Safety vulnerability ID: 76296
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In h2oai/h2o-3 version 3.46.0.1, the run_tool command exposes classes in the water.tools package through the ast parser. This includes the XGBoostLibExtractTool class, which can be exploited to shut down the server and write large files to arbitrary directories, leading to a denial of service.
Latest version: 3.46.0.7
H2O, Fast Scalable Machine Learning, for python
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application