Latest CVE Feed
-
7.5
HIGHCVE-2024-11043
A Denial of Service (DoS) vulnerability was discovered in the /api/v1/boards/{board_id} endpoint of invoke-ai/invokeai version v5.0.2. This vulnerability occurs when an excessively large payload is sent in the board_name field during a PATCH request. By s... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Denial of Service
-
9.1
CRITICALCVE-2024-11042
In invoke-ai/invokeai version v5.0.2, the web API `POST /api/v1/images/delete` is vulnerable to Arbitrary File Deletion. This vulnerability allows unauthorized attackers to delete arbitrary files on the server, potentially including critical or sensitive ... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2024-11041
vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by send... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2024-11039
A pickle deserialization vulnerability exists in the Latex English error correction plug-in function of binary-husky/gpt_academic versions up to and including 3.83. This vulnerability allows attackers to achieve remote command execution by deserializing u... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2024-11037
A path traversal vulnerability exists in binary-husky/gpt_academic at commit 679352d, which allows an attacker to bypass the blocked_paths protection and read the config.py file containing sensitive information such as the OpenAI API key. This vulnerabili... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2024-11033
A Denial of Service (DoS) vulnerability exists in the file upload feature of binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this ... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Denial of Service
-
7.7
HIGHCVE-2024-11031
In version 3.83 of binary-husky/gpt_academic, a Server-Side Request Forgery (SSRF) vulnerability exists in the Markdown_Translate.get_files_from_everything() API. This vulnerability is exploited through the HotReload(Markdown翻译中) plugin function, which al... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Server-Side Request Forgery
-
7.7
HIGHCVE-2024-11030
GPT Academic version 3.83 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability through its HotReload plugin function, which calls the crazy_utils.get_files_from_everything() API without proper sanitization. This allows attackers to exploit ... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Server-Side Request Forgery
-
8.8
HIGHCVE-2024-10986
GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application o... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Path Traversal
-
7.6
HIGHCVE-2024-10956
GPT Academy version 3.83 in the binary-husky/gpt_academic repository is vulnerable to Cross-Site WebSocket Hijacking (CSWSH). This vulnerability allows an attacker to hijack an existing WebSocket connection between the victim's browser and the server, ena... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2024-10955
A Regular Expression Denial of Service (ReDoS) vulnerability exists in gaizhenbiao/chuanhuchatgpt, as of commit 20b2e02. The server uses the regex pattern `r'<[^>]+>'` to parse user input. In Python's default regex engine, this pattern can take polynomial... Read more
Affected Products : chuanhuchatgpt- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2024-10954
In the `manim` plugin of binary-husky/gpt_academic, versions prior to the fix, a vulnerability exists due to improper handling of user-provided prompts. The root cause is the execution of untrusted code generated by the LLM without a proper sandbox. This ... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2024-10950
In binary-husky/gpt_academic version <= 3.83, the plugin `CodeInterpreter` is vulnerable to code injection caused by prompt injection. The root cause is the execution of user-provided prompts that generate untrusted code without a sandbox, allowing the ex... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2024-10948
A vulnerability in the upload function of binary-husky/gpt_academic allows any user to read arbitrary files on the system, including sensitive files such as `config.py`. This issue affects the latest version of the product. An attacker can exploit this vu... Read more
Affected Products : gpt_academic- Published: Mar. 20, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Path Traversal
-
5.3
MEDIUMCVE-2024-10940
A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTe... Read more
Affected Products : langchain- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-10935
automatic1111/stable-diffusion-webui version 1.10.0 contains a vulnerability where the server fails to handle excessive characters appended to the end of multipart boundaries. This flaw can be exploited by sending malformed multipart requests with arbitra... Read more
Affected Products : stable-diffusion-webui- Published: Mar. 20, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-10912
A Denial of Service (DoS) vulnerability exists in the file upload feature of lm-sys/fastchat version 0.2.36. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this by sendi... Read more
Affected Products : fastchat- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
6.1
MEDIUMCVE-2024-10908
An open redirect vulnerability in lm-sys/fastchat Release v0.2.36 allows a remote unauthenticated attacker to redirect users to arbitrary websites via a specially crafted URL. This can be exploited for phishing attacks, malware distribution, and credentia... Read more
Affected Products : fastchat- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2024-10907
In lm-sys/fastchat Release v0.2.36, the server fails to handle excessive characters appended to the end of multipart boundaries. This flaw can be exploited by sending malformed multipart requests with arbitrary characters at the end of the boundary. Each ... Read more
Affected Products : fastchat- Published: Mar. 20, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
8.1
HIGHCVE-2024-10906
In version 0.6.0 of eosphoros-ai/db-gpt, the `uvicorn` app created by `dbgpt_server` uses an overly permissive instance of `CORSMiddleware` which sets the `Access-Control-Allow-Origin` to `*` for all requests. This configuration makes all endpoints expose... Read more
Affected Products : db-gpt- Published: Mar. 20, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Cross-Site Request Forgery