{"provider_url":"https://hatena.blog","type":"rich","published":"2025-09-05 00:00:00","author_name":"tanigawa","url":"https://malware-log.hatenablog.com/entry/2025/09/05/000000_2","blog_title":"TT Malware Log","description":"\u3010\u8981\u7d04\u3011 \u7c73\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5e81\uff08CISA\uff09\u306f\u300cSitecore\u300d\u3084\u300cLinux\u30ab\u30fc\u30cd\u30eb\u300d\u306a\u30693\u4ef6\u306e\u8106\u5f31\u6027\u60aa\u7528\u304c\u78ba\u8a8d\u3055\u308c\u305f\u3068\u3057\u3066\u6ce8\u610f\u559a\u8d77\u3092\u767a\u8868\u3057\u305f\u3002Sitecore\u88fd\u54c1\u306b\u5f71\u97ff\u3059\u308bCVE-2025-53690\u306fASP.NET\u30b5\u30f3\u30d7\u30eb\u30ad\u30fc\u6d41\u7528\u306b\u8d77\u56e0\u3057\u3001\u30b3\u30fc\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u3084\u30ea\u30e2\u30fc\u30c8\u5b9f\u884c\u304c\u53ef\u80fd\u3067CVSS9.0\u306e\u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u8a55\u4fa1\u3002\u3055\u3089\u306bLinux\u30ab\u30fc\u30cd\u30eb\u306e\u7af6\u5408\u72b6\u614b\uff08CVE-2025-38352\uff09\u3084Android Runtime\u306eUse After Free\uff08CVE-2025-48543\uff09\u306b\u3088\u308b\u6a29\u9650\u6607\u683c\u3082\u5831\u544a\u3055\u308c\u3001\u3044\u305a\u308c\u3082\u300c\u9ad8\u300d\u3068\u8a55\u4fa1\u3055\u308c\u3066\u3044\u308b\u3002 \u3010\u30cb\u30e5\u30fc\u30b9\u3011 \u25c6\u300cSitecore\u300d\u3084\u300cLinux\u30ab\u2026","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fmalware-log.hatenablog.com%2Fentry%2F2025%2F09%2F05%2F000000_2\" title=\"\u300cSitecore\u300d\u3084\u300cLinux\u30ab\u30fc\u30cd\u30eb\u300d\u306e\u8106\u5f31\u6027\u60aa\u7528\u306b\u6ce8\u610f\u559a\u8d77 - \u7c73\u5f53\u5c40 - TT Malware Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","version":"1.0","blog_url":"https://malware-log.hatenablog.com/","image_url":null,"title":"\u300cSitecore\u300d\u3084\u300cLinux\u30ab\u30fc\u30cd\u30eb\u300d\u306e\u8106\u5f31\u6027\u60aa\u7528\u306b\u6ce8\u610f\u559a\u8d77 - \u7c73\u5f53\u5c40","width":"100%","height":"190","author_url":"https://blog.hatena.ne.jp/tanigawa/","provider_name":"Hatena Blog","categories":["\u8106\u5f31\u6027\u30ea\u30b9\u30c8: KEV / Known Exploited Vulnerabilities (CISA)","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u95a2: CISA / \u7c73\u56fd \u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30a4\u30f3\u30d5\u30e9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5e81 (\u7c73\u56fd)"]}