Логотип exploitDog
bind:CVE-2025-1550
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-1550

Количество 7

Количество 7

ubuntu логотип

CVE-2025-1550

8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2025-1550

8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 8.2
EPSS: Низкий
nvd логотип

CVE-2025-1550

8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2025-1550

4 месяца назад

Arbitrary Code Execution via Crafted Keras Config for Model Loading

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2025-1550

8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-48g7-3x6r-xfhp

8 месяцев назад

Arbitrary Code Execution via Crafted Keras Config for Model Loading

EPSS: Низкий
fstec логотип

BDU:2025-02637

8 месяцев назад

Уязвимость функции Keras Model.load_model библиотеки Keras, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-1550

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
7%
Низкий
8 месяцев назад
redhat логотип
CVE-2025-1550

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 8.2
7%
Низкий
8 месяцев назад
nvd логотип
CVE-2025-1550

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
7%
Низкий
8 месяцев назад
msrc логотип
CVE-2025-1550

Arbitrary Code Execution via Crafted Keras Config for Model Loading

CVSS3: 9.8
7%
Низкий
4 месяца назад
debian логотип
CVE-2025-1550

The Keras Model.load_model function permits arbitrary code execution, ...

CVSS3: 9.8
7%
Низкий
8 месяцев назад
github логотип
GHSA-48g7-3x6r-xfhp

Arbitrary Code Execution via Crafted Keras Config for Model Loading

7%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-02637

Уязвимость функции Keras Model.load_model библиотеки Keras, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.2
7%
Низкий
8 месяцев назад

Уязвимостей на страницу