{"id":"CVE-2024-30850","details":"An issue in tiagorlampert CHAOS v5.0.1 allows a remote attacker to execute arbitrary code via the BuildClient function within client_service.go","aliases":["CVE-2024-33434","GHSA-p3j6-f45h-hw5f","GHSA-xfjj-f699-rc79","GO-2024-2822"],"modified":"2026-05-04T08:37:17.217740Z","published":"2024-04-12T06:15:06.943Z","withdrawn":"2026-05-04T08:37:17.217740Z","references":[{"type":"EVIDENCE","url":"https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-30850.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.0.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}