Keras

Keras

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 11.02.2026 22:10:10
  • Zuletzt bearbeitet 26.02.2026 23:23:59

Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file ut...

  • EPSS 0.03%
  • Veröffentlicht 15.01.2026 14:09:53
  • Zuletzt bearbeitet 23.01.2026 18:35:49

Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the P...

  • EPSS 0.12%
  • Veröffentlicht 30.10.2025 17:15:37
  • Zuletzt bearbeitet 04.11.2025 15:41:56

The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without the filter="data" feature. A remote attacker can c...

  • EPSS 0.08%
  • Veröffentlicht 29.10.2025 08:48:29
  • Zuletzt bearbeitet 30.10.2025 15:03:13

The Keras.Model.load_model method, including when executed with the intended security mitigation safe_mode=True, is vulnerable to arbitrary local file loading and Server-Side Request Forgery (SSRF). This vulnerability stems from the way the StringL...

  • EPSS 0.1%
  • Veröffentlicht 17.10.2025 15:20:27
  • Zuletzt bearbeitet 21.10.2025 19:31:50

Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end us...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 19.09.2025 08:16:44
  • Zuletzt bearbeitet 23.09.2025 16:53:40

The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be ex...

  • EPSS 0.08%
  • Veröffentlicht 19.09.2025 08:15:04
  • Zuletzt bearbeitet 23.09.2025 16:53:28

The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .keras model archive that, when loaded via Model.load_model, will trigger arbitrary code to be execu...

  • EPSS 0.01%
  • Veröffentlicht 11.08.2025 07:21:16
  • Zuletzt bearbeitet 14.08.2025 16:24:41

A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.

Exploit
  • EPSS 4.79%
  • Veröffentlicht 11.03.2025 08:12:34
  • Zuletzt bearbeitet 31.07.2025 16:55:39

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python mo...

  • EPSS 0.15%
  • Veröffentlicht 08.01.2025 17:15:15
  • Zuletzt bearbeitet 22.09.2025 17:47:22

An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function.