output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability PVE-2023-61344 Advisory: Thingsboard-gateway 3.3 includes a fix for a potential race condition vulnerability.
https://github.com/thingsboard/thingsboard-gateway/pull/1114 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thingsboard-gateway version less then 3.3 have ### Response: Having vulnarability PVE-2023-61344 Advisory: Thingsboard-gateway 3.3 includes a fix for a potential race condition vulnerability.
https://github.com/thingsboard/thingsboard-gateway/pull/1114 | what vulnarability does thingsboard-gateway version less then 3.3 have | |
Having vulnarability PVE-2021-26158 Advisory: thorn before 1.1.0 has several security vulnerabilities: Now provides HMAC signing by default, No longer dispatches webhooks to internal networks, Now only dispatches to HTTP and HTTPS URLs by default, Now only dispatches to ports 80 and 443 by default, Adds recipient validators | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thorn version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-26158 Advisory: thorn before 1.1.0 has several security vulnerabilities: Now provides HMAC signing by default, No longer dispatches webhooks to internal networks, Now only dispatches to HTTP and HTTPS URLs by default, Now only dispatches to ports 80 and 443 by default, Adds recipient validators | what vulnarability does thorn version less then 1.1.0 have | |
Having vulnarability PVE-2022-49682 Advisory: Thoth 0.1.0 changes to use yaml.safe_load() to avoid a code execution vulnerability.
https://github.com/thoth-station/thamos/commit/b2e21df92a927c5ff753e2d9b4cf744417c7efcc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thoth version less then 0.1.0 have ### Response: Having vulnarability PVE-2022-49682 Advisory: Thoth 0.1.0 changes to use yaml.safe_load() to avoid a code execution vulnerability.
https://github.com/thoth-station/thamos/commit/b2e21df92a927c5ff753e2d9b4cf744417c7efcc | what vulnarability does thoth version less then 0.1.0 have | |
Having vulnarability PVE-2022-44498 Advisory: Threedi-modelchecker 0.23 adds integrity and other additional checks on connection for untrusted sqlite input.
https://github.com/nens/threedi-modelchecker/commit/c90ae2c53fa8c26efb5256f66631a0de2ffb6c83 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does threedi-modelchecker version less then 0.23 have ### Response: Having vulnarability PVE-2022-44498 Advisory: Threedi-modelchecker 0.23 adds integrity and other additional checks on connection for untrusted sqlite input.
https://github.com/nens/threedi-modelchecker/commit/c90ae2c53fa8c26efb5256f66631a0de2ffb6c83 | what vulnarability does threedi-modelchecker version less then 0.23 have | |
Having vulnarability PVE-2021-37644 Advisory: Thrift (Python bindings for Thrift) 0.11.0 is based in a version of Thrift-core that improves SSL security by adding cross client checks to make sure SSLv3 protocol cannot be negotiated - see: https://issues.apache.org/jira/browse/THRIFT-4084 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thrift version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-37644 Advisory: Thrift (Python bindings for Thrift) 0.11.0 is based in a version of Thrift-core that improves SSL security by adding cross client checks to make sure SSLv3 protocol cannot be negotiated - see: https://issues.apache.org/jira/browse/THRIFT-4084 | what vulnarability does thrift version less then 0.11.0 have | |
Having vulnarability CVE-2022-22815 Advisory: Thumbor 7.0.3 updates its `pillow` dependency ffrom versions >=8.4.0,<9 to >=9.0.0 due to security concerns. This change was made in response to the CVE-2022-22815 vulnerability.
https://github.com/thumbor/thumbor/pull/1390/commits/d260ee348ec59fece5bf60f6a98372ab86c1aaf6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does thumbor version less then 7.0.3 have ### Response: Having vulnarability CVE-2022-22815 Advisory: Thumbor 7.0.3 updates its `pillow` dependency ffrom versions >=8.4.0,<9 to >=9.0.0 due to security concerns. This change was made in response to the CVE-2022-22815 vulnerability.
https://github.com/thumbor/thumbor/pull/1390/commits/d260ee348ec59fece5bf60f6a98372ab86c1aaf6 | what vulnarability does thumbor version less then 7.0.3 have | |
Having vulnarability PVE-2021-26159 Advisory: tiddlyweb before 1.2.18 allowed empty passwords to authenticate. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tiddlyweb version less then 1.2.18 have ### Response: Having vulnarability PVE-2021-26159 Advisory: tiddlyweb before 1.2.18 allowed empty passwords to authenticate. | what vulnarability does tiddlyweb version less then 1.2.18 have | |
Having vulnarability CVE-2017-4975 Advisory: An issue was discovered in Pivotal PCF Tile Generator versions prior to 6.0.0. Tiles created by the PCF Tile Generator create a running open security group that overrides security groups set by the operator. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tile-generator version less then 6.0.0 have ### Response: Having vulnarability CVE-2017-4975 Advisory: An issue was discovered in Pivotal PCF Tile Generator versions prior to 6.0.0. Tiles created by the PCF Tile Generator create a running open security group that overrides security groups set by the operator. | what vulnarability does tile-generator version less then 6.0.0 have | |
Having vulnarability PVE-2024-63531 Advisory: Tiledb 2.7.0rc1 introduces a fix for a race condition that was causing inconsistencies during schema evolution operations. The fix involves setting a timestamp range to avoid conflicts during concurrent schema evolutions. This update could potentially lead to data integrity issues, unauthorized data access or modification, and even denial of service attacks if a race condition is exploited. Inc/TileDB/pull/2776/commits/6dfa2cb2ce3b60b811eabd893118cadce13b8c2a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tiledb version less then 2.7.0rc1 have ### Response: Having vulnarability PVE-2024-63531 Advisory: Tiledb 2.7.0rc1 introduces a fix for a race condition that was causing inconsistencies during schema evolution operations. The fix involves setting a timestamp range to avoid conflicts during concurrent schema evolutions. This update could potentially lead to data integrity issues, unauthorized data access or modification, and even denial of service attacks if a race condition is exploited. Inc/TileDB/pull/2776/commits/6dfa2cb2ce3b60b811eabd893118cadce13b8c2a | what vulnarability does tiledb version less then 2.7.0rc1 have | |
Having vulnarability CVE-2020-29651 Advisory: Time-series-metadata 0.1.1 updates its dependency 'py' to v1.10.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does time-series-metadata version less then 0.1.1 have ### Response: Having vulnarability CVE-2020-29651 Advisory: Time-series-metadata 0.1.1 updates its dependency 'py' to v1.10.0 to include a security fix. | what vulnarability does time-series-metadata version less then 0.1.1 have | |
Having vulnarability PVE-2022-45419 Advisory: Timeit is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does timeit version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45419 Advisory: Timeit is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does timeit version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-40164 Advisory: Timetagger 21.3.3 improves the authentication system to make it more secure (can revoke access). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does timetagger version less then 21.3.3 have ### Response: Having vulnarability PVE-2021-40164 Advisory: Timetagger 21.3.3 improves the authentication system to make it more secure (can revoke access). | what vulnarability does timetagger version less then 21.3.3 have | |
Having vulnarability CVE-2021-41496 Advisory: Timezonefinder 6.0.2 updates its dependency 'numpy' to v1.22.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does timezonefinder version less then 6.0.2 have ### Response: Having vulnarability CVE-2021-41496 Advisory: Timezonefinder 6.0.2 updates its dependency 'numpy' to v1.22.4 to include security fixes. | what vulnarability does timezonefinder version less then 6.0.2 have | |
Having vulnarability PVE-2021-38579 Advisory: The AES-CTR-HMAC-AEAD keys and the EncryptThenAuthenticate subtle implementation in tink versions before 1.4.0 may be vulnerable to chosen-ciphertext attacks. An attacker can generate ciphertexts that bypass the HMAC verification if and only if all of the following conditions are true:
* Tink C++ is used on systems where size_t is a 32-bit integer. This is usually the case on 32-bit machines.
* The attacker can specify long (>= 2^29 bytes ~ 536MB) associated data. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tink version less then 1.4.0 have ### Response: Having vulnarability PVE-2021-38579 Advisory: The AES-CTR-HMAC-AEAD keys and the EncryptThenAuthenticate subtle implementation in tink versions before 1.4.0 may be vulnerable to chosen-ciphertext attacks. An attacker can generate ciphertexts that bypass the HMAC verification if and only if all of the following conditions are true:
* Tink C++ is used on systems where size_t is a 32-bit integer. This is usually the case on 32-bit machines.
* The attacker can specify long (>= 2^29 bytes ~ 536MB) associated data. | what vulnarability does tink version less then 1.4.0 have | |
Having vulnarability PVE-2021-37692 Advisory: Tiny-gnupg 0.3.0 overhauls the ``gen_key()`` which now creates a different set of default keys. It no longer creates one primary key which does certifying & signing, with one subkey which handles encryption. Instead, tiny-gnupg 0.3.0 creates one certifying primary key, with three subkeys, one each for handling encryption, authentication, & signing. This is a more theoretically secure default key setup, & represents a common best-practice. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tiny-gnupg version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-37692 Advisory: Tiny-gnupg 0.3.0 overhauls the ``gen_key()`` which now creates a different set of default keys. It no longer creates one primary key which does certifying & signing, with one subkey which handles encryption. Instead, tiny-gnupg 0.3.0 creates one certifying primary key, with three subkeys, one each for handling encryption, authentication, & signing. This is a more theoretically secure default key setup, & represents a common best-practice. | what vulnarability does tiny-gnupg version less then 0.3.0 have | |
Having vulnarability PVE-2021-26160 Advisory: tinydb-serialization before 2.0.0 has an insecure implementation in ``ConcurrencyMiddleware``.
https://github.com/msiemens/tinydb/issues/18 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tinydb version less then 2.0.0 have ### Response: Having vulnarability PVE-2021-26160 Advisory: tinydb-serialization before 2.0.0 has an insecure implementation in ``ConcurrencyMiddleware``.
https://github.com/msiemens/tinydb/issues/18 | what vulnarability does tinydb version less then 2.0.0 have | |
Having vulnarability CVE-2021-3572 Advisory: Tiramisu-brulee 0.1.30 updates its dependency 'pip' to v21.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tiramisu-brulee version less then 0.1.30 have ### Response: Having vulnarability CVE-2021-3572 Advisory: Tiramisu-brulee 0.1.30 updates its dependency 'pip' to v21.1 to include a security fix. | what vulnarability does tiramisu-brulee version less then 0.1.30 have | |
Having vulnarability PVE-2022-51760 Advisory: Tkniter is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tkniter version greather then 0 have ### Response: Having vulnarability PVE-2022-51760 Advisory: Tkniter is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does tkniter version greather then 0 have | |
Having vulnarability PVE-2021-39839 Advisory: Tksvg 0.6 applies security patches for DoS vulnerabilities.
https://github.com/TkinterEP/python-tksvg/commit/92c23d7c3a01ab4ba225815d32bc1b8eff16df00 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tksvg version less then 0.6 have ### Response: Having vulnarability PVE-2021-39839 Advisory: Tksvg 0.6 applies security patches for DoS vulnerabilities.
https://github.com/TkinterEP/python-tksvg/commit/92c23d7c3a01ab4ba225815d32bc1b8eff16df00 | what vulnarability does tksvg version less then 0.6 have | |
Having vulnarability CVE-2022-24902 Advisory: TkVideoplayer is a simple library to play video files in tkinter. Uncontrolled memory consumption in versions of TKVideoplayer prior to 2.0.0 can theoretically lead to performance degradation. There are no known workarounds. This issue has been patched and users are advised to upgrade to version 2.0.0 or later. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tkvideoplayer version greather then equal to 0,less then 2.0.0 have ### Response: Having vulnarability CVE-2022-24902 Advisory: TkVideoplayer is a simple library to play video files in tkinter. Uncontrolled memory consumption in versions of TKVideoplayer prior to 2.0.0 can theoretically lead to performance degradation. There are no known workarounds. This issue has been patched and users are advised to upgrade to version 2.0.0 or later. | what vulnarability does tkvideoplayer version greather then equal to 0,less then 2.0.0 have | |
Having vulnarability CVE-2015-3220 Advisory: The tlslite library before 0.4.9 for Python allows remote attackers to trigger a denial of service (runtime exception and process crash). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tlslite version less then 0.4.9 have ### Response: Having vulnarability CVE-2015-3220 Advisory: The tlslite library before 0.4.9 for Python allows remote attackers to trigger a denial of service (runtime exception and process crash). | what vulnarability does tlslite version less then 0.4.9 have | |
Having vulnarability CVE-2020-26263 Advisory: Tlslite-ng versions 0.7.6 and 0.8.0-alpha39 include a fix for CVE-2020-26263: Tlslite-ng is an open source python library that implements SSL and TLS cryptographic protocols. In tlslite-ng before versions 0.7.6 and 0.8.0-alpha39, the code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependent. In particular, the code has multiple ways in which it leaks information about the decrypted ciphertext. It aborts as soon as the plaintext doesn't start with 0x00, 0x02. All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable.
Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not the case (see reference). As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the security policy of tlslite-ng.
https://github.com/tlsfuzzer/tlslite-ng/security/advisories/GHSA-wvcv-832q-fjg7
https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368
https://github.com/tlsfuzzer/tlslite-ng/pull/438
https://github.com/tlsfuzzer/tlslite-ng/pull/439
https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tlslite-ng version less then 0.7.6,greather then equal to 0.8.0-alpha1,less then 0.8.0-alpha39 have ### Response: Having vulnarability CVE-2020-26263 Advisory: Tlslite-ng versions 0.7.6 and 0.8.0-alpha39 include a fix for CVE-2020-26263: Tlslite-ng is an open source python library that implements SSL and TLS cryptographic protocols. In tlslite-ng before versions 0.7.6 and 0.8.0-alpha39, the code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependent. In particular, the code has multiple ways in which it leaks information about the decrypted ciphertext. It aborts as soon as the plaintext doesn't start with 0x00, 0x02. All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable.
Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not the case (see reference). As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the security policy of tlslite-ng.
https://github.com/tlsfuzzer/tlslite-ng/security/advisories/GHSA-wvcv-832q-fjg7
https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368
https://github.com/tlsfuzzer/tlslite-ng/pull/438
https://github.com/tlsfuzzer/tlslite-ng/pull/439
https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/ | what vulnarability does tlslite-ng version less then 0.7.6,greather then equal to 0.8.0-alpha1,less then 0.8.0-alpha39 have | |
Having vulnarability PVE-2021-38635 Advisory: Rmt 0.19 makes the discover step a little bit more secure. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tmt version less then 0.19 have ### Response: Having vulnarability PVE-2021-38635 Advisory: Rmt 0.19 makes the discover step a little bit more secure. | what vulnarability does tmt version less then 0.19 have | |
Having vulnarability CVE-2017-7234 Advisory: Toga-core 0.3.0.dev15 updates its dependency 'Django' minimum requirement to versions ~2.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does toga-core version less then 0.3.0.dev15 have ### Response: Having vulnarability CVE-2017-7234 Advisory: Toga-core 0.3.0.dev15 updates its dependency 'Django' minimum requirement to versions ~2.2 to include security fixes. | what vulnarability does toga-core version less then 0.3.0.dev15 have | |
Having vulnarability PVE-2021-40617 Advisory: Toggl-to-sqlite 0.3.1 removes the 'api_token' from the workspaces table. The presence of this field presented a security issue if a user published their 'SQLite' database to a public source (like 'Vercel'). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does toggl-to-sqlite version less then 0.3.1 have ### Response: Having vulnarability PVE-2021-40617 Advisory: Toggl-to-sqlite 0.3.1 removes the 'api_token' from the workspaces table. The presence of this field presented a security issue if a user published their 'SQLite' database to a public source (like 'Vercel'). | what vulnarability does toggl-to-sqlite version less then 0.3.1 have | |
Having vulnarability CVE-2022-34060 Advisory: The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does togglee version equal to 0.0.8 have ### Response: Having vulnarability CVE-2022-34060 Advisory: The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does togglee version equal to 0.0.8 have | |
Having vulnarability CVE-2020-10735 Advisory: Tomcatmanager 5.0.0 removed support for Python 3.6, which will not receive more security updates after 2021-12-23. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tomcatmanager version less then 5.0.0 have ### Response: Having vulnarability CVE-2020-10735 Advisory: Tomcatmanager 5.0.0 removed support for Python 3.6, which will not receive more security updates after 2021-12-23. | what vulnarability does tomcatmanager version less then 5.0.0 have | |
Having vulnarability PVE-2023-52914 Advisory: Tomproxies is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tomproxies version greather then 0 have ### Response: Having vulnarability PVE-2023-52914 Advisory: Tomproxies is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does tomproxies version greather then 0 have | |
Having vulnarability CVE-2019-19118 Advisory: Tomtoolkit 1.6.1 updates its dependency 'Django' requirement to '>=3.0.7' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tomtoolkit version less then 1.6.1 have ### Response: Having vulnarability CVE-2019-19118 Advisory: Tomtoolkit 1.6.1 updates its dependency 'Django' requirement to '>=3.0.7' to include security fixes. | what vulnarability does tomtoolkit version less then 1.6.1 have | |
Having vulnarability PVE-2024-63215 Advisory: Toodledo 1.5.0 adds a 'clear' keyword argument to TaskCache initialization. Setting 'clear' to True during initialization will clear and reload the cache.
https://github.com/jikamens/toodledo-python/commit/2e84231eb58e7cba46e590aa43a4f0d2e7030449 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does toodledo version less then 1.5.0 have ### Response: Having vulnarability PVE-2024-63215 Advisory: Toodledo 1.5.0 adds a 'clear' keyword argument to TaskCache initialization. Setting 'clear' to True during initialization will clear and reload the cache.
https://github.com/jikamens/toodledo-python/commit/2e84231eb58e7cba46e590aa43a4f0d2e7030449 | what vulnarability does toodledo version less then 1.5.0 have | |
Having vulnarability PVE-2024-64832 Advisory: Toolium 3.1.1 upgrades its readthedocs-sphinx-search to 0.3.2 to fix a security vulnerability.
https://github.com/Telefonica/toolium/commit/3fe3e3b2564ea8fa8841568fc291eae6e7156941 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does toolium version less then 3.1.1 have ### Response: Having vulnarability PVE-2024-64832 Advisory: Toolium 3.1.1 upgrades its readthedocs-sphinx-search to 0.3.2 to fix a security vulnerability.
https://github.com/Telefonica/toolium/commit/3fe3e3b2564ea8fa8841568fc291eae6e7156941 | what vulnarability does toolium version less then 3.1.1 have | |
Having vulnarability PVE-2023-60213 Advisory: Topobank-contact 1.1.1 includes a fix for a CSRF vulnerability.
https://github.com/ContactEngineering/topobank-contact/commit/fb71fd0893af91269dd61cd3af11250a50b77e88 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does topobank-contact version less then 1.1.1 have ### Response: Having vulnarability PVE-2023-60213 Advisory: Topobank-contact 1.1.1 includes a fix for a CSRF vulnerability.
https://github.com/ContactEngineering/topobank-contact/commit/fb71fd0893af91269dd61cd3af11250a50b77e88 | what vulnarability does topobank-contact version less then 1.1.1 have | |
Having vulnarability PVE-2023-60214 Advisory: Topobank-statistics 1.1.1 includes a fix for a CSRF vulnerability.
https://github.com/ContactEngineering/topobank-statistics/commit/c842e7dd077170f7cc72ff5289fa62bd5cc460bc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does topobank-statistics version less then 1.1.1 have ### Response: Having vulnarability PVE-2023-60214 Advisory: Topobank-statistics 1.1.1 includes a fix for a CSRF vulnerability.
https://github.com/ContactEngineering/topobank-statistics/commit/c842e7dd077170f7cc72ff5289fa62bd5cc460bc | what vulnarability does topobank-statistics version less then 1.1.1 have | |
Having vulnarability CVE-2018-1000523 Advisory: topydo contains a CWE-20: Improper Input Validation vulnerability in ListFormatParser::parse, file topydo/lib/ListFormat.py line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line.. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does topydo version greather then equal to 0 have ### Response: Having vulnarability CVE-2018-1000523 Advisory: topydo contains a CWE-20: Improper Input Validation vulnerability in ListFormatParser::parse, file topydo/lib/ListFormat.py line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line.. | what vulnarability does topydo version greather then equal to 0 have | |
Having vulnarability CVE-2023-45813 Advisory: Torbot 4.0.0 includes a fix for CVE-2023-45813: In affected versions the 'torbot.modules.validators.validate_link function' uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0.
https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does torbot version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-45813 Advisory: Torbot 4.0.0 includes a fix for CVE-2023-45813: In affected versions the 'torbot.modules.validators.validate_link function' uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0.
https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff | what vulnarability does torbot version less then 4.0.0 have | |
Having vulnarability PVE-2024-64663 Advisory: Torch 1.10.0 addresses a data race condition in the torch.jit.annotations.parse_type_line function which allowed simultaneous reading and writing the set of devices without synchronizing.
https://github.com/pytorch/pytorch/pull/58753 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does torch version less then 1.10.0 have ### Response: Having vulnarability PVE-2024-64663 Advisory: Torch 1.10.0 addresses a data race condition in the torch.jit.annotations.parse_type_line function which allowed simultaneous reading and writing the set of devices without synchronizing.
https://github.com/pytorch/pytorch/pull/58753 | what vulnarability does torch version less then 1.10.0 have | |
Having vulnarability CVE-2021-44228 Advisory: Torchserve 0.5.1 updates its dependency 'log4j' to v2.16.0 to include a fix for a critical vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does torchserve version less then 0.5.1 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Torchserve 0.5.1 updates its dependency 'log4j' to v2.16.0 to include a fix for a critical vulnerability. | what vulnarability does torchserve version less then 0.5.1 have | |
Having vulnarability PVE-2023-52923 Advisory: Torchtriton is malicious package that impersonated the library with the same name published on the PyTorch-nightly's repo. This one steals your sensitive files when imported.
https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does torchtriton version greather then 0 have ### Response: Having vulnarability PVE-2023-52923 Advisory: Torchtriton is malicious package that impersonated the library with the same name published on the PyTorch-nightly's repo. This one steals your sensitive files when imported.
https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays | what vulnarability does torchtriton version greather then 0 have | |
Having vulnarability CVE-2012-2374 Advisory: CRLF injection vulnerability in the tornado.web.RequestHandler.set_header function in Tornado before 2.2.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tornado version less then 2.2.1 have ### Response: Having vulnarability CVE-2012-2374 Advisory: CRLF injection vulnerability in the tornado.web.RequestHandler.set_header function in Tornado before 2.2.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input. | what vulnarability does tornado version less then 2.2.1 have | |
Having vulnarability CVE-2020-11010 Advisory: Tortoise-orm versions 0.15.23 and 0.16.6 include a fix for CVE-2020-11010: In Tortoise ORM before versions 0.15.23 and 0.16.6, various forms of SQL injection have been found for MySQL and when filtering or doing mass-updates on char/text fields. SQLite and PostgreSQL are only affected when filtering with contains, starts_with, or ends_with filters (and their case-insensitive counterparts).
https://github.com/tortoise/tortoise-orm/commit/91c364053e0ddf77edc5442914c6f049512678b3
https://github.com/tortoise/tortoise-orm/security/advisories/GHSA-9j2c-x8qm-qmjq | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tortoise-orm version less then 0.15.23,greather then equal to 0.16.0,less then 0.16.6 have ### Response: Having vulnarability CVE-2020-11010 Advisory: Tortoise-orm versions 0.15.23 and 0.16.6 include a fix for CVE-2020-11010: In Tortoise ORM before versions 0.15.23 and 0.16.6, various forms of SQL injection have been found for MySQL and when filtering or doing mass-updates on char/text fields. SQLite and PostgreSQL are only affected when filtering with contains, starts_with, or ends_with filters (and their case-insensitive counterparts).
https://github.com/tortoise/tortoise-orm/commit/91c364053e0ddf77edc5442914c6f049512678b3
https://github.com/tortoise/tortoise-orm/security/advisories/GHSA-9j2c-x8qm-qmjq | what vulnarability does tortoise-orm version less then 0.15.23,greather then equal to 0.16.0,less then 0.16.6 have | |
Having vulnarability PVE-2022-50729 Advisory: Toucan-connectors 3.18.2 sanitizes SQL for athena connector in order to prevent SQL injection.
https://github.com/ToucanToco/toucan-connectors/pull/649 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does toucan-connectors version less then 3.18.2 have ### Response: Having vulnarability PVE-2022-50729 Advisory: Toucan-connectors 3.18.2 sanitizes SQL for athena connector in order to prevent SQL injection.
https://github.com/ToucanToco/toucan-connectors/pull/649 | what vulnarability does toucan-connectors version less then 3.18.2 have | |
Having vulnarability CVE-2023-33175 Advisory: Toui 2.4.1 includes a fix for CVE-2023-33175: ToUI is using Flask-Caching (SimpleCache) to store user variables. These are stored in the server side. Websites that use 'Website.user_vars' property are affected.
https://github.com/mubarakalmehairbi/ToUI/security/advisories/GHSA-hh7j-pg39-q563 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does toui version greather then equal to 2.0.1,less then 2.4.1 have ### Response: Having vulnarability CVE-2023-33175 Advisory: Toui 2.4.1 includes a fix for CVE-2023-33175: ToUI is using Flask-Caching (SimpleCache) to store user variables. These are stored in the server side. Websites that use 'Website.user_vars' property are affected.
https://github.com/mubarakalmehairbi/ToUI/security/advisories/GHSA-hh7j-pg39-q563 | what vulnarability does toui version greather then equal to 2.0.1,less then 2.4.1 have | |
Having vulnarability CVE-2016-10075 Advisory: The tqdm._version module in tqdm versions before 4.11.2 allows local users to execute arbitrary code via a crafted repo with a malicious git log in the current working directory. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tqdm version less then 4.11.2 have ### Response: Having vulnarability CVE-2016-10075 Advisory: The tqdm._version module in tqdm versions before 4.11.2 allows local users to execute arbitrary code via a crafted repo with a malicious git log in the current working directory. | what vulnarability does tqdm version less then 4.11.2 have | |
Having vulnarability CVE-2005-2147 Advisory: Trac before 0.8.4 allows remote attackers to read or upload arbitrary files via a full pathname in the id parameter to the (1) upload or (2) attachment viewer scripts. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trac version less then 0.8.4 have ### Response: Having vulnarability CVE-2005-2147 Advisory: Trac before 0.8.4 allows remote attackers to read or upload arbitrary files via a full pathname in the id parameter to the (1) upload or (2) attachment viewer scripts. | what vulnarability does trac version less then 0.8.4 have | |
Having vulnarability PVE-2021-26162 Advisory: Tracauthopenid before 0.4.4 does not properly authorize if no email address was returned via AX or SREG. The 'email_white_list' config option was being ignored. Now, if 'email_white_list' is set and no email address can be determined, authorization will be denied. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tracauthopenid version less then 0.4.4 have ### Response: Having vulnarability PVE-2021-26162 Advisory: Tracauthopenid before 0.4.4 does not properly authorize if no email address was returned via AX or SREG. The 'email_white_list' config option was being ignored. Now, if 'email_white_list' is set and no email address can be determined, authorization will be denied. | what vulnarability does tracauthopenid version less then 0.4.4 have | |
Having vulnarability CVE-2017-18342 Advisory: Trackthenews 0.1.10 includes a security patch for the function 'main' in 'trackthenews/core.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/freedomofpress/trackthenews/commit/7ef1ae9d3ac2793e55d9df4161eddb46ff9a9fde | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trackthenews version less then 0.1.10 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Trackthenews 0.1.10 includes a security patch for the function 'main' in 'trackthenews/core.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/freedomofpress/trackthenews/commit/7ef1ae9d3ac2793e55d9df4161eddb46ff9a9fde | what vulnarability does trackthenews version less then 0.1.10 have | |
Having vulnarability PVE-2022-51450 Advisory: Transformers 4.23.0 includes a fix for a link vulnerable to repojacking.
https://github.com/huggingface/transformers/commit/ce2620194b4a8f070cd29504d34a79758affdf95 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does transformers version less then 4.23.0 have ### Response: Having vulnarability PVE-2022-51450 Advisory: Transformers 4.23.0 includes a fix for a link vulnerable to repojacking.
https://github.com/huggingface/transformers/commit/ce2620194b4a8f070cd29504d34a79758affdf95 | what vulnarability does transformers version less then 4.23.0 have | |
Having vulnarability CVE-2013-2073 Advisory: Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does transifex-client version less then 0.9 have ### Response: Having vulnarability CVE-2013-2073 Advisory: Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate. | what vulnarability does transifex-client version less then 0.9 have | |
Having vulnarability CVE-2023-47204 Advisory: Transmute-core 1.13.5 includes a fix for CVE-2023-47204: Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attackers to execute arbitrary Python code.
https://github.com/toumorokoshi/transmute-core/pull/58 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does transmute-core version less then 1.13.5 have ### Response: Having vulnarability CVE-2023-47204 Advisory: Transmute-core 1.13.5 includes a fix for CVE-2023-47204: Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attackers to execute arbitrary Python code.
https://github.com/toumorokoshi/transmute-core/pull/58 | what vulnarability does transmute-core version less then 1.13.5 have | |
Having vulnarability PVE-2021-34319 Advisory: Trash-cli before 0.17.1.14 has a bug that causes trash-put to use $topdir/.Trash/UID trashcan even when it is not secure and $topdir/.Trash-UID should be used instead. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trash-cli version less then 0.17.1.14 have ### Response: Having vulnarability PVE-2021-34319 Advisory: Trash-cli before 0.17.1.14 has a bug that causes trash-put to use $topdir/.Trash/UID trashcan even when it is not secure and $topdir/.Trash-UID should be used instead. | what vulnarability does trash-cli version less then 0.17.1.14 have | |
Having vulnarability CVE-2022-29217 Advisory: Treillage 0.2.1 updates its dependency 'PyJWT' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does treillage version less then 0.2.1 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Treillage 0.2.1 updates its dependency 'PyJWT' to include a security fix. | what vulnarability does treillage version less then 0.2.1 have | |
Having vulnarability CVE-2022-23607 Advisory: Treq 22.1.0 includes a fix for CVE-2022-23607: Treq's request methods ('treq.get', 'treq.post', etc.) and 'treq.client.HTTPClient' constructor accept cookies as a dictionary. Such cookies are not bound to a single domain, and are therefore sent to *every* domain ("supercookies"). This can potentially cause sensitive information to leak upon an HTTP redirect to a different domain., e.g. should 'https://example.com' redirect to 'http://cloudstorageprovider.com' the latter will receive the cookie 'session'. Treq 22.1.0 and later bind cookies given to request methods ('treq.request', 'treq.get', 'HTTPClient.request', 'HTTPClient.get', etc.) to the origin of the *url* parameter. For users unable to upgrade, instead of passing a dictionary as the *cookies* argument, pass a 'http.cookiejar.CookieJar' instance with properly domain- and scheme-scoped cookies in it.
https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does treq version less then 22.1.0 have ### Response: Having vulnarability CVE-2022-23607 Advisory: Treq 22.1.0 includes a fix for CVE-2022-23607: Treq's request methods ('treq.get', 'treq.post', etc.) and 'treq.client.HTTPClient' constructor accept cookies as a dictionary. Such cookies are not bound to a single domain, and are therefore sent to *every* domain ("supercookies"). This can potentially cause sensitive information to leak upon an HTTP redirect to a different domain., e.g. should 'https://example.com' redirect to 'http://cloudstorageprovider.com' the latter will receive the cookie 'session'. Treq 22.1.0 and later bind cookies given to request methods ('treq.request', 'treq.get', 'HTTPClient.request', 'HTTPClient.get', etc.) to the origin of the *url* parameter. For users unable to upgrade, instead of passing a dictionary as the *cookies* argument, pass a 'http.cookiejar.CookieJar' instance with properly domain- and scheme-scoped cookies in it.
https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc | what vulnarability does treq version less then 22.1.0 have | |
Having vulnarability CVE-2022-24439 Advisory: Trex 0.1.7 updates its dependency 'gitpython' to version '3.1.30' to include a security fix.
https://github.com/berrysauce/trex/commit/08c9630caaf81f1dc6f0dd549f88084eca5236ac | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trex version less then 0.1.7 have ### Response: Having vulnarability CVE-2022-24439 Advisory: Trex 0.1.7 updates its dependency 'gitpython' to version '3.1.30' to include a security fix.
https://github.com/berrysauce/trex/commit/08c9630caaf81f1dc6f0dd549f88084eca5236ac | what vulnarability does trex version less then 0.1.7 have | |
Having vulnarability CVE-2017-18342 Advisory: Triage 3.3.0 updates its dependency 'pyyaml' to versions '>=4.2b1' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does triage version less then 3.3.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Triage 3.3.0 updates its dependency 'pyyaml' to versions '>=4.2b1' to include a security fix. | what vulnarability does triage version less then 3.3.0 have | |
Having vulnarability CVE-2023-4863 Advisory: Trialtracker 0.1.7 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://github.com/ProtocolData/trialtracker/blob/3cbcfee719e8586067f9a587fadceabce034057b/env/requirements.txt#L108 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trialtracker version less then equal to 0.1.7 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Trialtracker 0.1.7 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://github.com/ProtocolData/trialtracker/blob/3cbcfee719e8586067f9a587fadceabce034057b/env/requirements.txt#L108 | what vulnarability does trialtracker version less then equal to 0.1.7 have | |
Having vulnarability PVE-2024-66824 Advisory: Tribler 6.4.1 addresses an issue regarding RSA encryption, noting its research context rather than practical use in tunnels. The discussion originates from work on homomorphic encryption for a 2013 paper, exploring Private Set Intersection problems in P2P systems. A specific RSA approach highlighted for its homomorphic properties required a unique implementation, leading to the creation of a "compatible_key" method. This was due to limitations in existing cryptographic libraries.
https://github.com/Tribler/tribler/pull/1188 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tribler version less then 6.4.1 have ### Response: Having vulnarability PVE-2024-66824 Advisory: Tribler 6.4.1 addresses an issue regarding RSA encryption, noting its research context rather than practical use in tunnels. The discussion originates from work on homomorphic encryption for a 2013 paper, exploring Private Set Intersection problems in P2P systems. A specific RSA approach highlighted for its homomorphic properties required a unique implementation, leading to the creation of a "compatible_key" method. This was due to limitations in existing cryptographic libraries.
https://github.com/Tribler/tribler/pull/1188 | what vulnarability does tribler version less then 6.4.1 have | |
Having vulnarability CVE-2023-28370 Advisory: Triplea 0.0.2 updates its dependency 'tornado' to v6.3.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does triplea version less then 0.0.2 have ### Response: Having vulnarability CVE-2023-28370 Advisory: Triplea 0.0.2 updates its dependency 'tornado' to v6.3.2 to include a security fix. | what vulnarability does triplea version less then 0.0.2 have | |
Having vulnarability CVE-2022-3101 Advisory: A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.
https://github.com/advisories/GHSA-7x96-2w32-w3gw | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tripleo-ansible version less then equal to 6.0.0 have ### Response: Having vulnarability CVE-2022-3101 Advisory: A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.
https://github.com/advisories/GHSA-7x96-2w32-w3gw | what vulnarability does tripleo-ansible version less then equal to 6.0.0 have | |
Having vulnarability CVE-2015-5303 Advisory: The TripleO Heat templates (tripleo-heat-templates), when deployed via the commandline interface, allow remote attackers to spoof OpenStack Networking metadata requests by leveraging knowledge of the default value of the NeutronMetadataProxySharedSecret parameter. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tripleo-heat-templates version less then 0.8.10,equal to 1.0.0 have ### Response: Having vulnarability CVE-2015-5303 Advisory: The TripleO Heat templates (tripleo-heat-templates), when deployed via the commandline interface, allow remote attackers to spoof OpenStack Networking metadata requests by leveraging knowledge of the default value of the NeutronMetadataProxySharedSecret parameter. | what vulnarability does tripleo-heat-templates version less then 0.8.10,equal to 1.0.0 have | |
Having vulnarability PVE-2021-36954 Advisory: trosnoth before 1.13.0 had insecure hard-coded server settings in the configuration file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trosnoth version less then 1.13.0 have ### Response: Having vulnarability PVE-2021-36954 Advisory: trosnoth before 1.13.0 had insecure hard-coded server settings in the configuration file. | what vulnarability does trosnoth version less then 1.13.0 have | |
Having vulnarability CVE-2015-3156 Advisory: The _write_config function in trove/guestagent/datastore/experimental/mongodb/service.py, reset_configuration function in trove/guestagent/datastore/experimental/postgresql/service/config.py, write_config function in trove/guestagent/datastore/experimental/redis/service.py, _write_mycnf function in trove/guestagent/datastore/mysql/service.py, InnoBackupEx::_run_prepare function in trove/guestagent/strategies/restore/mysql_impl.py, InnoBackupEx::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, MySQLDump::cmd in trove/guestagent/strategies/backup/mysql_impl.py, InnoBackupExIncremental::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, _get_actual_db_status function in trove/guestagent/datastore/experimental/cassandra/system.py and trove/guestagent/datastore/experimental/cassandra/service.py, and multiple class CbBackup methods in trove/guestagent/strategies/backup/experimental/couchbase_impl.py in Openstack DBaaS (aka Trove) as packaged in Openstack before 2015.1.0 (aka Kilo) allows local users to write to configuration files via a symlink attack on a temporary file. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trove version less then 2015.1.0 have ### Response: Having vulnarability CVE-2015-3156 Advisory: The _write_config function in trove/guestagent/datastore/experimental/mongodb/service.py, reset_configuration function in trove/guestagent/datastore/experimental/postgresql/service/config.py, write_config function in trove/guestagent/datastore/experimental/redis/service.py, _write_mycnf function in trove/guestagent/datastore/mysql/service.py, InnoBackupEx::_run_prepare function in trove/guestagent/strategies/restore/mysql_impl.py, InnoBackupEx::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, MySQLDump::cmd in trove/guestagent/strategies/backup/mysql_impl.py, InnoBackupExIncremental::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, _get_actual_db_status function in trove/guestagent/datastore/experimental/cassandra/system.py and trove/guestagent/datastore/experimental/cassandra/service.py, and multiple class CbBackup methods in trove/guestagent/strategies/backup/experimental/couchbase_impl.py in Openstack DBaaS (aka Trove) as packaged in Openstack before 2015.1.0 (aka Kilo) allows local users to write to configuration files via a symlink attack on a temporary file. | what vulnarability does trove version less then 2015.1.0 have | |
Having vulnarability PVE-2022-45460 Advisory: Trrfab is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.
https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trrfab version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45460 Advisory: Trrfab is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.
https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html | what vulnarability does trrfab version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-38105 Advisory: Trustpilot 6.1.0 includes security upgrades of the requests and urllib dependencies. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trustpilot version less then 6.1.0 have ### Response: Having vulnarability PVE-2021-38105 Advisory: Trustpilot 6.1.0 includes security upgrades of the requests and urllib dependencies. | what vulnarability does trustpilot version less then 6.1.0 have | |
Having vulnarability CVE-2012-0215 Advisory: model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Python does not properly restrict access to the Many2Many field in the relation model, which allows remote authenticated users to modify the privileges of arbitrary users via a (1) create, (2) write, (3) delete, or (4) copy rpc call. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tryton version less then 2.4.0 have ### Response: Having vulnarability CVE-2012-0215 Advisory: model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Python does not properly restrict access to the Many2Many field in the relation model, which allows remote authenticated users to modify the privileges of arbitrary users via a (1) create, (2) write, (3) delete, or (4) copy rpc call. | what vulnarability does tryton version less then 2.4.0 have | |
Having vulnarability CVE-2012-0215 Advisory: model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Python does not properly restrict access to the Many2Many field in the relation model, which allows remote authenticated users to modify the privileges of arbitrary users via a (1) create, (2) write, (3) delete, or (4) copy rpc call. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does trytond version less then 2.4.0 have ### Response: Having vulnarability CVE-2012-0215 Advisory: model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Python does not properly restrict access to the Many2Many field in the relation model, which allows remote authenticated users to modify the privileges of arbitrary users via a (1) create, (2) write, (3) delete, or (4) copy rpc call. | what vulnarability does trytond version less then 2.4.0 have | |
Having vulnarability CVE-2021-27291 Advisory: Tsgettoolbox 23.21.0 pins its indirect dependency 'pygments' to a version >=2.7.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tsgettoolbox version less then 23.21.0 have ### Response: Having vulnarability CVE-2021-27291 Advisory: Tsgettoolbox 23.21.0 pins its indirect dependency 'pygments' to a version >=2.7.4 to include security fixes. | what vulnarability does tsgettoolbox version less then 23.21.0 have | |
Having vulnarability CVE-2021-27291 Advisory: Tstoolbox 103.15.0 pins its dependency 'pygments' to versions >=2.7.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tstoolbox version less then 103.15.0 have ### Response: Having vulnarability CVE-2021-27291 Advisory: Tstoolbox 103.15.0 pins its dependency 'pygments' to versions >=2.7.4 to include security fixes. | what vulnarability does tstoolbox version less then 103.15.0 have | |
Having vulnarability PVE-2021-38370 Advisory: Ttrv 1.12.1 fixes a security vulnerability where malicious URLs could inject python code. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ttrv version less then 1.12.1 have ### Response: Having vulnarability PVE-2021-38370 Advisory: Ttrv 1.12.1 fixes a security vulnerability where malicious URLs could inject python code. | what vulnarability does ttrv version less then 1.12.1 have | |
Having vulnarability PVE-2023-60098 Advisory: Tts 0.9.0 includes a fix for a Race Condition vulnerability.
https://github.com/coqui-ai/TTS/pull/1807 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tts version less then 0.9.0 have ### Response: Having vulnarability PVE-2023-60098 Advisory: Tts 0.9.0 includes a fix for a Race Condition vulnerability.
https://github.com/coqui-ai/TTS/pull/1807 | what vulnarability does tts version less then 0.9.0 have | |
Having vulnarability PVE-2021-36279 Advisory: Tuf 0.11.1 prevents a persistent freeze attack - see: https://github.com/theupdateframework/tuf/pull/737 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tuf version less then 0.11.1 have ### Response: Having vulnarability PVE-2021-36279 Advisory: Tuf 0.11.1 prevents a persistent freeze attack - see: https://github.com/theupdateframework/tuf/pull/737 | what vulnarability does tuf version less then 0.11.1 have | |
Having vulnarability CVE-2024-23341 Advisory: TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese characters and Roman characters, and extracting sentences of the Taiwanese Chinese characters and the Roman characters. Prior to version 1.3.2, when using `tuitse_html` without quoting the input, there is a html injection vulnerability. Version 1.3.2 contains a patch for the issue. As a workaround, sanitize Taigi input with HTML quotation. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tuitse-tsusin version less then 1.3.2 have ### Response: Having vulnarability CVE-2024-23341 Advisory: TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese characters and Roman characters, and extracting sentences of the Taiwanese Chinese characters and the Roman characters. Prior to version 1.3.2, when using `tuitse_html` without quoting the input, there is a html injection vulnerability. Version 1.3.2 contains a patch for the issue. As a workaround, sanitize Taigi input with HTML quotation. | what vulnarability does tuitse-tsusin version less then 1.3.2 have | |
Having vulnarability CVE-2022-43982 Advisory: Tulflow 0.9.1 updates its dependency 'apache-airflow' to v2.4.3 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tulflow version less then 0.9.1 have ### Response: Having vulnarability CVE-2022-43982 Advisory: Tulflow 0.9.1 updates its dependency 'apache-airflow' to v2.4.3 to include security fixes. | what vulnarability does tulflow version less then 0.9.1 have | |
Having vulnarability CVE-2019-25101 Advisory: A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The name of the patch is f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does turbogears version greather then equal to 0,less then 1.0.11.11 have ### Response: Having vulnarability CVE-2019-25101 Advisory: A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The name of the patch is f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059. | what vulnarability does turbogears version greather then equal to 0,less then 1.0.11.11 have | |
Having vulnarability PVE-2021-40919 Advisory: Tutor 10.0.5 applies upstream XSS security fixes for the 'edx-platform' underlying dependency.
https://github.com/overhangio/tutor/commit/1773e2a347e6a9b3e378886ab2f8878dc6d80530 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tutor version less then 10.0.5 have ### Response: Having vulnarability PVE-2021-40919 Advisory: Tutor 10.0.5 applies upstream XSS security fixes for the 'edx-platform' underlying dependency.
https://github.com/overhangio/tutor/commit/1773e2a347e6a9b3e378886ab2f8878dc6d80530 | what vulnarability does tutor version less then 10.0.5 have | |
Having vulnarability CVE-2012-5825 Advisory: Tweepy does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the Python httplib library. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does tweepy version less then 3.0 have ### Response: Having vulnarability CVE-2012-5825 Advisory: Tweepy does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the Python httplib library. | what vulnarability does tweepy version less then 3.0 have | |
Having vulnarability PVE-2021-26169 Advisory: twilio before 3.5.0 is vulnerable to a timing attack vector in signature validation. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does twilio version less then 3.5.0 have ### Response: Having vulnarability PVE-2021-26169 Advisory: twilio before 3.5.0 is vulnerable to a timing attack vector in signature validation. | what vulnarability does twilio version less then 3.5.0 have | |
Having vulnarability CVE-2018-18074 Advisory: Twine 2.0.0 updates requests to 2.20 (or later) to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does twine version less then 2.0.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Twine 2.0.0 updates requests to 2.20 (or later) to include a security fix. | what vulnarability does twine version less then 2.0.0 have | |
Having vulnarability PVE-2021-39334 Advisory: A security vulnerability was discovered in twirp before 5.5.1 in the 'requirements.txt' file that is used to test Python-generated code, and could be used as sub-dependency checks for Python projects using Twirp. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does twirp version less then 5.5.1 have ### Response: Having vulnarability PVE-2021-39334 Advisory: A security vulnerability was discovered in twirp before 5.5.1 in the 'requirements.txt' file that is used to test Python-generated code, and could be used as sub-dependency checks for Python projects using Twirp. | what vulnarability does twirp version less then 5.5.1 have | |
Having vulnarability CVE-2016-1000111 Advisory: Twisted Web 16.4.0 includes the following three security fixes:
- A bug in twisted.web.server.Site.makeSession which may lead to predictable session IDs was fixed. Session IDs are now generated securely using `os.urandom`.
- twisted.web.server.Request.getSession will now, for a request sent over HTTPS, set a "Secure" cookie, preventing the secure session from being sent over plain-text HTTP.
- twisted.web.twcgi.CGIScript will now not pass the "Proxy" header to CGI scripts, as a mitigation to CVE-2016-1000111. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does twisted version less then 16.4.0 have ### Response: Having vulnarability CVE-2016-1000111 Advisory: Twisted Web 16.4.0 includes the following three security fixes:
- A bug in twisted.web.server.Site.makeSession which may lead to predictable session IDs was fixed. Session IDs are now generated securely using `os.urandom`.
- twisted.web.server.Request.getSession will now, for a request sent over HTTPS, set a "Secure" cookie, preventing the secure session from being sent over plain-text HTTP.
- twisted.web.twcgi.CGIScript will now not pass the "Proxy" header to CGI scripts, as a mitigation to CVE-2016-1000111. | what vulnarability does twisted version less then 16.4.0 have | |
Having vulnarability PVE-2021-37820 Advisory: twitchirc before 1.3 does not include a secure option to [`Connection`](twitchirc/twitchirc/connection.py) | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does twitchirc version less then 1.3 have ### Response: Having vulnarability PVE-2021-37820 Advisory: twitchirc before 1.3 does not include a secure option to [`Connection`](twitchirc/twitchirc/connection.py) | what vulnarability does twitchirc version less then 1.3 have | |
Having vulnarability CVE-2018-18074 Advisory: Twodolib 0.5.1 updates its dependency 'requests' to v2.20.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does twodolib version less then 0.5.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Twodolib 0.5.1 updates its dependency 'requests' to v2.20.1 to include a security fix. | what vulnarability does twodolib version less then 0.5.1 have | |
Having vulnarability CVE-2022-40896 Advisory: Twyn 2.5.7 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability.
https://github.com/elementsinteractive/twyn/pull/30 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does twyn version less then 2.5.7 have ### Response: Having vulnarability CVE-2022-40896 Advisory: Twyn 2.5.7 updates its dependency 'pygments' to version '2.15.1' to include a fix for a ReDoS vulnerability.
https://github.com/elementsinteractive/twyn/pull/30 | what vulnarability does twyn version less then 2.5.7 have | |
Having vulnarability PVE-2022-51679 Advisory: Twyne is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does twyne version greather then 0 have ### Response: Having vulnarability PVE-2022-51679 Advisory: Twyne is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does twyne version greather then 0 have | |
Having vulnarability CVE-2017-1000007 Advisory: txAWS (all current versions) fail to perform complete certificate verification resulting in vulnerability to MitM attacks and information disclosure. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does txaws version greather then 0 have ### Response: Having vulnarability CVE-2017-1000007 Advisory: txAWS (all current versions) fail to perform complete certificate verification resulting in vulnerability to MitM attacks and information disclosure. | what vulnarability does txaws version greather then 0 have | |
Having vulnarability PVE-2022-51698 Advisory: Type-color is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does type-color version greather then 0 have ### Response: Having vulnarability PVE-2022-51698 Advisory: Type-color is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does type-color version greather then 0 have | |
Having vulnarability CVE-2019-19275 Advisory: Typed_ast 1.3.0 and 1.3.1 have an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.) See: CVE-2019-19275. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does typed-ast version less then equal to 1.3.2 have ### Response: Having vulnarability CVE-2019-19275 Advisory: Typed_ast 1.3.0 and 1.3.1 have an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.) See: CVE-2019-19275. | what vulnarability does typed-ast version less then equal to 1.3.2 have | |
Having vulnarability PVE-2024-67006 Advisory: Typed-ffmpeg 1.0.4 enhances security by restricting class loading exclusively to the ffmpeg module, preventing unauthorized or unsafe class loading practices. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does typed-ffmpeg version less then 1.0.4 have ### Response: Having vulnarability PVE-2024-67006 Advisory: Typed-ffmpeg 1.0.4 enhances security by restricting class loading exclusively to the ffmpeg module, preventing unauthorized or unsafe class loading practices. | what vulnarability does typed-ffmpeg version less then 1.0.4 have | |
Having vulnarability PVE-2021-41727 Advisory: Typedb-client 2.1.1 implements secure channels for authentication. SSL is now required for connections to TypeDB cluster. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does typedb-client version less then 2.1.1 have ### Response: Having vulnarability PVE-2021-41727 Advisory: Typedb-client 2.1.1 implements secure channels for authentication. SSL is now required for connections to TypeDB cluster. | what vulnarability does typedb-client version less then 2.1.1 have | |
Having vulnarability PVE-2023-61485 Advisory: Typedb-driver 2.1.1 includes a fix for an unsafe defaults vulnerability: SSL is now required for connections to TypeDB cluster.
https://github.com/vaticle/typedb-driver-python/pull/225 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does typedb-driver version less then 2.1.1 have ### Response: Having vulnarability PVE-2023-61485 Advisory: Typedb-driver 2.1.1 includes a fix for an unsafe defaults vulnerability: SSL is now required for connections to TypeDB cluster.
https://github.com/vaticle/typedb-driver-python/pull/225 | what vulnarability does typedb-driver version less then 2.1.1 have | |
Having vulnarability PVE-2017-47604 Advisory: Typesafe-conductr-cli 0.58 secures bundle and bundle configuration files.
https://github.com/typesafehub/conductr-cli/pull/161/commits/2732f66d575772213af809aa17fb2214d62dc678 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does typesafe-conductr-cli version less then 0.58 have ### Response: Having vulnarability PVE-2017-47604 Advisory: Typesafe-conductr-cli 0.58 secures bundle and bundle configuration files.
https://github.com/typesafehub/conductr-cli/pull/161/commits/2732f66d575772213af809aa17fb2214d62dc678 | what vulnarability does typesafe-conductr-cli version less then 0.58 have | |
Having vulnarability PVE-2021-38798 Advisory: Typesense 0.13.0 allows one to generate API keys with fine-grained access control restrictions for better security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does typesense version less then 0.13.0 have ### Response: Having vulnarability PVE-2021-38798 Advisory: Typesense 0.13.0 allows one to generate API keys with fine-grained access control restrictions for better security. | what vulnarability does typesense version less then 0.13.0 have | |
Having vulnarability PVE-2022-51672 Advisory: Typestring is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does typestring version greather then 0 have ### Response: Having vulnarability PVE-2022-51672 Advisory: Typestring is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does typestring version greather then 0 have | |
Having vulnarability PVE-2022-51671 Advisory: Typesutil is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does typesutil version greather then 0 have ### Response: Having vulnarability PVE-2022-51671 Advisory: Typesutil is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does typesutil version greather then 0 have | |
Having vulnarability PVE-2024-99835 Advisory: Certain versions of ua_parser, a Python library for parsing browser user agents, are susceptible to arbitrary code execution attacks due to the use of the insecure YAML.load() function. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ua-parser version greather then equal to 0,less then 0.5.1 have ### Response: Having vulnarability PVE-2024-99835 Advisory: Certain versions of ua_parser, a Python library for parsing browser user agents, are susceptible to arbitrary code execution attacks due to the use of the insecure YAML.load() function. | what vulnarability does ua-parser version greather then equal to 0,less then 0.5.1 have | |
Having vulnarability CVE-2022-4572 Advisory: A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 can address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ubi-reader version greather then equal to 0,less then 0.8.5 have ### Response: Having vulnarability CVE-2022-4572 Advisory: A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 can address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability. | what vulnarability does ubi-reader version greather then equal to 0,less then 0.8.5 have | |
Having vulnarability PVE-2023-59607 Advisory: Udata 1.3.7 includes a fix for a Race Condition vulnerability.
https://github.com/opendatateam/udata/pull/1606 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does udata version less then 1.3.7 have ### Response: Having vulnarability PVE-2023-59607 Advisory: Udata 1.3.7 includes a fix for a Race Condition vulnerability.
https://github.com/opendatateam/udata/pull/1606 | what vulnarability does udata version less then 1.3.7 have | |
Having vulnarability PVE-2021-42173 Advisory: Udata-front version 1.1.0 unsets .vue delimiters used in HTML templates to prevent injections.
https://github.com/etalab/udata-front/pull/11 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does udata-front version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-42173 Advisory: Udata-front version 1.1.0 unsets .vue delimiters used in HTML templates to prevent injections.
https://github.com/etalab/udata-front/pull/11 | what vulnarability does udata-front version less then 1.1.0 have | |
Having vulnarability PVE-2021-37200 Advisory: Ugoira 0.5.0 uses secure protocol (HTTPS) instead of naive (HTTP). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ugoira version less then 0.5.0 have ### Response: Having vulnarability PVE-2021-37200 Advisory: Ugoira 0.5.0 uses secure protocol (HTTPS) instead of naive (HTTP). | what vulnarability does ugoira version less then 0.5.0 have | |
Having vulnarability CVE-2021-45931 Advisory: HarfBuzz 2.9.0 has an out-of-bounds write in hb_bit_set_invertible_t::set (called from hb_sparseset_t<hb_bit_set_invertible_t>::set and hb_set_copy). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does uharfbuzz version equal to 2.9.0 have ### Response: Having vulnarability CVE-2021-45931 Advisory: HarfBuzz 2.9.0 has an out-of-bounds write in hb_bit_set_invertible_t::set (called from hb_sparseset_t<hb_bit_set_invertible_t>::set and hb_set_copy). | what vulnarability does uharfbuzz version equal to 2.9.0 have | |
Having vulnarability PVE-2021-41029 Advisory: Uiautomator2 2.13.2 updates its dependency 'atx-agent' to v0.9.6 to include a security fix.
https://github.com/openatx/uiautomator2/commit/858b4aa48bc63c4000364c0665d82823b641d4dd | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does uiautomator2 version less then 2.13.2 have ### Response: Having vulnarability PVE-2021-41029 Advisory: Uiautomator2 2.13.2 updates its dependency 'atx-agent' to v0.9.6 to include a security fix.
https://github.com/openatx/uiautomator2/commit/858b4aa48bc63c4000364c0665d82823b641d4dd | what vulnarability does uiautomator2 version less then 2.13.2 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.