CVE-2026-27482
- EPSS 0.04%
- Veröffentlicht 21.02.2026 09:18:26
- Zuletzt bearbeitet 04.03.2026 18:59:13
Ray is an AI compute engine. In versions 2.53.0 and below, thedashboard HTTP server blocks browser-origin POST/PUT but does not cover DELETE, and key DELETE endpoints are unauthenticated by default. If the dashboard/agent is reachable (e.g., --dashbo...
CVE-2025-62593
- EPSS 0.01%
- Veröffentlicht 26.11.2025 22:28:28
- Zuletzt bearbeitet 01.12.2025 15:39:33
Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against b...
CVE-2023-6020
- EPSS 81.45%
- Veröffentlicht 16.11.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:42:59
LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.
CVE-2023-6021
- EPSS 87.32%
- Veröffentlicht 16.11.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:42:59
LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cv...
CVE-2023-6019
- EPSS 88.28%
- Veröffentlicht 16.11.2023 17:15:08
- Zuletzt bearbeitet 21.11.2024 08:42:59
A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be f...