Google TensorFlowΪÐÞ¸´RCEÎó²î¶ø²»ÔÙÖ§³ÖYAML£ºNetgearÐû²¼Çå¾²¸üÐÂ

Ðû²¼Ê±¼ä 2021-09-08

Google TensorFlowΪÐÞ¸´RCEÎó²î¶ø²»ÔÙÖ§³ÖYAML


Google TensorFlowΪÐÞ¸´RCEÎó²î¶ø²»ÔÙÖ§³ÖYAML.jpg

 

Google¿ª·¢µÄ»ùÓÚPythonµÄ»úеѧϰºÍÈ˹¤ÖÇÄÜÏîÄ¿TensorFlowÒѾ­·ÅÆúÁ˶ÔYAMLµÄÖ§³Ö¡£¡£ ¡£TensorFlow´úÂëÖеÄyaml.unsafe_load()º¯Êý±£´æÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬×·×ÙΪCVE-2021-37678£¬£¬£¬£¬£¬£¬£¬ÆÀ·ÖΪ9.3¡£¡£ ¡£µ±Ó¦Ó÷´ÐòÁл¯YAMLÃûÌõÄKerasÄ£×Óʱ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£ÎªÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬£¬TensorFlow¾öÒéÍêÈ«·ÅÆúYAMLµÄÖ§³Ö£¬£¬£¬£¬£¬£¬£¬×ª¶øÊ¹ÓÃJSON·´ÐòÁл¯¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/googles-tensorflow-drops-yaml-support-due-to-code-execution-flaw/


NetgearÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆä20¿î²úÆ·µÄÎó²î


NetgearÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆä20¿î²úÆ·µÄÎó²î.jpg


ÍøÂç×°±¸¹©Ó¦ÉÌNetgearÓÚÉÏÖÜ9ÔÂ3ÈÕÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆä20¿î²úÆ·µÄ3¸öÎó²î¡£¡£ ¡£ÕâЩÎó²îµÄ´úºÅ»®·ÖΪDemon's Cries¡¢Draconian FearºÍSeventh Inferno£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚǰÁ½¸öÎó²îµÄPoCÒѾ­¹ûÕæ¡£¡£ ¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬×îÑÏÖØµÄÊÇDemon's Cries£¬£¬£¬£¬£¬£¬£¬CVSSv3ÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÈÆ¹ýÉí·ÝÑéÖ¤²¢½ÓÊÜ×°±¸¡£¡£ ¡£Draconian FearÒ²ÊÇÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÄÜÓÃÓÚÐ®ÖÆµÇ¼µÄÖÎÀíÔ±»á»°¡£¡£ ¡£Ñо¿Ö°Ô±Ô¤¼ÆÔÚÏÂÖÜÒ»£¬£¬£¬£¬£¬£¬£¬¼´9ÔÂ13ÈÕÐû²¼¹ØÎó²îSeventh InfernoµÄÊÖÒÕϸ½Ú¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/demons-cries-authentication-bypass-patched-in-netgear-switches/


Node.js¿ª·¢ÍŶÓÐÞ¸´NPM°ünode-tarÖеĶà¸öÎó²î


Node.js¿ª·¢ÍŶÓÐÞ¸´NPM°ünode-tarÖеĶà¸öÎó²î.png


Node.js¿ª·¢ÍŶÓÐÞ¸´ÁËNPM°ü¡°tar¡±£¨ÓÖÃûnode-tar£©ÖеÄ5¸öÎó²î¡£¡£ ¡£ÆäÖнÏΪÑÏÖØµÄÊÇÎó²îCVE-2021-37712ºÍCVE-2021-37701¡£¡£ ¡£Èç¹ú¼ÒÎó²îÊý¾Ý¿â(NVD)ÖÐËùÊö£¬£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î¿ÉÓÃÀ´½¨ÉèºÍÁýÕÖí§ÒâÎļþ£¬£¬£¬£¬£¬£¬£¬»òÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö¾ùΪ8.2¡£¡£ ¡£´Ë´ÎÐÞ¸´µÄÎó²îÓ°ÏìÁ˸ÃNPM°ü°æ±¾5.0.0֮ǰµÄ°æ±¾¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/09/critical-flaws-in-npm-package-patched.html


ÖйúÏã¸ÛBilaxyÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô¤¼ÆËðʧÁè¼Ý2100ÍòÃÀÔª


ÖйúÏã¸ÛBilaxyÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô¤¼ÆËðʧÁè¼Ý2100ÍòÃÀÔª.jpg


8ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬ÖйúÏã¸ÛµÄ¼ÓÃÜÇ®±ÒÉúÒâËùBilaxy³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô¤¼ÆËðʧÁè¼Ý2100ÍòÃÀÔª¡£¡£ ¡£BilaxyÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ8ÔÂ28ÈÕÏÂÖç6µãµ½7µãÖ®¼ä£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡ÁË295¸öERC-20±Ò¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬BilaxyÒÑ×èÖ¹ÁËÆäÍøÕ¾ÉÏÕýÔÚ¾ÙÐÐÉúÒ⣬£¬£¬£¬£¬£¬£¬²¢ÇÒ½¨Òé¿Í»§ÔÝʱ²»Òª½«ÓÃÓÚÉúÒâµÄ¼ÓÃÜÇ®±Ò´æÈëÉúÒâËù¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾½«ÔÝͣЧÀÍÖÁÉÙ2ÖÜ£¬£¬£¬£¬£¬£¬£¬ÓÃÀ´ÆÊÎöºÚ¿ÍÐÐΪºÍ¸üÐÂϵͳ£¬£¬£¬£¬£¬£¬£¬²¢ÊµÑéÈ¡»Ø±»µÁµÄERC-20±Ò¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/09/cryptocurrency-exchange-bilaxy-under.html


FortiGuardÐû²¼2021ÄêH1È«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


FortiGuardÐû²¼2021ÄêH1È«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ.png


FortiGuardÓÚ8Ô·ÝÐû²¼ÁË2021ÄêH1È«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬2021Äê6ÔÂÆ½¾ùÿÖÜÀÕË÷Èí¼þ»î¶¯±ÈÒ»ÄêǰͬÆÚºá¿ç10.7±¶¡£¡£ ¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬µçÐÅÐÐÒµÊǹ¥»÷ÕßµÄÖ÷ÒªµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÕþ¸®¡¢ÍйÜÇ徲ЧÀÍÌṩÉÌ¡¢Æû³µºÍÖÆÔìÐÐÒµ¡£¡£ ¡£½©Ê¬ÍøÂçÒ²ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬£¬½ñÄêÄêÍ·ÔÚ35%µÄ×éÖ¯Öмì²âµ½Á˽©Ê¬ÍøÂç»î¶¯£¬£¬£¬£¬£¬£¬£¬¶øÕâÒ»±ÈÀýÔÚ6¸öÔºóÔöÌíΪ51%¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߸üÇàíùÓÚ¼ì²âÈÆ¹ýÊÖÒÕºÍÌáȨÊÖÒÕ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/report-threat-landscape-2021.pdf


Positive TechnologiesÐû²¼2021Ä깤ҵΣº¦µÄ±¨¸æ


Positive TechnologiesÐû²¼2021Ä깤ҵΣº¦µÄ±¨¸æ.jpg


Positive TechnologiesÓÚ9ÔÂ1ÈÕÐû²¼ÁË2021Ä깤ҵÐÅÏ¢Ç徲Σº¦µÄÆÊÎö±¨¸æ¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬2020Ä꣬£¬£¬£¬£¬£¬£¬¹¤Òµ²¿·ÖÊǽö´ÎÓÚÕþ¸®µÄµÚ¶þ´ó¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬ÓÐ12%µÄ¹¥»÷Õë¶Ô¹¤Òµ¹«Ë¾¡£¡£ ¡£ÔÚ91%µÄ¹¤Òµ¹«Ë¾ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÉøÍ¸½øÈëÄÚÍø£¬£¬£¬£¬£¬£¬£¬Ö®ºó¹¥»÷Õ߾ͿÉÒÔ»ñµÃÓû§Æ¾Ö¤²¢ÍêÈ«¿ØÖÆ»ù´¡ÉèÊ©¡£¡£ ¡£2021Äê5Ô£¬£¬£¬£¬£¬£¬£¬ÔÚThe Standoff 2021µÄÐéÄâ°Ð³¡Õ¹Ê¾ÁËÐÅÏ¢Çå¾²¶Ô¹¤Òµ×éÖ¯µÄÓ°Ï죬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÁ½ÌìÄÚ¿ØÖÆÁ˼ÓÓÍÕ¾£¬£¬£¬£¬£¬£¬£¬×èÖ¹ÁË×ÔÈ»Æø¹©Ó¦²¢Òý·¢Á˱¬Õ¨¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ptsecurity.com/ww-en/analytics/ics-risks-2021/