Логотип exploitDog
bind:CVE-2024-6483
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6483

Количество 2

Количество 2

nvd логотип

CVE-2024-6483

11 месяцев назад

A vulnerability in the `runs/delete-batch` endpoint of aimhubio/aim version 3.19.3 allows for arbitrary file or directory deletion through path traversal. The endpoint does not mitigate path traversal when handling user-specified run-names, which are used to specify log/metadata files for deletion. This can be exploited to delete arbitrary files or directories, potentially causing denial of service or data loss.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-p6x3-v6g3-7557

11 месяцев назад

Aim Relative Path Traversal vulnerability

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6483

A vulnerability in the `runs/delete-batch` endpoint of aimhubio/aim version 3.19.3 allows for arbitrary file or directory deletion through path traversal. The endpoint does not mitigate path traversal when handling user-specified run-names, which are used to specify log/metadata files for deletion. This can be exploited to delete arbitrary files or directories, potentially causing denial of service or data loss.

CVSS3: 5.3
0%
Низкий
11 месяцев назад
github логотип
GHSA-p6x3-v6g3-7557

Aim Relative Path Traversal vulnerability

CVSS3: 5.3
0%
Низкий
11 месяцев назад

Уязвимостей на страницу