
CVE-2024-10950 – Code Injection in binary-husky/gpt_academic
https://notcve.org/view.php?id=CVE-2024-10950
20 Mar 2025 — In binary-husky/gpt_academic version <= 3.83, the plugin `CodeInterpreter` is vulnerable to code injection caused by prompt injection. • https://huntr.com/bounties/9abb1617-0c1d-42c7-a647-d9d2b39c6866 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-9439 – Remote Code Execution in transformeroptimus/superagi
https://notcve.org/view.php?id=CVE-2024-9439
20 Mar 2025 — SuperAGI is vulnerable to remote code execution in the latest version. The `agent template update` API allows attackers to control certain parameters, which are then fed to the eval function without any sanitization or checks in place. This vulnerability can lead to full system compromise. • https://huntr.com/bounties/d710884f-b5ab-4b31-a2e6-e4b38488def1 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-6982 – Remote Code Execution in Calculate Function in parisneo/lollms
https://notcve.org/view.php?id=CVE-2024-6982
20 Mar 2025 — A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's `eval()` function to evaluate mathematical expressions within a Python sandbox that disables `__builtins__` and only allows functions from the `math` module. This sandbox can be bypassed by loading the `os` module using the `_frozen_importlib.BuiltinImporter` class, allowing an attacker to execute arbitrary commands on the server. The issue is fixed in vers... • https://github.com/parisneo/lollms/commit/30e7eaba2ccfb751a81e7cb29fdef2ae8ffa6832 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-9070 – Deserialization Vulnerability in BentoML's Runner Server in bentoml/bentoml
https://notcve.org/view.php?id=CVE-2024-9070
20 Mar 2025 — The vulnerability is triggered when the args-number parameter is greater than 1, leading to automatic deserialization and arbitrary code execution. • https://huntr.com/bounties/7be6fc22-be18-44ee-a001-ac7158d5e1a5 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2024-10264 – HTTP Request Smuggling in netease-youdao/qanything
https://notcve.org/view.php?id=CVE-2024-10264
20 Mar 2025 — This can lead to unauthorized access, bypassing security controls, session hijacking, data leakage, and potentially arbitrary code execution. • https://huntr.com/bounties/988247d5-fd60-4d85-845a-e867d62c0d02 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2024-10190 – Unauthenticated Remote Code Execution in ElasticRendezvousHandler in horovod/horovod
https://notcve.org/view.php?id=CVE-2024-10190
20 Mar 2025 — This allows an attacker to send a malicious pickle object via a PUT request, leading to arbitrary code execution on the server. • https://huntr.com/bounties/3e398d1f-70c2-4e05-ae22-f5d66b19a754 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2024-9016 – Unauthenticated Remote Command Execution in man-group/dtale
https://notcve.org/view.php?id=CVE-2024-9016
20 Mar 2025 — man-group dtale version <= 3.13.1 contains a vulnerability where the query parameters from the request are directly passed into the run_query function without proper sanitization. This allows for unauthenticated remote command execution via the df.query method when the query engine is set to 'python'. • https://huntr.com/bounties/8b84de4f-e4c6-44f7-b985-d548b07ccf89 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-8581 – Path Traversal in parisneo/lollms-webui
https://notcve.org/view.php?id=CVE-2024-8581
20 Mar 2025 — A vulnerability in the `upload_app` function of parisneo/lollms-webui V12 (Strawberry) allows an attacker to delete any file or directory on the system. The function does not implement user input filtering with the `filename` value, causing a Path Traversal error. • https://github.com/parisneo/lollms-webui/commit/dcc078cbe20d2a9640b0942a622134b0e3fa6e48 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-8156 – Command Injection in significant-gravitas/autogpt
https://notcve.org/view.php?id=CVE-2024-8156
20 Mar 2025 — A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys. • https://github.com/significant-gravitas/autogpt/commit/1df7d527dd37dff8363dc162fb58d300f072e302 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2025-0185 – Pandas Query Injection in langgenius/dify
https://notcve.org/view.php?id=CVE-2025-0185
20 Mar 2025 — A vulnerability in the Dify Tools' Vanna module of the langgenius/dify repository allows for a Pandas Query Injection in the latest version. The vulnerability occurs in the function `vn.get_training_plan_generic(df_information_schema)`, which does not properly sanitize user inputs before executing queries using the Pandas library. This can potentially lead to Remote Code Execution (RCE) if exploited. • https://huntr.com/bounties/7d9eb9b2-7b86-45ed-89bd-276c1350db7e • CWE-94: Improper Control of Generation of Code ('Code Injection') •