4.0.3
4 years ago
1 years ago
Known vulnerabilities in the aim package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Denial of Service (DoS) due to the How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Denial of Service (DoS) due to missing timeouts in some of the methods. How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to External Control of File Name or Path via the How to fix External Control of File Name or Path? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Relative Path Traversal through the How to fix Relative Path Traversal? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Synchronous Access of Remote Resource without Timeout by using the option for connecting to an external filesystem via the How to fix Synchronous Access of Remote Resource without Timeout? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Denial of Service (DoS) by sending a large number of requests to retrieve tracked metrics simultaneously. This excessive load results in uncontrolled resource consumption due to the server's inability to limit the number of metrics requested per call and its single-threaded nature. How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Access Control Bypass due to the use of an outdated Note: This is only exploitable if an attacker can write files to a known location on the Aim server. How to fix Access Control Bypass? There is no fixed version for | [3.0.0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Directory Traversal in the How to fix Directory Traversal? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Denial of Service (DoS) through the tracking server. An attacker can cause the server to become unresponsive to other requests by sending very large images that exceed the maximum size for websocket messages. How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Excessive Data Query Operations in a Large Data Table through the tracking and simultaneous querying of a large number of How to fix Excessive Data Query Operations in a Large Data Table? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to its us of How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction through the manipulation of file paths. An attacker could remotely overwrite any file on the host server and to exfiltrate any data from the host server. This can be abused to cause denial of service by overwriting critical system files, loss of private data, and remote code execution by downloading private ssh-keys. Note: Having full control over these zip files leads to two vulnerabilities: The first is being able to overwrite any existing file on the system(e.g. the contents of the file is not "useful" to the attacker, but it can nevertheless be used to cause denial of service by overwriting critical system files). The second vulnerability is achieved by using the built-in How to fix Arbitrary File Write via Archive Extraction? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Resource Exhaustion due to the misconfiguration of the remote tracking server. This can lead to an endless loop of connections that prevents it from handling other legitimate requests. How to fix Resource Exhaustion? There is no fixed version for | [0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to improper restriction of user access to the How to fix Improper Control of Generation of Code ('Code Injection')? There is no fixed version for | [3.0.0,) |
aim is a super-easy way to record, search and compare AI experiments. Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) due to the lack of CSRF and CORS protection in the aim dashboard. An attacker can exploit this by tricking a user into executing a malicious script that sends unauthorized requests to the aim server, leading to potential data loss and unauthorized data manipulation. How to fix Cross-Site Request Forgery (CSRF)? There is no fixed version for | [0,) |