Exploitable Weaknesses in Widely Used ML Toolsets Allows Control of Servers, Escalation of Privileges
A group of cybersecurity analysts have revealed nearly twenty security vulnerabilities across fifteen distinct open-source initiatives connected with machine learning...
