kubeflow-pipelines-visualization-server

Direct Vulnerabilities

Known vulnerabilities in the kubeflow-pipelines-visualization-server package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2026-44896

<2.16.1-r2
  • L
CVE-2026-44897

<2.16.1-r2
  • L
CVE-2026-44708

<2.16.1-r2
  • L
GHSA-58cw-g322-p94v

<2.16.1-r2
  • L
GHSA-mf9v-mfxr-j63j

<2.16.1-r1
  • L
GHSA-qccp-gfcp-xxvc

<2.16.1-r1
  • M
Information Exposure

<2.16.1-r1
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<2.16.1-r1
  • L
GHSA-8mp2-v27r-99xp

<2.16.1-r2
  • L
GHSA-8g87-j6q8-g93x

<2.16.1-r2
  • L
Inefficient Regular Expression Complexity

<2.16.1-r2
  • L
GHSA-v87v-83h2-53w7

<2.16.1-r2
  • L
GHSA-wjx4-4jcj-g98j

<2.16.1-r0
  • M
Heap-based Buffer Overflow

<2.16.1-r0
  • H
Integer Overflow or Wraparound

<2.16.1-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.16.1-r0
  • L
GHSA-whj4-6x5x-4v2j

<2.16.1-r1
  • H
Resource Exhaustion

<2.16.1-r1
  • M
Integer Overflow or Wraparound

<2.16.1-r0
  • L
GHSA-pwv6-vv43-88gr

<2.16.1-r0
  • L
GHSA-5xmw-vc9v-4wf2

<2.16.1-r0
  • L
GHSA-r73j-pqj5-w3x7

<2.16.1-r0
  • L
Directory Traversal

<2.16.0-r5
  • L
GHSA-4c99-qj7h-p3vg

<2.16.0-r5
  • L
Directory Traversal

<2.16.0-r5
  • L
XML External Entity (XXE) Injection

<2.16.0-r5
  • L
GHSA-7jqv-fw35-gmx9

<2.16.0-r5
  • L
GHSA-vfmq-68hx-4jfw

<2.16.0-r5
  • M
HTTP Response Splitting

<2.16.0-r4
  • M
Information Exposure

<2.16.0-r4
  • L
GHSA-966j-vmvw-g2g9

<2.16.0-r4
  • L
GHSA-w2fm-2cpv-w7v5

<2.16.0-r4
  • C
Out-of-Bounds

<2.16.0-r4
  • L
GHSA-63hf-3vf5-4wqf

<2.16.0-r4
  • L
GHSA-mwh4-6h8g-pg8w

<2.16.0-r4
  • L
GHSA-2vrm-gr82-f7m5

<2.16.0-r4
  • L
GHSA-3wq7-rqq7-wx6j

<2.16.0-r4
  • L
Allocation of Resources Without Limits or Throttling

<2.16.0-r4
  • L
GHSA-p423-j2cm-9vmq

<2.16.0-r4
  • H
Directory Traversal

<2.16.0-r4
  • L
GHSA-m5qp-6w8w-w647

<2.16.0-r4
  • M
Allocation of Resources Without Limits or Throttling

<2.16.0-r4
  • M
HTTP Response Splitting

<2.16.0-r4
  • L
HTTP Response Splitting

<2.16.0-r4
  • L
Resource Exhaustion

<2.16.0-r4
  • L
GHSA-p998-jp59-783m

<2.16.0-r4
  • M
Improper Input Validation

<2.16.0-r4
  • L
GHSA-c427-h43c-vf67

<2.16.0-r4
  • H
Allocation of Resources Without Limits or Throttling

<2.16.0-r4
  • L
GHSA-hcc4-c3v8-rx92

<2.16.0-r4
  • L
GHSA-jm6w-m3j8-898g

<2.16.0-r3
  • L
Missing Authentication for Critical Function

<2.16.0-r3
  • L
GHSA-gfwx-w7gr-fvh7

<2.16.0-r3
  • L
Cross-site Scripting (XSS)

<2.16.0-r3
  • L
GHSA-rf74-v2fm-23pw

<2.16.0-r3
  • L
Uncontrolled Recursion

<2.16.0-r2
  • H
Resource Exhaustion

<2.16.0-r2
  • L
GHSA-78cv-mqj4-43f7

<2.16.0-r2
  • L
GHSA-qjxf-f2mg-c6mc

<2.16.0-r2
  • L
GHSA-jr27-m4p2-rc6r

<2.16.0-r2
  • L
GHSA-29vq-49wr-vm6x

<2.16.0-r1
  • M
Improper Handling of Windows Device Names

<2.16.0-r1
  • L
GHSA-9hjg-9r4m-mvj7

<2.5.0-r3
  • L
Insufficiently Protected Credentials

<2.5.0-r3
  • H
Resource Exhaustion

<2.4.0-r0
  • L
GHSA-79v4-65xg-pq4g

<2.4.0-r1
  • L
CVE-2024-12797

<2.4.0-r1
  • L
GHSA-q874-g24w-4q9g

<2.4.0-r0
  • M
Directory Traversal

<2.4.0-r0
  • H
Out-of-bounds Write

<2.15.0-r5
  • H
Allocation of Resources Without Limits or Throttling

<2.15.0-r1
  • L
CVE-2025-12058

<2.14.3-r2
  • H
Insufficient Verification of Data Authenticity

<2.3.0-r1
  • M
CVE-2025-59842

<2.14.3-r1
  • L
GHSA-vvfj-2jqx-52jm

<2.14.3-r1
  • H
CVE-2026-0897

<2.15.0-r4
  • L
GHSA-248v-346w-9cwc

<2.3.0-r1
  • L
GHSA-69f9-5gxw-wvc2

<2.15.0-r1
  • H
CVE-2024-35178

<2.4.0-r0
  • L
GHSA-7cx3-6m66-7c5m

<2.5.0-r1
  • M
Information Exposure

<2.4.0-r0
  • L
Protection Mechanism Failure

<2.4.0-r0
  • H
CVE-2022-29241

<2.4.0-r0
  • L
Allocation of Resources Without Limits or Throttling

<2.5.0-r1
  • L
GHSA-h95x-26f3-88hr

<2.4.0-r0
  • L
GHSA-7p94-766c-hgjp

<2.16.0-r0
  • L
CVE-2024-28397

<2.4.0-r0
  • L
GHSA-cfh3-3jmp-rvhc

<2.15.0-r5
  • M
CVE-2024-37891

<2.3.0-r1
  • L
GHSA-753j-mpmx-qq6g

<2.3.0-r1
  • L
GHSA-8w49-h785-mj3c

<2.3.0-r4
  • L
GHSA-fh55-r93g-j68g

<2.15.0-r1
  • L
GHSA-m5xw-hwxw-fq3j

<2.15.0-r0
  • L
Resource Exhaustion

<2.3.0-r4
  • L
GHSA-xg9f-g7g7-2323

<2.4.0-r0
  • M
Directory Traversal

<2.15.0-r1
  • L
GHSA-28jp-44vh-q42h

<2.14.3-r2
  • M
CVE-2026-26007

<2.15.0-r5
  • L
GHSA-r6ph-v2qm-q3c2

<2.15.0-r5
  • M
Open Redirect

<2.4.0-r0
  • L
GHSA-793v-589g-574v

<2.15.0-r3
  • L
Improper Handling of Highly Compressed Data (Data Amplification)

<2.15.0-r1
  • L
GHSA-6jhg-hg63-jvvf

<2.15.0-r1
  • L
GHSA-mq84-hjqx-cwf2

<2.14.3-r2
  • L
CVE-2025-12060

<2.14.3-r2
  • L
GHSA-2xpw-w6gg-jr37

<2.15.0-r1
  • M
Cross-site Scripting (XSS)

<2.4.0-r0
  • L
GHSA-w235-7p84-xx57

<2.3.0-r1
  • M
Logging of Excessive Data

<2.15.0-r1
  • L
GHSA-34jh-p97f-mpxf

<2.3.0-r1
  • L
Improper Input Validation

<2.4.0-r0
  • L
GHSA-54jq-c3m8-4m76

<2.15.0-r1
  • L
GHSA-r726-vmfq-j9j3

<2.4.0-r0
  • M
Heap-based Buffer Overflow

<2.5.0-r4
  • H
Arbitrary Code Injection

<2.4.1-r2
  • C
CVE-2025-1550

<2.4.1-r2
  • L
GHSA-xg8h-j46f-w952

<2.5.0-r4
  • L
GHSA-64x5-55rw-9974

<2.4.0-r0
  • L
CVE-2024-55459

<2.3.0-r5
  • M
Insecure Storage of Sensitive Information

<2.3.0-r1
  • L
Arbitrary Code Injection

<2.16.0-r0
  • L
GHSA-jj3x-wxrx-4x23

<2.15.0-r1
  • L
GHSA-6mq8-rvhq-8wgg

<2.15.0-r1
  • L
GHSA-cjgq-5qmw-rcj6

<2.3.0-r5
  • L
GHSA-g84x-mcqj-x9qq

<2.15.0-r1
  • L
GHSA-jw8x-6495-233v

<2.3.0-r1
  • M
Cross-site Scripting (XSS)

<2.4.0-r0
  • L
GHSA-mqqc-3gqh-h2x8

<2.15.0-r1
  • L
GHSA-gm62-xv2j-4w53

<2.15.0-r0
  • M
HTTP Request Smuggling

<2.15.0-r1
  • L
GHSA-pq7m-3gw7-gq5x

<2.4.0-r0
  • L
GHSA-3f63-hfp8-52jq

<2.4.1-r2
  • L
GHSA-9jmq-rx5f-8jwq

<2.4.0-r0
  • L
GHSA-q2x7-8rv6-6q7h

<2.4.0-r0
  • L
GHSA-9wx4-h78v-vm56

<2.3.0-r0
  • L
CVE-2024-35195

<2.3.0-r0
  • L
GHSA-f9vj-2wh5-fj8j

<2.4.0-r0
  • M
HTTP Request Smuggling

<2.15.0-r1
  • M
Allocation of Resources Without Limits or Throttling

<2.15.0-r1
  • L
GHSA-48g7-3x6r-xfhp

<2.4.1-r2
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<2.15.0-r1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.15.0-r1
  • L
GHSA-q34m-jh98-gwm2

<2.4.0-r0
  • H
Execution with Unnecessary Privileges

<2.4.0-r0
  • L
GHSA-33p9-3p43-82vq

<2.5.0-r3
  • L
GHSA-vqfr-h8mv-ghfj

<2.4.1-r3
  • H
Out-of-bounds Write

<2.4.0-r0
  • L
HTTP Request Smuggling

<2.4.1-r3
  • L
Uncontrolled Search Path Element

<2.5.0-r3
  • L
GHSA-h5c8-rqwp-cp95

<2.4.0-r0
  • L
GHSA-hrfv-mqp8-q5rw

<2.4.0-r0
  • L
Allocation of Resources Without Limits or Throttling

<2.15.0-r4
  • L
GHSA-63vm-454h-vhhq

<2.15.0-r4
  • L
GHSA-h56g-gq9v-vc8r

<2.4.0-r0
  • H
Allocation of Resources Without Limits or Throttling

<2.15.0-r0
  • M
Improper Access Control

<2.4.0-r0
  • L
GHSA-px8h-6qxv-m22q

<2.4.0-r0
  • L
GHSA-hrw6-wg82-cm62

<2.4.0-r0
  • M
CVE-2026-21883

<2.15.0-r3
  • H
Allocation of Resources Without Limits or Throttling

<2.4.0-r0
  • L
Deserialization of Untrusted Data

<2.15.0-r0
  • L
GHSA-xfhx-r7ww-5995

<2.15.0-r4
  • H
Out-of-bounds Read

<2.2.0-r0
  • M
CVE-2024-28219

<2.2.0-r0
  • H
Inefficient Regular Expression Complexity

<2.2.0-r0
  • L
CVE-2024-34069

<2.4.0-r0
  • L
CVE-2024-27454

<2.2.0-r0
  • L
GHSA-h75v-3vvj-5mfj

<2.4.0-r0
  • L
CVE-2023-29483

<2.2.0-r0
  • L
GHSA-2g68-c3qc-8985

<2.4.0-r0
  • L
Uncontrolled Recursion

<2.2.0-r0
  • L
Cross-site Scripting (XSS)

<2.4.0-r0