kubeflow-pipelines-visualization-server vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kubeflow-pipelines-visualization-server package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

<2.4.0-r0
  • H
Execution with Unnecessary Privileges

<2.4.0-r0
  • H
CVE-2022-29241

<2.4.0-r0
  • H
Resource Exhaustion

<2.4.0-r0
  • M
Open Redirect

<2.4.0-r0
  • M
Information Exposure

<2.4.0-r0
  • M
Cross-site Scripting (XSS)

<2.4.0-r0
  • L
GHSA-h5c8-rqwp-cp95

<2.4.0-r0
  • L
GHSA-xg9f-g7g7-2323

<2.4.0-r0
  • L
GHSA-h95x-26f3-88hr

<2.4.0-r0
  • L
Directory Traversal

<2.4.0-r0
  • L
GHSA-64x5-55rw-9974

<2.4.0-r0
  • L
Improper Input Validation

<2.4.0-r0
  • L
GHSA-q874-g24w-4q9g

<2.4.0-r0
  • H
Out-of-bounds Write

<2.4.0-r0
  • L
GHSA-h56g-gq9v-vc8r

<2.4.0-r0
  • L
GHSA-hrfv-mqp8-q5rw

<2.4.0-r0
  • L
GHSA-r726-vmfq-j9j3

<2.4.0-r0
  • M
Cross-site Scripting (XSS)

<2.4.0-r0
  • M
Improper Access Control

<2.4.0-r0
  • L
GHSA-q34m-jh98-gwm2

<2.4.0-r0
  • H
CVE-2024-35178

<2.4.0-r0
  • L
GHSA-f9vj-2wh5-fj8j

<2.4.0-r0
  • L
GHSA-9jmq-rx5f-8jwq

<2.4.0-r0
  • L
GHSA-pq7m-3gw7-gq5x

<2.4.0-r0
  • L
CVE-2024-28397

<2.4.0-r0
  • L
GHSA-px8h-6qxv-m22q

<2.4.0-r0
  • L
Protection Mechanism Failure

<2.4.0-r0
  • L
GHSA-hrw6-wg82-cm62

<2.4.0-r0
  • L
GHSA-q2x7-8rv6-6q7h

<2.4.0-r0
  • L
CVE-2024-55459

<2.3.0-r5
  • L
GHSA-cjgq-5qmw-rcj6

<2.3.0-r5
  • L
GHSA-8w49-h785-mj3c

<2.3.0-r4
  • L
Resource Exhaustion

<2.3.0-r4
  • L
GHSA-34jh-p97f-mpxf

<2.3.0-r1
  • M
Insecure Storage of Sensitive Information

<2.3.0-r1
  • L
GHSA-w235-7p84-xx57

<2.3.0-r1
  • L
GHSA-jw8x-6495-233v

<2.3.0-r1
  • L
GHSA-248v-346w-9cwc

<2.3.0-r1
  • L
CVE-2024-39689

<2.3.0-r1
  • L
CVE-2024-37891

<2.3.0-r1
  • L
GHSA-753j-mpmx-qq6g

<2.3.0-r1
  • L
GHSA-9wx4-h78v-vm56

<2.3.0-r0
  • L
CVE-2024-35195

<2.3.0-r0
  • H
Out-of-bounds Read

<2.2.0-r0
  • L
GHSA-m87m-mmvp-v9qm

<2.2.0-r0
  • L
GHSA-cr6f-gf5w-vhrc

<2.2.0-r0
  • L
GHSA-h75v-3vvj-5mfj

<2.2.0-r0
  • L
CVE-2024-34064

<2.2.0-r0
  • L
CVE-2024-28219

<2.2.0-r0
  • L
CVE-2024-34069

<2.2.0-r0
  • L
GHSA-44wm-f244-xhp3

<2.2.0-r0
  • L
GHSA-3rq5-2g8h-59hc

<2.2.0-r0
  • L
GHSA-2m57-hf25-phgg

<2.2.0-r0
  • L
CVE-2024-21506

<2.2.0-r0
  • L
GHSA-pwr2-4v36-6qpr

<2.2.0-r0
  • L
GHSA-jjg7-2v4v-x38h

<2.2.0-r0
  • L
CVE-2024-27454

<2.2.0-r0
  • L
CVE-2023-29483

<2.2.0-r0
  • H
CVE-2024-3651

<2.2.0-r0
  • L
Uncontrolled Recursion

<2.2.0-r0
  • L
GHSA-2g68-c3qc-8985

<2.2.0-r0