output
stringlengths
64
2.91k
input
stringclasses
1 value
text
stringlengths
264
3.14k
instruction
stringlengths
53
330
Having vulnarability CVE-2018-6594 Advisory: Destringcare 0.0.4 removes its dependency 'pycrypto' to fix security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does destringcare version less then 0.0.4 have ### Response: Having vulnarability CVE-2018-6594 Advisory: Destringcare 0.0.4 removes its dependency 'pycrypto' to fix security vulnerabilities.
what vulnarability does destringcare version less then 0.0.4 have
Having vulnarability CVE-2020-8203 Advisory: Determined 0.12.12rc0 updates its NPM dependency 'lodash' to v4.17.19 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does determined version less then 0.12.12rc0 have ### Response: Having vulnarability CVE-2020-8203 Advisory: Determined 0.12.12rc0 updates its NPM dependency 'lodash' to v4.17.19 to include a security fix.
what vulnarability does determined version less then 0.12.12rc0 have
Having vulnarability CVE-2017-18342 Advisory: Devpi-Ldap 2.0.0 includes a security patch for the function 'init' in 'devpi_ldap/main.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/devpi/devpi-ldap/commit/8da2b3c1ed44e8223ce006a3737dc6a8446e945d#diff-ecbfd22333fa5942c9fe7a999189222d1ca71d72a1a89d7a1f55d559671eb200
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does devpi-ldap version less then 2.0.0 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Devpi-Ldap 2.0.0 includes a security patch for the function 'init' in 'devpi_ldap/main.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). https://github.com/devpi/devpi-ldap/commit/8da2b3c1ed44e8223ce006a3737dc6a8446e945d#diff-ecbfd22333fa5942c9fe7a999189222d1ca71d72a1a89d7a1f55d559671eb200
what vulnarability does devpi-ldap version less then 2.0.0 have
Having vulnarability PVE-2023-63112 Advisory: Dfetch 0.6.0 introduces security enhancements to prevent path traversal attacks for dst path. The tool now checks if the destination path is within the directory tree, ensures uniqueness of destinations, and verifies casing consistency with the system. https://github.com/dfetch-org/dfetch/commit/02a4f2500821e980a1605effed219cc7952a37a6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dfetch version less then 0.6.0 have ### Response: Having vulnarability PVE-2023-63112 Advisory: Dfetch 0.6.0 introduces security enhancements to prevent path traversal attacks for dst path. The tool now checks if the destination path is within the directory tree, ensures uniqueness of destinations, and verifies casing consistency with the system. https://github.com/dfetch-org/dfetch/commit/02a4f2500821e980a1605effed219cc7952a37a6
what vulnarability does dfetch version less then 0.6.0 have
Having vulnarability PVE-2024-64038 Advisory: DGL 0.8.2 introduces a fix for a race condition encountered in its distributed machine learning algorithms, specifically SparseAdam and SparseAdagrad. It was causing inconsistent parameter updates during concurrent operations, impacted the accuracy and reliability of the learning models. This fix is crucial for applications using DGL for complex graph data processing, as it guarantees more accurate and dependable outcomes in training and inference phases. https://github.com/dmlc/dgl/pull/3971/files
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dgl version less then 0.8.2 have ### Response: Having vulnarability PVE-2024-64038 Advisory: DGL 0.8.2 introduces a fix for a race condition encountered in its distributed machine learning algorithms, specifically SparseAdam and SparseAdagrad. It was causing inconsistent parameter updates during concurrent operations, impacted the accuracy and reliability of the learning models. This fix is crucial for applications using DGL for complex graph data processing, as it guarantees more accurate and dependable outcomes in training and inference phases. https://github.com/dmlc/dgl/pull/3971/files
what vulnarability does dgl version less then 0.8.2 have
Having vulnarability CVE-2023-50447 Advisory: Diamondback version 5.0.1 updates its dependency to include Pillow version 10.2.0, specifically to address vulnerabilities that could potentially lead to arbitrary code execution associated with earlier versions of Pillow.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diamondback version less then 5.0.1 have ### Response: Having vulnarability CVE-2023-50447 Advisory: Diamondback version 5.0.1 updates its dependency to include Pillow version 10.2.0, specifically to address vulnerabilities that could potentially lead to arbitrary code execution associated with earlier versions of Pillow.
what vulnarability does diamondback version less then 5.0.1 have
Having vulnarability PVE-2022-45420 Advisory: Diango is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diango version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45420 Advisory: Diango is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
what vulnarability does diango version greather then 0,less then 0 have
Having vulnarability PVE-2023-53578 Advisory: Didjvu 0.4 includes a security fix: Insecure use of /tmp when executing c44. https://github.com/jwilk/didjvu/issues/8
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does didjvu version less then 0.4 have ### Response: Having vulnarability PVE-2023-53578 Advisory: Didjvu 0.4 includes a security fix: Insecure use of /tmp when executing c44. https://github.com/jwilk/didjvu/issues/8
what vulnarability does didjvu version less then 0.4 have
Having vulnarability CVE-2024-25711 Advisory: diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffoscope version less then 256 have ### Response: Having vulnarability CVE-2024-25711 Advisory: diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted.
what vulnarability does diffoscope version less then 256 have
Having vulnarability PVE-2021-40539 Advisory: Diffpriv 1.0.0rc1 includes a security fix: with the 'diff' and 'enc' modules, parameters were stored in Python memory, and never removed. This commit deletes these parameters and helps prevent attackers from gaining access to these parameters, which can help them gain access to the original text and/or data.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffpriv version less then 1.0.0rc1 have ### Response: Having vulnarability PVE-2021-40539 Advisory: Diffpriv 1.0.0rc1 includes a security fix: with the 'diff' and 'enc' modules, parameters were stored in Python memory, and never removed. This commit deletes these parameters and helps prevent attackers from gaining access to these parameters, which can help them gain access to the original text and/or data.
what vulnarability does diffpriv version less then 1.0.0rc1 have
Having vulnarability CVE-2021-29510 Advisory: Diffsync 1.4.0 updates its dependency 'pydantic' minimum version to v1.7.4 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diffsync version less then 1.4.0 have ### Response: Having vulnarability CVE-2021-29510 Advisory: Diffsync 1.4.0 updates its dependency 'pydantic' minimum version to v1.7.4 to include a security fix.
what vulnarability does diffsync version less then 1.4.0 have
Having vulnarability CVE-2021-44556 Advisory: National Library of the Netherlands digger < 6697d1269d981e35e11f240725b16401b5ce3db5 is affected by a XML External Entity (XXE) vulnerability. Since XML parsing resolves external entities, a malicious XML stream could leak internal files and/or cause a DoS.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does digger version less then 6697d1269d981e35e11f240725b16401b5ce3db5 have ### Response: Having vulnarability CVE-2021-44556 Advisory: National Library of the Netherlands digger < 6697d1269d981e35e11f240725b16401b5ce3db5 is affected by a XML External Entity (XXE) vulnerability. Since XML parsing resolves external entities, a malicious XML stream could leak internal files and/or cause a DoS.
what vulnarability does digger version less then 6697d1269d981e35e11f240725b16401b5ce3db5 have
Having vulnarability PVE-2021-39653 Advisory: Digitalmarketplace-utils versions before v22.0.0 included vulnerabilities where untrusted input might result in susceptibility to a cross-site scripting (XSS) exploit. https://github.com/Crown-Commercial-Service/digitalmarketplace-utils/pull/286
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does digitalmarketplace-utils version less then 22.0.0 have ### Response: Having vulnarability PVE-2021-39653 Advisory: Digitalmarketplace-utils versions before v22.0.0 included vulnerabilities where untrusted input might result in susceptibility to a cross-site scripting (XSS) exploit. https://github.com/Crown-Commercial-Service/digitalmarketplace-utils/pull/286
what vulnarability does digitalmarketplace-utils version less then 22.0.0 have
Having vulnarability PVE-2024-64481 Advisory: Dipdup 3.0.2 fixes a race condition caused by event emitter concurrency. https://github.com/dipdup-io/dipdup/commit/03ea5e666fc06d447a8ad29033405a082a66e9fd
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dipdup version less then 3.0.2 have ### Response: Having vulnarability PVE-2024-64481 Advisory: Dipdup 3.0.2 fixes a race condition caused by event emitter concurrency. https://github.com/dipdup-io/dipdup/commit/03ea5e666fc06d447a8ad29033405a082a66e9fd
what vulnarability does dipdup version less then 3.0.2 have
Having vulnarability PVE-2022-44691 Advisory: Dirac 8.0.0a13 fixes an arbitrary code execution vulnerability in JEncode. https://github.com/DIRACGrid/DIRAC/pull/5810
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dirac version less then 8.0.0a13 have ### Response: Having vulnarability PVE-2022-44691 Advisory: Dirac 8.0.0a13 fixes an arbitrary code execution vulnerability in JEncode. https://github.com/DIRACGrid/DIRAC/pull/5810
what vulnarability does dirac version less then 8.0.0a13 have
Having vulnarability CVE-2019-12781 Advisory: Directory-client-core 5.1.1 updates its dependency 'Django' to v1.11.22 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-client-core version less then 5.1.1 have ### Response: Having vulnarability CVE-2019-12781 Advisory: Directory-client-core 5.1.1 updates its dependency 'Django' to v1.11.22 to include security fixes.
what vulnarability does directory-client-core version less then 5.1.1 have
Having vulnarability CVE-2018-3721 Advisory: Directory-components 25.0.1 updates its NPM dependency 'lodash.mergewith' to v4.6.2 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-components version less then 25.0.1 have ### Response: Having vulnarability CVE-2018-3721 Advisory: Directory-components 25.0.1 updates its NPM dependency 'lodash.mergewith' to v4.6.2 to include security fixes.
what vulnarability does directory-components version less then 25.0.1 have
Having vulnarability CVE-2021-35042 Advisory: Directory-constants 21.0.3 updates 'Django' to v3.2.5 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-constants version less then 21.0.3 have ### Response: Having vulnarability CVE-2021-35042 Advisory: Directory-constants 21.0.3 updates 'Django' to v3.2.5 to include a security fix.
what vulnarability does directory-constants version less then 21.0.3 have
Having vulnarability CVE-2018-7536 Advisory: Directory-healthcheck 1.1.2 updates its dependency 'Django' to v1.11.22 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does directory-healthcheck version less then 1.1.2 have ### Response: Having vulnarability CVE-2018-7536 Advisory: Directory-healthcheck 1.1.2 updates its dependency 'Django' to v1.11.22 to include security fixes.
what vulnarability does directory-healthcheck version less then 1.1.2 have
Having vulnarability PVE-2021-40799 Advisory: Dirsearch 0.4.2 fixes a CSV Injection vulnerability. See also: <https://www.exploit-db.com/exploits/49370>.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dirsearch version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-40799 Advisory: Dirsearch 0.4.2 fixes a CSV Injection vulnerability. See also: <https://www.exploit-db.com/exploits/49370>.
what vulnarability does dirsearch version less then 0.4.2 have
Having vulnarability CVE-2018-18074 Advisory: Discogs-client 2.2.2 updates dependency 'requests' to v2.20.0 to resolve security vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discogs-client version less then 2.2.2 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Discogs-client 2.2.2 updates dependency 'requests' to v2.20.0 to resolve security vulnerabilities.
what vulnarability does discogs-client version less then 2.2.2 have
Having vulnarability PVE-2023-52937 Advisory: Discord-dev is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discord-dev version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52937 Advisory: Discord-dev is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls
what vulnarability does discord-dev version greather then equal to 0 have
Having vulnarability PVE-2021-39641 Advisory: For some extra security, Discord-ext-slash 0.2.3 looks up commands by both their name and guild ID if their command ID fails to return any results (it returns a warning with 'SlashWarning' both times, and returns an error if still no command is found.)
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discord-ext-slash version less then 0.2.3 have ### Response: Having vulnarability PVE-2021-39641 Advisory: For some extra security, Discord-ext-slash 0.2.3 looks up commands by both their name and guild ID if their command ID fails to return any results (it returns a warning with 'SlashWarning' both times, and returns an error if still no command is found.)
what vulnarability does discord-ext-slash version less then 0.2.3 have
Having vulnarability PVE-2023-52936 Advisory: Discorder is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discorder version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-52936 Advisory: Discorder is a malicious package. It installs information-stealing and RAT (remote access trojan) Malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access. https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls
what vulnarability does discorder version greather then equal to 0 have
Having vulnarability PVE-2021-38343 Advisory: Discordpie 0.5.1 includes a security patch. No details are given.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discordpie version less then 0.5.1 have ### Response: Having vulnarability PVE-2021-38343 Advisory: Discordpie 0.5.1 includes a security patch. No details are given.
what vulnarability does discordpie version less then 0.5.1 have
Having vulnarability PVE-2022-45459 Advisory: DiscordSafety is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does discordsafety version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45459 Advisory: DiscordSafety is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks. https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html
what vulnarability does discordsafety version greather then 0,less then 0 have
Having vulnarability CVE-2021-28658 Advisory: Dispatch 1.3.16 updates its dependency 'Django' to v3.1.8 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does dispatch version less then 1.3.16 have ### Response: Having vulnarability CVE-2021-28658 Advisory: Dispatch 1.3.16 updates its dependency 'Django' to v3.1.8 to include security fixes.
what vulnarability does dispatch version less then 1.3.16 have
Having vulnarability PVE-2022-45425 Advisory: Distrib is a typosquatting package. It installs malware in your system that leaks your data. https://github.com/rsc-dev/pypi_malware
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does distrib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45425 Advisory: Distrib is a typosquatting package. It installs malware in your system that leaks your data. https://github.com/rsc-dev/pypi_malware
what vulnarability does distrib version greather then 0,less then 0 have
Having vulnarability CVE-2021-42343 Advisory: Distributed 2021.10.0 includes a fix for CVE-2021-42343: Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhst. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does distributed version greather then equal to 0,less then 2021.10.0 have ### Response: Having vulnarability CVE-2021-42343 Advisory: Distributed 2021.10.0 includes a fix for CVE-2021-42343: Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhst. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
what vulnarability does distributed version greather then equal to 0,less then 2021.10.0 have
Having vulnarability PVE-2021-41294 Advisory: Divina 0.1 adds a security group with ssh access enabled on partitioning EC2.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does divina version less then 0.1 have ### Response: Having vulnarability PVE-2021-41294 Advisory: Divina 0.1 adds a security group with ssh access enabled on partitioning EC2.
what vulnarability does divina version less then 0.1 have
Having vulnarability PVE-2021-41317 Advisory: Diycrate version 0.2.11.0 includes a security patch for the function 'oauth_dance' in 'diycrate/oauth_utils.py'. It contained requests calls with verify=False, disabling SSL certificate checks. https://github.com/jheld/diycrate/commit/40e51a586f16da215a3ff8096cfa64e23b0fa5cb#diff-7772b99d74abcfaa2bf013c9a4647b2b42cec23f84a79a5d4de0ef6973720971
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does diycrate version less then 0.2.11.0 have ### Response: Having vulnarability PVE-2021-41317 Advisory: Diycrate version 0.2.11.0 includes a security patch for the function 'oauth_dance' in 'diycrate/oauth_utils.py'. It contained requests calls with verify=False, disabling SSL certificate checks. https://github.com/jheld/diycrate/commit/40e51a586f16da215a3ff8096cfa64e23b0fa5cb#diff-7772b99d74abcfaa2bf013c9a4647b2b42cec23f84a79a5d4de0ef6973720971
what vulnarability does diycrate version less then 0.2.11.0 have
Having vulnarability PVE-2022-45421 Advisory: Djago is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djago version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45421 Advisory: Djago is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
what vulnarability does djago version greather then 0,less then 0 have
Having vulnarability PVE-2022-45413 Advisory: Djanga is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djanga version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45413 Advisory: Djanga is a typosquatting package. It shows a malicious behavior, for example, it may leak your sensitive data and/or gain unauthorized persistence in your system. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/
what vulnarability does djanga version greather then 0,less then 0 have
Having vulnarability CVE-2016-2513 Advisory: Djangae before 0.9.4 uses Django 1.7, which has known vulnerabilities.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does djangae version less then 0.9.4 have ### Response: Having vulnarability CVE-2016-2513 Advisory: Djangae before 0.9.4 uses Django 1.7, which has known vulnerabilities.
what vulnarability does djangae version less then 0.9.4 have
Having vulnarability CVE-2007-5712 Advisory: The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers. https://www.djangoproject.com/weblog/2007/oct/26/security-fix
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django version less then 0.91.1,greather then equal to 0.95a1,less then 0.95.2,greather then equal to 0.96a1,less then 0.96.1 have ### Response: Having vulnarability CVE-2007-5712 Advisory: The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers. https://www.djangoproject.com/weblog/2007/oct/26/security-fix
what vulnarability does django version less then 0.91.1,greather then equal to 0.95a1,less then 0.95.2,greather then equal to 0.96a1,less then 0.96.1 have
Having vulnarability PVE-2021-25736 Advisory: Django-access-tokens 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site. https://github.com/mohawkhq/django-access-tokens/compare/0.9.1...0.9.2
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-access-tokens version less then 0.9.2 have ### Response: Having vulnarability PVE-2021-25736 Advisory: Django-access-tokens 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site. https://github.com/mohawkhq/django-access-tokens/compare/0.9.1...0.9.2
what vulnarability does django-access-tokens version less then 0.9.2 have
Having vulnarability PVE-2021-34892 Advisory: Django-access-tokens-py3 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site. https://github.com/ducminhgd/django-access-tokens-py3/compare/0.9.1...0.9.2
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-access-tokens-py3 version less then 0.9.2 have ### Response: Having vulnarability PVE-2021-34892 Advisory: Django-access-tokens-py3 0.9.2 fixes scoping of permissions where the token provided a smaller subset of the required permissions. As an extreme case, an access token granting no permissions could be used to access any permissions on the site. https://github.com/ducminhgd/django-access-tokens-py3/compare/0.9.1...0.9.2
what vulnarability does django-access-tokens-py3 version less then 0.9.2 have
Having vulnarability CVE-2017-12794 Advisory: Django-addon 1.11.5.1 updates its dependency 'django' to v1.11.5 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-addon version less then 1.11.5.1 have ### Response: Having vulnarability CVE-2017-12794 Advisory: Django-addon 1.11.5.1 updates its dependency 'django' to v1.11.5 to include a security fix.
what vulnarability does django-addon version less then 1.11.5.1 have
Having vulnarability PVE-2021-38705 Advisory: Django-afip 7.1.1 reduces TLS security for AFIP's servers. Sadly, AFIP only has insecure endpoints, so maintainers were forced to reduce security to talk to them. https://github.com/WhyNotHugo/django-afip/commit/51abdd1d83d81e979dcfba9eee23d9a33ae318c3
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-afip version greather then equal to 7.1.1 have ### Response: Having vulnarability PVE-2021-38705 Advisory: Django-afip 7.1.1 reduces TLS security for AFIP's servers. Sadly, AFIP only has insecure endpoints, so maintainers were forced to reduce security to talk to them. https://github.com/WhyNotHugo/django-afip/commit/51abdd1d83d81e979dcfba9eee23d9a33ae318c3
what vulnarability does django-afip version greather then equal to 7.1.1 have
Having vulnarability CVE-2020-13254 Advisory: Django-airplane 1.1.0 and prior depends on an insecure Django version (2.2.10).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-airplane version less then equal to 1.1.0 have ### Response: Having vulnarability CVE-2020-13254 Advisory: Django-airplane 1.1.0 and prior depends on an insecure Django version (2.2.10).
what vulnarability does django-airplane version less then equal to 1.1.0 have
Having vulnarability PVE-2021-41834 Advisory: Django-ajax-datatable version 4.1.4 adds missing CSRF token header in the first POST call (initialize_table()).
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ajax-datatable version less then 4.1.4 have ### Response: Having vulnarability PVE-2021-41834 Advisory: Django-ajax-datatable version 4.1.4 adds missing CSRF token header in the first POST call (initialize_table()).
what vulnarability does django-ajax-datatable version less then 4.1.4 have
Having vulnarability CVE-2017-20182 Advisory: Django-ajax-utilities 1.2.9 includes a fix for CVE-2017-20182: This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument URL leads to cross-site scripting. The attack may be initiated remotely. #NOTE: The data we include in this advisory differs from the publicly available on nvd.nist.gov. The patch commit was issued for version 1.2.9. https://github.com/vikingco/django-ajax-utilities/pull/29/commits/329eb1dd1580ca1f9d4f95bc69939833226515c9
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ajax-utilities version less then 1.2.9 have ### Response: Having vulnarability CVE-2017-20182 Advisory: Django-ajax-utilities 1.2.9 includes a fix for CVE-2017-20182: This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument URL leads to cross-site scripting. The attack may be initiated remotely. #NOTE: The data we include in this advisory differs from the publicly available on nvd.nist.gov. The patch commit was issued for version 1.2.9. https://github.com/vikingco/django-ajax-utilities/pull/29/commits/329eb1dd1580ca1f9d4f95bc69939833226515c9
what vulnarability does django-ajax-utilities version less then 1.2.9 have
Having vulnarability PVE-2021-25737 Advisory: Django-allauth before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings. https://github.com/pennersr/django-allauth/commit/492ba9739b323cb66ef4020259c1db2d49cb6526
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allauth version less then 0.28.0 have ### Response: Having vulnarability PVE-2021-25737 Advisory: Django-allauth before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings. https://github.com/pennersr/django-allauth/commit/492ba9739b323cb66ef4020259c1db2d49cb6526
what vulnarability does django-allauth version less then 0.28.0 have
Having vulnarability PVE-2021-36394 Advisory: Django-allauth-underground before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings. https://github.com/biwin/django-allauth-underground/commit/492ba9739b323cb66ef4020259c1db2d49cb6526
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allauth-underground version less then 0.28.0 have ### Response: Having vulnarability PVE-2021-36394 Advisory: Django-allauth-underground before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings. https://github.com/biwin/django-allauth-underground/commit/492ba9739b323cb66ef4020259c1db2d49cb6526
what vulnarability does django-allauth-underground version less then 0.28.0 have
Having vulnarability CVE-2021-44420 Advisory: Django-allianceutils 2.1.0 uses a new URL pattern adopted by Django core to include a security fix. https://github.com/AllianceSoftware/django-allianceutils/commit/eb4b60c463d6da860591b0335506e88b69b366af
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-allianceutils version less then 2.1.0 have ### Response: Having vulnarability CVE-2021-44420 Advisory: Django-allianceutils 2.1.0 uses a new URL pattern adopted by Django core to include a security fix. https://github.com/AllianceSoftware/django-allianceutils/commit/eb4b60c463d6da860591b0335506e88b69b366af
what vulnarability does django-allianceutils version less then 2.1.0 have
Having vulnarability PVE-2021-25738 Advisory: Django-anonymizer 0.4 changes 'Anonymizer.attributes' to require every field to be listed. This deals with the common security problem when a model is updated, but the Anonymizer is not updated.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-anonymizer version less then 0.4 have ### Response: Having vulnarability PVE-2021-25738 Advisory: Django-anonymizer 0.4 changes 'Anonymizer.attributes' to require every field to be listed. This deals with the common security problem when a model is updated, but the Anonymizer is not updated.
what vulnarability does django-anonymizer version less then 0.4 have
Having vulnarability CVE-2018-6596 Advisory: In django-anymail before 1.4 the webhook validation was vulnerable to a timing attack. An attacker could have used this to obtain the WEBHOOK_AUTHORIZATION shared secret, potentially allowing them to post fabricated or malicious email tracking events to the app.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-anymail version less then 1.4 have ### Response: Having vulnarability CVE-2018-6596 Advisory: In django-anymail before 1.4 the webhook validation was vulnerable to a timing attack. An attacker could have used this to obtain the WEBHOOK_AUTHORIZATION shared secret, potentially allowing them to post fabricated or malicious email tracking events to the app.
what vulnarability does django-anymail version less then 1.4 have
Having vulnarability PVE-2023-53266 Advisory: Django-appwrite 1.3.0 replaces the user ID with JSON Web Tokens (JWT) in communication with the Appwrite server. This change prevents potential risk of attempting to login by generating random IDs.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-appwrite version less then 1.3.0 have ### Response: Having vulnarability PVE-2023-53266 Advisory: Django-appwrite 1.3.0 replaces the user ID with JSON Web Tokens (JWT) in communication with the Appwrite server. This change prevents potential risk of attempting to login by generating random IDs.
what vulnarability does django-appwrite version less then 1.3.0 have
Having vulnarability PVE-2021-25740 Advisory: Django-autocomplete-light before 2.3.0 when updating the queryset from outside the autocomplete class may lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly. https://github.com/yourlabs/django-autocomplete-light/pull/494
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-autocomplete-light version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-25740 Advisory: Django-autocomplete-light before 2.3.0 when updating the queryset from outside the autocomplete class may lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly. https://github.com/yourlabs/django-autocomplete-light/pull/494
what vulnarability does django-autocomplete-light version less then 2.3.0 have
Having vulnarability PVE-2021-34497 Advisory: Django-autocomplete-light-bsc 2.3.0 watches changes to 'queryset'. Before, updating the queryset from outside the autocomplete class could lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly. https://github.com/yourlabs/django-autocomplete-light/commit/3cbc4dc92d3bc902d11e3b29a7f9ea9cc3f8dcb7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-autocomplete-light-bsc version less then 2.3.0 have ### Response: Having vulnarability PVE-2021-34497 Advisory: Django-autocomplete-light-bsc 2.3.0 watches changes to 'queryset'. Before, updating the queryset from outside the autocomplete class could lead to a security problem, ie. if you don't replicate filters you apply manually on the autocomplete object choices into choices_for_request() then a malicious user could see choices which they shouldn't by querying the autocomplete directly. https://github.com/yourlabs/django-autocomplete-light/commit/3cbc4dc92d3bc902d11e3b29a7f9ea9cc3f8dcb7
what vulnarability does django-autocomplete-light-bsc version less then 2.3.0 have
Having vulnarability CVE-2018-16984 Advisory: Django-awl 0.23.1 updates minimum requirements for Django to v2.1.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-awl version less then 0.23.1 have ### Response: Having vulnarability CVE-2018-16984 Advisory: Django-awl 0.23.1 updates minimum requirements for Django to v2.1.2 to include a security fix.
what vulnarability does django-awl version less then 0.23.1 have
Having vulnarability PVE-2023-60088 Advisory: Django-axes 5.20.0 includes a fix for a Race Condition vulnerability. https://github.com/jazzband/django-axes/commit/93341a4d04dbb1772e5f9508789f2816e08db789
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-axes version less then 5.20.0 have ### Response: Having vulnarability PVE-2023-60088 Advisory: Django-axes 5.20.0 includes a fix for a Race Condition vulnerability. https://github.com/jazzband/django-axes/commit/93341a4d04dbb1772e5f9508789f2816e08db789
what vulnarability does django-axes version less then 5.20.0 have
Having vulnarability CVE-2020-4071 Advisory: Django-basic-auth-ip-whitelist 0.3.4 fixes a potential timing attack if basic authentication is enabled.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-basic-auth-ip-whitelist version less then 0.3.4 have ### Response: Having vulnarability CVE-2020-4071 Advisory: Django-basic-auth-ip-whitelist 0.3.4 fixes a potential timing attack if basic authentication is enabled.
what vulnarability does django-basic-auth-ip-whitelist version less then 0.3.4 have
Having vulnarability PVE-2021-35076 Advisory: Django-basicauth before 0.4.2 is vulnerable to timing attacks. https://github.com/hirokiky/django-basicauth/commit/94ba948c5f6b8b2543570bda4c8f73737f249971
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-basicauth version less then 0.4.2 have ### Response: Having vulnarability PVE-2021-35076 Advisory: Django-basicauth before 0.4.2 is vulnerable to timing attacks. https://github.com/hirokiky/django-basicauth/commit/94ba948c5f6b8b2543570bda4c8f73737f249971
what vulnarability does django-basicauth version less then 0.4.2 have
Having vulnarability PVE-2023-62660 Advisory: Django-bootstrap-icons 0.8.6 includes a fix for a XXE vulnerability. https://github.com/christianwgd/django-bootstrap-icons/commit/82c613ddc5b86c09265941198a04c17fab2aa82f https://github.com/christianwgd/django-bootstrap-icons/commit/fe697fee238271cf2bbae0da3842235ca8fb9271#diff-876bde05b2ccdc8dfd807690f323652f60ac2f737bf19babdc00f78ea7d9c0e4R4
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-bootstrap-icons version less then 0.8.6,greather then equal to 0.6.0 have ### Response: Having vulnarability PVE-2023-62660 Advisory: Django-bootstrap-icons 0.8.6 includes a fix for a XXE vulnerability. https://github.com/christianwgd/django-bootstrap-icons/commit/82c613ddc5b86c09265941198a04c17fab2aa82f https://github.com/christianwgd/django-bootstrap-icons/commit/fe697fee238271cf2bbae0da3842235ca8fb9271#diff-876bde05b2ccdc8dfd807690f323652f60ac2f737bf19babdc00f78ea7d9c0e4R4
what vulnarability does django-bootstrap-icons version less then 0.8.6,greather then equal to 0.6.0 have
Having vulnarability CVE-2020-24583 Advisory: Django-bootstrap4 2.3.0 updates its dependency 'Django' to v3.1.2 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-bootstrap4 version less then 2.3.0 have ### Response: Having vulnarability CVE-2020-24583 Advisory: Django-bootstrap4 2.3.0 updates its dependency 'Django' to v3.1.2 to include security fixes.
what vulnarability does django-bootstrap4 version less then 2.3.0 have
Having vulnarability CVE-2017-7234 Advisory: Django-buckets 0.1.20 updates its dependency 'Django' to v1.10.7 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-buckets version less then 0.1.20 have ### Response: Having vulnarability CVE-2017-7234 Advisory: Django-buckets 0.1.20 updates its dependency 'Django' to v1.10.7 to include security fixes.
what vulnarability does django-buckets version less then 0.1.20 have
Having vulnarability PVE-2021-37015 Advisory: django-ca 1.10.0 stores CA private keys in the more secure PKCS8 format.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-ca version less then 1.10.0 have ### Response: Having vulnarability PVE-2021-37015 Advisory: django-ca 1.10.0 stores CA private keys in the more secure PKCS8 format.
what vulnarability does django-ca version less then 1.10.0 have
Having vulnarability PVE-2023-61998 Advisory: Django-cacheops 4.0.6 includes a security fix: Catastrophic backtracking in template extensions. https://github.com/Suor/django-cacheops/commit/adba2dc9908c50157d417fd7564669c11ed23b2a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cacheops version less then 4.0.6 have ### Response: Having vulnarability PVE-2023-61998 Advisory: Django-cacheops 4.0.6 includes a security fix: Catastrophic backtracking in template extensions. https://github.com/Suor/django-cacheops/commit/adba2dc9908c50157d417fd7564669c11ed23b2a
what vulnarability does django-cacheops version less then 4.0.6 have
Having vulnarability PVE-2022-51465 Advisory: Django-cas-server 0.9.0 fixes a XSS vulnerability. https://github.com/nitmir/django-cas-server/commit/971cde093ce5af5aac9ced93c85b92c40e6e5665
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cas-server version less then 0.9.0 have ### Response: Having vulnarability PVE-2022-51465 Advisory: Django-cas-server 0.9.0 fixes a XSS vulnerability. https://github.com/nitmir/django-cas-server/commit/971cde093ce5af5aac9ced93c85b92c40e6e5665
what vulnarability does django-cas-server version less then 0.9.0 have
Having vulnarability CVE-2020-17495 Advisory: Django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. See CVE-2020-17495.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-celery-results version less then equal to 1.2.1 have ### Response: Having vulnarability CVE-2020-17495 Advisory: Django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. See CVE-2020-17495.
what vulnarability does django-celery-results version less then equal to 1.2.1 have
Having vulnarability PVE-2021-25741 Advisory: Django-cms 2.1.3 fixes a serious security issue in PlaceholderAdmin that allowed any active staff user to add, edit and delete any plugin.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cms version less then 2.1.3 have ### Response: Having vulnarability PVE-2021-25741 Advisory: Django-cms 2.1.3 fixes a serious security issue in PlaceholderAdmin that allowed any active staff user to add, edit and delete any plugin.
what vulnarability does django-cms version less then 2.1.3 have
Having vulnarability CVE-2021-44649 Advisory: Django-cms-patched 2.3.5 is vulnerable to CVE-2021-44649.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cms-patched version less then 3.0.17 have ### Response: Having vulnarability CVE-2021-44649 Advisory: Django-cms-patched 2.3.5 is vulnerable to CVE-2021-44649.
what vulnarability does django-cms-patched version less then 3.0.17 have
Having vulnarability CVE-2022-34265 Advisory: Django-codenerix 4.0.10 updates its 'Django' requirement to '>=4.0.6' to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-codenerix version less then 4.0.10 have ### Response: Having vulnarability CVE-2022-34265 Advisory: Django-codenerix 4.0.10 updates its 'Django' requirement to '>=4.0.6' to include a security fix.
what vulnarability does django-codenerix version less then 4.0.10 have
Having vulnarability PVE-2021-37132 Advisory: Django-cors-headers version 3.0.0 fixes a security issue where the CORS middleware would allow requests between schemes, for example from insecure 'http://' origins to a secure 'https://' site. Now you will need to update your whitelist to include schemes, for example from this: CORS_ORIGIN_WHITELIST = ['example.com'] to this: CORS_ORIGIN_WHITELIST = ['https://example.com'] https://github.com/adamchainz/django-cors-headers/issues/259
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-cors-headers version less then 3.0.0 have ### Response: Having vulnarability PVE-2021-37132 Advisory: Django-cors-headers version 3.0.0 fixes a security issue where the CORS middleware would allow requests between schemes, for example from insecure 'http://' origins to a secure 'https://' site. Now you will need to update your whitelist to include schemes, for example from this: CORS_ORIGIN_WHITELIST = ['example.com'] to this: CORS_ORIGIN_WHITELIST = ['https://example.com'] https://github.com/adamchainz/django-cors-headers/issues/259
what vulnarability does django-cors-headers version less then 3.0.0 have
Having vulnarability PVE-2021-38708 Advisory: Django-councilmatic 2.5.9 patches a XSS vulnerability when using filter options. https://github.com/datamade/django-councilmatic/issues/270 https://github.com/datamade/django-councilmatic/pull/271
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-councilmatic version less then 2.5.9 have ### Response: Having vulnarability PVE-2021-38708 Advisory: Django-councilmatic 2.5.9 patches a XSS vulnerability when using filter options. https://github.com/datamade/django-councilmatic/issues/270 https://github.com/datamade/django-councilmatic/pull/271
what vulnarability does django-councilmatic version less then 2.5.9 have
Having vulnarability PVE-2021-25747 Advisory: Django-countries 3.4 fixes a escaping issue in CountrySelectWidget that could lead to XSS. https://github.com/SmileyChris/django-countries/commit/1ed7c6763d890d00f32242202b424709e8668d5a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-countries version less then 3.4 have ### Response: Having vulnarability PVE-2021-25747 Advisory: Django-countries 3.4 fixes a escaping issue in CountrySelectWidget that could lead to XSS. https://github.com/SmileyChris/django-countries/commit/1ed7c6763d890d00f32242202b424709e8668d5a
what vulnarability does django-countries version less then 3.4 have
Having vulnarability PVE-2021-25751 Advisory: Django-crispy-forms 1.1.4 fixes a thread safety issue with 'CrispyFieldNode'. This avoids leaking information between requests in multithreaded WSGI servers.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-crispy-forms version less then 1.1.4 have ### Response: Having vulnarability PVE-2021-25751 Advisory: Django-crispy-forms 1.1.4 fixes a thread safety issue with 'CrispyFieldNode'. This avoids leaking information between requests in multithreaded WSGI servers.
what vulnarability does django-crispy-forms version less then 1.1.4 have
Having vulnarability CVE-2018-16552 Advisory: MicroPyramid Django-CRM 0.2 does not use CSRF token for /users/create/, /users/##/edit/, and /accounts/##/delete/ URIs.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-crm version less then equal to 0.2 have ### Response: Having vulnarability CVE-2018-16552 Advisory: MicroPyramid Django-CRM 0.2 does not use CSRF token for /users/create/, /users/##/edit/, and /accounts/##/delete/ URIs.
what vulnarability does django-crm version less then equal to 0.2 have
Having vulnarability PVE-2021-25753 Advisory: Django-dajaxice-ng 0.1.7 fixes the dajaxice callback model to improve security against XSS attacks. https://github.com/ifanrx/django-dajaxice/commit/cd56cde9d9f4f0bea56e97fe86513553669ad187
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dajaxice-ng version less then 0.1.7 have ### Response: Having vulnarability PVE-2021-25753 Advisory: Django-dajaxice-ng 0.1.7 fixes the dajaxice callback model to improve security against XSS attacks. https://github.com/ifanrx/django-dajaxice/commit/cd56cde9d9f4f0bea56e97fe86513553669ad187
what vulnarability does django-dajaxice-ng version less then 0.1.7 have
Having vulnarability CVE-2021-30459 Advisory: A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form. See CVE-2021-30459.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-debug-toolbar version less then 1.11.1,greather then 2,less then 2.2.1,greather then 3,less then 3.2.1 have ### Response: Having vulnarability CVE-2021-30459 Advisory: A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form. See CVE-2021-30459.
what vulnarability does django-debug-toolbar version less then 1.11.1,greather then 2,less then 2.2.1,greather then 3,less then 3.2.1 have
Having vulnarability CVE-2023-36053 Advisory: Django-descope 1.3.0 updates its dependency 'django' to v4.2.3 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-descope version less then 1.3.0 have ### Response: Having vulnarability CVE-2023-36053 Advisory: Django-descope 1.3.0 updates its dependency 'django' to v4.2.3 to include a security fix.
what vulnarability does django-descope version less then 1.3.0 have
Having vulnarability PVE-2021-25754 Advisory: django-discord-bind 0.2.0 added state validation to prevent CSRF attacks.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-discord-bind version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-25754 Advisory: django-discord-bind 0.2.0 added state validation to prevent CSRF attacks.
what vulnarability does django-discord-bind version less then 0.2.0 have
Having vulnarability PVE-2022-51366 Advisory: Django-djet2 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions. https://github.com/djungle-io/django-djet2/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-djet2 version less then 1.0.4 have ### Response: Having vulnarability PVE-2022-51366 Advisory: Django-djet2 1.0.4 fixes security issue with accessing model_lookup_view (when using RelatedFieldAjaxListFilter) without permissions. https://github.com/djungle-io/django-djet2/commit/734f3521d8290f6162847ad0b5c33d8ab5e119a9
what vulnarability does django-djet2 version less then 1.0.4 have
Having vulnarability CVE-2021-45116 Advisory: Django-dsfr 0.6.2 updates its dependency 'Django' to v3.2.12 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dsfr version less then 0.6.2 have ### Response: Having vulnarability CVE-2021-45116 Advisory: Django-dsfr 0.6.2 updates its dependency 'Django' to v3.2.12 to include security fixes.
what vulnarability does django-dsfr version less then 0.6.2 have
Having vulnarability PVE-2023-61314 Advisory: Django-dynamic-breadcrumbs 0.4.3 includes a fix for a potential XSS vulnerability. https://github.com/marcanuy/django-dynamic-breadcrumbs/pull/6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-dynamic-breadcrumbs version less then 0.4.3 have ### Response: Having vulnarability PVE-2023-61314 Advisory: Django-dynamic-breadcrumbs 0.4.3 includes a fix for a potential XSS vulnerability. https://github.com/marcanuy/django-dynamic-breadcrumbs/pull/6
what vulnarability does django-dynamic-breadcrumbs version less then 0.4.3 have
Having vulnarability PVE-2021-25755 Advisory: Django-embed-video 0.3 treats faked urls as invalid. https://github.com/jazzband/django-embed-video/commit/d0d357b767e324a7cc21b5035357fdfbc7c8ce8e
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-embed-video version less then 0.3 have ### Response: Having vulnarability PVE-2021-25755 Advisory: Django-embed-video 0.3 treats faked urls as invalid. https://github.com/jazzband/django-embed-video/commit/d0d357b767e324a7cc21b5035357fdfbc7c8ce8e
what vulnarability does django-embed-video version less then 0.3 have
Having vulnarability PVE-2021-25756 Advisory: Django-envelope 0.4.1 fixes an information disclosure vulnerability. If django-envelope prefilled forms, all non-logged in users could see pre-filled data. https://github.com/zsiciarz/django-envelope/pull/7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-envelope version less then 0.4.1 have ### Response: Having vulnarability PVE-2021-25756 Advisory: Django-envelope 0.4.1 fixes an information disclosure vulnerability. If django-envelope prefilled forms, all non-logged in users could see pre-filled data. https://github.com/zsiciarz/django-envelope/pull/7
what vulnarability does django-envelope version less then 0.4.1 have
Having vulnarability PVE-2021-34269 Advisory: django-epiced before 0.3.0 does not escape HTML output by default.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-epiced version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-34269 Advisory: django-epiced before 0.3.0 does not escape HTML output by default.
what vulnarability does django-epiced version less then 0.3.0 have
Having vulnarability CVE-2017-6591 Advisory: There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-epiceditor version less then equal to 0.2.3 have ### Response: Having vulnarability CVE-2017-6591 Advisory: There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field.
what vulnarability does django-epiceditor version less then equal to 0.2.3 have
Having vulnarability PVE-2023-60231 Advisory: Django-error-report-2 0.4.2 includes a fix for a CSRF vulnerability. https://github.com/matmair/django-error-report-2/pull/6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-error-report-2 version less then 0.4.2 have ### Response: Having vulnarability PVE-2023-60231 Advisory: Django-error-report-2 0.4.2 includes a fix for a CSRF vulnerability. https://github.com/matmair/django-error-report-2/pull/6
what vulnarability does django-error-report-2 version less then 0.4.2 have
Having vulnarability PVE-2021-25757 Advisory: Django-fernet-fields 0.3 removes DualField and HashField. The only cases where they are useful, they aren't secure. https://github.com/orcasgit/django-fernet-fields/commit/b2c5fbf3eff53b2f19f116d626bc2496922882c2
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-fernet-fields version less then 0.3 have ### Response: Having vulnarability PVE-2021-25757 Advisory: Django-fernet-fields 0.3 removes DualField and HashField. The only cases where they are useful, they aren't secure. https://github.com/orcasgit/django-fernet-fields/commit/b2c5fbf3eff53b2f19f116d626bc2496922882c2
what vulnarability does django-fernet-fields version less then 0.3 have
Having vulnarability PVE-2021-25758 Advisory: Django-fiber 0.9.9.1 changes permission check in API from IsAuthenticated to IsAdminUser. https://github.com/django-fiber/django-fiber/commit/3c362920e5624fc457b5c74fd51d459340a74dd0
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-fiber version less then 0.9.9.1 have ### Response: Having vulnarability PVE-2021-25758 Advisory: Django-fiber 0.9.9.1 changes permission check in API from IsAuthenticated to IsAdminUser. https://github.com/django-fiber/django-fiber/commit/3c362920e5624fc457b5c74fd51d459340a74dd0
what vulnarability does django-fiber version less then 0.9.9.1 have
Having vulnarability PVE-2022-49240 Advisory: Django-file-form 3.1.1 adds cross-site request forgery protection to tus uploads using the standard Django CSRF token. https://github.com/mbraak/django-file-form/commit/de5180dbc12daec70e24a70054ed6334656b3ea6
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-file-form version less then 3.1.1 have ### Response: Having vulnarability PVE-2022-49240 Advisory: Django-file-form 3.1.1 adds cross-site request forgery protection to tus uploads using the standard Django CSRF token. https://github.com/mbraak/django-file-form/commit/de5180dbc12daec70e24a70054ed6334656b3ea6
what vulnarability does django-file-form version less then 3.1.1 have
Having vulnarability PVE-2023-59208 Advisory: Django-filer 3.0.0rc1 includes a fix for a XSS vulnerability. https://github.com/django-cms/django-filer/pull/1364
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-filer version less then 3.0.0rc1 have ### Response: Having vulnarability PVE-2023-59208 Advisory: Django-filer 3.0.0rc1 includes a fix for a XSS vulnerability. https://github.com/django-cms/django-filer/pull/1364
what vulnarability does django-filer version less then 3.0.0rc1 have
Having vulnarability CVE-2020-15225 Advisory: Django-filter 2.4.0 includes a fix for CVE-2020-15225: In django-filter before version 2.4.0, automatically generated 'NumberFilter' instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a 'MaxValueValidator' with a a default 'limit_value' of 1e50 to the form field used by 'NumberFilter' instances. In addition, 'NumberFilter' implements the new 'get_max_validator()' which should return a configured validator instance to customise the limit, or else 'None' to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade. https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-filter version less then 2.4.0 have ### Response: Having vulnarability CVE-2020-15225 Advisory: Django-filter 2.4.0 includes a fix for CVE-2020-15225: In django-filter before version 2.4.0, automatically generated 'NumberFilter' instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a 'MaxValueValidator' with a a default 'limit_value' of 1e50 to the form field used by 'NumberFilter' instances. In addition, 'NumberFilter' implements the new 'get_max_validator()' which should return a configured validator instance to customise the limit, or else 'None' to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade. https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973
what vulnarability does django-filter version less then 2.4.0 have
Having vulnarability PVE-2021-37875 Advisory: Django-formidable 4.0.0 adds an XSS prevention mechanism. https://github.com/peopledoc/django-formidable/pull/378/commits/e6e5392823e78bb17259b1d4ed45182e34c13dd7
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-formidable version less then 4.0.0 have ### Response: Having vulnarability PVE-2021-37875 Advisory: Django-formidable 4.0.0 adds an XSS prevention mechanism. https://github.com/peopledoc/django-formidable/pull/378/commits/e6e5392823e78bb17259b1d4ed45182e34c13dd7
what vulnarability does django-formidable version less then 4.0.0 have
Having vulnarability PVE-2021-25762 Advisory: django-friendship 1.2.0 fixes a security issue where the library was not checking the owner of a FriendRequest during accept and cancelation. https://github.com/revsys/django-friendship/commit/b522463cb5a04240b1aeb1b7c06559fa1450ab4a
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-friendship version less then 1.2.0 have ### Response: Having vulnarability PVE-2021-25762 Advisory: django-friendship 1.2.0 fixes a security issue where the library was not checking the owner of a FriendRequest during accept and cancelation. https://github.com/revsys/django-friendship/commit/b522463cb5a04240b1aeb1b7c06559fa1450ab4a
what vulnarability does django-friendship version less then 1.2.0 have
Having vulnarability PVE-2022-48522 Advisory: Django-froala-editor 4.0.11 fixes XSS vulnerability in [insert video].
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-froala-editor version less then 4.0.11 have ### Response: Having vulnarability PVE-2022-48522 Advisory: Django-froala-editor 4.0.11 fixes XSS vulnerability in [insert video].
what vulnarability does django-froala-editor version less then 4.0.11 have
Having vulnarability CVE-2021-46898 Advisory: Django-grappelli 2.15.2 includes a fix for CVE-2021-46898: views/switch.py in django-grappelli before 2.15.2 attempts to prevent external redirection with startswith("/") but this does not consider a protocol-relative URL (e.g., //example.com) attack. https://github.com/sehmaschine/django-grappelli/issues/975
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-grappelli version less then 2.15.2 have ### Response: Having vulnarability CVE-2021-46898 Advisory: Django-grappelli 2.15.2 includes a fix for CVE-2021-46898: views/switch.py in django-grappelli before 2.15.2 attempts to prevent external redirection with startswith("/") but this does not consider a protocol-relative URL (e.g., //example.com) attack. https://github.com/sehmaschine/django-grappelli/issues/975
what vulnarability does django-grappelli version less then 2.15.2 have
Having vulnarability PVE-2021-25763 Advisory: Django-guts 0.1.1 fixes a security issue that allowed anyone to read any file. https://github.com/svetlyak40wt/django-guts/commit/2ee837eda79aaa7f957482f6cfd485863179fd8b
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-guts version less then 0.1.1 have ### Response: Having vulnarability PVE-2021-25763 Advisory: Django-guts 0.1.1 fixes a security issue that allowed anyone to read any file. https://github.com/svetlyak40wt/django-guts/commit/2ee837eda79aaa7f957482f6cfd485863179fd8b
what vulnarability does django-guts version less then 0.1.1 have
Having vulnarability CVE-2018-14574 Advisory: Django-hashedfilenamestorage 2.4 updates Django dependency requirement to >=2.0.8 to include security fixes.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hashedfilenamestorage version less then 2.4 have ### Response: Having vulnarability CVE-2018-14574 Advisory: Django-hashedfilenamestorage 2.4 updates Django dependency requirement to >=2.0.8 to include security fixes.
what vulnarability does django-hashedfilenamestorage version less then 2.4 have
Having vulnarability PVE-2021-38508 Advisory: Django-hashid-field 1.0.0 fixes a security issue. It has been pointed out that it's possible to discover the salt used when encoding Hashids. Thereby, it is very dangerous to use settings.SECRET_KEY, as an attacker may be able to get SECRET_KEY from HashidFields. https://github.com/nshafer/django-hashid-field/commit/3e3017367d569c08de49f7b0c9fe1e06e9cb7114
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hashid-field version less then 1.0.0 have ### Response: Having vulnarability PVE-2021-38508 Advisory: Django-hashid-field 1.0.0 fixes a security issue. It has been pointed out that it's possible to discover the salt used when encoding Hashids. Thereby, it is very dangerous to use settings.SECRET_KEY, as an attacker may be able to get SECRET_KEY from HashidFields. https://github.com/nshafer/django-hashid-field/commit/3e3017367d569c08de49f7b0c9fe1e06e9cb7114
what vulnarability does django-hashid-field version less then 1.0.0 have
Having vulnarability PVE-2021-25764 Advisory: Django-haystack 1.1 removes insecure use of 'eval' from the Whoosh backend. https://github.com/django-haystack/django-haystack/commit/e0dc369cc12621df51bc8f807ff5ef728131e6ea
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-haystack version less then 1.1 have ### Response: Having vulnarability PVE-2021-25764 Advisory: Django-haystack 1.1 removes insecure use of 'eval' from the Whoosh backend. https://github.com/django-haystack/django-haystack/commit/e0dc369cc12621df51bc8f807ff5ef728131e6ea
what vulnarability does django-haystack version less then 1.1 have
Having vulnarability CVE-2019-18874 Advisory: Django-heartbeat 2.0.3 updates its dependency 'psutil' to v5.7.0 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-heartbeat version less then 2.0.3 have ### Response: Having vulnarability CVE-2019-18874 Advisory: Django-heartbeat 2.0.3 updates its dependency 'psutil' to v5.7.0 to include a security fix.
what vulnarability does django-heartbeat version less then 2.0.3 have
Having vulnarability CVE-2021-3950 Advisory: Django-helpdesk 0.3.1 includes a fix for CVE-2021-3950: Django-helpdesk is vulnerable to improper neutralization of input during web page generation ('Cross-site Scripting'). https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-helpdesk version less then 0.3.1 have ### Response: Having vulnarability CVE-2021-3950 Advisory: Django-helpdesk 0.3.1 includes a fix for CVE-2021-3950: Django-helpdesk is vulnerable to improper neutralization of input during web page generation ('Cross-site Scripting'). https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60
what vulnarability does django-helpdesk version less then 0.3.1 have
Having vulnarability PVE-2021-25765 Advisory: Django-hijack before 1.0.7 fixes a HTML injection vulnerability in admin. https://github.com/django-hijack/django-hijack/commit/4ad17c88629fed8bfad93e3c0a59ee3792c61ca4
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-hijack version less then 1.0.7 have ### Response: Having vulnarability PVE-2021-25765 Advisory: Django-hijack before 1.0.7 fixes a HTML injection vulnerability in admin. https://github.com/django-hijack/django-hijack/commit/4ad17c88629fed8bfad93e3c0a59ee3792c61ca4
what vulnarability does django-hijack version less then 1.0.7 have
Having vulnarability CVE-2019-12308 Advisory: Django-howl 1.0.4 updates Django to v2.2.2 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-howl version less then 1.0.4 have ### Response: Having vulnarability CVE-2019-12308 Advisory: Django-howl 1.0.4 updates Django to v2.2.2 to include a security fix.
what vulnarability does django-howl version less then 1.0.4 have
Having vulnarability PVE-2021-25766 Advisory: django-html5-appcache 0.3.0 added a security check for sensitive views.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-html5-appcache version less then 0.3.0 have ### Response: Having vulnarability PVE-2021-25766 Advisory: django-html5-appcache 0.3.0 added a security check for sensitive views.
what vulnarability does django-html5-appcache version less then 0.3.0 have
Having vulnarability CVE-2020-6817 Advisory: Django-idempotency-key 1.1.0 updates the minimum version of its dependency 'bleach' to v3.1.4 to include a security fix.
Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does django-idempotency-key version less then 1.1.0 have ### Response: Having vulnarability CVE-2020-6817 Advisory: Django-idempotency-key 1.1.0 updates the minimum version of its dependency 'bleach' to v3.1.4 to include a security fix.
what vulnarability does django-idempotency-key version less then 1.1.0 have