Логотип exploitDog
bind:CVE-2024-9053
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-9053

Количество 4

Количество 4

redhat логотип

CVE-2024-9053

10 месяцев назад

vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.

CVSS3: 2.6
EPSS: Низкий
nvd логотип

CVE-2024-9053

10 месяцев назад

vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2024-9053

10 месяцев назад

vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncE ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-cj47-qj6g-x7r4

10 месяцев назад

vLLM allows Remote Code Execution by Pickle Deserialization via AsyncEngineRPCServer() RPC server entrypoints

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-9053

vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.

CVSS3: 2.6
2%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-9053

vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.

CVSS3: 9.8
2%
Низкий
10 месяцев назад
debian логотип
CVE-2024-9053

vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncE ...

CVSS3: 9.8
2%
Низкий
10 месяцев назад
github логотип
GHSA-cj47-qj6g-x7r4

vLLM allows Remote Code Execution by Pickle Deserialization via AsyncEngineRPCServer() RPC server entrypoints

CVSS3: 9.8
2%
Низкий
10 месяцев назад

Уязвимостей на страницу