{"uuid": "c056c219-76be-431f-9687-2bbdcd8c3c76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21552", "type": "seen", "source": "https://t.me/cvedetector/1461", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21552 - SuperAGI Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-21552 \nPublished : July 22, 2024, 3:15 p.m. | 34\u00a0minutes ago \nDescription : All versions of `SuperAGI` are vulnerable to Arbitrary Code Execution due to unsafe use of the \u2018eval\u2019 function. An attacker could induce the LLM output to exploit this vulnerability and gain arbitrary code execution on the SuperAGI application server. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T17:50:06.000000Z"}