Page 2 of 14 results (0.021 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

03 Jul 2023 — An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used. • https://github.com/hwchase17/langchain/issues/5872 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

20 Jun 2023 — Langchain 0.0.171 is vulnerable to Arbitrary code execution in load_prompt. • https://github.com/hwchase17/langchain/issues/4849 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

14 Jun 2023 — Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the "releases/tag" reference, a fix is available. • https://github.com/hwchase17/langchain/issues/4833 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 2

05 Apr 2023 — In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method. • https://github.com/hwchase17/langchain/issues/1026 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •