{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T21:21:38.939","vulnerabilities":[{"cve":{"id":"CVE-2024-9340","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:48.100","lastModified":"2025-07-15T11:15:24.300","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthenticated attackers to cause excessive resource consumption by sending malformed multipart requests with arbitrary characters appended to the end of multipart boundaries. This flaw in the multipart request boundary processing mechanism leads to an infinite loop, resulting in a complete denial of service for all users. Affected endpoints include `/api/v1/login` and `/api/v1/device_authorization`."},{"lang":"es","value":"Una vulnerabilidad de denegación de servicio (DoS) en zenml-io/zenml versión 0.66.0 permite a atacantes no autenticados consumir recursos excesivamente mediante el envío de solicitudes multiparte malformadas con caracteres arbitrarios añadidos al final de los límites. Esta falla en el mecanismo de procesamiento de los límites de solicitudes multiparte genera un bucle infinito, lo que resulta en una denegación de servicio completa para todos los usuarios. Los endpoints afectados incluyen `/api/v1/login` y `/api/v1/device_authorization`."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-835"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-835"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*","versionEndExcluding":"0.68.0","matchCriteriaId":"7AE0A162-5652-47CD-8840-FDA3C425F0ED"}]}]}],"references":[{"url":"https://github.com/zenml-io/zenml/commit/cba152eb9ca3071c8372b0b91c02d9d3351de48d","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/c9200654-7dc0-4c1d-8573-ab79a87fb4f6","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}