diff --git a/triton/README.md b/triton/README.md index 24577d4..fb97eb1 100644 --- a/triton/README.md +++ b/triton/README.md @@ -13,6 +13,9 @@ See this [blog](https://protectai.com/threat-research/triton-inference-server-ar - **triton_file_write**: Exploits a file overwrite vulnerability when Triton is started with the non-default ```--model-control explicit``` flag - **triton_model_rce**: Allows you to obtain remote code execution on the server hosting Triton by (ab)using it's Python model backend when Triton is started with the non-default ```--model-control explicit``` flag +## Reports +- **l1k3beef**: https://huntr.com/bounties/b27148e3-4da4-4e12-95ae-756d33d94687/ + ## Disclaimer The vulnerabilities and associated exploits provided in this repository are for educational and ethical security testing purposes only.