βΌ CVE-2022-23569 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. Multiple operations in TensorFlow can be used to trigger a denial of service via `CHECK`-fails (i.e., assertion failures). This is similar to TFSA-2021-198 and has similar fixes. We have patched the reported issues in multiple GitHub commits. It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21725 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. The estimator for the cost of some convolution operations can be made to execute a division by 0. The function fails to check that the stride argument is strictly positive. Hence, the fix is to add a check for the stride argument to ensure it is valid. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21734 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44866 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Online-Movie-Ticket-Booking-System 1.0. The file about.php does not perform input validation on the 'id' paramter. An attacker can append SQL queries to the input to extract sensitive information from the database.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21739 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. The implementation of `QuantizedMaxPool` has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21735 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash a TensorFlow process via a division by 0. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21737 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount` operations allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail. There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
ποΈ Cloudflare bug bounty program goes public with $3k rewards on offer ποΈ
π Read
via "The Daily Swig".
Silicon Valley firm has paid out more than $200k since private programβs 2018 launchπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Cloudflare bug bounty program goes public with $3,000 rewards on offer
Silicon Valley firm has paid out more than $200,000 since private programβs 2018 launch
β Elementor WordPress plugin has a gaping security hole β update now β
π Read
via "Naked Security".
We shouldn't need to say, "Check your inputs!" these days, but we're saying it anyway.π Read
via "Naked Security".
Naked Security
Elementor WordPress plugin has a gaping security hole β update now
We shouldnβt need to say, βCheck your inputs!β these days, but weβre saying it anyway.
β S3 Ep68: Bugs, scams, privacyβ¦ and fonts?! [Podcast + Transcript] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep68: Bugs, scams, privacy β¦and fonts?! [Podcast + Transcript]
Latest episode β listen now!
π Hydra Network Logon Cracker 9.3 π
π Read
via "Packet Storm Security".
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.π Read
via "Packet Storm Security".
Packetstormsecurity
Hydra Network Logon Cracker 9.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ Bittersweet Symfony: Devs accidentally turn off CSRF protection in PHP framework ποΈ
π Read
via "The Daily Swig".
Inadvertent defense downgrade quickly revertedπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Bittersweet Symfony: Devs accidentally turn off CSRF protection in PHP framework
Inadvertent defense downgrade quickly reverted
βΌ CVE-2022-21740 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21741 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft a TFLite model that would trigger a division by zero in the implementation of depthwise convolutions. The parameters of the convolution can be user controlled and are also used within a division operation to determine the size of the padding that needs to be added before applying the convolution. There is no check before this division that the divisor is strictly positive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
β Wormhole Crypto Platform: βFunds Are Safeβ After $314M Heist β
π Read
via "Threat Post".
The popular bridge, which connects Ethereum, Solana blockchain & more, was shelled out by it's-not-saying. Wormhole is trying to negotiate with the attacker.π Read
via "Threat Post".
Threat Post
Wormhole Crypto Platform: βFunds Are Safeβ After $314M Heist
The popular bridge, which connects Ethereum, Solana blockchain & more, was shelled out by it's-not-saying. Wormhole is trying to negotiate with the attacker.
βοΈ How Phishers Are Slinking Their Links Into LinkedIn βοΈ
π Read
via "Krebs on Security".
If you received a link to LinkedIn.com via email, SMS or instant message, would you click it? Spammers, phishers and other ne'er-do-wells are hoping you will, because they've long taken advantage of a marketing feature on the business networking site which lets them create a LinkedIn.com link that bounces your browser to other websites, such as phishing pages that mimic top online brands (but chiefly Linkedin's parent firm Microsoft).π Read
via "Krebs on Security".
Krebsonsecurity
How Phishers Are Slinking Their Links Into LinkedIn
If you received a link to LinkedIn.com via email, SMS or instant message, would you click it? Spammers, phishers and other ne'er-do-wells are hoping you will, because they've long taken advantage of a marketing feature on the business networking siteβ¦
π΄ Big Pharma Finds Patch Management a Bitter Pill π΄
π Read
via "Dark Reading".
One-quarter of pharmaceutical manufacturers received a failing grade on patch management, which is a vital step in heading off ransomware attacks.π Read
via "Dark Reading".
Dark Reading
Big Pharma Finds Patch Management a Bitter Pill
One-quarter of pharmaceutical manufacturers received a failing grade on patch management, which is a vital step in heading off ransomware attacks.
π΄ Simplifying Zero Trust Security in Healthcare Organizations π΄
π Read
via "Dark Reading".
Healthcare organizations are increasingly looking at zero trust to help deter ransomware attacks, safeguard PHI, and prevent downtime.π Read
via "Dark Reading".
Dark Reading
Simplifying Zero Trust Security in Healthcare Organizations
Healthcare organizations are increasingly looking at zero trust to help deter ransomware attacks, safeguard PHI, and prevent downtime.
π A Cyber NTSB: DHS Announces Cyber Review Board π
π Read
via "".
The board will investigate breaches and vulnerabilities to find out why they happened and how to prevent them from happening again.π Read
via "".
Digital Guardian
A Cyber NTSB: DHS Announces Cyber Review Board
The board will investigate breaches and vulnerabilities to find out why they happened and how to prevent them from happening again.
β Critical Cisco Bugs Open VPN Routers to Cyberattacks β
π Read
via "Threat Post".
The company's RV line of small-business routers contains 15 different security vulnerabilities that could enable everything from RCE to corporate network access and denial-of-service β and many have exploits circulating.π Read
via "Threat Post".
Threat Post
Critical Cisco Bugs Open VPN Routers to Cyberattacks
The RV line of small-business routers contains 15 flaws, some unpatched, that could enable RCE, corporate network access or DoS β and many have exploits circulating.
βΌ CVE-2022-24307 βΌ
π Read
via "National Vulnerability Database".
Mastodon before 3.3.2 and 3.4.x before 3.4.6 has incorrect access control because it does not compact incoming signed JSON-LD activities. (JSON-LD signing has been supported since version 1.6.0.)π Read
via "National Vulnerability Database".