{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.mrmt.net%2Fentry%2F2000%2F04%2F05%2F000000\" title=\"uri - \u306a\u3093\u304b:\u304b\u3093\u304c\u3048\u3066-6\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_url":"https://hatena.blog","published":"2000-04-05 00:00:00","provider_name":"Hatena Blog","categories":[],"width":"100%","height":"190","type":"rich","version":"1.0","image_url":null,"blog_title":"\u306a\u3093\u304b:\u304b\u3093\u304c\u3048\u3066-6","url":"https://blog.mrmt.net/entry/2000/04/05/000000","title":"uri","author_name":"mrmt","blog_url":"https://blog.mrmt.net/","author_url":"https://blog.hatena.ne.jp/mrmt/","description":"Security Problems with Linux 2.2.x IP MasqueradingLinux 2.2.x \u306e IP masquerade \u6a5f\u80fd\u306e\u5f31\u70b9,\u65e5\u672c\u8a9e\u306b\u3088\u308b\u7d39\u4ecbCERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web RequestsTHE CANONICAL ABBREVIATION/ACRONYM LIST\u30c9\u30b3\u30e2\u3001\u6b21\u4e16\u4ee3\u643a\u5e2f\u300cIMT-2000\u300d\u306e\u4e8b\u696d\u8a8d\u53ef\u3092\u7533\u8acbJMMS\u3001\u4e2d\u53e4\u8eca\u306e\u696d\u8005\u5411\u3051\u30aa\u30fc\u30af\u30b7\u30e7\u30f3\u3092\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3067\u5c06\u6765\u306f\u3001\u8a3c\u5238\u3084\u4e0d\u52d5\u7523\u58f2\u8cb7\u306a\u3069\u4ed6\u306e\u5206\u91ce\u3078\u306e\u30b7\u30b9\u30c6\u30e0\u5fdc\u7528\u3082http://www.\u2026"}