{"id":15013,"date":"2022-02-20T02:12:58","date_gmt":"2022-02-19T17:12:58","guid":{"rendered":"https:\/\/begi.net\/news\/?p=15013"},"modified":"2022-02-20T02:13:08","modified_gmt":"2022-02-19T17:13:08","slug":"us-cert%e3%80%81%e3%80%8cknown-exploited-vulnerabilities-catalog%e3%80%8d%e3%81%ab%e6%96%b0%e3%81%9f%e3%81%ab15%e3%81%ae%e6%97%a2%e7%9f%a5%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7%e3%82%92%e8%bf%bd","status":"publish","type":"post","link":"https:\/\/begi.net\/news\/archives\/15013.html","title":{"rendered":"US-CERT\u3001\u300cKnown Exploited Vulnerabilities Catalog\u300d\u306b\u65b0\u305f\u306b15\u306e\u8106\u5f31\u6027\u3092\u8ffd\u52a0\u3001Windows\u3084Mac OS\u306b\u5b58\u5728\u3059\u308b\u5371\u967a\u5ea6\u306e\u9ad8\u3044\u8106\u5f31\u6027"},"content":{"rendered":"<p><A HREF=\"https:\/\/www.cisa.gov\/\">US-CERT<\/A>\u306f2\u670810\u65e5(\u73fe\u5730\u6642\u9593)\u3001\u300cKnown Exploited Vulnerabilities Catalog | CISA\u300d\u306b\u3001\u65b0\u305f\u306b15\u306e\u65e2\u77e5\u306e\u8106\u5f31\u6027\u3092\u8ffd\u52a0\u3057\u305f\u3068\u767a\u8868\u3057\u305f\u3002<\/p>\n<p>\u8ffd\u52a0\u3055\u308c\u305f\u30bf\u30a4\u30c8\u30eb\u306f\u4ee5\u4e0b\u306e\u901a\u308a\u3002<\/p>\n<p>CVE-2021-36934\t\tMicrosoft Windows SAM Local Privilege Escalation Vulnerability<br \/>\nCVE-2020-0796\t\tMicrosoft SMBv3 Remote Code Execution Vulnerability<br \/>\nCVE-2018-1000861\tJenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability<br \/>\nCVE-2017-9791\t\tApache Struts 1 Improper Input Validation Vulnerability<br \/>\nCVE-2017-8464\t\tMicrosoft Windows Shell (.lnk) Remote Code Execution Vulnerability<br \/>\nCVE-2017-10271\t\tOracle Corporation WebLogic Server Remote Code Execution Vulnerability<br \/>\nCVE-2017-0263\t\tMicrosoft Win32k Privilege Escalation Vulnerability<br \/>\nCVE-2017-0262\t\tMicrosoft Office Remote Code Execution Vulnerability<br \/>\nCVE-2017-0145\t\tMicrosoft SMBv1 Remote Code Execution Vulnerability<br \/>\nCVE-2017-0144\t\tMicrosoft SMBv1 Remote Code Execution Vulnerability<br \/>\nCVE-2016-3088\t\tApache ActiveMQ Improper Input Validation Vulnerability<br \/>\nCVE-2015-2051\t\tD-Link DIR-645 Router Remote Code Execution<br \/>\nCVE-2015-1635\t\tMicrosoft HTTP.sys Remote Code Execution Vulnerability<br \/>\nCVE-2015-1130\t\tApple OS X Authentication Bypass Vulnerability<br \/>\nCVE-2014-4404\t\tApple OS X Heap-Based Buffer Overflow Vulnerability<\/p>\n<p>Windows\u3084Mac OS\u306b\u5b58\u5728\u3059\u308b\u8106\u5f31\u6027\u304c\u6319\u3052\u3089\u308c\u3066\u304a\u308a\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u4e8b\u4f8b\u3082\u3042\u308b\u3068\u3044\u3046\u3002Windows\u3084Mac OS\u3067\u306f\u3059\u3067\u306b\u3053\u308c\u3089\u306e\u8106\u5f31\u6027\u306e\u4fee\u6b63\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b\u305f\u3081\u3001\u30e6\u30fc\u30b6\u306f\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u9069\u7528\u3059\u308b\u3053\u3068\u304c\u5f37\u304f\u63a8\u5968\u3055\u308c\u308b<\/p>\n<p align=\"right\">(\u5ddd\u539f \u9f8d\u4eba\/\u3073\u304e\u306d\u3063\u3068)<\/p>\n<p><b>[\u95a2\u9023\u30ea\u30f3\u30af]<\/b><br \/>\n<A HREF=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">\u30a2\u30ca\u30a6\u30f3\u30b9<\/A><\/p>\n","protected":false},"excerpt":{"rendered":"<p>US-CERT\u306f2\u670810\u65e5(\u73fe\u5730\u6642\u9593)\u3001\u300cKnown Exploited Vulnerabilities Catalog | CISA\u300d\u306b\u3001\u65b0\u305f\u306b15\u306e\u65e2\u77e5\u306e\u8106\u5f31\u6027\u3092\u8ffd\u52a0\u3057\u305f\u3068\u767a\u8868\u3057\u305f\u3002 \u8ffd\u52a0\u3055\u308c\u305f\u30bf\u30a4\u30c8\u30eb\u306f\u4ee5\u4e0b\u306e\u901a\u308a\u3002 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-15013","post","type-post","status-publish","format-standard","hentry","category-16"],"_links":{"self":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/15013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/comments?post=15013"}],"version-history":[{"count":2,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/15013\/revisions"}],"predecessor-version":[{"id":15015,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/15013\/revisions\/15015"}],"wp:attachment":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/media?parent=15013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/categories?post=15013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/tags?post=15013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}