output stringlengths 64 2.91k | input stringclasses 1 value | text stringlengths 264 3.14k | instruction stringlengths 53 330 |
|---|---|---|---|
Having vulnarability CVE-2018-6594 Advisory: Destringcare 0.0.4 removes its dependency 'pycrypto' to fix security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does destringcare version less then 0.0.4 have ### Response: Having vulnarability CVE-2018-6594 Advisory: Destringcare 0.0.4 removes its dependency 'pycrypto' to fix security vulnerabilities. | what vulnarability does destringcare version less then 0.0.4 have | |
Having vulnarability CVE-2020-8203 Advisory: Determined 0.12.12rc0 updates its NPM dependency 'lodash' to v4.17.19 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does determined version less then 0.12.12rc0 have ### Response: Having vulnarability CVE-2020-8203 Advisory: Determined 0.12.12rc0 updates its NPM dependency 'lodash' to v4.17.19 to include a security fix. | what vulnarability does determined version less then 0.12.12rc0 have | |
Having vulnarability CVE-2017-18342 Advisory: Devpi-Ldap 2.0.0 includes a security patch for the function 'init' in 'devpi_ldap/main.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/devpi/devpi-ldap/commit/8da2b3c1ed44e8223ce006a3737dc6a8446e945d#diff-ecbfd22333fa5942c9fe7a999189222d1ca71d72a1a89d7a1f55d559671eb200 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does devpi-ldap version less then 2.0.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Devpi-Ldap 2.0.0 includes a security patch for the function 'init' in 'devpi_ldap/main.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/devpi/devpi-ldap/commit/8da2b3c1ed44e8223ce006a3737dc6a8446e945d#diff-ecbfd22333fa5942c9fe7a999189222d1ca71d72a1a89d7a1f55d559671eb200 | what vulnarability does devpi-ldap version less then 2.0.0 have | |
Having vulnarability PVE-2023-63112 Advisory: Dfetch 0.6.0 introduces security enhancements to prevent path traversal attacks for dst path. The tool now checks if the destination path is within the directory tree, ensures uniqueness of destinations, and verifies casing consistency with the system.
https://github.com/dfetch-org/dfetch/commit/02a4f2500821e980a1605effed219cc7952a37a6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dfetch version less then 0.6.0 have ### Response: Having vulnarability PVE-2023-63112 Advisory: Dfetch 0.6.0 introduces security enhancements to prevent path traversal attacks for dst path. The tool now checks if the destination path is within the directory tree, ensures uniqueness of destinations, and verifies casing consistency with the system.
https://github.com/dfetch-org/dfetch/commit/02a4f2500821e980a1605effed219cc7952a37a6 | what vulnarability does dfetch version less then 0.6.0 have | |
Having vulnarability PVE-2024-64038 Advisory: DGL 0.8.2 introduces a fix for a race condition encountered in its distributed machine learning algorithms, specifically SparseAdam and SparseAdagrad. It was causing inconsistent parameter updates during concurrent operations, impacted the accuracy and reliability of the learning models. This fix is crucial for applications using DGL for complex graph data processing, as it guarantees more accurate and dependable outcomes in training and inference phases.
https://github.com/dmlc/dgl/pull/3971/files | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dgl version less then 0.8.2 have ### Response: Having vulnarability PVE-2024-64038 Advisory: DGL 0.8.2 introduces a fix for a race condition encountered in its distributed machine learning algorithms, specifically SparseAdam and SparseAdagrad. It was causing inconsistent parameter updates during concurrent operations, impacted the accuracy and reliability of the learning models. This fix is crucial for applications using DGL for complex graph data processing, as it guarantees more accurate and dependable outcomes in training and inference phases.
https://github.com/dmlc/dgl/pull/3971/files | what vulnarability does dgl version less then 0.8.2 have | |
Having vulnarability CVE-2023-50447 Advisory: Diamondback version 5.0.1 updates its dependency to include Pillow version 10.2.0, specifically to address vulnerabilities that could potentially lead to arbitrary code execution associated with earlier versions of Pillow. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diamondback version less then 5.0.1 have ### Response: Having vulnarability CVE-2023-50447 Advisory: Diamondback version 5.0.1 updates its dependency to include Pillow version 10.2.0, specifically to address vulnerabilities that could potentially lead to arbitrary code execution associated with earlier versions of Pillow. | what vulnarability does diamondback version less then 5.0.1 have | |
Having vulnarability PVE-2022-45420 Advisory: Diango is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diango version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45420 Advisory: Diango is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does diango version greather then 0,less then 0 have | |
Having vulnarability PVE-2023-53578 Advisory: Didjvu 0.4 includes a security fix: Insecure use of /tmp when executing c44.
https://github.com/jwilk/didjvu/issues/8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does didjvu version less then 0.4 have ### Response: Having vulnarability PVE-2023-53578 Advisory: Didjvu 0.4 includes a security fix: Insecure use of /tmp when executing c44.
https://github.com/jwilk/didjvu/issues/8 | what vulnarability does didjvu version less then 0.4 have | |
Having vulnarability CVE-2024-25711 Advisory: diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffoscope version less then 256 have ### Response: Having vulnarability CVE-2024-25711 Advisory: diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted. | what vulnarability does diffoscope version less then 256 have | |
Having vulnarability PVE-2021-40539 Advisory: Diffpriv 1.0.0rc1 includes a security fix: with the 'diff' and 'enc' modules, parameters were stored in Python memory, and never removed. This commit deletes these parameters and helps prevent attackers from gaining access to these parameters, which can help them gain access to the original text and/or data. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffpriv version less then 1.0.0rc1 have ### Response: Having vulnarability PVE-2021-40539 Advisory: Diffpriv 1.0.0rc1 includes a security fix: with the 'diff' and 'enc' modules, parameters were stored in Python memory, and never removed. This commit deletes these parameters and helps prevent attackers from gaining access to these parameters, which can help them gain access to the original text and/or data. | what vulnarability does diffpriv version less then 1.0.0rc1 have | |
Having vulnarability CVE-2021-29510 Advisory: Diffsync 1.4.0 updates its dependency 'pydantic' minimum version to v1.7.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffsync version less then 1.4.0 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Diffsync 1.4.0 updates its dependency 'pydantic' minimum version to v1.7.4 to include a security fix. | what vulnarability does diffsync version less then 1.4.0 have | |
Having vulnarability CVE-2021-44556 Advisory: National Library of the Netherlands digger < 6697d1269d981e35e11f240725b16401b5ce3db5 is affected by a XML External Entity (XXE) vulnerability. Since XML parsing resolves external entities, a malicious XML stream could leak internal files and/or cause a DoS. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does digger version less then 6697d1269d981e35e11f240725b16401b5ce3db5 have ### Response: Having vulnarability CVE-2021-44556 Advisory: National Library of the Netherlands digger < 6697d1269d981e35e11f240725b16401b5ce3db5 is affected by a XML External Entity (XXE) vulnerability. Since XML parsing resolves external entities, a malicious XML stream could leak internal files and/or cause a DoS. | what vulnarability does digger version less then 6697d1269d981e35e11f240725b16401b5ce3db5 have | |
Having vulnarability PVE-2021-39653 Advisory: Digitalmarketplace-utils versions before v22.0.0 included vulnerabilities where untrusted input might result in susceptibility to a cross-site scripting (XSS) exploit.
https://github.com/Crown-Commercial-Service/digitalmarketplace-utils/pull/286 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does digitalmarketplace-utils version less then 22.0.0 have ### Response: Having vulnarability PVE-2021-39653 Advisory: Digitalmarketplace-utils versions before v22.0.0 included vulnerabilities where untrusted input might result in susceptibility to a cross-site scripting (XSS) exploit.
https://github.com/Crown-Commercial-Service/digitalmarketplace-utils/pull/286 | what vulnarability does digitalmarketplace-utils version less then 22.0.0 have | |
Having vulnarability PVE-2024-64481 Advisory: Dipdup 3.0.2 fixes a race condition caused by event emitter concurrency.
https://github.com/dipdup-io/dipdup/commit/03ea5e666fc06d447a8ad29033405a082a66e9fd | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dipdup version less then 3.0.2 have ### Response: Having vulnarability PVE-2024-64481 Advisory: Dipdup 3.0.2 fixes a race condition caused by event emitter concurrency.
https://github.com/dipdup-io/dipdup/commit/03ea5e666fc06d447a8ad29033405a082a66e9fd | what vulnarability does dipdup version less then 3.0.2 have | |
Having vulnarability PVE-2022-44691 Advisory: Dirac 8.0.0a13 fixes an arbitrary code execution vulnerability in JEncode.
https://github.com/DIRACGrid/DIRAC/pull/5810 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dirac version less then 8.0.0a13 have ### Response: Having vulnarability PVE-2022-44691 Advisory: Dirac 8.0.0a13 fixes an arbitrary code execution vulnerability in JEncode.
https://github.com/DIRACGrid/DIRAC/pull/5810 | what vulnarability does dirac version less then 8.0.0a13 have | |
Having vulnarability CVE-2019-12781 Advisory: Directory-client-core 5.1.1 updates its dependency 'Django' to v1.11.22 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-client-core version less then 5.1.1 have ### Response: Having vulnarability CVE-2019-12781 Advisory: Directory-client-core 5.1.1 updates its dependency 'Django' to v1.11.22 to include security fixes. | what vulnarability does directory-client-core version less then 5.1.1 have | |
Having vulnarability CVE-2018-3721 Advisory: Directory-components 25.0.1 updates its NPM dependency 'lodash.mergewith' to v4.6.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-components version less then 25.0.1 have ### Response: Having vulnarability CVE-2018-3721 Advisory: Directory-components 25.0.1 updates its NPM dependency 'lodash.mergewith' to v4.6.2 to include security fixes. | what vulnarability does directory-components version less then 25.0.1 have | |
Having vulnarability CVE-2021-35042 Advisory: Directory-constants 21.0.3 updates 'Django' to v3.2.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-constants version less then 21.0.3 have ### Response: Having vulnarability CVE-2021-35042 Advisory: Directory-constants 21.0.3 updates 'Django' to v3.2.5 to include a security fix. | what vulnarability does directory-constants version less then 21.0.3 have | |
Having vulnarability CVE-2018-7536 Advisory: Directory-healthcheck 1.1.2 updates its dependency 'Django' to v1.11.22 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-healthcheck version less then 1.1.2 have ### Response: Having vulnarability CVE-2018-7536 Advisory: Directory-healthcheck 1.1.2 updates its dependency 'Django' to v1.11.22 to include security fixes. | what vulnarability does directory-healthcheck version less then 1.1.2 have | |
Having vulnarability PVE-2021-40799 Advisory: Dirsearch 0.4.2 fixes a CSV Injection vulnerability. See also: <https://www.exploit-db.com/exploits/49370>. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dirsearch version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-40799 Advisory: Dirsearch 0.4.2 fixes a CSV Injection vulnerability. See also: <https://www.exploit-db.com/exploits/49370>. | what vulnarability does dirsearch version less then 0.4.2 have | |
Having vulnarability CVE-2018-18074 Advisory: Discogs-client 2.2.2 updates dependency 'requests' to v2.20.0 to resolve security vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discogs-client version less then 2.2.2 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Discogs-client 2.2.2 updates dependency 'requests' to v2.20.0 to resolve security vulnerabilities. | what vulnarability does discogs-client version less then 2.2.2 have | |
Having vulnarability PVE-2023-52937 Advisory: Discord-dev is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discord-dev version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52937 Advisory: Discord-dev is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | what vulnarability does discord-dev version greather then equal to 0 have | |
Having vulnarability PVE-2021-39641 Advisory: For some extra security, Discord-ext-slash 0.2.3 looks up commands by both their name and guild ID if their command ID fails to return any results (it returns a warning with 'SlashWarning' both times, and returns an error if still no command is found.) | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discord-ext-slash version less then 0.2.3 have ### Response: Having vulnarability PVE-2021-39641 Advisory: For some extra security, Discord-ext-slash 0.2.3 looks up commands by both their name and guild ID if their command ID fails to return any results (it returns a warning with 'SlashWarning' both times, and returns an error if still no command is found.) | what vulnarability does discord-ext-slash version less then 0.2.3 have | |
Having vulnarability PVE-2023-52936 Advisory: Discorder is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discorder version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52936 Advisory: Discorder is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls | what vulnarability does discorder version greather then equal to 0 have | |
Having vulnarability PVE-2021-38343 Advisory: Discordpie 0.5.1 includes a security patch. No details are given. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discordpie version less then 0.5.1 have ### Response: Having vulnarability PVE-2021-38343 Advisory: Discordpie 0.5.1 includes a security patch. No details are given. | what vulnarability does discordpie version less then 0.5.1 have | |
Having vulnarability PVE-2022-45459 Advisory: DiscordSafety is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.
https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discordsafety version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45459 Advisory: DiscordSafety is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.
https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html | what vulnarability does discordsafety version greather then 0,less then 0 have | |
Having vulnarability CVE-2021-28658 Advisory: Dispatch 1.3.16 updates its dependency 'Django' to v3.1.8 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dispatch version less then 1.3.16 have ### Response: Having vulnarability CVE-2021-28658 Advisory: Dispatch 1.3.16 updates its dependency 'Django' to v3.1.8 to include security fixes. | what vulnarability does dispatch version less then 1.3.16 have | |
Having vulnarability PVE-2022-45425 Advisory: Distrib is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does distrib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45425 Advisory: Distrib is a typosquatting package. It installs malware in your system that leaks your data.
https://github.com/rsc-dev/pypi_malware | what vulnarability does distrib version greather then 0,less then 0 have | |
Having vulnarability CVE-2021-42343 Advisory: Distributed 2021.10.0 includes a fix for CVE-2021-42343: Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhst. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does distributed version greather then equal to 0,less then 2021.10.0 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Distributed 2021.10.0 includes a fix for CVE-2021-42343: Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhst. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution. | what vulnarability does distributed version greather then equal to 0,less then 2021.10.0 have | |
Having vulnarability PVE-2021-41294 Advisory: Divina 0.1 adds a security group with ssh access enabled on partitioning EC2. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does divina version less then 0.1 have ### Response: Having vulnarability PVE-2021-41294 Advisory: Divina 0.1 adds a security group with ssh access enabled on partitioning EC2. | what vulnarability does divina version less then 0.1 have | |
Having vulnarability PVE-2021-41317 Advisory: Diycrate version 0.2.11.0 includes a security patch for the function 'oauth_dance' in 'diycrate/oauth_utils.py'. It contained requests calls with verify=False, disabling SSL certificate checks.
https://github.com/jheld/diycrate/commit/40e51a586f16da215a3ff8096cfa64e23b0fa5cb#diff-7772b99d74abcfaa2bf013c9a4647b2b42cec23f84a79a5d4de0ef6973720971 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diycrate version less then 0.2.11.0 have ### Response: Having vulnarability PVE-2021-41317 Advisory: Diycrate version 0.2.11.0 includes a security patch for the function 'oauth_dance' in 'diycrate/oauth_utils.py'. It contained requests calls with verify=False, disabling SSL certificate checks.
https://github.com/jheld/diycrate/commit/40e51a586f16da215a3ff8096cfa64e23b0fa5cb#diff-7772b99d74abcfaa2bf013c9a4647b2b42cec23f84a79a5d4de0ef6973720971 | what vulnarability does diycrate version less then 0.2.11.0 have | |
Having vulnarability PVE-2022-45421 Advisory: Djago is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djago version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45421 Advisory: Djago is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does djago version greather then 0,less then 0 have | |
Having vulnarability PVE-2022-45413 Advisory: Djanga is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djanga version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45413 Advisory: Djanga is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system.
https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/ | what vulnarability does djanga version greather then 0,less then 0 have | |
Having vulnarability CVE-2016-2513 Advisory: Djangae before 0.9.4 uses Django 1.7, which has known vulnerabilities. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangae version less then 0.9.4 have ### Response: Having vulnarability CVE-2016-2513 Advisory: Djangae before 0.9.4 uses Django 1.7, which has known vulnerabilities. | what vulnarability does djangae version less then 0.9.4 have | |
Having vulnarability CVE-2007-5712 Advisory: The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.
https://www.djangoproject.com/weblog/2007/oct/26/security-fix | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django version less then 0.91.1,greather then equal to 0.95a1,less then 0.95.2,greather then equal to 0.96a1,less then 0.96.1 have ### Response: Having vulnarability CVE-2007-5712 Advisory: The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.
https://www.djangoproject.com/weblog/2007/oct/26/security-fix | what vulnarability does django version less then 0.91.1,greather then equal to 0.95a1,less then 0.95.2,greather then equal to 0.96a1,less then 0.96.1 have | |
Having vulnarability PVE-2021-25736 Advisory: Django-access-tokens 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site.
https://github.com/mohawkhq/django-access-tokens/compare/0.9.1...0.9.2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-access-tokens version less then 0.9.2 have ### Response: Having vulnarability PVE-2021-25736 Advisory: Django-access-tokens 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site.
https://github.com/mohawkhq/django-access-tokens/compare/0.9.1...0.9.2 | what vulnarability does django-access-tokens version less then 0.9.2 have | |
Having vulnarability PVE-2021-34892 Advisory: Django-access-tokens-py3 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site.
https://github.com/ducminhgd/django-access-tokens-py3/compare/0.9.1...0.9.2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-access-tokens-py3 version less then 0.9.2 have ### Response: Having vulnarability PVE-2021-34892 Advisory: Django-access-tokens-py3 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site.
https://github.com/ducminhgd/django-access-tokens-py3/compare/0.9.1...0.9.2 | what vulnarability does django-access-tokens-py3 version less then 0.9.2 have | |
Having vulnarability CVE-2017-12794 Advisory: Django-addon 1.11.5.1 updates its dependency 'django' to v1.11.5 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-addon version less then 1.11.5.1 have ### Response: Having vulnarability CVE-2017-12794 Advisory: Django-addon 1.11.5.1 updates its dependency 'django' to v1.11.5 to include a security fix. | what vulnarability does django-addon version less then 1.11.5.1 have | |
Having vulnarability PVE-2021-38705 Advisory: Django-afip 7.1.1 reduces TLS security for AFIP's servers. Sadly, AFIP only has insecure endpoints, so maintainers were forced to reduce security to talk to them.
https://github.com/WhyNotHugo/django-afip/commit/51abdd1d83d81e979dcfba9eee23d9a33ae318c3 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-afip version greather then equal to 7.1.1 have ### Response: Having vulnarability PVE-2021-38705 Advisory: Django-afip 7.1.1 reduces TLS security for AFIP's servers. Sadly, AFIP only has insecure endpoints, so maintainers were forced to reduce security to talk to them.
https://github.com/WhyNotHugo/django-afip/commit/51abdd1d83d81e979dcfba9eee23d9a33ae318c3 | what vulnarability does django-afip version greather then equal to 7.1.1 have | |
Having vulnarability CVE-2020-13254 Advisory: Django-airplane 1.1.0 and prior depends on an insecure Django version (2.2.10). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-airplane version less then equal to 1.1.0 have ### Response: Having vulnarability CVE-2020-13254 Advisory: Django-airplane 1.1.0 and prior depends on an insecure Django version (2.2.10). | what vulnarability does django-airplane version less then equal to 1.1.0 have | |
Having vulnarability PVE-2021-41834 Advisory: Django-ajax-datatable version 4.1.4 adds missing CSRF token header in the first POST call (initialize_table()). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ajax-datatable version less then 4.1.4 have ### Response: Having vulnarability PVE-2021-41834 Advisory: Django-ajax-datatable version 4.1.4 adds missing CSRF token header in the first POST call (initialize_table()). | what vulnarability does django-ajax-datatable version less then 4.1.4 have | |
Having vulnarability CVE-2017-20182 Advisory: Django-ajax-utilities 1.2.9 includes a fix for CVE-2017-20182: This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument URL leads to cross-site scripting. The attack may be initiated remotely.
#NOTE: The data we include in this advisory differs from the publicly available on nvd.nist.gov. The patch commit was issued for version 1.2.9.
https://github.com/vikingco/django-ajax-utilities/pull/29/commits/329eb1dd1580ca1f9d4f95bc69939833226515c9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ajax-utilities version less then 1.2.9 have ### Response: Having vulnarability CVE-2017-20182 Advisory: Django-ajax-utilities 1.2.9 includes a fix for CVE-2017-20182: This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument URL leads to cross-site scripting. The attack may be initiated remotely.
#NOTE: The data we include in this advisory differs from the publicly available on nvd.nist.gov. The patch commit was issued for version 1.2.9.
https://github.com/vikingco/django-ajax-utilities/pull/29/commits/329eb1dd1580ca1f9d4f95bc69939833226515c9 | what vulnarability does django-ajax-utilities version less then 1.2.9 have | |
Having vulnarability PVE-2021-25737 Advisory: Django-allauth before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.
https://github.com/pennersr/django-allauth/commit/492ba9739b323cb66ef4020259c1db2d49cb6526 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allauth version less then 0.28.0 have ### Response: Having vulnarability PVE-2021-25737 Advisory: Django-allauth before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.
https://github.com/pennersr/django-allauth/commit/492ba9739b323cb66ef4020259c1db2d49cb6526 | what vulnarability does django-allauth version less then 0.28.0 have | |
Having vulnarability PVE-2021-36394 Advisory: Django-allauth-underground before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.
https://github.com/biwin/django-allauth-underground/commit/492ba9739b323cb66ef4020259c1db2d49cb6526 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allauth-underground version less then 0.28.0 have ### Response: Having vulnarability PVE-2021-36394 Advisory: Django-allauth-underground before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.
https://github.com/biwin/django-allauth-underground/commit/492ba9739b323cb66ef4020259c1db2d49cb6526 | what vulnarability does django-allauth-underground version less then 0.28.0 have | |
Having vulnarability CVE-2021-44420 Advisory: Django-allianceutils 2.1.0 uses a new URL pattern adopted by Django core to include a security fix.
https://github.com/AllianceSoftware/django-allianceutils/commit/eb4b60c463d6da860591b0335506e88b69b366af | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allianceutils version less then 2.1.0 have ### Response: Having vulnarability CVE-2021-44420 Advisory: Django-allianceutils 2.1.0 uses a new URL pattern adopted by Django core to include a security fix.
https://github.com/AllianceSoftware/django-allianceutils/commit/eb4b60c463d6da860591b0335506e88b69b366af | what vulnarability does django-allianceutils version less then 2.1.0 have | |
Having vulnarability PVE-2021-25738 Advisory: Django-anonymizer 0.4 changes 'Anonymizer.attributes' to require every field to be listed. This deals with the common security problem when a model is updated, but the Anonymizer is not updated. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-anonymizer version less then 0.4 have ### Response: Having vulnarability PVE-2021-25738 Advisory: Django-anonymizer 0.4 changes 'Anonymizer.attributes' to require every field to be listed. This deals with the common security problem when a model is updated, but the Anonymizer is not updated. | what vulnarability does django-anonymizer version less then 0.4 have | |
Having vulnarability CVE-2018-6596 Advisory: In django-anymail before 1.4 the webhook validation was vulnerable to a timing attack. An attacker could have used this to obtain the WEBHOOK_AUTHORIZATION shared secret, potentially allowing them to post fabricated or malicious email tracking events to the app. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-anymail version less then 1.4 have ### Response: Having vulnarability CVE-2018-6596 Advisory: In django-anymail before 1.4 the webhook validation was vulnerable to a timing attack. An attacker could have used this to obtain the WEBHOOK_AUTHORIZATION shared secret, potentially allowing them to post fabricated or malicious email tracking events to the app. | what vulnarability does django-anymail version less then 1.4 have | |
Having vulnarability PVE-2023-53266 Advisory: Django-appwrite 1.3.0 replaces the user ID with JSON Web Tokens (JWT) in communication with the Appwrite server. This change prevents potential risk of attempting to login by generating random IDs. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-appwrite version less then 1.3.0 have ### Response: Having vulnarability PVE-2023-53266 Advisory: Django-appwrite 1.3.0 replaces the user ID with JSON Web Tokens (JWT) in communication with the Appwrite server. This change prevents potential risk of attempting to login by generating random IDs. | what vulnarability does django-appwrite version less then 1.3.0 have | |
Having vulnarability PVE-2021-25740 Advisory: Django-autocomplete-light before 2.3.0 when updating the queryset from outside the autocomplete class may lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly.
https://github.com/yourlabs/django-autocomplete-light/pull/494 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-autocomplete-light version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-25740 Advisory: Django-autocomplete-light before 2.3.0 when updating the queryset from outside the autocomplete class may lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly.
https://github.com/yourlabs/django-autocomplete-light/pull/494 | what vulnarability does django-autocomplete-light version less then 2.3.0 have | |
Having vulnarability PVE-2021-34497 Advisory: Django-autocomplete-light-bsc 2.3.0 watches changes to 'queryset'. Before, updating the queryset from outside the autocomplete class could lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly.
https://github.com/yourlabs/django-autocomplete-light/commit/3cbc4dc92d3bc902d11e3b29a7f9ea9cc3f8dcb7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-autocomplete-light-bsc version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-34497 Advisory: Django-autocomplete-light-bsc 2.3.0 watches changes to 'queryset'. Before, updating the queryset from outside the autocomplete class could lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly.
https://github.com/yourlabs/django-autocomplete-light/commit/3cbc4dc92d3bc902d11e3b29a7f9ea9cc3f8dcb7 | what vulnarability does django-autocomplete-light-bsc version less then 2.3.0 have | |
Having vulnarability CVE-2018-16984 Advisory: Django-awl 0.23.1 updates minimum requirements for Django to v2.1.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-awl version less then 0.23.1 have ### Response: Having vulnarability CVE-2018-16984 Advisory: Django-awl 0.23.1 updates minimum requirements for Django to v2.1.2 to include a security fix. | what vulnarability does django-awl version less then 0.23.1 have | |
Having vulnarability PVE-2023-60088 Advisory: Django-axes 5.20.0 includes a fix for a Race Condition vulnerability.
https://github.com/jazzband/django-axes/commit/93341a4d04dbb1772e5f9508789f2816e08db789 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-axes version less then 5.20.0 have ### Response: Having vulnarability PVE-2023-60088 Advisory: Django-axes 5.20.0 includes a fix for a Race Condition vulnerability.
https://github.com/jazzband/django-axes/commit/93341a4d04dbb1772e5f9508789f2816e08db789 | what vulnarability does django-axes version less then 5.20.0 have | |
Having vulnarability CVE-2020-4071 Advisory: Django-basic-auth-ip-whitelist 0.3.4 fixes a potential timing attack if basic authentication is enabled. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-basic-auth-ip-whitelist version less then 0.3.4 have ### Response: Having vulnarability CVE-2020-4071 Advisory: Django-basic-auth-ip-whitelist 0.3.4 fixes a potential timing attack if basic authentication is enabled. | what vulnarability does django-basic-auth-ip-whitelist version less then 0.3.4 have | |
Having vulnarability PVE-2021-35076 Advisory: Django-basicauth before 0.4.2 is vulnerable to timing attacks.
https://github.com/hirokiky/django-basicauth/commit/94ba948c5f6b8b2543570bda4c8f73737f249971 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-basicauth version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-35076 Advisory: Django-basicauth before 0.4.2 is vulnerable to timing attacks.
https://github.com/hirokiky/django-basicauth/commit/94ba948c5f6b8b2543570bda4c8f73737f249971 | what vulnarability does django-basicauth version less then 0.4.2 have | |
Having vulnarability PVE-2023-62660 Advisory: Django-bootstrap-icons 0.8.6 includes a fix for a XXE vulnerability.
https://github.com/christianwgd/django-bootstrap-icons/commit/82c613ddc5b86c09265941198a04c17fab2aa82f
https://github.com/christianwgd/django-bootstrap-icons/commit/fe697fee238271cf2bbae0da3842235ca8fb9271#diff-876bde05b2ccdc8dfd807690f323652f60ac2f737bf19babdc00f78ea7d9c0e4R4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-bootstrap-icons version less then 0.8.6,greather then equal to 0.6.0 have ### Response: Having vulnarability PVE-2023-62660 Advisory: Django-bootstrap-icons 0.8.6 includes a fix for a XXE vulnerability.
https://github.com/christianwgd/django-bootstrap-icons/commit/82c613ddc5b86c09265941198a04c17fab2aa82f
https://github.com/christianwgd/django-bootstrap-icons/commit/fe697fee238271cf2bbae0da3842235ca8fb9271#diff-876bde05b2ccdc8dfd807690f323652f60ac2f737bf19babdc00f78ea7d9c0e4R4 | what vulnarability does django-bootstrap-icons version less then 0.8.6,greather then equal to 0.6.0 have | |
Having vulnarability CVE-2020-24583 Advisory: Django-bootstrap4 2.3.0 updates its dependency 'Django' to v3.1.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-bootstrap4 version less then 2.3.0 have ### Response: Having vulnarability CVE-2020-24583 Advisory: Django-bootstrap4 2.3.0 updates its dependency 'Django' to v3.1.2 to include security fixes. | what vulnarability does django-bootstrap4 version less then 2.3.0 have | |
Having vulnarability CVE-2017-7234 Advisory: Django-buckets 0.1.20 updates its dependency 'Django' to v1.10.7 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-buckets version less then 0.1.20 have ### Response: Having vulnarability CVE-2017-7234 Advisory: Django-buckets 0.1.20 updates its dependency 'Django' to v1.10.7 to include security fixes. | what vulnarability does django-buckets version less then 0.1.20 have | |
Having vulnarability PVE-2021-37015 Advisory: django-ca 1.10.0 stores CA private keys in the more secure PKCS8 format. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ca version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-37015 Advisory: django-ca 1.10.0 stores CA private keys in the more secure PKCS8 format. | what vulnarability does django-ca version less then 1.10.0 have | |
Having vulnarability PVE-2023-61998 Advisory: Django-cacheops 4.0.6 includes a security fix: Catastrophic backtracking in template extensions.
https://github.com/Suor/django-cacheops/commit/adba2dc9908c50157d417fd7564669c11ed23b2a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cacheops version less then 4.0.6 have ### Response: Having vulnarability PVE-2023-61998 Advisory: Django-cacheops 4.0.6 includes a security fix: Catastrophic backtracking in template extensions.
https://github.com/Suor/django-cacheops/commit/adba2dc9908c50157d417fd7564669c11ed23b2a | what vulnarability does django-cacheops version less then 4.0.6 have | |
Having vulnarability PVE-2022-51465 Advisory: Django-cas-server 0.9.0 fixes a XSS vulnerability.
https://github.com/nitmir/django-cas-server/commit/971cde093ce5af5aac9ced93c85b92c40e6e5665 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cas-server version less then 0.9.0 have ### Response: Having vulnarability PVE-2022-51465 Advisory: Django-cas-server 0.9.0 fixes a XSS vulnerability.
https://github.com/nitmir/django-cas-server/commit/971cde093ce5af5aac9ced93c85b92c40e6e5665 | what vulnarability does django-cas-server version less then 0.9.0 have | |
Having vulnarability CVE-2020-17495 Advisory: Django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. See CVE-2020-17495. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-celery-results version less then equal to 1.2.1 have ### Response: Having vulnarability CVE-2020-17495 Advisory: Django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. See CVE-2020-17495. | what vulnarability does django-celery-results version less then equal to 1.2.1 have | |
Having vulnarability PVE-2021-25741 Advisory: Django-cms 2.1.3 fixes a serious security issue in PlaceholderAdmin that allowed any active staff user to add, edit and delete any plugin. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cms version less then 2.1.3 have ### Response: Having vulnarability PVE-2021-25741 Advisory: Django-cms 2.1.3 fixes a serious security issue in PlaceholderAdmin that allowed any active staff user to add, edit and delete any plugin. | what vulnarability does django-cms version less then 2.1.3 have | |
Having vulnarability CVE-2021-44649 Advisory: Django-cms-patched 2.3.5 is vulnerable to CVE-2021-44649. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cms-patched version less then 3.0.17 have ### Response: Having vulnarability CVE-2021-44649 Advisory: Django-cms-patched 2.3.5 is vulnerable to CVE-2021-44649. | what vulnarability does django-cms-patched version less then 3.0.17 have | |
Having vulnarability CVE-2022-34265 Advisory: Django-codenerix 4.0.10 updates its 'Django' requirement to '>=4.0.6' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-codenerix version less then 4.0.10 have ### Response: Having vulnarability CVE-2022-34265 Advisory: Django-codenerix 4.0.10 updates its 'Django' requirement to '>=4.0.6' to include a security fix. | what vulnarability does django-codenerix version less then 4.0.10 have | |
Having vulnarability PVE-2021-37132 Advisory: Django-cors-headers version 3.0.0 fixes a security issue where the CORS middleware would allow requests between schemes, for example from insecure 'http://' origins to a secure 'https://' site. Now you will need to update your whitelist to include schemes, for example from this:
CORS_ORIGIN_WHITELIST = ['example.com']
to this:
CORS_ORIGIN_WHITELIST = ['https://example.com']
https://github.com/adamchainz/django-cors-headers/issues/259 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cors-headers version less then 3.0.0 have ### Response: Having vulnarability PVE-2021-37132 Advisory: Django-cors-headers version 3.0.0 fixes a security issue where the CORS middleware would allow requests between schemes, for example from insecure 'http://' origins to a secure 'https://' site. Now you will need to update your whitelist to include schemes, for example from this:
CORS_ORIGIN_WHITELIST = ['example.com']
to this:
CORS_ORIGIN_WHITELIST = ['https://example.com']
https://github.com/adamchainz/django-cors-headers/issues/259 | what vulnarability does django-cors-headers version less then 3.0.0 have | |
Having vulnarability PVE-2021-38708 Advisory: Django-councilmatic 2.5.9 patches a XSS vulnerability when using filter options.
https://github.com/datamade/django-councilmatic/issues/270
https://github.com/datamade/django-councilmatic/pull/271 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-councilmatic version less then 2.5.9 have ### Response: Having vulnarability PVE-2021-38708 Advisory: Django-councilmatic 2.5.9 patches a XSS vulnerability when using filter options.
https://github.com/datamade/django-councilmatic/issues/270
https://github.com/datamade/django-councilmatic/pull/271 | what vulnarability does django-councilmatic version less then 2.5.9 have | |
Having vulnarability PVE-2021-25747 Advisory: Django-countries 3.4 fixes a escaping issue in CountrySelectWidget that could lead to XSS.
https://github.com/SmileyChris/django-countries/commit/1ed7c6763d890d00f32242202b424709e8668d5a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-countries version less then 3.4 have ### Response: Having vulnarability PVE-2021-25747 Advisory: Django-countries 3.4 fixes a escaping issue in CountrySelectWidget that could lead to XSS.
https://github.com/SmileyChris/django-countries/commit/1ed7c6763d890d00f32242202b424709e8668d5a | what vulnarability does django-countries version less then 3.4 have | |
Having vulnarability PVE-2021-25751 Advisory: Django-crispy-forms 1.1.4 fixes a thread safety issue with 'CrispyFieldNode'. This avoids leaking information between requests in multithreaded WSGI servers. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-crispy-forms version less then 1.1.4 have ### Response: Having vulnarability PVE-2021-25751 Advisory: Django-crispy-forms 1.1.4 fixes a thread safety issue with 'CrispyFieldNode'. This avoids leaking information between requests in multithreaded WSGI servers. | what vulnarability does django-crispy-forms version less then 1.1.4 have | |
Having vulnarability CVE-2018-16552 Advisory: MicroPyramid Django-CRM 0.2 does not use CSRF token for /users/create/, /users/##/edit/, and /accounts/##/delete/ URIs. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-crm version less then equal to 0.2 have ### Response: Having vulnarability CVE-2018-16552 Advisory: MicroPyramid Django-CRM 0.2 does not use CSRF token for /users/create/, /users/##/edit/, and /accounts/##/delete/ URIs. | what vulnarability does django-crm version less then equal to 0.2 have | |
Having vulnarability PVE-2021-25753 Advisory: Django-dajaxice-ng 0.1.7 fixes the dajaxice callback model to improve security against XSS attacks.
https://github.com/ifanrx/django-dajaxice/commit/cd56cde9d9f4f0bea56e97fe86513553669ad187 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dajaxice-ng version less then 0.1.7 have ### Response: Having vulnarability PVE-2021-25753 Advisory: Django-dajaxice-ng 0.1.7 fixes the dajaxice callback model to improve security against XSS attacks.
https://github.com/ifanrx/django-dajaxice/commit/cd56cde9d9f4f0bea56e97fe86513553669ad187 | what vulnarability does django-dajaxice-ng version less then 0.1.7 have | |
Having vulnarability CVE-2021-30459 Advisory: A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form. See CVE-2021-30459. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-debug-toolbar version less then 1.11.1,greather then 2,less then 2.2.1,greather then 3,less then 3.2.1 have ### Response: Having vulnarability CVE-2021-30459 Advisory: A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form. See CVE-2021-30459. | what vulnarability does django-debug-toolbar version less then 1.11.1,greather then 2,less then 2.2.1,greather then 3,less then 3.2.1 have | |
Having vulnarability CVE-2023-36053 Advisory: Django-descope 1.3.0 updates its dependency 'django' to v4.2.3 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-descope version less then 1.3.0 have ### Response: Having vulnarability CVE-2023-36053 Advisory: Django-descope 1.3.0 updates its dependency 'django' to v4.2.3 to include a security fix. | what vulnarability does django-descope version less then 1.3.0 have | |
Having vulnarability PVE-2021-25754 Advisory: django-discord-bind 0.2.0 added state validation to prevent CSRF attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-discord-bind version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-25754 Advisory: django-discord-bind 0.2.0 added state validation to prevent CSRF attacks. | what vulnarability does django-discord-bind version less then 0.2.0 have | |
Having vulnarability PVE-2022-51366 Advisory: Django-djet2 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.
https://github.com/djungle-io/django-djet2/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-djet2 version less then 1.0.4 have ### Response: Having vulnarability PVE-2022-51366 Advisory: Django-djet2 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions.
https://github.com/djungle-io/django-djet2/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9 | what vulnarability does django-djet2 version less then 1.0.4 have | |
Having vulnarability CVE-2021-45116 Advisory: Django-dsfr 0.6.2 updates its dependency 'Django' to v3.2.12 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dsfr version less then 0.6.2 have ### Response: Having vulnarability CVE-2021-45116 Advisory: Django-dsfr 0.6.2 updates its dependency 'Django' to v3.2.12 to include security fixes. | what vulnarability does django-dsfr version less then 0.6.2 have | |
Having vulnarability PVE-2023-61314 Advisory: Django-dynamic-breadcrumbs 0.4.3 includes a fix for a potential XSS vulnerability.
https://github.com/marcanuy/django-dynamic-breadcrumbs/pull/6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dynamic-breadcrumbs version less then 0.4.3 have ### Response: Having vulnarability PVE-2023-61314 Advisory: Django-dynamic-breadcrumbs 0.4.3 includes a fix for a potential XSS vulnerability.
https://github.com/marcanuy/django-dynamic-breadcrumbs/pull/6 | what vulnarability does django-dynamic-breadcrumbs version less then 0.4.3 have | |
Having vulnarability PVE-2021-25755 Advisory: Django-embed-video 0.3 treats faked urls as invalid.
https://github.com/jazzband/django-embed-video/commit/d0d357b767e324a7cc21b5035357fdfbc7c8ce8e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-embed-video version less then 0.3 have ### Response: Having vulnarability PVE-2021-25755 Advisory: Django-embed-video 0.3 treats faked urls as invalid.
https://github.com/jazzband/django-embed-video/commit/d0d357b767e324a7cc21b5035357fdfbc7c8ce8e | what vulnarability does django-embed-video version less then 0.3 have | |
Having vulnarability PVE-2021-25756 Advisory: Django-envelope 0.4.1 fixes an information disclosure vulnerability. If django-envelope prefilled forms, all non-logged in users could see pre-filled data.
https://github.com/zsiciarz/django-envelope/pull/7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-envelope version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-25756 Advisory: Django-envelope 0.4.1 fixes an information disclosure vulnerability. If django-envelope prefilled forms, all non-logged in users could see pre-filled data.
https://github.com/zsiciarz/django-envelope/pull/7 | what vulnarability does django-envelope version less then 0.4.1 have | |
Having vulnarability PVE-2021-34269 Advisory: django-epiced before 0.3.0 does not escape HTML output by default. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-epiced version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-34269 Advisory: django-epiced before 0.3.0 does not escape HTML output by default. | what vulnarability does django-epiced version less then 0.3.0 have | |
Having vulnarability CVE-2017-6591 Advisory: There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-epiceditor version less then equal to 0.2.3 have ### Response: Having vulnarability CVE-2017-6591 Advisory: There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field. | what vulnarability does django-epiceditor version less then equal to 0.2.3 have | |
Having vulnarability PVE-2023-60231 Advisory: Django-error-report-2 0.4.2 includes a fix for a CSRF vulnerability.
https://github.com/matmair/django-error-report-2/pull/6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-error-report-2 version less then 0.4.2 have ### Response: Having vulnarability PVE-2023-60231 Advisory: Django-error-report-2 0.4.2 includes a fix for a CSRF vulnerability.
https://github.com/matmair/django-error-report-2/pull/6 | what vulnarability does django-error-report-2 version less then 0.4.2 have | |
Having vulnarability PVE-2021-25757 Advisory: Django-fernet-fields 0.3 removes DualField and HashField. The only cases where they are useful, they aren't secure.
https://github.com/orcasgit/django-fernet-fields/commit/b2c5fbf3eff53b2f19f116d626bc2496922882c2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-fernet-fields version less then 0.3 have ### Response: Having vulnarability PVE-2021-25757 Advisory: Django-fernet-fields 0.3 removes DualField and HashField. The only cases where they are useful, they aren't secure.
https://github.com/orcasgit/django-fernet-fields/commit/b2c5fbf3eff53b2f19f116d626bc2496922882c2 | what vulnarability does django-fernet-fields version less then 0.3 have | |
Having vulnarability PVE-2021-25758 Advisory: Django-fiber 0.9.9.1 changes permission check in API from IsAuthenticated to IsAdminUser.
https://github.com/django-fiber/django-fiber/commit/3c362920e5624fc457b5c74fd51d459340a74dd0 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-fiber version less then 0.9.9.1 have ### Response: Having vulnarability PVE-2021-25758 Advisory: Django-fiber 0.9.9.1 changes permission check in API from IsAuthenticated to IsAdminUser.
https://github.com/django-fiber/django-fiber/commit/3c362920e5624fc457b5c74fd51d459340a74dd0 | what vulnarability does django-fiber version less then 0.9.9.1 have | |
Having vulnarability PVE-2022-49240 Advisory: Django-file-form 3.1.1 adds cross-site request forgery protection to tus uploads using the standard Django CSRF token.
https://github.com/mbraak/django-file-form/commit/de5180dbc12daec70e24a70054ed6334656b3ea6 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-file-form version less then 3.1.1 have ### Response: Having vulnarability PVE-2022-49240 Advisory: Django-file-form 3.1.1 adds cross-site request forgery protection to tus uploads using the standard Django CSRF token.
https://github.com/mbraak/django-file-form/commit/de5180dbc12daec70e24a70054ed6334656b3ea6 | what vulnarability does django-file-form version less then 3.1.1 have | |
Having vulnarability PVE-2023-59208 Advisory: Django-filer 3.0.0rc1 includes a fix for a XSS vulnerability.
https://github.com/django-cms/django-filer/pull/1364 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-filer version less then 3.0.0rc1 have ### Response: Having vulnarability PVE-2023-59208 Advisory: Django-filer 3.0.0rc1 includes a fix for a XSS vulnerability.
https://github.com/django-cms/django-filer/pull/1364 | what vulnarability does django-filer version less then 3.0.0rc1 have | |
Having vulnarability CVE-2020-15225 Advisory: Django-filter 2.4.0 includes a fix for CVE-2020-15225: In django-filter before version 2.4.0, automatically generated 'NumberFilter' instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a 'MaxValueValidator' with a a default 'limit_value' of 1e50 to the form field used by 'NumberFilter' instances. In addition, 'NumberFilter' implements the new 'get_max_validator()' which should return a configured validator instance to customise the limit, or else 'None' to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.
https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-filter version less then 2.4.0 have ### Response: Having vulnarability CVE-2020-15225 Advisory: Django-filter 2.4.0 includes a fix for CVE-2020-15225: In django-filter before version 2.4.0, automatically generated 'NumberFilter' instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a 'MaxValueValidator' with a a default 'limit_value' of 1e50 to the form field used by 'NumberFilter' instances. In addition, 'NumberFilter' implements the new 'get_max_validator()' which should return a configured validator instance to customise the limit, or else 'None' to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.
https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973 | what vulnarability does django-filter version less then 2.4.0 have | |
Having vulnarability PVE-2021-37875 Advisory: Django-formidable 4.0.0 adds an XSS prevention mechanism.
https://github.com/peopledoc/django-formidable/pull/378/commits/e6e5392823e78bb17259b1d4ed45182e34c13dd7 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-formidable version less then 4.0.0 have ### Response: Having vulnarability PVE-2021-37875 Advisory: Django-formidable 4.0.0 adds an XSS prevention mechanism.
https://github.com/peopledoc/django-formidable/pull/378/commits/e6e5392823e78bb17259b1d4ed45182e34c13dd7 | what vulnarability does django-formidable version less then 4.0.0 have | |
Having vulnarability PVE-2021-25762 Advisory: django-friendship 1.2.0 fixes a security issue where the library was not checking the owner of a FriendRequest during accept and cancelation.
https://github.com/revsys/django-friendship/commit/b522463cb5a04240b1aeb1b7c06559fa1450ab4a | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-friendship version less then 1.2.0 have ### Response: Having vulnarability PVE-2021-25762 Advisory: django-friendship 1.2.0 fixes a security issue where the library was not checking the owner of a FriendRequest during accept and cancelation.
https://github.com/revsys/django-friendship/commit/b522463cb5a04240b1aeb1b7c06559fa1450ab4a | what vulnarability does django-friendship version less then 1.2.0 have | |
Having vulnarability PVE-2022-48522 Advisory: Django-froala-editor 4.0.11 fixes XSS vulnerability in [insert video]. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-froala-editor version less then 4.0.11 have ### Response: Having vulnarability PVE-2022-48522 Advisory: Django-froala-editor 4.0.11 fixes XSS vulnerability in [insert video]. | what vulnarability does django-froala-editor version less then 4.0.11 have | |
Having vulnarability CVE-2021-46898 Advisory: Django-grappelli 2.15.2 includes a fix for CVE-2021-46898: views/switch.py in django-grappelli before 2.15.2 attempts to prevent external redirection with startswith("/") but this does not consider a protocol-relative URL (e.g., //example.com) attack.
https://github.com/sehmaschine/django-grappelli/issues/975 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-grappelli version less then 2.15.2 have ### Response: Having vulnarability CVE-2021-46898 Advisory: Django-grappelli 2.15.2 includes a fix for CVE-2021-46898: views/switch.py in django-grappelli before 2.15.2 attempts to prevent external redirection with startswith("/") but this does not consider a protocol-relative URL (e.g., //example.com) attack.
https://github.com/sehmaschine/django-grappelli/issues/975 | what vulnarability does django-grappelli version less then 2.15.2 have | |
Having vulnarability PVE-2021-25763 Advisory: Django-guts 0.1.1 fixes a security issue that allowed anyone to read any file.
https://github.com/svetlyak40wt/django-guts/commit/2ee837eda79aaa7f957482f6cfd485863179fd8b | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-guts version less then 0.1.1 have ### Response: Having vulnarability PVE-2021-25763 Advisory: Django-guts 0.1.1 fixes a security issue that allowed anyone to read any file.
https://github.com/svetlyak40wt/django-guts/commit/2ee837eda79aaa7f957482f6cfd485863179fd8b | what vulnarability does django-guts version less then 0.1.1 have | |
Having vulnarability CVE-2018-14574 Advisory: Django-hashedfilenamestorage 2.4 updates Django dependency requirement to >=2.0.8 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hashedfilenamestorage version less then 2.4 have ### Response: Having vulnarability CVE-2018-14574 Advisory: Django-hashedfilenamestorage 2.4 updates Django dependency requirement to >=2.0.8 to include security fixes. | what vulnarability does django-hashedfilenamestorage version less then 2.4 have | |
Having vulnarability PVE-2021-38508 Advisory: Django-hashid-field 1.0.0 fixes a security issue. It has been pointed out that it's possible to discover the salt used when encoding Hashids. Thereby, it is very dangerous to use settings.SECRET_KEY, as an attacker may be able to get SECRET_KEY from HashidFields.
https://github.com/nshafer/django-hashid-field/commit/3e3017367d569c08de49f7b0c9fe1e06e9cb7114 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hashid-field version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-38508 Advisory: Django-hashid-field 1.0.0 fixes a security issue. It has been pointed out that it's possible to discover the salt used when encoding Hashids. Thereby, it is very dangerous to use settings.SECRET_KEY, as an attacker may be able to get SECRET_KEY from HashidFields.
https://github.com/nshafer/django-hashid-field/commit/3e3017367d569c08de49f7b0c9fe1e06e9cb7114 | what vulnarability does django-hashid-field version less then 1.0.0 have | |
Having vulnarability PVE-2021-25764 Advisory: Django-haystack 1.1 removes insecure use of 'eval' from the Whoosh backend.
https://github.com/django-haystack/django-haystack/commit/e0dc369cc12621df51bc8f807ff5ef728131e6ea | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-haystack version less then 1.1 have ### Response: Having vulnarability PVE-2021-25764 Advisory: Django-haystack 1.1 removes insecure use of 'eval' from the Whoosh backend.
https://github.com/django-haystack/django-haystack/commit/e0dc369cc12621df51bc8f807ff5ef728131e6ea | what vulnarability does django-haystack version less then 1.1 have | |
Having vulnarability CVE-2019-18874 Advisory: Django-heartbeat 2.0.3 updates its dependency 'psutil' to v5.7.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-heartbeat version less then 2.0.3 have ### Response: Having vulnarability CVE-2019-18874 Advisory: Django-heartbeat 2.0.3 updates its dependency 'psutil' to v5.7.0 to include a security fix. | what vulnarability does django-heartbeat version less then 2.0.3 have | |
Having vulnarability CVE-2021-3950 Advisory: Django-helpdesk 0.3.1 includes a fix for CVE-2021-3950: Django-helpdesk is vulnerable to improper neutralization of input during web page generation ('Cross-site Scripting').
https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e
https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-helpdesk version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-3950 Advisory: Django-helpdesk 0.3.1 includes a fix for CVE-2021-3950: Django-helpdesk is vulnerable to improper neutralization of input during web page generation ('Cross-site Scripting').
https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e
https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60 | what vulnarability does django-helpdesk version less then 0.3.1 have | |
Having vulnarability PVE-2021-25765 Advisory: Django-hijack before 1.0.7 fixes a HTML injection vulnerability in admin.
https://github.com/django-hijack/django-hijack/commit/4ad17c88629fed8bfad93e3c0a59ee3792c61ca4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hijack version less then 1.0.7 have ### Response: Having vulnarability PVE-2021-25765 Advisory: Django-hijack before 1.0.7 fixes a HTML injection vulnerability in admin.
https://github.com/django-hijack/django-hijack/commit/4ad17c88629fed8bfad93e3c0a59ee3792c61ca4 | what vulnarability does django-hijack version less then 1.0.7 have | |
Having vulnarability CVE-2019-12308 Advisory: Django-howl 1.0.4 updates Django to v2.2.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-howl version less then 1.0.4 have ### Response: Having vulnarability CVE-2019-12308 Advisory: Django-howl 1.0.4 updates Django to v2.2.2 to include a security fix. | what vulnarability does django-howl version less then 1.0.4 have | |
Having vulnarability PVE-2021-25766 Advisory: django-html5-appcache 0.3.0 added a security check for sensitive views. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-html5-appcache version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-25766 Advisory: django-html5-appcache 0.3.0 added a security check for sensitive views. | what vulnarability does django-html5-appcache version less then 0.3.0 have | |
Having vulnarability CVE-2020-6817 Advisory: Django-idempotency-key 1.1.0 updates the minimum version of its dependency 'bleach' to v3.1.4 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-idempotency-key version less then 1.1.0 have ### Response: Having vulnarability CVE-2020-6817 Advisory: Django-idempotency-key 1.1.0 updates the minimum version of its dependency 'bleach' to v3.1.4 to include a security fix. | what vulnarability does django-idempotency-key version less then 1.1.0 have |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.