Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| parisneo | parisneo/lollms-webui | unspecified ~ latest | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An absolute path traversal vulnerability exists in parisneo/lollms-webui v9.6, specifically in the open_file endpoint of lollms_advanced.py. The sanitize_path function with allow_absolute_path=True allows an attacker to access arbitrary files and directories on a Windows system. This vulnerability can be exploited to read any file and list arbitrary directories on the affected system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-6250.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet