{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T11:43:05.204","vulnerabilities":[{"cve":{"id":"CVE-2024-8018","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:38.887","lastModified":"2025-10-15T13:15:53.283","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in imartinez/privategpt version 0.5.0 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process these characters, rendering privateGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity."},{"lang":"es","value":"Una vulnerabilidad en imartinez/privategpt versión 0.5.0 permite un ataque de denegación de servicio (DOS). Al subir un archivo, si un atacante añade una gran cantidad de caracteres al final de un límite multiparte, el sistema procesará estos caracteres continuamente, lo que hará que privateGPT sea inaccesible. Este consumo descontrolado de recursos puede provocar una indisponibilidad prolongada del servicio, lo que interrumpe las operaciones y puede causar inaccesibilidad a los datos y pérdida de productividad."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pribai:privategpt:0.5.0:*:*:*:*:*:*:*","matchCriteriaId":"333CCF9D-DB3A-4421-AC04-A258EC82BA05"}]}]}],"references":[{"url":"https://huntr.com/bounties/0661fa3b-bea4-4156-abed-a65d51958505","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}