Page 31 of 44850 results (0.012 seconds)

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A vulnerability in the RpcAgentServerLauncher class of modelscope/agentscope v0.0.6a3 allows for remote code execution (RCE) via deserialization of untrusted data using the dill library. • https://huntr.com/bounties/7a42da2a-2ae5-442d-aff9-c9a3b47870eb • CWE-502: Deserialization of Untrusted Data •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This can result in remote code execution by deserializing malicious pickle data. • https://huntr.com/bounties/75a544f3-34a3-4da0-b5a3-1495cb031e09 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.4EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This can potentially lead to Remote Code Execution (RCE). • https://huntr.com/bounties/e32fda74-ca83-431c-8de8-08274ba686c9 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This vulnerability can be exploited by an attacker to inject arbitrary SQL queries, leading to remote code execution (RCE) through the use of PostgreSQL's large object functionality. • https://github.com/run-llama/llama_index/commit/5d03c175476452db9b8abcdb7d5767dd7b310a75 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.4EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — The impact of this vulnerability includes the potential for remote code execution (RCE) by writing malicious files, such as a malicious `__init__.py` in the Python's `/site-packages/` directory. • https://huntr.com/bounties/f7fbf76e-aa1c-4106-b007-e9579f4f7d5f • CWE-73: External Control of File Name or Path •

CVSS: 9.0EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This can potentially lead to Remote Code Execution (RCE) if exploited. • https://huntr.com/bounties/7d9eb9b2-7b86-45ed-89bd-276c1350db7e • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.0EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This vulnerability allows an attacker to upload an arbitrary file to the server, potentially leading to remote code execution or overwriting any file on the server. • https://huntr.com/bounties/31bdf98c-5205-4c48-9bc7-9e780ba63398 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — A vulnerability in the h2oai/h2o-3 REST API versions 3.46.0.4 allows unauthenticated remote attackers to execute arbitrary code via deserialization of untrusted data. • https://github.com/h2oai/h2o-3/commit/ac1d642b4d86f10a02d75974055baf2a4b2025ac • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This enables CSRF attacks on all endpoints of the tracking server, which can be chained with other existing vulnerabilities such as remote code execution, denial of service, and arbitrary file read/write. • https://huntr.com/bounties/2038df5f-4829-4040-8573-67bf9bb89229 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.0EPSS: 0%CPEs: -EXPL: 0

20 Mar 2025 — This can lead to arbitrary file write and potentially remote code execution. • https://github.com/danny-avila/librechat/commit/629be5c0ca2b332178524b4e3f6fac715aea8cc4 • CWE-29: Path Traversal: '\..\filename' •