3.46.0.7
10 years ago
23 days ago
Known vulnerabilities in the ai.h2o:h2o-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the How to fix Deserialization of Untrusted Data? Upgrade | [,3.46.0.6) |
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) through the How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Exposed Dangerous Method or Function through the How to fix Exposed Dangerous Method or Function? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Directory Traversal via the endpoint for exporting models. An attacker can overwrite any file on the target server by exporting a model to any file in the server's file structure. Note: This vulnerability requires there to be a model that is available for export. In usual instances of How to fix Directory Traversal? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via the How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Synchronous Access of Remote Resource without Timeout via the typeahead endpoint due to lacking timeout when checking that a specified resource exists. An attacker can cause the application to block and become unresponsive to other requests by sending multiple requests to an attacker-controlled server that hangs. How to fix Synchronous Access of Remote Resource without Timeout? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to improper input validation. An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform. How to fix Deserialization of Untrusted Data? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Denial Of Service through the How to fix Denial Of Service? Upgrade | [,3.46.0.6) |
Affected versions of this package are vulnerable to External Control of File Name or Path via the How to fix External Control of File Name or Path? Upgrade | [,3.46.0.1) |
Affected versions of this package are vulnerable to Directory Traversal via a local file in the REST API. A remote attacker can access every file on the API server with the permissions of the user who ran the command. How to fix Directory Traversal? Upgrade | [,3.46.0.1) |
Affected versions of this package are vulnerable to Arbitrary Code Injection through the 'import' feature. An attacker can upload and run arbitrary code, fully compromising the system with access equal to the permissions of the running How to fix Arbitrary Code Injection? Upgrade | [,3.46.0.1) |