{"published":"2025-09-14 00:00:00","categories":["Security"],"provider_name":"Hatena Blog","version":"1.0","title":"NVD\uff08National Vulnerability Database\uff09","description":"NVD\uff08National Vulnerability Database\uff09 \u6982\u8981\u3068\u7279\u5fb4 \u5206\u985e \u4e0a\u4f4d\u6982\u5ff5\u30fb\u4e0b\u4f4d\u6982\u5ff5 \u30e1\u30ea\u30c3\u30c8 \u30c7\u30e1\u30ea\u30c3\u30c8 \u65e2\u5b58\u3068\u306e\u6bd4\u8f03 \u7af6\u5408 \u5c0e\u5165\u30dd\u30a4\u30f3\u30c8 \u6ce8\u610f\u70b9 \u4eca\u5f8c \u95a2\u9023\u30ad\u30fc\u30ef\u30fc\u30c9 NVD\uff08National Vulnerability Database\uff09 NVD\uff08National Vulnerability Database\uff09\u306f\u3001\u30a2\u30e1\u30ea\u30ab\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240\uff08NIST\uff09\u304c\u7ba1\u7406\u3059\u308b\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8106\u5f31\u6027\u60c5\u5831\u3092\u307e\u3068\u3081\u305f\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3067\u3059\u3002 NVD\u306f\u3001CVE\uff08Common Vulnerabilities and Exposures\uff09\u3068\u547c\u3070\u308c\u308b\u56fd\u969b\u7684\u306b\u6a19\u6e96\u5316\u3055\u308c\u305f\u8b58\u5225\u5b50\u306b\u3001\u8106\u5f31\u6027\u306e\u2026","blog_url":"https://kaeken.hatenablog.com/","author_url":"https://blog.hatena.ne.jp/kaeken/","provider_url":"https://hatena.blog","author_name":"kaeken","height":"190","image_url":null,"blog_title":"kaeken(\u5609\u6c38\u5cf6\u5065\u53f8)\u30d6\u30ed\u30b0","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fkaeken.hatenablog.com%2Fentry%2F2025%2F09%2F14%2F000000\" title=\"NVD\uff08National Vulnerability Database\uff09 - kaeken(\u5609\u6c38\u5cf6\u5065\u53f8)\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://kaeken.hatenablog.com/entry/2025/09/14/000000","width":"100%","type":"rich"}