9.8

CVSS3.1

CVE-2024-4320 - Remote Code Execution due to LFI in '/install_extension' in parisneo/lollms-webui

A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuโ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:22 p.m. ๐Ÿ”„ Last Modified: Nov. 21, 2024, 9:42 a.m.

4.8

CVSS3.1

CVE-2024-2171 - Stored XSS in zenml-io/zenml

A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml repository, specifically within the 'logo_url' field. By injecting malicious payloads into this field, an attacker could send harmful messages to other users, potentially compromising their accounts. The vulnerabโ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:22 p.m. ๐Ÿ”„ Last Modified: Nov. 21, 2024, 9:09 a.m.

8.1

CVSS3.1

CVE-2024-5133 - Account Takeover via Exposed Recovery Token in lunary-ai/lunary

In lunary-ai/lunary version 1.2.4, an account takeover vulnerability exists due to the exposure of password recovery tokens in API responses. Specifically, when a user initiates the password reset process, the recovery token is included in the response of the `GET /v1/users/me/org` endpoint, which โ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:21 p.m. ๐Ÿ”„ Last Modified: Oct. 15, 2025, 12:49 p.m.

7.8

CVSS3.1

CVE-2024-30373 - Kofax Power PDF JPF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

Kofax Power PDF JPF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malโ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:20 p.m. ๐Ÿ”„ Last Modified: Nov. 21, 2024, 9:11 a.m.

9.8

CVSS3.1

CVE-2024-3234 - Path Traversal in gaizhenbiao/chuanhuchatgpt

The gaizhenbiao/chuanhuchatgpt application is vulnerable to a path traversal attack due to its use of an outdated gradio component. The application is designed to restrict user access to resources within the `web_assets` folder. However, the outdated version of gradio it employs is susceptible to pโ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:20 p.m. ๐Ÿ”„ Last Modified: Nov. 21, 2024, 9:29 a.m.

6.1

CVSS3.1

CVE-2024-5478 - Cross-site Scripting (XSS) in SAML metadata endpoint in lunary-ai/lunary

A Cross-site Scripting (XSS) vulnerability exists in the SAML metadata endpoint `/auth/saml/${org?.id}/metadata` of lunary-ai/lunary version 1.2.7. The vulnerability arises due to the application's failure to escape or validate the `orgId` parameter supplied by the user before incorporating it intoโ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:20 p.m. ๐Ÿ”„ Last Modified: Nov. 21, 2024, 9:47 a.m.

7.2

CVSS3.1

CVE-2024-5186 - Server Side Request Forgery (SSRF) in imartinez/privategpt

A Server-Side Request Forgery (SSRF) vulnerability exists in the file upload section of imartinez/privategpt version 0.5.0. This vulnerability allows attackers to send crafted requests that could result in unauthorized access to the local network and potentially sensitive information. Specifically,โ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:19 p.m. ๐Ÿ”„ Last Modified: May 19, 2025, 4:49 p.m.

7.2

CVSS3.1

CVE-2024-5225 - SQL Injection in berriai/litellm

An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidatโ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:19 p.m. ๐Ÿ”„ Last Modified: Nov. 21, 2024, 9:47 a.m.

8.8

CVSS3.1

CVE-2024-0520 - Remote Code Execution due to Full Controlled File Write in mlflow/mlflow

A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper neutralization of special elements used in an OS command ('Command Injection') within the `mlflow.data.http_dataset_source.py` module. Specifically, when loading a dataset from a source URL with an HTTP โ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:19 p.m. ๐Ÿ”„ Last Modified: Oct. 15, 2025, 1:15 p.m.

3.3

CVSS3.1

CVE-2024-2213 - Improper Authentication in zenml-io/zenml

An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to improper authentication mechanisms, an attacker with access to an active user session can change the account password without needing to know the current password. This vulnerability allows for unauthorized accounโ€ฆ

๐Ÿ“… Published: June 6, 2024, 6:19 p.m. ๐Ÿ”„ Last Modified: Oct. 21, 2025, 2:14 p.m.
Total resulsts: 348147
Page 9458 of 34,815
ยซ previous page ยป next page
Filters