Metrics
Affected Vendors & Products
Thu, 10 Jul 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Superagi
Superagi superagi |
|
| CPEs | cpe:2.3:a:superagi:superagi:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Superagi
Superagi superagi |
Mon, 23 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Jun 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, was found in TransformerOptimus SuperAGI up to 0.0.14. Affected is the function download_attachment of the file SuperAGI/superagi/helper/read_email.py of the component EmailToolKit. The manipulation of the argument filename leads to path traversal. The exploit has been disclosed to the public and may be used. | |
| Title | TransformerOptimus SuperAGI EmailToolKit read_email.py download_attachment path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-19T21:27:45.359Z
Updated: 2025-06-23T19:29:57.906Z
Reserved: 2025-06-19T06:55:34.431Z
Link: CVE-2025-6280
Updated: 2025-06-23T16:16:22.548Z
Status : Analyzed
Published: 2025-06-19T22:15:20.160
Modified: 2025-07-09T23:56:04.580
Link: CVE-2025-6280
No data.
ReportizFlow