{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T04:15:14.054","vulnerabilities":[{"cve":{"id":"CVE-2024-10714","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:18.527","lastModified":"2025-10-15T13:15:36.873","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in binary-husky/gpt_academic version 3.83 allows an attacker to cause a Denial of Service (DoS) by adding excessive characters to the end of a multipart boundary during file upload. This results in the server continuously processing each character and displaying warnings, rendering the application inaccessible. The issue occurs when the terminal shows a warning: 'multipart.multipart Consuming a byte '0x2d' in end state'."},{"lang":"es","value":"Una vulnerabilidad en binary-husky/gpt_academic versión 3.83 permite a un atacante provocar una denegación de servicio (DoS) añadiendo caracteres excesivos al final de un límite multiparte durante la carga de un archivo. Esto provoca que el servidor procese continuamente cada carácter y muestre advertencias, lo que hace que la aplicación sea inaccesible. El problema ocurre cuando la terminal muestra la advertencia: «multipart.multipart Consuming a byte '0x2d' in end state»."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:binary-husky:gpt_academic:3.83:*:*:*:*:*:*:*","matchCriteriaId":"63F16447-B71B-4EAC-9ABD-EA8B4D131601"}]}]}],"references":[{"url":"https://huntr.com/bounties/3e25b76c-714f-4948-8f5a-0ec9a6500068","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}