Happy Hacking8

干净的信息流推送工具,偏向安全圈的点点滴滴,为安全研究人员每日发现优质内容。

每日更新
时间节点
2021-05-16 16:27:05doonsec
...
本文为2021全国大学生信息安全竞赛初赛部分WP
2021-05-16 15:06:57来自Freebuf
CVE2021-3156 sudo堆溢出漏洞分析与利用研究。
2021-05-16 14:07:02doonsec
...
简介Snapdragon是由美国Qualcomm公司设计和销售的一系列用于移动终端的片上系统(SoC)半导体
2021-05-16 13:46:53doonsec
...
本文为轩辕实验室原创材料,转载需标注来源。
2021-05-16 13:46:53doonsec
2021-05-16 13:46:53doonsec
...
真实招聘,机不可失。八方贤才,及锋而试。
2021-05-16 13:46:53doonsec
...
点击上方「蓝色微信名」可快速关注起源对角斗士的最早记载要追溯到公元前264年。当时的角斗士大多是奴隶,被迫在
2021-05-16 13:27:07doonsec
...
00—前言    在学习JAVA反序列化漏洞的过程中,我们常常使用DNSLOG作为漏洞验证的方法之一。通过查
2021-05-16 13:06:54来自Freebuf
“SOAR”为代表的自动化联动处置技术平台是真正的刚需。
2021-05-16 12:46:58doonsec
...
前言“ 申明:本次测试只作为学习用处,请勿未授权进行渗透测试,切勿用于其它用途!本篇文章来自M78安全团队成
2021-05-16 12:46:58doonsec
2021-05-16 12:46:3152破解论坛
2021-05-16 12:26:51doonsec
2021-05-16 12:26:51doonsec
...
网络攻击者越来越多地利用勒索软件来攻击关键的基础设施,今年2月,一家天然气压缩设施就遭到勒索软件攻击,被迫关
2021-05-16 12:06:52doonsec
...
双方将充分发挥在各自领域的核心优势,为区块链和数字货币相关企业提供更完整的安全解决方案。
2021-05-16 12:06:51doonsec
2021-05-16 11:46:55doonsec
...
以下是START联盟成员撰写的一系列思想文章的一部分。这些社论专栏反映的是作者的观点,而不一定是START联
2021-05-16 11:26:51来自Freebuf
2021年5月12日,美国总统拜登签署名为“加强国家网络安全的行政命令”以加强网络网络安全和保护联邦政府网络。
2021-05-16 11:26:47doonsec
2021-05-16 11:26:47doonsec
...
5月15日,百度安全2020 BSRC年度盛典颁奖仪式在海南三亚海棠湾举行。多位来自学术界、企业界的安全专家、行业领袖出席,并与三十余名优秀白帽代表共同见证了BSRC多个年度重磅奖项的开启。
2021-05-16 11:26:2752破解论坛
2021-05-16 11:06:58来自Freebuf
美国的勒索软件攻击中约有50%到70%是针对中小企业的,去年总计造成3.5亿美元的损失。
2021-05-16 11:06:57doonsec
2021-05-16 11:06:57doonsec
...
坚守为国为民初心,深耕网络安全行业,推陈出新。
2021-05-16 11:06:57doonsec
...
红队进行渗透期间,社工钓鱼的手段必不可少
2021-05-16 11:01:17hackone最新公开漏洞
影响厂商:UPchieve 奖励: 危险等级:high
用户枚举通过忘记密码
2021-05-16 10:26:56doonsec
...
左手狗币右手“shi”币, 马斯克马大叔操纵币圈风云,有人却浪里翻腾,骗取银钱无数。
2021-05-16 10:26:55doonsec
...
红日安全团队最近的一个ATT\\x26amp;CK靶场
2021-05-16 10:26:55doonsec
...
点击左上角订阅了解更多漏洞信息一.引言全球云厂商有很多,本文主要针对Spring Boot信息泄露在aws上
2021-05-16 10:26:55doonsec
...
这里给大家“曝光”我们时常关注的优质网络安全公众号,内容偏向技术类,覆盖范围包括:红蓝对抗、内网渗透、Web
2021-05-16 10:06:54来自Freebuf
作者:[腾讯洋葱反入侵系统] vspiders、七夜、柯南1. 概述4月11日,腾讯洋葱反入侵团队监测到一起PyPI软件供应链攻击事件,经过...
2021-05-16 09:46:44doonsec
...
安全帮®每日资讯Apple设备可通过被利用的“Find My”网络功能收集蓝牙设备信息安全研究人员证实,“S
2021-05-16 09:46:27T00ls论坛
2021-05-16 09:26:46doonsec
...
知己知彼,百战不殆。政企安全部门只有在多次经历实战攻防的洗礼,通过实战对攻击队的攻击手法不断深入了解,才能不
2021-05-16 09:26:46doonsec
...
来自全省的100支队伍300名选手参加了比赛,在AWD PLUS赛场中展开激烈角逐。经过一天的淋漓酣战,山石网科安全技术研究院NEURON战队四道PWN题全部解出,u200b最终获得互联网企业组一等奖。
2021-05-16 09:26:46doonsec
...
勒索黑客刚把美国燃油管道商干趴下了,又勒索爱尔兰医疗系统2000万美元。
2021-05-16 08:46:46doonsec
...
文章前半段会简单的介绍一下Kubernetes,后半段会介绍如何从零开始慢慢的搭建集群。
2021-05-16 08:26:50doonsec
2021-05-16 08:06:58来自Freebuf
在大数据时代的信息化战争中,谁控制了最真实的信息流,谁就控制了这场战争的主导权。
2021-05-16 05:01:17hackone最新公开漏洞
影响厂商:Sifchain(https://hackerone.com/sifchain) 
3 Bucket | 信息泄露
2021-05-16 02:46:35doonsec
...
导读:在超级信息高速公路上绕行。
2021-05-16 01:46:17T00ls论坛
2021-05-16 01:46:1652破解论坛
2021-05-16 00:26:33doonsec
2021-05-16 00:26:33doonsec
2021-05-16 00:06:46SecWiki周报
2021-05-16 00:06:31doonsec
...
兄弟们 快公众号回复加群获取二维码加群吹水!!!!!兄弟们 快公众号回复加群获取二维码加群吹水!!!!!兄弟
2021-05-15 23:46:31doonsec
2021-05-15 23:23:42知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:DedeCMS
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.

DedeCMS V5.7 SP2包含一个 CSRF 漏洞,允许远程攻击者向 web 管理器发送恶意请求,允许远程代码执行。
2021-05-15 23:19:13知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `SVDF` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/7f283ff806b2031f407db64c4d3edcda8fb9f9f5/tensorflow/lite/kernels/svdf.cc#L99-L102). An attacker can craft a model such that `params->rank` would be 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

TensorFlow 是一个端到端的机器学习开源平台。运算符的实现很容易受到零错误的 https://github.com/tensorflow/tensorflow/blob/7f283ff806b2031f407db64c4d3edcda8fb9f9f5/tensorflow/lite/kernels/SVDF.cc#l99-l102。攻击者可以设计一个模型使得‘ params-> rank’为0。这个补丁将包含在 TensorFlow 2.5.0中。我们还将在 TensorFlow 2.4.2,TensorFlow 2.3.3,TensorFlow 2.2.3和 TensorFlow 2.1.4上精心挑选这个提交,因为这些也会受到影响,并且仍然在支持范围内。
2021-05-15 23:18:04知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step of the `SpaceToDepth` TFLite operator does not check for 0 before division(https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). An attacker can craft a model such that `params->block_size` would be zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

TensorFlow 是一个端到端的机器学习开源平台。操作符的‘准备’步骤不会在分割前检查0 https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#l63-l67。攻击者可以设计一个“ params-> block _ size”为零的模型。这个补丁将包含在 TensorFlow 2.5.0中。我们还将在 TensorFlow 2.4.2,TensorFlow 2.3.3,TensorFlow 2.2.3和 TensorFlow 2.1.4上精心挑选这个提交,因为这些也会受到影响,并且仍然在支持范围内。
2021-05-15 23:13:39知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger undefined behavior by binding to null pointer in `tf.raw_ops.ParameterizedTruncatedNormal`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/3f6fe4dfef6f57e768260b48166c27d148f3015f/tensorflow/core/kernels/parameterized_truncated_normal_op.cc#L630) does not validate input arguments before accessing the first element of `shape`. If `shape` argument is empty, then `shape_tensor.flat<T>()` is an empty array. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

TensorFlow 是一个端到端的机器学习开源平台。攻击者可以通过绑定到‘ tf.raw _ ops 中的空指针来触发未定义行为。参数化截断正常’。这是因为在访问第一个元素‘ shape’之前,实现 https://github.com/tensorflow/tensorflow/blob/3f6fe4dfef6f57e768260b48166c27d148f3015f/tensorflow/core/kernels/parameterized_truncated_normal_op.cc#l
2021-05-15 23:13:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `tf.raw_ops.SparseSplit`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/699bff5d961f0abfde8fa3f876e6d241681fbef8/tensorflow/core/util/sparse/sparse_tensor.h#L528-L530) accesses an array element based on a user controlled offset. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

TensorFlow 是一个端到端的机器学习开源平台。攻击者可以在‘ tf.raw _ ops 中导致堆缓冲区溢出。‘ SparseSplit’。这是因为实现( https://github.com/tensorflow/tensorflow/blob/699bff5d961f0abfde8fa3f876e6d241681fbef8/tensorflow/core/util/sparse/sparse_tensor.h#l528-l530)根据用户控制的偏移量访问数组元素。这个补丁将包含在 TensorFlow 2.5.0中。我们还将在 TensorFlow 2.4.2,TensorFlow 2.3.3,TensorFlow 2.2.3和 TensorFlow 2.1.4上精心挑选这个提交,因为这些也会受到影响,并且仍然在支持范围内。
2021-05-15 23:11:54知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
TensorFlow is an end-to-end open source platform for machine learning. An attacker can read data outside of bounds of heap allocated buffer in `tf.raw_ops.QuantizeAndDequantizeV3`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/11ff7f80667e6490d7b5174aa6bf5e01886e770f/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L237) does not validate the value of user supplied `axis` attribute before using it to index in the array backing the `input` argument. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

TensorFlow 是一个端到端的机器学习开源平台。攻击者可以在‘ tf.raw _ ops 中读取堆分配缓冲区边界之外的数据。3‘。这是因为在使用它在支持‘ input’参数的数组中建立索引之前,实现 https://github.com/tensorflow/tensorflow/blob/11ff7f80667e6490d7b5174aa6bf5e01886e770f/tensorflow/core/kernels/quantize_and_dequantize_op.cc#l237不会验证用户提供的‘ axis’属性的值。这个补丁将包含在 TensorFlow 2.5.
2021-05-15 23:11:43知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L85-L89) computes a divisor quantity by dividing two user controlled values. The user controls the values of `input_size[i]` and `pooling_ratio_[i]` (via the `value.shape()` and `pooling_ratio` arguments). If the value in `input_size[i]` is smaller than the `pooling_ratio_[i]`, then the floor operation results in `output_size[i]` being 0. The `DCHECK_GT` line is a no-op outside of debug mode, so in released versions of TF this does not trigger. Later, these computed values are used as arguments(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L96-L99) to 
2021-05-15 23:09:57知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L148-L165) uses `CHECK_*` assertions instead of `OP_REQUIRES` to validate user controlled inputs. Whereas `OP_REQUIRES` allows returning an error condition back to the user, the `CHECK_*` macros result in a crash if the condition is false, similar to `assert`. In this case, `height` is 0 from the `images` input. This results in `max_box_row_clamp` being negative and the assertion being falsified, followed by aborting program execution. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and