CVE-2024-10110

In version 3.23.0 of aimhubio/aim, the ScheduledStatusReporter object can be instantiated to run on the main thread of the tracking server, leading to the main thread being blocked indefinitely. This results in a denial of service as the tracking server becomes unable to respond to other requests.
References
Link Resource
https://huntr.com/bounties/5ea6cf56-7b4c-4dce-9b6c-3e910fbb1ae4 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:aimstack:aim:3.23.0:*:*:*:*:python:*:*

History

23 Jul 2025, 20:56

Type Values Removed Values Added
Summary
  • (es) En la versión 3.23.0 de aimhubio/aim, el objeto ScheduledStatusReporter puede instanciarse para ejecutarse en el hilo principal del servidor de seguimiento, lo que provoca el bloqueo indefinido de dicho hilo. Esto provoca una denegación de servicio, ya que el servidor de seguimiento no puede responder a otras solicitudes.
CPE cpe:2.3:a:aimstack:aim:3.23.0:*:*:*:*:python:*:*
First Time Aimstack aim
Aimstack
References () https://huntr.com/bounties/5ea6cf56-7b4c-4dce-9b6c-3e910fbb1ae4 - () https://huntr.com/bounties/5ea6cf56-7b4c-4dce-9b6c-3e910fbb1ae4 - Exploit, Third Party Advisory

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-23 20:56


NVD link : CVE-2024-10110

Mitre link : CVE-2024-10110

CVE.ORG link : CVE-2024-10110


JSON object : View

Products Affected

aimstack

  • aim
CWE
CWE-400

Uncontrolled Resource Consumption