AI Request: OS Command Injection in intel/neural-compressor #555
Labels
ai-bounty-prp
Identify an AI bounty plugin
Contributor queue
When a contributor has already one issue/PR in review, we put the following ones on hold with this.
PRP:Accepted
According to the original report, the Exploit is straightforward and is one simple HTTP request.
the original report:
https://huntr.com/bounties/69c7e0f6-c9de-4ae7-8441-b3bd0dd954a0
CVE-2024-39766
The text was updated successfully, but these errors were encountered: