Metrics
Affected Vendors & Products
Wed, 15 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-208 |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 14 Nov 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 |
Wed, 13 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-203 | |
| CPEs | cpe:2.3:a:mudler:localai:2.17.1:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 29 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mudler
Mudler localai |
|
| CPEs | cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mudler
Mudler localai |
|
| Metrics |
ssvc
|
Tue, 29 Oct 2024 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access. | |
| Title | Timing Attack in mudler/localai | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-10-29T12:48:29.287Z
Updated: 2025-10-15T12:50:35.354Z
Reserved: 2024-07-23T03:56:04.540Z
Link: CVE-2024-7010
Updated: 2024-10-29T13:30:26.296Z
Status : Modified
Published: 2024-10-29T13:15:08.683
Modified: 2025-10-15T13:15:50.737
Link: CVE-2024-7010
No data.