Логотип exploitDog
bind:CVE-2024-9439
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-9439

Количество 2

Количество 2

nvd логотип

CVE-2024-9439

11 месяцев назад

SuperAGI is vulnerable to remote code execution in the latest version. The `agent template update` API allows attackers to control certain parameters, which are then fed to the eval function without any sanitization or checks in place. This vulnerability can lead to full system compromise.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mq78-p977-pwgv

11 месяцев назад

SuperAGI is vulnerable to remote code execution in the latest version. The `agent template update` API allows attackers to control certain parameters, which are then fed to the eval function without any sanitization or checks in place. This vulnerability can lead to full system compromise.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-9439

SuperAGI is vulnerable to remote code execution in the latest version. The `agent template update` API allows attackers to control certain parameters, which are then fed to the eval function without any sanitization or checks in place. This vulnerability can lead to full system compromise.

CVSS3: 8.8
1%
Низкий
11 месяцев назад
github логотип
GHSA-mq78-p977-pwgv

SuperAGI is vulnerable to remote code execution in the latest version. The `agent template update` API allows attackers to control certain parameters, which are then fed to the eval function without any sanitization or checks in place. This vulnerability can lead to full system compromise.

CVSS3: 8.8
1%
Низкий
11 месяцев назад

Уязвимостей на страницу