2018年4月19日木曜日

19日 木曜日、赤口

+ Cisco WebEx Clients Remote Code Execution Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs
CVE-2018-0112

+ Cisco UCS Director Virtual Machine Information Disclosure Vulnerability for End User Portal
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-uscd
CVE-2018-0238

+ Cisco StarOS Interface Forwarding Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-staros
CVE-2018-0239

+ Cisco IOS XR Software UDP Broadcast Forwarding Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-iosxr
CVE-2018-0241

+ Cisco Firepower Detection Engine Secure Sockets Layer Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort
CVE-2018-0233

+ Cisco Firepower 2100 Series Security Appliances IP Fragmentation Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fp2100
CVE-2018-0230

+ Cisco ASA Software, FTD Software, and AnyConnect Secure Mobility Client SAML Authentication Session Fixation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asaanyconnect
CVE-2018-0229

+ Cisco Adaptive Security Appliance Application Layer Protocol Inspection Denial of Service Vulnerabilities
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa_inspect
CVE-2018-0240

+ Cisco Adaptive Security Appliance TLS Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa3
CVE-2018-0231

+ Cisco Adaptive Security Appliance Flow Creation Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa2
CVE-2018-0228

+ Cisco Adaptive Security Appliance Virtual Private Network SSL Client Certificate Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa1
CVE-2018-0227

+ Cisco WebEx Connect IM Cross-Site Scripting Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-webcon
CVE-2018-0276

+ Cisco Unified Communications Manager LDAP Information Disclosure Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ucm1
CVE-2018-0267

+ Cisco Unified Communications Manager HTTP Interface Information Disclosure Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ucm
CVE-2018-0266

+ Cisco StarOS IPsec Manager Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-starosasr
CVE-2018-0273

+ Cisco Packet Data Network Gateway Peer-to-Peer Message Processing Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-pdng
CVE-2018-0256

+ Cisco Identity Services Engine Shell Access Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise
CVE-2018-0275

+ Cisco Industrial Ethernet Switches Device Manager Cross-Site Request Forgery Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-iess
CVE-2018-0255

+ Cisco Firepower System Software Intelligent Application Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2
CVE-2018-0254

+ Cisco Firepower System Software Server Message Block File Policy Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss1
CVE-2018-0244

+ Cisco Firepower System Software Server Message Block File Policy Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss
CVE-2018-0243

+ Cisco Firepower Threat Defense SSL Engine High CPU Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-firepower
CVE-2018-0272

+ Cisco DNA Center Cross Origin Resource Sharing Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-dna1
CVE-2018-0269

+ Cisco cBR Series Converged Broadband Routers High CPU Usage Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-cbr8
CVE-2018-0257

+ Cisco Adaptive Security Appliance Clientless SSL VPN Cross-Site Scripting Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asawvpn2
CVE-2018-0251

+ Cisco Adaptive Security Appliance WebVPN Cross-Site Scripting Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asawvpn
CVE-2018-0242

+ Cisco AMP for Endpoints macOS Connector DMG File Malware Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-amp
CVE-2018-0237

+ Cisco MATE Live Directory Information Disclosure Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-MATE1
CVE-2018-0260

+ Cisco MATE Collector Cross-Site Request Forgery Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-MATE
CVE-2018-0259

+ Cisco Wireless LAN Controller Default Simple Network Management Protocol Community Strings
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wlc

【開催報告】Amazon Chimeを使ったJAWS DAYS 2018 re:Capが開催されました
https://aws.amazon.com/jp/blogs/news/amazon-chime-jaws-days-2018-recap/

[AWS Black Belt Online Seminar] Amazon EC2 資料及び QA 公開
https://aws.amazon.com/jp/blogs/news/webinar-bb-ec2-2018/

EFS ファイルシステムを Amazon SageMaker ノートブックに (ライフサイクル設定を含めて) マウントする
https://aws.amazon.com/jp/blogs/news/mount-an-efs-file-system-to-an-amazon-sagemaker-notebook-with-lifecycle-configurations/

Amazon Translate を使用したチャットチャンネル
https://aws.amazon.com/jp/blogs/news/translate-a-chat-channel-using-amazon-translate/

より高速で、より柔軟性のあるモデルを Amazon SageMaker 線形学習者でトレーニングする
https://aws.amazon.com/jp/blogs/news/train-faster-more-flexible-models-with-amazon-sagemaker-linear-learner/

ライフサイクル構成およびインターネットアクセスを無効にするオプションを使用して Amazon SageMaker ノートブックインスタンスをカスタマイズする
https://aws.amazon.com/jp/blogs/news/customize-your-amazon-sagemaker-notebook-instances-with-lifecycle-configurations-and-the-option-to-disable-internet-access/

Gluon on Amazon SageMaker 上の Gluon および AWS Batch によるテキスト分類
https://aws.amazon.com/jp/blogs/news/text-classification-with-gluon-on-amazon-sagemaker-and-aws-batch/

Amazon Machine Learning API と PubNub ChatEngine でスマートなチャットアプリを開発する
https://aws.amazon.com/jp/blogs/news/build-smart-chat-apps-with-amazon-machine-learning-apis-and-the-pubnub-chatengine/

Amazon Sagemaker を使用してマーチ・マッドネスを予測する
https://aws.amazon.com/jp/blogs/news/predict-march-madness-using-amazon-sagemaker/

狙われるニッポン 先端技術で守れ
発電所や鉄道も危ない、サイバー攻撃を受けやすくなった理由
http://tech.nikkeibp.co.jp/atcl/nxt/column/18/00233/00012/?ST=nxt_thmit_security

0 件のコメント:

コメントを投稿