output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2022-34064 Advisory: The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zibal version equal to 1.0.0 have ### Response: Having vulnarability CVE-2022-34064 Advisory: The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does zibal version equal to 1.0.0 have | |
Having vulnarability PVE-2021-39245 Advisory: CC2531 coordinators running Z-Stack Home 1.2 firmware in zigpy-znp before version 0.3.0 erroneously permit joins on startup, even after being reset. Joins are now explicitly disabled every time the coordinator is started. See: <https://github.com/home-assistant/core/issues/43245>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zigpy-znp version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-39245 Advisory: CC2531 coordinators running Z-Stack Home 1.2 firmware in zigpy-znp before version 0.3.0 erroneously permit joins on startup, even after being reset. Joins are now explicitly disabled every time the coordinator is started. See: <https://github.com/home-assistant/core/issues/43245>. | what vulnarability does zigpy-znp version less then 0.3.0 have | |
Having vulnarability PVE-2017-45728 Advisory: Ziirish 0.1.0 escape fields before executing the restore command.
https://github.com/ziirish/burp-ui/commit/fa56bbf6e84c4ab39b60da23069e17839e4f6dfb | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ziirish version less then 0.1.0 have ### Response: Having vulnarability PVE-2017-45728 Advisory: Ziirish 0.1.0 escape fields before executing the restore command.
https://github.com/ziirish/burp-ui/commit/fa56bbf6e84c4ab39b60da23069e17839e4f6dfb | what vulnarability does ziirish version less then 0.1.0 have | |
Having vulnarability CVE-2022-2309 Advisory: Zimscraperlib 1.6.1 updates 'lxml' dependency range to '>=4.6.3,<4.10' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zimscraperlib version less then 1.6.1 have ### Response: Having vulnarability CVE-2022-2309 Advisory: Zimscraperlib 1.6.1 updates 'lxml' dependency range to '>=4.6.3,<4.10' to include a security fix. | what vulnarability does zimscraperlib version less then 1.6.1 have | |
Having vulnarability CVE-2010-3495 Advisory: Race condition in ZEO/StorageServer.py in Zope Object Database (ZODB) before 3.10.0 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, a related issue to CVE-2010-3492. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zodb version less then 3.10.0 have ### Response: Having vulnarability CVE-2010-3495 Advisory: Race condition in ZEO/StorageServer.py in Zope Object Database (ZODB) before 3.10.0 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, a related issue to CVE-2010-3492. | what vulnarability does zodb version less then 3.10.0 have | |
Having vulnarability CVE-2009-0668 Advisory: Zodb3 3.8.2 includes a fix for CVE-2009-0668: Arbitrary Python code execution in ZODB ZEO storage servers.
https://github.com/zopefoundation/ZODB/commit/74888d16158655661b87aa25fa272293b704f9fa | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zodb3 version less then 3.8.2 have ### Response: Having vulnarability CVE-2009-0668 Advisory: Zodb3 3.8.2 includes a fix for CVE-2009-0668: Arbitrary Python code execution in ZODB ZEO storage servers.
https://github.com/zopefoundation/ZODB/commit/74888d16158655661b87aa25fa272293b704f9fa | what vulnarability does zodb3 version less then 3.8.2 have | |
Having vulnarability CVE-2021-23437 Advisory: Zodipy 0.2.2 updates its dependency 'pillow' to v8.3.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zodipy version less then 0.2.2 have ### Response: Having vulnarability CVE-2021-23437 Advisory: Zodipy 0.2.2 updates its dependency 'pillow' to v8.3.2 to include security fixes. | what vulnarability does zodipy version less then 0.2.2 have | |
Having vulnarability PVE-2021-41055 Advisory: Zope 2.13.1 restores security declarations for deprecated 'sets' module. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zope version less then 2.13.1 have ### Response: Having vulnarability PVE-2021-41055 Advisory: Zope 2.13.1 restores security declarations for deprecated 'sets' module. | what vulnarability does zope version less then 2.13.1 have | |
Having vulnarability CVE-2009-2265 Advisory: Zope.html 1.2 includes a fix for CVE-2009-2265: Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zope-html version less then 1.2 have ### Response: Having vulnarability CVE-2009-2265 Advisory: Zope.html 1.2 includes a fix for CVE-2009-2265: Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory. | what vulnarability does zope-html version less then 1.2 have | |
Having vulnarability PVE-2022-51028 Advisory: Zope.security 5.4 disables unsafe math optimizations in C code.
https://github.com/zopefoundation/zope.security/pull/89 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zope-security version less then 5.4 have ### Response: Having vulnarability PVE-2022-51028 Advisory: Zope.security 5.4 disables unsafe math optimizations in C code.
https://github.com/zopefoundation/zope.security/pull/89 | what vulnarability does zope-security version less then 5.4 have | |
Having vulnarability CVE-2011-2528 Advisory: Unspecified vulnerability in (1) Zope 2.12.x before 2.12.19 and 2.13.x before 2.13.8, as used in Plone 4.x and other products, and (2) PloneHotfix20110720 for Plone 3.x allows attackers to gain privileges via unspecified vectors, related to a "highly serious vulnerability." NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-0720. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zope2 version less then 2.12.19,greather then equal to 2.13,less then 2.13.8 have ### Response: Having vulnarability CVE-2011-2528 Advisory: Unspecified vulnerability in (1) Zope 2.12.x before 2.12.19 and 2.13.x before 2.13.8, as used in Plone 4.x and other products, and (2) PloneHotfix20110720 for Plone 3.x allows attackers to gain privileges via unspecified vectors, related to a "highly serious vulnerability." NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-0720. | what vulnarability does zope2 version less then 2.12.19,greather then equal to 2.13,less then 2.13.8 have | |
Having vulnarability CVE-2008-5102 Advisory: Zopeskel before <2.11 uses an insecure transitive dependency (Zope before 2.9.10). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zopeskel version less then 2.11 have ### Response: Having vulnarability CVE-2008-5102 Advisory: Zopeskel before <2.11 uses an insecure transitive dependency (Zope before 2.9.10). | what vulnarability does zopeskel version less then 2.11 have | |
Having vulnarability CVE-2022-21699 Advisory: Zotero2readwise 0.2.4 updates its dependency 'ipython' to v7.32.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zotero2readwise version less then 0.2.4 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Zotero2readwise 0.2.4 updates its dependency 'ipython' to v7.32.0 to include a security fix. | what vulnarability does zotero2readwise version less then 0.2.4 have | |
Having vulnarability PVE-2024-64396 Advisory: Zpywallet 0.4.0 changes to using 'coincurve' instead of 'ecdsa', to protect public and private keys generation against side-channel attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zpywallet version less then 0.4.0 have ### Response: Having vulnarability PVE-2024-64396 Advisory: Zpywallet 0.4.0 changes to using 'coincurve' instead of 'ecdsa', to protect public and private keys generation against side-channel attacks. | what vulnarability does zpywallet version less then 0.4.0 have | |
Having vulnarability PVE-2021-37856 Advisory: zsl 0.22.0 upgrade to newest Flask and removes vulnerable dependencies | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zsl version less then 0.22.0 have ### Response: Having vulnarability PVE-2021-37856 Advisory: zsl 0.22.0 upgrade to newest Flask and removes vulnerable dependencies | what vulnarability does zsl version less then 0.22.0 have | |
Having vulnarability CVE-2022-4899 Advisory: The python-zstd version 1.5.5.1 has upgraded its dependency Zstd from version 1.5.4 to 1.5.5. This upgrade includes a fix for a vulnerability discovered in zstd version 1.4.10. The vulnerability allows an attacker to supply an empty string as an argument to the command line tool, which could lead to a buffer overrun.
https://github.com/facebook/zstd/pull/3220/commits/e1873ad576cb478fff0e6e44ad99599cd5fd2846
https://github.com/sergey-dryabzhinsky/python-zstd/commit/4bf2a020aaa5055ff4a61fd11de3afe195b1c3d7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zstd version less then 1.5.5.1 have ### Response: Having vulnarability CVE-2022-4899 Advisory: The python-zstd version 1.5.5.1 has upgraded its dependency Zstd from version 1.5.4 to 1.5.5. This upgrade includes a fix for a vulnerability discovered in zstd version 1.4.10. The vulnerability allows an attacker to supply an empty string as an argument to the command line tool, which could lead to a buffer overrun.
https://github.com/facebook/zstd/pull/3220/commits/e1873ad576cb478fff0e6e44ad99599cd5fd2846
https://github.com/sergey-dryabzhinsky/python-zstd/commit/4bf2a020aaa5055ff4a61fd11de3afe195b1c3d7 | what vulnarability does zstd version less then 1.5.5.1 have | |
Having vulnarability PVE-2022-51836 Advisory: Zulip-botserver 0.5.0 validates tokens before accepting messages to avoid impersonation.
https://github.com/zulip/python-zulip-api/pull/408/commits/ec866400e5ab1b978f6805656c7cba13d00df6ac | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zulip-botserver version less then 0.5.0 have ### Response: Having vulnarability PVE-2022-51836 Advisory: Zulip-botserver 0.5.0 validates tokens before accepting messages to avoid impersonation.
https://github.com/zulip/python-zulip-api/pull/408/commits/ec866400e5ab1b978f6805656c7cba13d00df6ac | what vulnarability does zulip-botserver version less then 0.5.0 have | |
Having vulnarability PVE-2021-38640 Advisory: Zulip-term 0.5.2 fixes a security issue due to limited quote escaping in notifications. Additionally, it fixes a security issue when running in profiling mode (fixed filename in /tmp). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zulip-term version less then 0.5.2 have ### Response: Having vulnarability PVE-2021-38640 Advisory: Zulip-term 0.5.2 fixes a security issue due to limited quote escaping in notifications. Additionally, it fixes a security issue when running in profiling mode (fixed filename in /tmp). | what vulnarability does zulip-term version less then 0.5.2 have | |
Having vulnarability PVE-2021-26199 Advisory: zwiki before <0.37 has a cross-site scripting vulnerability in standard error messages. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does zwiki version less then 0.37 have ### Response: Having vulnarability PVE-2021-26199 Advisory: zwiki before <0.37 has a cross-site scripting vulnerability in standard error messages. | what vulnarability does zwiki version less then 0.37 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.