Llamaindex

Llamaindex

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Veröffentlicht 12.01.2026 23:04:43
  • Zuletzt bearbeitet 15.01.2026 22:39:58

LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserialize multi_...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 12.01.2026 23:04:25
  • Zuletzt bearbeitet 21.01.2026 18:30:26

LlamaIndex (run-llama/llama_index) versions up to and including 0.12.2 contain an uncontrolled resource consumption vulnerability in the VannaPack VannaQueryEngine implementation. The custom_query() logic generates SQL statements from a user-supplied...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 13.10.2025 16:15:08
  • Zuletzt bearbeitet 21.10.2025 14:48:53

The llama_index library version 0.12.33 sets the NLTK data directory to a subdirectory of the codebase by default, which is world-writable in multi-user environments. This configuration allows local users to overwrite, delete, or corrupt NLTK data fi...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 10.07.2025 13:04:34
  • Zuletzt bearbeitet 30.07.2025 20:00:35

A vulnerability in the DocugamiReader class of the run-llama/llama_index repository, up to version 0.12.28, involves the use of MD5 hashing to generate IDs for document chunks. This approach leads to hash collisions when structurally distinct chunks ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 07.07.2025 12:21:10
  • Zuletzt bearbeitet 30.07.2025 20:01:32

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 07.07.2025 09:55:56
  • Zuletzt bearbeitet 30.07.2025 20:03:35

The JSONReader in run-llama/llama_index versions 0.12.28 is vulnerable to a stack overflow due to uncontrolled recursive JSON parsing. This vulnerability allows attackers to trigger a Denial of Service (DoS) by submitting deeply nested JSON structure...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 07.07.2025 09:55:46
  • Zuletzt bearbeitet 30.07.2025 20:01:47

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files,...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 07.07.2025 09:54:50
  • Zuletzt bearbeitet 30.07.2025 21:25:03

A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 07.07.2025 09:54:22
  • Zuletzt bearbeitet 30.07.2025 21:28:24

A vulnerability in the ArxivReader class of the run-llama/llama_index repository, versions up to v0.12.22.post1, allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical title...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 07.07.2025 09:54:06
  • Zuletzt bearbeitet 30.07.2025 21:24:40

An XML Entity Expansion vulnerability, also known as a 'billion laughs' attack, exists in the sitemap parser of the run-llama/llama_index repository, specifically affecting version v0.12.21. This vulnerability allows an attacker to supply a malicious...