Latest CVE Feed
-
7.5
HIGHCVE-2024-10650
An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can s... Read more
Affected Products : chuanhuchatgpt- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Denial of Service
-
8.2
HIGHCVE-2024-10648
A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating... Read more
Affected Products : gradio- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2024-10624
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the gradio-app/gradio repository, affecting the gr.Datetime component. The affected version is git commit 98cbcae. The vulnerability arises from the use of a regular expression `^(?:\s... Read more
Affected Products : gradio- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-10572
In h2oai/h2o-3 version 3.46.0.1, the `run_tool` command exposes classes in the `water.tools` package through the `ast` parser. This includes the `XGBoostLibExtractTool` class, which can be exploited to shut down the server and write large files to arbitra... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-10569
A vulnerability in the dataframe component of gradio-app/gradio (version git 98cbcae) allows for a zip bomb attack. The component uses pd.read_csv to process input values, which can accept compressed files. An attacker can exploit this by uploading a mali... Read more
Affected Products : gradio- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2024-10553
A vulnerability in the h2oai/h2o-3 REST API versions 3.46.0.4 allows unauthenticated remote attackers to execute arbitrary code via deserialization of untrusted data. The vulnerability exists in the endpoints POST /99/ImportSQLTable and POST /3/SaveToHive... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2024-10550
A vulnerability in the `/3/ParseSetup` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to ca... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-10549
A vulnerability in the `/3/Parse` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint uses a user-specified string to construct a regular expression, which is then applied to another user-specified string. By... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Denial of Service
-
7.2
HIGHCVE-2024-10513
A path traversal vulnerability exists in the 'document uploads manager' feature of mintplex-labs/anything-llm, affecting the latest version prior to 1.2.2. This vulnerability allows users with the 'manager' role to access and manipulate the 'anythingllm.d... Read more
Affected Products : anythingllm- Published: Mar. 20, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2024-10481
A CSRF vulnerability exists in comfyanonymous/comfyui versions up to v0.2.2. This vulnerability allows attackers to host malicious websites that, when visited by authenticated ComfyUI users, can perform arbitrary API requests on behalf of the user. This c... Read more
Affected Products : comfyui- Published: Mar. 20, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.5
MEDIUMCVE-2024-10457
Multiple Server-Side Request Forgery (SSRF) vulnerabilities were identified in the significant-gravitas/autogpt repository, specifically in the GitHub Integration and Web Search blocks. These vulnerabilities affect version agpt-platform-beta-v0.1.1. The i... Read more
- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Server-Side Request Forgery
-
7.6
HIGHCVE-2024-10366
An improper access control vulnerability (IDOR) exists in the delete attachments functionality of danny-avila/librechat version v0.7.5-rc2. The endpoint does not verify whether the provided attachment ID belongs to the current user, allowing any authentic... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
5.4
MEDIUMCVE-2024-10363
In version 0.7.5 of danny-avila/LibreChat, there is an improper access control vulnerability. Users can share, use, and create prompts without being granted permission by the admin. This can break application logic and permissions, allowing unauthorized a... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authorization
-
9.1
CRITICALCVE-2024-10361
An arbitrary file deletion vulnerability exists in danny-avila/librechat version v0.7.5-rc2, specifically within the /api/files endpoint. This vulnerability arises from improper input validation, allowing path traversal techniques to delete arbitrary file... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Path Traversal
-
4.6
MEDIUMCVE-2024-10359
In danny-avila/librechat version v0.7.5-rc2, a vulnerability exists in the preset creation functionality where a user can manipulate the user ID field through mass assignment. This allows an attacker to inject a different user ID into the preset object, c... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-10330
In lunary-ai/lunary version 1.5.6, the `/v1/evaluators/` endpoint lacks proper access control, allowing any user associated with a project to fetch all evaluator data regardless of their role. This vulnerability permits low-privilege users to access poten... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
7.3
HIGHCVE-2024-10275
In version 1.5.5 of lunary-ai/lunary, a vulnerability exists where admins, who do not have direct permissions to access billing resources, can change the permissions of existing users to include billing permissions. This can lead to a privilege escalation... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-10274
An improper authorization vulnerability exists in lunary-ai/lunary version 1.5.5. The /users/me/org endpoint lacks adequate access control mechanisms, allowing unauthorized users to access sensitive information about all team members in the current organi... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-10273
In lunary-ai/lunary v1.5.0, improper privilege management in the models.ts file allows users with viewer roles to modify models owned by others. The PATCH endpoint for models does not have appropriate privilege checks, enabling low-privilege users to upda... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-10272
lunary-ai/lunary is vulnerable to broken access control in the latest version. An attacker can view the content of any dataset without any kind of authorization by sending a GET request to the /v1/datasets endpoint without a valid authorization token.... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jun. 20, 2025
- Vuln Type: Authorization