zenml@0.56.4 vulnerabilities
ZenML: Write production-ready ML code.
-
latest version
0.70.0
-
first published
4 years ago
-
latest version published
6 days ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the zenml package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,0.57.0rc2)
|
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the How to fix Cross-site Scripting (XSS)? Upgrade |
[,0.58.0)
|
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') due to improper handling of line feed ( How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')? Upgrade |
[,0.57.1)
|
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Insufficient Session Expiration due to the improper session management mechanism. An attacker can maintain unauthorized access and perform actions as a legitimate user by reusing old session credentials or session IDs after a password change. The vulnerability arises when sessions do not expire immediately after a password change, allowing the session to remain active and usable in another browser without requiring re-authentication. How to fix Insufficient Session Expiration? There is no fixed version for |
[0.56.3,)
|