Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0992 | Command injection in paddle.utils.download._wget_download (bypass filter) in paddlepaddle/paddle 2.6.0 |
Github GHSA |
GHSA-qqv2-35q8-p2g2 | PaddlePaddle command injection in paddle.utils.download._wget_download |
Sun, 19 Jan 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Paddlepaddle
Paddlepaddle paddlepaddle |
|
| CPEs | cpe:2.3:a:paddlepaddle:paddlepaddle:2.6.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Paddlepaddle
Paddlepaddle paddlepaddle |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-02-13T17:27:27.221Z
Reserved: 2024-01-23T01:13:44.482Z
Link: CVE-2024-0815
Updated: 2024-08-01T18:18:18.739Z
Status : Analyzed
Published: 2024-03-07T04:15:07.143
Modified: 2025-01-19T02:23:10.973
Link: CVE-2024-0815
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA