Flowise Path Injection at /api/v1/openai-assistants-file due to lack of fileName parameter sanitizatio
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2024-36420 | 1 Jul 202416:15 | – | nvd |
![]() | CVE-2024-36420 | 1 Jul 202416:15 | – | osv |
![]() | GHSA-H997-3FXJ-P5J8 Flowise Path Injection at /api/v1/openai-assistants-file | 5 Aug 202421:29 | – | osv |
![]() | CVE-2024-36420 | 5 Feb 202504:53 | – | redhatcve |
![]() | CVE-2024-36420 | 1 Jul 202416:15 | – | cve |
![]() | Code Injection | 3 Jul 202406:35 | – | veracode |
![]() | CVE-2024-36420 GHSL-2023-232: Flowise Path Injection at /api/v1/openai-assistants-file | 1 Jul 202415:53 | – | vulnrichment |
![]() | Flowise Path Injection at /api/v1/openai-assistants-file | 5 Aug 202421:29 | – | github |
[
{
"vendor": "FlowiseAI",
"product": "Flowise",
"versions": [
{
"version": "<= 1.4.3",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo