{"uuid": "eafbac41-50f0-4b39-bd27-493bee92568e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1550", "type": "seen", "source": "https://t.me/cvedetector/20053", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1550 - Apache Keras Safe Mode RCE Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1550 \nPublished : March 11, 2025, 9:15 a.m. | 50\u00a0minutes ago \nDescription : The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T11:46:19.000000Z"}