|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 1, 2026, 2 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 253521 | 4.3 | 警告 | アドビシステムズ レッドハット |
- | Adobe Reader および Acrobat におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2010-0190 | 2010-04-28 15:56 | 2010-04-13 | Show | GitHub Exploit DB Packet Storm |
| 253522 | 7.8 | 危険 | サイバートラスト株式会社 Linux レッドハット |
- | Linux kernel の r8169 ドライバにおけるサービス運用妨害 (DoS) の脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2009-4537 | 2010-04-28 15:21 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 253523 | 4.3 | 警告 | IBM Apache Software Foundation アップル サイバートラスト株式会社 ヒューレット・パッカード ターボリナックス レッドハット |
- | Apache の mod_proxy_ftp における UTF-7 エンコードに関するクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2008-0005 | 2010-04-28 15:18 | 2008-01-11 | Show | GitHub Exploit DB Packet Storm |
| 253524 | 10 | 危険 | IntelliCom Innovation AB | - | IntelliCom NetBiter デバイスにおけるデフォルトパスワードの問題 |
CWE-255
証明書・パスワード管理 |
CVE-2009-4463 | 2010-04-27 16:10 | 2010-04-7 | Show | GitHub Exploit DB Packet Storm |
| 253525 | 9.3 | 危険 | Foxit Software Inc | - | Foxit Reader に任意のコード実行が可能な脆弱性 |
CWE-94
コード・インジェクション |
CVE-2010-1239 | 2010-04-27 16:10 | 2010-04-6 | Show | GitHub Exploit DB Packet Storm |
| 253526 | 10 | 危険 | ヒューレット・パッカード | - | Broadcom NetXtreme 管理用ファームウェアにバッファオーバーフローの脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0104 | 2010-04-27 16:09 | 2010-03-31 | Show | GitHub Exploit DB Packet Storm |
| 253527 | 6.8 | 警告 | アップル | - | AirPort Utility におけるアクセス制限を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2009-2822 | 2010-04-27 16:09 | 2010-03-31 | Show | GitHub Exploit DB Packet Storm |
| 253528 | 9.3 | 危険 | アップル | - | Apple Safari の ColorSync における整数オーバーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2010-0040 | 2010-04-27 15:20 | 2010-03-15 | Show | GitHub Exploit DB Packet Storm |
| 253529 | 4 | 警告 | Squid-cache.org サイバートラスト株式会社 ターボリナックス レッドハット |
- | Squid の lib/rfc1035.c におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2010-0308 | 2010-04-27 15:20 | 2010-01-28 | Show | GitHub Exploit DB Packet Storm |
| 253530 | 6.8 | 警告 | アップル | - | Apple Mac OS X の QuickDraw Manager におけるバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2009-2837 | 2010-04-27 15:20 | 2009-11-9 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 1, 2026, 4:54 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 211681 | 9.8 |
CRITICAL
Network |
eq-3 |
homematic_ccu2_firmware homematic_ccu3_firmware |
eQ-3 Homematic AddOn 'CloudMatic' on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN servic… |
CWE-425
Direct Request ('Forced Browsing') |
CVE-2019-9584 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211682 | 8.2 |
HIGH
Network |
eq-3 |
homematic_ccu3_firmware homematic_ccu2_firmware |
eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, … |
CWE-400
Uncontrolled Resource Consumption |
CVE-2019-9583 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211683 | 7.5 |
HIGH
Network |
eq-3 | homematic_ccu2_firmware | eQ-3 Homematic CCU2 outdated base software packages allows Denial of Service. CCU2 affected versions: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. |
NVD-CWE-noinfo
|
CVE-2019-9582 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211684 | 8.1 |
HIGH
Adjacent |
google apple canonical debian opensuse redhat huawei |
android mac_os_x watchos iphone_os tvos ubuntu_linux debian_linux leap enterprise_linux_server enterprise_linux_for_real_time enterprise_linux_for_real_time_for_nfv e… |
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This al… |
CWE-327
Use of a Broken or Risky Cryptographic Algorithm |
CVE-2019-9506 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211685 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee nodejs |
swiftnio traffic_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-s… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9518 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211686 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee netapp nodejs |
swiftnio traffic_server http_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services ente… |
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without const… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9517 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211687 | 6.5 |
MEDIUM
Network |
apple apache canonical debian fedoraproject synology opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux fedora skynas diskstation_manager vs960hd_firmware leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, … |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9516 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211688 | 7.5 |
HIGH
Network |
apple apache debian nodejs |
swiftnio traffic_server debian_linux node.js |
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queu… |
CWE-400
Uncontrolled Resource Consumption |
CVE-2019-9512 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211689 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9515 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211690 | 7.5 |
HIGH
Network |
apple apache debian canonical synology fedoraproject opensuse redhat oracle mcafee netapp f5 nodejs |
swiftnio traffic_server debian_linux ubuntu_linux skynas diskstation_manager vs960hd_firmware fedora leap enterprise_linux_workstation enterprise_linux_server softwar… |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that shou… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9514 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |