An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/hwchase17/langchain/issues/5872 |
![]() ![]() |
History
Fri, 22 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 | |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-22T16:46:55.583Z
Reserved: 2023-06-21T00:00:00
Link: CVE-2023-36258

Updated: 2024-08-02T16:45:56.359Z

Status : Modified
Published: 2023-07-03T21:15:09.797
Modified: 2024-11-22T17:15:05.750
Link: CVE-2023-36258

No data.