|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 7, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 254241 | 7.5 | 危険 | サン・マイクロシステムズ サイバートラスト株式会社 VMware レッドハット |
- | Sun Java SE および OpenJDK の Swing 実装における情報漏えいの脆弱性 |
CWE-200
情報漏えい |
CVE-2009-3882 | 2010-02-23 11:51 | 2009-11-9 | Show | GitHub Exploit DB Packet Storm |
| 254242 | 7.5 | 危険 | サン・マイクロシステムズ サイバートラスト株式会社 VMware レッドハット |
- | Sun Java SE および OpenJDK における権限を取得される脆弱性 |
CWE-200
情報漏えい |
CVE-2009-3881 | 2010-02-23 11:51 | 2009-11-9 | Show | GitHub Exploit DB Packet Storm |
| 254243 | 5 | 警告 | サン・マイクロシステムズ サイバートラスト株式会社 VMware レッドハット |
- | Sun Java SE および OpenJDK の Abstract Window Toolkit (AWT) における情報漏えいの脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2009-3880 | 2010-02-23 11:51 | 2009-11-9 | Show | GitHub Exploit DB Packet Storm |
| 254244 | 7.5 | 危険 | サン・マイクロシステムズ サイバートラスト株式会社 VMware レッドハット |
- | Sun Java SE および OpenJDK の X11 および Win32GraphicsDevice サブシステムにおける getConfigurations 関数による配列の複製に関する脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-3879 | 2010-02-23 11:51 | 2009-11-9 | Show | GitHub Exploit DB Packet Storm |
| 254245 | 5 | 警告 | サン・マイクロシステムズ VMware レッドハット |
- | Sun Java SE の TrueType フォント解析機能におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-3729 | 2010-02-23 11:51 | 2009-11-9 | Show | GitHub Exploit DB Packet Storm |
| 254246 | 5 | 警告 | アップル サイバートラスト株式会社 VMware サン・マイクロシステムズ レッドハット |
- | Sun Java SE および OpenJDK の Java Runtime Environment (JRE) における ディレクトリトラバーサルの脆弱性 |
CWE-22
パス・トラバーサル |
CVE-2009-3728 | 2010-02-23 11:51 | 2009-11-9 | Show | GitHub Exploit DB Packet Storm |
| 254247 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer における任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2010-0248 | 2010-02-22 12:15 | 2010-01-21 | Show | GitHub Exploit DB Packet Storm |
| 254248 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer における任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2010-0244 | 2010-02-22 12:15 | 2010-01-21 | Show | GitHub Exploit DB Packet Storm |
| 254249 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer の URL 検証における任意のローカルプログラムを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2010-0027 | 2010-02-22 12:15 | 2010-01-21 | Show | GitHub Exploit DB Packet Storm |
| 254250 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer における任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2010-0247 | 2010-02-22 12:14 | 2010-01-21 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 8, 2026, 4:54 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 212571 | 8.8 |
HIGH
Network |
dahuasecurity |
ipc-hdw1x2x_firmware ipc-hfw1x2x_firmware ipc-hdw2x2x_firmware ipc-hfw2x2x_firmware ipc-hdw4x2x_firmware ipc-hfw4x2x_firmware ipc-hdbw4x2x_firmware ipc-hdw5x2x_firmware ipc-hf… |
Some of Dahua's Debug functions do not have permission separation. Low-privileged users can use the Debug function after logging in. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC… |
CWE-276
Incorrect Default Permissions |
CVE-2019-9679 | 2024-11-21 13:52 | 2019-09-19 | Show | GitHub Exploit DB Packet Storm |
| 212572 | 7.5 |
HIGH
Network |
dahuasecurity |
ipc-hdw1x2x_firmware ipc-hfw1x2x_firmware ipc-hdw2x2x_firmware ipc-hfw2x2x_firmware ipc-hdw4x2x_firmware ipc-hfw4x2x_firmware ipc-hdbw4x2x_firmware ipc-hdw5x2x_firmware ipc-hf… |
Some Dahua products have the problem of denial of service during the login process. An attacker can cause a device crashed by constructing a malicious packet. Affected products include: IPC-HDW1X2X,I… |
NVD-CWE-noinfo
|
CVE-2019-9678 | 2024-11-21 13:52 | 2019-09-19 | Show | GitHub Exploit DB Packet Storm |
| 212573 | 9.8 |
CRITICAL
Network |
dahuasecurity |
ipc-hdw1x2x_firmware ipc-hfw1x2x_firmware ipc-hdw2x2x_firmware ipc-hfw2x2x_firmware ipc-hdw4x2x_firmware ipc-hfw4x2x_firmware ipc-hdbw4x2x_firmware ipc-hdw5x2x_firmware ipc-hf… |
The specific fields of CGI interface of some Dahua products are not strictly verified, an attacker can cause a buffer overflow by constructing malicious packets. Affected products include: IPC-HDW1X2… |
CWE-120
Classic Buffer Overflow |
CVE-2019-9677 | 2024-11-21 13:52 | 2019-09-19 | Show | GitHub Exploit DB Packet Storm |
| 212574 | 5.3 |
MEDIUM
Network |
dahuasecurity |
ipc-hdw1x2x_firmware ipc-hfw1x2x_firmware ipc-hdw2x2x_firmware ipc-hfw2x2x_firmware ipc-hdw4x2x_firmware ipc-hfw4x2x_firmware ipc-hdbw4x2x_firmware ipc-hdw5x2x_firmware ipc-hf… |
Online upgrade information in some firmware packages of Dahua products is not encrypted. Attackers can obtain this information by analyzing firmware packages by specific means. Affected products incl… |
CWE-311
Missing Encryption of Sensitive Data |
CVE-2019-9681 | 2024-11-21 13:52 | 2019-09-18 | Show | GitHub Exploit DB Packet Storm |
| 212575 | 9.8 |
CRITICAL
Network |
libreoffice opensuse |
libreoffice leap |
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice… |
CWE-417
Channel and Path Errors |
CVE-2019-9855 | 2024-11-21 13:52 | 2019-09-7 | Show | GitHub Exploit DB Packet Storm |
| 212576 | 7.8 |
HIGH
Local |
libreoffice redhat debian canonical opensuse fedoraproject |
libreoffice enterprise_linux debian_linux ubuntu_linux leap fedora |
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to … |
CWE-22
Path Traversal |
CVE-2019-9854 | 2024-11-21 13:52 | 2019-09-7 | Show | GitHub Exploit DB Packet Storm |
| 212577 | 6.5 |
MEDIUM
Network |
symantec | management_center | An information disclosure vulnerability in the Management Center (MC) REST API 2.0, 2.1, and 2.2 prior to 2.2.2.1 allows a malicious authenticated user to obtain passwords for external backup and CPL… |
NVD-CWE-noinfo
|
CVE-2019-9697 | 2024-11-21 13:52 | 2019-08-30 | Show | GitHub Exploit DB Packet Storm |
| 212578 | 9.8 |
CRITICAL
Network |
lexmark |
cs31x_firmware cs41x_firmware cx310_firmware ms310_firmware ms312_firmware ms317_firmware ms410_firmware m1140_firmware ms315_firmware ms415_firmware ms417_firmware m… |
Various Lexmark products have a Buffer Overflow (issue 3 of 3). |
CWE-119
Incorrect Access of Indexable Resource ('Range Error') |
CVE-2019-9933 | 2024-11-21 13:52 | 2019-08-29 | Show | GitHub Exploit DB Packet Storm |
| 212579 | 9.8 |
CRITICAL
Network |
lexmark |
cs31x_firmware cs41x_firmware cx310_firmware ms310_firmware ms312_firmware ms317_firmware ms410_firmware m1140_firmware ms315_firmware ms415_firmware ms417_firmware m… |
Various Lexmark products have a Buffer Overflow (issue 2 of 3). |
CWE-119
Incorrect Access of Indexable Resource ('Range Error') |
CVE-2019-9932 | 2024-11-21 13:52 | 2019-08-29 | Show | GitHub Exploit DB Packet Storm |
| 212580 | 7.5 |
HIGH
Network |
lexmark |
cs31x_firmware cs41x_firmware cx310_firmware ms310_firmware ms312_firmware ms317_firmware ms410_firmware m1140_firmware ms315_firmware ms415_firmware ms417_firmware m… |
Various Lexmark printers contain a denial of service vulnerability in the SNMP service that can be exploited to crash the device. |
NVD-CWE-noinfo
|
CVE-2019-9931 | 2024-11-21 13:52 | 2019-08-29 | Show | GitHub Exploit DB Packet Storm |