First published: Tue Dec 19 2023(Updated: )
with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <2.9.2 | 2.9.2 |
Lfprojects Mlflow | <2.9.2 | |
<2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.