output
stringlengths 64
2.91k
| input
stringclasses 1
value | text
stringlengths 264
3.14k
| instruction
stringlengths 53
330
|
---|---|---|---|
Having vulnarability PVE-2022-45461 Advisory: 10Cent10 is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.
https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 10cent10 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45461 Advisory: 10Cent10 is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.
https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html | what vulnarability does 10cent10 version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-45462 Advisory: 10Cent11 is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.
https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 10cent11 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-45462 Advisory: 10Cent11 is a malicious package, typosquatting. It steals Discord access tokens, passwords, and even stage dependency confusion attacks.
https://thehackernews.com/2021/11/11-malicious-pypi-python-libraries.html | what vulnarability does 10cent11 version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-47995 Advisory: 11Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 11cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47995 Advisory: 11Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | what vulnarability does 11cent version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-47999 Advisory: 12Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 12cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47999 Advisory: 12Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | what vulnarability does 12cent version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-48000 Advisory: 13Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 13cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-48000 Advisory: 13Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | what vulnarability does 13cent version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-48001 Advisory: 14Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 14cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-48001 Advisory: 14Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | what vulnarability does 14cent version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-47996 Advisory: 15Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 15cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47996 Advisory: 15Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | what vulnarability does 15cent version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-47997 Advisory: 16Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does 16cent version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47997 Advisory: 16Cent is a malicious package. It exfiltrates data from the host where it is installed.
https://bertusk.medium.com/malicious-pypi-packages-found-exfiltrating-data-and-opening-reverse-shells-87d4afb5d99e | what vulnarability does 16cent version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-51033 Advisory: Aa-timezones 1.12.0 updates its NPM dependency 'moment-timezone' to include security fixes.
https://github.com/ppfeufer/aa-timezones/pull/58/commits/8f382a1a3a3f9ddd77f10fb3b1d3380e6267eab1
https://github.com/moment/moment-timezone/security/advisories/GHSA-56x4-j7p9-fcf9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aa-timezones version less then 1.12.0 have ### Response: Having vulnarability PVE-2022-51033 Advisory: Aa-timezones 1.12.0 updates its NPM dependency 'moment-timezone' to include security fixes.
https://github.com/ppfeufer/aa-timezones/pull/58/commits/8f382a1a3a3f9ddd77f10fb3b1d3380e6267eab1
https://github.com/moment/moment-timezone/security/advisories/GHSA-56x4-j7p9-fcf9 | what vulnarability does aa-timezones version less then 1.12.0 have |
|
Having vulnarability PVE-2021-44525 Advisory: Aadhaar-py 2.0.1 updates its dependency 'pillow' to v9.0.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aadhaar-py version less then 2.0.1 have ### Response: Having vulnarability PVE-2021-44525 Advisory: Aadhaar-py 2.0.1 updates its dependency 'pillow' to v9.0.0 to include security fixes. | what vulnarability does aadhaar-py version less then 2.0.1 have |
|
Having vulnarability CVE-2022-33001 Advisory: The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aamiles version equal to 0.1.0 have ### Response: Having vulnarability CVE-2022-33001 Advisory: The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | what vulnarability does aamiles version equal to 0.1.0 have |
|
Having vulnarability CVE-2020-11944 Advisory: Abe (aka bitcoin-abe) through 0.7.2, and 0.8pre, allows XSS in __call__ in abe.py because the PATH_INFO environment variable is mishandled during a PageNotFound exception. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does abe version less then 0.7.2,equal to 0.8pre have ### Response: Having vulnarability CVE-2020-11944 Advisory: Abe (aka bitcoin-abe) through 0.7.2, and 0.8pre, allows XSS in __call__ in abe.py because the PATH_INFO environment variable is mishandled during a PageNotFound exception. | what vulnarability does abe version less then 0.7.2,equal to 0.8pre have |
|
Having vulnarability CVE-2017-18342 Advisory: Abiflows 0.6 includes a security patch for the function 'test_abipy_manager_from_file' in 'abiflows/fireworks/utils/tests/test_fw_utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/abinit/abiflows/commit/479b957c3b1abe41d85aaff2d14439605ddc5d0b#diff-5a814c49249ffdc2d551933c1bec95c4b2fe64d0619470085c5fef247fea2309 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does abiflows version less then 0.6 have ### Response: Having vulnarability CVE-2017-18342 Advisory: Abiflows 0.6 includes a security patch for the function 'test_abipy_manager_from_file' in 'abiflows/fireworks/utils/tests/test_fw_utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/abinit/abiflows/commit/479b957c3b1abe41d85aaff2d14439605ddc5d0b#diff-5a814c49249ffdc2d551933c1bec95c4b2fe64d0619470085c5fef247fea2309 | what vulnarability does abiflows version less then 0.6 have |
|
Having vulnarability PVE-2023-62205 Advisory: Abilian-devtools 0.4.4 includes a fix for a command injection vulnerability.
https://github.com/abilian/abilian-devtools/commit/9d71b0d3b6b467589d58aacc932ca3dc7e524ce2 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does abilian-devtools version less then 0.4.4 have ### Response: Having vulnarability PVE-2023-62205 Advisory: Abilian-devtools 0.4.4 includes a fix for a command injection vulnerability.
https://github.com/abilian/abilian-devtools/commit/9d71b0d3b6b467589d58aacc932ca3dc7e524ce2 | what vulnarability does abilian-devtools version less then 0.4.4 have |
|
Having vulnarability CVE-2020-26215 Advisory: Abracadabra 0.0.4 updates its dependency 'notebook' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does abracadabra version less then 0.0.4 have ### Response: Having vulnarability CVE-2020-26215 Advisory: Abracadabra 0.0.4 updates its dependency 'notebook' to include a security fix. | what vulnarability does abracadabra version less then 0.0.4 have |
|
Having vulnarability CVE-2023-41050 Advisory: AccessControl 4.4, 5.8 and 6.2 include a fix for CVE-2023-41050: Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown 'getattr' and 'getitem', not the policy restricted 'AccessControl' variants '_getattr_' and '_getitem_'. This can lead to critical information disclosure. 'AccessControl' already provides a safe variant for 'str.format' and denies access to 'string.Formatter'. However, 'str.format_map' is still unsafe. Affected are all users who allow untrusted users to create 'AccessControl' controlled Python code and execute it. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does accesscontrol version less then 4.4,greather then equal to 5.0,less then 5.8,greather then equal to 6.0,less then 6.2 have ### Response: Having vulnarability CVE-2023-41050 Advisory: AccessControl 4.4, 5.8 and 6.2 include a fix for CVE-2023-41050: Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown 'getattr' and 'getitem', not the policy restricted 'AccessControl' variants '_getattr_' and '_getitem_'. This can lead to critical information disclosure. 'AccessControl' already provides a safe variant for 'str.format' and denies access to 'string.Formatter'. However, 'str.format_map' is still unsafe. Affected are all users who allow untrusted users to create 'AccessControl' controlled Python code and execute it. | what vulnarability does accesscontrol version less then 4.4,greather then equal to 5.0,less then 5.8,greather then equal to 6.0,less then 6.2 have |
|
Having vulnarability PVE-2021-34978 Advisory: acqusition is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does acqusition version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2021-34978 Advisory: acqusition is a package affected by pytosquatting: http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ | what vulnarability does acqusition version greather then 0,less then 0 have |
|
Having vulnarability CVE-2023-25562 Advisory: In DataHub versions prior to 0.8.45, session cookies are only cleared upon new sign-ins, not during logouts. This allows potential attackers to bypass authentication checks using the AuthUtils.hasValidSessionCookie() method by using a cookie from a logged-out session. Consequently, any logged-out session cookie might be considered valid, leading to an authentication bypass. Users are advised to upgrade to version 0.8.45 to rectify this vulnerability. Currently, there are no known workarounds. This vulnerability was identified and reported by the GitHub Security lab and is being tracked under GHSL-2022-083.
https://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj
https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/datahub-frontend/app/auth/AuthUtils.java#L78 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does acryl-datahub version less then 0.8.45 have ### Response: Having vulnarability CVE-2023-25562 Advisory: In DataHub versions prior to 0.8.45, session cookies are only cleared upon new sign-ins, not during logouts. This allows potential attackers to bypass authentication checks using the AuthUtils.hasValidSessionCookie() method by using a cookie from a logged-out session. Consequently, any logged-out session cookie might be considered valid, leading to an authentication bypass. Users are advised to upgrade to version 0.8.45 to rectify this vulnerability. Currently, there are no known workarounds. This vulnerability was identified and reported by the GitHub Security lab and is being tracked under GHSL-2022-083.
https://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj
https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/datahub-frontend/app/auth/AuthUtils.java#L78 | what vulnarability does acryl-datahub version less then 0.8.45 have |
|
Having vulnarability PVE-2022-50460 Advisory: Actinia-core 2.0.0 fixes an unsafe temporary files creation vulnerability.
https://github.com/mundialis/actinia_core/pull/262
https://github.com/mundialis/actinia_core/pull/256 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does actinia-core version less then 2.0.0 have ### Response: Having vulnarability PVE-2022-50460 Advisory: Actinia-core 2.0.0 fixes an unsafe temporary files creation vulnerability.
https://github.com/mundialis/actinia_core/pull/262
https://github.com/mundialis/actinia_core/pull/256 | what vulnarability does actinia-core version less then 2.0.0 have |
|
Having vulnarability PVE-2022-48499 Advisory: Actinis-django-storages 1.7 fixes an insecure default ACL of 'public-read' in the 'S3BotoStorage' and 'S3Boto3Storage' backends. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does actinis-django-storages version less then 1.7 have ### Response: Having vulnarability PVE-2022-48499 Advisory: Actinis-django-storages 1.7 fixes an insecure default ACL of 'public-read' in the 'S3BotoStorage' and 'S3Boto3Storage' backends. | what vulnarability does actinis-django-storages version less then 1.7 have |
|
Having vulnarability CVE-2021-34141 Advisory: Actipy 1.1.0 updates its dependency 'numpy' requirement to '>=1.22' to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does actipy version less then 1.1.0 have ### Response: Having vulnarability CVE-2021-34141 Advisory: Actipy 1.1.0 updates its dependency 'numpy' requirement to '>=1.22' to include security fixes. | what vulnarability does actipy version less then 1.1.0 have |
|
Having vulnarability PVE-2023-62779 Advisory: Adios2 2.9.0 fixes a race condition in OnDemand timestep and in OnDemand delivery.
https://github.com/ornladios/ADIOS2/pull/3355/commits/9d55dad75ac09b1a6bfb3a94a054b023ced43fb9
https://github.com/ornladios/ADIOS2/pull/3369/commits/fd8b02a72d91ac31d9beb4e68fa77a353b657bb5 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does adios2 version less then 2.9.0 have ### Response: Having vulnarability PVE-2023-62779 Advisory: Adios2 2.9.0 fixes a race condition in OnDemand timestep and in OnDemand delivery.
https://github.com/ornladios/ADIOS2/pull/3355/commits/9d55dad75ac09b1a6bfb3a94a054b023ced43fb9
https://github.com/ornladios/ADIOS2/pull/3369/commits/fd8b02a72d91ac31d9beb4e68fa77a353b657bb5 | what vulnarability does adios2 version less then 2.9.0 have |
|
Having vulnarability CVE-2022-38072 Advisory: Admesh 0.98.5 fixes an improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does admesh version less then 0.98.5 have ### Response: Having vulnarability CVE-2022-38072 Advisory: Admesh 0.98.5 fixes an improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f | what vulnarability does admesh version less then 0.98.5 have |
|
Having vulnarability CVE-2021-28675 Advisory: Adversarial-robustness-toolbox version 1.6.1 updates its dependency "Pillow" to a secure version. See CVE-2021-28675. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does adversarial-robustness-toolbox version less then 1.6.1 have ### Response: Having vulnarability CVE-2021-28675 Advisory: Adversarial-robustness-toolbox version 1.6.1 updates its dependency "Pillow" to a secure version. See CVE-2021-28675. | what vulnarability does adversarial-robustness-toolbox version less then 1.6.1 have |
|
Having vulnarability PVE-2024-66853 Advisory: Adyen version 7.1.0 addresses a security vulnerability related to a timing attack in HMAC comparisons.
https://github.com/Adyen/adyen-python-api-library/pull/170/commits/092f2062eafff2d92adc4d9f73c684510fe090d1 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does adyen version less then 7.1.0 have ### Response: Having vulnarability PVE-2024-66853 Advisory: Adyen version 7.1.0 addresses a security vulnerability related to a timing attack in HMAC comparisons.
https://github.com/Adyen/adyen-python-api-library/pull/170/commits/092f2062eafff2d92adc4d9f73c684510fe090d1 | what vulnarability does adyen version less then 7.1.0 have |
|
Having vulnarability CVE-2018-1000805 Advisory: Aegea 2.2.7 updates the minimum requirement for its dependency 'paramiko' to v2.4.2 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aegea version less then 2.2.7 have ### Response: Having vulnarability CVE-2018-1000805 Advisory: Aegea 2.2.7 updates the minimum requirement for its dependency 'paramiko' to v2.4.2 to include a security fix. | what vulnarability does aegea version less then 2.2.7 have |
|
Having vulnarability PVE-2021-37721 Advisory: Aethos 0.3.0.1 hotfixed NLTK package in setup.py. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aethos version less then 0.3.0.1 have ### Response: Having vulnarability PVE-2021-37721 Advisory: Aethos 0.3.0.1 hotfixed NLTK package in setup.py. | what vulnarability does aethos version less then 0.3.0.1 have |
|
Having vulnarability PVE-2023-54923 Advisory: Afdko 3.0.0 includes a fix for a code execution vulnerability.
https://github.com/adobe-type-tools/afdko/issues/780 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does afdko version less then 3.0.0 have ### Response: Having vulnarability PVE-2023-54923 Advisory: Afdko 3.0.0 includes a fix for a code execution vulnerability.
https://github.com/adobe-type-tools/afdko/issues/780 | what vulnarability does afdko version less then 3.0.0 have |
|
Having vulnarability PVE-2023-58993 Advisory: Agixt 1.2.4 includes a fix for a path traversal vulnerability.
https://github.com/Josh-XT/AGiXT/pull/673 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does agixt version less then 1.2.4 have ### Response: Having vulnarability PVE-2023-58993 Advisory: Agixt 1.2.4 includes a fix for a path traversal vulnerability.
https://github.com/Josh-XT/AGiXT/pull/673 | what vulnarability does agixt version less then 1.2.4 have |
|
Having vulnarability CVE-2018-18074 Advisory: Agraph-python 101.0.1 updates requests from 2.18.4 to 2.20.0 for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does agraph-python version less then 101.0.1 have ### Response: Having vulnarability CVE-2018-18074 Advisory: Agraph-python 101.0.1 updates requests from 2.18.4 to 2.20.0 for security reasons. | what vulnarability does agraph-python version less then 101.0.1 have |
|
Having vulnarability CVE-2014-3702 Advisory: Directory traversal vulnerability in eNovance eDeploy allows remote attackers to create arbitrary directories and files and consequently cause a denial of service (resource consumption) via a (dot dot) the session parameter. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ahc-tools version less then 1.6.0 have ### Response: Having vulnarability CVE-2014-3702 Advisory: Directory traversal vulnerability in eNovance eDeploy allows remote attackers to create arbitrary directories and files and consequently cause a denial of service (resource consumption) via a (dot dot) the session parameter. | what vulnarability does ahc-tools version less then 1.6.0 have |
|
Having vulnarability CVE-2022-40897 Advisory: Ahjo 3.1.1 updates its dependency 'setuptools' to v65.5.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ahjo version less then 3.1.1 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Ahjo 3.1.1 updates its dependency 'setuptools' to v65.5.1 to include a security fix. | what vulnarability does ahjo version less then 3.1.1 have |
|
Having vulnarability CVE-2024-0960 Advisory: A vulnerability was found in flink-extended ai-flow 0.3.1. It has been declared as critical. Affected by this vulnerability is the function cloudpickle.loads of the file \ai_flow\cli\commands\workflow_command.py. The manipulation leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252205 was assigned to this vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ai-flow version less then equal to 0.3.1 have ### Response: Having vulnarability CVE-2024-0960 Advisory: A vulnerability was found in flink-extended ai-flow 0.3.1. It has been declared as critical. Affected by this vulnerability is the function cloudpickle.loads of the file \ai_flow\cli\commands\workflow_command.py. The manipulation leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252205 was assigned to this vulnerability. | what vulnarability does ai-flow version less then equal to 0.3.1 have |
|
Having vulnarability CVE-2021-41213 Advisory: Ai-python 0.8.1 updates its dependency 'tensorflow' to v2.6.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ai-python version less then 0.8.1 have ### Response: Having vulnarability CVE-2021-41213 Advisory: Ai-python 0.8.1 updates its dependency 'tensorflow' to v2.6.1 to include security fixes. | what vulnarability does ai-python version less then 0.8.1 have |
|
Having vulnarability PVE-2021-37054 Advisory: Aiida 0.12.3 fixes a security vulnerability by upgrading `paramiko` to `2.4.2`. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiida version less then 0.12.3 have ### Response: Having vulnarability PVE-2021-37054 Advisory: Aiida 0.12.3 fixes a security vulnerability by upgrading `paramiko` to `2.4.2`. | what vulnarability does aiida version less then 0.12.3 have |
|
Having vulnarability PVE-2021-36956 Advisory: aiida-core 0.12.3 fixes security vulnerability by upgrading `paramiko` to `2.4.2` | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiida-core version less then 0.12.3 have ### Response: Having vulnarability PVE-2021-36956 Advisory: aiida-core 0.12.3 fixes security vulnerability by upgrading `paramiko` to `2.4.2` | what vulnarability does aiida-core version less then 0.12.3 have |
|
Having vulnarability CVE-2020-8545 Advisory: Global.py in AIL framework 2.8 allows path traversal. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ail version less then 2.9 have ### Response: Having vulnarability CVE-2020-8545 Advisory: Global.py in AIL framework 2.8 allows path traversal. | what vulnarability does ail version less then 2.9 have |
|
Having vulnarability CVE-2020-5311 Advisory: Aim 1.2.13 updates its dependency 'pillow' to v6.2.2 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aim version less then 1.2.13 have ### Response: Having vulnarability CVE-2020-5311 Advisory: Aim 1.2.13 updates its dependency 'pillow' to v6.2.2 to include security fixes. | what vulnarability does aim version less then 1.2.13 have |
|
Having vulnarability PVE-2023-59901 Advisory: Aio-pika 9.1.5 includes a fix for a Race Condition vulnerability.
https://github.com/mosquito/aio-pika/pull/566 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aio-pika version less then 9.1.5 have ### Response: Having vulnarability PVE-2023-59901 Advisory: Aio-pika 9.1.5 includes a fix for a Race Condition vulnerability.
https://github.com/mosquito/aio-pika/pull/566 | what vulnarability does aio-pika version less then 9.1.5 have |
|
Having vulnarability PVE-2021-38620 Advisory: Certificate hostname validation in aioapns version 1.10 is enabled by default for security reasons. It can be turned off by using no_cert_validation option. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aioapns version less then 1.10 have ### Response: Having vulnarability PVE-2021-38620 Advisory: Certificate hostname validation in aioapns version 1.10 is enabled by default for security reasons. It can be turned off by using no_cert_validation option. | what vulnarability does aioapns version less then 1.10 have |
|
Having vulnarability CVE-2022-33124 Advisory: AIOHTTP 3.8.1 can report a "ValueError: Invalid IPv6 URL" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application.
Alias: GHSA-rwqr-c348-m5wr | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiob version equal to 0.0.1 have ### Response: Having vulnarability CVE-2022-33124 Advisory: AIOHTTP 3.8.1 can report a "ValueError: Invalid IPv6 URL" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application.
Alias: GHSA-rwqr-c348-m5wr | what vulnarability does aiob version equal to 0.0.1 have |
|
Having vulnarability PVE-2024-64278 Advisory: Aiobotocore 2.9.1 fixes a race condition that was affecting the S3 Express identity cache. This race condition could occur when multiple threads attempted to read from or write to the cache simultaneously, leading to unpredictable behavior. The fix involves implementing synchronization mechanisms, specifically an asyncio lock, to ensure that only one thread can access the cache at a time.
https://github.com/aio-libs/aiobotocore/pull/1073/commits/9097884cd8246460794157125ccd6378c3e901f8 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiobotocore version less then 2.9.1 have ### Response: Having vulnarability PVE-2024-64278 Advisory: Aiobotocore 2.9.1 fixes a race condition that was affecting the S3 Express identity cache. This race condition could occur when multiple threads attempted to read from or write to the cache simultaneously, leading to unpredictable behavior. The fix involves implementing synchronization mechanisms, specifically an asyncio lock, to ensure that only one thread can access the cache at a time.
https://github.com/aio-libs/aiobotocore/pull/1073/commits/9097884cd8246460794157125ccd6378c3e901f8 | what vulnarability does aiobotocore version less then 2.9.1 have |
|
Having vulnarability PVE-2021-37469 Advisory: The proxy in aiocoap 0.4a1 only creates log files when explicitly requested (18ddf8c). Also, support for secured protocols has been added. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiocoap version less then 0.4a1 have ### Response: Having vulnarability PVE-2021-37469 Advisory: The proxy in aiocoap 0.4a1 only creates log files when explicitly requested (18ddf8c). Also, support for secured protocols has been added. | what vulnarability does aiocoap version less then 0.4a1 have |
|
Having vulnarability PVE-2021-25612 Advisory: aiocouchdb 0.6.0 now correctly set members for database security. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiocouchdb version less then 0.6.0 have ### Response: Having vulnarability PVE-2021-25612 Advisory: aiocouchdb 0.6.0 now correctly set members for database security. | what vulnarability does aiocouchdb version less then 0.6.0 have |
|
Having vulnarability CVE-2021-41945 Advisory: Aiocurrencylayer version 1.0.4 updates its httpx dependency to version 0.23 or newer in response to CVE-2021-41945.
https://github.com/home-assistant-ecosystem/aiocurrencylayer/commit/5768c17400f7d6222290f671ba3c8ba7b4c223ce | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiocurrencylayer version less then 1.0.4 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Aiocurrencylayer version 1.0.4 updates its httpx dependency to version 0.23 or newer in response to CVE-2021-41945.
https://github.com/home-assistant-ecosystem/aiocurrencylayer/commit/5768c17400f7d6222290f671ba3c8ba7b4c223ce | what vulnarability does aiocurrencylayer version less then 1.0.4 have |
|
Having vulnarability PVE-2021-38045 Advisory: The server of aioftp 0.15.0 uses explicit mapping of available commands for security reasons. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aioftp version less then 0.15.0 have ### Response: Having vulnarability PVE-2021-38045 Advisory: The server of aioftp 0.15.0 uses explicit mapping of available commands for security reasons. | what vulnarability does aioftp version less then 0.15.0 have |
|
Having vulnarability PVE-2021-25613 Advisory: Aiohttp 0.16.3 fixes a directory traversal vulnerability by making changes in StaticRoute class of web_urldispatcher.py.
https://github.com/aio-libs/aiohttp/pull/383 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp version less then 0.16.3 have ### Response: Having vulnarability PVE-2021-25613 Advisory: Aiohttp 0.16.3 fixes a directory traversal vulnerability by making changes in StaticRoute class of web_urldispatcher.py.
https://github.com/aio-libs/aiohttp/pull/383 | what vulnarability does aiohttp version less then 0.16.3 have |
|
Having vulnarability PVE-2021-32971 Advisory: Aiohttp-auth-autz before 0.2.0 isn't correctly checking the user_id in acl middleware, leading to a possible permission escalation.
https://github.com/ilex/aiohttp_auth_autz/commit/b8bb3178786daebc828298dc0d1988b191890495 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-auth-autz version less then 0.2.0 have ### Response: Having vulnarability PVE-2021-32971 Advisory: Aiohttp-auth-autz before 0.2.0 isn't correctly checking the user_id in acl middleware, leading to a possible permission escalation.
https://github.com/ilex/aiohttp_auth_autz/commit/b8bb3178786daebc828298dc0d1988b191890495 | what vulnarability does aiohttp-auth-autz version less then 0.2.0 have |
|
Having vulnarability CVE-2014-1402 Advisory: Aiohttp-jinja2 1.1.1 updates minimal supported 'Jinja2' version to 2.10.1 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-jinja2 version less then 1.1.1 have ### Response: Having vulnarability CVE-2014-1402 Advisory: Aiohttp-jinja2 1.1.1 updates minimal supported 'Jinja2' version to 2.10.1 to include security fixes. | what vulnarability does aiohttp-jinja2 version less then 1.1.1 have |
|
Having vulnarability PVE-2022-47805 Advisory: Aiohttp-proxies is a malicious package. It contains a backdoor.
https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-proxies version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47805 Advisory: Aiohttp-proxies is a malicious package. It contains a backdoor.
https://blog.sonatype.com/can-you-spot-this-cryptic-reverse-shell-found-in-pypi-packages | what vulnarability does aiohttp-proxies version greather then 0,less then 0 have |
|
Having vulnarability CVE-2018-1000519 Advisory: aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-session version greather then equal to 0,less then 2.4.0 have ### Response: Having vulnarability CVE-2018-1000519 Advisory: aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie). | what vulnarability does aiohttp-session version greather then equal to 0,less then 2.4.0 have |
|
Having vulnarability PVE-2022-47816 Advisory: Aiohttp-socks4 is a malicious package, typosquatting. It installs a Trojan in your system.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-socks4 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47816 Advisory: Aiohttp-socks4 is a malicious package, typosquatting. It installs a Trojan in your system.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | what vulnarability does aiohttp-socks4 version greather then 0,less then 0 have |
|
Having vulnarability PVE-2022-47822 Advisory: Aiohttp-socks5 is a malicious package, typosquatting. It installs a Trojan in your system.
https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-socks5 version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47822 Advisory: Aiohttp-socks5 is a malicious package, typosquatting. It installs a Trojan in your system.
https://blog.sonatype.com/trojanized-pypi-package-imitates-a-popular-python-server-library | what vulnarability does aiohttp-socks5 version greather then 0,less then 0 have |
|
Having vulnarability PVE-2021-38483 Advisory: Aiohttp-swagger before 1.0.15 includes a version of js-yaml that's not secure. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiohttp-swagger version less then 1.0.15 have ### Response: Having vulnarability PVE-2021-38483 Advisory: Aiohttp-swagger before 1.0.15 includes a version of js-yaml that's not secure. | what vulnarability does aiohttp-swagger version less then 1.0.15 have |
|
Having vulnarability PVE-2023-62410 Advisory: Aiokafka 0.4.0 includes a fix for a potential race condition vulnerability.
https://github.com/aio-libs/aiokafka/pull/286 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiokafka version less then 0.4.0 have ### Response: Having vulnarability PVE-2023-62410 Advisory: Aiokafka 0.4.0 includes a fix for a potential race condition vulnerability.
https://github.com/aio-libs/aiokafka/pull/286 | what vulnarability does aiokafka version less then 0.4.0 have |
|
Having vulnarability CVE-2022-40897 Advisory: Aiolifx-themes 0.4.1 updates its dependency 'setuptools' to v65.5.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiolifx-themes version less then 0.4.1 have ### Response: Having vulnarability CVE-2022-40897 Advisory: Aiolifx-themes 0.4.1 updates its dependency 'setuptools' to v65.5.1 to include a security fix. | what vulnarability does aiolifx-themes version less then 0.4.1 have |
|
Having vulnarability PVE-2021-38602 Advisory: The `Opake.client` & `Opake.client_registration` methods in aiootp version 0.11.0 take an instantiated client database instead of client credentials which improves security, efficiency & usability. This change reduces the amount of exposure received by user passwords & other credentials. It also simplifies usage of the protocol by only needing to carry around a database instead of a slew of credentials, which is also faster, since the credentials are passed through the cpu & memory hard `passcrypt` function every time to open the database. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiootp version less then 0.11.0 have ### Response: Having vulnarability PVE-2021-38602 Advisory: The `Opake.client` & `Opake.client_registration` methods in aiootp version 0.11.0 take an instantiated client database instead of client credentials which improves security, efficiency & usability. This change reduces the amount of exposure received by user passwords & other credentials. It also simplifies usage of the protocol by only needing to carry around a database instead of a slew of credentials, which is also faster, since the credentials are passed through the cpu & memory hard `passcrypt` function every time to open the database. | what vulnarability does aiootp version less then 0.11.0 have |
|
Having vulnarability PVE-2024-65890 Advisory: In version 0.1.5, aiopioneer resolves a race condition with the implementation of safe_wait_for, which enhances the handling of asynchronous tasks, especially during cancellations and event updates.
https://github.com/crowbarz/aiopioneer/commit/f6f7ce66226825df9e039ed5f12f34812dcc4a7d | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiopioneer version less then 0.1.5 have ### Response: Having vulnarability PVE-2024-65890 Advisory: In version 0.1.5, aiopioneer resolves a race condition with the implementation of safe_wait_for, which enhances the handling of asynchronous tasks, especially during cancellations and event updates.
https://github.com/crowbarz/aiopioneer/commit/f6f7ce66226825df9e039ed5f12f34812dcc4a7d | what vulnarability does aiopioneer version less then 0.1.5 have |
|
Having vulnarability CVE-2021-41945 Advisory: Aioradio 0.17.9 updates 'httpx' to v0.23.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aioradio version less then 0.17.9 have ### Response: Having vulnarability CVE-2021-41945 Advisory: Aioradio 0.17.9 updates 'httpx' to v0.23.0 to include a security fix. | what vulnarability does aioradio version less then 0.17.9 have |
|
Having vulnarability CVE-2024-27305 Advisory: aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue is also existed in other SMTP software like Postfix. With the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances. This issue has been addressed in version 1.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. See CVE-2024-27305. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiosmtpd version less then 1.4.5 have ### Response: Having vulnarability CVE-2024-27305 Advisory: aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue is also existed in other SMTP software like Postfix. With the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances. This issue has been addressed in version 1.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. See CVE-2024-27305. | what vulnarability does aiosmtpd version less then 1.4.5 have |
|
Having vulnarability PVE-2022-50882 Advisory: Aiosmtplib 1.1.7 fixes a possible injection vulnerability (a variant of https://consensys.net/diligence/vulnerabilities/python-smtplib-multiple-crlf-injection/). | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiosmtplib version less then 1.1.7 have ### Response: Having vulnarability PVE-2022-50882 Advisory: Aiosmtplib 1.1.7 fixes a possible injection vulnerability (a variant of https://consensys.net/diligence/vulnerabilities/python-smtplib-multiple-crlf-injection/). | what vulnarability does aiosmtplib version less then 1.1.7 have |
|
Having vulnarability CVE-2021-23980 Advisory: Aiosolr 3.3.2 updates its dependency 'bleach' to v3.3.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiosolr version less then 3.3.2 have ### Response: Having vulnarability CVE-2021-23980 Advisory: Aiosolr 3.3.2 updates its dependency 'bleach' to v3.3.0 to include a security fix. | what vulnarability does aiosolr version less then 3.3.2 have |
|
Having vulnarability PVE-2023-53560 Advisory: Aiotoolbox is a malicious package. It contains a custom script in setup.py that downloads malicious and obfuscated code.
https://inspector.pypi.io/project/aiotoolbox/1.5.2/packages/a0/9b/a3d1fdfb3036ad1bb6ee69f50eab85d042e7cd39ab24b3e8a1c0accbad1d/aiotoolbox-1.5.2.tar.gz/aiotoolbox-1.5.2/setup.py#line.60 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiotoolbox version greather then equal to 0 have ### Response: Having vulnarability PVE-2023-53560 Advisory: Aiotoolbox is a malicious package. It contains a custom script in setup.py that downloads malicious and obfuscated code.
https://inspector.pypi.io/project/aiotoolbox/1.5.2/packages/a0/9b/a3d1fdfb3036ad1bb6ee69f50eab85d042e7cd39ab24b3e8a1c0accbad1d/aiotoolbox-1.5.2.tar.gz/aiotoolbox-1.5.2/setup.py#line.60 | what vulnarability does aiotoolbox version greather then equal to 0 have |
|
Having vulnarability CVE-2019-1000007 Advisory: aioxmpp version 0.10.2 and earlier contains a Improper Handling of Structural Elements vulnerability in Stanza Parser, rollback during error processing, aioxmpp.xso.model.guard function that can result in Denial of Service, Other. This attack appears to be exploitable via Remote. A crafted stanza can be sent to an application which uses the vulnerable components to either inject data in a different context or cause the application to reconnect (potentially losing data). This vulnerability appears to have been fixed in 0.10.3. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aioxmpp version less then equal to 0.10.2 have ### Response: Having vulnarability CVE-2019-1000007 Advisory: aioxmpp version 0.10.2 and earlier contains a Improper Handling of Structural Elements vulnerability in Stanza Parser, rollback during error processing, aioxmpp.xso.model.guard function that can result in Denial of Service, Other. This attack appears to be exploitable via Remote. A crafted stanza can be sent to an application which uses the vulnerable components to either inject data in a different context or cause the application to reconnect (potentially losing data). This vulnerability appears to have been fixed in 0.10.3. | what vulnarability does aioxmpp version less then equal to 0.10.2 have |
|
Having vulnarability PVE-2023-99973 Advisory: Apache-airflow 1.8.0 includes a fix for a code execution vulnerability in PrestoHook. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does airflow version less then 1.8.0 have ### Response: Having vulnarability PVE-2023-99973 Advisory: Apache-airflow 1.8.0 includes a fix for a code execution vulnerability in PrestoHook. | what vulnarability does airflow version less then 1.8.0 have |
|
Having vulnarability CVE-2024-26130 Advisory: Airflow-duckdb version 0.1.1 updates its cryptography dependency from 42.0.2 to 42.0.4 to address the security issue CVE-2024-26130, enhancing its security features.
https://github.com/hussein-awala/airflow-duckdb/commit/bdae387e9ee2c7045091b20632a740236405e54c | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does airflow-duckdb version less then 0.1.1 have ### Response: Having vulnarability CVE-2024-26130 Advisory: Airflow-duckdb version 0.1.1 updates its cryptography dependency from 42.0.2 to 42.0.4 to address the security issue CVE-2024-26130, enhancing its security features.
https://github.com/hussein-awala/airflow-duckdb/commit/bdae387e9ee2c7045091b20632a740236405e54c | what vulnarability does airflow-duckdb version less then 0.1.1 have |
|
Having vulnarability PVE-2022-52477 Advisory: Aiutil 0.71.1 includes a fix for an injection vulnerability through password input.
https://github.com/legendu-net/aiutil/pull/333/commits/e1d016d329b39b5e799de9c2fcacb2249582863f | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aiutil version less then 0.71.1 have ### Response: Having vulnarability PVE-2022-52477 Advisory: Aiutil 0.71.1 includes a fix for an injection vulnerability through password input.
https://github.com/legendu-net/aiutil/pull/333/commits/e1d016d329b39b5e799de9c2fcacb2249582863f | what vulnarability does aiutil version less then 0.71.1 have |
|
Having vulnarability CVE-2019-25066 Advisory: A vulnerability has been found in ajenti 2.1.31 and classified as critical. This vulnerability affects unknown code of the component API. The manipulation leads to privilege escalation. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.32 is able to address this issue. The name of the patch is 7aa146b724e0e20cfee2c71ca78fafbf53a8767c. It is recommended to upgrade the affected component. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ajenti version less then 2.1.37 have ### Response: Having vulnarability CVE-2019-25066 Advisory: A vulnerability has been found in ajenti 2.1.31 and classified as critical. This vulnerability affects unknown code of the component API. The manipulation leads to privilege escalation. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.32 is able to address this issue. The name of the patch is 7aa146b724e0e20cfee2c71ca78fafbf53a8767c. It is recommended to upgrade the affected component. | what vulnarability does ajenti version less then 2.1.37 have |
|
Having vulnarability CVE-2018-1000083 Advisory: Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds with a traceback error that leaks a path of the server. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ajenti-panel version greather then equal to 0 have ### Response: Having vulnarability CVE-2018-1000083 Advisory: Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds with a traceback error that leaks a path of the server. | what vulnarability does ajenti-panel version greather then equal to 0 have |
|
Having vulnarability PVE-2021-39665 Advisory: Ajsonrpc 1.1.0 ensures server security by having the response manager return a generic ServerError without error details in case of an application exception. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ajsonrpc version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-39665 Advisory: Ajsonrpc 1.1.0 ensures server security by having the response manager return a generic ServerError without error details in case of an application exception. | what vulnarability does ajsonrpc version less then 1.1.0 have |
|
Having vulnarability CVE-2016-2512 Advisory: Aldryn-django 1.8.10.1 updates its dependency 'Django' to v1.8.10 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aldryn-django version less then 1.8.10.1 have ### Response: Having vulnarability CVE-2016-2512 Advisory: Aldryn-django 1.8.10.1 updates its dependency 'Django' to v1.8.10 to include security fixes. | what vulnarability does aldryn-django version less then 1.8.10.1 have |
|
Having vulnarability CVE-2022-29773 Advisory: An access control issue in aleksis/core/util/auth_helpers.py: ClientProtectedResourceMixin of AlekSIS-Core v2.8.1 and below allows attackers to access arbitrary scopes if no allowed scopes are specifically set.
https://edugit.org/AlekSIS/official/AlekSIS-Core/-/issues/688 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aleksis-core version greather then equal to 0,less then 2.9 have ### Response: Having vulnarability CVE-2022-29773 Advisory: An access control issue in aleksis/core/util/auth_helpers.py: ClientProtectedResourceMixin of AlekSIS-Core v2.8.1 and below allows attackers to access arbitrary scopes if no allowed scopes are specifically set.
https://edugit.org/AlekSIS/official/AlekSIS-Core/-/issues/688 | what vulnarability does aleksis-core version greather then equal to 0,less then 2.9 have |
|
Having vulnarability CVE-2020-10735 Advisory: Aleph-message 0.3.1 updates its dependency ''pydantic' requirement to versions '~=1.10.5' to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aleph-message version less then 0.3.1 have ### Response: Having vulnarability CVE-2020-10735 Advisory: Aleph-message 0.3.1 updates its dependency ''pydantic' requirement to versions '~=1.10.5' to include a security fix. | what vulnarability does aleph-message version less then 0.3.1 have |
|
Having vulnarability CVE-2020-26214 Advisory: In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alerta-server version less then 7.5.7,greather then equal to 8.0.0,less then 8.1.0 have ### Response: Having vulnarability CVE-2020-26214 Advisory: In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients. | what vulnarability does alerta-server version less then 7.5.7,greather then equal to 8.0.0,less then 8.1.0 have |
|
Having vulnarability PVE-2021-39148 Advisory: Alex-ber-utils 0.6.3 changes the base docker image version to 0.1.0, because it has a fix for a potential security risk: Git changed to not store credentials as plain text but to keep them in memory for 1 hour. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alex-ber-utils version less then 0.6.3 have ### Response: Having vulnarability PVE-2021-39148 Advisory: Alex-ber-utils 0.6.3 changes the base docker image version to 0.1.0, because it has a fix for a potential security risk: Git changed to not store credentials as plain text but to keep them in memory for 1 hour. | what vulnarability does alex-ber-utils version less then 0.6.3 have |
|
Having vulnarability CVE-2018-1000807 Advisory: Alexandra 0.4.0 updates its dependency 'pyOpenSSL' to v17.5.0 to include security fixes. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alexandra version less then 0.4.0 have ### Response: Having vulnarability CVE-2018-1000807 Advisory: Alexandra 0.4.0 updates its dependency 'pyOpenSSL' to v17.5.0 to include security fixes. | what vulnarability does alexandra version less then 0.4.0 have |
|
Having vulnarability PVE-2023-62763 Advisory: Alfred3-interact 0.2.4 fixes a race condition in `MatchMaker._init_member()` which apparently creates a member before its session ID is available in the database.
https://github.com/jobrachem/alfred3-interact/commit/0e3c7e964338af72f50066475382c35778888701 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alfred3-interact version less then 0.2.4 have ### Response: Having vulnarability PVE-2023-62763 Advisory: Alfred3-interact 0.2.4 fixes a race condition in `MatchMaker._init_member()` which apparently creates a member before its session ID is available in the database.
https://github.com/jobrachem/alfred3-interact/commit/0e3c7e964338af72f50066475382c35778888701 | what vulnarability does alfred3-interact version less then 0.2.4 have |
|
Having vulnarability CVE-2022-24439 Advisory: Algokit 0.3.0 updates its dependency 'GitPython' to v3.1.30 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does algokit version less then 0.3.0 have ### Response: Having vulnarability CVE-2022-24439 Advisory: Algokit 0.3.0 updates its dependency 'GitPython' to v3.1.30 to include a security fix. | what vulnarability does algokit version less then 0.3.0 have |
|
Having vulnarability PVE-2021-39381 Advisory: Algorithm-toolkit 0.1.3beta resolves security issues with internal dependencies Pillow and marked.js. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does algorithm-toolkit version less then 0.1.3beta have ### Response: Having vulnarability PVE-2021-39381 Advisory: Algorithm-toolkit 0.1.3beta resolves security issues with internal dependencies Pillow and marked.js. | what vulnarability does algorithm-toolkit version less then 0.1.3beta have |
|
Having vulnarability PVE-2022-51694 Advisory: Algorithmic is a malicious package. It triggers the install of W4SP Stealer in your system. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does algorithmic version greather then 0 have ### Response: Having vulnarability PVE-2022-51694 Advisory: Algorithmic is a malicious package. It triggers the install of W4SP Stealer in your system. | what vulnarability does algorithmic version greather then 0 have |
|
Having vulnarability PVE-2024-67887 Advisory: Algoseek-connector version 2.1.3 addresses a security vulnerability in the sqlparse library by updating from version "^0.4.4" to "^0.5.0", in response to the security advisory GHSA-2m57-hf25-phgg. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does algoseek-connector version less then 2.1.3 have ### Response: Having vulnarability PVE-2024-67887 Advisory: Algoseek-connector version 2.1.3 addresses a security vulnerability in the sqlparse library by updating from version "^0.4.4" to "^0.5.0", in response to the security advisory GHSA-2m57-hf25-phgg. | what vulnarability does algoseek-connector version less then 2.1.3 have |
|
Having vulnarability PVE-2021-36530 Advisory: allennlp 0.6.1 upgrades flask to avoid security vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does allennlp version less then 0.6.1 have ### Response: Having vulnarability PVE-2021-36530 Advisory: allennlp 0.6.1 upgrades flask to avoid security vulnerability. | what vulnarability does allennlp version less then 0.6.1 have |
|
Having vulnarability PVE-2021-34432 Advisory: Allmydata-tahoe 1.1.0 removes 'localdir=/localfile=' and 't=download' operations to avoid security issues.
https://github.com/tahoe-lafs/tahoe-lafs/commit/151f69d9b59ee76522c5ae3dad259ded752e8ad4 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does allmydata-tahoe version less then 1.1.0 have ### Response: Having vulnarability PVE-2021-34432 Advisory: Allmydata-tahoe 1.1.0 removes 'localdir=/localfile=' and 't=download' operations to avoid security issues.
https://github.com/tahoe-lafs/tahoe-lafs/commit/151f69d9b59ee76522c5ae3dad259ded752e8ad4 | what vulnarability does allmydata-tahoe version less then 1.1.0 have |
|
Having vulnarability PVE-2021-36628 Advisory: alt-model-checkpoint 1.0.1 upgrades dependencies, esp. for requests==2.20.0 security patch | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alt-model-checkpoint version less then 1.0.1 have ### Response: Having vulnarability PVE-2021-36628 Advisory: alt-model-checkpoint 1.0.1 upgrades dependencies, esp. for requests==2.20.0 security patch | what vulnarability does alt-model-checkpoint version less then 1.0.1 have |
|
Having vulnarability CVE-2022-21699 Advisory: Altair-recipes 0.9.2 updates its dependency 'ipython' to v7.31.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does altair-recipes version less then 0.9.2 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Altair-recipes 0.9.2 updates its dependency 'ipython' to v7.31.1 to include a security fix. | what vulnarability does altair-recipes version less then 0.9.2 have |
|
Having vulnarability CVE-2022-45061 Advisory: Altvmasterlist version 3.1.0 updates its IDNA dependency from version 3.6 to 3.7 to fix a denial of service vulnerability. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does altvmasterlist version less then 3.1.0 have ### Response: Having vulnarability CVE-2022-45061 Advisory: Altvmasterlist version 3.1.0 updates its IDNA dependency from version 3.6 to 3.7 to fix a denial of service vulnerability. | what vulnarability does altvmasterlist version less then 3.1.0 have |
|
Having vulnarability PVE-2022-50145 Advisory: Alvaro 1.1.1 replaced Pickle with JSON to prevent code injection vulnerabilities.
https://github.com/edgecase963/Alvaro/commit/d87c53359e7edde827add46a7870d4192eef0451 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does alvaro version less then 1.1.1 have ### Response: Having vulnarability PVE-2022-50145 Advisory: Alvaro 1.1.1 replaced Pickle with JSON to prevent code injection vulnerabilities.
https://github.com/edgecase963/Alvaro/commit/d87c53359e7edde827add46a7870d4192eef0451 | what vulnarability does alvaro version less then 1.1.1 have |
|
Having vulnarability PVE-2024-66905 Advisory: Amazon-product-details-scraper version 1.0.4 introduces a security update to enhance the validation process for host URLs, mitigating potential vulnerabilities associated with improper URL verification.
https://github.com/ranjan-mohanty/amazon-product-details-scraper/pull/10/commits/e8491b1e13b4b9a35f6009d65b7c33d16e3cff10 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amazon-product-details-scraper version less then 1.0.4 have ### Response: Having vulnarability PVE-2024-66905 Advisory: Amazon-product-details-scraper version 1.0.4 introduces a security update to enhance the validation process for host URLs, mitigating potential vulnerabilities associated with improper URL verification.
https://github.com/ranjan-mohanty/amazon-product-details-scraper/pull/10/commits/e8491b1e13b4b9a35f6009d65b7c33d16e3cff10 | what vulnarability does amazon-product-details-scraper version less then 1.0.4 have |
|
Having vulnarability CVE-2018-20060 Advisory: Ambient-api 1.5.2 updates requirements.txt to use urllib3>=1.23 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does ambient-api version less then 1.5.2 have ### Response: Having vulnarability CVE-2018-20060 Advisory: Ambient-api 1.5.2 updates requirements.txt to use urllib3>=1.23 to include a security fix. | what vulnarability does ambient-api version less then 1.5.2 have |
|
Having vulnarability PVE-2022-47809 Advisory: Aml-ds-pipeline-contrib is a malicious package, typosquatting. It aims at targeting Azure environments.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does aml-ds-pipeline-contrib version greather then 0,less then 0 have ### Response: Having vulnarability PVE-2022-47809 Advisory: Aml-ds-pipeline-contrib is a malicious package, typosquatting. It aims at targeting Azure environments.
https://blog.sonatype.com/careful-out-there-open-source-attacks-continue-to-be-on-the-uptick | what vulnarability does aml-ds-pipeline-contrib version greather then 0,less then 0 have |
|
Having vulnarability PVE-2023-99972 Advisory: AMQP versions 0.8 to 0.9.1 (Python client) do not carry out hostname verification during tls connections, paving the way for potential Man-in-the-Middle attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amqp version greather then equal to 0.8,less then equal to 0.9.1 have ### Response: Having vulnarability PVE-2023-99972 Advisory: AMQP versions 0.8 to 0.9.1 (Python client) do not carry out hostname verification during tls connections, paving the way for potential Man-in-the-Middle attacks. | what vulnarability does amqp version greather then equal to 0.8,less then equal to 0.9.1 have |
|
Having vulnarability PVE-2023-99972 Advisory: AMQPlib versions 0.8 to 0.9.1 (Python client) do not carry out hostname verification during tls connections, paving the way for potential Man-in-the-Middle attacks. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amqplib version greather then equal to 0.8,less then equal to 0.9.1 have ### Response: Having vulnarability PVE-2023-99972 Advisory: AMQPlib versions 0.8 to 0.9.1 (Python client) do not carry out hostname verification during tls connections, paving the way for potential Man-in-the-Middle attacks. | what vulnarability does amqplib version greather then equal to 0.8,less then equal to 0.9.1 have |
|
Having vulnarability PVE-2023-53085 Advisory: Amqtt 0.10.0 includes a security fix: If an attacker could produce a KeyError inside an authentication plugin, the authentication was accepted instead of rejected.
https://github.com/Yakifo/amqtt/pull/68 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amqtt version less then 0.10.0 have ### Response: Having vulnarability PVE-2023-53085 Advisory: Amqtt 0.10.0 includes a security fix: If an attacker could produce a KeyError inside an authentication plugin, the authentication was accepted instead of rejected.
https://github.com/Yakifo/amqtt/pull/68 | what vulnarability does amqtt version less then 0.10.0 have |
|
Having vulnarability PVE-2017-47647 Advisory: Amsterdam 1.1 runs the suricata container with lower permissions to increase security.
https://github.com/StamusNetworks/Amsterdam/commit/cadf11008a148919cd77da57e1d77c5a2e1092e9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amsterdam version less then 1.1 have ### Response: Having vulnarability PVE-2017-47647 Advisory: Amsterdam 1.1 runs the suricata container with lower permissions to increase security.
https://github.com/StamusNetworks/Amsterdam/commit/cadf11008a148919cd77da57e1d77c5a2e1092e9 | what vulnarability does amsterdam version less then 1.1 have |
|
Having vulnarability CVE-2020-7660 Advisory: Amundsen-frontend 3.0.0 updates its dependency 'serialize-javascript' to v3.1.0 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does amundsen-frontend version less then 3.0.0 have ### Response: Having vulnarability CVE-2020-7660 Advisory: Amundsen-frontend 3.0.0 updates its dependency 'serialize-javascript' to v3.1.0 to include a security fix. | what vulnarability does amundsen-frontend version less then 3.0.0 have |
|
Having vulnarability CVE-2021-45105 Advisory: Analytics-zoo 0.11.1 updates its dependency 'log4j' to v2.17.0 to fix critical and severe vulnerabilities.
https://github.com/intel-analytics/analytics-zoo/commit/be893d0c173563df923b54578774bd4226d0bbd9 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does analytics-zoo version less then 0.11.1 have ### Response: Having vulnarability CVE-2021-45105 Advisory: Analytics-zoo 0.11.1 updates its dependency 'log4j' to v2.17.0 to fix critical and severe vulnerabilities.
https://github.com/intel-analytics/analytics-zoo/commit/be893d0c173563df923b54578774bd4226d0bbd9 | what vulnarability does analytics-zoo version less then 0.11.1 have |
|
Having vulnarability CVE-2020-11075 Advisory: In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anchore version equal to 0.7.0 have ### Response: Having vulnarability CVE-2020-11075 Advisory: In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1. | what vulnarability does anchore version equal to 0.7.0 have |
|
Having vulnarability CVE-2020-11075 Advisory: In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anchorecli version equal to 0.7.0 have ### Response: Having vulnarability CVE-2020-11075 Advisory: In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1. | what vulnarability does anchorecli version equal to 0.7.0 have |
|
Having vulnarability CVE-2022-21699 Advisory: Anchorpy 0.6.4 updates its dependency 'ipython' to v8.0.1 to include a security fix. | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does anchorpy version less then 0.6.4 have ### Response: Having vulnarability CVE-2022-21699 Advisory: Anchorpy 0.6.4 updates its dependency 'ipython' to v8.0.1 to include a security fix. | what vulnarability does anchorpy version less then 0.6.4 have |
|
Having vulnarability PVE-2021-25615 Advisory: Annotator 0.11.2 fixes a bug that allowed authenticated users to overwrite annotations on which they did not have permissions.
https://github.com/openannotation/annotator-store/issues/82 | Below is an instruction that describes a task. Write a response that appropriately completes the request. ### Instruction: what vulnarability does annotator version less then 0.11.2 have ### Response: Having vulnarability PVE-2021-25615 Advisory: Annotator 0.11.2 fixes a bug that allowed authenticated users to overwrite annotations on which they did not have permissions.
https://github.com/openannotation/annotator-store/issues/82 | what vulnarability does annotator version less then 0.11.2 have |