Latest CVE Feed
-
9.8
CRITICALCVE-2024-8954
In composiohq/composio version 0.5.10, the API does not validate the `x-api-key` header's value during the authentication step. This vulnerability allows an attacker to bypass authentication by providing any random value in the `x-api-key` header, thereby... Read more
Affected Products : composio- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2024-8953
In composiohq/composio version 0.4.3, the mathematical_calculator endpoint uses the unsafe eval() function to perform mathematical operations. This can lead to arbitrary code execution if untrusted input is passed to the eval() function.... Read more
Affected Products : composio- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2024-8952
A Server-Side Request Forgery (SSRF) vulnerability exists in composiohq/composio version v0.4.2, specifically in the /api/actions/execute/WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint. This vulnerability allows an attacker to read files, access AWS metadata, an... Read more
Affected Products : composio- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Server-Side Request Forgery
-
9.8
CRITICALCVE-2024-8898
A path traversal vulnerability exists in the `install` and `uninstall` API endpoints of parisneo/lollms-webui version V12 (Strawberry). This vulnerability allows attackers to create or delete directories with arbitrary paths on the system. The issue arise... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-8859
A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. When users configure and use the dbfs service, concatenating the URL directly into the file protocol results in an arbitrary file read vulnerability. This issue occurs because only the... Read more
Affected Products : mlflow- Published: Mar. 20, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-8789
Lunary-ai/lunary version git 105a3f6 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. The application allows users to upload their own regular expressions, which are then executed on the server side. Certain regular expressions can ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Denial of Service
-
9.1
CRITICALCVE-2024-8769
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as... Read more
Affected Products : aim- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal
-
7.3
HIGHCVE-2024-8765
In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensitive ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-8764
A vulnerability in lunary-ai/lunary, as of commit be54057, allows users to upload and execute arbitrary regular expressions on the server side. This can lead to a Denial of Service (DoS) condition, as certain regular expressions can cause excessive resour... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-8763
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary repository, specifically in the compileTextTemplate function. The affected version is git be54057. An attacker can exploit this vulnerability by manipulating the r... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Denial of Service
-
7.1
HIGHCVE-2024-8736
A Denial of Service (DoS) vulnerability exists in multiple file upload endpoints of parisneo/lollms-webui version V12 (Strawberry). The vulnerability can be exploited remotely via Cross-Site Request Forgery (CSRF). Despite CSRF protection preventing file ... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Apr. 04, 2025
- Vuln Type: Denial of Service
-
8.2
HIGHCVE-2024-8616
In h2oai/h2o-3 version 3.46.0, the `/99/Models/{name}/json` endpoint allows for arbitrary file overwrite on the target server. The vulnerability arises from the `exportModelDetails` function in `ModelsHandler.java`, where the user-controllable `mexport.di... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2024-8613
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240802 allows attackers to access, copy, and delete other users' chat histories. This issue arises due to improper handling of session data and lack of access control mechanisms, enabling attackers t... Read more
Affected Products : chuanhuchatgpt- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
9.1
CRITICALCVE-2024-8581
A vulnerability in the `upload_app` function of parisneo/lollms-webui V12 (Strawberry) allows an attacker to delete any file or directory on the system. The function does not implement user input filtering with the `filename` value, causing a Path Travers... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Path Traversal
-
6.1
MEDIUMCVE-2024-8556
A stored cross-site scripting (XSS) vulnerability exists in modelscope/agentscope, as of the latest commit 21161fe on the main branch. The vulnerability occurs in the view for inspecting detailed run information, where a user-controllable string (run ID) ... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Cross-Site Scripting
-
9.1
CRITICALCVE-2024-8551
A path traversal vulnerability exists in the save-workflow and load-workflow functionality of modelscope/agentscope versions prior to the fix. This vulnerability allows an attacker to read and write arbitrary JSON files on the filesystem, potentially lead... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Path Traversal
-
9.1
CRITICALCVE-2024-8537
A path traversal vulnerability exists in the modelscope/agentscope application, affecting all versions. The vulnerability is present in the /delete-workflow endpoint, allowing an attacker to delete arbitrary files from the filesystem. This issue arises du... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-8524
A directory traversal vulnerability exists in modelscope/agentscope version 0.0.4. An attacker can exploit this vulnerability to read any local JSON file by sending a crafted POST request to the /read-examples endpoint.... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2024-8502
A vulnerability in the RpcAgentServerLauncher class of modelscope/agentscope v0.0.6a3 allows for remote code execution (RCE) via deserialization of untrusted data using the dill library. The issue occurs in the AgentServerServicer.create_agent method, whe... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2024-8501
An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This can l... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal