Submitter : c2a
Date: 15 January 2024
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.praetorian.com/blog/tensorflow-supply-chain-compromise-via-self-hosted-runner-attack/
Submitter : c2a
Date: 15 January 2024
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.praetorian.com/blog/tensorflow-supply-chain-compromise-via-self-hosted-runner-attack/