{"notices":false,"list":[{"cb_seq":"3794","cb_code":"2","cb_notice":"0","cb_title":"\uad6c\uae00 Chrome \ube0c\ub77c\uc6b0\uc800 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1<\/span> <\/span>\uac1c\uc694<\/span>
 o <\/span>Google \ube0c\ub77c\uc6b0\uc800\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c [1]<\/span><\/p>

<\/span> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span>
<\/span> <\/span>
\u25a1 <\/span>\uc124\uba85<\/span>
 o <\/span>\ub370\uc2a4\ud06c\ud1b1 \uc6a9 Chrome\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ud799 \ubc84\ud37c \uc624\ubc84\ud50c\ub85c \ucde8\uc57d\uc810(CVE-2025-4096) [1][2]<\/span><\/p>

 o <\/span>\ub370\uc2a4\ud06c\ud1b1 \uc6a9 Chrome\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubc94\uc704\ub97c \ubc97\uc5b4\ub09c \uba54\ubaa8\ub9ac \uc561\uc138\uc2a4 \ucde8\uc57d\uc810(CVE-2025-4050) [1][3]<\/span><\/p>

 o<\/span> <\/span>\ub370\uc2a4\ud06c\ud1b1 \uc6a9 Chrome\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \uc811\uadfc \uc81c\uc5b4 \uc6b0\ud68c \ucde8\uc57d\uc810(CVE-2025-4052) [1][4]<\/span><\/p>

 <\/span><\/p>

\u25a1<\/span> <\/span>\uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span>
<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2025-4096<\/span><\/p><\/td>

Chrome<\/span><\/p>

(Linux)<\/span><\/p><\/td>

136.0.7103.59 \ubbf8\ub9cc<\/span><\/p><\/td>

136.0.7103.59<\/span><\/p><\/td><\/tr>

CVE-2025-4050<\/span><\/p><\/td>

Chrome<\/span><\/p>

(Windows,<\/span> Mac)<\/span><\/p><\/td>

136.0.7103.48 \ubbf8<\/span>\ub9cc<\/span><\/p><\/td>

136.0.7103.48<\/span><\/p><\/td><\/tr>

CVE-2025-4052<\/span><\/p><\/td>

136.0.7103.49 \ubbf8<\/span>\ub9cc<\/span><\/p><\/td>

136.0.7103.49<\/span><\/p><\/td><\/tr><\/tbody><\/table>

 \u203b \ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 [1]<\/span><\/p>

 
<\/span>\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1] <\/span>https:\/\/chromereleases.googleblog.com\/2025\/04\/stable-channel-update-for-desktop_29.html<\/span><\/a><\/span><\/p>

 [2] <\/span>h<\/span>t<\/span>t<\/span>p<\/span>s<\/span>:<\/span>\/<\/span>\/<\/span>n<\/span>v<\/span>d<\/span>.<\/span>n<\/span>i<\/span>s<\/span>t<\/span>.<\/span>g<\/span>o<\/span>v<\/span>\/<\/span>v<\/span>u<\/span>l<\/span>n<\/span>\/<\/span>d<\/span>e<\/span>t<\/span>a<\/span>i<\/span>l<\/span>\/<\/span>C<\/span>V<\/span>E<\/span>-<\/span>2<\/span>0<\/span>2<\/span>5<\/span>-<\/span>4<\/span>0<\/span>9<\/span>6<\/span><\/a><\/span><\/p>

 [3] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4050<\/span><\/a><\/span><\/p>

 [4] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4052<\/span><\/a><\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-08 01:50:07","cb_use_flag":"0","cb_admin_id":"ikmet147","cb_admin_name":"\uc774\ucc3d\uc218","cb_readcount":"0"},{"cb_seq":"3793","cb_code":"2","cb_notice":"0","cb_title":"Elastic \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>Elastic\u793e\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c [1]<\/span><\/p>

<\/span> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span>
<\/span> <\/span>
\u25a1 \uc124\uba85<\/span>
 o <\/span>Kibana\uc5d0\uc11c \ud504\ub85c\ud1a0\ud0c0\uc785 \uc624\uc5fc\uc73c\ub85c \uc778\ud574 \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810(CVE-2025-25014) [1][2]<\/span>
<\/span> <\/span>
\u25a1<\/span> <\/span>\uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548

<\/span><\/span><\/p>

<\/span><\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2025-25014<\/span><\/p><\/td>

Kibana<\/span><\/p><\/td>

8.3.0 \uc774\uc0c1 ~ 8.17.5 \uc774\ud558<\/span><\/p><\/td>

8.17.6<\/span><\/p><\/td><\/tr>

8.18.0 \uc774\ud558<\/span><\/p><\/td>

8.18.1<\/span><\/p><\/td><\/tr>

9.0.0 \uc774\ud558<\/span><\/p><\/td>

9.0.1<\/span><\/p><\/td><\/tr><\/tbody><\/table>

 \ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 [1]<\/span><\/p>

 <\/span>
\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1]<\/span> <\/span>https:\/\/discuss.elastic.co\/t\/kibana-8-17-6-8-18-1-or-9-0-1-security-update-esa-2025-07\/377868<\/span><\/a><\/span><\/p>

 [2]<\/span> <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-25014<\/span><\/a><\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-08 01:49:04","cb_use_flag":"0","cb_admin_id":"ikmet147","cb_admin_name":"\uc774\ucc3d\uc218","cb_readcount":"0"},{"cb_seq":"3792","cb_code":"2","cb_notice":"0","cb_title":"\uc0bc\uc131\uc804\uc790 \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>\uc0bc\uc131\uc804\uc790\u793e\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c [1]<\/span><\/p>

 o \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span>
<\/span> <\/span>
\u25a1 <\/span>\uc124\uba85<\/span>
 o <\/span>\uc0bc\uc131\uc804\uc790 MagicINFO 9 Server\uc5d0\uc11c \uc5c5\ub85c\ub4dc \ub514\ub809\ud1a0\ub9ac \uacbd\ub85c \ubcc0\uc870\ub85c \uc778\ud574 \ubc1c\uc0dd\ud558\ub294 \ud30c\uc77c \uc5c5\ub85c\ub4dc \ucde8\uc57d\uc810(CVE-2024-7399) [1][3]<\/span>
<\/span>
\u25a1 <\/span>\uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548
<\/span>
<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2024-7399<\/span><\/p><\/td>

MagicINFO 9 Server<\/span><\/p><\/td>

21.1050.0 \ubbf8\ub9cc<\/span><\/p><\/td>

21.1050.0 \uc774\uc0c1<\/span><\/p><\/td><\/tr><\/tbody><\/table>

\u203b \ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 [1][2]<\/span><\/p>


<\/span>\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1] <\/span>htt<\/span>ps:\/\/security.samsungtv.com\/securityU<\/span>pdates<\/span><\/a><\/span><\/p>

 [2] <\/span>https:\/\/docs.samsungvx.com\/docs\/display\/MS9\/Release+Information?desktop=true<\/span><\/a><\/span>-<\/span><\/a>oName=sv-<\/span>translation#ReleaseInformation-MagicINFO9Server(21.1050.0)ReleaseN<\/span>otes<\/span><\/a><\/span><\/p>

 [3]<\/span> <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2024-73<\/span>99<\/span><\/a><\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-08 01:47:32","cb_use_flag":"0","cb_admin_id":"ikmet147","cb_admin_name":"\uc774\ucc3d\uc218","cb_readcount":"0"},{"cb_seq":"3791","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2025-05-06)","cb_contents":"

\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.<\/span>
* \ucc38\uc870 \ub9c1\ud06c : <\/span>
https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a><\/a><\/p>
cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2025-27363<\/th>FreeType<\/th>FreeType Out-of-Bounds Write Vulnerability<\/th>2025-05-06<\/th>FreeType contains an out-of-bounds write vulnerability when attempting to parse font subglyph structures related to TrueType GX and variable font files that may allow for arbitrary code execution.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-27<\/th><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-08 01:46:46","cb_use_flag":"0","cb_admin_id":"ikmet147","cb_admin_name":"\uc774\ucc3d\uc218","cb_readcount":"0"},{"cb_seq":"3789","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2025-05-05)","cb_contents":"
\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2025-05-05)2025-05-05<\/span><\/td><\/tr>
<\/colgroup>
\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.
* \ucc38\uc870 \ub9c1\ud06c : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>

cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2025-3248<\/th>Langflow<\/th>Langflow Missing Authentication Vulnerability<\/th>2025-05-05<\/th>Langflow contains a missing authentication vulnerability in the \/api\/v1\/validate\/code endpoint that allows a remote, unauthenticated attacker to execute arbitrary code via crafted HTTP requests.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-26<\/th><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table>
\ucd9c\ucc98 \uc0ac\uc774\ud2b8 : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a><\/h6>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-07 00:57:55","cb_use_flag":"0","cb_admin_id":"jangmaker","cb_admin_name":"\uc7a5\uc815\uc6d0","cb_readcount":"4"},{"cb_seq":"3787","cb_code":"2","cb_notice":"0","cb_title":"Synology \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 <\/span>\uac1c\uc694<\/span><\/p>

<\/span>o Synology<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p>

<\/span>o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>

 <\/p>

\u25a1 <\/span>\uc124\uba85<\/span><\/p>

<\/span>o Synology<\/span>\u793e<\/span>\uc758 <\/span>DiskStation<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810<\/span>(CVE-2024-10442) [2]<\/span><\/p>

 <\/p>

\u25a1 <\/span>\uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0\ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2024-10442
<\/span><\/p><\/td>

DSMUC 3.1<\/span><\/p><\/td>

3.1.4-23079 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

3.1.4-23079<\/span><\/p><\/td><\/tr>

Replication Service for DSM 7.2<\/span><\/p><\/td>

1.3.0-0423 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

1.3.0-0423<\/span><\/p><\/td><\/tr>

Replication Service for DSM 7.1<\/span><\/p><\/td>

1.2.2-0353 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

1.2.2-0353<\/span><\/p><\/td><\/tr>

Replication Service for DSM 6.2<\/span><\/p><\/td>

1.0.12-0066 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

1.0.12-0066<\/span><\/p><\/td><\/tr><\/tbody><\/table>

\u203b \ud558\ub2e8\uc758 \ucc38\uace0 \uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 [1]<\/span><\/p>


<\/span><\/p>

\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span><\/p>

[1] https:\/\/www.synology.com\/en-global\/security\/advisory\/Synology_SA_24_22<\/span><\/p>

[2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-10442<\/span><\/p>

 <\/p>

\u25a1 <\/span>\ubb38\uc758\uc0ac\ud56d<\/span><\/p>

<\/span>o <\/span>\ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130<\/span>: <\/span>\uad6d\ubc88\uc5c6\uc774 <\/span>118<\/span><\/p>

 <\/p>

\u25a1 <\/span>\uc791\uc131 <\/span>: <\/span>\uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-05 03:01:09","cb_use_flag":"0","cb_admin_id":"nahae95","cb_admin_name":"\uc774\ub098\ud574","cb_readcount":"5"},{"cb_seq":"3786","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2025-05-02)2025-05-02","cb_contents":"

\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.<\/span>
* \ucc38\uc870 \ub9c1\ud06c : <\/span>https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>

<\/p>
cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2024-58136<\/th>Yiiframework<\/th>Yiiframework Yii Improper Protection of Alternate Path Vulnerability<\/th>2025-05-02<\/th>Yii Framework contains an improper protection of alternate path vulnerability that may allow a remote attacker to execute arbitrary code. This vulnerability could affect other products that implement Yii, including\u2014but not limited to\u2014Craft CMS, as represented by CVE-2025-32432.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-23<\/th><\/tr>
CVE-2025-34028<\/th>Commvault<\/th>Commvault Command Center Path Traversal Vulnerability<\/th>2025-05-02<\/th>Commvault Command Center contains a path traversal vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-23

<\/th><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-05 03:00:35","cb_use_flag":"0","cb_admin_id":"nahae95","cb_admin_name":"\uc774\ub098\ud574","cb_readcount":"5"},{"cb_seq":"3785","cb_code":"2","cb_notice":"0","cb_title":" \u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2025-05-01)","cb_contents":"<\/colgroup>
\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.
* \ucc38\uc870 \ub9c1\ud06c : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>

cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2023-44221<\/th>SonicWall<\/th>SonicWall SMA100 Appliances OS Command Injection Vulnerability<\/th>2025-05-01<\/th>SonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-22<\/th><\/tr>
CVE-2024-38475<\/th>Apache<\/th>Apache HTTP Server Improper Escaping of Output Vulnerability<\/th>2025-05-01<\/th>Apache HTTP Server contains an improper escaping of output vulnerability in mod_rewrite that allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally\/directly reachable by any URL, resulting in code execution or source code disclosure.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-22

<\/th><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-05 03:00:07","cb_use_flag":"0","cb_admin_id":"nahae95","cb_admin_name":"\uc774\ub098\ud574","cb_readcount":"5"},{"cb_seq":"3782","cb_code":"2","cb_notice":"0","cb_title":"\ub9ac\ub205\uc2a4 \ucee4\ub110 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
<\/span><\/span> <\/span>o \ub9ac\ub205\uc2a4 \uc7ac\ub2e8\uc740 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c [1]<\/span><\/p>

<\/span><\/span> <\/span>o \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span>
<\/span><\/span><\/span>
\u25a1 \uc124\uba85<\/span>
<\/span><\/span> <\/span>o Linux Kernel\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uad8c\ud55c \uc0c1\uc2b9 \ucde8\uc57d\uc810(CVE-2025-21756) [1][2]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2025-21756<\/span><\/p><\/td>

Linux Kernel<\/span><\/p><\/td>

6.6.79<\/span> \ubbf8\ub9cc<\/span><\/p><\/td>

6.6.79<\/span><\/p><\/td><\/tr>

6.12.16<\/span> \ubbf8\ub9cc<\/span><\/p><\/td>

6.12.16<\/span><\/p><\/td><\/tr>

6.13.4<\/span> \ubbf8\ub9cc<\/span><\/p><\/td>

6.13.4<\/span><\/p><\/td><\/tr>

6.14-rc1<\/span> \ubbf8\ub9cc<\/span><\/p><\/td>

6.14-rc1<\/span><\/p><\/td><\/tr><\/tbody><\/table>

 <\/span>\u203b \ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 [1][2]<\/span><\/p>

 <\/span>\u203b \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8\uac00 \uacf5\uac1c\ub41c \uc6b4\uc601\uccb4\uc81c\ub97c \uc6b4\uc601\ud558\uace0 \uc788\uc744 \uacbd\uc6b0, \ucc38\uace0 \uc0ac\uc774\ud2b8\uc758 \ub0b4\uc6a9\uc744 \ucc38\uc870\ud558\uc5ec \ubcf4\uc548 \uc870\uce58 \ub610\ub294 \uc5c5\ub370\uc774\ud2b8 \uc218\ud589<\/span><\/p>

   - Debian [3]<\/span><\/p>

   - Ubuntu [4]<\/span><\/p>

   - Red Hat\/CentOS [5]<\/span><\/p>

   - SUSE\/openSUSE [6]<\/span><\/p>

   - Amazon [7]<\/span><\/p>

   - Google [8]<\/span><\/p>

<\/span><\/span>
\u25a1 \ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
[1] <\/span>https:\/\/lore.kernel.org\/linux-cve-announce\/2025022603-CVE-2025-21756-5e09@gregkh\/T\/<\/span><\/a><\/span><\/span><\/a><\/p>

[2] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21756<\/span><\/a><\/span><\/p>

[3] <\/span>https:\/\/security-tracker.debian.org\/tracker\/CVE-2025-21756<\/span><\/a><\/span><\/span><\/a><\/p>

[4] <\/span>https:\/\/ubuntu.com\/security\/CVE-2025-21756<\/span><\/a><\/span><\/p>

[5] <\/span>https:\/\/access.redhat.com\/security\/cve\/cve-2025-21756<\/span><\/a><\/span><\/p>

[6] <\/span>https:\/\/www.suse.com\/ko-kr\/security\/cve\/CVE-2025-21756.html<\/span><\/a><\/span><\/p>

[7] <\/span>https:\/\/alas.aws.amazon.com\/cve\/html\/CVE-2025-21756.html<\/span><\/a><\/span><\/p>

[8] <\/span>https:\/\/cloud.google.com\/support\/bulletins?hl=ko#gcp-2025-017<\/span><\/a><\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span><\/span><\/span>
\u25a1 \uc791\uc131: \uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/td><\/tr>

\ud0a4\uc6cc\ub4dc<\/span><\/td>Linux Kernel<\/span><\/a>

<\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-01 02:32:13","cb_use_flag":"0","cb_admin_id":"nahae95","cb_admin_name":"\uc774\ub098\ud574","cb_readcount":"9"},{"cb_seq":"3781","cb_code":"2","cb_notice":"0","cb_title":" \u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2025-04-29)","cb_contents":"
\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.
* \ucc38\uc870 \ub9c1\ud06c : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>

cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2025-31324<\/th>SAP<\/th>SAP NetWeaver Unrestricted File Upload Vulnerability<\/th>2025-04-29<\/th>SAP NetWeaver Visual Composer Metadata Uploader contains an unrestricted file upload vulnerability that allows an unauthenticated agent to upload potentially malicious executable binaries.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-20<\/th><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table>
\ucd9c\ucc98 \uc0ac\uc774\ud2b8 : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a><\/h6>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-05-01 02:31:31","cb_use_flag":"0","cb_admin_id":"nahae95","cb_admin_name":"\uc774\ub098\ud574","cb_readcount":"3"},{"cb_seq":"3779","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2025-04-28)","cb_contents":"

\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.<\/span>

* \ucc38\uc870 \ub9c1\ud06c : <\/span>
https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a><\/a>

<\/p>
cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2025-3928<\/th>Commvault<\/th>Commvault Web Server Unspecified Vulnerability<\/th>2025-04-28<\/th>Commvault Web Server contains an unspecified vulnerability that allows a remote, authenticated attacker to create and execute webshells.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-17<\/th><\/tr>
CVE-2025-42599<\/th>Qualitia<\/th>Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability<\/th>2025-04-28<\/th>Qualitia Active! Mail contains a stack-based buffer overflow vulnerability that allows a remote, unauthenticated attacker to execute arbitrary or trigger a denial-of-service via a specially crafted request.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-19<\/th><\/tr>
CVE-2025-1976<\/th>Broadcom<\/th>Broadcom Brocade Fabric OS Code Injection Vulnerability<\/th>2025-04-28<\/th>Broadcom Brocade Fabric OS contains a code injection vulnerability that allows a local user with administrative privileges to execute arbitrary code with full root privileges.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2025-05-19<\/th><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-04-30 00:43:30","cb_use_flag":"0","cb_admin_id":"ikmet147","cb_admin_name":"\uc774\ucc3d\uc218","cb_readcount":"8"},{"cb_seq":"3777","cb_code":"2","cb_notice":"0","cb_title":"SAP \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"<\/thead>

\u25a1 \uac1c\uc694<\/span>
<\/span><\/span> <\/span>o SAP\u793e\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c [1][2]<\/span><\/p>

<\/span><\/span> <\/span>o \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span>
<\/span><\/span><\/span>
\u25a1 \uc124\uba85<\/span>
<\/span><\/span> <\/span>o SAP NetWeaver(Visual Composer development server)\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ud30c\uc77c \uc5c5\ub85c\ub4dc \ucde8\uc57d\uc810(CVE-2025-31324) [1][3]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2025-31324<\/span><\/p><\/td>

SAP NetWeaver<\/span><\/p><\/td>

VCFRAMEWORK 7.50<\/span><\/p><\/td>

\ubcc4\ub3c4 \ubcf4\uc548 \ud328\uce58 \uc81c\uacf5 [2]<\/span><\/p><\/td><\/tr><\/tbody><\/table>

 <\/span>\u203b \ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 [1][2]<\/span><\/p>

<\/span><\/span>
\u25a1 \ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
[1] <\/span>https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/april-2025.html<\/span><\/a><\/span><\/p>

[2] <\/span>https:\/\/me.sap.com\/notes\/3594142<\/span><\/a><\/span><\/span><\/a><\/p>

[3] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31324<\/span><\/a><\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span><\/span><\/span>
\u25a1 \uc791\uc131: \uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-04-29 02:26:25","cb_use_flag":"0","cb_admin_id":"jangmaker","cb_admin_name":"\uc7a5\uc815\uc6d0","cb_readcount":"10"},{"cb_seq":"3773","cb_code":"2","cb_notice":"0","cb_title":"Apple \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 <\/span>o Apple\u793e\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c [1]<\/span>
<\/span> <\/span>o \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span>

\u25a1 \uc124\uba85<\/span>
 <\/span>o Xcode 16.3 \uc774\uc804 \ubc84\uc804\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubcf4\uc548 \ucde8\uc57d\uc810(CVE-2025-24226 \uc678 1\uac74) [2]<\/span><\/p>

<\/span> o macOS Sequoia 15.4 \uc774\uc804 \ubc84\uc804\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubcf4\uc548 \ucde8\uc57d\uc810(CVE-2025-24196 \uc678 127\uac74) [3]<\/span><\/p>

 <\/span>o macOS Sonoma 14.7.5 \uc774\uc804 \ubc84\uc804\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubcf4\uc548 \ucde8\uc57d\uc810(CVE-2025-24246 \uc678 85\uac74) [4]<\/span><\/p>

<\/span> o macOS Ventura 13.7.5 \uc774\uc804 \ubc84\uc804\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubcf4\uc548 \ucde8\uc57d\uc810(CVE-2025-24241 \uc678 79\uac74) [5]<\/span>

<\/span><\/p>

\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/span><\/p>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

Xcode<\/span><\/p><\/td>

Xcode 16.3 \ubbf8\ub9cc<\/span><\/span><\/p><\/td>

Xcode 16.3<\/span><\/span><\/p><\/td><\/tr>

macOS Sequoia<\/span><\/p><\/td>

macOS Sequoia 15.4 \ubbf8\ub9cc<\/span><\/p><\/td>

macOS Sequoia 15.4.1<\/span><\/p><\/td><\/tr>

macOS Sonoma<\/span><\/p><\/td>

macOS Sonoma 14.7.5 \ubbf8\ub9cc<\/span><\/p><\/td>

macOS Sonoma 14.7.5<\/span><\/p><\/td><\/tr>

macOS Ventura<\/span><\/p><\/td>

macOS Ventura 13.7.5 \ubbf8\ub9cc<\/span><\/p><\/td>

macOS Ventura 13.7.5<\/span><\/p><\/td><\/tr><\/tbody><\/table>

 <\/span>\u203b \ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 [1][6][7]<\/span><\/p>

 <\/span><\/p>

\u25a1 \ucc38\uace0\uc0ac\uc774\ud2b8<\/span><\/span><\/p>

[1] <\/span>https:\/\/support.apple.com\/ko-kr\/100100<\/span><\/a><\/span><\/span><\/p>

[2] <\/span>https:\/\/support.apple.com\/ko-kr\/122380<\/span><\/a><\/span><\/span><\/p>

[3] <\/span>https:\/\/support.apple.com\/ko-kr\/122373<\/span><\/a><\/span><\/p>

[4] <\/span>https:\/\/support.apple.com\/ko-kr\/122374<\/span><\/a><\/span><\/p>

[5] <\/span>https:\/\/support.apple.com\/ko-kr\/122375<\/span><\/a><\/span><\/p>

[6] <\/span>https:\/\/developer.apple.com\/kr\/support\/xcode\/<\/span><\/a><\/span><\/p>

[7] <\/span>https:\/\/support.apple.com\/ko-kr\/108382<\/span><\/a><\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-04-24 00:46:18","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"9"},{"cb_seq":"3772","cb_code":"2","cb_notice":"0","cb_title":"Mozilla \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 <\/span>o Mozilla \uc7ac\ub2e8\uc740 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c [1][2]<\/span>
<\/span> <\/span>o \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span>

\u25a1 \uc124\uba85<\/span>
 <\/span>o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc774\uba54\uc77c \uc554\ud638\ud654 \ucde8\uc57d\uc810(CVE-2025-26696) [1][2][3]<\/span>
<\/p>

 <\/span>o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc798\ubabb\ub41c \ud328\ub529 \uc0ac\uc6a9 \ucde8\uc57d\uc810(CVE-2025-26695) [1][2][4]<\/span><\/p>

 <\/span>o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 Use-After-Free \ucde8\uc57d\uc810(CVE-2025-1930, CVE-2025-1931) [1][2][5][6]<\/span><\/p>

 <\/span>o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubc94\uc704\ub97c \ubc97\uc5b4\ub09c \uc561\uc138\uc2a4 \ucde8\uc57d\uc810(CVE-2025-1932) [1][2][7]<\/span><\/p>

 o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 JIT \uc190\uc0c1 \ucde8\uc57d\uc810(CVE-2025-1933) [1][2][8]<\/span><\/p>

 <\/span>o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc608\uae30\uce58 \uc54a\uc740 GC \ubc1c\uc0dd \ucde8\uc57d\uc810(CVE-2025-1934) [1][2][9]<\/span><\/p>

 <\/span>o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ud074\ub9ad\uc7ac\ud0b9 \ucde8\uc57d\uc810(CVE-2025-1935) [1][2][10]<\/span><\/p>

 <\/span>o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucf58\ud150\uce20 \ud574\uc11d \ubcc0\uacbd \ucde8\uc57d\uc810(CVE-2025-1936) [1][2][11]<\/span><\/p>

 <\/span>o Thunderbird, Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810(CVE-2025-1937, CVE-2025-1938) [1][2][12][13]<\/span><\/p>

 <\/span>o Thunderbird\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucd08\uae30\ud654 \ub418\uc9c0 \uc54a\uc740 \uba54\ubaa8\ub9ac \uacf5\uac1c \ucde8\uc57d\uc810(CVE-2025-1942) [1][14]<\/span><\/p>

 <\/span>o Thunderbird\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810(CVE-2025-1943) [1][15]<\/span><\/p>

 <\/span>o Thunderbird ESR\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubc94\uc704\ub97c \ubc97\uc5b4\ub09c \uc4f0\uae30 \ucde8\uc57d\uc810(CVE-2024-43097) [2][16]<\/span><\/p>


<\/span><\/p>

\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2025-26696<\/span><\/p>

CVE-2025-26695<\/span><\/p>

CVE-2025-1930<\/span><\/p>

CVE-2025-1931<\/span><\/p>

CVE-2025-1932<\/span><\/p>

CVE-2025-1933<\/span><\/p>

CVE-2025-1934<\/span><\/p>

CVE-2025-1935<\/span><\/p>

CVE-2025-1936<\/span><\/p>

CVE-2025-1937<\/span><\/p>

CVE-2025-1938<\/span><\/p><\/td>

Thunderbird<\/span><\/p><\/td>

136 \ubbf8\ub9cc<\/span><\/p><\/td>

137.0.1<\/span><\/span><\/p><\/td><\/tr>

Thunderbird ESR<\/span><\/p><\/td>

128.8 \ubbf8\ub9cc<\/span><\/p><\/td>

128.8<\/span><\/p><\/td><\/tr>

CVE-2025-1942<\/span><\/p>

CVE-2025-1943<\/span><\/p><\/td>

Thunderbird<\/span><\/p><\/td>

136 \ubbf8\ub9cc<\/span><\/p><\/td>

137.0.1<\/span><\/p><\/td><\/tr>

CVE-2024-43097<\/span><\/p><\/td>

Thunderbird ESR<\/span><\/p><\/td>

128.8 \ubbf8\ub9cc<\/span><\/p><\/td>

128.8<\/span><\/p><\/td><\/tr><\/tbody><\/table>

\u203b \ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 [1][2][17]<\/span><\/p>

 <\/span><\/p>

\u25a1 \ucc38\uace0\uc0ac\uc774\ud2b8<\/span><\/span><\/p>

[1] <\/span>https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2025-17\/<\/span><\/a><\/p>

[2] <\/span>https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2025-18\/<\/span><\/a><\/span><\/p>

[3] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-26696<\/span><\/a><\/p>

[4] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-266<\/span>95<\/span><\/a><\/p>

[5] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1930<\/span><\/a><\/p>

[6] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1931<\/span><\/a><\/p>

[7] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1932<\/span><\/a><\/p>

[8] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1933<\/span><\/a><\/p>

[9] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1934<\/span><\/a><\/p>

[10] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1935<\/span><\/a><\/p>

[11] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1936<\/span><\/a><\/p>

[12] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1937<\/span><\/a><\/p>

[13] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1938<\/span><\/a><\/p>

[14] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1942<\/span><\/a><\/p>

[15] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1943<\/span><\/a><\/p>

[16] <\/span>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-43097<\/span><\/a><\/p>

[17] <\/span>https:\/\/www.thunderbird.net\/en-US\/thunderbird\/releases\/<\/span><\/a><\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-04-24 00:45:56","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"8"},{"cb_seq":"3770","cb_code":"2","cb_notice":"0","cb_title":"\uad6c\uae00 Chrome \ube0c\ub77c\uc6b0\uc800 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"<\/colgroup><\/tr><\/thead>

\u25a1 \uac1c\uc694<\/span>
 o Google \uc778\ud130\ub137 \ube0c\ub77c\uc6b0\uc800\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uacf5\uac1c<\/span>
<\/span> o \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0

\u25a1 \uc124\uba85<\/span>
 o Google Chrome \uc790\ub3d9 \ub85c\uadf8\uc778 \uae30\ub2a5\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc815\ubcf4 \uc720\ucd9c \ucde8\uc57d\uc810<\/span>
<\/span>
<\/span><\/p>

\u25a1 <\/span>\uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>


<\/p>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

Google Chrome<\/span><\/p>

(Windows)<\/span><\/p><\/td>

133 <\/span>\ubc84\uc804 \ubbf8\ub9cc<\/span><\/p><\/td>

133 <\/span>\ubc84\uc804 \uc774\uc0c1<\/span><\/p><\/td><\/tr><\/tbody><\/table>


<\/p>

<\/span>\u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1][2]<\/span><\/p>

 <\/p>

\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span><\/p>

 [1] <\/span>https:\/\/security.googleblog.com\/2024\/07\/improving-security-of-chrome-cookies-on.html<\/span><\/p>

 [2]<\/span> https:\/\/support.google.com\/chrome\/answer\/95414?sjid=7614594020571510147-AP<\/span><\/p><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2025-04-23 03:25:57","cb_use_flag":"0","cb_admin_id":"nahae95","cb_admin_name":"\uc774\ub098\ud574","cb_readcount":"7"}],"number":1260,"pagination":"1<\/strong>2<\/a>3<\/a>4<\/a>5<\/a>6<\/a>7<\/a><\/a><\/span>","total":1275,"html":"