Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":Feb. 9, 2026, 12:59 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
251771 4.3 警告 オラクル - Oracle Application Server の J2EE コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0070 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
251772 5 警告 オラクル - Oracle Application Server の J2EE コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0067 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
251773 5 警告 オラクル - Oracle Application Server の Access Manager Identity Server コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0066 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
251774 7.8 危険 サイバートラスト株式会社
Linux
レッドハット
- Linux kernel の e1000_clean_rx_irq 関数における整数アンダーフローの脆弱性 CWE-189
数値処理の問題
CVE-2009-1385 2010-02-15 11:03 2009-06-4 Show GitHub Exploit DB Packet Storm
251775 4.6 警告 サイバートラスト株式会社
Todd C. Miller
- sudo の Perl スクリプト実行時における権限昇格の脆弱性 - CVE-2005-4158 2010-02-15 11:03 2005-11-8 Show GitHub Exploit DB Packet Storm
251776 1 注意 オラクル - Oracle Database および Oracle Application Server の Unzip コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3412 2010-02-12 12:22 2010-01-12 Show GitHub Exploit DB Packet Storm
251777 3.2 注意 オラクル - Oracle Database の Oracle Spatial コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3413 2010-02-12 12:22 2010-01-12 Show GitHub Exploit DB Packet Storm
251778 3.6 注意 オラクル - Oracle Database の RDBMS コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3410 2010-02-12 12:21 2010-01-12 Show GitHub Exploit DB Packet Storm
251779 4 警告 オラクル - Oracle Database の Logical Standby コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-1996 2010-02-12 12:21 2010-01-12 Show GitHub Exploit DB Packet Storm
251780 4.9 警告 オラクル - Oracle Database の Oracle Spatial コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3414 2010-02-12 12:21 2010-01-12 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:April 19, 2026, 4:09 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1471 7.5 HIGH
Network
dlink di-8100_firmware
di-8100g_firmware
di-8004w_firmware
di-8003g_firmware
di-8003_firmware
di-8500_firmware
di-8200g_firmware
di-8200_firmware
di-8400_firmware
D-Link DI-8003 v16.07.26A1, DI-8500 v16.07.26A1; DI-8003G v17.12.21A1, DI-8200G v17.12.20A1, DI-8200 v16.07.26A1, DI-8400 v16.07.26A1, DI-8004w v16.07.26A1, DI-8100 v16.07.26A1, and DI-8100G v17.12.2… CWE-120
Classic Buffer Overflow
CVE-2025-52222 2026-04-15 00:45 2026-04-9 Show GitHub Exploit DB Packet Storm
1472 6.1 MEDIUM
Network
homarr homarr Homarr is an open-source dashboard. Prior to version 1.43.3, stored XSS vulnerability exists, allowing the execution of arbitrary JavaScript in a user's browser, with minimal or no user interaction r… CWE-20
CWE-434
 Improper Input Validation 
 Unrestricted Upload of File with Dangerous Type 
CVE-2025-64759 2026-04-15 00:42 2025-11-20 Show GitHub Exploit DB Packet Storm
1473 5.4 MEDIUM
Network
checkmk checkmk Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows an atta… CWE-79
Cross-site Scripting
CVE-2026-3466 2026-04-15 00:39 2026-04-7 Show GitHub Exploit DB Packet Storm
1474 7.5 HIGH
Network
mozilla rhino Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the to… CWE-400
 Uncontrolled Resource Consumption
CVE-2025-66453 2026-04-15 00:39 2025-12-4 Show GitHub Exploit DB Packet Storm
1475 7.3 HIGH
Local
checkmk checkmk Local privilege escalation in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows a site user to escalate their privilege… CWE-426
CWE-829
 Untrusted Search Path
 Inclusion of Functionality from Untrusted Control Sphere
CVE-2025-39666 2026-04-15 00:39 2026-04-7 Show GitHub Exploit DB Packet Storm
1476 5.3 MEDIUM
Network
wwbn avideo WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/CloneSite/client.log.php endpoint serves the clone operation log file without any authentication. Every other endp… CWE-200
Information Exposure
CVE-2026-35452 2026-04-15 00:37 2026-04-7 Show GitHub Exploit DB Packet Storm
1477 5.3 MEDIUM
Network
wwbn avideo WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/API/check.ffmpeg.json.php endpoint probes the FFmpeg remote server configuration and returns connectivity status w… CWE-306
Missing Authentication for Critical Function
CVE-2026-35450 2026-04-15 00:37 2026-04-7 Show GitHub Exploit DB Packet Storm
1478 7.2 HIGH
Network
chyrplite chyrp_lite Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path traversal vulnerability exists in the administration console that allows an administrator or a user with Change Settings p… CWE-22
CWE-73
CWE-434
Path Traversal
 External Control of File Name or Path
 Unrestricted Upload of File with Dangerous Type 
CVE-2026-35174 2026-04-15 00:37 2026-04-7 Show GitHub Exploit DB Packet Storm
1479 6.5 MEDIUM
Network
chyrplite chyrp_lite Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, an IDOR / Mass Assignment issue exists in the Post model that allows authenticated users with post editing permissions (Edit Post… CWE-639
CWE-914
 Authorization Bypass Through User-Controlled Key
 Improper Control of Dynamically-Identified Variables
CVE-2026-35173 2026-04-15 00:36 2026-04-7 Show GitHub Exploit DB Packet Storm
1480 9.8 CRITICAL
Network
linuxfoundation kedro Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without… CWE-94
CWE-502
Code Injection
 Deserialization of Untrusted Data
CVE-2026-35171 2026-04-15 00:36 2026-04-7 Show GitHub Exploit DB Packet Storm