Ollama

Ollama

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.44%
  • Veröffentlicht 20.03.2025 10:10:02
  • Zuletzt bearbeitet 02.04.2025 16:07:20

A vulnerability in ollama/ollama versions <=0.3.14 allows a malicious user to upload and create a customized GGUF model file on the Ollama server. This can lead to a division by zero error in the ggufPadding function, causing the server to crash and ...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 20.03.2025 10:09:48
  • Zuletzt bearbeitet 02.04.2025 16:02:38

A vulnerability in ollama/ollama <=0.3.14 allows a malicious user to create a customized GGUF model file, upload it to the Ollama server, and create it. This can cause the server to allocate unlimited memory, leading to a Denial of Service (DoS) atta...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 20.03.2025 10:08:47
  • Zuletzt bearbeitet 13.05.2025 13:28:08

A vulnerability in Ollama versions <=0.3.14 allows a malicious user to create a customized gguf model file that can be uploaded to the public Ollama server. When the server processes this malicious model, it crashes, leading to a Denial of Service (D...

Exploit
  • EPSS 49.21%
  • Veröffentlicht 31.10.2024 20:15:05
  • Zuletzt bearbeitet 13.05.2025 14:24:04

An issue was discovered in Ollama before 0.1.46. It exposes which files exist on the server on which it is deployed via path traversal in the api/push route.

Exploit
  • EPSS 0.16%
  • Veröffentlicht 31.10.2024 20:15:04
  • Zuletzt bearbeitet 13.05.2025 12:53:35

An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run in...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 31.10.2024 20:15:04
  • Zuletzt bearbeitet 13.05.2025 13:28:14

An issue was discovered in Ollama before 0.1.46. An attacker can use two HTTP requests to upload a malformed GGUF file containing just 4 bytes starting with the GGUF custom magic header. By leveraging a custom Modelfile that includes a FROM statement...

Exploit
  • EPSS 8.46%
  • Veröffentlicht 31.10.2024 20:15:04
  • Zuletzt bearbeitet 13.05.2025 13:32:48

An issue was discovered in Ollama through 0.3.14. File existence disclosure can occur via api/create. When calling the CreateModel route with a path parameter that does not exist, it reflects the "File does not exist" error message to the attacker, p...

  • EPSS 29.08%
  • Veröffentlicht 29.08.2024 03:15:05
  • Zuletzt bearbeitet 30.08.2024 16:08:54

extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory.

Exploit
  • EPSS 93.82%
  • Veröffentlicht 31.05.2024 04:15:09
  • Zuletzt bearbeitet 01.05.2025 14:01:44

Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ ...

  • EPSS 0.15%
  • Veröffentlicht 08.04.2024 19:15:07
  • Zuletzt bearbeitet 13.05.2025 00:42:52

Ollama before 0.1.29 has a DNS rebinding vulnerability that can inadvertently allow remote access to the full API, thereby letting an unauthorized user chat with a large language model, delete a model, or cause a denial of service (resource exhaustio...