{"id":1883,"date":"2021-09-25T20:53:24","date_gmt":"2021-09-25T11:53:24","guid":{"rendered":"https:\/\/csirt.ninja\/?p=1883"},"modified":"2021-09-26T13:47:57","modified_gmt":"2021-09-26T04:47:57","slug":"%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e6%94%bb%e6%92%83%e8%80%85%e3%81%8c%e5%88%a9%e7%94%a8%e3%81%99%e3%82%8b%e8%84%86%e5%bc%b1%e6%80%a7%e3%83%aa%e3%82%b9%e3%83%88%e3%83%a1","status":"publish","type":"post","link":"https:\/\/csirt.ninja\/?p=1883","title":{"rendered":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u8005\u304c\u5229\u7528\u3059\u308b\u8106\u5f31\u6027\u30ea\u30b9\u30c8\u30e1\u30e2"},"content":{"rendered":"<h3>\u25a0\u6982\u8981<\/h3>\n<p>2021\u5e7409\u670812\u65e5\u3001Recorded Future\u306eCSIRT\u30e1\u30f3\u30d0\u30fc\u3067\u3042\u308bAllan Liska\u6c0f\u304c<a href=\"https:\/\/twitter.com\/uuallan\/status\/1436852174621925376\">Twitter\u4e0a\u3067\u547c\u3073\u304b\u3051\u3092\u884c\u3044\u307e\u3057\u305f<\/a>\u3002<\/p>\n<p>\u305d\u306e\u547c\u3073\u304b\u3051\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u653b\u6483\u8005\u304c\u521d\u671f\u30a2\u30af\u30bb\u30b9\u3092\u7372\u5f97\u3059\u308b\u305f\u3081\u306b\u4f7f\u7528\u3059\u308b\u8106\u5f31\u6027\u306e\u30ea\u30b9\u30c8\u3092\u4f5c\u6210\u3057\u3088\u3046\u3068\u3057\u3066\u3044\u308b\u3068\u3044\u3046\u3082\u306e\u3067\u3001\u3044\u304f\u3064\u304b\u306e\u30d9\u30f3\u30c0\u30fc\u3084\u88fd\u54c1\u540d\u3068\u3068\u3082\u306bCVE\u756a\u53f7\u304c\u5217\u6319\u3055\u308c\u305f\u30ea\u30b9\u30c8\u306e\u753b\u50cf\u304c\u6dfb\u4ed8\u3055\u308c\u3066\u304a\u308a\u3001\u3053\u306e\u30ea\u30b9\u30c8\u306b\u63b2\u8f09\u3055\u308c\u3066\u3044\u306a\u3044\u3082\u306e\u304c\u3042\u308b\u304b\u3068\u3044\u3046\u3082\u306e\u3067\u3057\u305f\u3002\u3053\u308c\u306b\u5bfe\u3057\u3066\u3001\u69d8\u3005\u306a\u30ec\u30b9\u30dd\u30f3\u30b9\u304c\u3042\u308a\u3001\u30ea\u30b9\u30c8\u306f\u62e1\u5145(\u521d\u671f\u30a2\u30af\u30bb\u30b9\u7372\u5f97\u306b\u5229\u7528\u3055\u308c\u308b\u8106\u5f31\u6027\u4ee5\u5916\u3082\u542b\u3080)\u3055\u308c\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u7a76\u8005\u3067\u3042\u308b\u3001<a href=\"https:\/\/twitter.com\/pancak3lullz\/status\/1438897285484720129\">Pancak3\u6c0f\u304c\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u56f3\u3092\u4f5c\u6210<\/a>\u3057\u307e\u3057\u305f\u3002<\/p>\n<p><a href=\"http:\/\/csirt.ninja\/wp-content\/uploads\/2021\/09\/pancak3cvechart.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1889\" src=\"http:\/\/csirt.ninja\/wp-content\/uploads\/2021\/09\/pancak3cvechart-300x226.png\" alt=\"\" width=\"300\" height=\"226\" srcset=\"https:\/\/csirt.ninja\/wp-content\/uploads\/2021\/09\/pancak3cvechart-300x226.png 300w, https:\/\/csirt.ninja\/wp-content\/uploads\/2021\/09\/pancak3cvechart.png 693w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>\u3053\u308c\u3089\u306e\u6d41\u308c\u3092\u898b\u3066\u3044\u3066\u3001\u975e\u5e38\u306b\u3088\u3044\u53d6\u308a\u7d44\u307f\u3060\u3068\u601d\u3044\u3001\u79c1\u3082\u5fae\u529b\u306a\u304c\u3089\u8ca2\u732e\u3057\u305f\u3044\u3068\u8003\u3048\u307e\u3057\u305f\u3002<br \/>\npancak3\u6c0f\u304c\u4f5c\u6210\u3055\u308c\u305f\u56f3\u3060\u3051\u3067\u306f\u3001\u500b\u5225\u306e\u8106\u5f31\u6027\u60c5\u5831\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3084\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30d0\u30fc\u30b8\u30e7\u30f3\u3092\u77e5\u308b\u3053\u3068\u304c\u76f4\u63a5\u7684\u306b\u306f\u3067\u304d\u306a\u3044\u305f\u3081\u3001\u305d\u308c\u305e\u308c\u3092\u4e00\u89a7\u8868\u306b\u307e\u3068\u3081\u305f\u3082\u306e\u3092\u4f5c\u6210\u3057\u307e\u3057\u305f\u306e\u3067\u5171\u6709\u3044\u305f\u3057\u307e\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<h3>\u25a0\u4e00\u89a7\u8868<\/h3>\n<table style=\"border-collapse: collapse; width: 82.7055%; height: 1580px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px; text-align: left;\">\u30d9\u30f3\u30c0\u30fc\u3001\u88fd\u54c1\u540d<\/td>\n<td style=\"width: 10.8047%; height: 23px; text-align: left;\">CVE\u756a\u53f7<\/td>\n<td style=\"width: 43.5898%; height: 23px; text-align: left;\">\u5f71\u97ff\u3092\u53d7\u3051\u308b\u30b7\u30b9\u30c6\u30e0<\/td>\n<td style=\"width: 11.4195%; height: 23px; text-align: left;\">\u53c2\u8003\u30ea\u30f3\u30af<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"5\">Pulse Secure VPN<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-11510<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Pulse\u00a0Connect\u00a0Secure 8.1R15.1\u00a0\u672a\u6e80<\/li>\n<li>Pulse\u00a0Connect\u00a0Secure 8.2R12.1\u00a0\u672a\u6e80\u306e\u00a08.2<\/li>\n<li>Pulse\u00a0Connect\u00a0Secure 8.3R7.1\u00a0\u672a\u6e80\u306e\u00a08.3<\/li>\n<li>Pulse\u00a0Connect\u00a0Secure 9.0R3.4\u00a0\u672a\u6e80\u306e\u00a09.0<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-004411.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11510\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44101\/\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-11539<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Pulse\u00a0Connect\u00a0Secure 9.0R3.4\u00a0\u672a\u6e80\u306e\u00a09.0RX<\/li>\n<li>Pulse\u00a0Connect\u00a0Secure 8.3R7.1\u00a0\u672a\u6e80\u306e\u00a08.3RX<\/li>\n<li>Pulse\u00a0Connect\u00a0Secure 8.2R12.1\u00a0\u672a\u6e80\u306e\u00a08.2RX<\/li>\n<li>Pulse\u00a0Connect\u00a0Secure 8.1R15.1\u00a0\u672a\u6e80\u306e8.1RX<\/li>\n<li>Pulse\u00a0Policy\u00a0Secure 9.0R3.2\u00a0\u672a\u6e80\u306e\u00a09.0RX<\/li>\n<li>Pulse\u00a0Policy\u00a0Secure 5.4R7.1\u00a0\u672a\u6e80\u306e\u00a05.4RX<\/li>\n<li>Pulse\u00a0Policy\u00a0Secure 5.3R12.1\u00a0\u672a\u6e80\u306e\u00a05.3RX<\/li>\n<li>Pulse\u00a0Policy\u00a0Secure 5.2R12.1\u00a0\u672a\u6e80\u306e\u00a05.2RX<\/li>\n<li>Pulse\u00a0Policy\u00a0Secure 5.1R15.1\u00a0\u672a\u6e80\u306e\u00a05.1RX<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-004175.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11539\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44101\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-8243<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Pulse\u00a0Connect\u00a0Secure 9.1R8.2\u00a0\u672a\u6e80<\/li>\n<li>Pulse\u00a0Policy\u00a0Secure<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-011852.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-8243\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44588\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-8260<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Pulse\u00a0Secure\u00a0Desktop\u00a0Client 9.1R9\u00a0\u672a\u6e80<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-009660.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-8260\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44601\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-22893<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Pulse\u00a0Connect\u00a0Secure (PCS)\u00a0version\u00a09.0R3\u00a0\u304a\u3088\u3073\u305d\u308c\u4ee5\u964d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2021\/JVNDB-2021-001375.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22893\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44784\/\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"4\">Citrix<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-11634<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Citrix Receiver 4.9.6001\u672a\u6e80<\/li>\n<li>Citrix\u00a0Workspace 1904\u00a0\u672a\u6e80<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-004788.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11634\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/support.citrix.com\/article\/CTX251986\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-19781<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>CitrixADC\u304a\u3088\u3073CitrixGateway\u30d0\u30fc\u30b8\u30e7\u30f313.0\u306e13.0.47.24 \u4ee5\u524d<\/li>\n<li>NetScalerADC\u304a\u3088\u3073NetScalerGateway\u30d0\u30fc\u30b8\u30e7\u30f312.1\u306e12.1.55.18 \u4ee5\u524d<\/li>\n<li>NetScalerADC\u304a\u3088\u3073NetScalerGateway\u30d0\u30fc\u30b8\u30e7\u30f312.0\u306e12.0.63.13 \u4ee5\u524d<\/li>\n<li>NetScalerADC\u304a\u3088\u3073NetScalerGateway\u30d0\u30fc\u30b8\u30e7\u30f311.1\u306e11.1.63.15 \u4ee5\u524d<\/li>\n<li>NetScalerADC\u304a\u3088\u3073NetScalerGateway\u30d0\u30fc\u30b8\u30e7\u30f310.5\u306e10.5.70.12 \u4ee5\u524d<\/li>\n<li>CitrixSD-WAN WANOP\u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30e2\u30c7\u30eb4000-WO\u30014100-WO\u30015000-WO\u3001\u304a\u3088\u30735100-WO\u306e10.2.6b\u304a\u3088\u307311.0.3b\u3000\u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-013490.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-19781\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/support.citrix.com\/article\/CTX267027\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-8195<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Citrix\u00a0Gateway\u00a0Plug-in\u00a0for\u00a0Linux<\/li>\n<li>Citrix\u00a0Application\u00a0Delivery\u00a0Controller\u00a0\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2<\/li>\n<li>Citrix\u00a0Gateway\u00a0\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2<\/li>\n<li>Citrix\u00a0SDWAN\u00a0WAN-OP<\/li>\n<li>NetScaler\u00a0Gateway\u00a0\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-007580.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-8195\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/support.citrix.com\/article\/CTX276688\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-8196<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Citrix\u00a0Application\u00a0Delivery\u00a0Controller\u00a0\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2<\/li>\n<li>Citrix\u00a0Gateway\u00a0\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2<\/li>\n<li>Citrix\u00a0SDWAN\u00a0WAN-OP<\/li>\n<li>NetScaler\u00a0Gateway\u00a0\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-007581.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-8196\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/support.citrix.com\/article\/CTX276688\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"3\">Fortinet<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2018-13379<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>FortiOS 6.0.0\u00a0\u304b\u3089\u00a06.0.4<\/li>\n<li>FortiOS 5.6.3\u00a0\u304b\u3089\u00a05.6.7<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2018\/JVNDB-2018-015565.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-13379\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/fortiguard.com\/psirt\/FG-IR-18-384\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-5591<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>FortiOS 6.2.0 \u304a\u3088\u3073\u305d\u308c\u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-015828.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5591\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-19-037\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-12812<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>FortiOS 6.4.0<\/li>\n<li>FortiOS 6.2.0\u00a0\u304b\u3089\u00a06.2.3<\/li>\n<li>FortiOS 6.0.9\u00a0\u304a\u3088\u3073\u305d\u308c\u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-008709.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-12812\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/fortiguard.com\/psirt\/FG-IR-19-283\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"3\">SonicWall<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-7481<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>SMA100\u00a0\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2 9.0.0.3\u00a0\u304a\u3088\u3073\u305d\u308c\u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-013300.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-7481\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/psirt.global.sonicwall.com\/vuln-list\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-5135<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>SonicOS6.5.4.6-79n \u4ee5\u524d<\/li>\n<li>SonicOS6.5.1.11-4n \u4ee5\u524d<\/li>\n<li>SonicOS6.0.5.3-93o \u4ee5\u524d<\/li>\n<li>SonicOSv6.5.4.4-44v-21-794 \u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-012474.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5135\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2020-0010\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-20016<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a210\u7cfb\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u3067\u7a3c\u50cd\u3059\u308b\u4ee5\u4e0b\u306e\u88fd\u54c1<\/p>\n<ul>\n<li>SMA 200, SMA 210, SMA 400, SMA 410<\/li>\n<li>SMA 500v (Azure, AWS, ESXi, HyperV)<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-20016\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2021-0001\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"2\">F5<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-5902<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO, CGNAT)\u306e\u4ee5\u4e0b\u306e\u30d0\u30fc\u30b8\u30e7\u30f3<\/p>\n<ul>\n<li>\u30d6\u30e9\u30f3\u30c1 15\u306e15.1.0\u304a\u3088\u307315.0.0\u304b\u308915.0.1<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 14\u306e14.1.0\u304b\u308914.1.2<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 13\u306e13.1.0\u304b\u308913.1.3<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 12\u306e12.1.0\u304b\u308912.1.5<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 11\u306e11.6.1\u304b\u308911.6.5<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-007318.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5902\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/support.f5.com\/csp\/article\/K52145254\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-22986<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">BIG-IP(LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)\u306e\u4ee5\u4e0b\u306e\u30d0\u30fc\u30b8\u30e7\u30f3<\/p>\n<ul>\n<li>\u30d6\u30e9\u30f3\u30c1 16\u306e16.0.0\u304b\u308916.0.1<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 15\u306e15.1.0\u304b\u308915.1.2<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 14\u306e14.1.0\u304b\u308914.1.3<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 13\u306e13.1.0\u304b\u308913.1.3<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 12\u306e12.1.0\u304b\u308912.1.5<\/li>\n<\/ul>\n<p>BIG-IQ Centralized Management<\/p>\n<ul>\n<li>\u30d6\u30e9\u30f3\u30c1 7\u306e7.1.0\u304a\u3088\u30737.0.0<\/li>\n<li>\u30d6\u30e9\u30f3\u30c1 6\u306e6.0.0.\u304b\u30896.1.0<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22986\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/support.f5.com\/csp\/article\/K03009991\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"2\">Palo Alto<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-1579<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>PAN-OS 7.1.18\u00a0\u304a\u3088\u3073\u305d\u308c\u4ee5\u524d<\/li>\n<li>PAN-OS 8.0.11\u00a0\u304a\u3088\u3073\u305d\u308c\u4ee5\u524d<\/li>\n<li>PAN-OS 8.1.2\u00a0\u304a\u3088\u3073\u305d\u308c\u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-006592.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-1579\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/securityadvisories.paloaltonetworks.com\/Home\/Detail\/158\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-2021<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>PAN-OS 9.1\u00a0\u4ee5\u4e0a\u00a09.1.3\u00a0\u672a\u6e80<\/li>\n<li>PAN-OS 9.0\u00a0\u4ee5\u4e0a\u00a09.0.9\u00a0\u672a\u6e80<\/li>\n<li>PAN-OS 8.1\u00a0\u4ee5\u4e0a\u00a08.1.15\u00a0\u672a\u6e80<\/li>\n<li>PAN-OS 8.0<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-007341.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-2021\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2020-2021\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"2\">QNAP<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-36198<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>QTS 4.4.x: Malware Remover 4.5.4.0 \u4ee5\u4e0a 4.6.1.0 \u672a\u6e80<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-36198\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.qnap.com\/zh-tw\/security-advisory\/qsa-21-16\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-28799<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>QTS 4.5.2: Hybrid Backup Sync 3 16.0.0415 \u672a\u6e80<\/li>\n<li>QTS 4.3.6: Hybrid Backup Sync 3 3.0.210412 \u672a\u6e80<\/li>\n<li>QTS 4.3.3\u304a\u3088\u30734.3.4: Hybrid Backup Sync 3 3.0.210411 \u672a\u6e80<\/li>\n<li>QuTS hero h4.5.1: Hybrid Backup Sync 3 16.0.0419 \u672a\u6e80<\/li>\n<li>QuTScloud c4.5.1\u304b\u3089c4.5.4: Hybrid Backup Sync 3 16.0.0419 \u672a\u6e80<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-28799\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.qnap.com\/en\/security-advisory\/QSA-21-13\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\">Sophos<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-12271<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>SFOS 17.0<\/li>\n<li>SFOS 17.1<\/li>\n<li>SFOS 17.5<\/li>\n<li>SFOS 2020\/04\/25\u00a0\u3088\u308a\u524d\u306e\u00a018.0<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-004916.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-12271\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000039388?language=en_US\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"4\">Microsoft Windows<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-0708<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Windows\u00a07 for\u00a032-bit\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a07 for\u00a0x64-based\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a032-bit\u00a0Systems\u00a0SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a032-bit\u00a0Systems\u00a0SP2\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a0Itanium-Based\u00a0Systems\u00a0SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a0x64-based\u00a0Systems\u00a0SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a0x64-based\u00a0Systems\u00a0SP2\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0Itanium-Based\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0x64-based\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0x64-based\u00a0Systems\u00a0SP1\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-003551.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-0708\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2019-0708\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2020-1472<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Windows\u00a0Server version\u00a01903\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server version\u00a01909\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server version\u00a02004\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0x64-based\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0x64-based\u00a0Systems\u00a0SP1\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012 (Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012 R2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012 R2\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02016<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02016 (Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02019<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02019 (Server\u00a0Core\u00a0installation)<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2020\/JVNDB-2020-008530.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-1472\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-1472\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-31166<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Windows\u00a010 Version\u00a02004\u00a0for\u00a032-bit\u00a0Systems<\/li>\n<li>Microsoft\u00a0Windows\u00a010 Version\u00a02004\u00a0for\u00a0ARM64-based\u00a0Systems<\/li>\n<li>Microsoft\u00a0Windows\u00a010 Version\u00a02004\u00a0for\u00a0x64-based\u00a0Systems<\/li>\n<li>Microsoft\u00a0Windows\u00a010 Version\u00a020H2\u00a0for\u00a032-bit\u00a0Systems<\/li>\n<li>Microsoft\u00a0Windows\u00a010 Version\u00a020H2\u00a0for\u00a0ARM64-based\u00a0Systems<\/li>\n<li>Microsoft\u00a0Windows\u00a010 Version\u00a020H2\u00a0for\u00a0x64-based\u00a0Systems<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server version\u00a02004\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server version\u00a020H2\u00a0(Server\u00a0Core\u00a0Installation)<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2021\/JVNDB-2021-001508.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31166\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31166\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-36942<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Windows\u00a0Server version\u00a02004\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server version\u00a020H2\u00a0(Server\u00a0Core\u00a0Installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0x64-based\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0x64-based\u00a0Systems\u00a0SP1\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a032-bit\u00a0Systems\u00a0SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a032-bit\u00a0Systems\u00a0SP2\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a0x64-based\u00a0Systems\u00a0SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a0x64-based\u00a0Systems\u00a0SP2\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012 (Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012 R2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012 R2\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02016<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02016 (Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02019<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02019 (Server\u00a0Core\u00a0installation)<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2021\/JVNDB-2021-002297.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-36942\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-36942\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"4\">\u00a0Microsoft Exchange<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-26855<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Exchange\u00a0Server 2013\u00a0Cumulative\u00a0Update\u00a021<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2013\u00a0Cumulative\u00a0Update\u00a022<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2013\u00a0Cumulative\u00a0Update\u00a023<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a010<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a011<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a012<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a013<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a014<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a015<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a016<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a017<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a018<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a019<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a08<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a09<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a01<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a02<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a03<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a04<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a05<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a06<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a07<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a08<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2021\/JVNDB-2021-001133.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26855\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-26855\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-31207<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Exchange\u00a0Server 2013\u00a0Cumulative\u00a0Update\u00a023<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a019<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a020<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a08<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a09<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2021\/JVNDB-2021-001516.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31207\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-31207\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-34473<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Exchange\u00a0Server 2013\u00a0Cumulative\u00a0Update\u00a023<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a019<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a020<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a08<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a09<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2021\/JVNDB-2021-002172.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-34473\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-34473\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-34523<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Exchange\u00a0Server 2013\u00a0Cumulative\u00a0Update\u00a023<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a019<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2016\u00a0Cumulative\u00a0Update\u00a020<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a08<\/li>\n<li>Microsoft\u00a0Exchange\u00a0Server 2019\u00a0Cumulative\u00a0Update\u00a09<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2021\/JVNDB-2021-002240.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-34523\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-34523\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\" rowspan=\"3\">Microsoft Office<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2017-0199<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Office 2007\u00a0SP3<\/li>\n<li>Microsoft\u00a0Office 2010\u00a0SP2\u00a0(32-bit\u00a0editions)<\/li>\n<li>Microsoft\u00a0Office 2010\u00a0SP2\u00a0(64-bit\u00a0editions)<\/li>\n<li>Microsoft\u00a0Office 2013\u00a0SP1\u00a0(32-bit\u00a0editions)<\/li>\n<li>Microsoft\u00a0Office 2013\u00a0SP1\u00a0(64-bit\u00a0editions)<\/li>\n<li>Microsoft\u00a0Office 2016\u00a0(32-bit\u00a0edition)<\/li>\n<li>Microsoft\u00a0Office 2016\u00a0(64-bit\u00a0edition)<\/li>\n<li>Microsoft\u00a0Windows\u00a07 for\u00a032-bit\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a07 for\u00a0x64-based\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0Itanium-Based\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0x64-based\u00a0Systems\u00a0SP1<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 R2\u00a0for\u00a0x64-based\u00a0Systems\u00a0SP1\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a032-bit\u00a0Systems\u00a0SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a032-bit\u00a0Systems\u00a0SP2\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a0Itanium-Based\u00a0Systems\u00a0SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a0x64-based\u00a0Systems\u00a0SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02008 for\u00a0x64-based\u00a0Systems\u00a0SP2\u00a0(Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012<\/li>\n<li>Microsoft\u00a0Windows\u00a0Server\u00a02012 (Server\u00a0Core\u00a0installation)<\/li>\n<li>Microsoft\u00a0Windows\u00a0Vista SP2<\/li>\n<li>Microsoft\u00a0Windows\u00a0Vista x64\u00a0Edition\u00a0SP2<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2017\/JVNDB-2017-002402.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0199\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-0199\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2017-11882<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0Office 2007\u00a0Service\u00a0Pack\u00a03<\/li>\n<li>Microsoft\u00a0Office 2010\u00a0Service\u00a0Pack\u00a02\u00a0(32-bit\u00a0editions)<\/li>\n<li>Microsoft\u00a0Office 2013\u00a0Service\u00a0Pack\u00a01\u00a0(32-bit\u00a0editions)<\/li>\n<li>Microsoft\u00a0Office 2013\u00a0Service\u00a0Pack\u00a01\u00a0(64-bit\u00a0editions)<\/li>\n<li>Microsoft\u00a0Office 2016\u00a0(32-bit\u00a0edition)<\/li>\n<li>Microsoft\u00a0Office 2016\u00a0(64-bit\u00a0edition)<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2017\/JVNDB-2017-009645.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-11882\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-11882\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-40444<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Windows 10<\/li>\n<li>Windows 8.1<\/li>\n<li>Windows RT 8.1<\/li>\n<li>Windows 7<\/li>\n<li>Windows Server<\/li>\n<li>Windows Server 2022<\/li>\n<li>Windows Server 2019<\/li>\n<li>Windows Server 2016<\/li>\n<li>Windows Server 2012 R2<\/li>\n<li>Windows Server 2012<\/li>\n<li>Windows Server 2008 R2<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-40444\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-40444\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 94px;\">\n<td style=\"width: 12.8571%; height: 94px;\">Microsoft Azure<\/td>\n<td style=\"width: 10.8047%; height: 94px;\">CVE-2021-38647<\/td>\n<td style=\"width: 43.5898%; height: 94px;\">\n<ul>\n<li>OMI-1.6.8-1\u672a\u6e80<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 94px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-38647\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-38647\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\">Microsoft SharePoint<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2019-0604<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>Microsoft\u00a0SharePoint\u00a0Enterprise\u00a0Server 2016<\/li>\n<li>Microsoft\u00a0SharePoint\u00a0Foundation 2013\u00a0SP1<\/li>\n<li>Microsoft\u00a0SharePoint\u00a0Server 2010\u00a0SP2<\/li>\n<li>Microsoft\u00a0SharePoint\u00a0Server 2019<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2019\/JVNDB-2019-002318.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-0604\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2019-0604\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 12.8571%; height: 23px;\">vmware vCenter<\/td>\n<td style=\"width: 10.8047%; height: 23px;\">CVE-2021-21985<\/td>\n<td style=\"width: 43.5898%; height: 23px;\">\n<ul>\n<li>vCenter Server 7.0\u7cfb 7.0 U2b \u4ee5\u524d<\/li>\n<li>vCenter Server 6.7\u7cfb 6.7 U3n \u4ee5\u524d<\/li>\n<li>vCenter Server 6.5\u7cfb 6.5 U3p \u4ee5\u524d<\/li>\n<li>Cloud Foundation (vCenter Server) 4\u7cfb 4.2.1 \u4ee5\u524d<\/li>\n<li>Cloud Foundation (vCenter Server) 3\u7cfb 3.10.2.1 \u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 23px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21985\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0010.html\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 94px;\">\n<td style=\"width: 12.8571%; height: 94px;\" rowspan=\"4\">Accellion FTA<\/td>\n<td style=\"width: 10.8047%; height: 94px;\">CVE-2021-27101<\/td>\n<td style=\"width: 43.5898%; height: 94px;\">\n<ul>\n<li>Accellion\u00a0FTA 9_12_370 \u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 94px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27101\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.accellion.com\/company\/security-updates\/accellion-provides-update-to-fta-security-incident-following-mandiants-preliminary-findings\/\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 94px;\">\n<td style=\"width: 10.8047%; height: 94px;\">CVE-2021-27102<\/td>\n<td style=\"width: 43.5898%; height: 94px;\">\n<ul>\n<li>Accellion FTA 9_12_411 \u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 94px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27102\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.accellion.com\/company\/security-updates\/accellion-provides-update-to-fta-security-incident-following-mandiants-preliminary-findings\/\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 94px;\">\n<td style=\"width: 10.8047%; height: 94px;\">CVE-2021-27103<\/td>\n<td style=\"width: 43.5898%; height: 94px;\">\n<ul>\n<li>Accellion FTA 9_12_411 \u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 94px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27103\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.accellion.com\/company\/security-updates\/accellion-provides-update-to-fta-security-incident-following-mandiants-preliminary-findings\/\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 94px;\">\n<td style=\"width: 10.8047%; height: 94px;\">CVE-2021-27104<\/td>\n<td style=\"width: 43.5898%; height: 94px;\">\n<ul>\n<li>Accellion FTA 9_12_370 \u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 94px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27104\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.accellion.com\/company\/security-updates\/accellion-provides-update-to-fta-security-incident-following-mandiants-preliminary-findings\/\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 94px;\">\n<td style=\"width: 12.8571%; height: 94px;\">FileZen<\/td>\n<td style=\"width: 10.8047%; height: 94px;\">CVE-2021-20655<\/td>\n<td style=\"width: 43.5898%; height: 94px;\">\n<ul>\n<li>FileZen V3.0.0 \u304b\u3089 V4.2.7<\/li>\n<li>FileZen V5.0.0 \u304b\u3089 V5.0.2<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 94px;\"><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2021\/JVNDB-2021-000015.html\">JVNDB<\/a><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-20655\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.soliton.co.jp\/support\/2021\/004334.html\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 94px;\">\n<td style=\"width: 12.8571%; height: 94px;\">Atlassian<\/td>\n<td style=\"width: 10.8047%; height: 94px;\">CVE-2021-26084<\/td>\n<td style=\"width: 43.5898%; height: 94px;\">\n<ul>\n<li>Confluence 6.13.23\u672a\u6e80<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 94px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26084\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/jira.atlassian.com\/browse\/CONFSERVER-67940\">Vendor<\/a><\/td>\n<\/tr>\n<tr style=\"height: 94px;\">\n<td style=\"width: 12.8571%; height: 94px;\">Zoho Corp.<\/p>\n<p>ManageEngine ADSelfServicePlus<\/td>\n<td style=\"width: 10.8047%; height: 94px;\">CVE-2021-40539<\/td>\n<td style=\"width: 43.5898%; height: 94px;\">\n<ul>\n<li>ManageEngine ADSelfServicePlus\u00a0 \u30d3\u30eb\u30c96113 \u4ee5\u524d<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 11.4195%; height: 94px;\">JVNDB<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-40539\">NVDB<\/a><\/p>\n<p><a href=\"https:\/\/www.manageengine.com\/products\/self-service-password\/kb\/how-to-fix-authentication-bypass-vulnerability-in-REST-API.html\">Vendor<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<h3>\u25a0\u66f4\u65b0\u5c65\u6b74<\/h3>\n<p>\u30fb2021\u5e7409\u670825\u65e5 \u521d\u7248\u516c\u958b<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u25a0\u6982\u8981 2021\u5e7409\u670812\u65e5\u3001Recorded Future\u306eCSIRT\u30e1\u30f3\u30d0\u30fc\u3067\u3042\u308bAllan Liska\u6c0f\u304cTwitter\u4e0a\u3067\u547c\u3073\u304b\u3051\u3092\u884c\u3044\u307e\u3057\u305f\u3002 \u305d\u306e\u547c\u3073\u304b\u3051\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u653b\u6483\u8005\u304c\u521d\u671f\u30a2\u30af\u30bb\u30b9\u3092\u7372\u5f97\u3059\u308b\u305f\u3081 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1899,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,21],"tags":[],"views":16118,"_links":{"self":[{"href":"https:\/\/csirt.ninja\/index.php?rest_route=\/wp\/v2\/posts\/1883"}],"collection":[{"href":"https:\/\/csirt.ninja\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csirt.ninja\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csirt.ninja\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csirt.ninja\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1883"}],"version-history":[{"count":17,"href":"https:\/\/csirt.ninja\/index.php?rest_route=\/wp\/v2\/posts\/1883\/revisions"}],"predecessor-version":[{"id":1902,"href":"https:\/\/csirt.ninja\/index.php?rest_route=\/wp\/v2\/posts\/1883\/revisions\/1902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csirt.ninja\/index.php?rest_route=\/wp\/v2\/media\/1899"}],"wp:attachment":[{"href":"https:\/\/csirt.ninja\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csirt.ninja\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csirt.ninja\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}