.messagehub 1.5.1 removes 'guava API' usage because it is vulnerable to CVE-2018-10237. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does streamsx-messagehub version less then 1.5.1 have ### Response: Having vulnarability CVE-2018-10237 Advisory: Streamsx.messagehub 1.5.1 removes 'guava API' usage because it is vulnerable to CVE-2018-10237. | what vulnarability does streamsx-messagehub version less then 1.5.1 have | |
Having vulnarability PVE-2021-36618 Advisory: streamsx-objectstorage 1.7.2 resolves security vulnerabilities in third-party libs #135 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does streamsx-objectstorage version less then 1.7.0 have ### Response: Having vulnarability PVE-2021-36618 Advisory: streamsx-objectstorage 1.7.2 resolves security vulnerabilities in third-party libs #135 | what vulnarability does streamsx-objectstorage version less then 1.7.0 have | |
Having vulnarability PVE-2023-60227 Advisory: Streamsync 0.1.12 includes a fix for a Drive-by Attack vulnerability. A drive-by attack refers to a cyberattack in which a malicious script causes a program to download and install itself on a user's device, without explicit permission from the user.
https://github.com/streamsync-cloud/streamsync/commit/d92da4d75e1f2be833dfea391bc2a29856cf1974 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does streamsync version less then 0.1.12 have ### Response: Having vulnarability PVE-2023-60227 Advisory: Streamsync 0.1.12 includes a fix for a Drive-by Attack vulnerability. A drive-by attack refers to a cyberattack in which a malicious script causes a program to download and install itself on a user's device, without explicit permission from the user.
https://github.com/streamsync-cloud/streamsync/commit/d92da4d75e1f2be833dfea391bc2a29856cf1974 | what vulnarability does streamsync version less then 0.1.12 have | |
Having vulnarability PVE-2022-51676 Advisory: Strinfer is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does strinfer version greather then 0 have ### Response: Having vulnarability PVE-2022-51676 Advisory: Strinfer is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does strinfer version greather then 0 have | |
Having vulnarability PVE-2022-51687 Advisory: Stringe is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stringe version greather then 0 have ### Response: Having vulnarability PVE-2022-51687 Advisory: Stringe is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does stringe version greather then 0 have | |
Having vulnarability PVE-2022-51971 Advisory: Structlog-sentry-logger 0.18.0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does structlog-sentry-logger version less then 0.18.0 have ### Response: Having vulnarability PVE-2022-51971 Advisory: Structlog-sentry-logger 0.18.0 | what vulnarability does structlog-sentry-logger version less then 0.18.0 have | |
Having vulnarability CVE-2021-44228 Advisory: Stupidb 6.1.0 updates its dependency 'nixpkgs' to fix a critical vulnerability.
https://github.com/cpcloud/stupidb/pull/172/commits/8833da5cfdd26e94ceff43e6b8ea0615a9e03f5e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does stupidb version less then 6.1.0 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Stupidb 6.1.0 updates its dependency 'nixpkgs' to fix a critical vulnerability.
https://github.com/cpcloud/stupidb/pull/172/commits/8833da5cfdd26e94ceff43e6b8ea0615a9e03f5e | what vulnarability does stupidb version less then 6.1.0 have | |
Having vulnarability PVE-2023-52938 Advisory: Style.py is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does style.py version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52938 Advisory: Style.py is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | what vulnarability does style.py version greather then equal to 0 have | |
Having vulnarability CVE-2017-11424 Advisory: Suap-notifica-govbr 4.7.1 updates its dependency 'PyJWT' to v1.5.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does suap-notifica-govbr version less then 4.7.1 have ### Response: Having vulnarability CVE-2017-11424 Advisory: Suap-notifica-govbr 4.7.1 updates its dependency 'PyJWT' to v1.5.1 to include a security fix. | what vulnarability does suap-notifica-govbr version less then 4.7.1 have | |
Having vulnarability PVE-2021-38835 Advisory: Substra 0.0.19 fixes a vulnerability in lodash. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does substra version less then 0.0.19 have ### Response: Having vulnarability PVE-2021-38835 Advisory: Substra 0.0.19 fixes a vulnerability in lodash. | what vulnarability does substra version less then 0.0.19 have | |
Having vulnarability PVE-2023-60537 Advisory: Substrate-interface 1.1.5 includes a fix for a Race Condition vulnerability.
https://github.com/polkascan/py-substrate-interface/commit/a13577e45350b1df9b451bb16f5c221f57bf9c65 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does substrate-interface version less then 1.1.5 have ### Response: Having vulnarability PVE-2023-60537 Advisory: Substrate-interface 1.1.5 includes a fix for a Race Condition vulnerability.
https://github.com/polkascan/py-substrate-interface/commit/a13577e45350b1df9b451bb16f5c221f57bf9c65 | what vulnarability does substrate-interface version less then 1.1.5 have | |
Having vulnarability CVE-2013-2217 Advisory: Suds 0.7.0 includes a fix for CVE-2013-2217, a 'FileCache' default cache location security issue found in the original suds project. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does suds version less then 0.7.0 have ### Response: Having vulnarability CVE-2013-2217 Advisory: Suds 0.7.0 includes a fix for CVE-2013-2217, a 'FileCache' default cache location security issue found in the original suds project. | what vulnarability does suds version less then 0.7.0 have | |
Having vulnarability PVE-2021-40552 Advisory: suds-community 0.7.0 fixes `FileCache` default cache location related security issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does suds-community version less then 0.7.0 have ### Response: Having vulnarability PVE-2021-40552 Advisory: suds-community 0.7.0 fixes `FileCache` default cache location related security issue. | what vulnarability does suds-community version less then 0.7.0 have | |
Having vulnarability PVE-2022-45451 Advisory: Suffer is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does suffer version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45451 Advisory: Suffer is a malicious package, typosquatting. "The aforementioned package could be abused to become an entry point for more sophisticated threats, enabling the attacker to execute remote code on the target machine, amass system information, plunder credit card information and passwords auto-saved in Chrome and Edge browsers, and even steal Discord authentication tokens to impersonate the victim".
https://thehackernews.com/2021/07/several-malicious-typosquatted-python.html | what vulnarability does suffer version greather then 0,less then 0 have | |
Having vulnarability CVE-2021-41945 Advisory: Supabase 0.7.1 updates its dependency 'httpx' to v0.23.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does supabase version less then 0.7.1 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Supabase 0.7.1 updates its dependency 'httpx' to v0.23.0 to include a security fix. | what vulnarability does supabase version less then 0.7.1 have | |
Having vulnarability CVE-2022-25882 Advisory: Super-gradients 3.6.1 updates its ONNX dependency to version 1.16 to address a directory traversal vulnerability found in versions up to 1.15.0. This vulnerability allowed unauthorized access to files outside the intended directories due to an exploitable external_data field in tensor proto, circumventing previous fixes made for CVE-2022-25882. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does super-gradients version less then 3.6.1 have ### Response: Having vulnarability CVE-2022-25882 Advisory: Super-gradients 3.6.1 updates its ONNX dependency to version 1.16 to address a directory traversal vulnerability found in versions up to 1.15.0. This vulnerability allowed unauthorized access to files outside the intended directories due to an exploitable external_data field in tensor proto, circumventing previous fixes made for CVE-2022-25882. | what vulnarability does super-gradients version less then 3.6.1 have | |
Having vulnarability PVE-2021-39688 Advisory: Superdesk-planning 2.0.2 includes a security patch which requires authentication for all API endpoints. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does superdesk-planning version less then 2.0.2 have ### Response: Having vulnarability PVE-2021-39688 Advisory: Superdesk-planning 2.0.2 includes a security patch which requires authentication for all API endpoints. | what vulnarability does superdesk-planning version less then 2.0.2 have | |
Having vulnarability PVE-2021-26147 Advisory: Superset 0.11.0 prevents XSS on FAB list views.
https://github.com/apache/superset/pull/1125 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does superset version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-26147 Advisory: Superset 0.11.0 prevents XSS on FAB list views.
https://github.com/apache/superset/pull/1125 | what vulnarability does superset version less then 0.11.0 have | |
Having vulnarability CVE-2017-18214 Advisory: Superset-tddv (superset fork) 0.15.2 and prior have dependencies with known vulnerabilities (moment). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does superset-tddv version less then equal to 0.15.2 have ### Response: Having vulnarability CVE-2017-18214 Advisory: Superset-tddv (superset fork) 0.15.2 and prior have dependencies with known vulnerabilities (moment). | what vulnarability does superset-tddv version less then equal to 0.15.2 have | |
Having vulnarability CVE-2019-12105 Advisory: A vulnerability in Supervisor up to version 4.0.2 allows an unauthenticated user to read log files or restart a service when the inet_http_server component is enabled without a password. While this component is not activated by default, failure to secure it with a password, despite logged warnings and documentation advisories, exposes the system to unauthorized access. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does supervisor version greather then equal to 0,less then 4.0.3 have ### Response: Having vulnarability CVE-2019-12105 Advisory: A vulnerability in Supervisor up to version 4.0.2 allows an unauthenticated user to read log files or restart a service when the inet_http_server component is enabled without a password. While this component is not activated by default, failure to secure it with a password, despite logged warnings and documentation advisories, exposes the system to unauthorized access. | what vulnarability does supervisor version greather then equal to 0,less then 4.0.3 have | |
Having vulnarability CVE-2018-1000167 Advisory: OISF suricata-update version 1.0.0a1 contains an Insecure Deserialization vulnerability in the insecure yaml.load-Function as used in the following files: config.py:136, config.py:142, sources.py:99 and sources.py:131. The "list-sources"-command is affected by this bug. that can result in Remote Code Execution(even as root if suricata-update is called by root). This attack appears to be exploitable via a specially crafted yaml-file at https://www.openinfosecfoundation.org/rules/index.yaml. This vulnerability appears to have been fixed in 1.0.0b1. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does suricata-update version greather then equal to 0,less then 1.0.0b1 have ### Response: Having vulnarability CVE-2018-1000167 Advisory: OISF suricata-update version 1.0.0a1 contains an Insecure Deserialization vulnerability in the insecure yaml.load-Function as used in the following files: config.py:136, config.py:142, sources.py:99 and sources.py:131. The "list-sources"-command is affected by this bug. that can result in Remote Code Execution(even as root if suricata-update is called by root). This attack appears to be exploitable via a specially crafted yaml-file at https://www.openinfosecfoundation.org/rules/index.yaml. This vulnerability appears to have been fixed in 1.0.0b1. | what vulnarability does suricata-update version greather then equal to 0,less then 1.0.0b1 have | |
Having vulnarability CVE-2022-44020 Advisory: Sushy-tools 0.21.1 includes a fix for CVE-2022-44020: An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain. NOTE: this only affects an "unsupported, production-like configuration." | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sushy-tools version less then equal to 0.21.0 have ### Response: Having vulnarability CVE-2022-44020 Advisory: Sushy-tools 0.21.1 includes a fix for CVE-2022-44020: An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain. NOTE: this only affects an "unsupported, production-like configuration." | what vulnarability does sushy-tools version less then equal to 0.21.0 have | |
Having vulnarability PVE-2022-51673 Advisory: Sutiltype is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sutiltype version greather then 0 have ### Response: Having vulnarability PVE-2022-51673 Advisory: Sutiltype is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does sutiltype version greather then 0 have | |
Having vulnarability CVE-2023-32681 Advisory: Sv-dlp 2023.11.12 updates its dependency 'requests' to v2.31.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sv-dlp version less then 2023.11.12 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Sv-dlp 2023.11.12 updates its dependency 'requests' to v2.31.0 to include a security fix. | what vulnarability does sv-dlp version less then 2023.11.12 have | |
Having vulnarability CVE-2023-4863 Advisory: Svgdigitizer version 0.11.0 upgrades its Pillow dependency, which may introduce compatibility issues with macOS.
https://github.com/echemdb/svgdigitizer/commit/d9c6d5773d9e568b2cd7c96f3800ca49c3b8a384 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does svgdigitizer version less then 0.11.0 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Svgdigitizer version 0.11.0 upgrades its Pillow dependency, which may introduce compatibility issues with macOS.
https://github.com/echemdb/svgdigitizer/commit/d9c6d5773d9e568b2cd7c96f3800ca49c3b8a384 | what vulnarability does svgdigitizer version less then 0.11.0 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.