with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
{ "cpes": [ "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*" ], "severity": "High" }
"https://github.com/bitnami/vulndb/tree/main/data/mlflow/BIT-mlflow-2023-6940.json"