{"type":"rich","image_url":null,"author_url":"https://blog.hatena.ne.jp/tt_ctf/","blog_title":"TT \u8106\u5f31\u6027 Blog","provider_url":"https://hatena.blog","title":"2022 CWE Top 25 Most Dangerous Software Weaknesses","provider_name":"Hatena Blog","height":"190","description":"\u3010\u6982\u8981\u3011 No \u8106\u5f31\u6027 \u5099\u8003 1 CWE-787 \u7bc4\u56f2\u5916\u306e\u66f8\u304d\u8fbc\u307f 2 CWE-79 Web\u30da\u30fc\u30b8\u751f\u6210\u4e2d\u306e\u5165\u529b\u30c7\u30fc\u30bf\u306e\u4e0d\u9069\u5207\u306a\u51e6\u7406\uff08\u30af\u30ed\u30b9\u30b5\u30a4\u30c8\u30b9\u30af\u30ea\u30d7\u30c6\u30a3\u30f3\u30b0\uff09 3 CWE-89 SQL\u30b3\u30de\u30f3\u30c9\u3067\u4f7f\u7528\u3055\u308c\u308b\u7279\u6b8a\u8981\u7d20\u306e\u4e0d\u9069\u5207\u306a\u51e6\u7406\uff08SQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\uff09 4 CWE-20 \u4e0d\u9069\u5207\u306a\u5165\u529b\u691c\u8a3c 5 CWE-125 \u7bc4\u56f2\u5916\u306e\u8aad\u307f\u53d6\u308a 6 CWE-78 OS\u30b3\u30de\u30f3\u30c9\u3067\u4f7f\u7528\u3055\u308c\u308b\u7279\u6b8a\u8981\u7d20\u306e\u4e0d\u9069\u5207\u306a\u51e6\u7406\uff08OS\u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\uff09 7 CWE-416 \u89e3\u653e\u3057\u305f\u30e1\u30e2\u30ea\u306e\u4f7f\u7528 8 CWE-22 \u5236\u9650\u3055\u308c\u305f\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u306b\u5bfe\u3059\u308b\u4e0d\u9069\u5207\u306a\u30d1\u30b9\u540d\u5236\u9650\uff08\u30d1\u30b9\u30c8\u30e9\u30d0\u30fc\u30b5\u30eb\uff09 9 CWE-352 \u30af\u30ed\u30b9\u30b5\u30a4\u30c8\u30ea\u30af\u30a8\u30b9\u2026","blog_url":"https://vul.hatenadiary.com/","categories":["CWE\u756a\u53f7","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u95a2: CISA","\u8106\u5f31\u6027: OS\u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3","\u8106\u5f31\u6027: SQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3 / SQLi","\u8106\u5f31\u6027: XSS / \u30af\u30ed\u30b9\u30b5\u30a4\u30c8\u30b9\u30af\u30ea\u30d7\u30c6\u30a3\u30f3\u30b0","\u30c7\u30fc\u30bf:  top 25 most dangerous software weaknesses"],"published":"2022-06-28 00:00:00","author_name":"tt_ctf","url":"https://vul.hatenadiary.com/entry/2022/06/28/000000","version":"1.0","width":"100%","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fvul.hatenadiary.com%2Fentry%2F2022%2F06%2F28%2F000000\" title=\"2022 CWE Top 25 Most Dangerous Software Weaknesses - TT \u8106\u5f31\u6027 Blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>"}