{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T15:51:17.956","vulnerabilities":[{"cve":{"id":"CVE-2024-10829","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:20.257","lastModified":"2025-10-15T13:15:37.230","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Denial of Service (DoS) vulnerability in the multipart request boundary processing mechanism of eosphoros-ai/db-gpt v0.6.0 allows unauthenticated attackers to cause excessive resource consumption. The server fails to handle excessive characters appended to the end of multipart boundaries, leading to an infinite loop and complete denial of service for all users. This vulnerability affects all endpoints processing multipart/form-data requests."},{"lang":"es","value":"Una vulnerabilidad de denegación de servicio (DoS) en el mecanismo de procesamiento de los límites de solicitudes multiparte de eosphoros-ai/db-gpt v0.6.0 permite a atacantes no autenticados consumir recursos excesivamente. El servidor no gestiona el exceso de caracteres añadidos al final de los límites multiparte, lo que genera un bucle infinito y una denegación de servicio completa para todos los usuarios. Esta vulnerabilidad afecta a todos los endpoints que procesan solicitudes multiparte/form-data."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-835"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dbgpt:db-gpt:0.6.0:*:*:*:*:*:*:*","matchCriteriaId":"EBDB9D41-53F0-4893-AD12-C627705D4615"}]}]}],"references":[{"url":"https://huntr.com/bounties/e3a4a0ad-a2e0-497f-a2e0-e3c0ec7c4de4","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}