CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-9099

Description: In lunary-ai/lunary version v1.4.29, the GET /projects API endpoint exposes both public and private API keys for all projects to users with minimal permissions, such as Viewers or Prompt Editors. This vulnerability allows unauthorized users to retrieve sensitive credentials, which can be used to perform actions on behalf of the project, access private data, and delete resources. The private API keys are exposed in the developer tools when the endpoint is called from the frontend.

CVSS: HIGH (8.8)

EPSS Score: 0.02%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-9098

Description: In lunary-ai/lunary before version 1.4.30, a privilege escalation vulnerability exists where admins can invite new members with billing permissions, thereby gaining unauthorized access to billing resources. This issue arises because the user creation endpoint does not restrict admins from inviting users with billing roles. As a result, admins can circumvent the intended access control, posing a risk to the organization's financial resources.

CVSS: HIGH (7.3)

EPSS Score: 0.02%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-9096

Description: In lunary-ai/lunary version 1.4.28, the /checklists/:id route allows low-privilege users to modify checklists by sending a PATCH request. The route lacks proper access control, such as middleware to ensure that only authorized users (e.g., project owners or admins) can modify checklist data. This vulnerability allows any user associated with the project, regardless of their role, to modify checklists, including changing the slug or data fields, which can lead to tampering with essential project workflows, altering business logic, and introducing errors that undermine integrity.

CVSS: HIGH (7.6)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-9056

Description: BentoML version v1.3.4post1 is vulnerable to a Denial of Service (DoS) attack. The vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. This causes the server to continuously process each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.

CVSS: HIGH (7.5)

EPSS Score: 0.06%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-9000

Description: In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checklists, bypassing intended permission checks. Additionally, the endpoint does not validate the uniqueness of the slug field when creating a new checklist, allowing an attacker to spoof existing checklists by reusing the slug of an already-existing checklist. This can lead to significant data integrity issues, as legitimate checklists can be replaced with malicious or altered data.

CVSS: HIGH (7.1)

EPSS Score: 0.01%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-8998

Description: A Regular Expression Denial of Service (ReDoS) vulnerability exists in lunary-ai/lunary version git f07a845. The server uses the regex /{.*?}/ to match user-controlled strings. In the default JavaScript regex engine, this regex can take polynomial time to match certain crafted user inputs. As a result, an attacker can cause the server to hang for an arbitrary amount of time by submitting a specially crafted payload. This issue is fixed in version 1.4.26.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-8984

Description: A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.

CVSS: HIGH (7.5)

EPSS Score: 0.06%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-8966

Description: A vulnerability in the file upload process of gradio-app/gradio version @gradio/[email protected] allows for a Denial of Service (DoS) attack. An attacker can append a large number of characters to the end of a multipart boundary, causing the system to continuously process each character and issue warnings. This can render Gradio inaccessible for extended periods, disrupting services and causing significant downtime.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-8958

Description: In composiohq/composio version 0.4.3, there is an unrestricted file write and read vulnerability in the filetools actions. Due to improper validation of file paths, an attacker can read and write files anywhere on the server, potentially leading to privilege escalation or remote code execution.

CVSS: HIGH (7.2)

EPSS Score: 0.35%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-8953

Description: In composiohq/composio version 0.4.3, the mathematical_calculator endpoint uses the unsafe eval() function to perform mathematical operations. This can lead to arbitrary code execution if untrusted input is passed to the eval() function.

CVSS: HIGH (7.2)

EPSS Score: 0.09%

Source: CVE
March 20th, 2025 (4 months ago)