Update README.md
parent
9bb71d03a1
commit
ebe01f4353
|
@ -13,6 +13,9 @@ See this [blog](https://protectai.com/threat-research/triton-inference-server-ar
|
|||
- **triton_file_write**: Exploits a file overwrite vulnerability when Triton is started with the non-default ```--model-control explicit``` flag
|
||||
- **triton_model_rce**: Allows you to obtain remote code execution on the server hosting Triton by (ab)using it's Python model backend when Triton is started with the non-default ```--model-control explicit``` flag
|
||||
|
||||
## Reports
|
||||
- **l1k3beef**: https://huntr.com/bounties/b27148e3-4da4-4e12-95ae-756d33d94687/
|
||||
|
||||
## Disclaimer
|
||||
|
||||
The vulnerabilities and associated exploits provided in this repository are for educational and ethical security testing purposes only.
|
||||
|
|
Loading…
Reference in New Issue