output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability PVE-2021-36726 Advisory: Webp 1.0.1 adds further security related hardening in libwebp & libwebpmux.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webp version less then 0.1.2 have ### Response: Having vulnarability PVE-2021-36726 Advisory: Webp 1.0.1 adds further security related hardening in libwebp & libwebpmux.
what vulnarability does webp version less then 0.1.2 have
Having vulnarability PVE-2023-61582 Advisory: Webptools is vulnerable to shell command injection in filename or options due to lack of validation. https://github.com/scionoftech/webptools/issues/4
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webptools version less then equal to 0.0.9 have ### Response: Having vulnarability PVE-2023-61582 Advisory: Webptools is vulnerable to shell command injection in filename or options due to lack of validation. https://github.com/scionoftech/webptools/issues/4
what vulnarability does webptools version less then equal to 0.0.9 have
Having vulnarability PVE-2021-38854 Advisory: Webscrapbook 0.20.0 added content security policy restriction for served web pages. They can no longer send AJAX requests and form actions to prevent a potential attack. A config `app.content_security_policy` is added to change the behavior.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webscrapbook version less then 0.20.0 have ### Response: Having vulnarability PVE-2021-38854 Advisory: Webscrapbook 0.20.0 added content security policy restriction for served web pages. They can no longer send AJAX requests and form actions to prevent a potential attack. A config `app.content_security_policy` is added to change the behavior.
what vulnarability does webscrapbook version less then 0.20.0 have
Having vulnarability PVE-2022-50473 Advisory: Websockets 10.0 includes a fix for a DoS vulnerability. https://github.com/aaugustin/websockets/commit/0a935b8ec16f4430ffe638cdbfbe45f6f9d7f684
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does websockets version less then 10.0 have ### Response: Having vulnarability PVE-2022-50473 Advisory: Websockets 10.0 includes a fix for a DoS vulnerability. https://github.com/aaugustin/websockets/commit/0a935b8ec16f4430ffe638cdbfbe45f6f9d7f684
what vulnarability does websockets version less then 10.0 have
Having vulnarability PVE-2022-48411 Advisory: Webssh 0.7.3 stops storing plaintext passwords in local storage.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does webssh version less then 0.7.3 have ### Response: Having vulnarability PVE-2022-48411 Advisory: Webssh 0.7.3 stops storing plaintext passwords in local storage.
what vulnarability does webssh version less then 0.7.3 have
Having vulnarability CVE-2018-25082 Advisory: Weixin-python 0.5.5 includes a fix for CVE-2018-25082: This issue affects the function validate/to_xml. The manipulation leads to xml external entity reference. The attack may be initiated remotely. https://github.com/zwczou/weixin-python/pull/30
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does weixin-python version less then 0.5.5 have ### Response: Having vulnarability CVE-2018-25082 Advisory: Weixin-python 0.5.5 includes a fix for CVE-2018-25082: This issue affects the function validate/to_xml. The manipulation leads to xml external entity reference. The attack may be initiated remotely. https://github.com/zwczou/weixin-python/pull/30
what vulnarability does weixin-python version less then 0.5.5 have
Having vulnarability CVE-2016-10516 Advisory: Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does werkzeug version less then 0.11.11 have ### Response: Having vulnarability CVE-2016-10516 Advisory: Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message.
what vulnarability does werkzeug version less then 0.11.11 have
Having vulnarability CVE-2023-38759 Advisory: Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wger version less then equal to 2.2.0a3 have ### Response: Having vulnarability CVE-2023-38759 Advisory: Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components.
what vulnarability does wger version less then equal to 2.2.0a3 have
Having vulnarability PVE-2023-59192 Advisory: Whatsapp-chat-exporter 0.9.5 includes a fix for a XSS vulnerability. https://github.com/KnugiHK/WhatsApp-Chat-Exporter/commit/032af6cdcf3377e2736badaaaee36fdc91673be5
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does whatsapp-chat-exporter version less then 0.9.5 have ### Response: Having vulnarability PVE-2023-59192 Advisory: Whatsapp-chat-exporter 0.9.5 includes a fix for a XSS vulnerability. https://github.com/KnugiHK/WhatsApp-Chat-Exporter/commit/032af6cdcf3377e2736badaaaee36fdc91673be5
what vulnarability does whatsapp-chat-exporter version less then 0.9.5 have
Having vulnarability CVE-2022-40898 Advisory: Wheel 0.38.1 includes a fix for CVE-2022-40898: An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wheel version less then 0.38.1 have ### Response: Having vulnarability CVE-2022-40898 Advisory: Wheel 0.38.1 includes a fix for CVE-2022-40898: An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages
what vulnarability does wheel version less then 0.38.1 have
Having vulnarability CVE-2020-27783 Advisory: Whispers 1.3.9 updates its dependency 'lxml' to v4.6.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does whispers version less then 1.3.9 have ### Response: Having vulnarability CVE-2020-27783 Advisory: Whispers 1.3.9 updates its dependency 'lxml' to v4.6.2 to include a security fix.
what vulnarability does whispers version less then 1.3.9 have
Having vulnarability CVE-2021-32677 Advisory: Whist-server 0.1.0 updates its dependency 'fastapi' to v0.65.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does whist-server version less then 0.1.0 have ### Response: Having vulnarability CVE-2021-32677 Advisory: Whist-server 0.1.0 updates its dependency 'fastapi' to v0.65.2 to include a security fix.
what vulnarability does whist-server version less then 0.1.0 have
Having vulnarability PVE-2021-37275 Advisory: Whitenoise 4.1.3 fixes potential path traversal attack while running in autorefresh mode on Windows. https://github.com/evansd/whitenoise/commit/4d8a3ab1e97d7ddb18b3fa8b4909c92bad5529c6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does whitenoise version less then 4.1.3 have ### Response: Having vulnarability PVE-2021-37275 Advisory: Whitenoise 4.1.3 fixes potential path traversal attack while running in autorefresh mode on Windows. https://github.com/evansd/whitenoise/commit/4d8a3ab1e97d7ddb18b3fa8b4909c92bad5529c6
what vulnarability does whitenoise version less then 4.1.3 have
Having vulnarability PVE-2022-49792 Advisory: Whoisit 2.6.0 defaults to skip unsafe (HTTP) RDAP endpoints. https://github.com/meeb/whoisit/commit/9f954d8289ecda30c39f5b46fde1837568be0a93
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does whoisit version less then 2.6.0 have ### Response: Having vulnarability PVE-2022-49792 Advisory: Whoisit 2.6.0 defaults to skip unsafe (HTTP) RDAP endpoints. https://github.com/meeb/whoisit/commit/9f954d8289ecda30c39f5b46fde1837568be0a93
what vulnarability does whoisit version less then 2.6.0 have
Having vulnarability CVE-2022-25303 Advisory: Whoogle-search 0.7.2 includes a fix for CVE-2022-25303: Cross-site Scripting (XSS) via the query string parameter q. error_message() is rendered using the | safe filter, meaning the user input is not escaped.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does whoogle-search version less then 0.7.2 have ### Response: Having vulnarability CVE-2022-25303 Advisory: Whoogle-search 0.7.2 includes a fix for CVE-2022-25303: Cross-site Scripting (XSS) via the query string parameter q. error_message() is rendered using the | safe filter, meaning the user input is not escaped.
what vulnarability does whoogle-search version less then 0.7.2 have
Having vulnarability CVE-2021-25986 Advisory: Wiki 0.7.9 includes a fix for CVE-2021-25986: In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript. https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wiki version greather then equal to 0.0.20,less then 0.7.9 have ### Response: Having vulnarability CVE-2021-25986 Advisory: Wiki 0.7.9 includes a fix for CVE-2021-25986: In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript. https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986
what vulnarability does wiki version greather then equal to 0.0.20,less then 0.7.9 have
Having vulnarability PVE-2021-41226 Advisory: Wikibaseintegrator 0.10.1 includes OAuth 1.0a and OAuth 2.0 owner-only consumer support. These are now the best methods to securely authenticate against a MediaWiki instance.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wikibaseintegrator version less then 0.10.1 have ### Response: Having vulnarability PVE-2021-41226 Advisory: Wikibaseintegrator 0.10.1 includes OAuth 1.0a and OAuth 2.0 owner-only consumer support. These are now the best methods to securely authenticate against a MediaWiki instance.
what vulnarability does wikibaseintegrator version less then 0.10.1 have
Having vulnarability CVE-2022-34509 Advisory: The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wikifaces version equal to 1.0.0 have ### Response: Having vulnarability CVE-2022-34509 Advisory: The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party.
what vulnarability does wikifaces version equal to 1.0.0 have
Having vulnarability PVE-2021-40303 Advisory: Wikirepo 0.1.1.5 includes fixes to vulnerabilities through exception use.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wikirepo version less then 0.1.1.5 have ### Response: Having vulnarability PVE-2021-40303 Advisory: Wikirepo 0.1.1.5 includes fixes to vulnerabilities through exception use.
what vulnarability does wikirepo version less then 0.1.1.5 have
Having vulnarability PVE-2023-59355 Advisory: Wikitextparser 0.28.1 includes a fix for a catastrophic backtracking vulnerability. https://github.com/5j9/wikitextparser/issues/22 https://github.com/5j9/wikitextparser/commit/27b805f3483e27e2e829d2e44f8684e7bdb6200b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wikitextparser version less then 0.28.1 have ### Response: Having vulnarability PVE-2023-59355 Advisory: Wikitextparser 0.28.1 includes a fix for a catastrophic backtracking vulnerability. https://github.com/5j9/wikitextparser/issues/22 https://github.com/5j9/wikitextparser/commit/27b805f3483e27e2e829d2e44f8684e7bdb6200b
what vulnarability does wikitextparser version less then 0.28.1 have
Having vulnarability PVE-2021-35046 Advisory: will before 0.5.4 uses a insecure transitive dependency (bottle).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does will version less then 0.5.4 have ### Response: Having vulnarability PVE-2021-35046 Advisory: will before 0.5.4 uses a insecure transitive dependency (bottle).
what vulnarability does will version less then 0.5.4 have
Having vulnarability PVE-2021-41402 Advisory: Windsor version 1.0.1 includes a security fix for the function 'install' in 'windsor/cdkdependencies.py'. It contained an OS injection vulnerability: subprocess call with shell=True. https://github.com/westpoint-io/windsor/commit/ee9ab719500b6eef202f320bde11f84ef30b45e0#diff-713f6f14611f12ebebb0963b023a3d972511c1e04d5f80f97d072b60f486e14f
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does windsor version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-41402 Advisory: Windsor version 1.0.1 includes a security fix for the function 'install' in 'windsor/cdkdependencies.py'. It contained an OS injection vulnerability: subprocess call with shell=True. https://github.com/westpoint-io/windsor/commit/ee9ab719500b6eef202f320bde11f84ef30b45e0#diff-713f6f14611f12ebebb0963b023a3d972511c1e04d5f80f97d072b60f486e14f
what vulnarability does windsor version less then 1.0.1 have
Having vulnarability PVE-2021-40905 Advisory: Wirecloud-keycloak 0.3.4 fixes auth token injection when using WireCloud's proxy.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wirecloud-keycloak version less then 0.3.4 have ### Response: Having vulnarability PVE-2021-40905 Advisory: Wirecloud-keycloak 0.3.4 fixes auth token injection when using WireCloud's proxy.
what vulnarability does wirecloud-keycloak version less then 0.3.4 have
Having vulnarability PVE-2023-52687 Advisory: Wiredtiger 2.9.0, 3.0.14, 3.2.9 and 3.3.11 restrict where statistics log files can be created to remove a vulnerability. https://jira.mongodb.org/browse/WT-2711
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wiredtiger version less then 2.9.0,greather then equal to 3.0.0,less then 3.0.14,greather then equal to 3.1.0,less then 3.2.9,greather then equal to 3.3.0,less then 3.3.11 have ### Response: Having vulnarability PVE-2023-52687 Advisory: Wiredtiger 2.9.0, 3.0.14, 3.2.9 and 3.3.11 restrict where statistics log files can be created to remove a vulnerability. https://jira.mongodb.org/browse/WT-2711
what vulnarability does wiredtiger version less then 2.9.0,greather then equal to 3.0.0,less then 3.0.14,greather then equal to 3.1.0,less then 3.2.9,greather then equal to 3.3.0,less then 3.3.11 have
Having vulnarability PVE-2023-59418 Advisory: Wiremock 2.5.0 updates 'wiremock-standalone.jar' to version 2.35.0 to include a fix for a path traversal vulnerability. https://github.com/wiremock/python-wiremock/pull/48 https://github.com/wiremock/wiremock/pull/1930
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wiremock version less then 2.5.0 have ### Response: Having vulnarability PVE-2023-59418 Advisory: Wiremock 2.5.0 updates 'wiremock-standalone.jar' to version 2.35.0 to include a fix for a path traversal vulnerability. https://github.com/wiremock/python-wiremock/pull/48 https://github.com/wiremock/wiremock/pull/1930
what vulnarability does wiremock version less then 2.5.0 have
Having vulnarability PVE-2021-37522 Advisory: Wirepas-backend-client 1.2.0rc2 hides credentials when printing to stdout - see https://github.com/wirepas/backend-client/issues/48
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wirepas-backend-client version less then 1.2.0rc2 have ### Response: Having vulnarability PVE-2021-37522 Advisory: Wirepas-backend-client 1.2.0rc2 hides credentials when printing to stdout - see https://github.com/wirepas/backend-client/issues/48
what vulnarability does wirepas-backend-client version less then 1.2.0rc2 have
Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wmagent version greather then equal to 1.3.3rc1,less then 2.0.4 have ### Response: Having vulnarability CVE-2022-34558 Advisory: WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package.
what vulnarability does wmagent version greather then equal to 1.3.3rc1,less then 2.0.4 have
Having vulnarability CVE-2022-29217 Advisory: Wmcore 2.0.4 updates its dependency 'PyJWT' requirement to '~=2.4.0' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wmcore version less then 2.0.4 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Wmcore 2.0.4 updates its dependency 'PyJWT' requirement to '~=2.4.0' to include a security fix.
what vulnarability does wmcore version less then 2.0.4 have
Having vulnarability CVE-2019-13628 Advisory: wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wolfcrypt version less then equal to 4.0.0 have ### Response: Having vulnarability CVE-2019-13628 Advisory: wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
what vulnarability does wolfcrypt version less then equal to 4.0.0 have
Having vulnarability CVE-2020-25659 Advisory: Wolkenbrot 0.3 updates its dependency 'cryptography' to v3.3.2 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wolkenbrot version less then 0.3 have ### Response: Having vulnarability CVE-2020-25659 Advisory: Wolkenbrot 0.3 updates its dependency 'cryptography' to v3.3.2 to include security fixes.
what vulnarability does wolkenbrot version less then 0.3 have
Having vulnarability PVE-2022-51175 Advisory: Wordops 3.15.2 avoids dumping sensitive information in logs. https://github.com/WordOps/WordOps/commit/192b88452943a78d9a97508ed8c714691da72975
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wordops version less then 3.15.2 have ### Response: Having vulnarability PVE-2022-51175 Advisory: Wordops 3.15.2 avoids dumping sensitive information in logs. https://github.com/WordOps/WordOps/commit/192b88452943a78d9a97508ed8c714691da72975
what vulnarability does wordops version less then 3.15.2 have
Having vulnarability PVE-2021-26176 Advisory: wpull before 0.1006.1 is leaking HTTP header fields when transitioning from HTTP to HTTPS.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wpull version less then 0.1006.1 have ### Response: Having vulnarability PVE-2021-26176 Advisory: wpull before 0.1006.1 is leaking HTTP header fields when transitioning from HTTP to HTTPS.
what vulnarability does wpull version less then 0.1006.1 have
Having vulnarability CVE-2022-41905 Advisory: Wsgidav 4.1.0 includes a fix for CVE-2022-41905: Cross Site Scripting vulnerability in wsgidav when directory browsing is enabled. https://github.com/mar10/wsgidav/security/advisories/GHSA-xx6g-jj35-pxjv
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wsgidav version greather then equal to 3.0.0a1,less then 4.1.0 have ### Response: Having vulnarability CVE-2022-41905 Advisory: Wsgidav 4.1.0 includes a fix for CVE-2022-41905: Cross Site Scripting vulnerability in wsgidav when directory browsing is enabled. https://github.com/mar10/wsgidav/security/advisories/GHSA-xx6g-jj35-pxjv
what vulnarability does wsgidav version greather then equal to 3.0.0a1,less then 4.1.0 have
Having vulnarability PVE-2022-48145 Advisory: Wslink 1.5.3 blocks further actions if no valid token is sent. https://github.com/kitware/wslink/commit/06bec0d5d4b98da90310dc5eca6fc1add09e33e4
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wslink version less then 1.5.3 have ### Response: Having vulnarability PVE-2022-48145 Advisory: Wslink 1.5.3 blocks further actions if no valid token is sent. https://github.com/kitware/wslink/commit/06bec0d5d4b98da90310dc5eca6fc1add09e33e4
what vulnarability does wslink version less then 1.5.3 have
Having vulnarability PVE-2023-62460 Advisory: Wsnet 0.0.14 adds secure defaults to wsserver. https://github.com/skelsec/wsnet/commit/949015d367f40015a6858167454091ed0e61b49e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wsnet version less then 0.0.14 have ### Response: Having vulnarability PVE-2023-62460 Advisory: Wsnet 0.0.14 adds secure defaults to wsserver. https://github.com/skelsec/wsnet/commit/949015d367f40015a6858167454091ed0e61b49e
what vulnarability does wsnet version less then 0.0.14 have
Having vulnarability PVE-2021-42852 Advisory: Wtforms 3.0.0a1 escape unsafe characters in label text, patching a potential XSS vulnerability. https://github.com/wtforms/wtforms/commit/8529b953a0919300794f95e01a7713162908c8a6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does wtforms version less then 3.0.0a1 have ### Response: Having vulnarability PVE-2021-42852 Advisory: Wtforms 3.0.0a1 escape unsafe characters in label text, patching a potential XSS vulnerability. https://github.com/wtforms/wtforms/commit/8529b953a0919300794f95e01a7713162908c8a6
what vulnarability does wtforms version less then 3.0.0a1 have
Having vulnarability PVE-2022-52583 Advisory: Xaisuite 0.6.7 adds validation to prevent a code execution vulnerability. https://github.com/11301858/XAISuite/commit/418c75195c7a056a627317bfe08cad874c498fff
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xaisuite version less then 0.6.7 have ### Response: Having vulnarability PVE-2022-52583 Advisory: Xaisuite 0.6.7 adds validation to prevent a code execution vulnerability. https://github.com/11301858/XAISuite/commit/418c75195c7a056a627317bfe08cad874c498fff
what vulnarability does xaisuite version less then 0.6.7 have
Having vulnarability CVE-2021-23437 Advisory: Xaitk-saliency 0.5.0 updates its dependency 'pillow' to v8.3.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xaitk-saliency version less then 0.5.0 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Xaitk-saliency 0.5.0 updates its dependency 'pillow' to v8.3.2 to include a security fix.
what vulnarability does xaitk-saliency version less then 0.5.0 have
Having vulnarability PVE-2024-99895 Advisory: xalpha v0.11.4 is vulnerable to Remote Command Execution (RCE).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xalpha version greather then equal to 0.11.4,less then 0.11.9 have ### Response: Having vulnarability PVE-2024-99895 Advisory: xalpha v0.11.4 is vulnerable to Remote Command Execution (RCE).
what vulnarability does xalpha version greather then equal to 0.11.4,less then 0.11.9 have
Having vulnarability PVE-2023-59596 Advisory: Xata 0.7.0 includes a fix for a Race Condition vulnerability. https://github.com/xataio/xata-py/issues/42 https://github.com/xataio/xata-py/pull/45
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xata version less then 0.7.0 have ### Response: Having vulnarability PVE-2023-59596 Advisory: Xata 0.7.0 includes a fix for a Race Condition vulnerability. https://github.com/xataio/xata-py/issues/42 https://github.com/xataio/xata-py/pull/45
what vulnarability does xata version less then 0.7.0 have
Having vulnarability PVE-2023-53521 Advisory: Xblock-drag-and-drop-v2 3.0.0 sanitizes HTML tags to prevent XSS vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xblock-drag-and-drop-v2 version less then 3.0.0 have ### Response: Having vulnarability PVE-2023-53521 Advisory: Xblock-drag-and-drop-v2 3.0.0 sanitizes HTML tags to prevent XSS vulnerabilities.
what vulnarability does xblock-drag-and-drop-v2 version less then 3.0.0 have
Having vulnarability CVE-2019-12761 Advisory: A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call. See: CVE-2019-12761.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xdg version less then 0.26 have ### Response: Having vulnarability CVE-2019-12761 Advisory: A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call. See: CVE-2019-12761.
what vulnarability does xdg version less then 0.26 have
Having vulnarability CVE-2022-45061 Advisory: Xiaogpt version 2.31 is susceptible to a denial of service vulnerability due to issues with how idna.encode handles specially crafted inputs.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xiaogpt version less then 2.31 have ### Response: Having vulnarability CVE-2022-45061 Advisory: Xiaogpt version 2.31 is susceptible to a denial of service vulnerability due to issues with how idna.encode handles specially crafted inputs.
what vulnarability does xiaogpt version less then 2.31 have
Having vulnarability CVE-2022-3602 Advisory: Xknx 2.0.0 updates its dependency 'cryptography' to v38.0.3 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xknx version less then 2.0.0 have ### Response: Having vulnarability CVE-2022-3602 Advisory: Xknx 2.0.0 updates its dependency 'cryptography' to v38.0.3 to include security fixes.
what vulnarability does xknx version less then 2.0.0 have
Having vulnarability CVE-2021-25951 Advisory: XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service. The parse function does not properly restrict recursive entity references.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xml2dict version greather then equal to 0 have ### Response: Having vulnarability CVE-2021-25951 Advisory: XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service. The parse function does not properly restrict recursive entity references.
what vulnarability does xml2dict version greather then equal to 0 have
Having vulnarability PVE-2024-63455 Advisory: Xml2rfc 3.12.4 addresses an issue where affected versions were vulnerable to XSS attacks, allowing script elements in SVG sources. https://github.com/ietf-tools/xml2rfc/commit/df99f948b53ca4836d830ac55ec84eb4023e81dahttps://github.com/advisories/GHSA-cf4q-4cqr-7g7w
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xml2rfc version less then 3.12.4 have ### Response: Having vulnarability PVE-2024-63455 Advisory: Xml2rfc 3.12.4 addresses an issue where affected versions were vulnerable to XSS attacks, allowing script elements in SVG sources. https://github.com/ietf-tools/xml2rfc/commit/df99f948b53ca4836d830ac55ec84eb4023e81dahttps://github.com/advisories/GHSA-cf4q-4cqr-7g7w
what vulnarability does xml2rfc version less then 3.12.4 have
Having vulnarability PVE-2023-99969 Advisory: Xml2xlsx throughout 1.0.1 is vulnerable to XML External Entity (XEE) vulnerability. The function 'xml2xlsx()' does not restrict external entities while parsing the specially crafted XML document. An attacker is able to read local files by defining an external entity with a file:// URI as shown by the PoC: from xml2xlsx import xml2xlsx template_id = """ <!--?xml version="1.0" ?--> <!DOCTYPE replace [<!ENTITY ent SYSTEM "file:///c:/windows/win.ini"> ]> <sheet title="test"> <row><cell>vulnerable</cell></row> <row><cell>&ent;</cell></row> </sheet> // ----------------------------------- """ f = open('test.xlsx', 'wb') f.write(xml2xlsx(template_id)) f.close()
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xml2xlsx version less then equal to 1.0.1 have ### Response: Having vulnarability PVE-2023-99969 Advisory: Xml2xlsx throughout 1.0.1 is vulnerable to XML External Entity (XEE) vulnerability. The function 'xml2xlsx()' does not restrict external entities while parsing the specially crafted XML document. An attacker is able to read local files by defining an external entity with a file:// URI as shown by the PoC: from xml2xlsx import xml2xlsx template_id = """ <!--?xml version="1.0" ?--> <!DOCTYPE replace [<!ENTITY ent SYSTEM "file:///c:/windows/win.ini"> ]> <sheet title="test"> <row><cell>vulnerable</cell></row> <row><cell>&ent;</cell></row> </sheet> // ----------------------------------- """ f = open('test.xlsx', 'wb') f.write(xml2xlsx(template_id)) f.close()
what vulnarability does xml2xlsx version less then equal to 1.0.1 have
Having vulnarability PVE-2023-99938 Advisory: Xml4h is vulnerable to XML External Entity (XEE) attacks. The function 'parse()' does not restrict external entities while parsing a specially crafted XML document. Due to this flaw, an attacker could read local files by defining an external entity with a file:// URI as showed by the PoC: import xml4h doc = xml4h.parse('simple.xml') print(doc.userInfo.lastName.text) # simple.xml content: <!--?xml version="1.0" ?--> <!DOCTYPE replace [<!ENTITY ent SYSTEM "file:///c:/windows/win.ini"> ]> <userInfo> <firstName>John</firstName> <lastName>&ent;</lastName> </userInfo>
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xml4h version less then equal to 1.0 have ### Response: Having vulnarability PVE-2023-99938 Advisory: Xml4h is vulnerable to XML External Entity (XEE) attacks. The function 'parse()' does not restrict external entities while parsing a specially crafted XML document. Due to this flaw, an attacker could read local files by defining an external entity with a file:// URI as showed by the PoC: import xml4h doc = xml4h.parse('simple.xml') print(doc.userInfo.lastName.text) # simple.xml content: <!--?xml version="1.0" ?--> <!DOCTYPE replace [<!ENTITY ent SYSTEM "file:///c:/windows/win.ini"> ]> <userInfo> <firstName>John</firstName> <lastName>&ent;</lastName> </userInfo>
what vulnarability does xml4h version less then equal to 1.0 have
Having vulnarability CVE-2013-1665 Advisory: Xmlschema-acue 0.9.27 prevents XML attacks with the use of the defusedxml package.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xmlschema-acue version less then 0.9.27 have ### Response: Having vulnarability CVE-2013-1665 Advisory: Xmlschema-acue 0.9.27 prevents XML attacks with the use of the defusedxml package.
what vulnarability does xmlschema-acue version less then 0.9.27 have
Having vulnarability CVE-2020-15239 Advisory: In xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. The issue is patched in version 0.4.0.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xmpp-http-upload version less then 0.4.0 have ### Response: Having vulnarability CVE-2020-15239 Advisory: In xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. The issue is patched in version 0.4.0.
what vulnarability does xmpp-http-upload version less then 0.4.0 have
Having vulnarability PVE-2021-38310 Advisory: Xontrib-output-search 0.0.2 no longer uses 'XONSH_STORE_STDOUT'. Now, the only output stored is the last not empty command in memory. This is a more secure solution.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xontrib-output-search version less then 0.0.2 have ### Response: Having vulnarability PVE-2021-38310 Advisory: Xontrib-output-search 0.0.2 no longer uses 'XONSH_STORE_STDOUT'. Now, the only output stored is the last not empty command in memory. This is a more secure solution.
what vulnarability does xontrib-output-search version less then 0.0.2 have
Having vulnarability PVE-2021-40248 Advisory: Xpra 0.0.7.34 restricts access to the 'run-xpra' script (chmod) and fixes a problem when cursor data sent to the client was too big (exposing server memory).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xpra version less then 0.0.7.34 have ### Response: Having vulnarability PVE-2021-40248 Advisory: Xpra 0.0.7.34 restricts access to the 'run-xpra' script (chmod) and fixes a problem when cursor data sent to the client was too big (exposing server memory).
what vulnarability does xpra version less then 0.0.7.34 have
Having vulnarability PVE-2022-44949 Advisory: Xpresso 0.17.0 removes all security features. https://github.com/adriangb/xpresso/pull/60
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xpresso version greather then equal to 0.17.0 have ### Response: Having vulnarability PVE-2022-44949 Advisory: Xpresso 0.17.0 removes all security features. https://github.com/adriangb/xpresso/pull/60
what vulnarability does xpresso version greather then equal to 0.17.0 have
Having vulnarability CVE-2023-37920 Advisory: Xraysink 1.6.2 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a vulnerability. https://github.com/garyd203/xraysink/commit/3859f878f030ae4762592e7e900e079ac9e7f298
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xraysink version less then 1.6.2 have ### Response: Having vulnarability CVE-2023-37920 Advisory: Xraysink 1.6.2 updates its dependency 'certifi' to version '2023.7.22' to include a fix for a vulnerability. https://github.com/garyd203/xraysink/commit/3859f878f030ae4762592e7e900e079ac9e7f298
what vulnarability does xraysink version less then 1.6.2 have
Having vulnarability PVE-2021-39640 Advisory: Xscrapers 127.0.0.150077
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xscrapers version less then 127.0.0.150077 have ### Response: Having vulnarability PVE-2021-39640 Advisory: Xscrapers 127.0.0.150077
what vulnarability does xscrapers version less then 127.0.0.150077 have
Having vulnarability PVE-2022-45442 Advisory: Xss is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens. https://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xss version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45442 Advisory: Xss is a malicious package, typosquatting. It steals your Roblox security cookies and Discord tokens. https://securityboulevard.com/2022/02/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository
what vulnarability does xss version greather then 0,less then 0 have
Having vulnarability CVE-2019-1010266 Advisory: Xstatic-lodash (xstatic-packaged version of node JS module "lodash" v4.16.4) is affected by CVE-2019-1010266: Lodash prior to 4.17.11 is affected by 'CWE-400: Uncontrolled Resource Consumption'. The impact is Denial of Service (DoS). The component affected is the Date handler. The attack vector consists in the attacker providing very long strings, which the library attempts to match using a regular expression.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xstatic-lodash version less then 4.17.11 have ### Response: Having vulnarability CVE-2019-1010266 Advisory: Xstatic-lodash (xstatic-packaged version of node JS module "lodash" v4.16.4) is affected by CVE-2019-1010266: Lodash prior to 4.17.11 is affected by 'CWE-400: Uncontrolled Resource Consumption'. The impact is Denial of Service (DoS). The component affected is the Date handler. The attack vector consists in the attacker providing very long strings, which the library attempts to match using a regular expression.
what vulnarability does xstatic-lodash version less then 4.17.11 have
Having vulnarability CVE-2016-4055 Advisory: Xstatic-moment (xstatic-packaged version of JS library "moment" v2.8.4) is affected by CVE-2016-4055: The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)."
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xstatic-moment version less then 2.11.2 have ### Response: Having vulnarability CVE-2016-4055 Advisory: Xstatic-moment (xstatic-packaged version of JS library "moment" v2.8.4) is affected by CVE-2016-4055: The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)."
what vulnarability does xstatic-moment version less then 2.11.2 have
Having vulnarability PVE-2021-37222 Advisory: xtea3 1.0.0 change: Removal of CBCMAC (security reasons)
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xtea3 version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-37222 Advisory: xtea3 1.0.0 change: Removal of CBCMAC (security reasons)
what vulnarability does xtea3 version less then 1.0.0 have
Having vulnarability PVE-2021-44525 Advisory: Xtgeo 2.17.1 drops dependency on 'pillow' to avoid security issues with versions <=8.4. https://github.com/equinor/xtgeo/pull/748
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xtgeo version less then 2.17.1 have ### Response: Having vulnarability PVE-2021-44525 Advisory: Xtgeo 2.17.1 drops dependency on 'pillow' to avoid security issues with versions <=8.4. https://github.com/equinor/xtgeo/pull/748
what vulnarability does xtgeo version less then 2.17.1 have
Having vulnarability PVE-2024-65541 Advisory: Xtts-api-server 0.8.5 addresses a path traversal vulnerability. https://github.com/daswer123/xtts-api-server/pull/61/commits/50683bb818802116ae056c8e9f129d5ec4b1763d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xtts-api-server version less then 0.8.5 have ### Response: Having vulnarability PVE-2024-65541 Advisory: Xtts-api-server 0.8.5 addresses a path traversal vulnerability. https://github.com/daswer123/xtts-api-server/pull/61/commits/50683bb818802116ae056c8e9f129d5ec4b1763d
what vulnarability does xtts-api-server version less then 0.8.5 have
Having vulnarability PVE-2021-37718 Advisory: xuper 3.2.0 validates autogen tx to avoid fake transaction attack; Fix UTXO with negative frozen heigh could pass transaction check; Check the number of coinbase transactions in a block to avoid byzantine miner;
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does xuper version less then 3.2.0 have ### Response: Having vulnarability PVE-2021-37718 Advisory: xuper 3.2.0 validates autogen tx to avoid fake transaction attack; Fix UTXO with negative frozen heigh could pass transaction check; Check the number of coinbase transactions in a block to avoid byzantine miner;
what vulnarability does xuper version less then 3.2.0 have
Having vulnarability PVE-2021-36697 Advisory: yahoo-earnings-calendar 0.4.0 - fix(security): upgrade requests (14)
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yahoo-earnings-calendar version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-36697 Advisory: yahoo-earnings-calendar 0.4.0 - fix(security): upgrade requests (14)
what vulnarability does yahoo-earnings-calendar version less then 0.4.0 have
Having vulnarability CVE-2021-38305 Advisory: Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yamale version less then 3.0.8 have ### Response: Having vulnarability CVE-2021-38305 Advisory: Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8
what vulnarability does yamale version less then 3.0.8 have
Having vulnarability CVE-2017-18342 Advisory: Yaml-Mako version 1.0.0 includes a security patch in 'yaml_mako.py'. The use of unsafe yaml.load() allows instantiation of arbitrary objects. https://github.com/haarcuba/yaml_mako/commit/8e54bf48bf0a95495eaaf4e66cb42d8241c56f66#diff-98273dbb1f4888f07033576daad480b434f9fa909d2646e4a1e20f4691c9c757
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yaml-mako version less then 1.0.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Yaml-Mako version 1.0.0 includes a security patch in 'yaml_mako.py'. The use of unsafe yaml.load() allows instantiation of arbitrary objects. https://github.com/haarcuba/yaml_mako/commit/8e54bf48bf0a95495eaaf4e66cb42d8241c56f66#diff-98273dbb1f4888f07033576daad480b434f9fa909d2646e4a1e20f4691c9c757
what vulnarability does yaml-mako version less then 1.0.0 have
Having vulnarability CVE-2017-18342 Advisory: Yamlconf version 0.2.4 includes a security patch for the function 'load' in 'yamlconf/load.py'. It uses the unsafe yaml.load(), that allows the instantiation of arbitrary objects. yaml.safe_load() should be preferred. https://github.com/halfak/yamlconf/commit/712c05e178e4d16b0eb83e6621fd294b8c1fda61
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yamlconf version less then 0.2.4 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Yamlconf version 0.2.4 includes a security patch for the function 'load' in 'yamlconf/load.py'. It uses the unsafe yaml.load(), that allows the instantiation of arbitrary objects. yaml.safe_load() should be preferred. https://github.com/halfak/yamlconf/commit/712c05e178e4d16b0eb83e6621fd294b8c1fda61
what vulnarability does yamlconf version less then 0.2.4 have
Having vulnarability PVE-2022-45463 Advisory: Yandex-yt is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yandex-yt version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45463 Advisory: Yandex-yt is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
what vulnarability does yandex-yt version greather then 0,less then 0 have
Having vulnarability CVE-2020-7212 Advisory: Yandex2lightroom 1.0.9.2 updates its dependency 'urllib3' to v1.26.7 for including a security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yandex2lightroom version less then 1.0.9.2 have ### Response: Having vulnarability CVE-2020-7212 Advisory: Yandex2lightroom 1.0.9.2 updates its dependency 'urllib3' to v1.26.7 for including a security fixes.
what vulnarability does yandex2lightroom version less then 1.0.9.2 have
Having vulnarability PVE-2022-50813 Advisory: Yara-mail 2.0.14 updates its dependency "yara-python" requirement to ">=4.2.3" to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yara-mail version less then 2.0.14 have ### Response: Having vulnarability PVE-2022-50813 Advisory: Yara-mail 2.0.14 updates its dependency "yara-python" requirement to ">=4.2.3" to include a security fix.
what vulnarability does yara-mail version less then 2.0.14 have
Having vulnarability PVE-2022-50813 Advisory: Yara-python 4.2.3 includes a fix for an arbitrary code execution vulnerability. https://github.com/VirusTotal/yara/commit/b77e4f45b4662af320c999d4ee559e1f3bc61226
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yara-python version less then 4.2.3 have ### Response: Having vulnarability PVE-2022-50813 Advisory: Yara-python 4.2.3 includes a fix for an arbitrary code execution vulnerability. https://github.com/VirusTotal/yara/commit/b77e4f45b4662af320c999d4ee559e1f3bc61226
what vulnarability does yara-python version less then 4.2.3 have
Having vulnarability PVE-2021-35004 Advisory: yasha before 4.0 is parsing JSON without using the 'safe_load' function.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yasha version less then 4.0 have ### Response: Having vulnarability PVE-2021-35004 Advisory: yasha before 4.0 is parsing JSON without using the 'safe_load' function.
what vulnarability does yasha version less then 4.0 have
Having vulnarability PVE-2021-26177 Advisory: yaybu before 0.1.14 doesn't set file system permissions before content is written.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yaybu version less then 0.1.14 have ### Response: Having vulnarability PVE-2021-26177 Advisory: yaybu before 0.1.14 doesn't set file system permissions before content is written.
what vulnarability does yaybu version less then 0.1.14 have
Having vulnarability CVE-2021-27291 Advisory: Yessql 0.2.3 updates its dependency 'pygments' to v2.7.4 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yessql version less then 0.2.3 have ### Response: Having vulnarability CVE-2021-27291 Advisory: Yessql 0.2.3 updates its dependency 'pygments' to v2.7.4 to include security fixes.
what vulnarability does yessql version less then 0.2.3 have
Having vulnarability CVE-2023-32681 Advisory: Yfinance 0.2.26 updates its dependency 'requests' to version '2.31' to include a fix for an Information Exposure vulnerability. https://github.com/ranaroussi/yfinance/pull/1625
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yfinance version less then 0.2.26 have ### Response: Having vulnarability CVE-2023-32681 Advisory: Yfinance 0.2.26 updates its dependency 'requests' to version '2.31' to include a fix for an Information Exposure vulnerability. https://github.com/ranaroussi/yfinance/pull/1625
what vulnarability does yfinance version less then 0.2.26 have
Having vulnarability CVE-2020-27619 Advisory: Yfpy 4.0.0 removes support for Python 3.5, which doesn't receive security updates anymore.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yfpy version less then 4.0.0 have ### Response: Having vulnarability CVE-2020-27619 Advisory: Yfpy 4.0.0 removes support for Python 3.5, which doesn't receive security updates anymore.
what vulnarability does yfpy version less then 4.0.0 have
Having vulnarability PVE-2022-45464 Advisory: Yiffparty is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yiffparty version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45464 Advisory: Yiffparty is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
what vulnarability does yiffparty version greather then 0,less then 0 have
Having vulnarability CVE-2018-20133 Advisory: ymlref allows code injection.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ymlref version greather then 0 have ### Response: Having vulnarability CVE-2018-20133 Advisory: ymlref allows code injection.
what vulnarability does ymlref version greather then 0 have
Having vulnarability CVE-2017-18342 Advisory: Yorm 1.6.1 updates 'PyYAML' to v5.1 to include a security fix. https://github.com/jacebrowning/yorm/commit/87636588655ecd4ac760e83221a243aaa29f5a89
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yorm version less then 1.6.1 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Yorm 1.6.1 updates 'PyYAML' to v5.1 to include a security fix. https://github.com/jacebrowning/yorm/commit/87636588655ecd4ac760e83221a243aaa29f5a89
what vulnarability does yorm version less then 1.6.1 have
Having vulnarability CVE-2023-35934 Advisory: Youtube-dl 2021.12.17 and prior versions are vulnerable to CVE-2023-35934: It may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does youtube-dl version less then equal to 2021.12.17 have ### Response: Having vulnarability CVE-2023-35934 Advisory: Youtube-dl 2021.12.17 and prior versions are vulnerable to CVE-2023-35934: It may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj
what vulnarability does youtube-dl version less then equal to 2021.12.17 have
Having vulnarability CVE-2023-35934 Advisory: Youtube-dlc 2020.11.11.post3 and prior versions are vulnerable to CVE-2023-35934: It may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does youtube-dlc version less then equal to 2020.11.11.post3 have ### Response: Having vulnarability CVE-2023-35934 Advisory: Youtube-dlc 2020.11.11.post3 and prior versions are vulnerable to CVE-2023-35934: It may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj
what vulnarability does youtube-dlc version less then equal to 2020.11.11.post3 have
Having vulnarability PVE-2021-42987 Advisory: Yq 2.13.0 armors against entity expansion attacks. https://github.com/kislyuk/yq/commit/a5d2c572ee69009380a54a67662cf781f3036450
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yq version less then 2.13.0 have ### Response: Having vulnarability PVE-2021-42987 Advisory: Yq 2.13.0 armors against entity expansion attacks. https://github.com/kislyuk/yq/commit/a5d2c572ee69009380a54a67662cf781f3036450
what vulnarability does yq version less then 2.13.0 have
Having vulnarability CVE-2007-4559 Advisory: Yt 4.1.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yt version less then 4.1.2 have ### Response: Having vulnarability CVE-2007-4559 Advisory: Yt 4.1.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
what vulnarability does yt version less then 4.1.2 have
Having vulnarability PVE-2023-59133 Advisory: Yt-dlp 2023.2.17includes a fix for a DoS vulnerability. https://github.com/yt-dlp/yt-dlp/commit/8aa0bd5d10627ece3c1815c01d02fb8bf22847a7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yt-dlp version less then 2023.02.17 have ### Response: Having vulnarability PVE-2023-59133 Advisory: Yt-dlp 2023.2.17includes a fix for a DoS vulnerability. https://github.com/yt-dlp/yt-dlp/commit/8aa0bd5d10627ece3c1815c01d02fb8bf22847a7
what vulnarability does yt-dlp version less then 2023.02.17 have
Having vulnarability CVE-2018-18074 Advisory: Yt2mp3 version 1.2.3 updates its dependency "requests" to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yt2mp3 version less then 1.2.3 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Yt2mp3 version 1.2.3 updates its dependency "requests" to include a security fix.
what vulnarability does yt2mp3 version less then 1.2.3 have
Having vulnarability PVE-2021-26178 Advisory: yubiauth before 0.2.3 is updating credentials in an insecure way.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yubiauth version less then 0.2.3 have ### Response: Having vulnarability PVE-2021-26178 Advisory: yubiauth before 0.2.3 is updating credentials in an insecure way.
what vulnarability does yubiauth version less then 0.2.3 have
Having vulnarability CVE-2017-15361 Advisory: Yubikey-manager 0.4.6 blocks on-chip RSA key generation for YubiKey firmware versions 4.2.0 to 4.3.4 (inclusive) since these chips are vulnerable to CVE-2017-15361.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does yubikey-manager version less then 0.4.6 have ### Response: Having vulnarability CVE-2017-15361 Advisory: Yubikey-manager 0.4.6 blocks on-chip RSA key generation for YubiKey firmware versions 4.2.0 to 4.3.4 (inclusive) since these chips are vulnerable to CVE-2017-15361.
what vulnarability does yubikey-manager version less then 0.4.6 have
Having vulnarability PVE-2021-26179 Advisory: z3c.form before 2.4.2 has a security vulnerability in IBrowserRequest from IFormLayer. This prevents to mixin IBrowserRequest into non IBrowserRequest e.g. IJSONRPCRequest. This should be compatible since a browser request using z3c.form already provides IBrowserRequest and the IFormLayer is only a marker interface used as skin layer.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does z3c-form version less then 2.4.2 have ### Response: Having vulnarability PVE-2021-26179 Advisory: z3c.form before 2.4.2 has a security vulnerability in IBrowserRequest from IFormLayer. This prevents to mixin IBrowserRequest into non IBrowserRequest e.g. IJSONRPCRequest. This should be compatible since a browser request using z3c.form already provides IBrowserRequest and the IFormLayer is only a marker interface used as skin layer.
what vulnarability does z3c-form version less then 2.4.2 have
Having vulnarability PVE-2023-53081 Advisory: Z3c.authenticator 0.8.0 includes a security fix: move camefrom url to a session variable instead of exposing the url in the login form. Because the camefrom url is built at server side based on local information and will always only use internal traversal names. Exposing this camefrom query in the login url gives others only a point to attack because it could be simply set by a unfriendly domain with a custom url. https://github.com/zopefoundation/z3c.authenticator/commit/b58ef77a958fdac8cd5a5dbf6417fd7bb093412d
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does z3c.authenticator version less then 0.8.0 have ### Response: Having vulnarability PVE-2023-53081 Advisory: Z3c.authenticator 0.8.0 includes a security fix: move camefrom url to a session variable instead of exposing the url in the login form. Because the camefrom url is built at server side based on local information and will always only use internal traversal names. Exposing this camefrom query in the login url gives others only a point to attack because it could be simply set by a unfriendly domain with a custom url. https://github.com/zopefoundation/z3c.authenticator/commit/b58ef77a958fdac8cd5a5dbf6417fd7bb093412d
what vulnarability does z3c.authenticator version less then 0.8.0 have
Having vulnarability PVE-2023-53359 Advisory: Z3c.layer.pagelet 1.0.2 includes a security fix: The traverser defined for 'IPageletBrowserLayer' was a trusted adapter, so the security proxy got removed from each traversed object. Thus all sub-objects were publicly accessible. https://github.com/zopefoundation/z3c.layer.pagelet/commit/4825bcb2f2cc5734a58d1912bad82e9cee0d4947
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does z3c.layer.pagelet version less then 1.0.2,equal to 1.1.0 have ### Response: Having vulnarability PVE-2023-53359 Advisory: Z3c.layer.pagelet 1.0.2 includes a security fix: The traverser defined for 'IPageletBrowserLayer' was a trusted adapter, so the security proxy got removed from each traversed object. Thus all sub-objects were publicly accessible. https://github.com/zopefoundation/z3c.layer.pagelet/commit/4825bcb2f2cc5734a58d1912bad82e9cee0d4947
what vulnarability does z3c.layer.pagelet version less then 1.0.2,equal to 1.1.0 have
Having vulnarability CVE-2021-41945 Advisory: Zanshin-sdk-python version 1.2.5 has upgraded its httpx library to version 0.23.0 to address the security vulnerability detailed in CVE-2021-41945.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zanshin-sdk-python version less then 1.2.5 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Zanshin-sdk-python version 1.2.5 has upgraded its httpx library to version 0.23.0 to address the security vulnerability detailed in CVE-2021-41945.
what vulnarability does zanshin-sdk-python version less then 1.2.5 have
Having vulnarability CVE-2021-41945 Advisory: Zanshincli 1.2.7 updates its dependency 'httpx' to v0.23.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zanshincli version less then 1.2.7 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Zanshincli 1.2.7 updates its dependency 'httpx' to v0.23.0 to include a security fix.
what vulnarability does zanshincli version less then 1.2.7 have
Having vulnarability CVE-2021-41945 Advisory: Zanshinsdk 1.2.5 updates its dependency 'httpx' to v0.23.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zanshinsdk version less then 1.2.5 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Zanshinsdk 1.2.5 updates its dependency 'httpx' to v0.23.0 to include a security fix.
what vulnarability does zanshinsdk version less then 1.2.5 have
Having vulnarability CVE-2023-40889 Advisory: Zbar (python bindings) 0.10 and prior releases require a version of the ZBar Bar Code Reader which is affected by CVE-2023-40889: A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner. https://hackmd.io/@cspl/B1ZkFZv23
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zbar version greather then equal to 0,less then equal to 0.23.90 have ### Response: Having vulnarability CVE-2023-40889 Advisory: Zbar (python bindings) 0.10 and prior releases require a version of the ZBar Bar Code Reader which is affected by CVE-2023-40889: A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner. https://hackmd.io/@cspl/B1ZkFZv23
what vulnarability does zbar version greather then equal to 0,less then equal to 0.23.90 have
Having vulnarability PVE-2021-26180 Advisory: zeep before 0.4.0 is using an insecure XML parser.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zeep version less then 0.4.0 have ### Response: Having vulnarability PVE-2021-26180 Advisory: zeep before 0.4.0 is using an insecure XML parser.
what vulnarability does zeep version less then 0.4.0 have
Having vulnarability CVE-2022-29217 Advisory: Zendesk-django-auth 0.2.0 requires 'PyJWT>=2.4.0,<2.5.0' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zendesk-django-auth version less then 0.2.0 have ### Response: Having vulnarability CVE-2022-29217 Advisory: Zendesk-django-auth 0.2.0 requires 'PyJWT>=2.4.0,<2.5.0' to include a security fix.
what vulnarability does zendesk-django-auth version less then 0.2.0 have
Having vulnarability CVE-2023-1177 Advisory: Zenml 0.37.0 updates its dependency "mlflow' requirement to '>=1.24.0,<=2.2.2' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zenml version less then 0.37.0 have ### Response: Having vulnarability CVE-2023-1177 Advisory: Zenml 0.37.0 updates its dependency "mlflow' requirement to '>=1.24.0,<=2.2.2' to include a security fix.
what vulnarability does zenml version less then 0.37.0 have
Having vulnarability PVE-2023-62433 Advisory: Zeo 5.2.3 includes a fix for a potential race condition vulnerability that could lead to data corruption. https://github.com/zopefoundation/ZEO/issues/166
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zeo version less then 5.2.3 have ### Response: Having vulnarability PVE-2023-62433 Advisory: Zeo 5.2.3 includes a fix for a potential race condition vulnerability that could lead to data corruption. https://github.com/zopefoundation/ZEO/issues/166
what vulnarability does zeo version less then 5.2.3 have
Having vulnarability PVE-2022-52468 Advisory: Zeroconf 0.09 fixes a DoS vulnerability in readName.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zeroconf version less then 0.09 have ### Response: Having vulnarability PVE-2022-52468 Advisory: Zeroconf 0.09 fixes a DoS vulnerability in readName.
what vulnarability does zeroconf version less then 0.09 have
Having vulnarability CVE-2018-18074 Advisory: Zhmc-ansible-modules 0.6.0 updates the 'requests' package to 2.20.0 to fix CVE-2018-18074 vulnerability.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zhmc-ansible-modules version less then 0.6.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Zhmc-ansible-modules 0.6.0 updates the 'requests' package to 2.20.0 to fix CVE-2018-18074 vulnerability.
what vulnarability does zhmc-ansible-modules version less then 0.6.0 have
Having vulnarability CVE-2018-18074 Advisory: zhmcclient 0.21.0 updates Requests package to 2.20.0 to fix CVE-2018-18074 vulnerability
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zhmcclient version less then 0.21.0 have ### Response: Having vulnarability CVE-2018-18074 Advisory: zhmcclient 0.21.0 updates Requests package to 2.20.0 to fix CVE-2018-18074 vulnerability
what vulnarability does zhmcclient version less then 0.21.0 have