with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
| Software | From | Fixed in |
|---|---|---|
mlflow
|
- | 2.9.2 |
| lfprojects / mlflow | - | 2.9.2 |