output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2022-31116 Advisory: Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters.
https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ujson version less then 5.4.0 have ### Response: Having vulnarability CVE-2022-31116 Advisory: Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters.
https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r | what vulnarability does ujson version less then 5.4.0 have | |
Having vulnarability PVE-2024-64065 Advisory: Ultralytics version 8.0.5 implements a security update that addresses two significant vulnerabilities: command injection and path traversal. If exploited, it could allow unauthorized execution of arbitrary commands and unauthorized access to files on the server.
https://github.com/ultralytics/ultralytics/pull/888/files | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ultralytics version less then 8.0.5 have ### Response: Having vulnarability PVE-2024-64065 Advisory: Ultralytics version 8.0.5 implements a security update that addresses two significant vulnerabilities: command injection and path traversal. If exploited, it could allow unauthorized execution of arbitrary commands and unauthorized access to files on the server.
https://github.com/ultralytics/ultralytics/pull/888/files | what vulnarability does ultralytics version less then 8.0.5 have | |
Having vulnarability CVE-2022-0845 Advisory: Unbabel-comet 1.1.0 updates its dependency 'pytorch-lightning' to v1.6.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unbabel-comet version less then 1.1.0 have ### Response: Having vulnarability CVE-2022-0845 Advisory: Unbabel-comet 1.1.0 updates its dependency 'pytorch-lightning' to v1.6.0 to include security fixes. | what vulnarability does unbabel-comet version less then 1.1.0 have | |
Having vulnarability PVE-2023-61901 Advisory: Unearth 0.11.2 includes a security fix: Validate the package name extracted from the part before the last hyphen.
https://github.com/frostming/unearth/pull/77 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unearth version less then 0.11.2 have ### Response: Having vulnarability PVE-2023-61901 Advisory: Unearth 0.11.2 includes a security fix: Validate the package name extracted from the part before the last hyphen.
https://github.com/frostming/unearth/pull/77 | what vulnarability does unearth version less then 0.11.2 have | |
Having vulnarability CVE-2021-35042 Advisory: Unicef-locations 3.1 allows as dependency an insecure version of Django. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unicef-locations version less then equal to 3.1 have ### Response: Having vulnarability CVE-2021-35042 Advisory: Unicef-locations 3.1 allows as dependency an insecure version of Django. | what vulnarability does unicef-locations version less then equal to 3.1 have | |
Having vulnarability CVE-2017-18342 Advisory: Unicef-rest-export 0.5.2 updates its dependency 'Pyyaml' to v5.1 to include a security patch. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unicef-rest-export version less then 0.5.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Unicef-rest-export 0.5.2 updates its dependency 'Pyyaml' to v5.1 to include a security patch. | what vulnarability does unicef-rest-export version less then 0.5.2 have | |
Having vulnarability PVE-2021-43424 Advisory: Unicms 0.30.2 includes a fix for a XSS vulnerability.
https://github.com/UniversitaDellaCalabria/uniCMS/commit/05476a93ecd3e3c2511077629ec5da7d6c07d2bf | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unicms version less then 0.30.2 have ### Response: Having vulnarability PVE-2021-43424 Advisory: Unicms 0.30.2 includes a fix for a XSS vulnerability.
https://github.com/UniversitaDellaCalabria/uniCMS/commit/05476a93ecd3e3c2511077629ec5da7d6c07d2bf | what vulnarability does unicms version less then 0.30.2 have | |
Having vulnarability CVE-2022-29693 Advisory: Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unicorn version less then 2.0.0 have ### Response: Having vulnarability CVE-2022-29693 Advisory: Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c. | what vulnarability does unicorn version less then 2.0.0 have | |
Having vulnarability CVE-2021-34141 Advisory: Uniplot version 0.8.1 updates its numpy dependency to version 1.22.0 or later, responding to CVE-2021-34141.
https://github.com/olavolav/uniplot/commit/bd978d09a9b637e8a8bbd90d0cbb2a951b66e5b1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does uniplot version less then 0.8.1 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Uniplot version 0.8.1 updates its numpy dependency to version 1.22.0 or later, responding to CVE-2021-34141.
https://github.com/olavolav/uniplot/commit/bd978d09a9b637e8a8bbd90d0cbb2a951b66e5b1 | what vulnarability does uniplot version less then 0.8.1 have | |
Having vulnarability PVE-2023-62179 Advisory: Unixgpt 0.1.6 includes mitigation to avoid prompt injections.
https://github.com/jamino30/unixgpt/issues/2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unixgpt version less then 0.1.6 have ### Response: Having vulnarability PVE-2023-62179 Advisory: Unixgpt 0.1.6 includes mitigation to avoid prompt injections.
https://github.com/jamino30/unixgpt/issues/2 | what vulnarability does unixgpt version less then 0.1.6 have | |
Having vulnarability CVE-2018-18074 Advisory: Unleashclient 1.0.2 updates its dependency 'requests' to address a security issue. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unleashclient version less then 1.0.2 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Unleashclient 1.0.2 updates its dependency 'requests' to address a security issue. | what vulnarability does unleashclient version less then 1.0.2 have | |
Having vulnarability PVE-2022-48405 Advisory: Unmanic 0.2.2 updates front-end dependencies to include security fixes.
https://github.com/Unmanic/unmanic/commit/2faf7cf79edc77df116df48dbe49c10eb04474b6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unmanic version less then 0.2.2 have ### Response: Having vulnarability PVE-2022-48405 Advisory: Unmanic 0.2.2 updates front-end dependencies to include security fixes.
https://github.com/Unmanic/unmanic/commit/2faf7cf79edc77df116df48dbe49c10eb04474b6 | what vulnarability does unmanic version less then 0.2.2 have | |
Having vulnarability CVE-2019-17400 Advisory: The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does unoconv version greather then equal to 0,less then 0.9.0 have ### Response: Having vulnarability CVE-2019-17400 Advisory: The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion. | what vulnarability does unoconv version greather then equal to 0,less then 0.9.0 have | |
Having vulnarability PVE-2022-49720 Advisory: Untangle 1.2.0 prevents XXE attacks by disabling feature_external_ges.
https://github.com/stchris/untangle/commit/5c7b7ad87cae6f5f77e55e0948435be0cf80769c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does untangle version less then 1.2.0 have ### Response: Having vulnarability PVE-2022-49720 Advisory: Untangle 1.2.0 prevents XXE attacks by disabling feature_external_ges.
https://github.com/stchris/untangle/commit/5c7b7ad87cae6f5f77e55e0948435be0cf80769c | what vulnarability does untangle version less then 1.2.0 have | |
Having vulnarability CVE-2024-21503 Advisory: Up42-py version 0.37.2 updates its dependency on the black library, upgrading from version 22.12.0 to 24.3.0. This update addresses the security vulnerability identified in CVE-2024-21503. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does up42-py version less then 0.37.2 have ### Response: Having vulnarability CVE-2024-21503 Advisory: Up42-py version 0.37.2 updates its dependency on the black library, upgrading from version 22.12.0 to 24.3.0. This update addresses the security vulnerability identified in CVE-2024-21503. | what vulnarability does up42-py version less then 0.37.2 have | |
Having vulnarability PVE-2023-52920 Advisory: Upamonkws is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does upamonkws version greather then 0 have ### Response: Having vulnarability PVE-2023-52920 Advisory: Upamonkws is a malicious package. It delivers the W4SP Stealer Malware to your system.
https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html | what vulnarability does upamonkws version greather then 0 have | |
Having vulnarability CVE-2023-48051 Advisory: An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive information via weak encryption padding. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does upydev version greather then equal to 0,less then equal to 0.4.3 have ### Response: Having vulnarability CVE-2023-48051 Advisory: An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive information via weak encryption padding. | what vulnarability does upydev version greather then equal to 0,less then equal to 0.4.3 have | |
Having vulnarability CVE-2017-18342 Advisory: Urbansim 3.2 includes a security patch for the function 'from_yaml' in 'urbansim/utils/networks.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/UDST/urbansim/commit/44ca1d47e50fc9d6e12048329a6ff8907fbbf381 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does urbansim version less then 3.2 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Urbansim 3.2 includes a security patch for the function 'from_yaml' in 'urbansim/utils/networks.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/UDST/urbansim/commit/44ca1d47e50fc9d6e12048329a6ff8907fbbf381 | what vulnarability does urbansim version less then 3.2 have | |
Having vulnarability CVE-2022-21195 Advisory: All versions of package url-regex are vulnerable to Regular Expression Denial of Service (ReDoS) which can cause the CPU usage to crash. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does url-regex version greather then 0 have ### Response: Having vulnarability CVE-2022-21195 Advisory: All versions of package url-regex are vulnerable to Regular Expression Denial of Service (ReDoS) which can cause the CPU usage to crash. | what vulnarability does url-regex version greather then 0 have | |
Having vulnarability CVE-2022-31255 Advisory: Urlgrabber 4.0.0 includes a fix for CVE-2022-31255: An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to read files available to the user running the process, typically tomcat. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does urlgrabber version greather then equal to 3.3.2,less then equal to 3.10.2 have ### Response: Having vulnarability CVE-2022-31255 Advisory: Urlgrabber 4.0.0 includes a fix for CVE-2022-31255: An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to read files available to the user running the process, typically tomcat. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10. | what vulnarability does urlgrabber version greather then equal to 3.3.2,less then equal to 3.10.2 have | |
Having vulnarability PVE-2021-34986 Advisory: urlib3 is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does urlib3 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34986 Advisory: urlib3 is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | what vulnarability does urlib3 version greather then 0,less then 0 have | |
Having vulnarability PVE-2021-34987 Advisory: urllib is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does urllib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34987 Advisory: urllib is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | what vulnarability does urllib version greather then 0,less then 0 have | |
Having vulnarability CVE-2018-20060 Advisory: urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does urllib3 version less then 1.23 have ### Response: Having vulnarability CVE-2018-20060 Advisory: urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. | what vulnarability does urllib3 version less then 1.23 have | |
Having vulnarability CVE-2023-45803 Advisory: Urllib3-future 2.1.902 includes a fix for CVE-2023-45803: Urllib3's request body not stripped after redirect from 303 status changes request method to GET. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does urllib3-future version less then 2.1.902 have ### Response: Having vulnarability CVE-2023-45803 Advisory: Urllib3-future 2.1.902 includes a fix for CVE-2023-45803: Urllib3's request body not stripped after redirect from 303 status changes request method to GET. | what vulnarability does urllib3-future version less then 2.1.902 have | |
Having vulnarability PVE-2022-51761 Advisory: Urlllib is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does urlllib version greather then 0 have ### Response: Having vulnarability PVE-2022-51761 Advisory: Urlllib is a malicious package. It injects obfuscated JS code that replaces crypto addresses in developer clipboards. | what vulnarability does urlllib version greather then 0 have | |
Having vulnarability CVE-2020-7694 Advisory: The request logger provided by Uvicorn prior to version 0.11.7 is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file). See: CVE-2020-7694. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does uvicorn version less then 0.11.7 have ### Response: Having vulnarability CVE-2020-7694 Advisory: The request logger provided by Uvicorn prior to version 0.11.7 is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file). See: CVE-2020-7694. | what vulnarability does uvicorn version less then 0.11.7 have | |
Having vulnarability PVE-2021-34418 Advisory: Uwsgi 1.9.9 reduces security problems caused by wrong configurations by making the router_basicauth plugin return "break" instead of "next" if authorization fails. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does uwsgi version less then 1.9.9 have ### Response: Having vulnarability PVE-2021-34418 Advisory: Uwsgi 1.9.9 reduces security problems caused by wrong configurations by making the router_basicauth plugin return "break" instead of "next" if authorization fails. | what vulnarability does uwsgi version less then 1.9.9 have | |
Having vulnarability CVE-2023-44487 Advisory: The gRPC dependency in V3io-frames has been upgraded from version 1.20.0 to version 1.56.3 in the 0.10.11 update, in response to CVE-2023-44487.
https://github.com/v3io/frames/pull/662/commits/ce9e5d4b0040ba7887feb7e8b1307c0af6b5cfb3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does v3io-frames version less then 0.10.11 have ### Response: Having vulnarability CVE-2023-44487 Advisory: The gRPC dependency in V3io-frames has been upgraded from version 1.20.0 to version 1.56.3 in the 0.10.11 update, in response to CVE-2023-44487.
https://github.com/v3io/frames/pull/662/commits/ce9e5d4b0040ba7887feb7e8b1307c0af6b5cfb3 | what vulnarability does v3io-frames version less then 0.10.11 have | |
Having vulnarability CVE-2019-12408 Advisory: V3iofs 0.1.18 upgrades its PyArrow dependency to versions greater than 14.0.1 but less than 15, in response to the security vulnerability CVE-2019-12408. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does v3iofs version less then 0.1.18 have ### Response: Having vulnarability CVE-2019-12408 Advisory: V3iofs 0.1.18 upgrades its PyArrow dependency to versions greater than 14.0.1 but less than 15, in response to the security vulnerability CVE-2019-12408. | what vulnarability does v3iofs version less then 0.1.18 have | |
Having vulnarability CVE-2023-45813 Advisory: Validators 0.21.0 includes a fix for CVE-2023-45813: Inefficient Regular Expression Complexity in validate_link.
https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
https://github.com/python-validators/validators/pull/243 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does validators version greather then equal to 0.11.0,less then 0.21.0 have ### Response: Having vulnarability CVE-2023-45813 Advisory: Validators 0.21.0 includes a fix for CVE-2023-45813: Inefficient Regular Expression Complexity in validate_link.
https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
https://github.com/python-validators/validators/pull/243 | what vulnarability does validators version greather then equal to 0.11.0,less then 0.21.0 have | |
Having vulnarability CVE-2023-28635 Advisory: vantage6 is privacy preserving federated learning infrastructure. Prior to version 4.0.0, malicious users may try to get access to resources they are not allowed to see, by creating resources with integers as names. One example where this is a risk, is when users define which users are allowed to run algorithms on their node. This may be defined by username or user id. Now, for example, if user id 13 is allowed to run tasks, and an attacker creates a username with username '13', they would be wrongly allowed to run an algorithm. There may also be other places in the code where such a mixup of resource ID or name leads to issues. Version 4.0.0 contains a patch for this issue. The best solution is to check when resources are created or modified, that the resource name always starts with a character. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vantage6 version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-28635 Advisory: vantage6 is privacy preserving federated learning infrastructure. Prior to version 4.0.0, malicious users may try to get access to resources they are not allowed to see, by creating resources with integers as names. One example where this is a risk, is when users define which users are allowed to run algorithms on their node. This may be defined by username or user id. Now, for example, if user id 13 is allowed to run tasks, and an attacker creates a username with username '13', they would be wrongly allowed to run an algorithm. There may also be other places in the code where such a mixup of resource ID or name leads to issues. Version 4.0.0 contains a patch for this issue. The best solution is to check when resources are created or modified, that the resource name always starts with a character. | what vulnarability does vantage6 version less then 4.0.0 have | |
Having vulnarability CVE-2023-41882 Advisory: vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vantage6-client version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-41882 Advisory: vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds. | what vulnarability does vantage6-client version less then 4.0.0 have | |
Having vulnarability CVE-2023-41882 Advisory: vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vantage6-common version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-41882 Advisory: vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds. | what vulnarability does vantage6-common version less then 4.0.0 have | |
Having vulnarability CVE-2023-28635 Advisory: vantage6 is privacy preserving federated learning infrastructure. Prior to version 4.0.0, malicious users may try to get access to resources they are not allowed to see, by creating resources with integers as names. One example where this is a risk, is when users define which users are allowed to run algorithms on their node. This may be defined by username or user id. Now, for example, if user id 13 is allowed to run tasks, and an attacker creates a username with username '13', they would be wrongly allowed to run an algorithm. There may also be other places in the code where such a mixup of resource ID or name leads to issues. Version 4.0.0 contains a patch for this issue. The best solution is to check when resources are created or modified, that the resource name always starts with a character. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vantage6-node version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-28635 Advisory: vantage6 is privacy preserving federated learning infrastructure. Prior to version 4.0.0, malicious users may try to get access to resources they are not allowed to see, by creating resources with integers as names. One example where this is a risk, is when users define which users are allowed to run algorithms on their node. This may be defined by username or user id. Now, for example, if user id 13 is allowed to run tasks, and an attacker creates a username with username '13', they would be wrongly allowed to run an algorithm. There may also be other places in the code where such a mixup of resource ID or name leads to issues. Version 4.0.0 contains a patch for this issue. The best solution is to check when resources are created or modified, that the resource name always starts with a character. | what vulnarability does vantage6-node version less then 4.0.0 have | |
Having vulnarability CVE-2023-41882 Advisory: vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vantage6-server version less then 4.0.0 have ### Response: Having vulnarability CVE-2023-41882 Advisory: vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds. | what vulnarability does vantage6-server version less then 4.0.0 have | |
Having vulnarability CVE-2021-43837 Advisory: Vault-cli 3.0.0 includes a fix for CVE-2021-43837: In versions before 3.0.0 vault-cli features the ability for rendering templated values. When a secret starts with the prefix '!template!', vault-cli interprets the rest of the contents of the secret as a Jinja2 template. Jinja2 is a powerful templating engine and is not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. Users are advised to upgrade as soon as possible. For users unable to upgrade a workaround does exist. Using the environment variable 'VAULT_CLI_RENDER=false' or the flag '--no-render' (placed between 'vault-cli' and the subcommand, e.g. 'vault-cli --no-render get-all') or adding 'render: false' to the vault-cli configuration yaml file disables rendering and removes the vulnerability. Using the python library, you can use: 'vault_cli.get_client(render=False)' when creating your client to get a client that will not render templated secrets and thus operates securely.
https://github.com/peopledoc/vault-cli/security/advisories/GHSA-q34h-97wf-8r8j | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vault-cli version greather then equal to 0.7.0,less then 3.0.0 have ### Response: Having vulnarability CVE-2021-43837 Advisory: Vault-cli 3.0.0 includes a fix for CVE-2021-43837: In versions before 3.0.0 vault-cli features the ability for rendering templated values. When a secret starts with the prefix '!template!', vault-cli interprets the rest of the contents of the secret as a Jinja2 template. Jinja2 is a powerful templating engine and is not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. Users are advised to upgrade as soon as possible. For users unable to upgrade a workaround does exist. Using the environment variable 'VAULT_CLI_RENDER=false' or the flag '--no-render' (placed between 'vault-cli' and the subcommand, e.g. 'vault-cli --no-render get-all') or adding 'render: false' to the vault-cli configuration yaml file disables rendering and removes the vulnerability. Using the python library, you can use: 'vault_cli.get_client(render=False)' when creating your client to get a client that will not render templated secrets and thus operates securely.
https://github.com/peopledoc/vault-cli/security/advisories/GHSA-q34h-97wf-8r8j | what vulnarability does vault-cli version greather then equal to 0.7.0,less then 3.0.0 have | |
Having vulnarability CVE-2023-23931 Advisory: Vcert 0.16.0 updates its dependency 'cryptography' to v40.0.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vcert version less then 0.16.0 have ### Response: Having vulnarability CVE-2023-23931 Advisory: Vcert 0.16.0 updates its dependency 'cryptography' to v40.0.2 to include a security fix. | what vulnarability does vcert version less then 0.16.0 have | |
Having vulnarability CVE-2022-21187 Advisory: Vcspull 1.11.1 updates its dependency 'libvcs' to v0.11.1 to fix a command injection vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vcspull version less then 1.11.1 have ### Response: Having vulnarability CVE-2022-21187 Advisory: Vcspull 1.11.1 updates its dependency 'libvcs' to v0.11.1 to fix a command injection vulnerability. | what vulnarability does vcspull version less then 1.11.1 have | |
Having vulnarability CVE-2021-44228 Advisory: Venafi-vcert-gitlab-integration 2.1.0 updates its dependency 'VCert' to include a fix for log4j vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does venafi-vcert-gitlab-integration version less then 2.1.0 have ### Response: Having vulnarability CVE-2021-44228 Advisory: Venafi-vcert-gitlab-integration 2.1.0 updates its dependency 'VCert' to include a fix for log4j vulnerability. | what vulnarability does venafi-vcert-gitlab-integration version less then 2.1.0 have | |
Having vulnarability PVE-2024-63279 Advisory: Vendi 0.1.2 updates its dependency, wandb, to version 0.15.8 or higher to address known security issues that were present in older versions of wandb.
https://github.com/vendi-ai/declarai/pull/53/commits/3c0cd3d240b69d665a45fee02c060ce3b4ff99e3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vendi version less then 0.1.2 have ### Response: Having vulnarability PVE-2024-63279 Advisory: Vendi 0.1.2 updates its dependency, wandb, to version 0.15.8 or higher to address known security issues that were present in older versions of wandb.
https://github.com/vendi-ai/declarai/pull/53/commits/3c0cd3d240b69d665a45fee02c060ce3b4ff99e3 | what vulnarability does vendi version less then 0.1.2 have | |
Having vulnarability PVE-2024-67588 Advisory: Verbs 0.4.1 has updated its h2 library from version 0.3.25 to 0.3.26 to address a security concern related to Denial of Service (DoS) vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does verbs version less then 0.4.1 have ### Response: Having vulnarability PVE-2024-67588 Advisory: Verbs 0.4.1 has updated its h2 library from version 0.3.25 to 0.3.26 to address a security concern related to Denial of Service (DoS) vulnerabilities. | what vulnarability does verbs version less then 0.4.1 have | |
Having vulnarability CVE-2017-18342 Advisory: Verifone 0.1.8 updates its dependecy 'pyyaml' to v4.2b1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does verifone version less then 0.1.8 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Verifone 0.1.8 updates its dependecy 'pyyaml' to v4.2b1 to include a security fix. | what vulnarability does verifone version less then 0.1.8 have | |
Having vulnarability PVE-2021-38033 Advisory: Vermin 0.10.1 fixes the security advisory by upgrading bleach from 3.1.0 to 3.1.1. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vermin version less then 0.10.1 have ### Response: Having vulnarability PVE-2021-38033 Advisory: Vermin 0.10.1 fixes the security advisory by upgrading bleach from 3.1.0 to 3.1.1. | what vulnarability does vermin version less then 0.10.1 have | |
Having vulnarability CVE-2022-30595 Advisory: Vhcalc 0.2.4 updates its dependency 'pillow' to v9.1.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vhcalc version less then 0.2.4 have ### Response: Having vulnarability CVE-2022-30595 Advisory: Vhcalc 0.2.4 updates its dependency 'pillow' to v9.1.1 to include a security fix. | what vulnarability does vhcalc version less then 0.2.4 have | |
Having vulnarability PVE-2024-64508 Advisory: Videomass is affected by a Improper Privilege Management vulnerability in Preset Manager. This behavior could have been harmful if a user logged in with administrator privileges ran the program during the automatic update task to the new version of local presets.
https://github.com/jeanslack/Videomass/pull/258/commits/918539f5e6966c42691d7aaf7f6a057d9dc27b5b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does videomass version less then 5.0.4 have ### Response: Having vulnarability PVE-2024-64508 Advisory: Videomass is affected by a Improper Privilege Management vulnerability in Preset Manager. This behavior could have been harmful if a user logged in with administrator privileges ran the program during the automatic update task to the new version of local presets.
https://github.com/jeanslack/Videomass/pull/258/commits/918539f5e6966c42691d7aaf7f6a057d9dc27b5b | what vulnarability does videomass version less then 5.0.4 have | |
Having vulnarability PVE-2021-39346 Advisory: Vineyard 0.1.2 avoids DoS that could occur if being attacked by an invalid client.
https://github.com/v6d-io/v6d/pull/64/commits/31a7083d4f6dc42896e1acf4bf0ab69eb6c4bf8c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vineyard version less then 0.1.2 have ### Response: Having vulnarability PVE-2021-39346 Advisory: Vineyard 0.1.2 avoids DoS that could occur if being attacked by an invalid client.
https://github.com/v6d-io/v6d/pull/64/commits/31a7083d4f6dc42896e1acf4bf0ab69eb6c4bf8c | what vulnarability does vineyard version less then 0.1.2 have | |
Having vulnarability CVE-2018-15560 Advisory: Vips-hash 0.2.0 updates its dependency 'pycryptodome' requirement to '>=3.6.6,<4' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vips-hash version less then 0.2.0 have ### Response: Having vulnarability CVE-2018-15560 Advisory: Vips-hash 0.2.0 updates its dependency 'pycryptodome' requirement to '>=3.6.6,<4' to include a security fix. | what vulnarability does vips-hash version less then 0.2.0 have | |
Having vulnarability CVE-2021-33503 Advisory: Virl2-client 2.2.1post2 updates its dependency 'urllib3' to v1.26.7 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does virl2-client version less then 2.2.1post2 have ### Response: Having vulnarability CVE-2021-33503 Advisory: Virl2-client 2.2.1post2 updates its dependency 'urllib3' to v1.26.7 to include a security fix. | what vulnarability does virl2-client version less then 2.2.1post2 have | |
Having vulnarability PVE-2021-42692 Advisory: Virtool-core 0.4.0 updates its dependency 'aiohttp' to v3.8.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does virtool-core version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-42692 Advisory: Virtool-core 0.4.0 updates its dependency 'aiohttp' to v3.8.1 to include a security fix. | what vulnarability does virtool-core version less then 0.4.0 have | |
Having vulnarability CVE-2022-44020 Advisory: Virtualbmc 3.0.0 includes a fix for CVE-2022-44020: An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain.
NOTE: this only affects an "unsupported, production-like configuration." | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does virtualbmc version less then equal to 2.2.2 have ### Response: Having vulnarability CVE-2022-44020 Advisory: Virtualbmc 3.0.0 includes a fix for CVE-2022-44020: An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain.
NOTE: this only affects an "unsupported, production-like configuration." | what vulnarability does virtualbmc version less then equal to 2.2.2 have | |
Having vulnarability CVE-2011-4617 Advisory: virtualenv.py in virtualenv before 1.5 allows local users to overwrite arbitrary files via a symlink attack on a certain file in /tmp/. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does virtualenv version less then 1.5 have ### Response: Having vulnarability CVE-2011-4617 Advisory: virtualenv.py in virtualenv before 1.5 allows local users to overwrite arbitrary files via a symlink attack on a certain file in /tmp/. | what vulnarability does virtualenv version less then 1.5 have | |
Having vulnarability PVE-2022-45438 Advisory: Virtualnv is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does virtualnv version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45438 Advisory: Virtualnv is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does virtualnv version greather then 0,less then 0 have | |
Having vulnarability CVE-2019-11236 Advisory: Virustotal-python 0.0.3 updates its dependency 'urllib3' to v1.24.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does virustotal-python version less then 0.0.3 have ### Response: Having vulnarability CVE-2019-11236 Advisory: Virustotal-python 0.0.3 updates its dependency 'urllib3' to v1.24.2 to include a security fix. | what vulnarability does virustotal-python version less then 0.0.3 have | |
Having vulnarability CVE-2017-18342 Advisory: Viscid version 1.0.0 includes a security patch for the function 'plot_opts_to_kwargs' in 'viscid/plot/vpyplot.py'. It uses the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/viscid-hub/Viscid/commit/892052a5c12aa7aa865de277945c55defcc7e9f7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does viscid version less then 1.0.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Viscid version 1.0.0 includes a security patch for the function 'plot_opts_to_kwargs' in 'viscid/plot/vpyplot.py'. It uses the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/viscid-hub/Viscid/commit/892052a5c12aa7aa865de277945c55defcc7e9f7 | what vulnarability does viscid version less then 1.0.0 have | |
Having vulnarability PVE-2021-38871 Advisory: For security reasons, `.py` loader moved out of VisiData core version 2.-2 and into snippets. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does visidata version less then 2.-2 have ### Response: Having vulnarability PVE-2021-38871 Advisory: For security reasons, `.py` loader moved out of VisiData core version 2.-2 and into snippets. | what vulnarability does visidata version less then 2.-2 have | |
Having vulnarability PVE-2023-62405 Advisory: Visyn-core 6.0.0 includes a fix for a CSV injection vulnerability.
https://github.com/datavisyn/visyn_core/pull/108 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does visyn-core version less then 6.0.0 have ### Response: Having vulnarability PVE-2023-62405 Advisory: Visyn-core 6.0.0 includes a fix for a CSV injection vulnerability.
https://github.com/datavisyn/visyn_core/pull/108 | what vulnarability does visyn-core version less then 6.0.0 have | |
Having vulnarability PVE-2023-55057 Advisory: Viur-core 3.4.0rc1 includes an authorization bypass vulnerability: Logins via Google or other custom login handlers were able to authenticate users disabled by the system.
https://github.com/viur-framework/viur-core/pull/710 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does viur-core version less then 3.4.0rc1 have ### Response: Having vulnarability PVE-2023-55057 Advisory: Viur-core 3.4.0rc1 includes an authorization bypass vulnerability: Logins via Google or other custom login handlers were able to authenticate users disabled by the system.
https://github.com/viur-framework/viur-core/pull/710 | what vulnarability does viur-core version less then 3.4.0rc1 have | |
Having vulnarability PVE-2024-70374 Advisory: Vizable version 0.12.0 addresses a security issue by updating the `idna` package from version 3.6 to 3.7. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vizable version less then 0.12.0 have ### Response: Having vulnarability PVE-2024-70374 Advisory: Vizable version 0.12.0 addresses a security issue by updating the `idna` package from version 3.6 to 3.7. | what vulnarability does vizable version less then 0.12.0 have | |
Having vulnarability PVE-2023-61416 Advisory: Vizro 0.1.4 updates 'pydantic' requirement to '>=1.10.13, <2' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vizro version less then 0.1.4 have ### Response: Having vulnarability PVE-2023-61416 Advisory: Vizro 0.1.4 updates 'pydantic' requirement to '>=1.10.13, <2' to include a security fix. | what vulnarability does vizro version less then 0.1.4 have | |
Having vulnarability PVE-2023-61866 Advisory: Vllm 0.2.1 includes a security fix: Vulnerable memory modification to GPU shared memory.
https://github.com/vllm-project/vllm/pull/1241 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vllm version less then 0.2.1 have ### Response: Having vulnarability PVE-2023-61866 Advisory: Vllm 0.2.1 includes a security fix: Vulnerable memory modification to GPU shared memory.
https://github.com/vllm-project/vllm/pull/1241 | what vulnarability does vllm version less then 0.2.1 have | |
Having vulnarability CVE-2023-40590 Advisory: Vmware-aria-operations-integration-sdk 1.0.1 updates it dependency 'gitpython' to v3.1.34 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vmware-aria-operations-integration-sdk version less then 1.0.1 have ### Response: Having vulnarability CVE-2023-40590 Advisory: Vmware-aria-operations-integration-sdk 1.0.1 updates it dependency 'gitpython' to v3.1.34 to include a security fix. | what vulnarability does vmware-aria-operations-integration-sdk version less then 1.0.1 have | |
Having vulnarability CVE-2022-36436 Advisory: Vncauthproxy 1.2.0 includes a fix for CVE-2022-36436: Authentication bypass in RFB security handshake.
https://github.com/osuosl/twisted_vncauthproxy/pull/1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vncauthproxy version less then 1.2.0 have ### Response: Having vulnarability CVE-2022-36436 Advisory: Vncauthproxy 1.2.0 includes a fix for CVE-2022-36436: Authentication bypass in RFB security handshake.
https://github.com/osuosl/twisted_vncauthproxy/pull/1 | what vulnarability does vncauthproxy version less then 1.2.0 have | |
Having vulnarability PVE-2021-26173 Advisory: Vnccollab.theme before 1.5.2 has an undisclosed vulnerability in VNC Zimlet. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vnccollab-theme version less then 1.5.2 have ### Response: Having vulnarability PVE-2021-26173 Advisory: Vnccollab.theme before 1.5.2 has an undisclosed vulnerability in VNC Zimlet. | what vulnarability does vnccollab-theme version less then 1.5.2 have | |
Having vulnarability PVE-2024-68086 Advisory: This vulnerability involves a theoretical privilege escalation issue within the PyJWT library due to the way client-supplied JSON Web Tokens (JWTs) are verified against an allow-list of known algorithms, effectively preventing the use of invalid algorithms. The issue is rooted in the potential for manipulating JWTs by exploiting the `alg` header field, which specifies the algorithm used for the token's cryptographic signature. Despite the potential risk for privilege escalation, which could allow attackers to impersonate any client without detection, the vulnerability is deemed non-exploitable as PyJWT does not support the use of substrings of "HS256" as valid algorithms. Consequently, no specific mitigation actions are required, but caution is advised when updating PyJWT to ensure that only acceptable algorithms are specified and used. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vng-api-common version less then equal to 2.0.5 have ### Response: Having vulnarability PVE-2024-68086 Advisory: This vulnerability involves a theoretical privilege escalation issue within the PyJWT library due to the way client-supplied JSON Web Tokens (JWTs) are verified against an allow-list of known algorithms, effectively preventing the use of invalid algorithms. The issue is rooted in the potential for manipulating JWTs by exploiting the `alg` header field, which specifies the algorithm used for the token's cryptographic signature. Despite the potential risk for privilege escalation, which could allow attackers to impersonate any client without detection, the vulnerability is deemed non-exploitable as PyJWT does not support the use of substrings of "HS256" as valid algorithms. Consequently, no specific mitigation actions are required, but caution is advised when updating PyJWT to ensure that only acceptable algorithms are specified and used. | what vulnarability does vng-api-common version less then equal to 2.0.5 have | |
Having vulnarability PVE-2024-68087 Advisory: A privilege escalation vulnerability has been detected in versions of the PyJWT library due to how client-supplied JSON Web Tokens (JWTs) are verified. Despite being theoretically possible, this vulnerability is considered non-exploitable because the library uses an explicit allow-list of known algorithms to validate JWTs, automatically rejecting invalid or tampered user-supplied algorithms that could otherwise lead to impersonation attacks. It is important for users to ensure that when updating the PyJWT library, the configuration does not specify any invalid algorithms or those not explicitly intended for use. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vng-api-common-utrecht version less then equal to 1.3.2 have ### Response: Having vulnarability PVE-2024-68087 Advisory: A privilege escalation vulnerability has been detected in versions of the PyJWT library due to how client-supplied JSON Web Tokens (JWTs) are verified. Despite being theoretically possible, this vulnerability is considered non-exploitable because the library uses an explicit allow-list of known algorithms to validate JWTs, automatically rejecting invalid or tampered user-supplied algorithms that could otherwise lead to impersonation attacks. It is important for users to ensure that when updating the PyJWT library, the configuration does not specify any invalid algorithms or those not explicitly intended for use. | what vulnarability does vng-api-common-utrecht version less then equal to 1.3.2 have | |
Having vulnarability PVE-2022-51829 Advisory: Volcengine 1.0.62 updates APIs to prevent injection attacks.
https://github.com/volcengine/volc-sdk-python/commit/7f00052c6687ba31dca771c27b36bda8c676e847 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does volcengine version less then 1.0.62 have ### Response: Having vulnarability PVE-2022-51829 Advisory: Volcengine 1.0.62 updates APIs to prevent injection attacks.
https://github.com/volcengine/volc-sdk-python/commit/7f00052c6687ba31dca771c27b36bda8c676e847 | what vulnarability does volcengine version less then 1.0.62 have | |
Having vulnarability CVE-2022-45199 Advisory: Volumio-buddy 3.0.3 updates its dependency 'pillow' to v9.3.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does volumio-buddy version less then 3.0.3 have ### Response: Having vulnarability CVE-2022-45199 Advisory: Volumio-buddy 3.0.3 updates its dependency 'pillow' to v9.3.0 to include security fixes. | what vulnarability does volumio-buddy version less then 3.0.3 have | |
Having vulnarability PVE-2021-37332 Advisory: Vorta 0.6.21 includes a not further specified, small security improvement. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vorta version less then 0.6.21 have ### Response: Having vulnarability PVE-2021-37332 Advisory: Vorta 0.6.21 includes a not further specified, small security improvement. | what vulnarability does vorta version less then 0.6.21 have | |
Having vulnarability CVE-2022-22815 Advisory: Vpype 1.8.1 updates 'Pillow' to v9.0.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vpype version less then 1.8.1 have ### Response: Having vulnarability CVE-2022-22815 Advisory: Vpype 1.8.1 updates 'Pillow' to v9.0.0 to include security fixes. | what vulnarability does vpype version less then 1.8.1 have | |
Having vulnarability CVE-2017-18342 Advisory: Vresutils version 0.3.1 includes a security patch for the function 'init' in 'vresutils/snakemake.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/FRESNA/vresutils/commit/5d5fbb5d19454042c5bc1c379b4634d1182cfd6a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vresutils version less then 0.3.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Vresutils version 0.3.1 includes a security patch for the function 'init' in 'vresutils/snakemake.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/FRESNA/vresutils/commit/5d5fbb5d19454042c5bc1c379b4634d1182cfd6a | what vulnarability does vresutils version less then 0.3.1 have | |
Having vulnarability CVE-2021-42521 Advisory: Vtk 9.2.5 includes a fix for CVE-2021-42521: There is a NULL pointer dereference vulnerability in VTK before 9.2.5, and it lies in IO/Infovis/vtkXMLTreeReader.cxx. The vendor didn't check the return value of libxml2 API 'xmlDocGetRootElement', and try to dereference it. It is unsafe as the return value can be NULL and that NULL pointer dereference may crash the application.
https://gitlab.kitware.com/vtk/vtk/-/commit/f14698e98877b371b0859df164a232f36bd7c3de | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vtk version less then 9.2.5 have ### Response: Having vulnarability CVE-2021-42521 Advisory: Vtk 9.2.5 includes a fix for CVE-2021-42521: There is a NULL pointer dereference vulnerability in VTK before 9.2.5, and it lies in IO/Infovis/vtkXMLTreeReader.cxx. The vendor didn't check the return value of libxml2 API 'xmlDocGetRootElement', and try to dereference it. It is unsafe as the return value can be NULL and that NULL pointer dereference may crash the application.
https://gitlab.kitware.com/vtk/vtk/-/commit/f14698e98877b371b0859df164a232f36bd7c3de | what vulnarability does vtk version less then 9.2.5 have | |
Having vulnarability PVE-2023-59296 Advisory: Vulcan-sql 0.2.1 includes a fix for a SQL Injection vulnerability.
https://github.com/Canner/vulcan-sql/pull/23
https://github.com/Canner/vulcan-sql/pull/40 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vulcan-sql version less then 0.2.1 have ### Response: Having vulnarability PVE-2023-59296 Advisory: Vulcan-sql 0.2.1 includes a fix for a SQL Injection vulnerability.
https://github.com/Canner/vulcan-sql/pull/23
https://github.com/Canner/vulcan-sql/pull/40 | what vulnarability does vulcan-sql version less then 0.2.1 have | |
Having vulnarability PVE-2022-44834 Advisory: Vulnix 1.3.1 fixes an arbitrary code execution vulnerability in the derivation evaluation.
https://github.com/flyingcircusio/vulnix/commit/cc1195c57c3258b504cac9d69fe86972a22e2c5d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vulnix version less then 1.3.1 have ### Response: Having vulnarability PVE-2022-44834 Advisory: Vulnix 1.3.1 fixes an arbitrary code execution vulnerability in the derivation evaluation.
https://github.com/flyingcircusio/vulnix/commit/cc1195c57c3258b504cac9d69fe86972a22e2c5d | what vulnarability does vulnix version less then 1.3.1 have | |
Having vulnarability PVE-2024-64219 Advisory: Vunnel 0.18.0 fixes a race condition that occurred due to the incremental fetching of the CVE list over an extended period, which could lead to inconsistencies and intermittent failures in the quality gate as the underlying API might change the results during this time.
https://github.com/anchore/vunnel/pull/438/commits/4f973fd80a887b7be4e7848d65cd5063454c3196 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vunnel version less then 0.18.0 have ### Response: Having vulnarability PVE-2024-64219 Advisory: Vunnel 0.18.0 fixes a race condition that occurred due to the incremental fetching of the CVE list over an extended period, which could lead to inconsistencies and intermittent failures in the quality gate as the underlying API might change the results during this time.
https://github.com/anchore/vunnel/pull/438/commits/4f973fd80a887b7be4e7848d65cd5063454c3196 | what vulnarability does vunnel version less then 0.18.0 have | |
Having vulnarability PVE-2021-41012 Advisory: Vyper 0.2.12 includes a security fix: Memory corruption using function calls within arrays.
https://github.com/vyperlang/vyper/security/advisories/GHSA-22wc-c9wj-6q2v | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does vyper version less then 0.2.12 have ### Response: Having vulnarability PVE-2021-41012 Advisory: Vyper 0.2.12 includes a security fix: Memory corruption using function calls within arrays.
https://github.com/vyperlang/vyper/security/advisories/GHSA-22wc-c9wj-6q2v | what vulnarability does vyper version less then 0.2.12 have | |
Having vulnarability PVE-2021-41818 Advisory: Wafer 0.11.0 includes a different markdown renderer for pages and user-generated content to handle better the risk of XSS.
https://github.com/CTPUG/wafer/pull/603 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wafer version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-41818 Advisory: Wafer 0.11.0 includes a different markdown renderer for pages and user-generated content to handle better the risk of XSS.
https://github.com/CTPUG/wafer/pull/603 | what vulnarability does wafer version less then 0.11.0 have | |
Having vulnarability CVE-2021-32681 Advisory: A cross-site scripting vulnerability exists in versions 2.13-2.13.1, versions 2.12-2.12.4, and versions prior to 2.11.8. When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin). Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch). As a workaround, site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wagtail version less then 2.11.8,greather then equal to 2.13rc1,less then equal to 2.13.1,greather then equal to 2.12rc1,less then equal to 2.12.4 have ### Response: Having vulnarability CVE-2021-32681 Advisory: A cross-site scripting vulnerability exists in versions 2.13-2.13.1, versions 2.12-2.12.4, and versions prior to 2.11.8. When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin). Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch). As a workaround, site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`. | what vulnarability does wagtail version less then 2.11.8,greather then equal to 2.13rc1,less then equal to 2.13.1,greather then equal to 2.12rc1,less then equal to 2.12.4 have | |
Having vulnarability PVE-2021-37614 Advisory: Wagtail-2fa 1.1.0 requires the user to enter their password when creating a new token. This is done based on feedback of a security test by an external company. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wagtail-2fa version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-37614 Advisory: Wagtail-2fa 1.1.0 requires the user to enter their password when creating a new token. This is done based on feedback of a security test by an external company. | what vulnarability does wagtail-2fa version less then 1.1.0 have | |
Having vulnarability CVE-2020-13822 Advisory: Wagtail-autocomplete 0.7 updates its NPM dependency 'elliptic' to v6.5.4 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wagtail-autocomplete version less then 0.7 have ### Response: Having vulnarability CVE-2020-13822 Advisory: Wagtail-autocomplete 0.7 updates its NPM dependency 'elliptic' to v6.5.4 to include security fixes. | what vulnarability does wagtail-autocomplete version less then 0.7 have | |
Having vulnarability CVE-2023-4863 Advisory: Waifu2x-ncnn-vulkan-python 1.0.4 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/waifu2x-ncnn-vulkan-python/1.0.4/packages/42/28/a5ed9e1e843732709d07a0e1c8d50a71a1933a923883905aa4d11191b297/waifu2x-ncnn-vulkan-python-1.0.4.tar.gz/waifu2x-ncnn-vulkan-python-1.0.4/waifu2x_ncnn_vulkan_python/waifu2x-ncnn-vulkan/src/libwebp/ChangeLog | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does waifu2x-ncnn-vulkan-python version less then equal to 1.0.4 have ### Response: Having vulnarability CVE-2023-4863 Advisory: Waifu2x-ncnn-vulkan-python 1.0.4 and prior releases ship with a version of C library 'libwebp' which is affected by a high risk vulnerability.
https://inspector.pypi.io/project/waifu2x-ncnn-vulkan-python/1.0.4/packages/42/28/a5ed9e1e843732709d07a0e1c8d50a71a1933a923883905aa4d11191b297/waifu2x-ncnn-vulkan-python-1.0.4.tar.gz/waifu2x-ncnn-vulkan-python-1.0.4/waifu2x_ncnn_vulkan_python/waifu2x-ncnn-vulkan/src/libwebp/ChangeLog | what vulnarability does waifu2x-ncnn-vulkan-python version less then equal to 1.0.4 have | |
Having vulnarability PVE-2021-36764 Advisory: Waitress 0.9.0 checks for line feed/carriage to prevent HTTP Response Splitting attacks in the status line or the key of a header.
https://github.com/Pylons/waitress/pull/124
https://github.com/Pylons/waitress/issues/122 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does waitress version less then 0.9.0 have ### Response: Having vulnarability PVE-2021-36764 Advisory: Waitress 0.9.0 checks for line feed/carriage to prevent HTTP Response Splitting attacks in the status line or the key of a header.
https://github.com/Pylons/waitress/pull/124
https://github.com/Pylons/waitress/issues/122 | what vulnarability does waitress version less then 0.9.0 have | |
Having vulnarability PVE-2023-55020 Advisory: Wallycore 0.8.9 updates its C dependency 'libsecp256k1' to fix a potential timing leak when compiling with clang v14 or later.
https://github.com/BlockstreamResearch/secp256k1-zkp/compare/71a206fa5bbcbba5792fc6f9eb7e07c69555f2df...6ec1ff6040164cbc3fafb665e28449870e6a9113 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wallycore version less then 0.8.9 have ### Response: Having vulnarability PVE-2023-55020 Advisory: Wallycore 0.8.9 updates its C dependency 'libsecp256k1' to fix a potential timing leak when compiling with clang v14 or later.
https://github.com/BlockstreamResearch/secp256k1-zkp/compare/71a206fa5bbcbba5792fc6f9eb7e07c69555f2df...6ec1ff6040164cbc3fafb665e28449870e6a9113 | what vulnarability does wallycore version less then 0.8.9 have | |
Having vulnarability PVE-2022-47988 Advisory: Wandb 0.12.12 fixes an unsafe temporary file creation vulnerability.
https://github.com/wandb/client/pull/3360 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wandb version less then 0.12.12 have ### Response: Having vulnarability PVE-2022-47988 Advisory: Wandb 0.12.12 fixes an unsafe temporary file creation vulnerability.
https://github.com/wandb/client/pull/3360 | what vulnarability does wandb version less then 0.12.12 have | |
Having vulnarability PVE-2021-39213 Advisory: Warfit-learn 0.2 includes minor security improvements for dependencies. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does warfit-learn version less then 0.2 have ### Response: Having vulnarability PVE-2021-39213 Advisory: Warfit-learn 0.2 includes minor security improvements for dependencies. | what vulnarability does warfit-learn version less then 0.2 have | |
Having vulnarability PVE-2021-37044 Advisory: Wasmer 0.1.4 updates 'wasmer-runtime' to v0.2.1, that includes a security fix: the hashing algorithm for caching was made crypto-secure.
https://github.com/wasmerio/wasmer/pull/214 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wasmer version less then 0.1.4 have ### Response: Having vulnarability PVE-2021-37044 Advisory: Wasmer 0.1.4 updates 'wasmer-runtime' to v0.2.1, that includes a security fix: the hashing algorithm for caching was made crypto-secure.
https://github.com/wasmerio/wasmer/pull/214 | what vulnarability does wasmer version less then 0.1.4 have | |
Having vulnarability CVE-2021-32629 Advisory: Wasmtime 0.27.0 (Python bindings) downloads a new precompiled version of Wastime core that includes security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wasmtime version less then 0.27.0 have ### Response: Having vulnarability CVE-2021-32629 Advisory: Wasmtime 0.27.0 (Python bindings) downloads a new precompiled version of Wastime core that includes security fixes. | what vulnarability does wasmtime version less then 0.27.0 have | |
Having vulnarability PVE-2021-36948 Advisory: watchmaker 0.14.0 implements additional Salt states to address security scan issues | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does watchmaker version less then 0.14.0 have ### Response: Having vulnarability PVE-2021-36948 Advisory: watchmaker 0.14.0 implements additional Salt states to address security scan issues | what vulnarability does watchmaker version less then 0.14.0 have | |
Having vulnarability PVE-2022-44524 Advisory: Watchui 2.0.1 updates its dependency 'pillow' to v9.0.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does watchui version less then 2.0.1 have ### Response: Having vulnarability PVE-2022-44524 Advisory: Watchui 2.0.1 updates its dependency 'pillow' to v9.0.0 to include security fixes. | what vulnarability does watchui version less then 2.0.1 have | |
Having vulnarability CVE-2022-34056 Advisory: The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does watertools version equal to 0.0.0 have ### Response: Having vulnarability CVE-2022-34056 Advisory: The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does watertools version equal to 0.0.0 have | |
Having vulnarability CVE-2022-33003 Advisory: The watools package in PyPI v0.0.1 to v0.0.8 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does watools version greather then equal to 0.0.1,less then equal to 0.0.8 have ### Response: Having vulnarability CVE-2022-33003 Advisory: The watools package in PyPI v0.0.1 to v0.0.8 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does watools version greather then equal to 0.0.1,less then equal to 0.0.8 have | |
Having vulnarability CVE-2020-11022 Advisory: Wdmtoolbox 12.9.3 pins the dependency 'sphinx>=3.0.4' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wdmtoolbox version less then 12.9.3 have ### Response: Having vulnarability CVE-2020-11022 Advisory: Wdmtoolbox 12.9.3 pins the dependency 'sphinx>=3.0.4' to include security fixes. | what vulnarability does wdmtoolbox version less then 12.9.3 have | |
Having vulnarability PVE-2021-38615 Advisory: Web-py 0.21 prevents bad characters in headers. This is a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does web-py version less then 0.21 have ### Response: Having vulnarability PVE-2021-38615 Advisory: Web-py 0.21 prevents bad characters in headers. This is a security fix. | what vulnarability does web-py version less then 0.21 have | |
Having vulnarability CVE-2016-3952 Advisory: web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify. NOTE: this issue can be leveraged by remote attackers to gain administrative access. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does web2py version less then 2.14.1 have ### Response: Having vulnarability CVE-2016-3952 Advisory: web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify. NOTE: this issue can be leveraged by remote attackers to gain administrative access. | what vulnarability does web2py version less then 2.14.1 have | |
Having vulnarability CVE-2018-15560 Advisory: Web3 4.7.0 upgrades eth-hash to 0.2.0 with pycryptodome 3.6.6 which resolves a vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does web3 version less then 4.7.0 have ### Response: Having vulnarability CVE-2018-15560 Advisory: Web3 4.7.0 upgrades eth-hash to 0.2.0 with pycryptodome 3.6.6 which resolves a vulnerability. | what vulnarability does web3 version less then 4.7.0 have | |
Having vulnarability PVE-2022-52475 Advisory: Webappdirac 5.0.3 and 5.1.0a5 escape url parameters to avoid XSS vulnerabilities.
https://github.com/DIRACGrid/WebAppDIRAC/pull/712 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webappdirac version less then 5.0.3,greather then equal to 5.1.0a1,less then 5.1.0a5 have ### Response: Having vulnarability PVE-2022-52475 Advisory: Webappdirac 5.0.3 and 5.1.0a5 escape url parameters to avoid XSS vulnerabilities.
https://github.com/DIRACGrid/WebAppDIRAC/pull/712 | what vulnarability does webappdirac version less then 5.0.3,greather then equal to 5.1.0a1,less then 5.1.0a5 have | |
Having vulnarability CVE-2019-9710 Advisory: webargs 5.1.3 fixes race condition between parallel requests when the cache is used. See: CVE-2019-9710. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webargs version less then 5.1.3 have ### Response: Having vulnarability CVE-2019-9710 Advisory: webargs 5.1.3 fixes race condition between parallel requests when the cache is used. See: CVE-2019-9710. | what vulnarability does webargs version less then 5.1.3 have | |
Having vulnarability CVE-2020-25659 Advisory: Webauthn-rp 0.0.10 updates its dependency 'cryptography' to v3.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webauthn-rp version less then 0.0.10 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Webauthn-rp 0.0.10 updates its dependency 'cryptography' to v3.2 to include a security fix. | what vulnarability does webauthn-rp version less then 0.0.10 have | |
Having vulnarability PVE-2022-49342 Advisory: Webchanges 3.10.2 fixes an unsafe permissions vulnerability. On Linux and macOS systems, now is checked that the hooks file and the directory it is located in are owned and writable by only the user who is running the job (and not by its group or by other users. An explanatory ImportWarning message is now issued if the permissions are not correct and the import of the hooks module is skipped. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webchanges version less then 3.10.2 have ### Response: Having vulnarability PVE-2022-49342 Advisory: Webchanges 3.10.2 fixes an unsafe permissions vulnerability. On Linux and macOS systems, now is checked that the hooks file and the directory it is located in are owned and writable by only the user who is running the job (and not by its group or by other users. An explanatory ImportWarning message is now issued if the permissions are not correct and the import of the hooks module is skipped. | what vulnarability does webchanges version less then 3.10.2 have | |
Having vulnarability CVE-2021-41124 Advisory: Webcomix v3.5.1 updates its dependency "scrapy-splash" to 0.8.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webcomix version less then 3.5.1 have ### Response: Having vulnarability CVE-2021-41124 Advisory: Webcomix v3.5.1 updates its dependency "scrapy-splash" to 0.8.0 to include a security fix. | what vulnarability does webcomix version less then 3.5.1 have | |
Having vulnarability PVE-2023-99945 Advisory: Weblate 2.14 includes a fix for a XSS vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does weblate version less then 2.14 have ### Response: Having vulnarability PVE-2023-99945 Advisory: Weblate 2.14 includes a fix for a XSS vulnerability. | what vulnarability does weblate version less then 2.14 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.