Latest CVE Feed
-
7.6
HIGHCVE-2024-9096
In lunary-ai/lunary version 1.4.28, the /checklists/:id route allows low-privilege users to modify checklists by sending a PATCH request. The route lacks proper access control, such as middleware to ensure that only authorized users (e.g., project owners ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2024-9095
In lunary-ai/lunary version v1.4.28, the /bigquery API route lacks proper access control, allowing any logged-in user to create a Datastream to Google BigQuery and export the entire database. This includes sensitive data such as password hashes and secret... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2024-9070
A deserialization vulnerability exists in BentoML's runner server in bentoml/bentoml versions <=1.3.4.post1. By setting specific parameters, an attacker can execute unauthorized arbitrary code on the server, causing severe harm. The vulnerability is trigg... Read more
Affected Products : bentoml- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2024-9056
BentoML version v1.3.4post1 is vulnerable to a Denial of Service (DoS) attack. The vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. This causes the server to continuously pr... Read more
Affected Products : bentoml- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2024-9053
vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages w... Read more
- Published: Mar. 20, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Authentication
-
7.1
HIGHCVE-2024-9000
In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checklists, ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2024-8999
lunary-ai/lunary version v1.4.25 contains an improper access control vulnerability in the POST /api/v1/data-warehouse/bigquery endpoint. This vulnerability allows any user to export the entire database data by creating a stream to Google BigQuery without ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-8998
A Regular Expression Denial of Service (ReDoS) vulnerability exists in lunary-ai/lunary version git f07a845. The server uses the regex /{.*?}/ to match user-controlled strings. In the default JavaScript regex engine, this regex can take polynomial time to... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Apr. 04, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-8984
A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes ea... Read more
Affected Products : litellm- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
6.2
MEDIUMCVE-2024-8982
A Local File Inclusion (LFI) vulnerability in OpenLLM version 0.6.10 allows attackers to include files from the local server through the web application. This flaw could expose internal server files and potentially sensitive information such as configurat... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-8966
A vulnerability in the file upload process of gradio-app/gradio version @gradio/[email protected] allows for a Denial of Service (DoS) attack. An attacker can append a large number of characters to the end of a multipart boundary, causing the system to continu... Read more
- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2024-8958
In composiohq/composio version 0.4.3, there is an unrestricted file write and read vulnerability in the filetools actions. Due to improper validation of file paths, an attacker can read and write files anywhere on the server, potentially leading to privil... Read more
Affected Products : composio- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-8955
A Server-Side Request Forgery (SSRF) vulnerability exists in composiohq/composio version v0.4.4. This vulnerability allows an attacker to read the contents of any file in the system by exploiting the BROWSERTOOL_GOTO_PAGE and BROWSERTOOL_GET_PAGE_DETAILS ... Read more
Affected Products : composio- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Server-Side Request Forgery
-
9.8
CRITICALCVE-2024-8954
In composiohq/composio version 0.5.10, the API does not validate the `x-api-key` header's value during the authentication step. This vulnerability allows an attacker to bypass authentication by providing any random value in the `x-api-key` header, thereby... Read more
Affected Products : composio- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2024-8953
In composiohq/composio version 0.4.3, the mathematical_calculator endpoint uses the unsafe eval() function to perform mathematical operations. This can lead to arbitrary code execution if untrusted input is passed to the eval() function.... Read more
Affected Products : composio- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2024-8952
A Server-Side Request Forgery (SSRF) vulnerability exists in composiohq/composio version v0.4.2, specifically in the /api/actions/execute/WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint. This vulnerability allows an attacker to read files, access AWS metadata, an... Read more
Affected Products : composio- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Server-Side Request Forgery
-
9.8
CRITICALCVE-2024-8898
A path traversal vulnerability exists in the `install` and `uninstall` API endpoints of parisneo/lollms-webui version V12 (Strawberry). This vulnerability allows attackers to create or delete directories with arbitrary paths on the system. The issue arise... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-8859
A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. When users configure and use the dbfs service, concatenating the URL directly into the file protocol results in an arbitrary file read vulnerability. This issue occurs because only the... Read more
Affected Products : mlflow- Published: Mar. 20, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-8789
Lunary-ai/lunary version git 105a3f6 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. The application allows users to upload their own regular expressions, which are then executed on the server side. Certain regular expressions can ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Denial of Service
-
9.1
CRITICALCVE-2024-8769
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as... Read more
Affected Products : aim- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Path Traversal