Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| mlflow | mlflow/mlflow | unspecified ~ 2.17.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Mlflow before 2.17.0 is susceptible to local file inclusion due to path traversal in GitHub repository mlflow/mlflow. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-8859.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-0453 | Denial of Service through Batched Queries in GraphQL in mlflow/mlflow | |
| CVE-2025-1474 | Weak Password Requirements in mlflow/mlflow | |
| CVE-2025-1473 | CSRF in mlflow/mlflow | |
| CVE-2024-6838 | Uncontrolled Resource Consumption in mlflow/mlflow |
No comments yet