Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 1, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
252551 7.5 危険 IBM
Apache Software Foundation
- Apache Axis2 における任意のファイルを読まれる脆弱性 CWE-20
不適切な入力確認
CVE-2010-1632 2010-11-9 15:29 2010-06-22 Show GitHub Exploit DB Packet Storm
252552 9.3 危険 リアルネットワークス - RealNetworks RealPlayer における QCP ファイルの処理に関するヒープベースのバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2010-2578 2010-11-9 14:51 2010-10-15 Show GitHub Exploit DB Packet Storm
252553 9.3 危険 リアルネットワークス - RealNetworks RealPlayer の rjrmrpln.dll における任意のコードを実行される脆弱性 CWE-20
不適切な入力確認
CVE-2010-3750 2010-11-9 14:50 2010-10-15 Show GitHub Exploit DB Packet Storm
252554 9.3 危険 リアルネットワークス - RealNetworks RealPlayer の ActiveX コントロールにおける任意のコードを実行される脆弱性 CWE-119
バッファエラー
CVE-2010-3747 2010-11-9 14:50 2010-10-15 Show GitHub Exploit DB Packet Storm
252555 9.3 危険 リアルネットワークス - RealNetworks RealPlayer における任意のコードを実行される脆弱性 CWE-20
不適切な入力確認
CVE-2010-2998 2010-11-9 14:50 2010-10-15 Show GitHub Exploit DB Packet Storm
252556 - - Artifex Software - Ghostscript にサービス運用妨害 (DoS) の脆弱性 - - 2010-11-9 14:46 2010-10-13 Show GitHub Exploit DB Packet Storm
252557 4 警告 IBM - IBM DB2 におけるアクセス制限を回避される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2010-3475 2010-11-8 16:09 2010-08-5 Show GitHub Exploit DB Packet Storm
252558 5 警告 IBM - IBM DB2 におけるアクセス制限を回避される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2010-3474 2010-11-8 16:08 2010-04-19 Show GitHub Exploit DB Packet Storm
252559 9.3 危険 ジャストシステム - 一太郎シリーズにおける任意のコードが実行される脆弱性 CWE-noinfo
情報不足
CVE-2010-3916 2010-11-5 15:02 2010-11-4 Show GitHub Exploit DB Packet Storm
252560 9.3 危険 ジャストシステム - 一太郎シリーズにおける任意のコードが実行される脆弱性 CWE-noinfo
情報不足
CVE-2010-3915 2010-11-5 15:01 2010-11-4 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 2, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
308851 9.9 CRITICAL
Network
- - The WP Easy Gallery – WordPress Gallery Plugin plugin for WordPress is vulnerable to SQL Injection via the 'edit_imageId' and 'edit_imageDelete' parameters in all versions up to, and including, 4.8.5… CWE-89
SQL Injection
CVE-2024-8436 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308852 6.4 MEDIUM
Network
- - The Radio Player – Live Shoutcast, Icecast and Any Audio Stream Player for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'align' attribute within the 'wp:radio-p… CWE-79
Cross-site Scripting
CVE-2024-8267 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308853 - - - Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as… - CVE-2024-46936 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308854 - - - IceCMS v3.4.7 and before was discovered to contain a hardcoded JWT key, allowing an attacker to forge JWT authentication information. - CVE-2024-46612 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308855 - - - Incorrect access control in IceCMS v3.4.7 and before allows attackers to authenticate by entering any arbitrary values as the username and password via the loginAdmin method in the UserController.jav… - CVE-2024-46607 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308856 - - - Cursor is an artificial intelligence code editor. Prior to version 0.41.0, if a user on macOS has granted Cursor access to the camera or microphone, any program that is run on the machine is able to … CWE-277
 Insecure Inherited Permissions
CVE-2024-45599 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308857 - - - An Incorrect Access Control vulnerability was found in /music/ajax.php?action=delete_playlist in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to delet… - CVE-2024-42797 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308858 - - - Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point man… - CVE-2024-42507 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308859 - - - Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point man… - CVE-2024-42506 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm
308860 - - - Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point man… - CVE-2024-42505 2024-09-26 22:32 2024-09-25 Show GitHub Exploit DB Packet Storm