Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Take first steps in CodeQL for Python by writing a query to find CVE-2024-32022 | https://github.com/sylwia-budzynska/codeql-workshop | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-32025 | 9.1 CRITICAL | Kohya_ss is vulnerable to a command injection in `group_images_gui.py` (`GHSL-2024-021`) |
| CVE-2024-32026 | 9.1 CRITICAL | Kohya_ss is vulnerable to a command injection in `git_caption_gui.py` (`GHSL-2024-020`) |
| CVE-2024-32027 | 9.1 CRITICAL | Kohya_ss is vulnerable to a command injection in `finetune_gui.py` (`GHSL-2024-022`) |
| CVE-2024-32023 | 6.5 MEDIUM | Kohya_ss vulnerable to path injection in `common_gui.py` `find_and_replace` function (`GHS |
| CVE-2024-32024 | 6.5 MEDIUM | Kohya_ss vulenrable to path injection in `common_gui.py` `add_pre_postfix` function (`GHSL |
No comments yet