output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability PVE-2023-60490 Advisory: Svgelements 1.7.0 includes a fix for a ReDoS vulnerability. https://github.com/meerk40t/svgelements/commit/fad014e37c32481ab29d760780816f2c0b7f004e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does svgelements version less then 1.7.0 have ### Response: Having vulnarability PVE-2023-60490 Advisory: Svgelements 1.7.0 includes a fix for a ReDoS vulnerability. https://github.com/meerk40t/svgelements/commit/fad014e37c32481ab29d760780816f2c0b7f004e
what vulnarability does svgelements version less then 1.7.0 have
Having vulnarability CVE-2020-10799 Advisory: The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call. See: CVE-2020-10799.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does svglib version less then equal to 0.9.3 have ### Response: Having vulnarability CVE-2020-10799 Advisory: The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call. See: CVE-2020-10799.
what vulnarability does svglib version less then equal to 0.9.3 have
Having vulnarability CVE-2022-0235 Advisory: Svix 0.43.2 updates its JS dependency 'node-fetch' to v2.6.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does svix version less then 0.43.2 have ### Response: Having vulnarability CVE-2022-0235 Advisory: Svix 0.43.2 updates its JS dependency 'node-fetch' to v2.6.7 to include a security fix.
what vulnarability does svix version less then 0.43.2 have
Having vulnarability CVE-2021-25290 Advisory: Svmbir 0.2.3 updates its dependency 'Pillow' to v8.2.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does svmbir version less then 0.2.3 have ### Response: Having vulnarability CVE-2021-25290 Advisory: Svmbir 0.2.3 updates its dependency 'Pillow' to v8.2.0 to include security fixes.
what vulnarability does svmbir version less then 0.2.3 have
Having vulnarability CVE-2022-23491 Advisory: Sw360 1.2.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sw360 version less then 1.2.1 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Sw360 1.2.1 updates its dependency 'certifi' to v2022.12.7 to include a security fix.
what vulnarability does sw360 version less then 1.2.1 have
Having vulnarability PVE-2021-26150 Advisory: swauth before 1.1.0 has multiple undisclosed security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does swauth version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26150 Advisory: swauth before 1.1.0 has multiple undisclosed security vulnerabilities.
what vulnarability does swauth version less then 1.1.0 have
Having vulnarability CVE-2012-4406 Advisory: OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does swift version less then 1.7.0 have ### Response: Having vulnarability CVE-2012-4406 Advisory: OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
what vulnarability does swift version less then 1.7.0 have
Having vulnarability PVE-2021-37369 Advisory: Swifter 0.292 fixes a known security vulnerability in parso <= 0.4.0 by requiring parso > 0.4.0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does swifter version less then 0.292 have ### Response: Having vulnarability PVE-2021-37369 Advisory: Swifter 0.292 fixes a known security vulnerability in parso <= 0.4.0 by requiring parso > 0.4.0
what vulnarability does swifter version less then 0.292 have
Having vulnarability PVE-2022-50163 Advisory: Swig 3.0.7 fixes potential security exploit in generated Java classes. https://github.com/swig/swig/commit/a1771cb8a0cbba65ffd07bee96a2cb41a9f112fd
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does swig version less then 3.0.7 have ### Response: Having vulnarability PVE-2022-50163 Advisory: Swig 3.0.7 fixes potential security exploit in generated Java classes. https://github.com/swig/swig/commit/a1771cb8a0cbba65ffd07bee96a2cb41a9f112fd
what vulnarability does swig version less then 3.0.7 have
Having vulnarability CVE-2021-43618 Advisory: Swiglpk 5.0.10 updates its C dependency 'GMP' to v6.3.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does swiglpk version less then 5.0.10 have ### Response: Having vulnarability CVE-2021-43618 Advisory: Swiglpk 5.0.10 updates its C dependency 'GMP' to v6.3.0 to include a security fix.
what vulnarability does swiglpk version less then 5.0.10 have
Having vulnarability CVE-2017-18342 Advisory: Syft 0.2.3 uses yaml.safe_load() to fix an arbitrary code execution vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does syft version less then 0.2.3 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Syft 0.2.3 uses yaml.safe_load() to fix an arbitrary code execution vulnerability.
what vulnarability does syft version less then 0.2.3 have
Having vulnarability CVE-2013-1664 Advisory: Symphony-bdk-python 1.2.0 starts using the more secure defusedxml library to avoid XML vulnerabilities. https://github.com/finos/symphony-bdk-python/commit/114c9abb763cb883d6cdb471cfca38afc32f1adc
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does symphony-bdk-python version less then 1.2.0 have ### Response: Having vulnarability CVE-2013-1664 Advisory: Symphony-bdk-python 1.2.0 starts using the more secure defusedxml library to avoid XML vulnerabilities. https://github.com/finos/symphony-bdk-python/commit/114c9abb763cb883d6cdb471cfca38afc32f1adc
what vulnarability does symphony-bdk-python version less then 1.2.0 have
Having vulnarability PVE-2023-99947 Advisory: Sympy 1.12 includes a fix for a XXE vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sympy version less then 1.12 have ### Response: Having vulnarability PVE-2023-99947 Advisory: Sympy 1.12 includes a fix for a XXE vulnerability.
what vulnarability does sympy version less then 1.12 have
Having vulnarability PVE-2021-42832 Advisory: Synadm 0.13.1 avoids stating tokens in the debug log file ('~/.local/synadm/debug.log') or in the debug console output ('synadm -vv ...'). https://github.com/JOJ0/synadm/commit/d9667f9d4bcdbae40685433ad84cf58dbe2ab088
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does synadm version less then 0.13.1 have ### Response: Having vulnarability PVE-2021-42832 Advisory: Synadm 0.13.1 avoids stating tokens in the debug log file ('~/.local/synadm/debug.log') or in the debug console output ('synadm -vv ...'). https://github.com/JOJ0/synadm/commit/d9667f9d4bcdbae40685433ad84cf58dbe2ab088
what vulnarability does synadm version less then 0.13.1 have
Having vulnarability PVE-2023-59683 Advisory: Synapse 0.0.39 includes a fix for a Race Condition vulnerability. https://github.com/vertexproject/synapse/pull/558
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does synapse version less then 0.0.39 have ### Response: Having vulnarability PVE-2023-59683 Advisory: Synapse 0.0.39 includes a fix for a Race Condition vulnerability. https://github.com/vertexproject/synapse/pull/558
what vulnarability does synapse version less then 0.0.39 have
Having vulnarability PVE-2021-40828 Advisory: Synapse-downloader 0.0.5 upgrades several dependencies with vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does synapse-downloader version less then 0.0.5 have ### Response: Having vulnarability PVE-2021-40828 Advisory: Synapse-downloader 0.0.5 upgrades several dependencies with vulnerabilities.
what vulnarability does synapse-downloader version less then 0.0.5 have
Having vulnarability CVE-2022-0144 Advisory: Synapseml 0.10.0 updates its NPM dependency 'shelljs' to v0.8.5 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does synapseml version less then 0.10.0 have ### Response: Having vulnarability CVE-2022-0144 Advisory: Synapseml 0.10.0 updates its NPM dependency 'shelljs' to v0.8.5 to include a security fix.
what vulnarability does synapseml version less then 0.10.0 have
Having vulnarability CVE-2023-6015 Advisory: Syngen 0.5.0 updates its MLflow dependency from version 2.8.0 to 2.8.1 due to the CVE-2023-6015. https://github.com/tdspora/syngen/pull/314/commits/351291b187276f846647544265fe577b94f11e2a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does syngen version less then 0.5.0 have ### Response: Having vulnarability CVE-2023-6015 Advisory: Syngen 0.5.0 updates its MLflow dependency from version 2.8.0 to 2.8.1 due to the CVE-2023-6015. https://github.com/tdspora/syngen/pull/314/commits/351291b187276f846647544265fe577b94f11e2a
what vulnarability does syngen version less then 0.5.0 have
Having vulnarability PVE-2021-40549 Advisory: Synology-api 0.2.1 removes an unsecured certificate warning at login.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does synology-api version less then 0.2.1 have ### Response: Having vulnarability PVE-2021-40549 Advisory: Synology-api 0.2.1 removes an unsecured certificate warning at login.
what vulnarability does synology-api version less then 0.2.1 have
Having vulnarability CVE-2018-18074 Advisory: Synse 1.0.0 (python client) updates to work with Synse v3 API version, which contains several security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does synse version less then 1.0.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Synse 1.0.0 (python client) updates to work with Synse v3 API version, which contains several security fixes.
what vulnarability does synse version less then 1.0.0 have
Having vulnarability CVE-2024-0937 Advisory: A vulnerability, which was classified as critical, has been found in van_der_Schaar LAB synthcity 0.2.9. Affected by this issue is the function load_from_file of the component PKL File Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252182 is the identifier assigned to this vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does synthcity version less then equal to 0.2.9 have ### Response: Having vulnarability CVE-2024-0937 Advisory: A vulnerability, which was classified as critical, has been found in van_der_Schaar LAB synthcity 0.2.9. Affected by this issue is the function load_from_file of the component PKL File Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252182 is the identifier assigned to this vulnerability.
what vulnarability does synthcity version less then equal to 0.2.9 have
Having vulnarability PVE-2023-52915 Advisory: Sys-ej is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sys-ej version greather then 0 have ### Response: Having vulnarability PVE-2023-52915 Advisory: Sys-ej is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
what vulnarability does sys-ej version greather then 0 have
Having vulnarability PVE-2022-48245 Advisory: System-monitoring-center 0.1.21beta10 fixes code injection vulnerabilities. https://github.com/hakandundar34coding/system-monitoring-center/commit/24da39a821db8db5b6f4af88b21f0cc59a35e633
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does system-monitoring-center version less then 0.1.21beta10 have ### Response: Having vulnarability PVE-2022-48245 Advisory: System-monitoring-center 0.1.21beta10 fixes code injection vulnerabilities. https://github.com/hakandundar34coding/system-monitoring-center/commit/24da39a821db8db5b6f4af88b21f0cc59a35e633
what vulnarability does system-monitoring-center version less then 0.1.21beta10 have
Having vulnarability CVE-2022-26477 Advisory: The Security Team noticed that the termination condition of the for loop in the readExternal method is a controllable variable, which, if tampered with, may lead to CPU exhaustion. As a fix, we added an upper bound and termination condition in the read and write logic. We classify it as a "low-priority but useful improvement". SystemDS is a distributed system and needs to serialize/deserialize data but in many code paths (e.g., on Spark broadcast/shuffle or writing to sequence files) the byte stream is anyway protected by additional CRC fingerprints. In this particular case though, the number of decoders is upper-bounded by twice the number of columns, which means an attacker would need to modify two entries in the byte stream in a consistent manner. By adding these checks robustness was strictly improved with almost zero overhead. These code changes are available in versions higher than 2.2.1.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does systemds version greather then equal to 0,less then 2.2.2 have ### Response: Having vulnarability CVE-2022-26477 Advisory: The Security Team noticed that the termination condition of the for loop in the readExternal method is a controllable variable, which, if tampered with, may lead to CPU exhaustion. As a fix, we added an upper bound and termination condition in the read and write logic. We classify it as a "low-priority but useful improvement". SystemDS is a distributed system and needs to serialize/deserialize data but in many code paths (e.g., on Spark broadcast/shuffle or writing to sequence files) the byte stream is anyway protected by additional CRC fingerprints. In this particular case though, the number of decoders is upper-bounded by twice the number of columns, which means an attacker would need to modify two entries in the byte stream in a consistent manner. By adding these checks robustness was strictly improved with almost zero overhead. These code changes are available in versions higher than 2.2.1.
what vulnarability does systemds version greather then equal to 0,less then 2.2.2 have
Having vulnarability PVE-2023-52918 Advisory: Sysuptoer is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does sysuptoer version greather then 0 have ### Response: Having vulnarability PVE-2023-52918 Advisory: Sysuptoer is a malicious package. It delivers the W4SP Stealer Malware to your system. https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html
what vulnarability does sysuptoer version greather then 0 have
Having vulnarability PVE-2022-48010 Advisory: Tableauserverclient 0.18.0 uses defusedxml library to reduce XML attacks surface. https://github.com/tableau/server-client-python/pull/1002
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tableauserverclient version less then 0.17.0.post0.dev8 have ### Response: Having vulnarability PVE-2022-48010 Advisory: Tableauserverclient 0.18.0 uses defusedxml library to reduce XML attacks surface. https://github.com/tableau/server-client-python/pull/1002
what vulnarability does tableauserverclient version less then 0.17.0.post0.dev8 have
Having vulnarability CVE-2017-2810 Advisory: Tablib 0.11.5 includes a fix for CVE-2017-2810: An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability. https://github.com/jazzband/tablib/commit/69abfc3ada5d754cb152119c0b4777043657cb6e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tablib version greather then equal to 0.10.0,less then 0.11.5 have ### Response: Having vulnarability CVE-2017-2810 Advisory: Tablib 0.11.5 includes a fix for CVE-2017-2810: An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability. https://github.com/jazzband/tablib/commit/69abfc3ada5d754cb152119c0b4777043657cb6e
what vulnarability does tablib version greather then equal to 0.10.0,less then 0.11.5 have
Having vulnarability CVE-2023-32681 Advisory: Tagmark 0.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tagmark version less then 0.2.0 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Tagmark 0.2.0 updates its dependency 'requests' to v2.31.0 to include a security fix.
what vulnarability does tagmark version less then 0.2.0 have
Having vulnarability PVE-2021-43046 Advisory: In tahoe-lafs 1.17.0, the lease-checker now uses JSON instead of pickle to serialize its state. Tahoe will now refuse to run until you either delete all pickle files or migrate them. https://tahoe-lafs.org/trac/tahoe-lafs/ticket/3825
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tahoe-lafs version less then 1.17.0 have ### Response: Having vulnarability PVE-2021-43046 Advisory: In tahoe-lafs 1.17.0, the lease-checker now uses JSON instead of pickle to serialize its state. Tahoe will now refuse to run until you either delete all pickle files or migrate them. https://tahoe-lafs.org/trac/tahoe-lafs/ticket/3825
what vulnarability does tahoe-lafs version less then 1.17.0 have
Having vulnarability PVE-2024-68079 Advisory: Affected versions of Tahrir are vulnerable to Cross-Site Request Forgery (CSRF) in several views.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tahrir version less then 0.8.0 have ### Response: Having vulnarability PVE-2024-68079 Advisory: Affected versions of Tahrir are vulnerable to Cross-Site Request Forgery (CSRF) in several views.
what vulnarability does tahrir version less then 0.8.0 have
Having vulnarability CVE-2023-28859 Advisory: Tair 1.3.3 updates its dependency 'redis' to version '4.4.4' to fix a Race Condition vulnerability. https://github.com/tair-opensource/tair-py/commit/9640ee7b29faba60c06e9b63bf13484b2814c29d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tair version less then 1.3.3 have ### Response: Having vulnarability CVE-2023-28859 Advisory: Tair 1.3.3 updates its dependency 'redis' to version '4.4.4' to fix a Race Condition vulnerability. https://github.com/tair-opensource/tair-py/commit/9640ee7b29faba60c06e9b63bf13484b2814c29d
what vulnarability does tair version less then 1.3.3 have
Having vulnarability PVE-2023-59407 Advisory: Talkytrend from version 1.7.0 started to use 'xmltodict' instead of 'defusedxml' for security concerns. https://github.com/mraniki/talkytrend/commit/60fb19a5c3d22ee262907c211a3cf89355448590
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does talkytrend version less then 1.7.0 have ### Response: Having vulnarability PVE-2023-59407 Advisory: Talkytrend from version 1.7.0 started to use 'xmltodict' instead of 'defusedxml' for security concerns. https://github.com/mraniki/talkytrend/commit/60fb19a5c3d22ee262907c211a3cf89355448590
what vulnarability does talkytrend version less then 1.7.0 have
Having vulnarability CVE-2023-3817 Advisory: Tap-rest-api-msdk 1.3.2 updates its dependency 'cryptography' to version '41.0.3' to include a fix for a Denial of Service vulnerability. https://github.com/Widen/tap-rest-api-msdk/pull/38
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tap-rest-api-msdk version less then 1.3.2 have ### Response: Having vulnarability CVE-2023-3817 Advisory: Tap-rest-api-msdk 1.3.2 updates its dependency 'cryptography' to version '41.0.3' to include a fix for a Denial of Service vulnerability. https://github.com/Widen/tap-rest-api-msdk/pull/38
what vulnarability does tap-rest-api-msdk version less then 1.3.2 have
Having vulnarability PVE-2021-39374 Advisory: Tapestry 1.1.0 closed the security issue which could result in recovery from unauthenticated blocks without warning the user.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tapestry version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-39374 Advisory: Tapestry 1.1.0 closed the security issue which could result in recovery from unauthenticated blocks without warning the user.
what vulnarability does tapestry version less then 1.1.0 have
Having vulnarability PVE-2021-36700 Advisory: Tarantool 0.10.0 updates its dependency 'msgpack' requirement to '>=1.0.4' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tarantool version less then 0.10.0 have ### Response: Having vulnarability PVE-2021-36700 Advisory: Tarantool 0.10.0 updates its dependency 'msgpack' requirement to '>=1.0.4' to include a security fix.
what vulnarability does tarantool version less then 0.10.0 have
Having vulnarability CVE-2020-13867 Advisory: Targetcli-fb 2.1.53 includes a fix for CVE-2020-13867: Weak permissions for /etc/target (and for the backup directory and backup files). https://github.com/open-iscsi/targetcli-fb/commit/9f5764dac39b5b75ee6b5d9e4db419d09d64b898
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does targetcli-fb version less then equal to 2.1.52 have ### Response: Having vulnarability CVE-2020-13867 Advisory: Targetcli-fb 2.1.53 includes a fix for CVE-2020-13867: Weak permissions for /etc/target (and for the backup directory and backup files). https://github.com/open-iscsi/targetcli-fb/commit/9f5764dac39b5b75ee6b5d9e4db419d09d64b898
what vulnarability does targetcli-fb version less then equal to 2.1.52 have
Having vulnarability PVE-2021-41099 Advisory: Tartufo 2.5.0 disabled codecov due to a security breach.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tartufo version less then 2.5.0 have ### Response: Having vulnarability PVE-2021-41099 Advisory: Tartufo 2.5.0 disabled codecov due to a security breach.
what vulnarability does tartufo version less then 2.5.0 have
Having vulnarability PVE-2023-60908 Advisory: Task-queue 2.7.0 includes a fix for a race condition vulnerability. https://github.com/seung-lab/python-task-queue/commit/ec30b4e659975217b0518a7e7c59b27c537f7e90
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does task-queue version less then 2.7.0 have ### Response: Having vulnarability PVE-2023-60908 Advisory: Task-queue 2.7.0 includes a fix for a race condition vulnerability. https://github.com/seung-lab/python-task-queue/commit/ec30b4e659975217b0518a7e7c59b27c537f7e90
what vulnarability does task-queue version less then 2.7.0 have
Having vulnarability PVE-2023-62055 Advisory: Taskgraph 0.10.0 contains multiple race conditions that may cause the TaskGraph object to become unresponsive during its normal termination procedure. These race conditions do more than just freeze the object; they also pose a risk of initiating a Denial of Service (DoS) attack. https://github.com/natcap/taskgraph/commit/f05e71b0f6b72645768ad2f5ea87ed75c799be16
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does taskgraph version less then 0.10.0 have ### Response: Having vulnarability PVE-2023-62055 Advisory: Taskgraph 0.10.0 contains multiple race conditions that may cause the TaskGraph object to become unresponsive during its normal termination procedure. These race conditions do more than just freeze the object; they also pose a risk of initiating a Denial of Service (DoS) attack. https://github.com/natcap/taskgraph/commit/f05e71b0f6b72645768ad2f5ea87ed75c799be16
what vulnarability does taskgraph version less then 0.10.0 have
Having vulnarability CVE-2024-24762 Advisory: Tasos-apiauth version 0.1.1 has updated its fastapi dependency to mitigate the CVE-2024-24762 vulnerability, which arises from its starlette dependency and the python-multipart package's susceptibility to a Content-Type Header ReDoS attack.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tasos-apiauth version less then 0.1.1 have ### Response: Having vulnarability CVE-2024-24762 Advisory: Tasos-apiauth version 0.1.1 has updated its fastapi dependency to mitigate the CVE-2024-24762 vulnerability, which arises from its starlette dependency and the python-multipart package's susceptibility to a Content-Type Header ReDoS attack.
what vulnarability does tasos-apiauth version less then 0.1.1 have
Having vulnarability CVE-2007-4559 Advisory: Tatoebatools 0.2.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tatoebatools version less then 0.2.2 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Tatoebatools 0.2.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
what vulnarability does tatoebatools version less then 0.2.2 have
Having vulnarability PVE-2023-60556 Advisory: Tautulli 2.1.3beta includes a fix for a XSS vulnerability. https://github.com/Tautulli/Tautulli/commit/4fb4410552553ac3993fed641c1d3f251462d072
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tautulli version less then 2.1.3beta have ### Response: Having vulnarability PVE-2023-60556 Advisory: Tautulli 2.1.3beta includes a fix for a XSS vulnerability. https://github.com/Tautulli/Tautulli/commit/4fb4410552553ac3993fed641c1d3f251462d072
what vulnarability does tautulli version less then 2.1.3beta have
Having vulnarability PVE-2022-45137 Advisory: Tbats 1.0.7 upgrades its dependencies due to an vulnerability in Jinja2. In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tbats version less then 1.0.7 have ### Response: Having vulnarability PVE-2022-45137 Advisory: Tbats 1.0.7 upgrades its dependencies due to an vulnerability in Jinja2. In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
what vulnarability does tbats version less then 1.0.7 have
Having vulnarability PVE-2021-39230 Advisory: Td-ameritrade-python-api 0.3.2 no longer auto-generates 'credentials.json' in the utility folder out of a concern for security. Instead, the user must specify where they would like to cache their refresh token.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does td-ameritrade-python-api version less then 0.3.2 have ### Response: Having vulnarability PVE-2021-39230 Advisory: Td-ameritrade-python-api 0.3.2 no longer auto-generates 'credentials.json' in the utility folder out of a concern for security. Instead, the user must specify where they would like to cache their refresh token.
what vulnarability does td-ameritrade-python-api version less then 0.3.2 have
Having vulnarability CVE-2023-41040 Advisory: Teamscale-cli 9.1.2 updates its dependency 'gitpython' to v3.1.35 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does teamscale-cli version less then 9.1.2 have ### Response: Having vulnarability CVE-2023-41040 Advisory: Teamscale-cli 9.1.2 updates its dependency 'gitpython' to v3.1.35 to include a security fix.
what vulnarability does teamscale-cli version less then 9.1.2 have
Having vulnarability CVE-2024-23334 Advisory: Telebot-components version 0.11.1 upgrades its aiohttp dependency to version 3.9.2 from 3.9.1. This update is in response to addressing the security concern identified as CVE-2024-23334. https://github.com/bots-against-war/telebot-components/commit/a33844be3278d4ae491292bf513d7a06f153436f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does telebot-components version less then 0.11.1 have ### Response: Having vulnarability CVE-2024-23334 Advisory: Telebot-components version 0.11.1 upgrades its aiohttp dependency to version 3.9.2 from 3.9.1. This update is in response to addressing the security concern identified as CVE-2024-23334. https://github.com/bots-against-war/telebot-components/commit/a33844be3278d4ae491292bf513d7a06f153436f
what vulnarability does telebot-components version less then 0.11.1 have
Having vulnarability CVE-2020-25659 Advisory: Telegram-stats-bot 0.3.1 updates its dependency 'cryptography' to v3.3.1 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does telegram-stats-bot version less then 0.3.1 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Telegram-stats-bot 0.3.1 updates its dependency 'cryptography' to v3.3.1 to include a security fix.
what vulnarability does telegram-stats-bot version less then 0.3.1 have
Having vulnarability PVE-2021-26156 Advisory: telemeta before 1.4.31 has a undisclosed security vulnerability in TELEMETA_EXPORT_CACHE_DIR.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does telemeta version less then 1.4.31 have ### Response: Having vulnarability PVE-2021-26156 Advisory: telemeta before 1.4.31 has a undisclosed security vulnerability in TELEMETA_EXPORT_CACHE_DIR.
what vulnarability does telemeta version less then 1.4.31 have
Having vulnarability CVE-2021-29510 Advisory: Telemeter version 3.0.4 updates its dependency "Pydantic" to v1.7.4 include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does telemeter version less then 3.0.4 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Telemeter version 3.0.4 updates its dependency "Pydantic" to v1.7.4 include a security fix.
what vulnarability does telemeter version less then 3.0.4 have
Having vulnarability CVE-2021-41945 Advisory: Telepay 1.0.0 updates its dependency 'httpx' to v0.23.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does telepay version less then 1.0.0 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Telepay 1.0.0 updates its dependency 'httpx' to v0.23.0 to include a security fix.
what vulnarability does telepay version less then 1.0.0 have
Having vulnarability PVE-2021-38021 Advisory: Teleserver 2.2.0 increases the security by implementing better user verification. Now there are three ways of accessing teleserver: with GUI credentials, with service principal generated from system tab or with temporary token created via /login route of API.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does teleserver version less then 2.2.0 have ### Response: Having vulnarability PVE-2021-38021 Advisory: Teleserver 2.2.0 increases the security by implementing better user verification. Now there are three ways of accessing teleserver: with GUI credentials, with service principal generated from system tab or with temporary token created via /login route of API.
what vulnarability does teleserver version less then 2.2.0 have
Having vulnarability PVE-2021-34985 Advisory: telnet is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does telnet version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34985 Advisory: telnet is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/
what vulnarability does telnet version greather then 0,less then 0 have
Having vulnarability PVE-2023-52905 Advisory: Telnservrr is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server. https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does telnservrr version greather then 0 have ### Response: Having vulnarability PVE-2023-52905 Advisory: Telnservrr is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server. https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
what vulnarability does telnservrr version greather then 0 have
Having vulnarability CVE-2023-6395 Advisory: The Mock software contains a vulnerability wherein an attacker could potentially exploit privilege escalation, enabling the execution of arbitrary code with root user privileges. This weakness stems from the absence of proper sandboxing during the expansion and execution of Jinja2 templates, which may be included in certain configuration parameters. While the Mock documentation advises treating users added to the mock group as privileged, certain build systems invoking mock on behalf of users might inadvertently permit less privileged users to define configuration tags. These tags could then be passed as parameters to mock during execution, potentially leading to the utilization of Jinja2 templates for remote privilege escalation and the execution of arbitrary code as the root user on the build server.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does templated-dictionary version greather then equal to 0 have ### Response: Having vulnarability CVE-2023-6395 Advisory: The Mock software contains a vulnerability wherein an attacker could potentially exploit privilege escalation, enabling the execution of arbitrary code with root user privileges. This weakness stems from the absence of proper sandboxing during the expansion and execution of Jinja2 templates, which may be included in certain configuration parameters. While the Mock documentation advises treating users added to the mock group as privileged, certain build systems invoking mock on behalf of users might inadvertently permit less privileged users to define configuration tags. These tags could then be passed as parameters to mock during execution, potentially leading to the utilization of Jinja2 templates for remote privilege escalation and the execution of arbitrary code as the root user on the build server.
what vulnarability does templated-dictionary version greather then equal to 0 have
Having vulnarability CVE-2024-0936 Advisory: A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Affected by this vulnerability is the function load_from_file of the component PKL File Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252181 was assigned to this vulnerability. NOTE: The vendor was contacted early and confirmed immediately the existence of the issue. A patch is planned to be released in February 2024.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does temporai version less then equal to 0.0.3 have ### Response: Having vulnarability CVE-2024-0936 Advisory: A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Affected by this vulnerability is the function load_from_file of the component PKL File Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252181 was assigned to this vulnerability. NOTE: The vendor was contacted early and confirmed immediately the existence of the issue. A patch is planned to be released in February 2024.
what vulnarability does temporai version less then equal to 0.0.3 have
Having vulnarability CVE-2021-21371 Advisory: Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tenable-jira-cloud version less then 1.1.21 have ### Response: Having vulnarability CVE-2021-21371 Advisory: Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().
what vulnarability does tenable-jira-cloud version less then 1.1.21 have
Having vulnarability PVE-2021-38510 Advisory: Tendenci 11.0.1 patches a security hole in payments that could potentially expose user data.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tendenci version less then 11.0.1 have ### Response: Having vulnarability PVE-2021-38510 Advisory: Tendenci 11.0.1 patches a security hole in payments that could potentially expose user data.
what vulnarability does tendenci version less then 11.0.1 have
Having vulnarability PVE-2021-37550 Advisory: In teneto 0.4.5, save_tenetobids_snapshot to export current teneto settings. save_to_pickle (and corresponding load function) have been removed as they are not secure.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does teneto version less then 0.4.5 have ### Response: Having vulnarability PVE-2021-37550 Advisory: In teneto 0.4.5, save_tenetobids_snapshot to export current teneto settings. save_to_pickle (and corresponding load function) have been removed as they are not secure.
what vulnarability does teneto version less then 0.4.5 have
Having vulnarability PVE-2023-60278 Advisory: Tensorboard 1.9.0 includes a fix for a Race Condition vulnerability. https://github.com/tensorflow/tensorboard/pull/1235
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorboard version less then 1.9.0 have ### Response: Having vulnarability PVE-2023-60278 Advisory: Tensorboard 1.9.0 includes a fix for a Race Condition vulnerability. https://github.com/tensorflow/tensorboard/pull/1235
what vulnarability does tensorboard version less then 1.9.0 have
Having vulnarability PVE-2021-36375 Advisory: Tensorflow 1.10.0 defaults to use SSL when connecting to a server with tf.Session (except running on Windows). https://github.com/tensorflow/tensorflow/commit/ba9422a8adba18fc97cc1923002b7db8ca63dcfe
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-36375 Advisory: Tensorflow 1.10.0 defaults to use SSL when connecting to a server with tf.Session (except running on Windows). https://github.com/tensorflow/tensorflow/commit/ba9422a8adba18fc97cc1923002b7db8ca63dcfe
what vulnarability does tensorflow version less then 1.10.0 have
Having vulnarability CVE-2023-25676 Advisory: Tensorflow-aarch64 2.11.1 and 2.12.0 include a fix for CVE-2023-25676: When running versions prior to 2.12.0 and 2.11.1 with XLA, 'tf.raw_ops.ParallelConcat' segfaults with a nullptr dereference when given a parameter 'shape' with rank that is not greater than zero. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-aarch64 version less then 2.11.1,greather then equal to 2.12.0rc0,less then 2.12.0 have ### Response: Having vulnarability CVE-2023-25676 Advisory: Tensorflow-aarch64 2.11.1 and 2.12.0 include a fix for CVE-2023-25676: When running versions prior to 2.12.0 and 2.11.1 with XLA, 'tf.raw_ops.ParallelConcat' segfaults with a nullptr dereference when given a parameter 'shape' with rank that is not greater than zero. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq
what vulnarability does tensorflow-aarch64 version less then 2.11.1,greather then equal to 2.12.0rc0,less then 2.12.0 have
Having vulnarability CVE-2019-16778 Advisory: Tensorflow-cpu 1.15 includes a fix for CVE-2019-16778: In TensorFlow before 1.15, a heap buffer overflow in UnsortedSegmentSum can be produced when the Index template argument is int32. In this case data_size and num_segments fields are truncated from int64 to int32 and can produce negative numbers, resulting in accessing out of bounds heap memory. This is unlikely to be exploitable and was detected and fixed internally in TensorFlow 1.15 and 2.0. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-cpu version less then 1.15 have ### Response: Having vulnarability CVE-2019-16778 Advisory: Tensorflow-cpu 1.15 includes a fix for CVE-2019-16778: In TensorFlow before 1.15, a heap buffer overflow in UnsortedSegmentSum can be produced when the Index template argument is int32. In this case data_size and num_segments fields are truncated from int64 to int32 and can produce negative numbers, resulting in accessing out of bounds heap memory. This is unlikely to be exploitable and was detected and fixed internally in TensorFlow 1.15 and 2.0. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892
what vulnarability does tensorflow-cpu version less then 1.15 have
Having vulnarability CVE-2023-25674 Advisory: Tensorflow-cpu-aws 2.11.1 and 2.12.0 include a fix for CVE-2023-25674: Versions prior to 2.12.0 and 2.11.1 have a null pointer error in RandomShuffle with XLA enabled. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-cpu-aws version less then 2.11.1,greather then equal to 2.12.0rc0,less then 2.12.0 have ### Response: Having vulnarability CVE-2023-25674 Advisory: Tensorflow-cpu-aws 2.11.1 and 2.12.0 include a fix for CVE-2023-25674: Versions prior to 2.12.0 and 2.11.1 have a null pointer error in RandomShuffle with XLA enabled. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579
what vulnarability does tensorflow-cpu-aws version less then 2.11.1,greather then equal to 2.12.0rc0,less then 2.12.0 have
Having vulnarability CVE-2019-19880 Advisory: Tensorflow-directml 1.15.3 updates 'SQLite3' to v3.31.01 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-directml version less then 1.15.3 have ### Response: Having vulnarability CVE-2019-19880 Advisory: Tensorflow-directml 1.15.3 updates 'SQLite3' to v3.31.01 to include security fixes.
what vulnarability does tensorflow-directml version less then 1.15.3 have
Having vulnarability PVE-2022-48551 Advisory: Tensorflow-estimator 2.9.0 removes all boosted trees code due to security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-estimator version less then 2.9.0 have ### Response: Having vulnarability PVE-2022-48551 Advisory: Tensorflow-estimator 2.9.0 removes all boosted trees code due to security issues.
what vulnarability does tensorflow-estimator version less then 2.9.0 have
Having vulnarability CVE-2022-30115 Advisory: Tensorflow-federated 0.25.0 updates its dependency 'TensorFlow' to v2.9.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-federated version less then 0.25.0 have ### Response: Having vulnarability CVE-2022-30115 Advisory: Tensorflow-federated 0.25.0 updates its dependency 'TensorFlow' to v2.9.0 to include security fixes.
what vulnarability does tensorflow-federated version less then 0.25.0 have
Having vulnarability PVE-2021-36375 Advisory: Tensorflow-gpu before 1.10.0 uses an insecure grpc dependency.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-gpu version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-36375 Advisory: Tensorflow-gpu before 1.10.0 uses an insecure grpc dependency.
what vulnarability does tensorflow-gpu version less then 1.10.0 have
Having vulnarability CVE-2022-35965 Advisory: Tensorflow-intel 2.10.0 includes a fix for CVE-2022-35965: Segfault in 'LowerBound' and 'UpperBound'. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qxpx-j395-pw36
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-intel version less then 2.10.0 have ### Response: Having vulnarability CVE-2022-35965 Advisory: Tensorflow-intel 2.10.0 includes a fix for CVE-2022-35965: Segfault in 'LowerBound' and 'UpperBound'. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qxpx-j395-pw36
what vulnarability does tensorflow-intel version less then 2.10.0 have
Having vulnarability CVE-2023-25670 Advisory: Tensorflow-macos 2.11.1 and 2.12.0 include a fix for CVE-2023-25670: Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-macos version less then 2.11.1,greather then equal to 2.12.0rc0,less then 2.12.0 have ### Response: Having vulnarability CVE-2023-25670 Advisory: Tensorflow-macos 2.11.1 and 2.12.0 include a fix for CVE-2023-25670: Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w
what vulnarability does tensorflow-macos version less then 2.11.1,greather then equal to 2.12.0rc0,less then 2.12.0 have
Having vulnarability PVE-2023-60390 Advisory: Tensorflow-model-analysis 0.14.0 includes a fix for a Race Condition vulnerability. https://github.com/tensorflow/model-analysis/commit/4c2a9f16f8f07b28b17e956089eaf359d1b6997b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-model-analysis version less then 0.14.0 have ### Response: Having vulnarability PVE-2023-60390 Advisory: Tensorflow-model-analysis 0.14.0 includes a fix for a Race Condition vulnerability. https://github.com/tensorflow/model-analysis/commit/4c2a9f16f8f07b28b17e956089eaf359d1b6997b
what vulnarability does tensorflow-model-analysis version less then 0.14.0 have
Having vulnarability CVE-2019-19645 Advisory: Tensorflow-rocm versions 1.15.3, 2.0.2 and 2.1.1 updates its dependency "SQLite" to handle CVE-2019-19645.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-rocm version less then 1.15.3,greather then equal to 2.0.0a0,less then 2.0.2,greather then equal to 2.1.0rc0,less then 2.1.1 have ### Response: Having vulnarability CVE-2019-19645 Advisory: Tensorflow-rocm versions 1.15.3, 2.0.2 and 2.1.1 updates its dependency "SQLite" to handle CVE-2019-19645.
what vulnarability does tensorflow-rocm version less then 1.15.3,greather then equal to 2.0.0a0,less then 2.0.2,greather then equal to 2.1.0rc0,less then 2.1.1 have
Having vulnarability CVE-2020-15195 Advisory: Tensorflow-rocm-enhanced versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 include a fix for CVE-2020-15195: In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of 'SparseFillEmptyRowsGrad' uses a double indexing pattern. It is possible for 'reverse_index_map(i)' to be an index outside of bounds of 'grad_values', thus resulting in a heap buffer overflow. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorflow-rocm-enhanced version less then 1.15.4,greather then equal to 2.0.0a0,less then 2.0.3,greather then equal to 2.1.0a0,less then 2.1.2,greather then equal to 2.2.0a0,less then 2.2.1,greather then equal to 2.3.0a0,less then 2.3.1 have ### Response: Having vulnarability CVE-2020-15195 Advisory: Tensorflow-rocm-enhanced versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 include a fix for CVE-2020-15195: In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of 'SparseFillEmptyRowsGrad' uses a double indexing pattern. It is possible for 'reverse_index_map(i)' to be an index outside of bounds of 'grad_values', thus resulting in a heap buffer overflow. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr
what vulnarability does tensorflow-rocm-enhanced version less then 1.15.4,greather then equal to 2.0.0a0,less then 2.0.3,greather then equal to 2.1.0a0,less then 2.1.2,greather then equal to 2.2.0a0,less then 2.2.1,greather then equal to 2.3.0a0,less then 2.3.1 have
Having vulnarability PVE-2022-44753 Advisory: Tensorhive 0.3.1 updates its dependency 'webpack-bundle-analyzer' to v3.3.2. https://hackerone.com/reports/463380
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorhive version less then 0.3.1 have ### Response: Having vulnarability PVE-2022-44753 Advisory: Tensorhive 0.3.1 updates its dependency 'webpack-bundle-analyzer' to v3.3.2. https://hackerone.com/reports/463380
what vulnarability does tensorhive version less then 0.3.1 have
Having vulnarability CVE-2020-15210 Advisory: Tensorpy 1.5.0 updates Tensorflow to v1.15.4 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tensorpy version less then 1.5.0 have ### Response: Having vulnarability CVE-2020-15210 Advisory: Tensorpy 1.5.0 updates Tensorflow to v1.15.4 to include security fixes.
what vulnarability does tensorpy version less then 1.5.0 have
Having vulnarability PVE-2023-52906 Advisory: Tequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server. https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tequests version greather then 0 have ### Response: Having vulnarability PVE-2023-52906 Advisory: Tequests is a malicious package, typosquatting the popular Python 'requests' library. It embeds source code that retrieves a Golang-based ransomware binary from a remote server. https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
what vulnarability does tequests version greather then 0 have
Having vulnarability PVE-2021-39270 Advisory: Termius 1.2.13 removed storing of passwords and passphrases locally.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does termius version less then 1.2.13 have ### Response: Having vulnarability PVE-2021-39270 Advisory: Termius 1.2.13 removed storing of passwords and passphrases locally.
what vulnarability does termius version less then 1.2.13 have
Having vulnarability CVE-2021-28363 Advisory: Tern 2.5.0 updates its dependency 'urllib3' to v1.26.4 due to security issues.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tern version less then 2.5.0 have ### Response: Having vulnarability CVE-2021-28363 Advisory: Tern 2.5.0 updates its dependency 'urllib3' to v1.26.4 due to security issues.
what vulnarability does tern version less then 2.5.0 have
Having vulnarability CVE-2023-4863 Advisory: Tesserocr 2.6.1 ships with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected. https://inspector.pypi.io/project/tesserocr/2.6.1/packages/05/bb/603ec678bb2682b690c8af2b7f45099aa7666865c381ae27d5a0d2633f75/tesserocr-2.6.1-cp310-cp310-macosx_10_9_x86_64.whl
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tesserocr version equal to 2.6.1 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Tesserocr 2.6.1 ships with a version of C library 'libwebp' which is affected by a high risk vulnerability. Only mac OS X wheels on PyPI were affected. https://inspector.pypi.io/project/tesserocr/2.6.1/packages/05/bb/603ec678bb2682b690c8af2b7f45099aa7666865c381ae27d5a0d2633f75/tesserocr-2.6.1-cp310-cp310-macosx_10_9_x86_64.whl
what vulnarability does tesserocr version equal to 2.6.1 have
Having vulnarability CVE-2022-40897 Advisory: Testinfra-bdd 2.2.4 pins its dependency 'setuptools' to versions '>=65.5.1' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does testinfra-bdd version less then 2.2.4 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Testinfra-bdd 2.2.4 pins its dependency 'setuptools' to versions '>=65.5.1' to include a security fix.
what vulnarability does testinfra-bdd version less then 2.2.4 have
Having vulnarability PVE-2022-47821 Advisory: Testing-pip-confusion is a malicious package, typosquatting. https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does testing-pip-confusion version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47821 Advisory: Testing-pip-confusion is a malicious package, typosquatting. https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library
what vulnarability does testing-pip-confusion version greather then 0,less then 0 have
Having vulnarability CVE-2023-32681 Advisory: Testrail-api 1.12.1 updates its dependency 'requests' to v2.31.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does testrail-api version less then 1.12.1 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Testrail-api 1.12.1 updates its dependency 'requests' to v2.31.0 to include a security fix.
what vulnarability does testrail-api version less then 1.12.1 have
Having vulnarability CVE-2020-11022 Advisory: Tethys-platform 3.2.0 updates its dependency 'jQuery' to v3.5.1 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tethys-platform version less then 3.2.0 have ### Response: Having vulnarability CVE-2020-11022 Advisory: Tethys-platform 3.2.0 updates its dependency 'jQuery' to v3.5.1 to include security fixes.
what vulnarability does tethys-platform version less then 3.2.0 have
Having vulnarability PVE-2022-50170 Advisory: Texbld 0.2 patches an arbitrary FS access vulnerability. https://github.com/texbld/texbld/commit/06d0d7db7f2f1263269b50439e7d6f458063279e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does texbld version less then 0.2 have ### Response: Having vulnarability PVE-2022-50170 Advisory: Texbld 0.2 patches an arbitrary FS access vulnerability. https://github.com/texbld/texbld/commit/06d0d7db7f2f1263269b50439e7d6f458063279e
what vulnarability does texbld version less then 0.2 have
Having vulnarability CVE-2022-34066 Advisory: The Texercise package in PyPI v0.0.1 to v0.0.12 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does texercise version greather then equal to 0.0.1,less then equal to 0.0.12 have ### Response: Having vulnarability CVE-2022-34066 Advisory: The Texercise package in PyPI v0.0.1 to v0.0.12 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
what vulnarability does texercise version greather then equal to 0.0.1,less then equal to 0.0.12 have
Having vulnarability PVE-2023-62064 Advisory: Text2qti version 0.4.0 has addressed a vulnerability related to catastrophic backtracking in LaTeX math regex.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does text2qti version less then 0.4.0 have ### Response: Having vulnarability PVE-2023-62064 Advisory: Text2qti version 0.4.0 has addressed a vulnerability related to catastrophic backtracking in LaTeX math regex.
what vulnarability does text2qti version less then 0.4.0 have
Having vulnarability CVE-2021-37655 Advisory: Textattack 0.3.4 updates its dependency 'tensorflow' to v2.5.1 to include several security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does textattack version less then 0.3.4 have ### Response: Having vulnarability CVE-2021-37655 Advisory: Textattack 0.3.4 updates its dependency 'tensorflow' to v2.5.1 to include several security fixes.
what vulnarability does textattack version less then 0.3.4 have
Having vulnarability CVE-2016-10320 Advisory: Textract 1.5.0 includes a fix for CVE-2016-10320: Textract before 1.5.0 allows OS Command Injection attacks via a filename in a call to the process function. This may be a remote attack if a web application accepts names of arbitrary uploaded files.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does textract version less then 1.5.0 have ### Response: Having vulnarability CVE-2016-10320 Advisory: Textract 1.5.0 includes a fix for CVE-2016-10320: Textract before 1.5.0 allows OS Command Injection attacks via a filename in a call to the process function. This may be a remote attack if a web application accepts names of arbitrary uploaded files.
what vulnarability does textract version less then 1.5.0 have
Having vulnarability CVE-2020-11023 Advisory: Textworld 1.5.3 updates its dependency 'jquery' to v3.5.0 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does textworld version less then 1.5.3 have ### Response: Having vulnarability CVE-2020-11023 Advisory: Textworld 1.5.3 updates its dependency 'jquery' to v3.5.0 to include security fixes.
what vulnarability does textworld version less then 1.5.3 have
Having vulnarability PVE-2021-36687 Advisory: Tf-encrypted 0.4.0 implements cryptographically secure random numbers everywhere. https://github.com/tf-encrypted/tf-encrypted/commit/9346b7217be7c55952f6d9d51293ef13fca0215d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tf-encrypted version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-36687 Advisory: Tf-encrypted 0.4.0 implements cryptographically secure random numbers everywhere. https://github.com/tf-encrypted/tf-encrypted/commit/9346b7217be7c55952f6d9d51293ef13fca0215d
what vulnarability does tf-encrypted version less then 0.4.0 have
Having vulnarability CVE-2020-14343 Advisory: Tf-Models-Official version 2.5.0 includes a security patch for the function 'read_yaml_to_params_dict' in 'official/modeling/hyperparams/params_dict.py'. It used unsafe yaml.load(), allowing instantiation of arbitrary objects. https://github.com/tensorflow/models/commit/f6e9eda85f7e764e54199169ed829b94bcd07871#diff-8deb13e0080ce9697c0238e886a9de510faad3144427a5e794714b353d5ad8dc
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tf-models-official version less then 2.5.0 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Tf-Models-Official version 2.5.0 includes a security patch for the function 'read_yaml_to_params_dict' in 'official/modeling/hyperparams/params_dict.py'. It used unsafe yaml.load(), allowing instantiation of arbitrary objects. https://github.com/tensorflow/models/commit/f6e9eda85f7e764e54199169ed829b94bcd07871#diff-8deb13e0080ce9697c0238e886a9de510faad3144427a5e794714b353d5ad8dc
what vulnarability does tf-models-official version less then 2.5.0 have
Having vulnarability CVE-2023-27579 Advisory: Tflite-runtime 2.11.0 and prior versions are affected by CVE-2023-27579: Constructing a tflite model with a paramater 'filter_input_channel' of less than 1 gives a FPE. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5w96-866f-6rm8
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tflite-runtime version less then 2.11.1 have ### Response: Having vulnarability CVE-2023-27579 Advisory: Tflite-runtime 2.11.0 and prior versions are affected by CVE-2023-27579: Constructing a tflite model with a paramater 'filter_input_channel' of less than 1 gives a FPE. https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5w96-866f-6rm8
what vulnarability does tflite-runtime version less then 2.11.1 have
Having vulnarability PVE-2021-41170 Advisory: Tftpy 0.4.6 adds some security checks around the 'tftproot'.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tftpy version less then 0.4.6 have ### Response: Having vulnarability PVE-2021-41170 Advisory: Tftpy 0.4.6 adds some security checks around the 'tftproot'.
what vulnarability does tftpy version less then 0.4.6 have
Having vulnarability CVE-2020-14343 Advisory: Tfx 0.30.0 uses yaml.SafeLoader() to avoid a code execution vulnerability. https://github.com/tensorflow/tfx/commit/2692c9ab437d76b5d9517996bfe2596862e0791d#diff-68603411e5359dc496f3e5d7469be772aaca79b3e6950d4df9bdb616b519d3ce
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tfx version less then 0.30.0 have ### Response: Having vulnarability CVE-2020-14343 Advisory: Tfx 0.30.0 uses yaml.SafeLoader() to avoid a code execution vulnerability. https://github.com/tensorflow/tfx/commit/2692c9ab437d76b5d9517996bfe2596862e0791d#diff-68603411e5359dc496f3e5d7469be772aaca79b3e6950d4df9bdb616b519d3ce
what vulnarability does tfx version less then 0.30.0 have
Having vulnarability PVE-2021-40256 Advisory: Tg 0.1.3 makes 'file_path' setting in config file shell escaped for security reasons.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tg version less then 0.1.3 have ### Response: Having vulnarability PVE-2021-40256 Advisory: Tg 0.1.3 makes 'file_path' setting in config file shell escaped for security reasons.
what vulnarability does tg version less then 0.1.3 have
Having vulnarability PVE-2022-52083 Advisory: Tg-login 0.0.2 avoids printing the session string on screen. https://github.com/aahnik/tg-login/commit/4f2b34ad76ac6ffec9fd708103ae0ed02653fd2c
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tg-login version less then 0.0.2 have ### Response: Having vulnarability PVE-2022-52083 Advisory: Tg-login 0.0.2 avoids printing the session string on screen. https://github.com/aahnik/tg-login/commit/4f2b34ad76ac6ffec9fd708103ae0ed02653fd2c
what vulnarability does tg-login version less then 0.0.2 have
Having vulnarability PVE-2021-37295 Advisory: Thamos 0.1.0 uses yaml.safe_load for security reasons.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thamos version less then 0.1.0 have ### Response: Having vulnarability PVE-2021-37295 Advisory: Thamos 0.1.0 uses yaml.safe_load for security reasons.
what vulnarability does thamos version less then 0.1.0 have
Having vulnarability CVE-2021-34363 Advisory: The thefuck (aka The Fuck) package before 3.31 for Python allows Path Traversal that leads to arbitrary file deletion via the "undo archive operation" feature. https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thefuck version less then 3.31 have ### Response: Having vulnarability CVE-2021-34363 Advisory: The thefuck (aka The Fuck) package before 3.31 for Python allows Path Traversal that leads to arbitrary file deletion via the "undo archive operation" feature. https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092
what vulnarability does thefuck version less then 3.31 have
Having vulnarability CVE-2023-30798 Advisory: Thera-py 0.3.10 and 0.5.0.dev0 update its dependency 'starlette' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thera-py version less then 0.3.10,greather then equal to 0.4.dev0,less then 0.5.0.dev0 have ### Response: Having vulnarability CVE-2023-30798 Advisory: Thera-py 0.3.10 and 0.5.0.dev0 update its dependency 'starlette' to include a security fix.
what vulnarability does thera-py version less then 0.3.10,greather then equal to 0.4.dev0,less then 0.5.0.dev0 have
Having vulnarability CVE-2022-23491 Advisory: Thermostat 1.7.5 pins its dependency 'certifi' to versions '>=2022.12.07' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thermostat version less then 1.7.5 have ### Response: Having vulnarability CVE-2022-23491 Advisory: Thermostat 1.7.5 pins its dependency 'certifi' to versions '>=2022.12.07' to include a security fix.
what vulnarability does thermostat version less then 1.7.5 have
Having vulnarability PVE-2021-40660 Advisory: Thinc 8.0.4 starts to avoid the 'Pydantic' versions with security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thinc version less then 8.0.4 have ### Response: Having vulnarability PVE-2021-40660 Advisory: Thinc 8.0.4 starts to avoid the 'Pydantic' versions with security vulnerabilities.
what vulnarability does thinc version less then 8.0.4 have