Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 15, 2025

      This week in AI dev tools: Apple’s Foundations Model framework, Mistral’s first reasoning model, and more (June 13, 2025)

      June 13, 2025

      Open Talent platforms emerging to match skilled workers to needs, study finds

      June 13, 2025

      Java never goes out of style: Celebrating 30 years of the language

      June 12, 2025

      It’s the year of Linux… at least for Denmark — here’s why the country’s government is dumping Windows and Office 365

      June 15, 2025

      Grounded 2’s best feature is happening because Obsidian left the Xbox One behind

      June 15, 2025

      6 registry tweaks every tech-savvy user must apply on Windows 11

      June 14, 2025

      Here’s why network infrastructure is vital to maximizing your company’s AI adoption

      June 14, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Right Invoicing App for iPhone: InvoiceTemple

      June 14, 2025
      Recent

      Right Invoicing App for iPhone: InvoiceTemple

      June 14, 2025

      Tunnel Run game in 170 lines of pure JS

      June 14, 2025

      Integrating Drupal with Salesforce SSO via SAML and Dynamic User Sync

      June 14, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      It’s the year of Linux… at least for Denmark — here’s why the country’s government is dumping Windows and Office 365

      June 15, 2025
      Recent

      It’s the year of Linux… at least for Denmark — here’s why the country’s government is dumping Windows and Office 365

      June 15, 2025

      Grounded 2’s best feature is happening because Obsidian left the Xbox One behind

      June 15, 2025

      Microsoft wraps up the week with new Windows 11 preview builds, one each for Dev & Beta

      June 15, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-30202 – vLLM ZeroMQ Denial of Service and Data Exposure Vulnerability

    CVE-2025-30202 – vLLM ZeroMQ Denial of Service and Data Exposure Vulnerability

    April 30, 2025

    CVE ID : CVE-2025-30202

    Published : April 30, 2025, 1:15 a.m. | 1 hour, 52 minutes ago

    Description : vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.5.2 and prior to 0.8.5 are vulnerable to denial of service and data exposure via ZeroMQ on multi-node vLLM deployment. In a multi-node vLLM deployment, vLLM uses ZeroMQ for some multi-node communication purposes. The primary vLLM host opens an XPUB ZeroMQ socket and binds it to ALL interfaces. While the socket is always opened for a multi-node deployment, it is only used when doing tensor parallelism across multiple hosts. Any client with network access to this host can connect to this XPUB socket unless its port is blocked by a firewall. Once connected, these arbitrary clients will receive all of the same data broadcasted to all of the secondary vLLM hosts. This data is internal vLLM state information that is not useful to an attacker. By potentially connecting to this socket many times and not reading data published to them, an attacker can also cause a denial of service by slowing down or potentially blocking the publisher. This issue has been patched in version 0.8.5.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-32444 – “vLLM Mooncake ZeroMQ Remote Code Execution”
    Next Article CVE-2025-46552 – GitHub KHC-INVITATION-AUTOMATION Unauthenticated User Data Disclosure

    Related Posts

    Development

    HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass

    June 15, 2025
    Development

    Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads

    June 15, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-47711 – “nbdkit Denial-of-Service Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4798 – WordPress WP-DownloadManager Arbitrary File Read Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4236 – PCMan FTP Server MDIR Command Handler Buffer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Meet two Apple Swift Student Challenge champs building apps that solve real-world problems

    News & Updates

    Highlights

    CVE-2025-47939 – TYPO3 File Upload Vulnerability (Unrestricted File Type Upload)

    May 20, 2025

    CVE ID : CVE-2025-47939

    Published : May 20, 2025, 2:15 p.m. | 34 minutes ago

    Description : TYPO3 is an open source, PHP based web content management system. By design, the file management module in TYPO3’s backend user interface has historically allowed the upload of any file type, with the exception of those that are directly executable in a web server context. This lack of restriction means it is possible to upload files that may be considered potentially harmful, such as executable binaries (e.g., `.exe` files), or files with inconsistent file extensions and MIME types (for example, a file incorrectly named with a `.png` extension but actually carrying the MIME type `application/zip`) starting in version 9.0.0 and prior to versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, and 13.4.12 LTS. Although such files are not directly executable through the web server, their presence can introduce indirect risks. For example, third-party services such as antivirus scanners or malware detection systems might flag or block access to the website for end users if suspicious files are found. This could negatively affect the availability or reputation of the site. Users should update to TYPO3 version 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, or 13.4.12 LTS to fix the problem.

    Severity: 5.4 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Microsoft removes the paywall for Copilot Vision, but only for Edge users

    April 17, 2025

    Dark Web No Longer Safe Haven: 270 Arrested in Global Law Enforcement Raid

    May 23, 2025

    How to Recover Lost Web Design Files After a Crash or Mistake

    April 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.