|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 9, 2026, 2 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 254071 | 9.3 | 危険 | アドビシステムズ | - | Adobe Photoshop CS4 におけるバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2010-1296 | 2010-06-15 18:25 | 2010-05-26 | Show | GitHub Exploit DB Packet Storm |
| 254072 | 5 | 警告 | 日立 | - | Groupmax World Wide Web Desktop におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
- | 2010-06-14 16:24 | 2010-05-26 | Show | GitHub Exploit DB Packet Storm |
| 254073 | 4.3 | 警告 | 日立 | - | Hitachi Web Server の SSL クライアント認証における CRL 失効確認不可の脆弱性 |
CWE-287
不適切な認証 |
- | 2010-06-14 16:24 | 2010-05-17 | Show | GitHub Exploit DB Packet Storm |
| 254074 | 5 | 警告 | 日立 | - | TP1/Message Control におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-20
不適切な入力確認 |
- | 2010-06-14 16:23 | 2010-05-17 | Show | GitHub Exploit DB Packet Storm |
| 254075 | 10 | 危険 | 日立 CA Technologies |
- | CA XOsoft におけるバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2010-1223 | 2010-06-14 16:23 | 2010-04-6 | Show | GitHub Exploit DB Packet Storm |
| 254076 | 5 | 警告 | 日立 CA Technologies |
- | CA XOsoft における重要な情報を取得される脆弱性 |
CWE-287
不適切な認証 |
CVE-2010-1222 | 2010-06-14 16:23 | 2010-04-6 | Show | GitHub Exploit DB Packet Storm |
| 254077 | 5 | 警告 | 日立 CA Technologies |
- | CA XOsoft におけるユーザ名を列挙される脆弱性 |
CWE-287
不適切な認証 |
CVE-2010-1221 | 2010-06-14 16:23 | 2010-04-6 | Show | GitHub Exploit DB Packet Storm |
| 254078 | 6.8 | 警告 | フェンリル株式会社 | - | ActiveGeckoBrowser における複数の脆弱性 |
CWE-Other
その他 |
CVE-2010-2420 | 2010-06-14 12:01 | 2010-06-14 | Show | GitHub Exploit DB Packet Storm |
| 254079 | 6.8 | 警告 | サン・マイクロシステムズ GNU Project ターボリナックス サイバートラスト株式会社 レッドハット |
- | GNU tar および GNU cpio の rmt_read__ 関数におけるヒープベースのバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2010-0624 | 2010-06-11 18:45 | 2010-03-15 | Show | GitHub Exploit DB Packet Storm |
| 254080 | 3.5 | 注意 | PostgreSQL.org サイバートラスト株式会社 レッドハット |
- | PostgreSQL における整数オーバーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2010-0733 | 2010-06-9 16:54 | 2010-03-19 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 9, 2026, 5:07 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 249101 | 7.5 |
HIGH
Network |
hp | isaac_mizrahi_smartwatch | A potential security vulnerability caused by the use of insecure (http) transactions during login has been identified with early versions of the Isaac Mizrahi Smartwatch mobile app. HP has no access … |
CWE-254
7PK - Security Features |
CVE-2017-2748 | 2024-11-21 12:24 | 2019-03-28 | Show | GitHub Exploit DB Packet Storm |
| 249102 | 7.5 |
HIGH
Network |
apache | solr | Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the se… |
CWE-918
Server-Side Request Forgery (SSRF) |
CVE-2017-3164 | 2024-11-21 12:24 | 2019-03-9 | Show | GitHub Exploit DB Packet Storm |
| 249103 | 7.8 |
HIGH
Local |
isc | bind | The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9,… |
CWE-428
Unquoted Search Path or Element |
CVE-2017-3141 | 2024-11-21 12:24 | 2019-01-17 | Show | GitHub Exploit DB Packet Storm |
| 249104 | 5.9 |
MEDIUM
Network |
isc netapp |
bind data_ontap_edge oncommand_balance element_software |
If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.… |
CWE-400
Uncontrolled Resource Consumption |
CVE-2017-3140 | 2024-11-21 12:24 | 2019-01-17 | Show | GitHub Exploit DB Packet Storm |
| 249105 | 7.5 |
HIGH
Network |
isc redhat debian netapp juniper |
bind enterprise_linux_desktop enterprise_linux_server_aus enterprise_linux_workstation enterprise_linux_server_tus enterprise_linux_server enterprise_linux_server_eus debian_linu… |
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affec… |
CWE-416
Use After Free |
CVE-2017-3145 | 2024-11-21 12:24 | 2019-01-17 | Show | GitHub Exploit DB Packet Storm |
| 249106 | 7.5 |
HIGH
Network |
isc redhat canonical debian |
dhcp enterprise_linux_desktop enterprise_linux_workstation enterprise_linux_server enterprise_linux_server_aus enterprise_linux_server_eus enterprise_linux_server_tus ubuntu_linu… |
A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.… |
CWE-400
Uncontrolled Resource Consumption |
CVE-2017-3144 | 2024-11-21 12:24 | 2019-01-17 | Show | GitHub Exploit DB Packet Storm |
| 249107 | 5.9 |
MEDIUM
Network |
isc redhat debian |
bind enterprise_linux_desktop enterprise_linux_workstation enterprise_linux_server enterprise_linux_server_tus enterprise_linux_server_aus enterprise_linux_server_eus debian_linux |
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BI… |
NVD-CWE-noinfo
|
CVE-2017-3143 | 2024-11-21 12:24 | 2019-01-17 | Show | GitHub Exploit DB Packet Storm |
| 249108 | 3.7 |
LOW
Network |
isc redhat debian |
bind enterprise_linux_desktop enterprise_linux_workstation enterprise_linux_server enterprise_linux_server_tus enterprise_linux_server_aus enterprise_linux_server_eus debian_linux |
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a… |
CWE-20
Improper Input Validation |
CVE-2017-3142 | 2024-11-21 12:24 | 2019-01-17 | Show | GitHub Exploit DB Packet Storm |
| 249109 | 5.3 |
MEDIUM
Network |
isc netapp debian |
bind data_ontap_edge oncommand_balance element_software debian_linux |
named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regressi… |
CWE-617
Reachable Assertion |
CVE-2017-3138 | 2024-11-21 12:24 | 2019-01-17 | Show | GitHub Exploit DB Packet Storm |
| 249110 | 7.5 |
HIGH
Network |
isc redhat netapp debian |
bind enterprise_linux_desktop enterprise_linux_server_aus enterprise_linux_workstation enterprise_linux_server_tus enterprise_linux_server enterprise_linux_server_eus data_ontap_… |
Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion… |
CWE-617
Reachable Assertion |
CVE-2017-3137 | 2024-11-21 12:24 | 2019-01-17 | Show | GitHub Exploit DB Packet Storm |