Ergebnis für URL: http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240522__ios #[1]RSS
SeKiYURiTei6Ho-6Ru memo - 2024.05
Last modified: Sat Jan 6 15:51:34 2024 +0900 (JST)
____________________________________________________________________________
konoPe-6Zino±wo©¨sareruni,_[2]¨¸kiwoo5mikudasai5._
____________________________________________________________________________
[3]fS 2024.05.31
* [4]>+ [5]DoRaMa+ [9]¥I6N6HuRuE6N6Zaga³½dedorehodomatUtanoka,_°mo¥ranai5 (WIRED,
5/27)._H5N1._
¾¨notokoro,_¶tatiha,_³gaºheno tonarukadou5katoi5u5¹ni¢woketei5ru._¶½nio5keruH5
N1ha»ni¼¸¨»no¾£woki·kosuga,_no´haziU6I6RuSuga³ºnisuru._korega,_no³ni§noU6I6Ru
Sugaºsareru±datoe5rareru._TeKiSaSuno²´desitanoMiRuKuwo²n5daNeKoga2¹»¡si,_»no,_
U6I6RuSunisitei5takotogawakatUta._
¢£:
+ [10]³½no³nio5keru§¥I6N6HuRuE6N6ZaU6I6RuSu(H5N1)henonitui5te('²´£)' (®£,
4/4)
+ [11]A6MeRiKade2º®no³karanoHiTo §¥I6N6HuRuE6N6ZaU6I6RuSuA(H5N1)no¾¨no¶
(½£¢ / Yahoo, 5/25)
+ [12]³karaºsareta§H5N1¥I6N6HuRuE6N6ZaU6I6RuSuno±»§toMaU6Suheno§ (±§,
5/31)
³noºde¿¨sareru63°C 30o5yobi72°C
15no¡¶de,_¥I6N6HuRuE6N6ZaU6I6RuSuwo«mu³wo±¦si,_sonoµo5yobi¹°ni¥®site§U6I6RuSuw
o¡simasita._sono,_§U6I6RuSuha30000no1¥nimadesimasitaga,_¨ni§U6I6RuSuwo»surukot
ohadekimasen5desita(³1)._¹de,_±¦wowanai5´,_³noU6I6RuSuha4°Cde5±niwatari§wosu
rukotogawakarimasita._
[13]³noº¹ (ª² PLUS)._ 63oC/30 (©º) to 72oC/15 (©º) wo¼sitato._
¥¬no³de¬na©¬º (130oC/2toka) dato¨»sarerunodarou5._
sonokawarini¨³ha©º/©ºyorimo£run5dakedone._
* [14]>+ [15]wazuka3¥de60°monoRu-6Ta-6wo´sitaMaRuU6e6A6»+
[17]RoSiA6noPuRoPaGaN6Dawoº¡suru160no½NiYU-6SuSaI6Toha¥¡ninatUtaHuRoRiDatotun
agatUtei5ru (gigazine, 5/31)
* [18]>+
[19]MetagaAInoPuRoPaGaN6Dawo¡£suruI6SuRaE6RunoNeTUToWa-6KuwoFacebooktoInstagr
amkara¤ (gigazine, 5/30)
* [20]>+
[21]OpenAIgaRoSiA6.6½.6I6RaN6.6I6SuRaE6RuniyoruAInoª¨woª¶ni²i5datokasu
(gigazine, 5/31)._._
* [22]>+ [23]1900¥noIPA6DoReSuni¥sita§noBoTUToNeTUTo+ [25]RoSiA6gaStarlinkno¡wo¨³suru¦nano¥nisitatoU6KuRaI6Nagaº¨ (gigazine,
5/28)
* [26]>+ [27]MaRuU6E6A6ni¾±AIwoª¨sitanitui5tematometemita (piyolog, 5/31)
* [28]>+ [29]¨sitaPe-6ZigaSQLI6N6Zie6KuSiYON6»woketanitui5tematometemita
(piyolog, 5/28)
* [30]>+ [31]ªMe-6Ka-6ga§¢no¢De-6Tawoº¾to± (Kaspersky, 5/28)
ni,_kunoDoRaI6Ba-6ha,_,_sorezoreno¢£niºdui5teºgaºmaruªºniraretei5masita._tada,
_kou5sitaPuRoGuRaMuhakatuteha» ¥dea5ri,_ ¥surutoº¬²gasaretei5masitaga,_soredem
ohoton5donoDoRaI6Ba-6ha ¥sitei5masen5desita._¾¨,_ªMe-6Ka-6ha§¢nowozuni,_sikamo
§¢ni¥raserukotonaku§¢wo»²sitei5ruyou5desu._
ºdekiru±niyorimasuto,_koreha¾¨notokoroA6MeRiKa½noDoRaI6Ba-6ni¾sitenomiwaretei5
rutonokotodesu._sikasi,_A6MeRiKadematUtamonohatai5tei5no°nimogatUtei5kutame,_¼
tayou5nakotogasugunino°demowareru¯½§gaa5rimasu._
[32]fS i5roi5ro (2024.05.31)
(various)
PostgreSQL
* [33]PostgreSQL 16.3, 15.7, 14.12, 13.15, and 12.19 Released! (PostgreSQL,
2024.05.09)._[34]CVE-2024-4317 wo®£._PostgreSQL 12 ha EOL._
Trend Micro Apex One / Apex One SaaS
* [35]A6Ra-6To/A6DoBaI6ZaRi:Trend Micro Apex One o5yobi Apex One SaaS
deºsareta°no±§nitui5te(2024´5) (ToReN6DoMaI6KuRo, 2024.05.30)
CheckPoint CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum
Security Gateways, Quantum Spark Appliances
* [36]Check Point Software
Technologies¾½noVPN½nio5keru±e5i5no±§(CVE-2024-24919)nitui5te (JPCERT/CC,
2024.05.30)._hotfix gaºtei5masu._
glibc + PHP
motomotoha glibc iconv() no ¥nanodaga,_PHP deº¾sirutoi5u5±._
* [37]Re: The GNU C Library security advisories update for 2024-04-17:
GLIBC-SA-2024-0004/CVE-2024-2961: ISO-2022-CN-EXT: fix out-of-bound writes
when writing escape sequence (oss-sec ML, 2024.05.27)
* [38]Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP
engine (part 1) (ambionics security, 2024.05.27)
* [39]ambionics / cnext-exploits (GitHub)
asterisk
* [40]asterisk security releases 18.23.1, 20.8.1, & 21.3.1 (oss-sec ML,
2024.05.21)
Unbound
* [41]Unboundno±§±ga¬saremasita(CVE-2024-33655) (JPRS, 2024.05.13)
* [42]A novel pulsing DoS attack named "DNSBomb" has been discovered to affect
various DNS resolving software (nlnetlabs.nl, 2024.05.13)
¢£:
* [43]DNSBomb
* [44]BIND 9 is Unaffected by the DNSBomb (ISC, 2024.05.01)
* [45]Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique
(Hacker News, 2024.05.28)
E6ReKoMu WRC-X5400GS-B,_WRC-X5400GSA-B
* [46]JVNVU#97214223
E6ReKoMu½¡LANRu-6Ta-6nio5keruOSKoMaN6DoI6N6Zie6KuSiYON6no±§ (JVN,
2024.05.28)._+ [49]iPhoneniMaI6NaKa-6Do¯½ni 2025´¥nokara Apple£º¨ (ITmedia,
5/30)._'niMaI6NaKa-6Do
no±wo½ si,_©naKa-6Dotoziyou5ni¿e5ruyou5ninaru>'._
* [50]>+ [51]MoBaI6RuSuicaA6PuRide³ TiYA-6Ziya¸¼¥gasinikui5¶
+
[53],_+ [64]§±°derumini de"TeReWa-6Ku"no¯ªºgaªka ha+ [66]OpenAIwo+ [72]¢geta¶,_ ToRaN6SuZie6N6Da-6¬ha i5kanisite©¨saretaka (MIT
Technology Review, 2023.10.23)
* [73]>+ [74]¨ºde³¦...¥no+ [76]·nadogana°monaku¯ºsitei5ku¾niPeN6KuRaBuga°° ( ° / Yahoo, 5/19)
* [77]>+ A6PaRuToHeI6To½¶I6SuRaE6Runiyoru¹¢
½¸¤ ICJ,_¦¢no«ª®wo½¤ (5/24)
+ [78]½¸+ [90]("±)"§ª¬§de¸KaRiwon5dai5de·wo® ´»ha§250º §ª¦ (TBS,
5/28)._+ [92]+ [96]AIga+ [98]no³²ha+ [100]GPT-4ono½ni°¸ PoRuNo,_GiYAN6BuRude To-6KuN6gasaretei5ta (MIT
Technology Review, 5/28)
* [101]>+ [102]®+ [106]MaI6NaKa-6Dono¼+ [108]·©£¯no©SaI6Toni£A6KuSeSu KuReKa±25000¶¥ya¨¡noº±gae5i5sita¯½§
(ITmedia, 5/28)
* [109]>+ [110]´HaU6SuniSaI6Ba-6» 30¶no±e5i5,_PaSuWa-6Domo ºi5mo50¶("½a5ri)"
(ITmedia, 5/24)
2008´kara11´nikakete¨sitei5taga,_¾¨ha¿¨sitei5nai5WebPe-6ZinoSeKiYURiTei6nigaa
5ri,_e5i5nitunagatUtatoi5u5._nii5tanoha21¥._Sa-6Ba¢£wositei5rukara,_A6KuSeSu
°ga¥nie5tei5rutono±woke,_¿»sitatokoro+ [112]+ [114]+ [116]¬46JPNICO6-6PuN6PoRiSi-6Mi-6Tei6N6Gu¬nogo
(jpopf.net)._2024.06.21,_±¬½£°º / Zoom,_¡ (³¼)._ [117]DNS Summer Day 2024
too5moi5tUkirikabutUterunaa5._
[118]fS i5roi5ro (2024.05.28)
(various)
PDF.js
* [119]+ [122]+
[124]BaTUHua6Ro-6noWi-FiRu-6Ta-6+ [133]¤¯ga3¥deRaN6SaMuU6e6A6«³kara©§dekita± ½¤garu (@IT, 5/14)
·saretaSiSuTeMuno©§wo¦mirude¸datUtanoha,_sitUkariBaTUKuA6TUPuwotUtei5takotoda.
_+ [135]InstalledAppView v1.08 (Nirsoft)
* [136]>+ [137]+ [148]±¤,_A6SaN6Zi«no³sitemeru ³heno«ki¡si¡ri (RoI6Ta-6, 5/21)
¢ha3,_A6SaN6Zi«ga½marede©wokeru¯½§gaa5rutono±deno³sitewo«ni±¯sitaga,_³´ni¬£na¤
wokerarerutono¼noºwometei5ta._
20¥no©,_2ºno¤ha,_½²®£¬1¡nonoª±ni¾suru©©woºdekinai5¯½§gaa5rutonoA6SaN6Zi«no»µwo
mae5,_´ni¤surutono¤woºsita._
3¹deno: [149]WikiLeaksµnoZiYURiA6N6.6A6SaN6Ziga,_³½heno»wo+ I6RaN6noRaI6Si§±,_heriga½si»¡._
A6BuDoRaHiA6N6¸mositeo5ri,_kotiramo»¡._
+ [154]noI6RaN6§±HeRi,_no¸º ½ka I6RaN6± (¥, 5/20)
+ [155]I6RaN6¢,_sita§±HeRiwoº...ha+ [159]OpenAInoAI±º¾Ti-6MuToTUPuga+ [161]NHK+ [163]iOS 17.5henoA6PuDede+ [169],_+
[172]³CISAno½GaI6DoRaI6N6ni¥¬mo²._»»©no¡¤wonau5SaI6Ba-6»kara¶.6ZiYA-6NaRiSuTo
rawo· (Internet Watch, 5/17)._huU5mu._ + [175]RiNiA6°¹noToN6NeRu¥wohe JR±·¾·ga¨
¸yatame nado14kano´gagatUtawokete (CBC / Yahoo, 5/16)._soratakotoka¶._
* [176]>+ [177]¡kiºto¾±suruAI,_½de+ [289]©§¥¦ SuMa-6ToGuRaSudeSNSºka 18³wo¸he (NHK, 5/15)._´ 2 no¥¦._
Xwote,_¦noºnii5taºga§¦ni±si,_ga¥no¦¨no¦niªretaniSuMa-6ToGuRaSuwo¨sitei5runowo§
¦·¡gaºsi,_¦ni¸sitei5masita._
¨¥¥BaReta±dehanai5to._
konoha¨noºga¸ki¼n5dae5womotoni£¨ni¥simasitaga,_¥¦ha¼datUtatoi5u5kotodesu._
maa5,_BaReterusi,_sou5naruwanaa5._
* [290]>+ ¶§ReN6Sa¹¢
+ [291]+ [299]RaN6SaMuU6e6A6»niyoru«£¯i5,_´no5ni~SoHuo6Suga¿»woº¨ (Internet
Watch, 5/10)._²katUtemasunee5._
¿»ha,_SoHuo6Suga¿»¾ni¼si,_³,_³,_§,_A6ZiA6ª³°no14Ka½nonoIT/SaI6Ba-6SeKiYURiTei
6¨noRi-6Da-65000ºwo¾¡tosite,_2024´1~2ni½sitamono._
RaN6SaMuU6e6A6»woketaha¿»¾¡no59%._koreha,_»2´no¿»(2023´,_2022´tomoni66%)kara,_
wazukanisita._
(¥)
«£wo¯tUtatositaha1097ºde,_¯tUtano³¤ha396917DoRu._®¤ha200DoRude,_´¿»no40DoRuka
ra5ni sitei5ru(³¤deha2.6)._³siteno94%ga¯waretei5ruga,_²gamo§kinaGuRu-6Pu(50DoR
u¥)¥deha,_yorimo¯no¹ganai5._¹de,_²gamo§kinaGuRu-6Puha,_yorimoni¯tUtano¹ga§kii5
._
* [300]>+ [301]',_¨¡ni¶¤sasezu (¥, 5/9)._hidee5._
nazekonoyou5naºwoketanoka._3,_§¡noMeN6Ba-6dea5ru³®©¯¦·to¯¦¨·()no¾¹,_ºwomatome
ta20´¦no¨·,_¬ganizita._
¾ha+ [329]SoNi-6ha+ [331]Google Cloud,_ª´ºnoA6KaU6N6Towo¤¤ mo¤¤
¾denoBaTUKuA6TUPudenan5toka©§ (ITmedia, 5/13)
[332]fS [333]Chrome Stable Channel Update for Desktop
(Google, 2024.05.09)
Chrome 124.0.6367.201/.202 (Mac / Windows) o5yobi 124.0.6367.201 (Linux) ¬._
0-day ¥ [334]CVE-2024-4671 wo®£._¢£:
* [335]Chrome for Android Update (Google, 2024.05.10)._Chrome 124
(124.0.6367.171) for Android._
* [336]sudeniª¨no±a5ri,_+ [340]4¾"¿ªZeRoto¶´si"no£ "gomakasito°na"niga®worasu (±, 3/5)._¢£:
+ [341]§4¾niKaRuTeRu,_ki·kosita+ ¹£PuRoBaI6Da-6¬»¶ (±PuRaTUToHuo6-6Mu¾¦)
+ [347]SNSno¹·,_nohe ºni°mo ga (¥, 5/10)
+ [348]SNSdeno·«³,_korederu?
+ [354]°iPadno»,_¹¤woketeA6TUPuRugaª + [356]RoSiA6¥»¢seyo,_SuPe-6SuXto³½²noSuTa-6RiN6Ku±¦ (BuRu-6MuBa-6Gu,
5/10)._¾¦®gatorareta¡._
½²noZiYON6.6PuRaMu¿¡garakanisita._»gaºmatUtei5ruPuRaMuhaI6N6TaBiYU-6de,_'no» + [376]+ [378]RiSuno´ki°,_AIde¤¥ + [380]§SaI6Ba-6ReZiRiE6N6Su(CRA)no¢¼henoMaTUPiN6Guga¬sareru (Internet
Watch, 5/9)
* [381]>+ [382]Ask iFixit: PuRaSuTiTUKunobetatukiwo´suniha? (iFixit, 5/3)
korewo¿keruno¹ha,_SoHuToKo-6To½wo·wanai5kotodesu._ (¥)
¦demoGaZie6TUTowokosutUteGaN6Konarewo½tosuwositara,_mou5¦toSoHuToTaTUTino½wo·u
5kotohanai5hazudesu._
ºkani......._tohai5e5,_¦tUtekara·e5ruganakanakanai5n5dayonaa5._
¦sutositehakou5dasou5desu._
1. ©kai5³¸´
2. ¹
3. ¶¤ (I6SoPuRoPiRuA6RuKo-6Ru)
koredemo®narakon5namonomoa5rusou5desu._
+ RaI6Ta-6² (RaI6ToNaHuSa)
+ A6SeToN6 (MaNiKiYUA6¤²)
+ O6ReN6ZiO6I6Ru
* [383]>+ [384]GuRiKo,_¾³wo¹®£ ¶.6¸tomoni50 SiSuTeMu³no±¿de (ITmedia,
5/8)._a5i5kawarazuº·haªnomama._
* [385]>+ [386]°iPad Prono»+ [394]+ [396]SaI6Ba-6¯ª£RoTUKuBiTUTo,_RaN6SaMuU6e6A6ºnoRoSiA6ºwo·´ (¥,
5/8)._¢£:
+ [397]U.S. Charges Russian National with Developing and Operating LockBit
Ransomware (justice.gov, 5/7)
+ [398]RaN6SaMuU6e6A6+ [414]+ [416]YuVua6Ru.6NoA6.6HaRaRi'no¾´ha (NHK sai5tama¾, 4/15)
* [427]>+ [428]¾º¹SiSuTeMu³ni´u5 TiRuDo(·µ)noº·¢no¶·ni¢suruo5«bi (GuRiKo, 5/1)
º·¢wositei5ru¾noTiRuDoo5yobiKiRiN6BiBaReTUZikara©²wositei5ruTiRuDonitukimasite
,_5¬noº·wo®siteo5rimasita._sikasi,_£niketenoniwositeo5ri,_kono¦,_º·¢no¶·woºi
5tasimasita._¾¹denoº·haªºdesu
4/3 no·ºkarasitekitaga,_no®¦tazu._¢£:
+ [429]GuRiKo ·µnoº·¢ ¶·º ¥no®su (NHK, 5/1)._6/E
kurai5madehakakarudarou5toi5u5kotoka._
+ [430]BuRaN6Do³moSuToTUPu GuRiKonoSiSuTeMu³,_garu±¿ (¥, 5/2)
e5te°tani±¿garakaninatUtanoga,_JAsaganoBuRaN6Do³da._GuRiKono½ ¾+ [435]½wotosuruMaSuKu,_¦nowo¡´ (Wall Street Journal, 5/1)
to¸nodeºninatUtanoha,_½gaTeSuRanitotUte¶µmetenanoni¾si,_½hayaª½noEV.6ª¢wo»d
ukerutameniTeSuRawosorehodotositei5nai5toi5u5kotoda._
* [436]>+ [437]TeSuRa»¨¨no§£,_EVni°ru ¨³+ [439]½£BaBuRu,_°mo¢meyou5tosinakatUta (Wall Street Journal, 5/2)
no½niha,_motUto©kusorewo¶suruwo·kosanakatUtaTuKegatUtei5ru._
½noDeBeRoTUPa-650¾riga½µno¥(DeHuo6RuTo)ni¥tUta._½£wotosuruSiN6KuTaN6KuKeyann
iyoruto,_50ºga·wo±tUta._½¨no2000¸nogaªnomamade,_niha4400DoRu(687000)gadato¦sa
retei5ru._
»½no¤¡¼ha3ni5.9%½sita._DeBeRoTUPa-6heno°²´niyoru¥wo¶tareta°¹¿ha,_µno¯i5ni¦sin
5dei5ru._katute½£(GDP)no25%wo meta£¢££gaya·no³kasetonari,_½¨gaguratui5tei5ru
._
____________________________________________________________________________
[440]fS 2024.05.01
* [441]>+ [442]What We Learned Inside a North Korean Internet Server: How Well
Do You Know Your Partners? (38 North,
4/22)._goroninatUten5dei5runodesuga,_³±i5desune._
nomarue5KuRaU6DoSa-6Ba-6³²._ DeepL ³:
»nitUtei5ruga,_ªtatinoPuRoZie6KuTono¨ga®noA6NiMe-6Ta-6nikeniºsaretei5rukotowo
¥tUtei5takotowoºsuru¼ hanai5._,_³½wo ¹tosuruA6NiMe-6SiYON6wo«musubetenoHua6I6R
uno¨KoMeN6Toha½de¸karetei5rukotokara,_konoha§PuRoDeYU-6Sa-6kara°µdewareta¯½§g
ai5._
* [443]>+ [444]TeReBihaZiYANi-6no»wodonoyou5nie5taka2-o
-»»¥,_noNiYU-6Suªnokara-("¶¡no¹)"#538 (NHK BuRoGu, 4/30)
tosite§¨nimositaga,_v1999´kara2000´nikakete,_±¥gaZiYANi-6niyoru´tatiheno§ ³woº
suru±wositakoto,_vsosite,_ZiYANi-6´tonoºdea5ru¥tonodewareta¤nio5i5te,_2004´2,_
de±¬no¤ºgamerare,_ZiYANi-6niyoru§ ³noga¸desaretakotonitui5tesitaªha¨kunakatUta
._
2019´7noZiYANi-6no½¼nisite,_kono¹ga¦reraretei5nakatUtakotoha,_±nokarasurutoºda
tUtatominasarerudea5rou5._
sorewomae5tau5e5de,_¹noderaretakotonitui5teha,_(1)½¼,_(2)¾¡,_(3)E6N6TaMe(E6N6
Ta-6TeI6N6MeN6To)henoi5,_(4)¬º(ZiYANi-6)no ,_no4tunoSaBuKaTeGoRi-6ni§¥dekiruto
tatiha¤sita._
sorezore,_suru wo·ni¬sitei5ku._
____________________________________________________________________________
[SeKiYURiTei6Ho-6Ru memo]
[[445]nitui5te]
References
1. http://www.st.ryukoku.ac.jp/%7Ekjm/security/memo/memo.rdf
2. http://www.st.ryukoku.ac.jp/%7Ekjm/security/memo/desc.html
3. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531
4. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__tanakasan
5. https://news.ntv.co.jp/category/society/384db4ff849e4d0ba124738d4686498c
6. https://www.ntv.co.jp/info/pressrelease/20240531.html
7. https://president.jp/articles/-/78666?page=1
8. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__birdflu
9. https://wired.jp/article/bird-avian-flu-us-cattle-h5n1-human-infection-missed-cases/
10. https://jlia.lin.gr.jp/info/archives12725/
11. https://news.yahoo.co.jp/expert/articles/c6cd41c51e3f686390cc6be5b436ef0b5f4b1e17
12. https://www.u-tokyo.ac.jp/focus/ja/press/z0406_00015.html
13. https://rp.rakuno.ac.jp/archives/knowledge/1079.html
14. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__pumpkin
15. https://gigazine.net/news/20240531-mystery-malware-destroys-600000-routers/
16. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__ru
17. https://gigazine.net/news/20240531-russian-propaganda-are-connected-to-former-sheriff/
18. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__meta
19. https://gigazine.net/news/20240530-meta-shuts-down-israeli-ai-propaganda-network/
20. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__openai
21. https://gigazine.net/news/20240531-openai-ai-abuse-disrupting/
22. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__911
23. https://gigazine.net/news/20240530-911-s5-botnet-dismantled/
24. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__starlink
25. https://gigazine.net/news/20240528-russian-jamming-of-us-weapons-starlink/
26. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__mal
27. https://piyolog.hatenadiary.jp/entry/2024/05/31/005050
28. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__sql
29. https://piyolog.hatenadiary.jp/entry/2024/05/28/140527
30. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531__lexisnexis
31. https://blog.kaspersky.co.jp/car-manufacturers-silently-sell-user-telematics-data/36410/
32. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240531_various
33. https://www.postgresql.org/about/news/postgresql-163-157-1412-1315-and-1219-released-2858/
34. https://nvd.nist.gov/vuln/detail/CVE-2024-4317
35. https://success.trendmicro.com/dcx/s/solution/000298098?language=ja
36. https://www.jpcert.or.jp/newsflash/2024053001.html
37. https://seclists.org/oss-sec/2024/q2/258
38. https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
39. https://github.com/ambionics/cnext-exploits/
40. https://seclists.org/oss-sec/2024/q2/250
41. https://jprs.jp/tech/security/2024-05-13-unbound.html
42. https://nlnetlabs.nl/downloads/unbound/CVE-2024-33655.txt
43. https://dnsbomb.net/
44. https://www.isc.org/blogs/2024-dnsbomb/
45. https://thehackernews.com/2024/05/researchers-warn-of-catddos-botnet-and.html
46. https://jvn.jp/vu/JVNVU97214223/
47. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240530
48. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240530__myna
49. https://www.itmedia.co.jp/news/articles/2405/30/news114.html
50. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240530__jre
51. https://www.itmedia.co.jp/news/articles/2405/30/news135.html
52. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240530__site
53. https://internet.watch.impress.co.jp/docs/news/1595403.html
54. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240530_various
55. https://www.openssl.org/news/secadv/20240528.txt
56. https://forest.watch.impress.co.jp/docs/news/1595885.html
57. https://nginx.org/en/CHANGES-1.26
58. https://nginx.org/en/CHANGES
59. https://www.top10vpn.com/research/wifi-vulnerability-ssid/
60. https://www.top10vpn.com/assets/2024/05/Top10VPN-x-Vanhoef-SSID-Confusion.pdf
61. https://internet.watch.impress.co.jp/docs/yajiuma/1593513.html
62. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240529
63. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240529__musho
64. https://www.itmedia.co.jp/news/articles/2405/29/news109.html
65. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240529__openai
66. https://www.itmedia.co.jp/news/articles/2405/29/news093.html
67. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240529_tuiki
68. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517_firefox
69. https://mozillazine.jp/?p=8598
70. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528
71. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__trans
72. https://www.technologyreview.jp/s/285249/how-the-idea-of-a-transgender-contagion-went-viral-and-caused-untold-harm/
73. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__hyogo
74. https://news.yahoo.co.jp/articles/a0867d9739f2c1e09871b99e699076837366d11d
75. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__pen
76. https://news.yahoo.co.jp/expert/articles/ac921410a4575fd9e51f500bd3a438a8ca4ad312
77. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__israel
78. https://www.bbc.com/japanese/articles/cm55vrd4y74o
79. https://www.jetro.go.jp/biznews/2024/05/c83bee0d829c4dca.html
80. https://www3.nhk.or.jp/news/html/20240526/k10014460891000.html
81. https://www3.nhk.or.jp/news/html/20240527/k10014461671000.html
82. https://www.jiji.com/jc/article?k=2024052700613&g=int
83. https://www.afpbb.com/articles/-/3521405
84. https://www.afpbb.com/articles/-/3521441?cx_part=top_category&cx_position=3
85. https://www.yomiuri.co.jp/world/20240528-OYT1T50073/
86. https://www3.nhk.or.jp/news/html/20240528/k10014462631000.html
87. https://www.bbc.com/japanese/articles/cnkk821e17qo
88. https://www.change.org/p/%E6%9D%B1%E4%BA%AC%E8%97%9D%E8%A1%93%E5%A4%A7%E5%AD%A6%E3%81%AF-%E3%82%AC%E3%82%B6%E5%9C%B0%E5%8C%BA%E3%81%A7%E8%99%90%E6%AE%BA%E3%82%92%E7%B6%9A%E3%81%91%E3%82%8B%E3%82%A4%E3%82%B9%E3%83%A9%E3%82%A8%E3%83%AB%E8%BB%8D%E3%82%92%E6%94%AF%E6%8F%B4%E3%81%97%E3%81%9F%E3%83%99%E3%83%84%E3%82%A1%E3%83%AB%E3%82%A8%E3%83%AB%E7%BE%8E%E8%A1%93%E3%83%87%E3%82%B6%E3%82%A4%E3%83%B3%E3%82%A2%E3%82%AB%E3%83%87%E3%83%9F%E3%83%BC%E3%81%A8%E3%81%AE%E5%9B%BD%E9%9A%9B%E4%BA%A4%E6%B5%81%E5%8D%94%E5%AE%9A%E3%82%92%E6%89%93%E3%81%A1%E5%88%87%E3%81%A3%E3%81%A6%E3%81%8F%E3%81%A0%E3%81%95%E3%81%84
89. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__osaka
90. https://newsdig.tbs.co.jp/articles/-/1195205?display=1
91. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__zone
92. https://courrier.jp/news/archives/365107/
93. https://www.cinemacafe.net/article/2024/05/28/91793.html
94. https://forbesjapan.com/articles/detail/71181
95. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__ai
96. https://jp.wsj.com/articles/ai-is-driving-the-next-industrial-revolution-wall-street-is-cashing-in-d6e63a58
97. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__jr
98. https://diamond.jp/articles/-/344241
99. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__gpt4o
100. https://www.technologyreview.jp/s/336754/gpt-4os-chinese-token-training-data-is-polluted-by-spam-and-porn-websites/
101. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__kita
102. https://www3.nhk.or.jp/news/html/20240528/k10014462821000.html
103. https://www.jiji.com/jc/article?k=2024052800271&g=int
104. https://www.yomiuri.co.jp/world/20240528-OYT1T50081/
105. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__myna
106. https://www.itmedia.co.jp/news/articles/2405/27/news142.html
107. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__nagasaki
108. https://www.itmedia.co.jp/news/articles/2405/28/news116.html
109. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__sekisui
110. https://www.itmedia.co.jp/news/articles/2405/24/news180.html
111. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__copilot
112. https://forest.watch.impress.co.jp/docs/news/1594917.html
113. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__rust
114. https://forest.watch.impress.co.jp/docs/serial/yajiuma/1594981.html
115. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528__jpopf
116. https://jpopf.net/JPOPM46Program
117. https://dnsops.jp/event20240621.html
118. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240528_various
119. https://forest.watch.impress.co.jp/docs/news/1593338.html
120. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240527
121. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240527__vbscript
122. https://forest.watch.impress.co.jp/docs/news/1593925.html
123. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240527__buffalo
124. https://internet.watch.impress.co.jp/docs/news/1593570.html
125. https://www.buffalo.jp/news/detail/20240523-01.html
126. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240527_chrome
127. https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html
128. https://nvd.nist.gov/vuln/detail/CVE-2024-5274
129. https://chromereleases.googleblog.com/2024/05/chrome-for-android-update_23.html
130. https://forest.watch.impress.co.jp/docs/news/1594715.html
131. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240522
132. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240522__ransom
133. https://atmarkit.itmedia.co.jp/ait/articles/2405/14/news005.html
134. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240522__installedappview
135. https://www.nirsoft.net/utils/installed_app_view.html
136. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240522__ios
137. https://forest.watch.impress.co.jp/docs/news/1593122.html
138. https://9to5mac.com/2024/05/20/apple-releases-ios-17-5-1-with-fix-for-bug-that-caused-deleted-photos-to-return/
139. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240522__sq321
140. https://jp.reuters.com/world/europe/DSC7AACLSNON5MXSGPTSZDIBYU-2024-05-21/
141. https://www.nytimes.com/2024/05/21/world/asia/singapore-airlines-turbulence-death.html
142. https://www.aviationwire.jp/archives/301044
143. https://www.aviationwire.jp/archives/301059
144. https://flyteam.jp/registration/9V-SWM
145. https://www.flightradar24.com/data/aircraft/9v-swm#354eb60f
146. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240521
147. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240521__assange
148. https://jp.reuters.com/world/security/EOIYRLTJ7FJRPMU7GCWFC2YAUI-2024-05-20/
149. https://wired.jp/article/julian-assange-extradite-court-decision-wikileaks/
150. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240521_tuiki
151. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240520_various
152. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240520
153. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240520__raisi
154. https://mainichi.jp/articles/20240520/k00/00m/030/086000c
155. https://www.yomiuri.co.jp/world/20240520-OYT1T50073/
156. https://jp.reuters.com/economy/D2AA2YGHV5OYPMA5QPQEYBYH5A-2024-05-20/
157. https://jp.reuters.com/world/security/74XL6FSPBBIH3MQ4KPSFGYO4KM-2024-05-20/
158. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240520__openai
159. https://www.itmedia.co.jp/news/articles/2405/18/news062.html
160. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240520__nhk
161. https://www.itmedia.co.jp/news/articles/2405/17/news202.html
162. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240520__ios
163. https://internet.watch.impress.co.jp/docs/yajiuma/1592807.html
164. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240520_various
165. https://forest.watch.impress.co.jp/docs/news/1592269.html
166. https://mta.openssl.org/pipermail/openssl-announce/2024-May/000303.html
167. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517
168. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517__impress
169. https://forest.watch.impress.co.jp/docs/serial/yajiuma/1592528.html
170. https://forest.watch.impress.co.jp/docs/news/1592486.html
171. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517__cisa
172. https://internet.watch.impress.co.jp/docs/news/1592150.html
173. https://blog.kaspersky.co.jp/how-to-protect-from-pegasus-spyware/32437/
174. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517__jr
175. https://news.yahoo.co.jp/articles/d3dc8521f05f5cd13cad769c9b3014cee1d7f146
176. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517__kara
177. https://www.technologyreview.jp/s/335746/deepfakes-of-the-dead-are-a-growing-chinese-business/
178. https://www.hayakawa-online.co.jp/product/books/20524.html
179. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517_microsoft
180. https://msrc.microsoft.com/blog/2024/05/202405-security-update/
181. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30045
182. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30053
183. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30041
184. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30007
185. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30047
186. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30048
187. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30055
188. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30056
189. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4331
190. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4368
191. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4558
192. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4559
193. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4671
194. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4761
195. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4947
196. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4948
197. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4949
198. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-4950
199. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30059
200. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30060
201. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30042
202. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30043
203. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30044
204. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30006
205. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-29994
206. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30033
207. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30054
208. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30046
209. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-32002
210. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-32004
211. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30034
212. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30031
213. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-29996
214. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30025
215. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30037
216. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30016
217. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30020
218. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30036
219. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30019
220. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30008
221. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30032
222. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30035
223. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30051
224. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30010
225. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30011
226. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30017
227. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30018
228. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30050
229. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-29997
230. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-29998
231. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-29999
232. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30000
233. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30001
234. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30002
235. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30003
236. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30004
237. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30005
238. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30012
239. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30021
240. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30040
241. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30027
242. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30039
243. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30009
244. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30014
245. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30015
246. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30022
247. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30023
248. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30024
249. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30029
250. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-26238
251. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30030
252. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30028
253. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30038
254. https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2024-30049
255. https://msrc.microsoft.com/update-guide/ja-JP/advisory/CVE-2024-30044
256. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040
257. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046
258. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051
259. https://www.nichepcgamer.com/archives/reports-that-the-problem-of-not-being-able-to-connect-to-the-vpn-has-not-been-fixed.html
260. https://msrc.microsoft.com/update-guide/releaseNote/2024-May
261. https://isc.sans.edu/diary/Microsoft%20May%202024%20Patch%20Tuesday/30920
262. https://www.nichepcgamer.com/archives/windows11-windows-update-2024-5-kb5037771.html
263. https://www.nichepcgamer.com/archives/windows10-windows-update-2024-5-kb5037768.html
264. https://blog.kaspersky.co.jp/cve-2024-30051/36342/
265. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051
266. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517_tuiki
267. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/04.html#20240415_panos
268. https://www.jpcert.or.jp/at/2024/at240009.html
269. https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CrO6CAK
270. https://www.volexity.com/blog/2024/05/15/detecting-compromise-of-cve-2024-3400-on-palo-alto-networks-globalprotect-devices/
271. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517_various
272. https://www.openwall.com/lists/oss-security/2024/05/14/2
273. https://forest.watch.impress.co.jp/docs/news/1591601.html
274. https://www.openwall.com/lists/oss-security/2024/05/13/1
275. https://forest.watch.impress.co.jp/docs/news/1591569.html
276. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517_firefox
277. https://mozillazine.jp/?p=8579
278. https://mozillazine.jp/?p=8586
279. https://mozillazine.jp/?p=8592
280. https://mozillazine.jp/?p=8598
281. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240517_chrome
282. https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html
283. https://nvd.nist.gov/vuln/detail/CVE-2024-4947
284. https://chromereleases.googleblog.com/2024/05/chrome-for-android-update_15.html
285. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#may-16-2024
286. https://nvd.nist.gov/vuln/detail/CVE-2024-4947
287. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240515
288. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240515__cheating
289. https://www3.nhk.or.jp/news/html/20240515/k10014449501000.html
290. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240515__stss
291. https://www3.nhk.or.jp/news/html/20240515/k10014449271000.html
292. https://plus.nhk.jp/watch/st/g1_2024051430151
293. https://www.nhk.or.jp/minplus/0121/topic086.html
294. https://www.hokeniryo.metro.tokyo.lg.jp/kansen/stss_kansen.html
295. https://www.hokeniryo.metro.tokyo.lg.jp/kansen/stss_kansen.files/STSSmanual202404.pdf
296. https://www.niid.go.jp/niid/ja/group-a-streptococcus-m/2656-cepr/12594-stss-2023-2024.html
297. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240514
298. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240514__ransom
299. https://internet.watch.impress.co.jp/docs/news/1590189.html
300. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240514__kyotou
301. https://www.itmedia.co.jp/news/articles/2405/10/news058.html
302. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240514_apple
303. https://support.apple.com/en-us/HT201222
304. https://support.apple.com/ja-jp/HT214101
305. https://support.apple.com/ja-jp/HT214100
306. https://forest.watch.impress.co.jp/docs/news/1591132.html
307. https://www.apple.com/jp/newsroom/2024/05/apple-and-google-deliver-support-for-unwanted-tracking-alerts-in-ios-and-android/
308. https://support.apple.com/ja-jp/HT214102
309. https://support.apple.com/ja-jp/HT214104
310. https://support.apple.com/ja-jp/HT214106
311. https://support.apple.com/ja-jp/HT214107
312. https://support.apple.com/ja-jp/HT214105
313. https://support.apple.com/ja-jp/HT214103
314. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240514_chrome
315. https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html
316. https://nvd.nist.gov/vuln/detail/CVE-2024-4761
317. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240513_chrome
318. https://nvd.nist.gov/vuln/detail/CVE-2024-4671
319. https://nvd.nist.gov/vuln/detail/CVE-2024-4761
320. https://chromereleases.googleblog.com/2024/05/chrome-for-android-update_13.html
321. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240514_various
322. https://jvn.jp/ta/JVNTA94876636/
323. https://www.wireguard.com/netns/#the-new-namespace-solution
324. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240513
325. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240513__hokudai
326. https://mainichi.jp/articles/20240507/k00/00m/040/112000c
327. https://mainichi.jp/articles/20240507/k00/00m/040/111000c
328. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240513__reonpocket5
329. https://www.itmedia.co.jp/news/articles/2405/10/news135.html
330. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240513__google
331. https://www.itmedia.co.jp/news/articles/2405/13/news090.html
332. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240513_chrome
333. https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html
334. https://nvd.nist.gov/vuln/detail/CVE-2024-4671
335. https://chromereleases.googleblog.com/2024/05/chrome-for-android-update_10.html
336. https://forest.watch.impress.co.jp/docs/news/1590782.html
337. https://learn.microsoft.com/ja-jp/deployedge/microsoft-edge-relnotes-security#may-10-2024
338. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510
339. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510__sonpo
340. https://toyokeizai.net/articles/-/738667
341. https://newswitch.jp/p/38946
342. https://www.fsa.go.jp/news/r5/hoken/20231226/20231226.html
343. https://jp.reuters.com/markets/japan/funds/WFVL6CR3ZZIYHOF74J47NHABUU-2023-12-26/
344. https://www.nikkei.com/article/DGXZQOUB299ES0Z20C24A2000000/
345. https://www.nikkei.com/topics/23080201
346. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510__provider
347. https://digital.asahi.com/articles/ASS5B20MYS5BULFA00PM.html
348. https://www.tokyo-np.co.jp/article/326157
349. https://www.itmedia.co.jp/news/articles/2403/01/news170.html
350. https://o-lawoffice.jp/columns/178/
351. https://www.shugiin.go.jp/internet/itdb_gian.nsf/html/gian/keika/1DDBACE.htm
352. https://www.shugiin.go.jp/internet/itdb_gian.nsf/html/gian/honbun/g21309034.htm
353. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510__apple
354. https://digital.asahi.com/articles/ASS5B1SLJS5BBQBQ2JHM.html
355. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510__starlink
356. https://www.bloomberg.co.jp/news/articles/2024-05-09/SD87K8DWX2PS00
357. https://www.itmedia.co.jp/news/articles/2402/13/news081.html
358. https://www.wsj.com/business/telecom/starlink-musk-ukraine-russia-sudan-satellite-communications-technology-f4fc79d9
359. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510__dell
360. https://www.itmedia.co.jp/news/articles/2405/10/news118.html
361. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510__izumi
362. https://xtech.nikkei.com/atcl/nxt/news/24/00723/
363. https://www.izumi.co.jp/corp/outline/news_release/pdf/2024/0216news.pdf
364. https://www.izumi.co.jp/corp/outline/news_release/pdf/2024/0216news_02.pdf
365. https://www.izumi.co.jp/corp/outline/news_release/pdf/2024/0220news.pdf
366. https://www.izumi.co.jp/corp/ir/pdf/2024/0222news.pdf
367. https://www.izumi.co.jp/corp/outline/news_release/pdf/2024/0222news.pdf
368. https://www.izumi.co.jp/corp/outline/news_release/pdf/2024/0509news_01.pdf
369. https://www.izumi.co.jp/corp/ir/pdf/2024/0509news.pdf
370. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510__hoken
371. https://www.nikkei.com/article/DGXZQOUB07CPE0X00C24A5000000/
372. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240510__teamv
373. https://businessnetwork.jp/article/19442/
374. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240509
375. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240509__ntt
376. https://businessnetwork.jp/article/20288/
377. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240509__kaji
378. https://www.itmedia.co.jp/news/articles/2405/07/news141.html
379. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240509__eu
380. https://internet.watch.impress.co.jp/docs/column/security/1588335.html
381. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240509__beta
382. https://jp.ifixit.com/News/95068/ask-ifixit-%E3%83%97%E3%83%A9%E3%82%B9%E3%83%81%E3%83%83%E3%82%AF%E3%81%AE%E3%81%B9%E3%81%9F%E3%81%A4%E3%81%8D%E3%82%92%E7%9B%B4%E3%81%99%E3%81%AB%E3%81%AF%EF%BC%9F
383. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240509__guriko
384. https://www.itmedia.co.jp/news/articles/2405/08/news176.html
385. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240509__apple
386. https://www.itmedia.co.jp/news/articles/2405/09/news084.html
387. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240509_various
388. https://support.apple.com/ja-jp/HT214099
389. https://nvd.nist.gov/vuln/detail/CVE-2024-27793
390. https://www.itmedia.co.jp/news/articles/2405/09/news053.html
391. https://citizenlab.ca/2024/04/vulnerabilities-across-keyboard-apps-reveal-keystrokes-to-network-eavesdroppers/
392. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240508
393. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240508__apple
394. https://www.itmedia.co.jp/news/articles/2405/08/news118.html
395. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240508__lockbit
396. https://digital.asahi.com/articles/ASS573RP0S57UTIL028M.html
397. https://www.justice.gov/opa/pr/us-charges-russian-national-developing-and-operating-lockbit-ransomware
398. https://www.npa.go.jp/news/release/2024/20240507001.html
399. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240508_various
400. https://helpcenter.trendmicro.com/ja-jp/article/tmka-12336
401. https://nvidia.custhelp.com/app/answers/detail/a_id/5533
402. https://nvd.nist.gov/vuln/detail/CVE-2024-0096
403. https://nvd.nist.gov/vuln/detail/CVE-2024-0097
404. https://nvd.nist.gov/vuln/detail/CVE-2024-0098
405. https://forest.watch.impress.co.jp/docs/news/1589607.html
406. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240508_chrome
407. https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html
408. https://chromereleases.googleblog.com/2024/05/chrome-for-android-update.html
409. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240508_tuiki
410. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/04.html#20240411_microsoft
411. https://gigazine.net/news/20240502-microsoft-windows-security-update-vpn/
412. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240507
413. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240507__ff
414. https://www.itmedia.co.jp/news/articles/2405/07/news129.html
415. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240507__israel
416. https://courrier.jp/news/tag/longread-harari-war-israel/
417. https://www.haaretz.com/israel-news/2024-04-18/ty-article-magazine/from-gaza-to-iran-the-netanyahu-government-is-endangering-israels-survival/0000018e-f25f-daad-a3de-fe7ff5790000
418. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240507__rakka
419. https://jp.wsj.com/articles/why-an-iphone-can-survive-a-drop-from-a-plane-but-not-from-your-kitchen-counter-fe21cca8
420. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240502
421. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240502__orange
422. https://www.nikkan-gendai.com/articles/view/life/339626
423. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240502__surface
424. https://blogs.windows.com/japan/2024/05/02/deep-dive-into-the-surface-it-toolkit/
425. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240502__giga
426. https://www.nhk.or.jp/shutoken/saitama/article/020/22/
427. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240502__guriko
428. https://www.glico.com/assets/files/NR20240501_hp__1.pdf
429. https://www3.nhk.or.jp/news/html/20240501/k10014438211000.html
430. https://mainichi.jp/articles/20240501/k00/00m/020/015000c
431. https://piyolog.hatenadiary.jp/entry/2024/04/26/013037
432. https://xtech.nikkei.com/atcl/nxt/column/18/00001/09206/
433. https://diamond.jp/articles/-/342762
434. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240502__tesla
435. https://jp.wsj.com/articles/why-musk-now-needs-china-more-than-it-needs-him-0a339c43
436. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240502__ev
437. https://jp.wsj.com/articles/tesla-is-pulling-back-from-ev-charging-and-people-are-freaking-out-c83d56ad
438. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240502__chinabubble
439. https://jp.wsj.com/articles/the-folly-of-chinas-real-estate-boom-was-easy-to-see-but-no-one-wanted-to-stop-it-8f54ea25
440. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240501
441. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240501__kita
442. https://www.38north.org/2024/04/what-we-learned-inside-a-north-korean-internet-server-how-well-do-you-know-your-partners/
443. http://www.st.ryukoku.ac.jp/~kjm/security/memo/2024/05.html#20240501__johnny
444. https://www.nhk.or.jp/bunken-blog/500/492567.html
445. http://www.st.ryukoku.ac.jp/~kjm/author.html
Usage: http://www.kk-software.de/kklynxview/get/URL
e.g. http://www.kk-software.de/kklynxview/get/http://www.kk-software.de
Errormessages are in German, sorry ;-)