{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T00:57:53.397","vulnerabilities":[{"cve":{"id":"CVE-2024-9070","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:46.570","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A deserialization vulnerability exists in BentoML's runner server in bentoml/bentoml versions <=1.3.4.post1. By setting specific parameters, an attacker can execute unauthorized arbitrary code on the server, causing severe harm. The vulnerability is triggered when the args-number parameter is greater than 1, leading to automatic deserialization and arbitrary code execution."},{"lang":"es","value":"Existe una vulnerabilidad de deserialización en el servidor de ejecución de BentoML en las versiones de bentoml/bentoml anteriores a la 1.3.4.post1. Al configurar parámetros específicos, un atacante puede ejecutar código arbitrario no autorizado en el servidor, lo que causa graves daños. La vulnerabilidad se activa cuando el parámetro args-number es mayor que 1, lo que provoca la deserialización automática y la ejecución de código arbitrario."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"references":[{"url":"https://huntr.com/bounties/7be6fc22-be18-44ee-a001-ac7158d5e1a5","source":"security@huntr.dev"}]}}]}