Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| mlflow | mlflow/mlflow | unspecified ~ 2.11.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Arbitrary file read exploit for CVE-2024-2928 in mlflow | https://github.com/nuridincersaygili/CVE-2024-2928 | POC Details |
| 2 | MLflow versions prior to 2.11.3 are vulnerable to a Path Traversal attack due to improper URI fragment parsing. This vulnerability allows attackers to read arbitrary files on the server, potentially exposing sensitive information. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-2928.yaml | POC Details |
| 3 | yasa扫描sjtu_CVE-2024-2928漏洞报告 | https://github.com/rain321654/sjtu_CVE-2024-2928 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet