Логотип exploitDog
bind:CVE-2024-10100
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10100

Количество 2

Количество 2

nvd логотип

CVE-2024-10100

больше 1 года назад

A path traversal vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of the file parameter, which is open to path traversal through URL encoding. This allows attackers to view any file on the host system, including sensitive files such as critical application files, SSH keys, API keys, and configuration values.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-hxww-jp5h-xqpc

больше 1 года назад

A path traversal vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of the file parameter, which is open to path traversal through URL encoding. This allows attackers to view any file on the host system, including sensitive files such as critical application files, SSH keys, API keys, and configuration values.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-10100

A path traversal vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of the file parameter, which is open to path traversal through URL encoding. This allows attackers to view any file on the host system, including sensitive files such as critical application files, SSH keys, API keys, and configuration values.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-hxww-jp5h-xqpc

A path traversal vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of the file parameter, which is open to path traversal through URL encoding. This allows attackers to view any file on the host system, including sensitive files such as critical application files, SSH keys, API keys, and configuration values.

CVSS3: 7.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу