Lucene search

K
StitionaiDevika

4 matches found

CVE
CVE
added 2024/06/27 6:15 p.m.133 views

CVE-2024-5334

A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with ...

7.5CVSS7.3AI score0.5433EPSS
CVE
CVE
added 2024/06/27 6:15 p.m.37 views

CVE-2024-5547

A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploi...

7.5CVSS7.4AI score0.00931EPSS
CVE
CVE
added 2024/06/27 6:15 p.m.33 views

CVE-2024-5548

A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affec...

7.5CVSS7.5AI score0.00897EPSS
CVE
CVE
added 2024/08/04 12:15 a.m.28 views

CVE-2024-6331

stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034dc9207ba1f9f is vulnerable to Local File Read (LFI) by Prompt Injection. The integration of Google Gimini 1.0 Pro with HarmBlockThreshold.BLOCK_NONE for HarmCategory.HARM_CATEGORY_HATE_SPEECH and HarmCategory.HARM_CATEGORY_HARASS...

7.5CVSS7.6AI score0.00236EPSS