CVE-2025-8406
- EPSS 0.01%
- Veröffentlicht 05.10.2025 09:00:36
- Zuletzt bearbeitet 06.10.2025 15:16:04
ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and ...
CVE-2024-9340
- EPSS 0.15%
- Veröffentlicht 20.03.2025 10:08:50
- Zuletzt bearbeitet 15.07.2025 11:15:24
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthenticated attackers to cause excessive resource consumption by sending malformed multipart requests with arbitrary characters appended to the end of multipart bound...
CVE-2024-4311
- EPSS 0.13%
- Veröffentlicht 14.11.2024 18:15:19
- Zuletzt bearbeitet 07.05.2025 13:48:33
zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the us...
CVE-2024-5062
- EPSS 0.12%
- Veröffentlicht 30.06.2024 16:15:03
- Zuletzt bearbeitet 21.11.2024 09:46:53
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml version 0.57.1. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the survey redirect parameter. This...
CVE-2024-4680
- EPSS 0.05%
- Veröffentlicht 08.06.2024 20:15:52
- Zuletzt bearbeitet 21.11.2024 09:43:22
A vulnerability in zenml-io/zenml version 0.56.3 allows attackers to reuse old session credentials or session IDs due to insufficient session expiration. Specifically, the session does not expire after a password change, enabling an attacker to maint...
CVE-2024-2383
- EPSS 0.08%
- Veröffentlicht 06.06.2024 19:15:54
- Zuletzt bearbeitet 21.11.2024 09:09:38
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5 due to the application's failure to set appropriate X-Frame-Options or Content-Security-Policy HTTP headers. This vulnerability allows an attacker to embed the ...
CVE-2024-2032
- EPSS 0.04%
- Veröffentlicht 06.06.2024 19:15:53
- Zuletzt bearbeitet 21.11.2024 09:08:53
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55.3, which allows for the creation of multiple users with the same username when requests are sent in parallel. This issue was fixed in version 0.55.5. The vulner...
CVE-2024-2035
- EPSS 0.05%
- Veröffentlicht 06.06.2024 19:15:53
- Zuletzt bearbeitet 21.11.2024 09:08:53
An improper authorization vulnerability exists in the zenml-io/zenml repository, specifically within the API PUT /api/v1/users/id endpoint. This vulnerability allows any authenticated user to modify the information of other users, including changing ...
CVE-2024-2171
- EPSS 0.05%
- Veröffentlicht 06.06.2024 19:15:53
- Zuletzt bearbeitet 21.11.2024 09:09:10
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml repository, specifically within the 'logo_url' field. By injecting malicious payloads into this field, an attacker could send harmful messages to other users, pote...
CVE-2024-2213
- EPSS 0.02%
- Veröffentlicht 06.06.2024 19:15:53
- Zuletzt bearbeitet 21.11.2024 09:09:16
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to improper authentication mechanisms, an attacker with access to an active user session can change the account password without needing to know the current password. ...