0.0
NA
CVE-2024-57000
Anyscale Inc Ray Remote Code Execution Vulnerability
Description

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-48022. Reason: This candidate is a duplicate of CVE-2023-48022. Notes: All CVE users should reference CVE-2023-48022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

INFO

Published Date :

Feb. 11, 2025, 11:15 p.m.

Last Modified :

Feb. 14, 2025, 6:15 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2024-57000 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Ray_project ray
Solution
This CVE is a duplicate and should not be used. Reference the correct CVE for remediation.
  • Refer to CVE-2023-48022 for actual remediation steps.
  • Do not use this candidate identifier.
Public PoC/Exploit Available at Github

CVE-2024-57000 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

PowerShell Shell HTML Python

Updated: 7 months, 2 weeks ago
1 stars 1 fork 1 watcher
Born at : July 8, 2025, 7:25 a.m. This repo has been linked 7 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-57000 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-57000 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Rejected by [email protected]

    Feb. 14, 2025

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Feb. 14, 2025

    Action Type Old Value New Value
    Changed Description An issue in Anyscale Inc Ray between v.2.9.3 and v.2.40.0 allows a remote attacker to execute arbitrary code via a crafted script. Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-48022. Reason: This candidate is a duplicate of CVE-2023-48022. Notes: All CVE users should reference CVE-2023-48022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    Removed CVSS V3.1 CISA-ADP: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Removed CWE CISA-ADP: CWE-94
    Removed Reference MITRE: https://github.com/honysyang/Ray.git
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Feb. 12, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-94
  • New CVE Received by [email protected]

    Feb. 11, 2025

    Action Type Old Value New Value
    Added Description An issue in Anyscale Inc Ray between v.2.9.3 and v.2.40.0 allows a remote attacker to execute arbitrary code via a crafted script.
    Added Reference https://github.com/honysyang/Ray.git
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.