aim is vulnerable to directory traversal. An attacker can access arbitrary files and directories stored on a file system by manipulating variables that reference files with dot-dot-slash (../)
sequences and their variations or by using absolute file paths.
github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16
github.com/aimhubio/aim/issues/999
github.com/aimhubio/aim/pull/1003
github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738
github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc