{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T05:55:50.242","vulnerabilities":[{"cve":{"id":"CVE-2024-12070","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:27.110","lastModified":"2025-07-14T17:45:20.000","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A Denial of Service (DoS) vulnerability exists in the file upload feature of haotian-liu/llava, specifically in Release v1.2.0 (LLaVA-1.6). The vulnerability is due to improper handling of form-data with a large filename in the file upload request. By sending a payload with an excessively large filename, the server becomes overwhelmed and unresponsive, leading to unavailability for legitimate users. This issue can be exploited without authentication, making it highly scalable and increasing the risk of exploitation."},{"lang":"es","value":"Existe una vulnerabilidad de denegación de servicio (DoS) en la función de carga de archivos de haotian-liu/llava, concretamente en la versión v1.2.0 (LLaVA-1.6). La vulnerabilidad se debe a la gestión incorrecta de datos de formulario con un nombre de archivo demasiado grande en la solicitud de carga de archivos. Al enviar un payload con un nombre de archivo excesivamente grande, el servidor se satura y deja de responder, lo que provoca la indisponibilidad para los usuarios legítimos. Este problema puede explotarse sin autenticación, lo que lo hace altamente escalable y aumenta el riesgo de explotación."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hliu:large_language_and_vision_assistant:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"16359AF7-BEEE-464E-9B76-3D47F6635EE8"}]}]}],"references":[{"url":"https://huntr.com/bounties/8adac028-21c5-41ba-b785-b03066c0b2a6","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]},{"url":"https://huntr.com/bounties/8adac028-21c5-41ba-b785-b03066c0b2a6","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]}]}}]}