Логотип exploitDog
bind:CVE-2024-12044
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-12044

Количество 2

Количество 2

nvd логотип

CVE-2024-12044

11 месяцев назад

A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the `pickle.loads()` function in the `all_reduce_dict()` distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-mvp8-9qgw-vf58

11 месяцев назад

A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the `pickle.loads()` function in the `all_reduce_dict()` distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-12044

A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the `pickle.loads()` function in the `all_reduce_dict()` distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network.

CVSS3: 9.8
2%
Низкий
11 месяцев назад
github логотип
GHSA-mvp8-9qgw-vf58

A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the `pickle.loads()` function in the `all_reduce_dict()` distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network.

CVSS3: 9.8
2%
Низкий
11 месяцев назад

Уязвимостей на страницу