{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:10:44.254","vulnerabilities":[{"cve":{"id":"CVE-2025-0190","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:51.780","lastModified":"2025-03-28T14:28:25.273","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In version 3.25.0 of aimhubio/aim, a denial of service vulnerability exists. By tracking a large number of `Text` objects and then querying them simultaneously through the web API, the Aim web server becomes unresponsive to other requests for an extended period while processing and returning these objects. This vulnerability can be exploited repeatedly, leading to a complete denial of service."},{"lang":"es","value":"En la versión 3.25.0 de aimhubio/aim, existe una vulnerabilidad de denegación de servicio. Al rastrear una gran cantidad de objetos `Text` y consultarlos simultáneamente a través de la API web, el servidor web de Aim deja de responder a otras solicitudes durante un período prolongado mientras procesa y devuelve estos objetos. Esta vulnerabilidad puede explotarse repetidamente, lo que provoca una denegación de servicio completa."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-1049"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aimstack:aim:3.25.0:*:*:*:*:*:*:*","matchCriteriaId":"A9850B23-8420-4636-8BCF-DBFB56C51026"}]}]}],"references":[{"url":"https://huntr.com/bounties/38d151f1-abb4-443a-86b0-6c26f0c6cb70","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}