Lucene search

K
LunaryLunary

64 matches found

CVE
CVE
added 2025/03/20 10:15 a.m.36 views

CVE-2024-8763

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary repository, specifically in the compileTextTemplate function. The affected version is git be54057. An attacker can exploit this vulnerability by manipulating the regular expression /{{(.*?)}}/g, causing the ...

7.5CVSS7.4AI score0.00093EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-10330

In lunary-ai/lunary version 1.5.6, the /v1/evaluators/ endpoint lacks proper access control, allowing any user associated with a project to fetch all evaluator data regardless of their role. This vulnerability permits low-privilege users to access potentially sensitive evaluation data.

6.5CVSS6.7AI score0.00032EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-10762

In lunary-ai/lunary before version 1.5.9, the /v1/evaluators/ endpoint allows users to delete evaluators of a project by sending a DELETE request. However, the route lacks proper access control, such as middleware to ensure that only users with appropriate roles can delete evaluator data. This vuln...

8.1CVSS8AI score0.00044EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-11300

In lunary-ai/lunary before version 1.6.3, an improper access control vulnerability exists where a user can access prompt data of another user. This issue affects version 1.6.2 and the main branch. The vulnerability allows unauthorized users to view sensitive prompt data by accessing specific URLs, ...

8.8CVSS8.5AI score0.00033EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-11301

In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request with the same slug as an existing evaluator. Th...

6.5CVSS6.4AI score0.00017EPSS
CVE
CVE
added 2024/06/06 6:15 p.m.35 views

CVE-2024-5127

In lunary-ai/lunary versions 1.2.2 through 1.2.25, an improper access control vulnerability allows users on the Free plan to invite other members and assign them any role, including those intended for Paid and Enterprise plans only. This issue arises due to insufficient backend validation of roles ...

5.4CVSS5.4AI score0.0009EPSS
CVE
CVE
added 2024/06/06 7:16 p.m.35 views

CVE-2024-5130

An Incorrect Authorization vulnerability exists in lunary-ai/lunary versions up to and including 1.2.2, which allows unauthenticated users to delete any dataset. The vulnerability is due to the lack of proper authorization checks in the dataset deletion endpoint. Specifically, the endpoint does not...

7.5CVSS7.5AI score0.00427EPSS
CVE
CVE
added 2024/06/27 7:15 p.m.35 views

CVE-2024-5755

In lunary-ai/lunary versions

5.3CVSS5.3AI score0.00066EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-8764

A vulnerability in lunary-ai/lunary, as of commit be54057, allows users to upload and execute arbitrary regular expressions on the server side. This can lead to a Denial of Service (DoS) condition, as certain regular expressions can cause excessive resource consumption, blocking the server from pro...

7.5CVSS7.4AI score0.00095EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-10273

In lunary-ai/lunary v1.5.0, improper privilege management in the models.ts file allows users with viewer roles to modify models owned by others. The PATCH endpoint for models does not have appropriate privilege checks, enabling low-privilege users to update models they should not have access to mod...

6.5CVSS6.5AI score0.0003EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-10274

An improper authorization vulnerability exists in lunary-ai/lunary version 1.5.5. The /users/me/org endpoint lacks adequate access control mechanisms, allowing unauthorized users to access sensitive information about all team members in the current organization. This vulnerability can lead to the d...

6.5CVSS6.3AI score0.00032EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-7476

A broken access control vulnerability exists in lunary-ai/lunary versions 1.2.7 through 1.4.2. The vulnerability allows an authenticated attacker to modify any user's templates by sending a crafted HTTP POST request to the /v1/templates/{id}/versions endpoint. This issue is resolved in version 1.4....

4.3CVSS4.3AI score0.0003EPSS
Web
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-9000

In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checklists, bypassing intended permission checks. Additi...

7.1CVSS6.8AI score0.00015EPSS
Web
CVE
CVE
added 2024/06/01 4:15 p.m.21 views

CVE-2024-4148

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary application, version 1.2.10. An attacker can exploit this vulnerability by maliciously manipulating regular expressions, which can significantly impact the response time of the application and potentially re...

7.5CVSS7.4AI score0.00096EPSS
Total number of security vulnerabilities64