Bounties
Partners
Community
Info
vllm-project / vllm
Project repository
A high-throughput and memory-efficient inference and serving engine for LLMs
Submit a report
FIRST INTERACTION
WITHIN
34 DAYS
REVIEW
WITHIN
35 DAYS
FIX
WITHIN
N/A DAYS
vLLM Server Unsafe Deserialization Leads to Arbitrary Code Execution
Mar 22nd 2025
racerz-fighting
•
not applicable
Remote Code Execution in Insecure Pickle Deserialization via recv_obj() in class...
Feb 20th 2025
seaw1nd
•
duplicate
Critical
vLLM Server Unsafe Deserialization Leads to Arbitrary Code Execution
Feb 1st 2025
avilum
•
informative
Critical
Remote Code Execution by Pickle Deserialization via MessageQueue.dequeue() Broad...
Dec 30th 2024
zpbrent
•
Critical
•
$1500
Critical
•
$1500
•
CVE-2024-11041
CVE-2024-11041
"POST /v1/completions" and "POST /v1/embeddings" Denials of Service
Dec 16th 2024
rh-tguittet
•
High
•
$750
High
•
$750
•
CVE-2024-11040
CVE-2024-11040
vllm has Cloudpickle deserializes arbitrary command execution
Dec 7th 2024
hexian2001
•
duplicate
Critical
Remote Code Execution by Pickle Deserialization via AsyncEngineRPCServer() RPC s...
Dec 6th 2024
zpbrent
•
Critical
•
$1500
Critical
•
$1500
•
CVE-2024-9053
CVE-2024-9053
Remote Code Execution by Pickle Deserialization via recv_object() distributed tr...
Dec 6th 2024
zpbrent
•
Critical
•
$1500
Critical
•
$1500
•
CVE-2024-9052
CVE-2024-9052
Command Injection in nccl_integrity_check function
Jun 12th 2024
vanirxxx
•
informative
High
Malicious model to RCE by torch.load in hf_model_weights_iterator (as well as th...
May 28th 2024
dogewatch
•
informative
Critical
CRITICAL
$0
HIGH
$0
MEDIUM
$0
LOW
$0