{"author_name":"masahiroirie","provider_url":"https://hatena.blog","blog_url":"https://vhoge.hateblo.jp/","version":"1.0","url":"https://vhoge.hateblo.jp/entry/2025/01/07/220315","type":"rich","height":"190","author_url":"https://blog.hatena.ne.jp/masahiroirie/","published":"2025-01-07 22:03:15","categories":[],"blog_title":"vHoge","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fvhoge.hateblo.jp%2Fentry%2F2025%2F01%2F07%2F220315\" title=\"VMSA-2024 \u3092\u6570\u3048\u308b - vHoge\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_name":"Hatena Blog","title":"VMSA-2024 \u3092\u6570\u3048\u308b","width":"100%","image_url":null,"description":"\u5e74\u3082\u660e\u3051\u305f\u306e\u3067 2024\u5e74\u306b\u767a\u884c\u3055\u308c\u305f VMSA \u3092\u6570\u3048\u3066\u307f\u305f\u3060\u3051\u306e\u30dd\u30b9\u30c8\u3002 \u4f55\u304b\u306e\u5f79\u306b\u7acb\u3064\u304b\u3082\u3002 VMSA \u4e00\u89a7 VMSA \u30d9\u30fc\u30b9\u306722\u4ef6\u3001CVE \u30d9\u30fc\u30b9\u3060\u306849\u4ef6 \u3061\u306a\u307f\u306b2023\u5e74\u306e VMSA \u306f27\u4ef6\u306a\u306e\u3067\u6e1b\u5c11\u3063\u307d\u3044\u304c\u3001Omnissa \u5206(2024\u5e74\u306f2\u4ef6)\u304c\u5206\u304b\u308c\u3066\u306e\u4ef6\u6570\u306a\u306e\u3067\u305d\u3053\u307e\u3067\u306f\u5909\u308f\u3063\u3066\u3044\u306a\u3044\u304b\u3002\u3002\u3002 VMSA Product Severity CVE count VMSA-2024-0001 Aria Automation Critical 1 VMSA-2024-0002 Aria Operations for Networks Important 5 VMSA-2024\u2026"}