Font Size Change

HOMEIT SecurityMeasures for Information Security VulnerabilitiesQuarterly ReportsVulnerability Countermeasure Information Database JVN iPedia Registration Status [2017 2nd Quarter (Apr. - Jun.)]

PRINT PAGE

IT Security

Vulnerability Countermeasure Information Database JVN iPedia Registration Status [2017 2nd Quarter (Apr. - Jun.)]

Augst 28, 2017
IT Security Center

1. 2017 2nd Quarter: Vulnerability Countermeasure Information Database JVN iPedia Registration Status

The vulnerability countermeasure information database JVN iPedia (http://jvndb.jvn.jp/en/) is endeavoring to become a comprehensive database where vulnerability information about software used in Japan is aggregated for IT users to easily access vulnerability information. JVN iPedia collects and/or translates the vulnerability information published by 1) domestic software developers, 2) JVN (*1), a vulnerability information portal run by JPCERT/CC and IPA, and 3) NVD (*2), a vulnerability database run by NIST (*3). JVN iPedia has continued to make the vulnerability information available to the public since April 25, 2007.


1-1. Vulnerabilities Registered in 2017/2Q

~ JVN iPedia now stores 70,996 vulnerabilities ~

The summary of the vulnerability information registered to the Japanese version of JVN iPedia during the 2nd quarter of 2017 (April 1 to June 30, 2017) is shown in the table below. As of the end of June 2017, the total number of vulnerabilities stored in JVN iPedia is 70,996 (Table 1-1, Figure 1-1). Since the start of 2017, the number of vulnerabilities published by NVD has been on the rise. It was 2,687 last quarter, and 3,511 this quarter, increasing yet again.

As for the English version, the total of 1,728 vulnerabilities are available as shown in the lower half of the table.


Table 1-1. Registered Vulnerabilities in 2nd Quarter of 2017
  Information Source Registered Cases Cumulative Cases
Japanese Version Domestic Product Developers 3 cases 183 cases
JVN 310 cases 7,470 cases
NVD 3,198 cases 63,343 cases
Total 3,511 cases 70,996 cases
English Version Domestic Product Developers 3 cases 183 cases
JVN 89 cases 1,545 cases
Total 92 cases 1,728 cases

1-2. Hot Topic #1: WordPress Pug-in Vulnerabilities

~ More than eighty percent were serious enough to possibly result in service outage ~

In June 2017, several Japanese websites using a WordPress plug-in (*4) "WP Job Manager" were hacked by attackers who exploited a vulnerability in the plug-in. The vulnerability allowed attackers to upload image files without logging into the websites, resulting in website defacement. Since the similar incidents seemed imminent, IPA issued an emergency security alert (*5) for the plug-in users.

Table 1-2 is a list of WordPress plug-in vulnerabilities registered to JVN iPedia this quarter.

Table 1-2. WordPress Plug-in Vulnerabilities Registered to JVN iPedia from April 2017 to June 2017
NoJVNDB-IDTitleCVSSv2
Base Score
CWE
1 JVNDB-2015-007553 WordPress Plug-in "Aviary Image Editor Add-on For Gravity Forms" arbitrary code injection vulnerability (in Japanese only) 7.5 CWE-434
2 JVNDB-2017-002629 WordPress Plug-in "Spider Event Calendar" SQL injection vulnerability (in Japanese only) 7.5 CWE-89
3 JVNDB-2017-000115 WordPress plugin "Multi Feed Reader" SQL injection vulnerability 6.5 CWE-89
4 JVNDB-2017-004276 WordPress Plug-in "WP-Testimonials" SQL injection vulnerability (in Japanese only) 6.5 CWE-89
5 JVNDB-2017-004277 WordPress Plug-in "Event List" SQL injection vulnerability (in Japanese only) 6.5 CWE-89
6 JVNDB-2017-004278 WordPress Plug-in "WP Jobs" SQL injection vulnerability (in Japanese only) 6.5 CWE-89
7 JVNDB-2015-007554 WordPress Plug-in "Image Export" absolute path traversal vulnerability (in Japanese only) 6.4 CWE-22
8 JVNDB-2015-007539 Open redirect vulnerability in the proxyimages function in wowproxy.php in WordPress Plug-in "Wow Moodboard Lite" (in Japanese only) 5.8 CWE-601
9 JVNDB-2017-002812 WordPress Plug-in "WHIZZ" cross-site request forgery vulnerability (in Japanese only) 5.8 CWE-352
10 JVNDB-2015-007548 WordPress Plug-in "Zip Attachments" directory traversal vulnerability (in Japanese only) 8.0 CWE-22
11 JVNDB-2015-007549 WordPress Plug-in "WP e-Commerce Shop Styling" directory traversal vulnerability (in Japanese only) 5.0 CWE-22
12 JVNDB-2015-007550 WordPress Plug-in "MDC YouTube Downloader" absolute path traversal vulnerability (in Japanese only) 5.0 CWE-22
13 JVNDB-2015-007555 upload.php in WordPress Plug-in "Powerplay Gallery" allows to create arbitrary directories (in Japanese only) 5.0 CWE-264
14 JVNDB-2017-000067 WordPress Plug-in "WP Statistics" cross-site scripting vulnerability 5.0 CWE-79
15 JVNDB-2017-000068 WordPress Plug-in "WP Statistics" cross-site scripting vulnerability 5.0 CWE-79
16 JVNDB-2017-000073 WordPress Plug-in "Booking Calendar" directory traversal vulnerability 5.0 CWE-22
17 JVNDB-2017-000074 WordPress Plug-in "Booking Calendar" cross-site scripting vulnerability 5.0 CWE-79
18 JVNDB-2017-000092 WordPress Plug-in "WP Booking System" cross-site scripting vulnerability 5.0 CWE-79
19 JVNDB-2017-000139 WordPress plugin "WP Job Manager" fails to restrict access permissions 5.0 CWE-264
20 JVNDB-2014-008308 WordPress Plug-in "Backup to Dropbox" cross-site scripting vulnerability (in Japanese only) 4.3 CWE-79
21 JVNDB-2015-007538 Cross-site scripting vulnerability in phpWhois used in WordPress Plug-in "AdSense Click Fraud Monitoring" (in Japanese only) 4.3 CWE-79
22 JVNDB-2016-008453 WordPress Plug-in "Clean Login" cross-site request forgery vulnerability (in Japanese only) 4.3 CWE-352
23 JVNDB-2017-000127 WordPress Plug-in "WordPress Download Manager" cross-site scripting vulnerability 4.3 CWE-79
24 JVNDB-2017-002813 WordPress Plug-in "CopySafe Web Protection" cross-site request forgery vulnerability (in Japanese only) 4.3 CWE-352
25 JVNDB-2017-003315 WordPress Plug-in "Easy WP SMTP" cross-site scripting vulnerability (in Japanese only) 4.3 CWE-79
26 JVNDB-2017-003980 WordPress Plug-in "Spiffy Calendar" cross-site scripting vulnerability (in Japanese only) 4.3 CWE-79
27 JVNDB-2017-004500 Reflected cross-site scripting vulnerability in sendtesterror.php in WordPress Plug-in "Raygun4WP" (in Japanese only) 4.3 CWE-79
28 JVNDB-2017-004557 WordPress Plug-in "Webhammer WP Custom Fields Search" cross-site scripting vulnerability (in Japanese only) 4.3 CWE-79
29 JVNDB-2017-004589 WordPress Plug-in "WP Editor.MD" stored cross-site scripting vulnerability (in Japanese only) 4.3 CWE-79
30 JVNDB-2017-004590 WordPress Plug-in "Markdown on Save Improved" stored cross-site scripting vulnerability (in Japanese only) 4.3 CWE-79
31 JVNDB-2017-000062 WordPress Plug-in "WP Statistics" cross-site scripting vulnerability 2.6 CWE-79
32 JVNDB-2017-000093 WordPress Plug-in "MaxButtons" cross-site scripting vulnerability 2.6 CWE-79
33 JVNDB-2017-000094 Multiple BestWebSoft WordPress plugins vulnerable to cross-site scripting 2.6 CWE-79
34 JVNDB-2017-000103 WordPress Plug-in "WP Live Chat Support" cross-site scripting vulnerability 2.6 CWE-79
35 JVNDB-2017-000128 WordPress Plug-in "WordPress Download Manager" open redirect vulnerability 2.6 CWE-20
36 JVNDB-2017-000132 WordPress Plug-in "WP-Members" cross-site scripting vulnerability 2.6 CWE-79
37 JVNDB-2017-000140 WordPress Plug-in "Event Calendar WD" cross-site scripting vulnerability 2.6 CWE-79

There were 37 vulnerabilities including JVNDB-2017-000139, for which IPA issued an above-mentioned security alert, and the severity of more than 8 present (30 vulnerabilities) were higher than Level II (CVSSv2 score 4.0 - 6.9). The severity means those vulnerabilities are serious enough to possibly result in service outage.

Figure 1-2 is a pie chart of CWEs appeared in Table 1-2 above.

As shown in the chart, cross-site scripting (CWE-79) accounts for 51.4 percent, followed by SQL injection (CWE-89) and path traversal (CWE-22) for 13.5 percent. SQL injection vulnerability, for example, could allow attackers to do malicious things including data modification, theft and/or leak.

WordPress vulnerabilities lie not only in the WordPress itself but also in its plug-ins and could just as well cause serious security incidents. The system operators and administrators who are responsible for systems using a content management system (CMS), such as WordPress, need to watch out for updates for the CMS software itself as well as for its plug-ins.

IPA issues emergency security alerts for vulnerabilities in widely-used software as necessary. The alerts can be received as soon as they are issued through the service called “icat for JSON (*6). System operators and administrators can check out those information services to help facilitate their mission to mitigate vulnerabilities.


1-3. Hot Topic #2: DLL Hijacking Vulnerabilities

~ Twenty-nine vulnerabilities reported this quarter – the highest number in the last three years ~

Through the Information Security Early Warning Partnership (*7), many DLL (*8) hijacking vulnerabilities were reported to IPA and registered to JVN iPedia this quarter. DLL hijacking is that when an application like installer or self-extracting archive is executed, the application loads a DLL file placed in the same directory as the application in preference to a legitimate DLL file located in the Window’s system directory. Some malware are observed to exploit such behavior of vulnerable applications to spread the infection (*9).

Figure 1-3 shows the quarterly changed in the number of DLL hijacking vulnerabilities registered to JVN iPedia from the 3rd quarter of 2014 to this quarter. The easiness to spot this vulnerability may have contributed to the sudden increase of the vulnerability reports.

Table 1-3 is a list of some DLL hijacking vulnerabilities registered to JVN iPedia this quarter. The severity of them are relatively high (CVSSv2 base score 6.8 falls under the severity level II), which means the effect of successful attacks could be potentially large.

Table 1-3. Some of DLL Hijacking Vulnerabilities Registered to JVN iPedia
NoJVNDB-ID
(CVE)
TitleCVSSv2
Base Score
Date
PublicCWE
1 JVNDB-2017-000153
(CVE-2017-2233)
Installer of PDF Digital Signature Plugin provided by the Ministry of Justice may insecurely load Dynamic Link Libraries 6.8 2017/6/30
2 JVNDB-2017-000145
(CVE-2017-2226)
Installer of Setup file of advance preparation for e-Tax software (WEB version) may insecurely load Dynamic Link Libraries 6.8 2017/6/28
3 JVNDB-2017-000102
(CVE-2017-2177)
Installer of the Ministry of Justice [The electronic authentication system based on the commercial registration system "The CRCA user's Software"] may insecurely load Dynamic Link Libraries 6.8 2017/5/26
4 JVNDB-2017-000101
(CVE-2017-2176)
Installers of the screensavers provided by JAPAN AIR SELF DEFENSE FORCE, MINISTRY OF DEFENSE may insecurely load Dynamic Link Libraries 6.8 2017/5/25
5 JVNDB-2017-000076
(CVE-2017-2154)
Multiple JustSystems products including Hanako may insecurely load Dynamic Link Libraries 6.8 2017/4/20
6 JVNDB-2017-000069
(CVE-2017-2149)
Multiple installers of Toshiba memory card related software may insecurely load Dynamic Link Libraries 6.8 2017/4/14

Developers of installer builders and file compression/extraction tools, installers and self-extracting archives should take the following measures (*10) to protect users. Likewise, application users should take the following measures when executing an installer or self-extracting archive.

Installer builder and file compression/extraction tool developers

Make sure your software and/or tools contain no DLL hijack vulnerability.

Installer and self-extracting archive developers

When you find vulnerability information on the installer builders or file compression/extraction tool you are using, update it to the fixed version. Also, when you modify command execution, make sure that the commands in the legitimate and intended directory are executed.

Application users

Before executing an installer or self-extracting archive, make sure that there are no suspicious file in the same directory as the installer or self-extracting archive, or create a new directory and copy the installer or self-extracting archive there for execution. It is also strongly recommended that you do not execute an application downloaded from the Internet in the download directory. If you execute the installer or self-extracting archive in the download directory where a maliciously-crafted DLL file has been placed at some point in time, the installer or self-extracting archive may load the malicious-crafted DLL file when it is executed.

2. Details on JVN iPedia Registered Data

2-1. Types of Vulnerabilities Reported

Figure 2-1 shows the number of vulnerabilities newly added to JVN iPedia during the 2nd quarter of 2017, sorted by the CWE vulnerability types.

The type of the vulnerabilities reported most in the 2nd quarter is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) with 559 cases, followed by CWE-284 (Improper Access Control) with 364 cases, CWE-264 (Permissions, Privileges and Access Controls with 316, CWE-200 (Information Exposure) with 302, CWE-79 Cross-Site Scripting) with 289. CWE-119, the most reported vulnerability type this quarter, could allow attackers to execute arbitrary code on affected servers/PCs, causing various undesirable consequences, such as unauthorized access to and/or modification of data.

Software developers need to make sure to implement necessary security measures from the planning and design phase of software development to mitigate vulnerability. IPA provides tools and guidelines, such as "How to Secure Your Website" (*11) and "Secure Programing Guide" (*12) and "AppGoat" (*13), a hands-on venerability learning tool, for website developers and operators to build secure websites.

2-2. Severity of Vulnerabilities Reported

Figure 2-2 shows the yearly change in the severity (CVSSv2) of vulnerabilities registered to JVN iPedia based on the year they were first published.

As of June 2017, 39.1 percent are level III ("High", CVSS Base Score = 7.0-10.0), 53.2 percent are level ll ("Medium", CVSS Base Score = 4.0-6.9), and 7.7 percent are level I ("Low", CVSS Base Score = 0.0-3.9). This means 92.3 percent of all vulnerabilities reported are level II or higher, which are potentially critical enough to cause damage like information exposure or data modification.

To mitigate threats imposed by the known vulnerabilities, it is essential for users to update software to the latest version or apply security patches as soon as possible when they become available.

In addition to a CVSSv2 severity score, JVN iPedia has started a pilot to provide a CVSSv3 (*14) severity score since December 1, 2015 (*15).

2-3. Types of Software Reported with Vulnerability

Figure 2-3 shows the yearly change in the type of software reported with vulnerability. Application vulnerabilities have been published most, accounting for 73.3 percent of the 2017 total.

Since 2007, vulnerability in industrial control systems (ICS) used in critical infrastructure sectors has started to be added to JVN iPedia. As of the 2nd quarter of 2017, the total of 1,091 ICS vulnerabilities have been registered (Figure 2-4).

2-4. Products Reported with Vulnerability

Table 2-1 lists the top 20 software whose vulnerabilities were most registered to JVN iPedia during the 2nd quarter (April to June) of 2017. Ranked 1st is ImageMagick, an image processing software, with 151 vulnerabilities. The background being that NVD has published its vulnerabilities in bulk including those found before 2017 and not that a lot of ImageMagick vulnerabilities have been found this quarter. Many operating systems made the top 20 list. As seen in Table 2-1, popular vendors’ software, such as Microsoft's and Apple's, are ranked in.

Besides those in the top 20 list, JVN iPedia stores vulnerabilities about a variety of software used in business and at home in Japan. IPA hopes software developers and users will make use of JVN iPedia to efficiently check vulnerability information about the software they are using and take necessary action in a timely manner (*16).


Table 2-4. Top 20 Software Products Vulnerabilities Were Most Registered [Apr. 2017 – Jun.2017]
RankCategoryProduct Name (Vendor) Number of
Vulnerabilities
Registered
1 Image Processing ImageMagick (ImageMagick) 151
2 OS iOS (Apple) 136
3 OS Linux Kernel (kernel.org) 135
4 OS Android (Google) 118
5 OS Microsoft Windows 10 (Microsoft) 103
5 OS Microsoft Windows Server 2016 (Microsoft) 103
7 OS Microsoft Windows Server 2012 (Microsoft) 102
8 OS Apple Mac OS X (Apple) 101
9 OS Microsoft Windows 8.1 (Microsoft) 96
10 OS Microsoft Windows Server 2008 (Microsoft) 90
11 OS tvOS (Apple) 89
12 OS Microsoft Windows 7 (Microsoft) 82
13 OS Microsoft Windows RT 8.1 (Microsoft) 78
14 Browser Safari (Apple) 70
15 OS watchOS (Apple) 53
16 Image Processing AutoTrace (AutoTrace project) 50
17 PDF Viewer Adobe Reader (Adobe Systems) 49
17 PDF Viewer/Editor Adobe Acrobat (Adobe Systems) 49
19 OS openSUSE Leap (openSUSE project) 43
20 Browser Microsoft Edge (Microsoft) 38

3. Most Accessed Vulnerability Countermeasure Information

Table 3-1 lists the top 20 most accessed vulnerability information in JVN iPedia during the 2nd quarter of 2017 (April – June).

An improper access control vulnerability in Intel Active Management Technology was ranked 1st and became a hot topic since the vulnerability could affect a large number of organizations if the technology was used on their servers, making system administrators scrambled to respond.


Table 3-1. Top 20 Most Accessed Vulnerability Countermeasure Information in JVN iPedia [Apr. 2017 – Jun. 2017]
NoIDTitleCVSSv2
Base
Score
Date
Public
Access
Count
1 JVNDB-2017-002923 Intel Active Management Technology (AMT) improper access control vulnerability (in Japanese only) 10.0 2017/5/9 7,767
2 JVNDB-2017-000069 Multiple installers of Toshiba memory card related software may insecurely load Dynamic Link Libraries 6.8 2017/4/14 4,299
3 JVNDB-2017-000054 ASSETBASE vulnerable to cross-site scripting 2.6 2017/4/11 4,095
4 JVNDB-2017-000070 WN-AC1167GR vulnerable to cross-site scripting 1.4 2017/4/14 3,980
5 JVNDB-2016-004511 DES and Triple DES encryption algorithm used in cryptographic protocols like TLS vulnerable to birthday attacks (in Japanese only) 5.0 2016/9/2 3,977
6 JVNDB-2017-000058 Tablacus Explorer vulnerable to script injection 6.8 2017/4/7 3,961
7 JVNDB-2017-000072 WNC01WH vulnerable to OS command injection 5.2 2017/4/21 3,893
8 JVNDB-2017-002402 Microsoft OLE URL Moniker improperly handles remotely-linked HTA data (aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API") (in Japanese only) 9.3 2017/4/13 3,811
9 JVNDB-2017-000068 WordPress plugin "WP Statistics" vulnerable to cross-site scripting 5.0 2017/4/13 3,520
10 JVNDB-2017-000055 NETGEAR ProSAFE Plus Configuration Utility vulnerable to improper access control 2.9 2017/4/18 3,408
11 JVNDB-2017-000074 WordPress plugin "Booking Calendar" vulnerable to cross-site scripting 5.0 2017/4/20 3,398
12 JVNDB-2017-000044 CentreCOM AR260S V2 vulnerable to privilege escalation 5.2 2017/3/30 3,355
13 JVNDB-2017-000076 Multiple JustSystems products including Hanako may insecurely load Dynamic Link Libraries 6.8 2017/4/20 3,338
14 JVNDB-2017-000060 WN-G300R3 vulnerable to stack based buffer overflow 5.8 2017/4/10 3,276
15 JVNDB-2017-000077 Installer of Vivaldi for Windows may insecurely load executable files 6.8 2017/4/25 3,258
16 JVNDB-2017-000059 WN-G300R3 vulnerable to OS command injection 5.2 2017/4/10 3,254
17 JVNDB-2017-000066 The API in Cybozu Office vulnerable to denial-of-service (DoS) 7.8 2017/4/11 3,224
18 JVNDB-2017-000065 Cybozu Office fails to restrict access permission in the templates delete function in "customapp" 5.5 2017/4/11 3,200
19 JVNDB-2017-000075 Hoozin Viewer vulnerable to buffer overflow 5.1 2017/4/20 3,187
20 JVNDB-2017-000050 WordPress plugin "YOP Poll" vulnerable to cross-site scripting 4.0 2017/3/23 3,179

Table 3-2 lists the top 5 most accessed vulnerability information among those reported by domestic product developers. If using vulnerable software, system administrators should apply security patches or update their system as soon as possible to prevent damage.


Table 3-2. Top 5 Most Accessed Vulnerabilities Reported by Domestic Developers [Apr. 2017 - Jun. 2017]
NoIDTitleCVSSv2
Base
Score
Date
Public
Access
Count
1 JVNDB-2016-006450 Vulnerability in JP1/Cm2/Network Node Manager i 4.3 2017/1/4 2,731
2 JVNDB-2017-002225 Cross-site Scripting Vulnerability in multiple Hitachi products 4.3 2017/4/5 788
3 JVNDB-2017-003108 Multiple Vulnerabilities in Hitachi IT Operations Director and JP1/IT Desktop Management 7.5 2017/5/16 657
4 JVNDB-2011-001632 Arbitrary Data Insertion Vulnerability in Hitachi Web Server SSL/TLS Protocol 4.3 2011/5/26 254
5 JVNDB-2007-001022 Apache UTF-7 Encoding Cross-Site Scripting Vulnerability 4.3 2007/12/25 245

Note 1) Color Code for CVSS Base Score and Severity Level

CVSS Base Score = 0.0~3.9
Severity Level = I (Low)
CVSS Base Score = 4.0~6.9
Severity Level = II (Medium)
CVSS Base Score = 7.0~10.0
Severity Level = III (High)

Note 2) Color Code for Published Date

Published in 2015 and before Published in 2016 Published in 2017

Footnotes

(*1) Japan Vulnerability Notes: A portal for vulnerability countermeasure information including information on vendor response to the reported vulnerabilities and security support. Operated in the collaboration of IPA and JPCERT/CC.
https://jvn.jp/en/

(*2) National Vulnerability Database: A vulnerability database operated by NIST.
http://nvd.nist.gov/home.cfm

(*3) National Institute of Standards and Technology: A U.S federal agency that develops and promotes measurement, standards and technology.
http://www.nist.gov/

(*4) Plug-in: a software component that adds a specific feature to an existing software.

(*5) JVN#56787058: Improper Access Control Vulnerability in WordPress Plug-In "WP Job Manager"
https://www.ipa.go.jp/security/ciadr/vul/20170615-jvn.html (in Japanese only)

(*6) A security information service that displays IPA security alerts in one’s website in real-time. Used by more than 1,000 websites including companies, government agencies and educational institutions.
https://www.ipa.go.jp/security/vuln/icat.html (in Japanese only)

(*7) Information Security Early Warning Partnership Guideline
https://www.ipa.go.jp/security/ciadr/partnership_guide.html (in Japanese only)

(*8) DLL: an executable file that contains specific code and/or data that can be shared by many programs.

(*9) RedLeaves: Malware Built on Open Source RAT (2017-04-03)
https://www.jpcert.or.jp/magazine/acreport-redleaves.html (in Japanese only)

(*10) JVNTA#91240916: DLL Hijacking and Command Execution Vulnerability in Windows Applications
https://jvn.jp/ta/JVNTA91240916/ (in Japanese only)

(*11) How to Secure Your Websites
https://www.ipa.go.jp/security/vuln/websecurity.html (latest version in Japanese only )

(*12) Secure Programing Guide
https://www.ipa.go.jp/security/awareness/vendor/programming/ (in Japanese only)

(*13) AppGoat
https://www.ipa.go.jp/security/vuln/appgoat/ (in Japanese only)

(*14) CVSSv3: An open framework for assessing the severity of vulnerabilities. With v3, evolution of technology, such as the prevalence of virtualization and sandbox technology, have been considered and introduced.
https://www.first.org/cvss/specification-document
https://www.ipa.go.jp/security/vuln/CVSSv3.html (in Japanese only)

(*15) IPA has started to add CVSSv3 score to JVN iPedia
https://www.ipa.go.jp/security/vuln/SeverityLevel3.html (in Japanese only)

(*16) IPA Technical Watch - Daily Practice Guide: Tips on Vulnerability Management
The guide gives tips on how to efficiently and efficiently collect and leverage vulnerability information.
https://www.ipa.go.jp/security/technicalwatch/20150331.html (in Japanese only)

Past Quarterly Reports

Contact

IT Security Center,
Information-technology Promotion Agency, Japan (ISEC/IPA)