CWE-76

Total CVEs
9
Vulnerabilities
Avg CVSS v3
7.2
High
Latest CVE
2024
Most Recent

Severity Distribution

Critical 2
22.2%
High 3
33.3%
Medium 3
33.3%
Low 1
11.1%

External References

All CVEs (9)

Page 1 of 1
CVSS:9.8(Critical)

BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` param...

CWE-762024
CVSS:9.6(Critical)

llama-cpp-python is the Python bindings for llama.cpp. `llama-cpp-python` depends on class `Llama` in `llama.py` to load `.gguf` llama.cpp or Latency Machine Learning Models. The `__init__` constructo...

CWE-762024
CVSS:8.8(High)

Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.7.5.

CWE-762023
CVSS:8.4(High)

parisneo/lollms-webui, in its latest version, is vulnerable to remote code execution due to an insecure dependency on llama-cpp-python version llama_cpp_python-0.2.61+cpuavx2-cp311-cp311-manylinux_2_3...

CWE-762024
CVSS:7.2(High)

This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application serve...

CWE-762024
CVSS:6.5(Medium)

An Improper Neutralization of Equivalent Special Elements vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows a unauthenticated, adjacent attacker to ...

CWE-762024
CVSS:6.1(Medium)

This is a reflected cross site scripting vulnerability in the PaperCut NG/MF application server. An attacker can exploit this weakness by crafting a malicious URL that contains a script. When an unsus...

CWE-762024
CVSS:5.7(Medium)

Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.8.0.

CWE-762023
CVSS:3.1(Low)

This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissa...

CWE-762024