Show filters
93 Total Results
Displaying 11-20 of 93
Sort by:
Attacker Value
Unknown

CVE-2024-1455

Disclosure Date: March 26, 2024 (last updated April 16, 2024)
A vulnerability in the langchain-ai/langchain repository allows for a Billion Laughs Attack, a type of XML External Entity (XXE) exploitation. By nesting multiple layers of entities within an XML document, an attacker can cause the XML parser to consume excessive CPU and memory resources, leading to a denial of service (DoS).
0
Attacker Value
Unknown

CVE-2024-28088

Disclosure Date: March 04, 2024 (last updated January 12, 2025)
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
Attacker Value
Unknown

CVE-2024-2057

Disclosure Date: March 01, 2024 (last updated April 01, 2024)
A vulnerability was found in LangChain langchain_community 0.0.26. It has been classified as critical. Affected is the function load_local in the library libs/community/langchain_community/retrievers/tfidf.py of the component TFIDFRetriever. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.27 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-255372.
0
Attacker Value
Unknown

CVE-2024-23052

Disclosure Date: February 29, 2024 (last updated January 17, 2025)
An issue in WuKongOpenSource WukongCRM v.72crm_9.0.1_20191202 allows a remote attacker to execute arbitrary code via the parseObject() function in the fastjson component.
Attacker Value
Unknown

CVE-2024-0243

Disclosure Date: February 26, 2024 (last updated February 27, 2024)
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Soup url = "https://example.com" loader = RecursiveUrlLoader( url=url, max_depth=2, extractor=lambda x: Soup(x, "html.parser").text ) docs = loader.load() ``` An attacker in control of the contents of `https://example.com` could place a malicious HTML file in there with links like "https://example.completely.different/my_file.html" and the crawler would proceed to download that file as well even though `prevent_outside=True`. https://github.com/langchain-ai/langchain/blob/bf0b3cc0b5ade1fb95a5b1b6fa260e99064c2e22/libs/community/langchain_community/document_loaders/recursive_url_loader.py#L51-L51 Resolved in https://github.com/langchain-ai/langchain/pull/15559
0
Attacker Value
Unknown

CVE-2023-46914

Disclosure Date: February 07, 2024 (last updated February 15, 2024)
SQL Injection vulnerability in RM bookingcalendar module for PrestaShop versions 2.7.9 and before, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via ics_export.php.
Attacker Value
Unknown

CVE-2023-47510

Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPSolutions-HQ WPDBSpringClean plugin <= 1.6 versions.
Attacker Value
Unknown

CVE-2023-32786

Disclosure Date: October 20, 2023 (last updated October 28, 2023)
In Langchain through 0.0.155, prompt injection allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF and potentially injecting content into downstream tasks.
Attacker Value
Unknown

CVE-2023-46229

Disclosure Date: October 19, 2023 (last updated October 26, 2023)
LangChain before 0.0.317 allows SSRF via document_loaders/recursive_url_loader.py because crawling can proceed from an external server to an internal server.
Attacker Value
Unknown

CVE-2023-44467

Disclosure Date: October 09, 2023 (last updated February 26, 2024)
langchain_experimental (aka LangChain Experimental) in LangChain before 0.0.306 allows an attacker to bypass the CVE-2023-36258 fix and execute arbitrary code via __import__ in Python code, which is not prohibited by pal_chain/base.py.