LlamaIndex 0.4.30

CPE Details

LlamaIndex 0.4.30
0.4.30
2024-01-29
11h25 +00:00
2024-01-29
11h25 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:llamaindex:llamaindex:0.4.30:*:*:*:*:*:*:*

Informations

Vendor

llamaindex

Product

llamaindex

Version

0.4.30

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-6210 2025-07-07 09h55 +00:00 A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.
6.2
Moyen
CVE-2024-12910 2025-03-20 10h09 +00:00 A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index repository, version latest, allows an attacker to cause a Denial of Service (DoS) by controlling a URL variable to contain the root URL. This leads to infinite recursive calls to the `get_article_urls` method, exhausting system resources and potentially crashing the application.
5.9
Moyen
CVE-2024-23751 2024-01-22 00h00 +00:00 LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feature in NLSQLTableQueryEngine, SQLTableRetrieverQueryEngine, NLSQLRetriever, RetrieverQueryEngine, and PGVectorSQLQueryEngine. For example, an attacker might be able to delete this year's student records via "Drop the Students table" within English language input.
9.8
Critique