{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:14:16.968","vulnerabilities":[{"cve":{"id":"CVE-2024-12044","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:26.387","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the `pickle.loads()` function in the `all_reduce_dict()` distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network."},{"lang":"es","value":"Existe una vulnerabilidad de ejecución remota de código en open-mmlab/mmdetection versión v3.3.0. Esta vulnerabilidad se debe al uso de la función `pickle.loads()` en la API de entrenamiento distribuido `all_reduce_dict()` sin la debida depuración. Esto permite a un atacante ejecutar código arbitrario mediante la difusión de un payload malicioso a la red de entrenamiento distribuido."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"references":[{"url":"https://huntr.com/bounties/f7e4fc32-e167-49fb-9fc7-f092b9c27e8a","source":"security@huntr.dev"}]}}]}