From 2c9154ecdf6d080fcff094257e9cba11f6641261 Mon Sep 17 00:00:00 2001 From: Andrew Rathbun <36825567+AndrewRathbun@users.noreply.github.com> Date: Sat, 26 Oct 2024 15:49:40 -0400 Subject: [PATCH] Update PowerShell_Ollama_AI_cve-2024-37032.mkape --- Modules/Apps/PowerShell_Ollama_AI_cve-2024-37032.mkape | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Modules/Apps/PowerShell_Ollama_AI_cve-2024-37032.mkape b/Modules/Apps/PowerShell_Ollama_AI_cve-2024-37032.mkape index ed27b8451..72619867e 100644 --- a/Modules/Apps/PowerShell_Ollama_AI_cve-2024-37032.mkape +++ b/Modules/Apps/PowerShell_Ollama_AI_cve-2024-37032.mkape @@ -15,6 +15,6 @@ Processors: # Ollama is used for self-hosted AI inference, and it supports many models out of the box. # Ollama serves as the backend for common AI projects such as OpenWebUI, among others. # The code will identify the installed Models, the Model Integrity hash and the Ollama PrivateKey. -#.\kape.exe --msource c:\ --mdest k:\case-12345\Kape\mout --module powershell_ollama_ai_cve-2024-37032 +# .\kape.exe --msource c:\ --mdest k:\case-12345\Kape\mout --module powershell_ollama_ai_cve-2024-37032 # https://www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032 # https://owasp.org/www-community/attacks/Path_Traversal