Path traversal vulnerability in apply_settings functio
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2024-6281 Path Traversal in parisneo/lollms | 20 Jul 202403:19 | – | cvelist |
![]() | GHSA-8MRM-R7H3-C3HJ LoLLMS vulnerable to Expected Behavior Violation | 20 Jul 202406:30 | – | osv |
![]() | CVE-2024-6281 | 20 Jul 202404:15 | – | osv |
![]() | LoLLMS vulnerable to Expected Behavior Violation | 20 Jul 202406:30 | – | github |
![]() | Path Traversal | 26 Jul 202405:55 | – | veracode |
![]() | CVE-2024-6281 Path Traversal in parisneo/lollms | 20 Jul 202403:19 | – | vulnrichment |
![]() | CVE-2024-6281 | 5 Feb 202503:03 | – | redhatcve |
![]() | CVE-2024-6281 | 20 Jul 202404:15 | – | nvd |
[
{
"vendor": "parisneo",
"product": "parisneo/lollms",
"versions": [
{
"version": "unspecified",
"lessThan": "9.5.1",
"status": "affected",
"versionType": "custom"
}
]
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
discussion_db_name | request body | /parisneo/lollms/apply_settings | Path traversal vulnerability allowing manipulation of system paths via the discussion_db_name parameter. | CWE-440 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo