Page 3 of 14 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used. • https://github.com/hwchase17/langchain/issues/5872 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Langchain 0.0.171 is vulnerable to Arbitrary code execution in load_prompt. • https://github.com/hwchase17/langchain/issues/4849 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the "releases/tag" reference, a fix is available. • https://github.com/hwchase17/langchain/issues/4833 https://github.com/langchain-ai/langchain/pull/6992 https://github.com/langchain-ai/langchain/releases/tag/v0.0.225 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method. • https://github.com/hwchase17/langchain/issues/1026 https://github.com/hwchase17/langchain/issues/814 https://github.com/hwchase17/langchain/pull/1119 https://twitter.com/rharang/status/1641899743608463365/photo/1 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •