4.0.3
4 years ago
1 years ago
Known vulnerabilities in the aim package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to its us of How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction through the manipulation of file paths. An attacker could remotely overwrite any file on the host server and to exfiltrate any data from the host server. This can be abused to cause denial of service by overwriting critical system files, loss of private data, and remote code execution by downloading private ssh-keys. Note: Having full control over these zip files leads to two vulnerabilities: The first is being able to overwrite any existing file on the system(e.g. the contents of the file is not "useful" to the attacker, but it can nevertheless be used to cause denial of service by overwriting critical system files). The second vulnerability is achieved by using the built-in How to fix Arbitrary File Write via Archive Extraction? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Resource Exhaustion due to the misconfiguration of the remote tracking server. This can lead to an endless loop of connections that prevents it from handling other legitimate requests. How to fix Resource Exhaustion? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to improper restriction of user access to the How to fix Improper Control of Generation of Code ('Code Injection')? There is no fixed version for | [3.0.0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) due to the lack of CSRF and CORS protection in the aim dashboard. An attacker can exploit this by tricking a user into executing a malicious script that sends unauthorized requests to the aim server, leading to potential data loss and unauthorized data manipulation. How to fix Cross-Site Request Forgery (CSRF)? There is no fixed version for | [0,) |