Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 12 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google keras |
|
| Vendors & Products |
Google
Google keras |
Wed, 11 Feb 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file utilizing HDF5 external dataset references. | |
| Title | Arbitrary File Read in Keras via HDF5 External Datasets | |
| Weaknesses | CWE-200 CWE-73 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2026-02-12T14:53:02.502Z
Reserved: 2026-01-29T22:48:03.030Z
Link: CVE-2026-1669
Updated: 2026-02-12T14:52:46.277Z
Status : Awaiting Analysis
Published: 2026-02-11T23:16:03.750
Modified: 2026-02-12T15:10:37.307
Link: CVE-2026-1669
OpenCVE Enrichment
Updated: 2026-02-12T10:00:50Z