Commit Graph

862 Commits (b3f282796103775ec3a9640a2f3531797785f628)
 

Author SHA1 Message Date
Alex 05ec1216e0
Merge pull request #363 from hirenchauhan2/feat/ui/170
feat(ui): add scroll to bottom button
1 year ago
Alex af0e6481f8 Update Conversation.tsx 1 year ago
Alex 11a745c4d9
Merge pull request #364 from arc53/bug/fix-test
Fix broken test
1 year ago
Alex 2393da4425
Update README.md 1 year ago
Alex 95ab08e02d Update test_celery.py 1 year ago
Alex 95fdedf12e
Merge pull request #361 from Ayush-Prabhu/patch-1
Grammatical corrections
1 year ago
Alex c73dd776db
Merge pull request #362 from arc53/feature/startup-script-cpu-inference
script + cpu optimisations
1 year ago
Alex 891e5fea3f
Update README.md 1 year ago
Alex bb2f6f23b5
Update README.md 1 year ago
Alex cd9b03bdb9 celery syncs 1 year ago
Alex a619269502 celery bugs 1 year ago
Hiren Chauhan 153b5c028b
feat(ui): add scroll to bottom button
This will show the scroll to bottom button when user scrolls to top from the last message.

Closes #170
1 year ago
Alex 9a33bf2210 script + cpu optimisations 1 year ago
Ayush-Prabhu 34b4cd2231
Grammatical corrections
Corrected grammatical errors and spelling errors in : docs/pages/Guides/My-AI-answers-questions-using-external-knowledge.md
1 year ago
Alex 6045cbbc62
Merge pull request #355 from arc53/feature/cpu-llm
llama-cpp local
1 year ago
Alex 9bbf4044e0 script 1 year ago
Alex fcf8a64d91
Merge pull request #360 from jbampton/fix-spelling
Fix spelling
1 year ago
John Bampton 2c6ab18e41 Fix spelling 1 year ago
Alex 2fea294b13 Update settings.py 1 year ago
Pavel b47ecab1a9 llama-cpp local 1 year ago
Pavel b86c294250
Merge pull request #354 from arc53/featue/elasticsearch
working es
1 year ago
Alex 3eacfb91aa fix314 1 year ago
Alex 94164c2a71
Merge branch 'main' into featue/elasticsearch 1 year ago
Alex d85eb83ea2 elastic search fixes 1 year ago
Alex b2002639db
Merge pull request #353 from arc53/bug/fix-aes-pdf
Update requirements.txt
1 year ago
Alex 347cfe253f elastic2 1 year ago
Pavel 833e1836e1
Merge pull request #352 from arc53/feature/aws-sagemaker-inference
sagemaker + llm creator class
1 year ago
Alex e4be38b9f7 sagemaker + llm creator class 1 year ago
Alex 783e7f6939 working es 1 year ago
Alex c1c54f4848
Update README.md 1 year ago
Alex 86be6be2d2
Update Dockerfile 1 year ago
Alex 35a63e867a
Merge pull request #345 from beardcodes/patch-1
Update Dockerfile
1 year ago
Alex 9c12a417ee
Update README.md 1 year ago
Alex 32a019c0d6 Update requirements.txt 1 year ago
Pavel b7e4a3c99e
Merge pull request #348 from arc53/feature/better-structure
Feature/better structure
1 year ago
Alex 039062d071 ruff fix 1 year ago
Alex 83ae3e8371 more ruff fixes 1 year ago
Alex 852de8bdfc ruff linting 1 year ago
Alex b8acb860aa some tests 1 year ago
Alex e6849b85d1 Create huggingface.py 1 year ago
Alex 8fa9657ba6 working full 1 year ago
Zakarya El Quaroui 04b038960b
Update Dockerfile
The current node version is vulnerable to buffer overflow. 

CVE-2022-3602
PUBLISHED
View JSON
X.509 Email Address 4-byte Buffer Overflow
Important CVE JSON 5 Information
Assigner: Openssl

Published: 2022-11-01Updated: 2022-11-03
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
1 year ago
Alex 52507a5a95
Merge pull request #342 from arc53/hacktoberfest 1 year ago
Alex d8505ba2ab
Update README.md 1 year ago
Alex fa26c0997e
Update index.mdx 1 year ago
Alex 5a0aadd2ae Hacktoberfest info 1 year ago
Alex 025549ebf8 fixes to make it work 1 year ago
Alex e85a583f0a testings 1 year ago
Alex f7244ddb7a
Merge pull request #340 from DenyTwice/main
UI Improvements, implements task 3 in issue #279
1 year ago
DenyTwice d983a519e3 Uncomments selectDocsModal, removes redundant styles 1 year ago