Safety vulnerability ID: 76256
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A vulnerability in the runs/delete-batch endpoint of aimhubio/aim version 3.19.3 allows for arbitrary file or directory deletion through path traversal. The endpoint does not mitigate path traversal when handling user-specified run-names, which are used to specify log/metadata files for deletion. This can be exploited to delete arbitrary files or directories, potentially causing denial of service or data loss.
Latest version: 4.0.3
A super-easy way to record, search and compare AI experiments.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application