{"vulnerability": "CVE-2025-1550", "sightings": [{"uuid": "b660c906-0245-4616-b4e0-eced17b0846d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1550", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lu6tdma2e32w", "content": "", "creation_timestamp": "2025-07-17T21:02:29.350888Z"}, {"uuid": "1acf6b59-463e-411e-9833-24e4a4944056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1550", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lkd2qkl7n227", "content": "", "creation_timestamp": "2025-03-14T07:13:32.853693Z"}, {"uuid": "def09628-39b2-449c-8f53-f58b88b425a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15509", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mfth5c2gew2e", "content": "", "creation_timestamp": "2026-02-27T09:58:14.455469Z"}, {"uuid": "6c616e95-bd4b-4077-82c0-9d3d8628a696", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15503", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-15503.yaml", "content": "", "creation_timestamp": "2026-02-11T09:38:10.000000Z"}, {"uuid": "30671b0d-e4cc-4bd4-866c-16902719c2a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15502", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mc2ygd3jvb2e", "content": "", "creation_timestamp": "2026-01-10T12:15:22.433330Z"}, {"uuid": "187a0598-bc9e-48d8-a97a-0a64884ad6fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15503", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mgvcd3qrn52w", "content": "", "creation_timestamp": "2026-03-12T21:02:38.540755Z"}, {"uuid": "8017e32e-2c65-4ef4-b149-58eb5898ecaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15500", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mbzlz4zqto2p", "content": "", "creation_timestamp": "2026-01-09T23:00:36.222144Z"}, {"uuid": "cd5364a0-6bb6-455e-9d56-c4875a707c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15500", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mbzm2cmv4u2f", "content": "", "creation_timestamp": "2026-01-09T23:01:15.432654Z"}, {"uuid": "dc0c2770-2474-4c1f-a20f-c89db36c9210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15500", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mbzm4iel2q2a", "content": "", "creation_timestamp": "2026-01-09T23:02:28.527905Z"}, {"uuid": "ac9fc7ce-a4cb-4d6d-b6ce-220008601639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15501", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mbzn7dgheh2g", "content": "", "creation_timestamp": "2026-01-09T23:21:57.825776Z"}, {"uuid": "94b915d5-7892-4176-a3c8-cb8368df9b97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15501", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbzozusc542q", "content": "", "creation_timestamp": "2026-01-09T23:54:41.552440Z"}, {"uuid": "229a435e-f805-4b8c-8481-97665d54e16c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15500", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbzplrmcpi2g", "content": "", "creation_timestamp": "2026-01-10T00:04:42.451110Z"}, {"uuid": "7b955a7f-488f-41e8-8824-8b2a2364771f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15503", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mc322qun4y2q", "content": "", "creation_timestamp": "2026-01-10T12:44:42.174290Z"}, {"uuid": "f92b6db9-a5cd-41ff-b2a6-81a7cf2a4195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15504", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mc3dtaz46y2m", "content": "", "creation_timestamp": "2026-01-10T15:39:27.992825Z"}, {"uuid": "e37f9bd2-5954-46e1-8161-9fd95a6af972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15505", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mc4lju2pkm2e", "content": "", "creation_timestamp": "2026-01-11T03:30:01.903595Z"}, {"uuid": "1b3d15ec-44f9-4e23-a126-77e6a548b35e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15506", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mc5gwwh73g22", "content": "", "creation_timestamp": "2026-01-11T11:40:31.764833Z"}, {"uuid": "c4a1a071-8aa7-45e8-bccf-e92daaf42e18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15503", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-25)", "content": "", "creation_timestamp": "2026-03-25T00:00:00.000000Z"}, {"uuid": "024be782-dc52-4648-8f24-d1adbdc1a7ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15506", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115876695460772125", "content": "", "creation_timestamp": "2026-01-11T13:27:33.741551Z"}, {"uuid": "21fb4113-8979-4037-afaf-941d780c5fc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15501", "type": "published-proof-of-concept", "source": "Telegram/ylcODQd3Ghk_u3NxDdtmMfOkVOn_WhDQ3Q3s4y1swSp7-7I", "content": "", "creation_timestamp": "2026-01-10T00:04:56.000000Z"}, {"uuid": "eafbac41-50f0-4b39-bd27-493bee92568e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1550", "type": "seen", "source": "https://t.me/cvedetector/20053", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1550 - Apache Keras Safe Mode RCE Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1550 \nPublished : March 11, 2025, 9:15 a.m. | 50\u00a0minutes ago \nDescription : The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T11:46:19.000000Z"}, {"uuid": "f1a3a3b7-7090-4d49-90bf-a7446215258d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1550", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7118", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1550\n\ud83d\udd25 CVSS Score: 7.3 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.\n\ud83d\udccf Published: 2025-03-11T08:12:34.974Z\n\ud83d\udccf Modified: 2025-03-11T08:12:34.974Z\n\ud83d\udd17 References:\n1. https://github.com/keras-team/keras/pull/20751", "creation_timestamp": "2025-03-11T08:38:53.000000Z"}, {"uuid": "89dca613-448e-43f1-b00c-ea418f92f77e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15500", "type": "published-proof-of-concept", "source": "Telegram/-kDXONxRqavwq-Pnrvr7A0ZsXrbz45BomGjWd6QYQrGEWk4", "content": "", "creation_timestamp": "2026-01-09T23:07:31.000000Z"}, {"uuid": "1cc3daca-3c19-4d5c-ac9b-5d11899cc721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1550", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9845", "content": "Inside CVE-2025-1550: Remote Code Execution via Keras Models\n\nhttps://blog.huntr.com/inside-cve-2025-1550-remote-code-execution-via-keras-models", "creation_timestamp": "2025-05-11T12:00:52.000000Z"}, {"uuid": "0b1a4056-e236-4189-95c7-8cc0d2d3db71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15503", "type": "published-proof-of-concept", "source": "Telegram/HEyoP6o_w_uKqhNpzRpz0TBMoTyViJcn1NOxzI3l-iTxrJI", "content": "", "creation_timestamp": "2026-01-10T10:00:13.000000Z"}, {"uuid": "09b0c100-1345-4b0a-bd54-fd9a0e0d4777", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-15502", "type": "published-proof-of-concept", "source": "Telegram/kNwatoZ7i9RhmIy1lcaojAEU2Vj4FvxeHvBbtht-pLYnTPo", "content": "", "creation_timestamp": "2026-01-10T09:00:25.000000Z"}, {"uuid": "91b3f499-5ecc-495f-ac17-baa8d4bb3960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1550", "type": "published-proof-of-concept", "source": "Telegram/pkXIaiZyZuzT_Pl6hZZWn5mEgJvxrDSmjrnTe04Bm5-D6EY", "content": "", "creation_timestamp": "2025-03-11T10:30:14.000000Z"}]}