mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
60 lines
2.3 KiB
JSON
60 lines
2.3 KiB
JSON
{
|
|
"id": "CVE-2024-10714",
|
|
"sourceIdentifier": "security@huntr.dev",
|
|
"published": "2025-03-20T10:15:18.527",
|
|
"lastModified": "2025-03-20T10:15:18.527",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in binary-husky/gpt_academic version 3.83 allows an attacker to cause a Denial of Service (DoS) by adding excessive characters to the end of a multipart boundary during file upload. This results in the server continuously processing each character and displaying warnings, rendering the application inaccessible. The issue occurs when the terminal shows a warning: 'multipart.multipart Consuming a byte '0x2d' in end state'."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en binary-husky/gpt_academic versi\u00f3n 3.83 permite a un atacante provocar una denegaci\u00f3n de servicio (DoS) a\u00f1adiendo caracteres excesivos al final de un l\u00edmite multiparte durante la carga de un archivo. Esto provoca que el servidor procese continuamente cada car\u00e1cter y muestre advertencias, lo que hace que la aplicaci\u00f3n sea inaccesible. El problema ocurre cuando la terminal muestra la advertencia: \u00abmultipart.multipart Consuming a byte '0x2d' in end state\u00bb."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "security@huntr.dev",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@huntr.dev",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://huntr.com/bounties/3e25b76c-714f-4948-8f5a-0ec9a6500068",
|
|
"source": "security@huntr.dev"
|
|
}
|
|
]
|
|
} |