Safety vulnerability ID: 76195
The information on this page was manually curated by our Cybersecurity Intelligence Team.
vllm-project vllm version 0.6.0 contains a vulnerability in the distributed training API. The function vllm.distributed.GroupCoordinator.recv_object() deserializes received object bytes using pickle.loads() without sanitization, leading to a remote code execution vulnerability.
Latest version: 0.8.3
A high-throughput and memory-efficient inference and serving engine for LLMs
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application