{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T14:15:10.905","vulnerabilities":[{"cve":{"id":"CVE-2024-8789","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:44.340","lastModified":"2025-10-15T13:15:56.000","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lunary-ai/lunary version git 105a3f6 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. The application allows users to upload their own regular expressions, which are then executed on the server side. Certain regular expressions can have exponential runtime complexity relative to the input size, leading to potential denial of service. An attacker can exploit this by submitting a specially crafted regular expression, causing the server to become unresponsive for an arbitrary length of time."},{"lang":"es","value":"La versión git 105a3f6 de Lunary-ai/lunary es vulnerable a un ataque de denegación de servicio (ReDoS). La aplicación permite a los usuarios cargar sus propias expresiones regulares, que se ejecutan en el servidor. Ciertas expresiones regulares pueden tener una complejidad de ejecución exponencial en relación con el tamaño de entrada, lo que puede provocar una denegación de servicio. Un atacante puede aprovechar esto enviando una expresión regular especialmente manipulada, lo que provoca que el servidor deje de responder durante un tiempo arbitrario."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-1333"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.23","matchCriteriaId":"1867D23D-5A19-4541-8258-E7F901C5F468"}]}]}],"references":[{"url":"https://github.com/lunary-ai/lunary/commit/7ff89b0304d191534b924cf063f3648206d497fa","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/e32f5f0d-bd46-4268-b6b1-619e07c6fda3","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}