mlflow

Direct Vulnerabilities

Known vulnerabilities in the mlflow package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-7qhf-v65m-g5f3

<3.10.1-r3
  • L
Missing Authentication for Critical Function

<3.10.1-r3
  • L
Uncontrolled Recursion

<3.10.1-r1
  • L
GHSA-gc5v-m9x4-r6x2

<3.10.1-r1
  • M
Insecure Temporary File

<3.10.1-r1
  • L
GHSA-jr27-m4p2-rc6r

<3.10.1-r1
  • L
GHSA-68rp-wp8r-4726

<3.9.0-r1
  • L
GHSA-29vq-49wr-vm6x

<3.9.0-r1
  • M
Information Exposure Through Caching

<3.9.0-r1
  • H
Out-of-bounds Write

<3.9.0-r1
  • M
Improper Handling of Windows Device Names

<3.9.0-r1
  • M
CVE-2026-26007

<3.9.0-r1
  • L
GHSA-r6ph-v2qm-q3c2

<3.9.0-r1
  • L
GHSA-cfh3-3jmp-rvhc

<3.9.0-r1
  • M
Directory Traversal

<3.8.1-r3
  • H
CVE-2026-0994

<3.8.1-r3
  • L
GHSA-7gcm-g887-7qv7

<3.8.1-r3
  • L
Directory Traversal

<3.8.1-r3
  • L
GHSA-63vm-454h-vhhq

<3.8.1-r3
  • L
GHSA-8rrh-rw8j-w5fx

<3.8.1-r3
  • L
GHSA-58pv-8j8x-9vj2

<3.8.1-r3
  • L
Allocation of Resources Without Limits or Throttling

<3.8.1-r3
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<3.8.1-r1
  • L
GHSA-38jv-5279-wg99

<3.8.1-r1
  • L
Resource Exhaustion

<3.4.0-r2
  • L
GHSA-w853-jp5j-5j7f

<3.8.0-r0
  • M
Link Following

<3.8.0-r0
  • L
GHSA-gm62-xv2j-4w53

<3.7.0-r1
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<3.7.0-r1
  • L
GHSA-2xpw-w6gg-jr37

<3.7.0-r1
  • H
Allocation of Resources Without Limits or Throttling

<3.7.0-r1
  • L
GHSA-768j-98cg-p3fv

<3.6.0-r1
  • C
XML Injection

<3.6.0-r1
  • M
Improper Handling of Windows Device Names

<3.6.0-r1
  • L
GHSA-hgf8-39gv-g3f2

<3.6.0-r1
  • L
CVE-2025-8869

<3.6.0-r0
  • L
GHSA-4xh5-x5gv-qwph

<3.6.0-r0
  • L
Algorithmic Complexity

<3.5.1-r1
  • L
GHSA-7f5h-v6xp-fcq8

<3.5.1-r1
  • L
GHSA-g7f3-828f-7h7m

<3.4.0-r2
  • L
GHSA-pq5p-34cr-23v9

<3.4.0-r2
  • L
Improper Input Validation

<3.4.0-r2
  • L
GHSA-9ggr-2464-2j32

<3.4.0-r1
  • L
Insufficient Verification of Data Authenticity

<3.4.0-r1
  • L
Allocation of Resources Without Limits or Throttling

<3.1.4-r0
  • L
GHSA-2c2j-9gv5-cj73

<3.1.4-r0
  • M
Open Redirect

<3.1.0-r3
  • L
GHSA-48p4-8xcf-vxj5

<3.1.0-r3
  • L
GHSA-pq67-6m6q-mj2v

<3.1.0-r3
  • M
Open Redirect

<3.1.0-r3
  • L
Insufficiently Protected Credentials

<3.1.0-r0
  • L
GHSA-9hjg-9r4m-mvj7

<3.1.0-r0
  • L
Function Call With Incorrect Order of Arguments

<2.22.0-r2
  • L
GHSA-4grg-w6v8-c28g

<2.22.0-r2
  • L
GHSA-q34m-jh98-gwm2

<2.21.0-r0
  • M
Directory Traversal

<2.21.0-r0
  • H
Resource Exhaustion

<2.21.0-r0
  • L
GHSA-f9vj-2wh5-fj8j

<2.21.0-r0
  • L
GHSA-gmj6-6f8f-6699

<2.19.0-r2
  • L
GHSA-q2x7-8rv6-6q7h

<2.19.0-r2
  • H
Improper Neutralization

<2.19.0-r2
  • L
Protection Mechanism Failure

<2.19.0-r2
  • L
GHSA-248v-346w-9cwc

<2.14.2-r0
  • H
Insufficient Verification of Data Authenticity

<2.14.2-r0
  • M
CVE-2024-37891

<2.14.1-r0
  • L
GHSA-34jh-p97f-mpxf

<2.14.1-r0
  • L
GHSA-pqcv-qw2r-r859

<2.13.2-r0
  • H
Arbitrary Code Injection

<2.13.2-r0
  • L
GHSA-9wx4-h78v-vm56

<2.13.1-r0
  • L
CVE-2024-35195

<2.13.1-r0