{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T02:03:33.743","vulnerabilities":[{"cve":{"id":"CVE-2024-8502","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:42.733","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the RpcAgentServerLauncher class of modelscope/agentscope v0.0.6a3 allows for remote code execution (RCE) via deserialization of untrusted data using the dill library. The issue occurs in the AgentServerServicer.create_agent method, where serialized input is deserialized using dill.loads, enabling an attacker to execute arbitrary commands on the server."},{"lang":"es","value":"Una vulnerabilidad en la clase RpcAgentServerLauncher de modelscope/agentscope v0.0.6a3 permite la ejecución remota de código (RCE) mediante la deserialización de datos no confiables mediante la librería dill. El problema se produce en el método AgentServerServicer.create_agent, donde la entrada serializada se deserializa mediante dill.loads, lo que permite a un atacante ejecutar comandos arbitrarios en el servidor."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"references":[{"url":"https://huntr.com/bounties/7a42da2a-2ae5-442d-aff9-c9a3b47870eb","source":"security@huntr.dev"}]}}]}