kubeflow-pipelines vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kubeflow-pipelines package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-29041

<2.4.0-r9
  • L
GHSA-pxg6-pf52-xh8x

<2.4.0-r9
  • L
GHSA-rv95-896h-c2vc

<2.4.0-r9
  • L
GHSA-93mq-9ffx-83m2

<2.4.0-r9
  • L
CVE-2024-47764

<2.4.0-r9
  • L
Allocation of Resources Without Limits or Throttling

<2.4.0-r9
  • L
GHSA-qxp5-gwg8-xv66

<2.4.0-r8
  • L
CVE-2025-22870

<2.4.0-r8
  • L
GHSA-gxpj-cx7g-858c

<2.4.0-r7
  • M
Resource Exhaustion

<2.4.0-r7
  • L
CVE-2025-22868

<2.4.0-r6
  • L
GHSA-jr5f-v2jv-69x6

<2.4.0-r5
  • L
CVE-2025-22869

<2.4.0-r5
  • L
Server-Side Request Forgery (SSRF)

<2.4.0-r5
  • L
GHSA-79v4-65xg-pq4g

<2.4.0-r4
  • L
CVE-2024-12797

<2.4.0-r4
  • L
CVE-2025-22866

<2.4.0-r3
  • L
GHSA-3whm-j4xm-rv8x

<2.4.0-r3
  • L
GHSA-6wxm-mpqj-6jpf

<2.4.0-r2
  • L
CVE-2024-45339

<2.4.0-r2
  • L
GHSA-w32m-9786-jp63

<2.3.0-r5
  • L
CVE-2024-45338

<2.3.0-r5
  • L
GHSA-v778-237x-gjrc

<2.3.0-r4
  • L
CVE-2024-45337

<2.3.0-r4
  • L
CVE-2024-10220

<2.3.0-r3
  • L
GHSA-27wf-5967-98gx

<2.3.0-r3
  • L
Inefficient Regular Expression Complexity

<2.3.0-r3
  • L
GHSA-rhx6-c78j-4q9w

<2.3.0-r3
  • L
GHSA-qwcr-r2fm-qrc7

<2.2.0-r12
  • L
GHSA-j7vj-rw65-4v26

<2.2.0-r12
  • L
GHSA-crqm-pwhx-j97f

<2.2.0-r12
  • L
GHSA-qw6h-vgh9-j6wx

<2.2.0-r12
  • M
Cross-site Scripting (XSS)

<2.2.0-r12
  • L
GHSA-8xfx-rj4p-23jm

<2.2.0-r12
  • L
GHSA-m6fv-jmcg-4jfg

<2.2.0-r12
  • L
GHSA-cm22-4g7w-348p

<2.2.0-r12
  • L
GHSA-9wv6-86v2-598j

<2.2.0-r12
  • H
CVE-2024-45590

<2.2.0-r12
  • M
Cross-site Scripting (XSS)

<2.2.0-r12
  • L
CVE-2024-34158

<2.2.0-r12
  • L
Inefficient Regular Expression Complexity

<2.2.0-r12
  • L
CVE-2024-34156

<2.2.0-r12
  • M
Cross-site Scripting (XSS)

<2.2.0-r12
  • L
CVE-2024-34155

<2.2.0-r12
  • H
Server-Side Request Forgery (SSRF)

<2.2.0-r10
  • L
GHSA-8hc4-vh64-cxmj

<2.2.0-r10
  • H
Resource Exhaustion

<2.2.0-r9
  • L
GHSA-mpg4-rc92-vx8v

<2.2.0-r9
  • L
CVE-2024-5321

<2.2.0-r8
  • L
GHSA-82m2-cv7p-4m75

<2.2.0-r8
  • L
GHSA-jfmj-5v4g-7637

<2.2.0-r7
  • L
Resource Exhaustion

<2.2.0-r7
  • L
GHSA-248v-346w-9cwc

<2.2.0-r6
  • H
Insufficient Verification of Data Authenticity

<2.2.0-r6
  • L
CVE-2024-24791

<2.2.0-r5
  • L
GHSA-hw49-2p59-3mhj

<2.2.0-r5
  • L
GHSA-3h5v-q93c-6h6q

<2.2.0-r4
  • L
CVE-2024-37890

<2.2.0-r4
  • L
GHSA-34jh-p97f-mpxf

<2.2.0-r4
  • L
CVE-2024-37891

<2.2.0-r4
  • L
GHSA-8cfg-vx93-jvxw

<2.2.0-r3
  • M
Information Exposure Through Log Files

<2.2.0-r3
  • L
GHSA-9wx4-h78v-vm56

<2.2.0-r2
  • L
CVE-2024-35195

<2.2.0-r2
  • L
GHSA-33c5-9fx5-fvjm

<2.1.0-r0
  • M
Open Redirect

<2.1.0-r0
  • L
GHSA-jjg7-2v4v-x38h

<2.1.0-r0
  • H
CVE-2024-3651

<2.1.0-r0
  • L
GHSA-pxhw-596r-rwq5

<2.0.5-r7
  • L
CVE-2024-3177

<2.0.5-r7
  • L
CVE-2023-45288

<2.0.5-r7
  • L
GHSA-4v7x-pqxf-cx7m

<2.0.5-r7
  • H
Improper Input Validation

<2.0.5-r5
  • L
GHSA-q78c-gwqw-jcmc

<2.0.5-r5
  • L
GHSA-cxjh-pqwp-8mfp

<2.0.5-r5
  • L
CVE-2024-24786

<2.0.5-r5
  • L
GHSA-8r3f-844c-mc37

<2.0.5-r5
  • L
CVE-2024-28849

<2.0.5-r5
  • L
CVE-2023-45290

<2.0.5-r4
  • L
GHSA-3q2c-pvp5-3cqp

<2.0.5-r4
  • L
GHSA-32ch-6x54-q4h9

<2.0.5-r4
  • L
CVE-2024-24785

<2.0.5-r4
  • L
GHSA-rr6r-cfgf-gc6h

<2.0.5-r4
  • L
GHSA-fgq5-q76c-gx78

<2.0.5-r4
  • L
CVE-2024-24784

<2.0.5-r4
  • L
CVE-2023-45289

<2.0.5-r4
  • L
CVE-2024-24783

<2.0.5-r4
  • L
GHSA-j6m3-gc37-6r6q

<2.0.5-r4
  • L
GHSA-6vqw-3v5j-54x4

<2.0.5-r3
  • H
NULL Pointer Dereference

<2.0.5-r3
  • L
GHSA-9v9h-cgj8-h64p

<2.0.5-r3
  • M
CVE-2024-0727

<2.0.5-r3
  • L
GHSA-3ww4-gg4f-jr7f

<2.0.5-r3
  • H
Information Exposure

<2.0.5-r3
  • L
GHSA-jchw-25xp-jwwc

<2.0.5-r2
  • M
Open Redirect

<2.0.5-r2
  • M
Improper Validation of Integrity Check Value

<2.0.5-r1
  • L
GHSA-45x7-px36-x8w8

<2.0.5-r1