Latest CVE Feed
-
9.1
CRITICALCVE-2024-10361
An arbitrary file deletion vulnerability exists in danny-avila/librechat version v0.7.5-rc2, specifically within the /api/files endpoint. This vulnerability arises from improper input validation, allowing path traversal techniques to delete arbitrary file... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Path Traversal
-
4.6
MEDIUMCVE-2024-10359
In danny-avila/librechat version v0.7.5-rc2, a vulnerability exists in the preset creation functionality where a user can manipulate the user ID field through mass assignment. This allows an attacker to inject a different user ID into the preset object, c... Read more
Affected Products : librechat- Published: Mar. 20, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-10330
In lunary-ai/lunary version 1.5.6, the `/v1/evaluators/` endpoint lacks proper access control, allowing any user associated with a project to fetch all evaluator data regardless of their role. This vulnerability permits low-privilege users to access poten... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
7.3
HIGHCVE-2024-10275
In version 1.5.5 of lunary-ai/lunary, a vulnerability exists where admins, who do not have direct permissions to access billing resources, can change the permissions of existing users to include billing permissions. This can lead to a privilege escalation... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-10274
An improper authorization vulnerability exists in lunary-ai/lunary version 1.5.5. The /users/me/org endpoint lacks adequate access control mechanisms, allowing unauthorized users to access sensitive information about all team members in the current organi... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-10273
In lunary-ai/lunary v1.5.0, improper privilege management in the models.ts file allows users with viewer roles to modify models owned by others. The PATCH endpoint for models does not have appropriate privilege checks, enabling low-privilege users to upda... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-10272
lunary-ai/lunary is vulnerable to broken access control in the latest version. An attacker can view the content of any dataset without any kind of authorization by sending a GET request to the /v1/datasets endpoint without a valid authorization token.... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jun. 20, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-10267
An information disclosure vulnerability exists in the latest version of transformeroptimus/superagi. An attacker can leak sensitive user information, including names, emails, and passwords, by attempting to register a new account with an email that is alr... Read more
Affected Products : superagi- Published: Mar. 20, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Information Disclosure
-
9.8
CRITICALCVE-2024-10264
HTTP Request Smuggling vulnerability in netease-youdao/qanything version 1.4.1 allows attackers to exploit inconsistencies in the interpretation of HTTP requests between a proxy and a server. This can lead to unauthorized access, bypassing security contro... Read more
- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2024-10252
A vulnerability in langgenius/dify versions <=v0.9.1 allows for code injection via internal SSRF requests in the Dify sandbox service. This vulnerability enables an attacker to execute arbitrary Python code with root privileges within the sandbox environm... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2024-10225
A vulnerability in haotian-liu/llava v1.2.0 allows an attacker to cause a Denial of Service (DoS) by appending a large number of characters to the end of a multipart boundary in a file upload request. This causes the server to continuously process each ch... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2024-10190
Horovod versions up to and including v0.28.1 are vulnerable to unauthenticated remote code execution. The vulnerability is due to improper handling of base64-encoded data in the `ElasticRendezvousHandler`, a subclass of `KVStoreHandler`. Specifically, the... Read more
Affected Products : horovod- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2024-10188
A vulnerability in BerriAI/litellm, as of commit 26c03c9, allows unauthenticated users to cause a Denial of Service (DoS) by exploiting the use of ast.literal_eval to parse user input. This function is not safe and is prone to DoS attacks, which can crash... Read more
Affected Products : litellm- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-10110
In version 3.23.0 of aimhubio/aim, the ScheduledStatusReporter object can be instantiated to run on the main thread of the tracking server, leading to the main thread being blocked indefinitely. This results in a denial of service as the tracking server b... Read more
Affected Products : aim- Published: Mar. 20, 2025
- Modified: Jul. 23, 2025
- Vuln Type: Denial of Service
-
8.3
HIGHCVE-2024-10109
A vulnerability in the mintplex-labs/anything-llm repository, as of commit 5c40419, allows low privilege users to access the sensitive API endpoint "/api/system/custom-models". This access enables them to modify the model's API key and base path, leading ... Read more
Affected Products : anythingllm- Published: Mar. 20, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-10051
Realchar version v0.0.4 is vulnerable to an unauthenticated denial of service (DoS) attack. The vulnerability exists in the file upload request handling, where appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Denial of Service
-
5.3
MEDIUMCVE-2024-10047
parisneo/lollms-webui versions v9.9 to the latest are vulnerable to a directory listing vulnerability. An attacker can list arbitrary directories on a Windows system by sending a specially crafted HTTP request to the /open_file endpoint.... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Information Disclosure
-
6.7
MEDIUMCVE-2024-10019
A vulnerability in the `start_app_server` function of parisneo/lollms-webui V12 (Strawberry) allows for path traversal and OS command injection. The function does not properly sanitize the `app_name` parameter, enabling an attacker to upload a malicious `... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Path Traversal
-
5.6
MEDIUMCVE-2024-0640
A stored cross-site scripting (XSS) vulnerability exists in chatwoot/chatwoot versions 3.0.0 to 3.5.1. This vulnerability allows an admin user to inject malicious JavaScript code via the dashboard app settings, which can then be executed by another admin ... Read more
Affected Products : chatwoot- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Cross-Site Scripting
-
5.5
MEDIUMCVE-2024-0245
A misconfiguration in the AndroidManifest.xml file in hamza417/inure before build97 allows for task hijacking. This vulnerability permits malicious applications to inherit permissions of the vulnerable app, potentially leading to the exposure of sensitive... Read more
Affected Products : inure- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Misconfiguration