{"uuid": "bb17e9ca-b828-42cf-aa39-7b4f94824126", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7776", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8224", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-7776\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability in the `download_model` function of the onnx/onnx framework, before and including version 1.16.1, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability can be exploited by an attacker to overwrite files in the user's directory, potentially leading to remote command execution.\n\ud83d\udccf Published: 2025-03-20T10:10:58.740Z\n\ud83d\udccf Modified: 2025-03-20T15:52:00.491Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/a7a46cf6-1fa0-454b-988c-62d222e83f63", "creation_timestamp": "2025-03-20T16:18:12.000000Z"}