Headline
GHSA-g7ph-8423-pf4j: Code execution in metagpt
MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen.
Code execution in metagpt
High severity GitHub Reviewed Published Jan 22, 2024 to the GitHub Advisory Database • Updated Jan 22, 2024
ghsa: Latest News
GHSA-ggmv-j932-q89q: Chall-Manager's HTTP Gateway is vulnerable to DoS due to missing header timeout