Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 2, 2026, 4 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
253031 4.6 警告 レッドハット - LVM2 のクラスタ論理ボリュームマネージャデーモンにおけるサービス運用妨害 (DoS) の脆弱性 CWE-287
不適切な認証
CVE-2010-2526 2010-08-24 18:42 2010-07-28 Show GitHub Exploit DB Packet Storm
253032 9.3 危険 シマンテック
IBM
- Autonomy KeyView の WordPerfect 5.x reader (wosr.dll) におけるヒープベースのバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2010-0135 2010-08-24 18:42 2010-08-4 Show GitHub Exploit DB Packet Storm
253033 9.3 危険 シマンテック
IBM
- Autonomy KeyView の library におけるヒープベースのバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2010-0126 2010-08-24 18:41 2010-08-4 Show GitHub Exploit DB Packet Storm
253034 9.3 危険 シマンテック
IBM
- Lotus 1-2-3 reader (wkssr.dll) の SpreadSheet における任意のコードを実行される脆弱性 CWE-119
バッファエラー
CVE-2010-1524 2010-08-24 18:41 2010-08-4 Show GitHub Exploit DB Packet Storm
253035 9.3 危険 シマンテック
IBM
- Lotus 1-2-3 reader (wkssr.dll) の SpreadSheet における任意のコードを実行される脆弱性 CWE-189
数値処理の問題
CVE-2010-1525 2010-08-24 18:41 2010-08-4 Show GitHub Exploit DB Packet Storm
253036 9.3 危険 シマンテック
IBM
- Lotus 1-2-3 reader (wkssr.dll) の SpreadSheet におけるスタックベースのバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2010-0133 2010-08-24 18:40 2010-08-4 Show GitHub Exploit DB Packet Storm
253037 9.3 危険 シマンテック
IBM
- Lotus 1-2-3 reader (wkssr.dll) の SpreadSheet におけるスタックベースのバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2010-0131 2010-08-24 18:40 2010-08-4 Show GitHub Exploit DB Packet Storm
253038 4.3 警告 サイバートラスト株式会社
LibTIFF
レッドハット
- x86_64 プラットフォーム上で稼動する RHEL の LibTIFF におけるサービス運用妨害 (DoS) の脆弱性 CWE-20
不適切な入力確認
CVE-2010-2598 2010-08-24 13:44 2010-07-8 Show GitHub Exploit DB Packet Storm
253039 6.8 警告 アップル
サイバートラスト株式会社
LibTIFF
レッドハット
- LibTIFF の FAX3 デコーダの Fax3SetupState 関数における整数オーバーフローの脆弱性 CWE-189
数値処理の問題
CVE-2010-1411 2010-08-24 13:44 2010-06-10 Show GitHub Exploit DB Packet Storm
253040 2.6 注意 アップル - Apple Safari の AutoFill 機能におけるアドレスブックカードの情報を取得される脆弱性 CWE-200
情報漏えい
CVE-2010-1796 2010-08-20 18:24 2010-07-30 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 2, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
290271 - ibm cognos_business_intelligence IBM Cognos Business Intelligence (BI) 8.4 and 8.4.1 allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted request containing a zero-valued byte. CWE-189
Numeric Errors
CVE-2012-4847 2024-11-21 10:43 2012-11-14 Show GitHub Exploit DB Packet Storm
290272 - microsoft .net_framework The code-optimization feature in the reflection implementation in Microsoft .NET Framework 4 and 4.5 does not properly enforce object permissions, which allows remote attackers to execute arbitrary c… CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4777 2024-11-21 10:43 2012-11-14 Show GitHub Exploit DB Packet Storm
290273 - microsoft .net_framework The Web Proxy Auto-Discovery (WPAD) functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not validate configuration data that is returned during acquisition of proxy setting… CWE-20
 Improper Input Validation 
CVE-2012-4776 2024-11-21 10:43 2012-11-14 Show GitHub Exploit DB Packet Storm
290274 - microsoft internet_explorer Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CTreeNode Use After Free Vulnerability." CWE-399
 Resource Management Errors
CVE-2012-4775 2024-11-21 10:43 2012-11-14 Show GitHub Exploit DB Packet Storm
290275 - bestpractical rt Argument injection vulnerability in Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote attackers to create arbitrary files via unspecified vectors related to the GnuPG clie… CWE-94
Code Injection
CVE-2012-4884 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
290276 - bestpractical rt Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote attackers to conduct a "confused deputy" attack to bypass the CSRF warning protection mechanism and cause victims to "mod… CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4734 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
290277 - bestpractical rt Cross-site request forgery (CSRF) vulnerability in Request Tracker (RT) 3.8.12 and other versions before 3.8.15, and 4.0.6 and other versions before 4.0.8, allows remote attackers to hijack the authe… CWE-352
 Origin Validation Error
CVE-2012-4732 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
290278 - bestpractical rtfm FAQ manager for Request Tracker (RTFM) before 2.4.5 does not properly check user rights, which allows remote authenticated users to create arbitrary articles in arbitrary classes via unknown vectors. CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4731 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
290279 - bestpractical rt Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote authenticated users with ModifySelf or AdminUser privileges to inject arbitrary email headers and conduct phishing attack… CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4730 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm
290280 - openstack image_registry_and_delivery_service_\(glance\)
essex
folsom
The v1 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to delete arbitrary non-protected images via an image deletion request, a different vulne… CWE-264
Permissions, Privileges, and Access Controls
CVE-2012-4573 2024-11-21 10:43 2012-11-11 Show GitHub Exploit DB Packet Storm