|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":April 30, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 253741 | 10 | 危険 | サン・マイクロシステムズ VMware |
- | Sun Java SE の Provider クラスにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-2721 | 2010-01-14 12:08 | 2009-08-10 | Show | GitHub Exploit DB Packet Storm |
| 253742 | 5 | 警告 | 有限会社シースリー | - | WebCalenderC3 におけるディレクトリトラバーサルの脆弱性 |
CWE-22
パス・トラバーサル |
CVE-2010-0348 | 2010-01-12 15:01 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 253743 | 4.3 | 警告 | 有限会社シースリー | - | WebCalenderC3 におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2010-0349 | 2010-01-12 15:00 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 253744 | 10 | 危険 | サイバートラスト株式会社 XEmacs |
- | XEmacs の glyphs-eimage.c における整数オーバーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2009-2688 | 2010-01-12 14:48 | 2009-08-5 | Show | GitHub Exploit DB Packet Storm |
| 253745 | 6.8 | 警告 | IBM | - | IBM WebSphere Application Server (WAS) におけるクロスサイトリクエストフォージェリの脆弱性 |
CWE-352
同一生成元ポリシー違反 |
CVE-2009-2746 | 2010-01-12 14:48 | 2009-11-13 | Show | GitHub Exploit DB Packet Storm |
| 253746 | 5 | 警告 | アップル | - | Apple Safari におけるローカル HTML ファイルを読まれる脆弱性 |
CWE-Other
その他 |
CVE-2009-2842 | 2010-01-7 12:09 | 2009-11-11 | Show | GitHub Exploit DB Packet Storm |
| 253747 | 5.5 | 警告 | シックス・アパート株式会社 | - | Movable Type におけるアクセス制限回避の脆弱性 |
CWE-264
認可・権限・アクセス制御 |
- | 2010-01-6 15:01 | 2010-01-6 | Show | GitHub Exploit DB Packet Storm |
| 253748 | 9.3 | 危険 | マイクロソフト | - | Microsoft Office Word および Open XML File Format Converter における、任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2009-3135 | 2010-01-6 14:44 | 2009-11-10 | Show | GitHub Exploit DB Packet Storm |
| 253749 | 5 | 警告 | トレンドマイクロ 日本電気 Apache Software Foundation 富士通 サイバートラスト株式会社 サン・マイクロシステムズ ヒューレット・パッカード レッドハット |
- | Apache Tomcat の Apache HTTP Server との組合せによるディレクトリトラバーサルの脆弱性 |
CWE-22
パス・トラバーサル |
CVE-2007-0450 | 2010-01-6 14:43 | 2007-03-16 | Show | GitHub Exploit DB Packet Storm |
| 253750 | 9.3 | 危険 | マイクロソフト | - | Microsoft Office Excel および Open XML File Format Converter におけるオブジェクトを含むスプレッドシートの処理に関する任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2009-3133 | 2010-01-5 16:18 | 2009-11-10 | Show | GitHub Exploit DB Packet Storm |
Update Date:April 30, 2026, 4:58 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 211511 | 7.5 |
HIGH
Network |
openpgpjs | openpgpjs | Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to forge signed messages by replacing its signatures with a "standalone" or "timestamp" signature. |
CWE-347
Improper Verification of Cryptographic Signature |
CVE-2019-9153 | 2024-11-21 13:51 | 2019-08-23 | Show | GitHub Exploit DB Packet Storm |
| 211512 | 9.8 |
CRITICAL
Network |
eq-3 |
homematic_ccu2_firmware homematic_ccu3_firmware |
eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of… |
CWE-306
Missing Authentication for Critical Function |
CVE-2019-9585 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211513 | 9.8 |
CRITICAL
Network |
eq-3 |
homematic_ccu2_firmware homematic_ccu3_firmware |
eQ-3 Homematic AddOn 'CloudMatic' on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN servic… |
CWE-425
Direct Request ('Forced Browsing') |
CVE-2019-9584 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211514 | 8.2 |
HIGH
Network |
eq-3 |
homematic_ccu3_firmware homematic_ccu2_firmware |
eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, … |
CWE-400
Uncontrolled Resource Consumption |
CVE-2019-9583 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211515 | 7.5 |
HIGH
Network |
eq-3 | homematic_ccu2_firmware | eQ-3 Homematic CCU2 outdated base software packages allows Denial of Service. CCU2 affected versions: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. |
NVD-CWE-noinfo
|
CVE-2019-9582 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211516 | 8.1 |
HIGH
Adjacent |
google apple canonical debian opensuse redhat huawei |
android mac_os_x watchos iphone_os tvos ubuntu_linux debian_linux leap enterprise_linux_server enterprise_linux_for_real_time enterprise_linux_for_real_time_for_nfv e… |
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This al… |
CWE-327
Use of a Broken or Risky Cryptographic Algorithm |
CVE-2019-9506 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 211517 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee nodejs |
swiftnio traffic_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-s… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9518 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211518 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee netapp nodejs |
swiftnio traffic_server http_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services ente… |
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without const… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9517 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211519 | 6.5 |
MEDIUM
Network |
apple apache canonical debian fedoraproject synology opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux fedora skynas diskstation_manager vs960hd_firmware leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, … |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9516 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 211520 | 7.5 |
HIGH
Network |
apple apache debian nodejs |
swiftnio traffic_server debian_linux node.js |
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queu… |
CWE-400
Uncontrolled Resource Consumption |
CVE-2019-9512 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |