Логотип exploitDog
bind:CVE-2025-62593
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-62593

Количество 3

Количество 3

nvd логотип

CVE-2025-62593

2 месяца назад

Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is insufficient as the fetch specification allows the User-Agent header to be modified. Combined with a DNS rebinding attack against the browser, and this vulnerability is exploitable against a developer running Ray who inadvertently visits a malicious website, or is served a malicious advertisement (malvertising). This issue has been patched in version 2.52.0.

EPSS: Низкий
github логотип

GHSA-q279-jhrf-cc6v

2 месяца назад

Ray is vulnerable to Critical RCE via Safari & Firefox Browsers through DNS Rebinding Attack

EPSS: Низкий
fstec логотип

BDU:2025-14769

3 месяца назад

Уязвимость фреймворка для масштабирования приложений AI и Python Ray, связанная с подделкой межсайтовых запросов, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-62593

Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is insufficient as the fetch specification allows the User-Agent header to be modified. Combined with a DNS rebinding attack against the browser, and this vulnerability is exploitable against a developer running Ray who inadvertently visits a malicious website, or is served a malicious advertisement (malvertising). This issue has been patched in version 2.52.0.

0%
Низкий
2 месяца назад
github логотип
GHSA-q279-jhrf-cc6v

Ray is vulnerable to Critical RCE via Safari & Firefox Browsers through DNS Rebinding Attack

0%
Низкий
2 месяца назад
fstec логотип
BDU:2025-14769

Уязвимость фреймворка для масштабирования приложений AI и Python Ray, связанная с подделкой межсайтовых запросов, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.6
0%
Низкий
3 месяца назад

Уязвимостей на страницу