{"author_url":"https://blog.hatena.ne.jp/ripjyr/","provider_name":"Hatena Blog","published":"2019-12-24 21:38:52","image_url":"https://images-fe.ssl-images-amazon.com/images/I/513hw-04L8L._SL160_.jpg","type":"rich","description":"Trend Micro Deep Security as a Service\u306b\u304a\u3051\u308b\u6a29\u9650\u6607\u683c\u306e\u8106\u5f31\u6027(CVE-2019-18191)\u306b\u3064\u3044\u3066\uff1a\u30b5\u30dd\u30fc\u30c8\u60c5\u5831 : \u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed Trend Micro Deep Security as a Service\u306b\u304a\u3051\u308b\u6a29\u9650\u6607\u683c\u306e\u8106\u5f31\u6027(CVE-2019-18191)\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027\u304c\u78ba\u8a8d\u3055\u308c\u307e\u3057\u305f\u3002 \u203b\u672c\u8106\u5f31\u6027\u306f12\u670810\u65e5(\u706b)\u306b\u5f71\u97ff\u3092\u53d7\u3051\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3054\u5229\u7528\u8005\u69d8\u306b\u5bfe\u3057\u3066\u500b\u5225\u306b\u3054\u9023\u7d61\u3055\u305b\u3066\u3044\u305f\u3060\u304d\u307e\u3057\u305f\u8106\u5f31\u6027\u3068\u540c\u4e00\u306e\u3082\u306e\u3067\u3059\u3002 \u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001\u4ee5\u4e0b\u306e\u30b5\u30a4\u30c8\u3092\u3054\u78ba\u8a8d\u304f\u3060\u3055\u3044\u3002\u30a2\u30e9\u30fc\u30c8/\u30a2\u30c9\u30d0\u30a4\u30b6\u30ea\uff1aDeep Security as a Service\u306b\u2026","blog_title":"\u307e\u3063\u3061\u3083\u3060\u3044\u3075\u304f\u306e\u65e5\u8a18","height":"190","version":"1.0","width":"100%","url":"https://ripjyr.hatenablog.jp/entry/2019/12/24/213852","author_name":"ripjyr","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fripjyr.hatenablog.jp%2Fentry%2F2019%2F12%2F24%2F213852\" title=\"Trend Micro Deep Security as a Service\u306b\u304a\u3051\u308b\u6a29\u9650\u6607\u683c\u306e\u8106\u5f31\u6027(CVE-2019-18191)\u306b\u3064\u3044\u3066\uff1a\u30b5\u30dd\u30fc\u30c8\u60c5\u5831 : \u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed\uff20 DSaaS\u306b\u304a\u3051\u308b\u6a29\u9650\u6607\u683c\u306e\u8106\u5f31\u6027\u304c\u5b58\u5728\u3068\u306e\u3053\u3068\u3002\u30bb\u30c3\u30c8\u30a2\u30c3\u30d7\u306e\u6761\u4ef6\u3067\u5f71\u97ff\u304c\u3042\u308b\u6a21\u69d8\u3002 - \u307e\u3063\u3061\u3083\u3060\u3044\u3075\u304f\u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_url":"https://hatena.blog","title":"Trend Micro Deep Security as a Service\u306b\u304a\u3051\u308b\u6a29\u9650\u6607\u683c\u306e\u8106\u5f31\u6027(CVE-2019-18191)\u306b\u3064\u3044\u3066\uff1a\u30b5\u30dd\u30fc\u30c8\u60c5\u5831 : \u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed\uff20 DSaaS\u306b\u304a\u3051\u308b\u6a29\u9650\u6607\u683c\u306e\u8106\u5f31\u6027\u304c\u5b58\u5728\u3068\u306e\u3053\u3068\u3002\u30bb\u30c3\u30c8\u30a2\u30c3\u30d7\u306e\u6761\u4ef6\u3067\u5f71\u97ff\u304c\u3042\u308b\u6a21\u69d8\u3002","blog_url":"https://ripjyr.hatenablog.jp/","categories":["IT","\u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed"]}