3.46.0.7
10 years ago
16 days ago
Known vulnerabilities in the ai.h2o:h2o-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) due to the improper handling of highly compressed data. An attacker can cause the server to become unresponsive and exhaust system memory by uploading and repeatedly parsing a large GZIP file. How to fix Improper Handling of Highly Compressed Data (Data Amplification)? There is no fixed version for | [3.32.1.2,) |
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) through the How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for | [3.30.0.7,) |
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) through the How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Exposed Dangerous Method or Function through the How to fix Exposed Dangerous Method or Function? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Directory Traversal via the endpoint for exporting models. An attacker can overwrite any file on the target server by exporting a model to any file in the server's file structure. Note: This vulnerability requires there to be a model that is available for export. In usual instances of How to fix Directory Traversal? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via the How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Synchronous Access of Remote Resource without Timeout via the typeahead endpoint due to lacking timeout when checking that a specified resource exists. An attacker can cause the application to block and become unresponsive to other requests by sending multiple requests to an attacker-controlled server that hangs. How to fix Synchronous Access of Remote Resource without Timeout? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to improper input validation. An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform. How to fix Deserialization of Untrusted Data? There is no fixed version for | [0,) |