CVE-2024-0815
Published Mar 7, 2024
Last updated 8 months ago
Overview
- Description
- Command injection in paddle.utils.download._wget_download (bypass filter) in paddlepaddle/paddle 2.6.0
- Source
- security@huntr.dev
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- 6
- Exploitability score
- 2.5
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- security@huntr.dev
- CWE-78
Social media
- Hype score
- Not currently trending