Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 8, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
254301 7.5 危険 VMware - 複数の VMware 製品の WebAccess におけるリクエストの発信元を偽装される脆弱性 CWE-20
不適切な入力確認
CVE-2010-0686 2010-04-21 17:53 2010-03-29 Show GitHub Exploit DB Packet Storm
254302 4.3 警告 VMware - 複数の VMware 製品の WebAccess におけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2010-1137 2010-04-21 17:51 2010-03-29 Show GitHub Exploit DB Packet Storm
254303 4.6 警告 GNU Project
サイバートラスト株式会社
レッドハット
- GNU Automake の dist または distcheck ルールにおけるコンテンツを変更される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2009-4029 2010-04-21 17:51 2009-12-20 Show GitHub Exploit DB Packet Storm
254304 5 警告 Linux
レッドハット
- Linux kernel の virtio-net ドライバにおけるサービス運用妨害 (DoS) の脆弱性 CWE-20
不適切な入力確認
CVE-2010-0741 2010-04-21 17:48 2010-03-30 Show GitHub Exploit DB Packet Storm
254305 6.9 警告 mielke
レッドハット
- brltty の libbrlttybba.so における権限昇格の脆弱性 CWE-264
CWE-Other
CVE-2008-3279 2010-04-21 17:47 2010-03-30 Show GitHub Exploit DB Packet Storm
254306 4.3 警告 Mozilla Foundation - Mozilla Firefox/SeaMonkey におけるサービス運用妨害 (DoS) の脆弱性 CWE-20
不適切な入力確認
CVE-2010-0181 2010-04-20 16:42 2010-03-30 Show GitHub Exploit DB Packet Storm
254307 5.8 警告 サイボウズ - 複数のサイボウズ製品におけるアクセス制限に関する脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2010-2029 2010-04-20 12:01 2010-04-20 Show GitHub Exploit DB Packet Storm
254308 9.3 危険 マイクロソフト - Microsoft Internet Explorer の Tabular Data Control ActiveX コントロールにおける任意のコードを実行される脆弱性 CWE-94
コード・インジェクション
CVE-2010-0805 2010-04-19 19:20 2010-03-30 Show GitHub Exploit DB Packet Storm
254309 9.3 危険 マイクロソフト - Microsoft Internet Explorer における任意のコードを実行される脆弱性 CWE-399
リソース管理の問題
CVE-2010-0491 2010-04-19 19:19 2010-03-30 Show GitHub Exploit DB Packet Storm
254310 4.3 警告 マイクロソフト - Microsoft Internet Explorer における同一生成元ポリシーを回避される脆弱性 CWE-200
情報漏えい
CVE-2010-0494 2010-04-19 19:19 2010-03-30 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 9, 2026, 5:07 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
304341 8.8 HIGH
Network
glpi-project glpi GLPI is a free asset and IT management software package. An authenticated user can exploit a SQL injection vulnerability from the ticket form. Upgrade to 10.0.17. CWE-89
SQL Injection
CVE-2024-41679 2024-11-21 00:21 2024-11-16 Show GitHub Exploit DB Packet Storm
304342 6.1 MEDIUM
Network
glpi-project glpi GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.1… CWE-79
Cross-site Scripting
CVE-2024-41678 2024-11-21 00:21 2024-11-16 Show GitHub Exploit DB Packet Storm
304343 8.8 HIGH
Network
glpi-project glpi GLPI is a free asset and IT management software package. An authenticated user can perfom a SQL injection by changing its preferences. Upgrade to 10.0.17. CWE-89
SQL Injection
CVE-2024-45608 2024-11-21 00:20 2024-11-16 Show GitHub Exploit DB Packet Storm
304344 6.1 MEDIUM
Network
glpi-project glpi GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.1… CWE-79
Cross-site Scripting
CVE-2024-43418 2024-11-21 00:20 2024-11-16 Show GitHub Exploit DB Packet Storm
304345 9.8 CRITICAL
Network
trcore dvc The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, lead… CWE-22
CWE-434
Path Traversal
 Unrestricted Upload of File with Dangerous Type 
CVE-2024-11311 2024-11-21 00:17 2024-11-18 Show GitHub Exploit DB Packet Storm
304346 7.5 HIGH
Network
trcore dvc The DVC from TRCore has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. CWE-22
Path Traversal
CVE-2024-11310 2024-11-21 00:17 2024-11-18 Show GitHub Exploit DB Packet Storm
304347 7.5 HIGH
Network
trcore dvc The DVC from TRCore has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. CWE-22
Path Traversal
CVE-2024-11309 2024-11-21 00:17 2024-11-18 Show GitHub Exploit DB Packet Storm
304348 5.5 MEDIUM
Local
trcore dvc The DVC from TRCore encrypts files using a hardcoded key. Attackers can use this key to decrypt the files and restore the original content. NVD-CWE-Other
CVE-2024-11308 2024-11-21 00:17 2024-11-18 Show GitHub Exploit DB Packet Storm
304349 9.8 CRITICAL
Network
trcore dvc The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, lead… CWE-22
CWE-434
Path Traversal
 Unrestricted Upload of File with Dangerous Type 
CVE-2024-11315 2024-11-21 00:16 2024-11-18 Show GitHub Exploit DB Packet Storm
304350 9.8 CRITICAL
Network
trcore dvc The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, lead… CWE-22
CWE-434
Path Traversal
 Unrestricted Upload of File with Dangerous Type 
CVE-2024-11314 2024-11-21 00:16 2024-11-18 Show GitHub Exploit DB Packet Storm