0.81.0
4 years ago
3 days ago
Known vulnerabilities in the zenml package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Infinite loop through the multipart request boundary processing mechanism. An attacker can cause excessive resource consumption by sending malformed multipart requests with arbitrary characters appended to the end of multipart boundaries. How to fix Infinite loop? Upgrade | [,0.68.0) |
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) in the How to fix Cross-site Request Forgery (CSRF)? Upgrade | [,0.73.0) |
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Race Condition within a Thread in the How to fix Race Condition within a Thread? Upgrade | [,0.71.0) |
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Incorrect Authorization due to improper RBAC enforcement. How to fix Incorrect Authorization? Upgrade | [,0.72.0) |
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the How to fix Cross-site Scripting (XSS)? Upgrade | [,0.58.0) |
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') due to improper handling of line feed ( How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')? Upgrade | [,0.57.1) |
zenml is a ZenML: Write production-ready ML code. Affected versions of this package are vulnerable to Insufficient Session Expiration due to the improper session management mechanism. An attacker can maintain unauthorized access and perform actions as a legitimate user by reusing old session credentials or session IDs after a password change. The vulnerability arises when sessions do not expire immediately after a password change, allowing the session to remain active and usable in another browser without requiring re-authentication. How to fix Insufficient Session Expiration? There is no fixed version for | [0.56.3,) |