{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T21:20:33.896","vulnerabilities":[{"cve":{"id":"CVE-2025-0189","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:51.660","lastModified":"2025-10-15T13:16:00.253","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In version 3.25.0 of aimhubio/aim, the tracking server is vulnerable to a denial of service attack. The server overrides the maximum size for websocket messages, allowing very large images to be tracked. This causes the server to become unresponsive to other requests while processing the large image, leading to a denial of service condition."},{"lang":"es","value":"En la versión 3.25.0 de aimhubio/aim, el servidor de seguimiento es vulnerable a un ataque de denegación de servicio. El servidor sobrescribe el tamaño máximo de los mensajes websocket, lo que permite el seguimiento de imágenes muy grandes. Esto provoca que el servidor deje de responder a otras solicitudes mientras procesa la imagen grande, lo que genera una condición de denegación de servicio."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aimstack:aim:3.25.0:*:*:*:*:*:*:*","matchCriteriaId":"A9850B23-8420-4636-8BCF-DBFB56C51026"}]}]}],"references":[{"url":"https://huntr.com/bounties/e4c9bf41-72cf-4d04-baaf-8f12b5b7926e","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}