works
Bug Hunting
Netease
2 Vulnerability foundNetease Internet technology company
LoLLMs
12 CVEs foundParisNeo/lollms-webui LLM Hosting UI Platform
Llama-Cpp-Python Remote Code Execution by Server-Side Template Injection in Model Metadata
Remote-Code Execution due to Server-Side Template Injection of unportection renderer behaviour in GGUF Model Metadata in Llama-cpp-Python
Transformers has a Deserialization of Untrusted Data
Transformers contains a Deserialization of Untrusted Data vulnerability within the load_repo_checkpoint() function under the TFPreTrainedModel() class. This vulnerability enables attackers to execute arbitrary code and commands by using a carefully crafted serialized payload.
Transformers RCE in 'tools/base.py' -> 'load_tool'
Transformer's transformers.load_tool *(can be access via from transformers import tools; tools.load_tool or transformers.load_tool) will execute arbitrary Python Commands in a maliciously-built repo without any HuggingFace Warnings in Hub and no trust_remote_code is required.
ManageBac Stored XSS Vulnerability via MITM Request Modification
This vulnerability occurs when submitting any content (comments, discussions) using the built-in editor, where intercepting and modifying the packet with Burp Suite as a Man-In-The-Middle (MITM) attack is possible.
Microsoft Semantic Kernel RCE
Microsoft NLP Semantic Kernel Template Engine Remote-Code Execution
Using eval() to load external AWS Sagemaker LLM request leading Python Command Injections in imartinez/privategpt
In sagemaker.py 's SagemakerLLM class's complete(), Since PrivateGPT used eval() instead of json.loads() to load the remote-retrieved string into a dictionary, Python-OS-command injections payload can be parsed the response of AWS Sagemaker
Tenda AC8v4 contains Multiple Stack-Overflow leading RCE
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via multiple variable in the multiple functions. CVE-2023-33669 -> CVE-2023-33675
Arbitrary File Reading via Path Traversal in geopython/pygeoapi
This vulnerability allows malicious users to inject LFI Payloads bypassing the existing sanitizations into the path variable, causing read arbitrary file reading via ''.//././/.'; Fixed in pull/1593.
GateKeep.ai IDOR -> Arbitrary User-data edit and disclosure
IDOR -> Arbitrary User-data edit and disclosure in gatekeep.ai text-to-video generation platform. Attacker can arbitrary edit and disclose user-data by exploiting the flaw in privilege management.
Arbitrary File Overwrite in ZulipConnector when zuliprc- direcetory exists in danswer-ai/danswer
Arbitrary file overwrite vulnerability in ZulipConnector's load_credentials function due to unsanitized realm_name and credentials content handling when zuliprc- directory exists.
Projects
Tree-of-AST
Python Code Analysis framework inspired by ToT (Tree-of-Thoughts) of Deliberate Code analysing states using ToT-based ways.
AutoGDB
Automatic Binary-exploitation Tool combining GPT and GDB
ChatWithBinary (ChatWithBinary.com)
Advanced AI-powered binary analysis tool leveraging OpenAI's LangChain technology, revolutionizing CTF Pwners' experience in binary file interpretation and vulnerability detection.