8.4

CVSS3.0

CVE-2024-3435 - Path Traversal in parisneo/lollms-webui

A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an a…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: July 9, 2025, 2:33 p.m.

0.0

CVE-2024-4642 -

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: May 20, 2024, 5:15 p.m.

5.4

CVSS3.1

CVE-2024-4263 - Improper Access Control in mlflow/mlflow

A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, where low privilege users with only EDIT permissions on an experiment can delete any artifacts. This issue arises due to the lack of proper validation for DELETE requests by users with EDIT permissions, allowing t…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: Feb. 3, 2025, 3:55 p.m.

8.4

CVSS3.0

CVE-2024-3126 - Command Injection in parisneo/lollms-webui

A command injection vulnerability exists in the 'run_xtts_api_server' function of the parisneo/lollms-webui application, specifically within the 'lollms_xtts.py' script. The vulnerability arises due to the improper neutralization of special elements used in an OS command. The affected function util…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: July 9, 2025, 2:36 p.m.

7.5

CVSS3.0

CVE-2024-3403 - Local File Inclusion in imartinez/privategpt

imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the 'Search in Docs' feature or query the AI t…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: July 17, 2025, 8:01 p.m.

8.8

CVSS3.0

CVE-2024-4181 - Command Injection in run-llama/llama_index

A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromise…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: Oct. 21, 2025, 11:36 a.m.

9.8

CVSS3.0

CVE-2024-4326 - Remote Code Execution via `/apply_settings` and `/execute_code` in parisneo/lollms-webui

A vulnerability in parisneo/lollms-webui versions up to 9.3 allows remote attackers to execute arbitrary code. The vulnerability stems from insufficient protection of the `/apply_settings` and `/execute_code` endpoints. Attackers can bypass protections by setting the host to localhost, enabling cod…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: July 9, 2025, 2:29 p.m.

7.5

CVSS3.1

CVE-2024-3848 - Path Traversal Bypass in mlflow/mlflow

A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skip…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: Jan. 24, 2025, 5:28 p.m.

7.5

CVSS3.0

CVE-2024-4321 - Local File Inclusion (LFI) in gaizhenbiao/chuanhuchatgpt

A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker c…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: July 10, 2025, 4:21 p.m.

7.5

CVSS3.0

CVE-2024-4322 - Path Traversal in parisneo/lollms-webui

A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `/list_personalities` endpoint. By manipulating the `category` parameter, an attacker can traverse the directory structure and list any directory on the system. This issue affects the latest vers…

πŸ“… Published: May 16, 2024, 9:03 a.m. πŸ”„ Last Modified: July 9, 2025, 2:32 p.m.
Total resulsts: 344963
Page 9414 of 34,497
Β« previous page Β» next page
Filters