Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
mlflow Vendor: lfprojects

About This Product

mlflow is a software product offered by lfprojects. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 53 known vulnerabilities affecting lfprojects mlflow. This includes 10 critical-severity issues and 37 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2022 to 2025, indicating a recent active security attention. 5 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2022-0736 2022-02-23 2024-11-21 7.5 5.0 Likely
CVE-2023-1176 2023-03-24 2024-11-21 3.3 - -
CVE-2023-1177 2023-03-24 2024-11-21 9.3 - -
CVE-2023-2356 2023-04-28 2024-11-21 7.5 - -
CVE-2023-30172 2023-05-11 2025-01-27 7.5 - -
CVE-2023-2780 2023-05-17 2024-11-21 9.8 - -
CVE-2023-3765 2023-07-19 2024-11-21 10.0 - -
CVE-2023-4033 2023-08-01 2024-11-21 7.8 - -
CVE-2023-6015 2023-11-16 2024-11-21 7.5 - -
CVE-2023-6018 2023-11-16 2024-11-21 9.8 - -
CVE-2023-6014 2023-11-16 2024-11-21 9.8 - -
CVE-2023-43472 2023-12-05 2024-11-21 7.5 - -
CVE-2023-6568 2023-12-07 2024-11-21 6.1 - -
CVE-2023-6709 2023-12-12 2024-11-21 8.8 - -
CVE-2023-6753 2023-12-13 2024-11-21 8.8 - -
CVE-2023-6831 2023-12-15 2024-11-21 8.1 - -
CVE-2023-6909 2023-12-18 2024-11-21 7.5 - -
CVE-2023-6940 2023-12-19 2024-11-21 8.8 - -
CVE-2023-6974 2023-12-20 2024-11-21 9.8 - -
CVE-2023-6975 2023-12-20 2024-11-21 9.8 - -
CVE-2023-6976 2023-12-20 2024-11-21 8.8 - -
CVE-2023-6977 2023-12-20 2024-11-21 7.5 - -
CVE-2024-27132 2024-02-23 2025-01-22 7.5 - -
CVE-2024-27133 2024-02-23 2025-01-22 7.5 - -
CVE-2024-1483 2024-04-16 2025-02-03 7.5 - -
CVE-2024-1558 2024-04-16 2025-02-03 7.5 - -
CVE-2024-1560 2024-04-16 2025-02-03 8.1 - -
CVE-2024-1593 2024-04-16 2025-02-03 7.5 - -
CVE-2024-1594 2024-04-16 2025-02-03 7.5 - -
CVE-2024-3573 2024-04-16 2025-02-03 9.3 - -
CVE-2024-3848 2024-05-16 2025-01-24 7.5 - -
CVE-2024-4263 2024-05-16 2025-02-03 5.4 - -
CVE-2024-37052 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37053 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37054 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37055 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37056 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37057 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37058 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37059 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37060 2024-06-04 2025-02-03 8.8 - -
CVE-2024-37061 2024-06-04 2025-02-03 8.8 - -
CVE-2024-0520 2024-06-06 2025-10-15 8.8 - -
CVE-2024-2928 2024-06-06 2024-11-21 7.5 - -
CVE-2024-3099 2024-06-06 2024-11-21 5.4 - -
CVE-2024-27134 2024-11-25 2025-02-03 7.0 - -
CVE-2024-6838 2025-03-20 2025-04-01 5.3 - -
CVE-2024-8859 2025-03-20 2025-08-05 7.5 - -
CVE-2025-0453 2025-03-20 2025-10-15 7.5 - -
CVE-2025-1473 2025-03-20 2025-08-05 7.1 - -
CVE-2025-1474 2025-03-20 2025-03-27 5.5 - -
CVE-2025-11200 2025-10-29 2025-12-31 9.8 - -
CVE-2025-11201 2025-10-29 2025-11-04 9.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for lfprojects mlflow by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.