Latest CVE Feed
-
7.5
HIGHCVE-2024-12864
A Denial of Service (DoS) vulnerability was discovered in the file upload feature of netease-youdao/qanything version v2.0.0. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can expl... Read more
- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-12779
A Server-Side Request Forgery (SSRF) vulnerability exists in infiniflow/ragflow version 0.12.0. The vulnerability is present in the `POST /v1/llm/add_llm` and `POST /v1/conversation/tts` endpoints. Attackers can specify an arbitrary URL as the `api_base` ... Read more
Affected Products : ragflow- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Server-Side Request Forgery
-
7.5
HIGHCVE-2024-12778
A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service (DoS) attack. The issue arises when a large number of tracked metrics are retrieved simultaneously from the Aim web API, causing the web server to become unresponsive. The root ... Read more
Affected Products : aim- Published: Mar. 20, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Denial of Service
-
5.9
MEDIUMCVE-2024-12777
A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service through the misuse of the sshfs-client. The tracking server, which is single-threaded, can be made unresponsive by requesting it to connect to an unresponsive socket via sshfs. ... Read more
Affected Products : aim- Published: Mar. 20, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Denial of Service
-
8.1
HIGHCVE-2024-12776
In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the appli... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2024-12775
langgenius/dify version 0.10.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the test functionality for the Create Custom Tool option via the REST API `POST /console/api/workspaces/current/tool-provider/api/test/pre`. Attackers can set th... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Server-Side Request Forgery
-
7.5
HIGHCVE-2024-12766
parisneo/lollms-webui version V13 (feather) suffers from a Server-Side Request Forgery (SSRF) vulnerability in the `POST /api/proxy` REST API. Attackers can exploit this vulnerability to abuse the victim server's credentials to access unauthorized web res... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Server-Side Request Forgery
-
7.5
HIGHCVE-2024-12761
A Denial of Service (DoS) vulnerability exists in the brycedrennan/imaginairy repository, version 15.0.0. The vulnerability is present in the `/api/stablestudio/generate` endpoint, which can be exploited by sending an invalid request. This causes the serv... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-12720
A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file tokenization_nougat_fast.py. The vulnerability occurs in the post_process_single() function, where a regular expr... Read more
Affected Products : transformers- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-12704
A vulnerability in the LangChainLLM class of the run-llama/llama_index repository, version v0.12.5, allows for a Denial of Service (DoS) attack. The stream_complete method executes the llm using a thread and retrieves the result via the get_response_gen m... Read more
Affected Products : llamaindex- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
5.3
MEDIUMCVE-2024-12580
A vulnerability in danny-avila/librechat prior to version 0.7.6 allows for logs debug injection. The parameters sessionId, fileId, userId, and file_id in the /code/download/:sessionId/:fileId and /download/:userId/:file_id APIs are not validated or filter... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2024-12537
In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of conten... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Apr. 04, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2024-12534
In version v0.3.32 of open-webui/open-webui, the application allows users to submit large payloads in the email and password fields during the sign-in process due to the lack of character length validation on these inputs. This vulnerability can lead to a... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2024-12450
In infiniflow/ragflow versions 0.12.0, the `web_crawl` function in `document_app.py` contains multiple vulnerabilities. The function does not filter URL parameters, allowing attackers to exploit Full Read SSRF by accessing internal network addresses and v... Read more
Affected Products : ragflow- Published: Mar. 20, 2025
- Modified: Apr. 04, 2025
- Vuln Type: Server-Side Request Forgery
-
9.8
CRITICALCVE-2024-12433
A vulnerability in infiniflow/ragflow versions v0.12.0 allows for remote code execution. The RPC server in RagFlow uses a hard-coded AuthKey 'authkey=b'infiniflow-token4kevinhu'' which can be easily fetched by attackers to join the group communication wit... Read more
Affected Products : ragflow- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2024-12392
A Server-Side Request Forgery (SSRF) vulnerability exists in binary-husky/gpt_academic version git 310122f. The application has a functionality to download papers from arxiv.org, but the URL validation is incomplete. An attacker can exploit this vulnerabi... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Server-Side Request Forgery
-
6.5
MEDIUMCVE-2024-12391
A vulnerability in binary-husky/gpt_academic, as of commit 310122f, allows for a Regular Expression Denial of Service (ReDoS) attack. The function '解析项目源码(手动指定和筛选源码文件类型)' permits the execution of user-provided regular expressions. Certain regular expressi... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2024-12390
A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exp... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2024-12389
A path traversal vulnerability exists in binary-husky/gpt_academic version git 310122f. The application supports the extraction of user-provided 7z files without proper validation. The Python py7zr package used for extraction does not guarantee that files... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2024-12388
A vulnerability in binary-husky/gpt_academic version 310122f allows for a Regular Expression Denial of Service (ReDoS) attack. The application uses a regular expression to parse user input, which can take polynomial time to match certain crafted inputs. T... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service