CVE-2024-10372

A vulnerability classified as problematic was found in chidiwilliams buzz 1.1.0. This vulnerability affects the function download_model of the file buzz/model_loader.py. The manipulation leads to insecure temporary file. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

More information : https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md

Attack vector : LOCAL
Attack complexity : HIGH
Privileges required : LOW
User interaction : NONE
Confidentiality impact : NONE
Integrity impact : LOW
Base score : 3.6
Base severity : LOW
Exploitability score : 1
Impact score : 2.5