CVE-2024-091707.03.2024, 09:15remote code execution in paddlepaddle/paddle 2.6.0Code InjectionEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST9.8 CRITICALNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H@huntr_aiCNA9.4 CRITICALNETWORKLOWNONECVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:LCVEADP------CISA-ADPADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 81%VendorProductVersionpaddlepaddlepaddlepaddle2.6.0𝑥= Vulnerable software versionsKnown Exploits!https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119Common Weakness EnumerationCWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Referenceshttps://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119