Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 22, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
219671 7.5 危険 Novell - SUSE Studio Onsite および SUSE Studio Extension for System z で使用される KIWI における任意のコマンドを実行される脆弱性 CWE-Other
その他
CVE-2011-4195 2014-04-21 17:27 2011-12-15 Show GitHub Exploit DB Packet Storm
219672 4.3 警告 Novell - SUSE Studio Onsite および SUSE Studio Extension for System z のオーバーレイファイルタブにおけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2011-4193 2014-04-21 17:25 2011-12-15 Show GitHub Exploit DB Packet Storm
219673 7.5 危険 Novell - SUSE Studio Onsite および SUSE Studio Extension for System z で使用される KIWI における任意のコマンドを実行される脆弱性 CWE-Other
その他
CVE-2011-4192 2014-04-21 17:24 2011-12-15 Show GitHub Exploit DB Packet Storm
219674 7.5 危険 Novell - SUSE Studio Onsite および SUSE Studio Extension for System z で使用される KIWI における任意のコマンドを実行される脆弱性 CWE-Other
その他
CVE-2011-3180 2014-04-21 17:23 2011-12-15 Show GitHub Exploit DB Packet Storm
219675 2.1 注意 Novell - SUSE Lifecycle Management Server における重要な情報を取得される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2011-0993 2014-04-21 17:22 2011-04-19 Show GitHub Exploit DB Packet Storm
219676 5 警告 Eucalyptus Systems - Eucalyptus の Web サービス API におけるサービス運用妨害 (DoS) の脆弱性 CWE-20
不適切な入力確認
CVE-2013-4768 2014-04-21 15:52 2014-02-24 Show GitHub Exploit DB Packet Storm
219677 5 警告 Pivotal Software, Inc. - Pivotal Grails 用 Resources プラグインにおけるディレクトリトラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2014-2858 2014-04-21 15:40 2014-02-19 Show GitHub Exploit DB Packet Storm
219678 5 警告 Pivotal Software, Inc. - Pivotal Grails 用 Resources プラグインのデフォルト設定における重要な情報を取得される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2014-2857 2014-04-21 15:39 2014-02-19 Show GitHub Exploit DB Packet Storm
219679 5 警告 Pivotal Software, Inc. - Pivotal Grails 用 Resources プラグインのデフォルト設定における重要な情報を取得される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2014-0053 2014-04-21 15:38 2014-02-19 Show GitHub Exploit DB Packet Storm
219680 2.1 注意 Apache Software Foundation
レッドハット
- Apache Zookeeper における重要な情報を取得される脆弱性 CWE-255
証明書・パスワード管理
CVE-2014-0085 2014-04-21 15:36 2014-04-14 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 23, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
294631 - microsoft internet_explorer Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not proper… CWE-399
 Resource Management Errors
CVE-2012-4787 2024-11-21 10:43 2012-12-12 Show GitHub Exploit DB Packet Storm
294632 - microsoft windows_xp
windows_server_2008
windows_7
windows_server_2003
windows_vista
The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 201… CWE-94
Code Injection
CVE-2012-4786 2024-11-21 10:43 2012-12-12 Show GitHub Exploit DB Packet Storm
294633 - microsoft internet_explorer Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Us… CWE-399
 Resource Management Errors
CVE-2012-4782 2024-11-21 10:43 2012-12-12 Show GitHub Exploit DB Packet Storm
294634 - layton_technology helpbox Multiple SQL injection vulnerabilities in Layton Helpbox 4.4.0 allow remote attackers to execute arbitrary SQL commands via the (1) reqclass parameter to editrequestenduser.asp; the (2) sys_request_i… CWE-89
SQL Injection
CVE-2012-4971 2024-11-21 10:43 2012-12-12 Show GitHub Exploit DB Packet Storm
294635 - microsoft internet_explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Inject… CWE-94
Code Injection
CVE-2012-4781 2024-11-21 10:43 2012-12-12 Show GitHub Exploit DB Packet Storm
294636 - microsoft windows_server_2008
windows_xp
windows_7
windows_server_2003
windows_vista
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow remote attackers to execute arbitrary code via … CWE-94
Code Injection
CVE-2012-4774 2024-11-21 10:43 2012-12-12 Show GitHub Exploit DB Packet Storm
294637 - ibm informix_dynamic_server Buffer overflow in IBM Informix 11.50 through 11.50.xC9W2 and 11.70 before 11.70.xC7 allows remote authenticated users to execute arbitrary code via a crafted SQL statement. CWE-119
Incorrect Access of Indexable Resource ('Range Error') 
CVE-2012-4857 2024-11-21 10:43 2012-12-9 Show GitHub Exploit DB Packet Storm
294638 - ibm flex_system_chassis_management_module
integrated_management_module_ii
IBM Flex System Chassis Management Module (CMM) and Integrated Management Module 2 (IMM2) allow local users to obtain sensitive information about (1) local accounts, (2) SSH private keys, (3) SSL/TLS… NVD-CWE-noinfo
CVE-2012-4838 2024-11-21 10:43 2012-12-9 Show GitHub Exploit DB Packet Storm
294639 - rockwellautomation plc-5_controller
ab_micrologix_controller
slc_500_controller
Rockwell Automation Allen-Bradley MicroLogix controller 1100, 1200, 1400, and 1500; SLC 500 controller platform; and PLC-5 controller platform, when Static status is not enabled, allow remote attacke… CWE-16
Configuration
CVE-2012-4690 2024-11-21 10:43 2012-12-9 Show GitHub Exploit DB Packet Storm
294640 - postoaktraffic awam_bluetooth_reader Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key… CWE-310
Cryptographic Issues
CVE-2012-4687 2024-11-21 10:43 2012-12-9 Show GitHub Exploit DB Packet Storm