Researchers Uncover Vulnerabilities in Open-Source AI and ML Models. Vulnerabilities in ChuanhuChatGPT, Lunary, LocalAI, and Deep Java Library (DJL). Path traversal, remote code execution, and unauthorized data access issues identified in various open-source AI and ML models
Reporter | Title | Published | Views | Family All 37 |
---|---|---|---|---|
![]() | CVE-2024-7474 IDOR in lunary-ai/lunary | 29 Oct 202412:46 | β | vulnrichment |
![]() | CVE-2024-5982 Path Traversal in gaizhenbiao/chuanhuchatgpt | 29 Oct 202412:46 | β | vulnrichment |
![]() | CVE-2024-7473 IDOR Vulnerability in lunary-ai/lunary | 29 Oct 202412:48 | β | vulnrichment |
![]() | CVE-2024-7475 Improper Access Control in lunary-ai/lunary | 29 Oct 202412:45 | β | vulnrichment |
![]() | CVE-2024-6983 Remote Code Execution in mudler/localai | 27 Sep 202415:43 | β | vulnrichment |
![]() | CVE-2024-7010 Timing Attack in mudler/localai | 29 Oct 202412:48 | β | vulnrichment |
![]() | CVE-2024-0129 | 15 Oct 202405:39 | β | vulnrichment |
![]() | CVE-2024-7473 IDOR Vulnerability in lunary-ai/lunary | 29 Oct 202412:48 | β | cvelist |
![]() | CVE-2024-5982 Path Traversal in gaizhenbiao/chuanhuchatgpt | 29 Oct 202412:46 | β | cvelist |
![]() | CVE-2024-7474 IDOR in lunary-ai/lunary | 29 Oct 202412:46 | β | cvelist |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo