Количество 7
Количество 7
CVE-2025-1550
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
CVE-2025-1550
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
CVE-2025-1550
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
CVE-2025-1550
Arbitrary Code Execution via Crafted Keras Config for Model Loading
CVE-2025-1550
The Keras Model.load_model function permits arbitrary code execution, ...
GHSA-48g7-3x6r-xfhp
Arbitrary Code Execution via Crafted Keras Config for Model Loading
BDU:2025-02637
Уязвимость функции Keras Model.load_model библиотеки Keras, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-1550 The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading. | CVSS3: 9.8 | 7% Низкий | 8 месяцев назад | |
CVE-2025-1550 The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading. | CVSS3: 8.2 | 7% Низкий | 8 месяцев назад | |
CVE-2025-1550 The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading. | CVSS3: 9.8 | 7% Низкий | 8 месяцев назад | |
CVE-2025-1550 Arbitrary Code Execution via Crafted Keras Config for Model Loading | CVSS3: 9.8 | 7% Низкий | 4 месяца назад | |
CVE-2025-1550 The Keras Model.load_model function permits arbitrary code execution, ... | CVSS3: 9.8 | 7% Низкий | 8 месяцев назад | |
GHSA-48g7-3x6r-xfhp Arbitrary Code Execution via Crafted Keras Config for Model Loading | 7% Низкий | 8 месяцев назад | ||
BDU:2025-02637 Уязвимость функции Keras Model.load_model библиотеки Keras, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.2 | 7% Низкий | 8 месяцев назад |
Уязвимостей на страницу