2015年12月9日水曜日

9日 水曜日、先勝

+ 2015 年 12 月のマイクロソフト セキュリティ情報の概要
https://technet.microsoft.com/ja-jp/library/security/ms15-dec

+ MS15-124 - 緊急 Internet Explorer 用の累積的なセキュリティ更新プログラム (3116180)
https://technet.microsoft.com/library/security/MS15-124
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6142
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6148
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6153
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6154
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6155
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6156
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6158
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6159
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6157
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6164

+ MS15-125 - 緊急 Microsoft Edge 用の累積的なセキュリティ更新プログラム (3116184)
https://technet.microsoft.com/library/security/MS15-125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6142
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6148
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6153
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6154
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6155
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6158
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6159
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6168
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6176

+ MS15-126 - 緊急 リモートでのコード実行に対処する JScript および VBScript 用の累積的なセキュリティ更新プログラム (3116178)
https://technet.microsoft.com/library/security/MS15-126
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6136

+ MS15-127 - 緊急 リモートでのコード実行に対処する Microsoft Windows DNS 用のセキュリティ更新プログラム (3100465)
https://technet.microsoft.com/library/security/MS15-127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6125

+ MS15-128 - 緊急 リモートでのコード実行に対処する Microsoft Graphics コンポーネント用のセキュリティ更新プログラム (3104503)
https://technet.microsoft.com/library/security/MS15-128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6108

+ MS15-129 - 緊急 リモートでのコード実行に対処する Silverlight 用のセキュリティ更新プログラム (3106614)
https://technet.microsoft.com/library/security/MS15-129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6165

+ MS15-130 - 緊急 リモートでのコード実行に対処する Microsoft Uniscribe 用のセキュリティ更新プログラム (3108670)
https://technet.microsoft.com/library/security/MS15-130
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6130

+ MS15-131 - 緊急 リモートでのコード実行に対処する Microsoft Office 用のセキュリティ更新プログラム (3116111)
https://technet.microsoft.com/library/security/MS15-131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6122
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6124
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6172

+ MS15-132 - 重要 リモートでのコード実行に対処する Microsoft Windows 用のセキュリティ更新プログラム (3116162)
https://technet.microsoft.com/library/security/MS15-132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6133

+ MS15-133 - 重要 特権の昇格に対処する Windows PGM 用のセキュリティ更新プログラム (3116130)
https://technet.microsoft.com/library/security/MS15-133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6126

+ MS15-134 - 重要 リモートでのコード実行に対処する Windows Media Center 用のセキュリティ更新プログラム (3108669)
https://technet.microsoft.com/library/security/MS15-134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6127

+ MS15-135 - 重要 特権の昇格に対処する Windows カーネル モード ドライバー用のセキュリティ更新プログラム (3119075)
https://technet.microsoft.com/library/security/MS15-135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6171
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6175

+ UPDATE: マイクロソフト セキュリティ アドバイザリ 3057154 DES 暗号化の使用を強化する更新プログラム
https://technet.microsoft.com/ja-jp/library/security/3057154

+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer および Microsoft Edge 上の Adobe Flash Player の脆弱性に対応する更新プログラム
https://technet.microsoft.com/ja-jp/library/security/2755801

+ マイクロソフト セキュリティ アドバイザリ 3123040 不注意で公開されたデジタル証明書により、なりすましが行われる
https://technet.microsoft.com/ja-jp/library/security/3123040

+ RHSA-2015:2552 Important: kernel security and bug fix update
https://rhn.redhat.com/errata/RHSA-2015-2552.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104

+ RHSA-2015:2561 Moderate: git security update
https://rhn.redhat.com/errata/RHSA-2015-2561.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7545

+ About the security content of Xcode 7.2
https://support.apple.com/ja-jp/HT205642
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7049
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7057

+ About the security content of Safari 9.0.2
https://support.apple.com/ja-jp/HT205639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7048
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7050

+ About the security content of watchOS 2.1
https://support.apple.com/ja-jp/HT205641
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6979
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7053
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7042
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7047
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7084
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7066
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6997

+ About the security content of OS X El Capitan 10.11.2 and Security Update 2015-008
https://support.apple.com/ja-jp/HT205637
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7074
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7071
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7078
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7053
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7076
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE
-2015-7111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7067
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7042
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7084
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7047
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7052
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7066
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5334
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7044

+ About the security content of tvOS 9.1
https://support.apple.com/ja-jp/HT205640
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7074
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7079
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7053
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7042
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7084
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7047
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7051
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7048
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7066

+ About the security content of iOS 9.2
https://support.apple.com/ja-jp/HT205635
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7074
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7079
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7069
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7070
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7053
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7042
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7084
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7047
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7051
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7066
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7037
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7048
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7050

+ Google Chrome 47.0.2526.80 released
http://googlechromereleases.blogspot.jp/2015/12/stable-channel-update_8.html

+ Opera 34 released
http://www.opera.com/docs/changelogs/unified/3400/

+ nginx 1.9.8 released
http://nginx.org/

+ APSB15-32 Security updates available for Adobe Flash Player
https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8047
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8048
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8049
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8050
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8454
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8057
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8066
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8067
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8069
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8070
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8071
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8401
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8406
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8409
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8416
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8423
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8424
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8425
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8426
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8427
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8428
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8433
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8434
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8435
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8436
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8437
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8439
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8440
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8446
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8451
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8452
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8453

+ CESA-2015:2549 Moderate CentOS 6 libxml2 Security Update
http://lwn.net/Alerts/667133/

+ Cisco DPC3939 (XB3) Router Administrative Web Interface Command Injection Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-xb3
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6361

+ UPDATE: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp

+ Cisco Residential Gateway Devices Cross-Site Request Forgery Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-gateway
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6378

+ Cisco Wireless Residential Unauthorized Command Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-cwr
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6401

+ Cisco Wireless Residential Gateway Stored Cross-Site Scripting Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-wrg
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6402

+ Samba 4.2.6 Available for Donwload
http://samba.org/samba/history/samba-4.2.6.html

+ Multiple Apple Products libc File System Buffer Overflow Patch
https://cxsecurity.com/issue/WLB-2015120089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7039

PoWA 3.0.0 released
http://www.postgresql.org/about/news/1629/

UPDATE: JVNDB-2015-000196 「アクセス解析」におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000196.html

News & Trend
広範なJava関連ソフトに潜む新手の脆弱性、その影響度は?
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/120700395/?ST=security

マイナンバー対応、企業の実情
マイナンバー「対応せずとも罰則なし」?対応しない企業は番号法違反
http://itpro.nikkeibp.co.jp/atcl/column/15/120300275/120300003/?ST=security

キヤノンITソリューションズが「ESET Smart Security V9.0」発表、キー入力を暗号化
http://itpro.nikkeibp.co.jp/atcl/news/15/120804011/?ST=security

キヤノンITS、インターネットバンキング保護など追加した総合セキュリティソフト最新版
http://itpro.nikkeibp.co.jp/atcl/news/15/120804010/?ST=security

VU#377260 Up.time agent for Windows contains multiple vulnerabilities
http://www.kb.cert.org/vuls/id/377260

VU#439016 TaxiHail Android mobile app contains multiple vulnerabilties
http://www.kb.cert.org/vuls/id/439016

0 件のコメント:

コメントを投稿