Safety vulnerability ID: 76312
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
Latest version: 3.9.2
Multi-backend Keras
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application