mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 09:50:49 +00:00
Update GobyVuls-Document.md
This commit is contained in:
parent
d7656260fd
commit
e9f9732284
@ -1,6 +1,21 @@
|
|||||||
# Goby History Update Vulnerability Total Document (Continuously Update)
|
# Goby History Update Vulnerability Total Document (Continuously Update)
|
||||||
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
|
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
|
||||||
|
|
||||||
|
**Updated document date: April 9, 2025**
|
||||||
|
|
||||||
|
## Langflow /api/v1/validate/code Code Execution Vulnerability (CVE-2025-3248)
|
||||||
|
| **Vulnerability** | Langflow /api/v1/validate/code Code Execution Vulnerability (CVE-2025-3248)|
|
||||||
|
| :----: | :-----|
|
||||||
|
| **Chinese name** | Langflow /api/v1/validate/code 代码执行漏洞(CVE-2025-3248) |
|
||||||
|
| **CVSS core** | 7.80 |
|
||||||
|
| **FOFA Query** (click to view the results directly)| [product="LOGSPACE-LangFlow"]
|
||||||
|
| **Number of assets affected** | 2448 |
|
||||||
|
| **Description** |LangFlow is a low-code visual AI application development tool based on Python, focusing on the development of Multi-Agent AI, Prompt Engineering, and Retrieval-Augmented Generation (RAG) applications. Versions prior to 1.3.0 are vulnerable to code injection in the /api/v1/validate/code endpoint. Remote and unauthenticated attackers can send crafted HTTP requests to execute arbitrary code.|
|
||||||
|
| **Impact** | Versions prior to 1.3.0 are vulnerable to code injection in the /api/v1/validate/code endpoint. Remote and unauthenticated attackers can send crafted HTTP requests to execute arbitrary code, potentially leading to full server control.|
|
||||||
|
| **Affected versions** | <1.3.0
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
**Updated document date: March 12, 2025**
|
**Updated document date: March 12, 2025**
|
||||||
|
|
||||||
## Apache Tomcat Remote Command Execution Vulnerability (CVE-2025-24813)
|
## Apache Tomcat Remote Command Execution Vulnerability (CVE-2025-24813)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user