Commit Graph

913 Commits (39e8ba42ff4650a91b10ad80601178cbd6121fa1)
 

Author SHA1 Message Date
Alex 91878c4591
Update README.md 9 months ago
Alex 05ec1216e0
Merge pull request #363 from hirenchauhan2/feat/ui/170
feat(ui): add scroll to bottom button
9 months ago
Alex af0e6481f8 Update Conversation.tsx 9 months ago
Alex 11a745c4d9
Merge pull request #364 from arc53/bug/fix-test
Fix broken test
9 months ago
Alex 2393da4425
Update README.md 9 months ago
Alex 95ab08e02d Update test_celery.py 9 months ago
Alex 95fdedf12e
Merge pull request #361 from Ayush-Prabhu/patch-1
Grammatical corrections
9 months ago
Alex c73dd776db
Merge pull request #362 from arc53/feature/startup-script-cpu-inference
script + cpu optimisations
9 months ago
Alex 891e5fea3f
Update README.md 9 months ago
Alex bb2f6f23b5
Update README.md 9 months ago
Alex cd9b03bdb9 celery syncs 9 months ago
Alex a619269502 celery bugs 9 months ago
Hiren Chauhan 153b5c028b
feat(ui): add scroll to bottom button
This will show the scroll to bottom button when user scrolls to top from the last message.

Closes #170
9 months ago
Alex 9a33bf2210 script + cpu optimisations 9 months ago
Ayush-Prabhu 34b4cd2231
Grammatical corrections
Corrected grammatical errors and spelling errors in : docs/pages/Guides/My-AI-answers-questions-using-external-knowledge.md
9 months ago
Alex 6045cbbc62
Merge pull request #355 from arc53/feature/cpu-llm
llama-cpp local
9 months ago
Alex 9bbf4044e0 script 9 months ago
Alex fcf8a64d91
Merge pull request #360 from jbampton/fix-spelling
Fix spelling
9 months ago
John Bampton 2c6ab18e41 Fix spelling 9 months ago
Alex 2fea294b13 Update settings.py 9 months ago
Pavel b47ecab1a9 llama-cpp local 9 months ago
Pavel b86c294250
Merge pull request #354 from arc53/featue/elasticsearch
working es
9 months ago
Alex 3eacfb91aa fix314 9 months ago
Alex 94164c2a71
Merge branch 'main' into featue/elasticsearch 9 months ago
Alex d85eb83ea2 elastic search fixes 9 months ago
Alex b2002639db
Merge pull request #353 from arc53/bug/fix-aes-pdf
Update requirements.txt
9 months ago
Alex 347cfe253f elastic2 9 months ago
Pavel 833e1836e1
Merge pull request #352 from arc53/feature/aws-sagemaker-inference
sagemaker + llm creator class
9 months ago
Alex e4be38b9f7 sagemaker + llm creator class 9 months ago
Alex 783e7f6939 working es 9 months ago
Alex c1c54f4848
Update README.md 9 months ago
Alex 86be6be2d2
Update Dockerfile 9 months ago
Alex 35a63e867a
Merge pull request #345 from beardcodes/patch-1
Update Dockerfile
9 months ago
Alex 9c12a417ee
Update README.md 9 months ago
Alex 32a019c0d6 Update requirements.txt 10 months ago
Pavel b7e4a3c99e
Merge pull request #348 from arc53/feature/better-structure
Feature/better structure
10 months ago
Alex 039062d071 ruff fix 10 months ago
Alex 83ae3e8371 more ruff fixes 10 months ago
Alex 852de8bdfc ruff linting 10 months ago
Alex b8acb860aa some tests 10 months ago
Alex e6849b85d1 Create huggingface.py 10 months ago
Alex 8fa9657ba6 working full 10 months ago
Zakarya El Quaroui 04b038960b
Update Dockerfile
The current node version is vulnerable to buffer overflow. 

CVE-2022-3602
PUBLISHED
View JSON
X.509 Email Address 4-byte Buffer Overflow
Important CVE JSON 5 Information
Assigner: Openssl

Published: 2022-11-01Updated: 2022-11-03
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
10 months ago
Alex 52507a5a95
Merge pull request #342 from arc53/hacktoberfest 10 months ago
Alex d8505ba2ab
Update README.md 10 months ago
Alex fa26c0997e
Update index.mdx 10 months ago
Alex 5a0aadd2ae Hacktoberfest info 10 months ago
Alex 025549ebf8 fixes to make it work 10 months ago
Alex e85a583f0a testings 10 months ago
Alex f7244ddb7a
Merge pull request #340 from DenyTwice/main
UI Improvements, implements task 3 in issue #279
10 months ago