Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 18, 2026, 2:16 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
219091 7.5 危険 Novell - SUSE Studio Onsite および SUSE Studio Extension for System z で使用される KIWI における任意のコマンドを実行される脆弱性 CWE-Other
その他
CVE-2011-3180 2014-04-21 17:23 2011-12-15 Show GitHub Exploit DB Packet Storm
219092 2.1 注意 Novell - SUSE Lifecycle Management Server における重要な情報を取得される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2011-0993 2014-04-21 17:22 2011-04-19 Show GitHub Exploit DB Packet Storm
219093 5 警告 Eucalyptus Systems - Eucalyptus の Web サービス API におけるサービス運用妨害 (DoS) の脆弱性 CWE-20
不適切な入力確認
CVE-2013-4768 2014-04-21 15:52 2014-02-24 Show GitHub Exploit DB Packet Storm
219094 5 警告 Pivotal Software, Inc. - Pivotal Grails 用 Resources プラグインにおけるディレクトリトラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2014-2858 2014-04-21 15:40 2014-02-19 Show GitHub Exploit DB Packet Storm
219095 5 警告 Pivotal Software, Inc. - Pivotal Grails 用 Resources プラグインのデフォルト設定における重要な情報を取得される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2014-2857 2014-04-21 15:39 2014-02-19 Show GitHub Exploit DB Packet Storm
219096 5 警告 Pivotal Software, Inc. - Pivotal Grails 用 Resources プラグインのデフォルト設定における重要な情報を取得される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2014-0053 2014-04-21 15:38 2014-02-19 Show GitHub Exploit DB Packet Storm
219097 2.1 注意 Apache Software Foundation
レッドハット
- Apache Zookeeper における重要な情報を取得される脆弱性 CWE-255
証明書・パスワード管理
CVE-2014-0085 2014-04-21 15:36 2014-04-14 Show GitHub Exploit DB Packet Storm
219098 5.8 警告 Fedora Project
レッドハット
- libvirt の LXC ドライバにおける任意のホストデバイスを削除される脆弱性 CWE-59
リンク解釈の問題
CVE-2013-6456 2014-04-21 13:52 2013-12-17 Show GitHub Exploit DB Packet Storm
219099 4.3 警告 Advanced Packaging Tool - Advanced Package Tool の apt-pkg/acquire-item.cc における任意のパッケージをインストールされる脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2012-0214 2014-04-21 12:18 2012-03-4 Show GitHub Exploit DB Packet Storm
219100 6.9 警告 Canonical - Ubuntu 上で稼動する libpam-modules の pam_motd における権限を取得される脆弱性 CWE-Other
その他
CVE-2011-3628 2014-04-21 11:37 2011-10-24 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 18, 2026, 4:12 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
293961 - ibm cognos_business_intelligence IBM Cognos Business Intelligence (BI) 8.4 and 8.4.1 allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted request containing a zero-valued byte. CWE-189
Numeric Errors
CVE-2012-4847 2024-11-21 10:43 2012-11-14 Show GitHub Exploit DB Packet Storm
293962 - microsoft .net_framework The code-optimization feature in the reflection implementation in Microsoft .NET Framework 4 and 4.5 does not properly enforce object permissions, which allows remote attackers to execute arbitrary c… CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4777 2024-11-21 10:43 2012-11-14 Show GitHub Exploit DB Packet Storm
293963 - microsoft .net_framework The Web Proxy Auto-Discovery (WPAD) functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not validate configuration data that is returned during acquisition of proxy setting… CWE-20
 Improper Input Validation 
CVE-2012-4776 2024-11-21 10:43 2012-11-14 Show GitHub Exploit DB Packet Storm
293964 - microsoft internet_explorer Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CTreeNode Use After Free Vulnerability." CWE-399
 Resource Management Errors
CVE-2012-4775 2024-11-21 10:43 2012-11-14 Show GitHub Exploit DB Packet Storm
293965 - bestpractical rt Argument injection vulnerability in Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote attackers to create arbitrary files via unspecified vectors related to the GnuPG clie… CWE-94
Code Injection
CVE-2012-4884 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
293966 - bestpractical rt Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote attackers to conduct a "confused deputy" attack to bypass the CSRF warning protection mechanism and cause victims to "mod… CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4734 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
293967 - bestpractical rt Cross-site request forgery (CSRF) vulnerability in Request Tracker (RT) 3.8.12 and other versions before 3.8.15, and 4.0.6 and other versions before 4.0.8, allows remote attackers to hijack the authe… CWE-352
 Origin Validation Error
CVE-2012-4732 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
293968 - bestpractical rtfm FAQ manager for Request Tracker (RTFM) before 2.4.5 does not properly check user rights, which allows remote authenticated users to create arbitrary articles in arbitrary classes via unknown vectors. CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4731 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
293969 - bestpractical rt Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote authenticated users with ModifySelf or AdminUser privileges to inject arbitrary email headers and conduct phishing attack… CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4730 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
293970 - openstack image_registry_and_delivery_service_\(glance\)
essex
folsom
The v1 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to delete arbitrary non-protected images via an image deletion request, a different vulne… CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4573 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm