Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 22, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
256591 7.2 危険 IBM - IBM AIX および VIOS の qoslist におけるバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2010-0961 2010-03-18 12:09 2010-03-5 Show GitHub Exploit DB Packet Storm
256592 9 危険 マイクロソフト - Microsoft Virtual PC の VMM におけるゲスト OS 内で任意のカーネルモードコードを実行される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2009-1542 2010-03-17 12:18 2009-07-14 Show GitHub Exploit DB Packet Storm
256593 6.8 警告 IBM - IBM Lotus Domino Web Access におけるクロスサイトリクエストフォージェリの脆弱性 CWE-352
同一生成元ポリシー違反
CVE-2010-0921 2010-03-16 11:15 2010-03-3 Show GitHub Exploit DB Packet Storm
256594 4.3 警告 IBM - IBM Lotus Domino Web Access におけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2010-0920 2010-03-16 11:14 2010-03-3 Show GitHub Exploit DB Packet Storm
256595 10 危険 IBM - IBM Lotus Domino Web Access の UltraLite 機能における脆弱性 CWE-noinfo
情報不足
CVE-2010-0918 2010-03-16 11:14 2010-03-3 Show GitHub Exploit DB Packet Storm
256596 4.9 警告 サイバートラスト株式会社
レッドハット
SystemTap
- SystemTap の _get_argv および _get_compat_argv 関数におけるサービス運用妨害 (DoS) の脆弱性 CWE-189
数値処理の問題
CVE-2010-0411 2010-03-16 11:14 2010-02-8 Show GitHub Exploit DB Packet Storm
256597 10 危険 サイバートラスト株式会社
レッドハット
SystemTap
- SystemTap の stap-server における任意のコマンドを実行される脆弱性 CWE-94
コード・インジェクション
CVE-2009-4273 2010-03-16 11:14 2010-01-26 Show GitHub Exploit DB Packet Storm
256598 6.5 警告 サイバートラスト株式会社
Linux
レッドハット
- KVM の x86 エミュレータにおける権限昇格の脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2010-0298 2010-03-16 11:13 2010-02-9 Show GitHub Exploit DB Packet Storm
256599 4.4 警告 サイバートラスト株式会社
Fabrice Bellard
レッドハット
- QEMU の usb_host_handle_control 関数におけるバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2010-0297 2010-03-16 11:13 2010-02-9 Show GitHub Exploit DB Packet Storm
256600 6.8 警告 サン・マイクロシステムズ
freedesktop.org
- Poppler における整数オーバーフローの脆弱性 CWE-189
数値処理の問題
CVE-2009-3605 2010-03-15 16:40 2009-11-2 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 23, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
4781 7.1 HIGH
Local
opencascade open_cascade_technology A heap-based out-of-bounds read vulnerability in RWObj_Reader::read in the OBJ file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows user-assisted attackers to cause a denial of service or … CWE-125
Out-of-bounds Read
CVE-2026-42477 2026-05-2 02:48 2026-05-2 Show GitHub Exploit DB Packet Storm
4782 7.1 HIGH
Local
opencascade open_cascade_technology Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadL… CWE-125
Out-of-bounds Read
CVE-2026-42476 2026-05-2 02:47 2026-05-2 Show GitHub Exploit DB Packet Storm
4783 9.8 CRITICAL
Network
hashcat hashcat A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted PKZIP hash fi… CWE-787
 Out-of-bounds Write
CVE-2026-42484 2026-05-2 02:45 2026-05-1 Show GitHub Exploit DB Packet Storm
4784 10.0 CRITICAL
Network
traefik traefik Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is an authentication bypass vulnerability in Traefik's ForwardAuth middleware when trustFo… CWE-345
 Insufficient Verification of Data Authenticity
CVE-2026-35051 2026-05-2 02:45 2026-05-1 Show GitHub Exploit DB Packet Storm
4785 9.8 CRITICAL
Network
hashcat hashcat A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code v… CWE-787
 Out-of-bounds Write
CVE-2026-42482 2026-05-2 02:45 2026-05-1 Show GitHub Exploit DB Packet Storm
4786 10.0 CRITICAL
Network
traefik traefik Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippe… CWE-290
CWE-306
 Authentication Bypass by Spoofing
Missing Authentication for Critical Function
CVE-2026-39858 2026-05-2 02:44 2026-05-1 Show GitHub Exploit DB Packet Storm
4787 5.3 MEDIUM
Network
exim exim In Exim before 4.99.2, when utf8 operators are enabled, there is an out-of-bounds read if large UTF-8 trailing characters are present (malformed UTF-8 header data). Information might be divulged with… CWE-125
Out-of-bounds Read
CVE-2026-40686 2026-05-2 02:44 2026-05-1 Show GitHub Exploit DB Packet Storm
4788 8.2 HIGH
Network
traefik traefik Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's StripPrefixRegex middl… CWE-706
 Use of Incorrectly-Resolved Name or Reference
CVE-2026-40912 2026-05-2 02:42 2026-05-1 Show GitHub Exploit DB Packet Storm
4789 7.1 HIGH
Network
dell idrac10_firmware Dell iDRAC10, versions 1.20.70.50 and 1.30.05.10, contains an Insufficiently Protected Credentials vulnerability. A race condition vulnerability exists that could allow an authenticated low‑privilege… CWE-522
 Insufficiently Protected Credentials
CVE-2026-35155 2026-05-2 02:40 2026-04-29 Show GitHub Exploit DB Packet Storm
4790 6.1 MEDIUM
Network
wso2 identity_server The authentication endpoint accepts user-supplied input without enforcing expected validation constraints, leading to a lack of proper output encoding. This allows for the injection of malicious Java… CWE-79
Cross-site Scripting
CVE-2025-10503 2026-05-2 02:40 2026-04-29 Show GitHub Exploit DB Packet Storm