Page 3 of 28 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

15 Aug 2023 — An issue in Harrison Chase langchain v.0.0.194 and before allows a remote attacker to execute arbitrary code via the from_math_prompt and from_colored_object_prompt functions. Un problema en langchain v.0.0.194 de Harrison Chase y anteriores permite a un atacante remoto ejecutar código arbitrario a través de las funciones from_math_prompt y from_colored_object_prompt. • https://github.com/hwchase17/langchain/issues/5872 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

05 Aug 2023 — An issue in Harrison Chase langchain v.0.0.194 allows an attacker to execute arbitrary code via the python exec calls in the PALChain, affected functions include from_math_prompt and from_colored_object_prompt. • http://langchain.com • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

06 Jul 2023 — SQL injection vulnerability in langchain before v0.0.247 allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component. • https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

06 Jul 2023 — An issue in langchain v.0.0.64 allows a remote attacker to execute arbitrary code via the PALChain parameter in the Python exec method. • https://github.com/hwchase17/langchain/issues/5872 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

03 Jul 2023 — An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used. • https://github.com/hwchase17/langchain/issues/5872 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

20 Jun 2023 — Langchain 0.0.171 is vulnerable to Arbitrary code execution in load_prompt. • https://github.com/hwchase17/langchain/issues/4849 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

14 Jun 2023 — Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the "releases/tag" reference, a fix is available. • https://github.com/hwchase17/langchain/issues/4833 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 2

05 Apr 2023 — In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method. • https://github.com/hwchase17/langchain/issues/1026 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •