Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): MLflow
- Search Type: Search All
- CPE Name Search: false
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-2780 |
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1. Published: May 17, 2023; 5:15:09 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-30172 |
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter. Published: May 10, 2023; 10:15:08 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-2356 |
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. Published: April 27, 2023; 8:15:08 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-1177 |
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1. Published: March 24, 2023; 11:15:10 AM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-1176 |
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.2.2. Published: March 24, 2023; 11:15:10 AM -0400 |
V4.0:(not available) V3.1: 3.3 LOW V2.0:(not available) |
CVE-2022-0736 |
Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1. Published: February 23, 2022; 4:15:14 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |