Lucene search

K
LanggeniusDify

5 matches found

CVE
CVE
added 2025/03/20 10:15 a.m.50 views

CVE-2025-1796

A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses random.randint for this purpose, which is not suitable ...

8.8CVSS7AI score0.00079EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.39 views

CVE-2024-10252

A vulnerability in langgenius/dify versions

8.8CVSS9.1AI score0.00081EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.36 views

CVE-2024-12039

langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in ...

8.1CVSS7.3AI score0.00146EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-12776

In langgenius/dify v0.10.1, the /forgot-password/resets endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application.

8.1CVSS8.1AI score0.00089EPSS
CVE
CVE
added 2025/07/07 10:15 a.m.8 views

CVE-2025-3467

An XSS vulnerability exists in langgenius/dify versions prior to 1.1.3, specifically affecting Firefox browsers. This vulnerability allows an attacker to obtain the administrator's token by sending a payload in the published chat. When the administrator views the conversation content through the mo...

8CVSS7.3AI score0.00032EPSS