|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 7, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 254151 | 5 | 警告 | サイバートラスト株式会社 OpenSSL Project IBM レッドハット |
- | OpenSSL の dtls1_buffer_record 関数におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-119
バッファエラー |
CVE-2009-1377 | 2010-03-12 14:43 | 2009-05-19 | Show | GitHub Exploit DB Packet Storm |
| 254152 | 5 | 警告 | アップル サイバートラスト株式会社 OpenSSL Project Apache Software Foundation レッドハット |
- | OpenSSL の zlib_stateful_init 関数におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2008-1678 | 2010-03-12 14:43 | 2008-07-10 | Show | GitHub Exploit DB Packet Storm |
| 254153 | 5.8 | 警告 | OpenPNEプロジェクト | - | OpenPNE におけるアクセス制限回避の脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2010-1040 | 2010-03-11 12:39 | 2010-03-5 | Show | GitHub Exploit DB Packet Storm |
| 254154 | 10 | 危険 | アドビシステムズ | - | Adobe Download Manager における任意のプログラムをダウンロードおよびインストールされる脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0189 | 2010-03-11 12:07 | 2010-02-23 | Show | GitHub Exploit DB Packet Storm |
| 254155 | 7.2 | 危険 | サイバートラスト株式会社 Linux レッドハット |
- | Linux kernel の collect_rx_frame 関数における脆弱性 |
CWE-119
バッファエラー |
CVE-2009-4005 | 2010-03-11 12:05 | 2009-11-20 | Show | GitHub Exploit DB Packet Storm |
| 254156 | 7.8 | 危険 | サイバートラスト株式会社 Linux レッドハット |
- | Linux kernel の RTL8169 NIC ドライバにおけるバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2009-1389 | 2010-03-11 12:04 | 2009-06-16 | Show | GitHub Exploit DB Packet Storm |
| 254157 | 5 | 警告 | サン・マイクロシステムズ サイバートラスト株式会社 VMware Net-SNMP レッドハット |
- | net-snmp の snmpd におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-189
数値処理の問題 |
CVE-2009-1887 | 2010-03-11 12:03 | 2009-06-25 | Show | GitHub Exploit DB Packet Storm |
| 254158 | 7.1 | 危険 | シスコシステムズ | - | 複数の Cisco 製品におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0568 | 2010-03-10 11:23 | 2010-02-17 | Show | GitHub Exploit DB Packet Storm |
| 254159 | 5 | 警告 | シスコシステムズ | - | 複数の Cisco 製品におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0567 | 2010-03-10 11:23 | 2010-02-17 | Show | GitHub Exploit DB Packet Storm |
| 254160 | 7.1 | 危険 | シスコシステムズ | - | Cisco Adaptive Security Appliance におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0566 | 2010-03-10 11:23 | 2010-02-17 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 7, 2026, 4:22 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 212811 | 7.5 |
HIGH
Network |
eq-3 | homematic_ccu2_firmware | eQ-3 Homematic CCU2 outdated base software packages allows Denial of Service. CCU2 affected versions: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. |
NVD-CWE-noinfo
|
CVE-2019-9582 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 212812 | 8.1 |
HIGH
Adjacent |
google apple canonical debian opensuse redhat huawei |
android mac_os_x watchos iphone_os tvos ubuntu_linux debian_linux leap enterprise_linux_server enterprise_linux_for_real_time enterprise_linux_for_real_time_for_nfv e… |
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This al… |
CWE-327
Use of a Broken or Risky Cryptographic Algorithm |
CVE-2019-9506 | 2024-11-21 13:51 | 2019-08-15 | Show | GitHub Exploit DB Packet Storm |
| 212813 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee nodejs |
swiftnio traffic_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-s… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9518 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 212814 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee netapp nodejs |
swiftnio traffic_server http_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services ente… |
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without const… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9517 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 212815 | 6.5 |
MEDIUM
Network |
apple apache canonical debian fedoraproject synology opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux fedora skynas diskstation_manager vs960hd_firmware leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, … |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9516 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 212816 | 7.5 |
HIGH
Network |
apple apache debian nodejs |
swiftnio traffic_server debian_linux node.js |
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queu… |
CWE-400
Uncontrolled Resource Consumption |
CVE-2019-9512 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 212817 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9515 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 212818 | 7.5 |
HIGH
Network |
apple apache debian canonical synology fedoraproject opensuse redhat oracle mcafee netapp f5 nodejs |
swiftnio traffic_server debian_linux ubuntu_linux skynas diskstation_manager vs960hd_firmware fedora leap enterprise_linux_workstation enterprise_linux_server softwar… |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that shou… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9514 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 212819 | 7.5 |
HIGH
Network |
apple apache canonical debian fedoraproject synology opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux fedora skynas diskstation_manager vs960hd_firmware leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the st… |
NVD-CWE-Other
|
CVE-2019-9513 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |
| 212820 | 7.5 |
HIGH
Network |
apple apache canonical debian synology fedoraproject opensuse redhat oracle mcafee f5 nodejs |
swiftnio traffic_server ubuntu_linux debian_linux skynas diskstation_manager vs960hd_firmware fedora leap software_collections jboss_core_services enterprise_linux | Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data… |
CWE-770
Allocation of Resources Without Limits or Throttling |
CVE-2019-9511 | 2024-11-21 13:51 | 2019-08-14 | Show | GitHub Exploit DB Packet Storm |