### [CVE-2024-10714](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10714) ![](https://img.shields.io/static/v1?label=Product&message=binary-husky%2Fgpt_academic&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%20Uncontrolled%20Resource%20Consumption&color=brightgreen) ### Description A vulnerability in binary-husky/gpt_academic version 3.83 allows an attacker to cause a Denial of Service (DoS) by adding excessive characters to the end of a multipart boundary during file upload. This results in the server continuously processing each character and displaying warnings, rendering the application inaccessible. The issue occurs when the terminal shows a warning: 'multipart.multipart Consuming a byte '0x2d' in end state'. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cve-scores