#author("2024-08-20T12:27:02+00:00","default:yoya","yoya")
#author("2024-08-20T12:30:50+00:00","default:yoya","yoya")
[[Security]] > [[CVE]]
#contents
* ImageMagick [#imagemagick]
- [[CVE/ImageMagick]]
* GhostScript [#ghostscript]
- [[CVE/GhostScript]]
* JPEG [#jpeg]
** thorfdbg/libjpeg (JPEG LS 開発レポジトリ、JPEG 完全版?) [#d7a8d286]
- https://github.com/thorfdbg/libjpeg
- [[CVE-2022-37769]] HuffmanDecoder::Get DoS
- [[CVE-2023-37836]] BitMapHook::BitMapHook DoS
* PNG [#png]
- [[CVE-2022-3857]]
* TIFF [#tiff]
- [[CVE-2023-2731]] LZWDecode DoS
- [[CVE-2023-40745]] libtiff <= 4.5.1 RCE
- [[CVE-2023-52355]] TIFFRasterScanlineSize64
* WebP [#webp]
- [[CVE-2023-4863]]
- CVE-2023-5129 (REJECTED) CVE-2023-4863 と同じ
- [[CVE-2023-5217]] - libvpx の方の脆弱性
- 最近の重要な libwebp および libvpx の脆弱性に関するガイダンス
-- https://www.akamai.com/ja/blog/security-research/guidance-on-critical-chrome-vulnerabilities-libwebp-and-libvpx
* OpenSSH [#openssh]
- [[CVE-2006-5051]]
- [[CVE-2024-6387]] - CVE-2006-5051 の再発
- [[CVE-2024-6409]] - CVE-2024-6387 のレビューで判明
* Apache [#apache]
- [[CVE-2024-39884]]
* PHP [#php]
- [[CVE-2024-4577]]
* Microsoft Windows [#windows]
- https://msrc.microsoft.com/update-guide/vulnerability
- https://www.fmworld.net/biz/common/info/ms24-08.html
- [[CVE-2024-21302]] 保護カーネル
- [[CVE-2024-38202]] Windows Update
** TCP/IP [#q1f46c1c]
- [[CVE-2024-38063]]
** SmartScreen [#smartscreen]
- [[CVE-2024-21351]]
** Exchange Server [#exchange]
- [[CVE-2024-21410]]
** Microsoft Defender [#defender]
- [[CVE-2024-21412]]
* VirusBuster [#virusbuster]
- [[CVE-2023-28929]]
* XZ-Utils liblzma [#xz]
- [[CVE-2024-3094]] sshd にバックドアが作られる
*. [#n8d85e52]
- 初心者でもCVE番号を取れるかもしれないガイド
-- https://qiita.com/yousukezan/items/7d48b7e3f43def57c407