CVE-2025-51464
- EPSS 0.47%
- Veröffentlicht 22.07.2025 00:00:00
- Zuletzt bearbeitet 11.09.2025 16:24:05
Cross-site Scripting (XSS) in aimhubio Aim 3.28.0 allows remote attackers to execute arbitrary JavaScript in victims browsers via malicious Python code submitted to the /api/reports endpoint, which is interpreted and executed by Pyodide when the repo...
- EPSS 0.31%
- Veröffentlicht 22.07.2025 00:00:00
- Zuletzt bearbeitet 11.09.2025 16:26:40
Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during res...
CVE-2025-5321
- EPSS 0.05%
- Veröffentlicht 29.05.2025 15:15:34
- Zuletzt bearbeitet 19.09.2025 17:17:50
A vulnerability classified as critical was found in aimhubio aim up to 3.29.1. This vulnerability affects the function RestrictedPythonQuery of the file /aim/storage/query.py of the component run_view Object Handler. The manipulation of the argument ...
CVE-2024-8101
- EPSS 0.08%
- Veröffentlicht 20.03.2025 10:11:29
- Zuletzt bearbeitet 01.04.2025 20:32:35
A stored cross-site scripting (XSS) vulnerability exists in the Text Explorer component of aimhubio/aim version 3.23.0. The vulnerability arises due to the use of `dangerouslySetInnerHTML` without proper sanitization, allowing arbitrary JavaScript ex...
CVE-2024-8769
- EPSS 0.53%
- Veröffentlicht 20.03.2025 10:11:22
- Zuletzt bearbeitet 15.10.2025 13:15:55
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalizati...
CVE-2024-12777
- EPSS 0.08%
- Veröffentlicht 20.03.2025 10:11:15
- Zuletzt bearbeitet 18.07.2025 20:01:55
A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service through the misuse of the sshfs-client. The tracking server, which is single-threaded, can be made unresponsive by requesting it to connect to an unresponsive socket via ss...
CVE-2024-8238
- EPSS 0.19%
- Veröffentlicht 20.03.2025 10:11:09
- Zuletzt bearbeitet 15.10.2025 13:15:54
In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side se...
CVE-2025-0189
- EPSS 0.14%
- Veröffentlicht 20.03.2025 10:10:54
- Zuletzt bearbeitet 15.10.2025 13:16:00
In version 3.25.0 of aimhubio/aim, the tracking server is vulnerable to a denial of service attack. The server overrides the maximum size for websocket messages, allowing very large images to be tracked. This causes the server to become unresponsive ...
CVE-2024-6829
- EPSS 0.1%
- Veröffentlicht 20.03.2025 10:10:50
- Zuletzt bearbeitet 23.07.2025 20:57:12
A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to exploit the `tarfile.extractall()` function to extract the contents of a maliciously crafted tarfile to arbitrary locations on the host server. The attacker can control `repo.path` ...
CVE-2024-12778
- EPSS 0.14%
- Veröffentlicht 20.03.2025 10:10:10
- Zuletzt bearbeitet 15.10.2025 13:15:40
A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service (DoS) attack. The issue arises when a large number of tracked metrics are retrieved simultaneously from the Aim web API, causing the web server to become unresponsive. The ...