|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 1, 2026, 12:10 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 252751 | 6.8 | 警告 | マイクロソフト | - | Microsoft Outlook Web Access におけるクロスサイトリクエストフォージェリの脆弱性 |
CWE-352
同一生成元ポリシー違反 |
CVE-2010-3213 | 2010-10-6 16:56 | 2010-09-7 | Show | GitHub Exploit DB Packet Storm |
| 252752 | 6.9 | 警告 | マイクロソフト | - | Microsoft Windows の Win32 サブシステム内にある CSRSS における権限昇格の脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2010-1891 | 2010-10-6 16:56 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
| 252753 | 9 | 危険 | マイクロソフト | - | Microsoft Windows の LSASS におけるヒープベースのバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2010-0820 | 2010-10-6 16:55 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
| 252754 | 9.3 | 危険 | マイクロソフト | - | Microsoft Windows の WordPad Text Converters における任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2010-2563 | 2010-10-6 16:55 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
| 252755 | 9.3 | 危険 | マイクロソフト | - | Microsoft Windows の RPC クライアント実装における任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2010-2567 | 2010-10-6 16:55 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
| 252756 | 6.8 | 警告 | マイクロソフト | - | Windows 上で稼働する Microsoft Internet Information Services におけるアクセス制限を回避される脆弱性 |
CWE-287
不適切な認証 |
CVE-2010-2731 | 2010-10-6 16:54 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
| 252757 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Information Services におけるバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2010-2730 | 2010-10-5 19:00 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
| 252758 | 4.3 | 警告 | マイクロソフト | - | Microsoft Internet Information Services の ASP 実装におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-119
バッファエラー |
CVE-2010-1899 | 2010-10-5 18:59 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
| 252759 | 9.3 | 危険 | マイクロソフト | - | Microsoft Outlook におけるヒープベースのバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2010-2728 | 2010-10-5 18:59 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
| 252760 | 9.3 | 危険 | マイクロソフト | - | Microsoft Windows の USP10.DLL 内の Uniscribe 実装における任意のコードを実行される脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2010-2738 | 2010-10-5 18:58 | 2010-09-14 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 1, 2026, 4:54 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 211681 | 9.8 |
CRITICAL
Network |
eq-3 |
homematic_ccu2_firmware homematic_ccu3_firmware |
eQ-3 Homematic AddOn 'CloudMatic' on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN servic… |
CWE-425
Direct Request ('Forced Browsing') |
CVE-2019-9584 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211682 | 8.2 |
HIGH
Network |
eq-3 |
homematic_ccu3_firmware homematic_ccu2_firmware |
eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, … |
CWE-400
Uncontrolled Resource Consumption |
CVE-2019-9583 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211683 | 7.5 |
HIGH
Network |
eq-3 | homematic_ccu2_firmware | eQ-3 Homematic CCU2 outdated base software packages allows Denial of Service. CCU2 affected versions: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. |
NVD-CWE-noinfo
|
CVE-2019-9582 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211684 | 8.1 |
HIGH
Adjacent |
google apple canonical debian opensuse redhat huawei |
android mac_os_x watchos iphone_os tvos ubuntu_linux debian_linux leap enterprise_linux_server enterprise_linux_for_real_time enterprise_linux_for_real_time_for_nfv e… |
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This al… |
CWE-327
Use of a Broken or Risky Cryptographic Algorithm |
CVE-2019-9506 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211685 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee nodejs |
swiftnio traffic_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-s… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9518 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211686 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee netapp nodejs |
swiftnio traffic_server http_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services ente… |
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without const… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9517 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211687 | 6.5 |
MEDIUM
Network |
apple apache canonical debian fedoraproject synology opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux fedora skynas diskstation_manager vs960hd_firmware leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, … |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9516 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211688 | 7.5 |
HIGH
Network |
apple apache debian nodejs |
swiftnio traffic_server debian_linux node.js |
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queu… |
CWE-400
Uncontrolled Resource Consumption |
CVE-2019-9512 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211689 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9515 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211690 | 7.5 |
HIGH
Network |
apple apache debian canonical synology fedoraproject opensuse redhat oracle mcafee netapp f5 nodejs |
swiftnio traffic_server debian_linux ubuntu_linux skynas diskstation_manager vs960hd_firmware fedora leap enterprise_linux_workstation enterprise_linux_server softwar… |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that shou… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9514 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |