invoke-ai Exploited Vulnerabilities