Ray Project

Ray

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 21.02.2026 09:18:26
  • Zuletzt bearbeitet 04.03.2026 18:59:13

Ray is an AI compute engine. In versions 2.53.0 and below, thedashboard HTTP server blocks browser-origin POST/PUT but does not cover DELETE, and key DELETE endpoints are unauthenticated by default. If the dashboard/agent is reachable (e.g., --dashbo...

  • EPSS 0.01%
  • Veröffentlicht 26.11.2025 22:28:28
  • Zuletzt bearbeitet 01.12.2025 15:39:33

Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against b...

Exploit
  • EPSS 81.45%
  • Veröffentlicht 16.11.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:42:59

LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.

Exploit
  • EPSS 87.32%
  • Veröffentlicht 16.11.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:42:59

LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cv...

Exploit
  • EPSS 88.28%
  • Veröffentlicht 16.11.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:42:59

A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be f...