Page 3 of 16 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in langchain before v0.0.247 allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component. • https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f https://github.com/hwchase17/langchain/issues/5923 https://github.com/hwchase17/langchain/pull/6051 https://github.com/langchain-ai/langchain/issues/5923#issuecomment-1696053841 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An issue in langchain v.0.0.64 allows a remote attacker to execute arbitrary code via the PALChain parameter in the Python exec method. • https://github.com/hwchase17/langchain/issues/5872 https://github.com/hwchase17/langchain/pull/6003 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used. • https://github.com/hwchase17/langchain/issues/5872 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Langchain 0.0.171 is vulnerable to Arbitrary code execution in load_prompt. • https://github.com/hwchase17/langchain/issues/4849 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the "releases/tag" reference, a fix is available. • https://github.com/hwchase17/langchain/issues/4833 https://github.com/langchain-ai/langchain/pull/6992 https://github.com/langchain-ai/langchain/releases/tag/v0.0.225 •