CVE-2024-11041
20.03.2025, 10:15
vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.Enginsight
Vendor | Product | Version |
---|---|---|
vllm | vllm | 0.6.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration