Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 7, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
254441 10 危険 アップル
VMware
サン・マイクロシステムズ
- Sun Java SE の Provider クラスにおける詳細不明な脆弱性 CWE-noinfo
情報不足
CVE-2009-2722 2010-01-4 14:56 2009-08-10 Show GitHub Exploit DB Packet Storm
254442 10 危険 アップル
VMware
サン・マイクロシステムズ
- Sun Java SE の Provider クラスにおける詳細不明な脆弱性 CWE-noinfo
情報不足
CVE-2009-2723 2010-01-4 14:55 2009-08-10 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 7, 2026, 4:22 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
308271 9.1 CRITICAL
Network
indutny elliptic The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation. CWE-347
 Improper Verification of Cryptographic Signature
CVE-2024-48949 2024-10-15 23:07 2024-10-10 Show GitHub Exploit DB Packet Storm
308272 6.1 MEDIUM
Network
idiom easy_social_share_buttons The Easy Social Share Buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and i… CWE-79
Cross-site Scripting
CVE-2024-8729 2024-10-15 22:40 2024-10-10 Show GitHub Exploit DB Packet Storm
308273 4.3 MEDIUM
Network
brevo newsletter\
_smtp\
_email_marketing_and_subscribe
The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. … CWE-352
 Origin Validation Error
CVE-2024-8477 2024-10-15 22:30 2024-10-10 Show GitHub Exploit DB Packet Storm
308274 7.5 HIGH
Network
checkmk checkmk Information leakage in mknotifyd in Checkmk before 2.3.0p18, 2.2.0p36, 2.1.0p49 and in 2.0.0p39 (EOL) allows attacker to get potentially sensitive data CWE-200
Information Exposure
CVE-2024-6747 2024-10-15 22:22 2024-10-10 Show GitHub Exploit DB Packet Storm
308275 6.1 MEDIUM
Network
limesurvey limesurvey Cross Site Scripting vulnerability in LimeSurvey before 6.5.12+240611 allows a remote attacker to execute arbitrary code via a crafted script to the title and comment fields. CWE-79
Cross-site Scripting
CVE-2024-28709 2024-10-15 22:19 2024-10-8 Show GitHub Exploit DB Packet Storm
308276 6.1 MEDIUM
Network
limesurvey limesurvey Cross Site Scripting vulnerability in LimeSurvey before 6.5.0+240319 allows a remote attacker to execute arbitrary code via a lack of input validation and output encoding in the Alert Widget's messag… CWE-79
Cross-site Scripting
CVE-2024-28710 2024-10-15 22:18 2024-10-8 Show GitHub Exploit DB Packet Storm
308277 - - - An issue in sbondCo Watcharr v.1.43.0 allows a remote attacker to execute arbitrary code and escalate privileges via the Change Password function. - CVE-2024-48827 2024-10-15 21:58 2024-10-12 Show GitHub Exploit DB Packet Storm
308278 - - - SQL injection vulnerability in employee-management-system-php-and-mysql-free-download.html taskmatic 1.0 allows a remote attacker to execute arbitrary code via the admin_id parameter of the /update-e… - CVE-2024-48813 2024-10-15 21:58 2024-10-12 Show GitHub Exploit DB Packet Storm
308279 6.5 MEDIUM
Network
- - An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker t… CWE-770
 Allocation of Resources Without Limits or Throttling
CVE-2024-47509 2024-10-15 21:58 2024-10-12 Show GitHub Exploit DB Packet Storm
308280 - - - An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in u… - CVE-2024-47495 2024-10-15 21:58 2024-10-12 Show GitHub Exploit DB Packet Storm