Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| parisneo | parisneo/lollms-webui | unspecified ~ latest | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | parisneo/lollms-webui contains a path traversal caused by improper handling of 'category' parameter in /list_personalities endpoint, letting attackers list arbitrary directories, exploit requires control over 'category' parameter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4322.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-2361 | Arbitrary Upload & Read via Path Traversal in parisneo/lollms-webui | |
| CVE-2024-2366 | Remote Code Execution in parisneo/lollms-webui | |
| CVE-2024-2358 | Path Traversal leading to Remote Code Execution in parisneo/lollms-webui | |
| CVE-2024-3126 | Command Injection in parisneo/lollms-webui | |
| CVE-2024-3435 | Path Traversal in parisneo/lollms-webui | |
| CVE-2024-4326 | Remote Code Execution via `/apply_settings` and `/execute_code` in parisneo/lollms-webui | |
| CVE-2024-4078 | Arbitrary Code Execution in parisneo/lollms |
No comments yet