Latest CVE Feed
-
6.5
MEDIUMCVE-2024-11301
In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request wit... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2024-11300
In lunary-ai/lunary before version 1.6.3, an improper access control vulnerability exists where a user can access prompt data of another user. This issue affects version 1.6.2 and the main branch. The vulnerability allows unauthorized users to view sensit... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-11173
An unhandled exception in the danny-avila/librechat repository, version git 600d217, can cause the server to crash, leading to a full denial of service. This issue occurs when certain API endpoints receive malformed input, resulting in an uncaught excepti... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-11172
A vulnerability in danny-avila/librechat version git a1647d7 allows an unauthenticated attacker to cause a denial of service by sending a crafted payload to the server. The middleware `checkBan` is not surrounded by a try-catch block, and an unhandled exc... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-11171
In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2024-11170
A vulnerability in danny-avila/librechat version git 81f2936 allows for path traversal due to improper sanitization of file paths by the multer middleware. This can lead to arbitrary file write and potentially remote code execution. The issue is fixed in ... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-11169
An unhandled exception in danny-avila/librechat version 3c94ff2 can lead to a server crash. The issue occurs when the fs module throws an exception while handling file uploads. An unauthenticated user can trigger this exception by sending a specially craf... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
9.4
CRITICALCVE-2024-11167
An improper access control vulnerability in danny-avila/librechat versions prior to 0.7.6 allows authenticated users to delete other users' prompts via the groupid parameter. This issue occurs because the endpoint does not verify whether the provided prom... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-11137
An Insecure Direct Object Reference (IDOR) vulnerability exists in the `PATCH /v1/runs/:id/score` endpoint of lunary-ai/lunary version 1.6.0. This vulnerability allows an attacker to update the score data of any run by manipulating the id parameter in the... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
9.6
CRITICALCVE-2024-11045
A Cross-Site WebSocket Hijacking (CSWSH) vulnerability in automatic1111/stable-diffusion-webui version 1.10.0 allows an attacker to clone a malicious server extension from a GitHub repository. The vulnerability arises from the lack of proper validation on... Read more
Affected Products : stable-diffusion-webui- Published: Mar. 20, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Authentication
-
6.1
MEDIUMCVE-2024-11044
An open redirect vulnerability in automatic1111/stable-diffusion-webui version 1.10.0 allows a remote unauthenticated attacker to redirect users to arbitrary websites via a specially crafted URL. This vulnerability can be exploited to conduct phishing att... Read more
Affected Products : stable-diffusion-webui- Published: Mar. 20, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2024-11043
A Denial of Service (DoS) vulnerability was discovered in the /api/v1/boards/{board_id} endpoint of invoke-ai/invokeai version v5.0.2. This vulnerability occurs when an excessively large payload is sent in the board_name field during a PATCH request. By s... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Denial of Service
-
9.1
CRITICALCVE-2024-11042
In invoke-ai/invokeai version v5.0.2, the web API `POST /api/v1/images/delete` is vulnerable to Arbitrary File Deletion. This vulnerability allows unauthorized attackers to delete arbitrary files on the server, potentially including critical or sensitive ... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2024-11041
vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by send... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2024-11039
A pickle deserialization vulnerability exists in the Latex English error correction plug-in function of binary-husky/gpt_academic versions up to and including 3.83. This vulnerability allows attackers to achieve remote command execution by deserializing u... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2024-11037
A path traversal vulnerability exists in binary-husky/gpt_academic at commit 679352d, which allows an attacker to bypass the blocked_paths protection and read the config.py file containing sensitive information such as the OpenAI API key. This vulnerabili... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2024-11033
A Denial of Service (DoS) vulnerability exists in the file upload feature of binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this ... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Denial of Service
-
7.7
HIGHCVE-2024-11031
In version 3.83 of binary-husky/gpt_academic, a Server-Side Request Forgery (SSRF) vulnerability exists in the Markdown_Translate.get_files_from_everything() API. This vulnerability is exploited through the HotReload(Markdown翻译中) plugin function, which al... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Server-Side Request Forgery
-
7.7
HIGHCVE-2024-11030
GPT Academic version 3.83 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability through its HotReload plugin function, which calls the crazy_utils.get_files_from_everything() API without proper sanitization. This allows attackers to exploit ... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Server-Side Request Forgery
-
8.8
HIGHCVE-2024-10986
GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application o... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Path Traversal