Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 12, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
255081 5 警告 オラクル - BEA Product Suite の WebLogic Server コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0068 2010-02-15 19:32 2010-01-12 Show GitHub Exploit DB Packet Storm
255082 4.3 警告 オラクル - Oracle Application Server の J2EE コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0070 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
255083 5 警告 オラクル - Oracle Application Server の J2EE コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0067 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
255084 5 警告 オラクル - Oracle Application Server の Access Manager Identity Server コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0066 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
255085 7.8 危険 サイバートラスト株式会社
Linux
レッドハット
- Linux kernel の e1000_clean_rx_irq 関数における整数アンダーフローの脆弱性 CWE-189
数値処理の問題
CVE-2009-1385 2010-02-15 11:03 2009-06-4 Show GitHub Exploit DB Packet Storm
255086 4.6 警告 サイバートラスト株式会社
Todd C. Miller
- sudo の Perl スクリプト実行時における権限昇格の脆弱性 - CVE-2005-4158 2010-02-15 11:03 2005-11-8 Show GitHub Exploit DB Packet Storm
255087 1 注意 オラクル - Oracle Database および Oracle Application Server の Unzip コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3412 2010-02-12 12:22 2010-01-12 Show GitHub Exploit DB Packet Storm
255088 3.2 注意 オラクル - Oracle Database の Oracle Spatial コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3413 2010-02-12 12:22 2010-01-12 Show GitHub Exploit DB Packet Storm
255089 3.6 注意 オラクル - Oracle Database の RDBMS コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3410 2010-02-12 12:21 2010-01-12 Show GitHub Exploit DB Packet Storm
255090 4 警告 オラクル - Oracle Database の Logical Standby コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-1996 2010-02-12 12:21 2010-01-12 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 13, 2026, 5:05 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
257021 7.5 HIGH
Network
microsoft windows_rt_8.1
windows_server_2012
windows_server_2016
windows_7
windows_10
windows_8.1
windows_server_2008
windows_server
Windows Search in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows se… NVD-CWE-noinfo
CVE-2017-11788 2024-11-21 12:08 2017-11-15 Show GitHub Exploit DB Packet Storm
257022 6.5 MEDIUM
Adjacent
meetcircle circle_with_disney_firmware An exploitable vulnerability exists in the WiFi management of Circle with Disney. A crafted Access Point with the same name as the legitimate one can be used to make Circle connect to an untrusted ne… CWE-290
 Authentication Bypass by Spoofing
CVE-2017-12096 2024-11-21 12:08 2017-11-8 Show GitHub Exploit DB Packet Storm
257023 6.5 MEDIUM
Adjacent
meetcircle circle_with_disney_firmware An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attac… CWE-77
Command Injection
CVE-2017-12094 2024-11-21 12:08 2017-11-8 Show GitHub Exploit DB Packet Storm
257024 9.8 CRITICAL
Network
meetcircle circle_with_disney_firmware An exploitable routing vulnerability exists in the Circle with Disney cloud infrastructure. A specially crafted packet can make the Circle cloud route a packet to any arbitrary Circle device. An atta… NVD-CWE-noinfo
CVE-2017-12085 2024-11-21 12:08 2017-11-8 Show GitHub Exploit DB Packet Storm
257025 6.6 MEDIUM
Network
meetcircle circle_with_disney_firmware A backdoor vulnerability exists in remote control functionality of Circle with Disney running firmware 2.0.1. A specific set of network packets can remotely start an SSH server on the device, resulti… CWE-862
 Missing Authorization
CVE-2017-12084 2024-11-21 12:08 2017-11-8 Show GitHub Exploit DB Packet Storm
257026 5.3 MEDIUM
Network
meetcircle circle_with_disney_firmware An exploitable information disclosure vulnerability exists in the apid daemon of the Circle with Disney running firmware 2.0.1. A specially crafted set of packets can make the Disney Circle dump stri… CWE-200
Information Exposure
CVE-2017-12083 2024-11-21 12:08 2017-11-8 Show GitHub Exploit DB Packet Storm
257027 9.8 CRITICAL
Network
microsoft chakracore ChakraCore allows an attacker to gain the same user rights as the current user, due to the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption … CWE-119
Incorrect Access of Indexable Resource ('Range Error') 
CVE-2017-11767 2024-11-21 12:08 2017-11-3 Show GitHub Exploit DB Packet Storm
257028 7.2 HIGH
Network
redhat keycloak It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission re… CWE-287
Improper Authentication
CVE-2017-12160 2024-11-21 12:08 2017-10-27 Show GitHub Exploit DB Packet Storm
257029 7.5 HIGH
Network
redhat
keycloak
single_sign_on
keycloak
It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible … CWE-613
 Insufficient Session Expiration
CVE-2017-12159 2024-11-21 12:08 2017-10-27 Show GitHub Exploit DB Packet Storm
257030 5.4 MEDIUM
Network
redhat
keycloak
single_sign_on
keycloak
It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain … CWE-79
Cross-site Scripting
CVE-2017-12158 2024-11-21 12:08 2017-10-27 Show GitHub Exploit DB Packet Storm