Page 13 of 49986 results (0.029 seconds)

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A vulnerability in imartinez/privategpt version 0.5.0 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process these characters, rendering privateGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and lo... • https://huntr.com/bounties/0661fa3b-bea4-4156-abed-a65d51958505 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A Denial of Service (DoS) vulnerability exists in the file upload feature of binary-husky/gpt_academic version 3.83. • https://huntr.com/bounties/78afc15c-7db7-42fe-90f5-a0480a2ec222 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — Lunary-ai/lunary version git 105a3f6 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. ... Certain regular expressions can have exponential runtime complexity relative to the input size, leading to potential denial of service. • https://github.com/lunary-ai/lunary/commit/7ff89b0304d191534b924cf063f3648206d497fa • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — The starlette package versions <=0.49 are susceptible to uncontrolled resource consumption, which can be exploited to cause a denial of service through memory exhaustion. • https://huntr.com/bounties/56175583-70e3-4d53-94de-3f3a8e2423ec • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. • https://github.com/danny-avila/librechat/commit/bb58a2d0662ef86dc75a9d2f6560125c018e3836 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — Each extra character is processed in an infinite loop, leading to excessive resource consumption and a complete denial of service (DoS) for all users. • https://huntr.com/bounties/bf3ca81d-3508-4455-95d9-0b653e46d6e4 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This can lead to unauthorized cloning of server extensions, execution of malicious scripts, data exfiltration, and potential denial of service (DoS). • https://huntr.com/bounties/b7ed0d87-0be5-4526-9b21-ffe0d39c283e • CWE-284: Improper Access Control •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — BentoML version v1.3.4post1 is vulnerable to a Denial of Service (DoS) attack. The vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. This causes the server to continuously process each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the ser... • https://huntr.com/bounties/a24a13c2-0300-4a95-b26a-ac7fe8f6521b • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A vulnerability in the `/3/ParseSetup` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. • https://huntr.com/bounties/ef3f4d89-3b8b-4618-b134-cb93c1664ec6 • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service (DoS) attack. The issue arises when a large number of tracked metrics are retrieved simultaneously from the Aim web API, causing the web server to become unresponsive. • https://huntr.com/bounties/892a9eee-0251-4e57-94a4-dad2e7f32715 • CWE-400: Uncontrolled Resource Consumption •