zenml v0.55.4 was discovered to contain an arbitrary file upload vulnerability in the load function at /materializers/cloudpickle_materializer.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://github.com/bayuncao/vul-cve-18 |     | 
History
                    Mon, 05 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:zenml:zenml:0.55.4:*:*:*:*:*:*:* | 
Thu, 10 Apr 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Zenml Zenml zenml | |
| CPEs | cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:* | |
| Vendors & Products | Zenml Zenml zenml | |
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2024-03-14T00:00:00.000Z
Updated: 2025-04-10T20:32:35.303Z
Reserved: 2024-03-08T00:00:00.000Z
Link: CVE-2024-28424
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T00:56:57.534Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-03-14T19:15:50.930
Modified: 2025-05-05T17:53:36.393
Link: CVE-2024-28424
 Redhat
                        Redhat
                    No data.