Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 12, 2026, 2:01 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
255081 4.3 警告 オラクル - Oracle Application Server の J2EE コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0070 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
255082 5 警告 オラクル - Oracle Application Server の J2EE コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0067 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
255083 5 警告 オラクル - Oracle Application Server の Access Manager Identity Server コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2010-0066 2010-02-15 19:31 2010-01-12 Show GitHub Exploit DB Packet Storm
255084 7.8 危険 サイバートラスト株式会社
Linux
レッドハット
- Linux kernel の e1000_clean_rx_irq 関数における整数アンダーフローの脆弱性 CWE-189
数値処理の問題
CVE-2009-1385 2010-02-15 11:03 2009-06-4 Show GitHub Exploit DB Packet Storm
255085 4.6 警告 サイバートラスト株式会社
Todd C. Miller
- sudo の Perl スクリプト実行時における権限昇格の脆弱性 - CVE-2005-4158 2010-02-15 11:03 2005-11-8 Show GitHub Exploit DB Packet Storm
255086 1 注意 オラクル - Oracle Database および Oracle Application Server の Unzip コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3412 2010-02-12 12:22 2010-01-12 Show GitHub Exploit DB Packet Storm
255087 3.2 注意 オラクル - Oracle Database の Oracle Spatial コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3413 2010-02-12 12:22 2010-01-12 Show GitHub Exploit DB Packet Storm
255088 3.6 注意 オラクル - Oracle Database の RDBMS コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3410 2010-02-12 12:21 2010-01-12 Show GitHub Exploit DB Packet Storm
255089 4 警告 オラクル - Oracle Database の Logical Standby コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-1996 2010-02-12 12:21 2010-01-12 Show GitHub Exploit DB Packet Storm
255090 4.9 警告 オラクル - Oracle Database の Oracle Spatial コンポーネントにおける脆弱性 CWE-noinfo
情報不足
CVE-2009-3414 2010-02-12 12:21 2010-01-12 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 12, 2026, 5:06 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
268911 8.1 HIGH
Network
gnu glibc Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary co… CWE-190
 Integer Overflow or Wraparound
CVE-2015-8982 2024-11-21 11:39 2017-03-16 Show GitHub Exploit DB Packet Storm
268912 5.5 MEDIUM
Local
imagemagick imagemagick The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file. CWE-476
 NULL Pointer Dereference
CVE-2015-8898 2024-11-21 11:39 2017-03-16 Show GitHub Exploit DB Packet Storm
268913 5.5 MEDIUM
Local
imagemagick imagemagick The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file. CWE-125
Out-of-bounds Read
CVE-2015-8897 2024-11-21 11:39 2017-03-16 Show GitHub Exploit DB Packet Storm
268914 6.5 MEDIUM
Network
imagemagick
oracle
redhat
imagemagick
linux
enterprise_linux_desktop
enterprise_linux_server_aus
enterprise_linux_workstation
enterprise_linux_server_tus
enterprise_linux_server
enterprise_linux_eus
Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file. NVD-CWE-Other
CVE-2015-8896 2024-11-21 11:39 2017-03-16 Show GitHub Exploit DB Packet Storm
268915 7.5 HIGH
Network
imagemagick imagemagick Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and later allows remote attackers to cause a denial of service (application crash) via a crafted length value, which triggers a buffer overflo… CWE-190
 Integer Overflow or Wraparound
CVE-2015-8895 2024-11-21 11:39 2017-03-16 Show GitHub Exploit DB Packet Storm
268916 5.5 MEDIUM
Local
imagemagick imagemagick Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file. CWE-415
 Double Free
CVE-2015-8894 2024-11-21 11:39 2017-03-16 Show GitHub Exploit DB Packet Storm
268917 7.0 HIGH
Local
mcafee security_webadvisor
cloud_av
security_scan_plus
Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted m… CWE-264
Permissions, Privileges, and Access Controls
CVE-2015-8993 2024-11-21 11:39 2017-03-15 Show GitHub Exploit DB Packet Storm
268918 7.0 HIGH
Local
mcafee security_webadvisor
cloud_av
security_scan_plus
Malicious file execution vulnerability in Intel Security WebAdvisor before 4.0.2, 4.0.1 and 3.7.2 allows attackers to make the product momentarily vulnerable via executing preexisting specifically cr… CWE-264
Permissions, Privileges, and Access Controls
CVE-2015-8992 2024-11-21 11:39 2017-03-15 Show GitHub Exploit DB Packet Storm
268919 7.0 HIGH
Local
mcafee security_webadvisor
cloud_av
security_scan_plus
Malicious file execution vulnerability in Intel Security McAfee Security Scan+ (MSS+) before 3.11.266.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifica… CWE-264
Permissions, Privileges, and Access Controls
CVE-2015-8991 2024-11-21 11:39 2017-03-15 Show GitHub Exploit DB Packet Storm
268920 7.5 HIGH
Network
mcafee advanced_threat_defense Detection bypass vulnerability in Intel Security Advanced Threat Defense (ATD) 3.4.6 and earlier allows malware samples to bypass ATD detection via renaming the malware. CWE-254
 7PK - Security Features
CVE-2015-8990 2024-11-21 11:39 2017-03-15 Show GitHub Exploit DB Packet Storm