Latest CVE Feed
-
7.5
HIGHCVE-2024-8789
Lunary-ai/lunary version git 105a3f6 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. The application allows users to upload their own regular expressions, which are then executed on the server side. Certain regular expressions can ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Denial of Service
-
9.1
CRITICALCVE-2024-8769
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as... Read more
Affected Products : aim- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal
-
7.3
HIGHCVE-2024-8765
In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensitive ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-8764
A vulnerability in lunary-ai/lunary, as of commit be54057, allows users to upload and execute arbitrary regular expressions on the server side. This can lead to a Denial of Service (DoS) condition, as certain regular expressions can cause excessive resour... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-8763
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary repository, specifically in the compileTextTemplate function. The affected version is git be54057. An attacker can exploit this vulnerability by manipulating the r... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Denial of Service
-
7.1
HIGHCVE-2024-8736
A Denial of Service (DoS) vulnerability exists in multiple file upload endpoints of parisneo/lollms-webui version V12 (Strawberry). The vulnerability can be exploited remotely via Cross-Site Request Forgery (CSRF). Despite CSRF protection preventing file ... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Apr. 04, 2025
- Vuln Type: Denial of Service
-
8.2
HIGHCVE-2024-8616
In h2oai/h2o-3 version 3.46.0, the `/99/Models/{name}/json` endpoint allows for arbitrary file overwrite on the target server. The vulnerability arises from the `exportModelDetails` function in `ModelsHandler.java`, where the user-controllable `mexport.di... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2024-8613
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240802 allows attackers to access, copy, and delete other users' chat histories. This issue arises due to improper handling of session data and lack of access control mechanisms, enabling attackers t... Read more
Affected Products : chuanhuchatgpt- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
9.1
CRITICALCVE-2024-8581
A vulnerability in the `upload_app` function of parisneo/lollms-webui V12 (Strawberry) allows an attacker to delete any file or directory on the system. The function does not implement user input filtering with the `filename` value, causing a Path Travers... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Path Traversal
-
6.1
MEDIUMCVE-2024-8556
A stored cross-site scripting (XSS) vulnerability exists in modelscope/agentscope, as of the latest commit 21161fe on the main branch. The vulnerability occurs in the view for inspecting detailed run information, where a user-controllable string (run ID) ... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Cross-Site Scripting
-
9.1
CRITICALCVE-2024-8551
A path traversal vulnerability exists in the save-workflow and load-workflow functionality of modelscope/agentscope versions prior to the fix. This vulnerability allows an attacker to read and write arbitrary JSON files on the filesystem, potentially lead... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Path Traversal
-
9.1
CRITICALCVE-2024-8537
A path traversal vulnerability exists in the modelscope/agentscope application, affecting all versions. The vulnerability is present in the /delete-workflow endpoint, allowing an attacker to delete arbitrary files from the filesystem. This issue arises du... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-8524
A directory traversal vulnerability exists in modelscope/agentscope version 0.0.4. An attacker can exploit this vulnerability to read any local JSON file by sending a crafted POST request to the /read-examples endpoint.... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2024-8502
A vulnerability in the RpcAgentServerLauncher class of modelscope/agentscope v0.0.6a3 allows for remote code execution (RCE) via deserialization of untrusted data using the dill library. The issue occurs in the AgentServerServicer.create_agent method, whe... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2024-8501
An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This can l... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2024-8489
A vulnerability in modelscope/agentscope, specifically in the AgentScope Studio backend server, allows for Cross-Site Request Forgery (CSRF) due to overly permissive CORS headers. This issue affects the latest commit on the main branch (21161fe). The vuln... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
9.8
CRITICALCVE-2024-8487
A Cross-Origin Resource Sharing (CORS) vulnerability exists in modelscope/agentscope version v0.0.4. The CORS configuration on the agentscope server does not properly restrict access to only trusted origins, allowing any external domain to make requests t... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2024-8438
A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint `/api/file` does not properly sanitize the `path` parameter, allowing an attacker to read arbitrary files on the server.... Read more
Affected Products : agentscope- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Path Traversal
-
5.4
MEDIUMCVE-2024-8400
A stored cross-site scripting (XSS) vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability allows an attacker to upload a malicious HTML file containing JavaScript code, which is then executed when the file is accessed... Read more
Affected Products : chuanhuchatgpt- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2024-8251
A vulnerability in mintplex-labs/anything-llm prior to version 1.2.2 allows for Prisma injection. The issue exists in the API endpoint "/embed/:embedId/stream-chat" where user-provided JSON is directly taken to the Prisma library's where clause. An attack... Read more
Affected Products : anythingllm- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Injection