Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 7, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
254431 9.3 危険 マイクロソフト - 複数の Microsoft 製品におけるセルに含まれる計算式の処理に関する任意のコードを実行される脆弱性 CWE-94
コード・インジェクション
CVE-2009-3131 2010-01-5 16:17 2009-11-10 Show GitHub Exploit DB Packet Storm
254432 9.3 危険 マイクロソフト - Microsoft Office Excel における任意のコードを実行される脆弱性 CWE-94
コード・インジェクション
CVE-2009-3128 2010-01-5 16:17 2009-11-10 Show GitHub Exploit DB Packet Storm
254433 9.3 危険 マイクロソフト - Microsoft Office および Open XML File Format Converter における任意のコードを実行される脆弱性 CWE-94
コード・インジェクション
CVE-2009-3127 2010-01-5 16:16 2009-11-10 Show GitHub Exploit DB Packet Storm
254434 6.8 警告 アップル
サイバートラスト株式会社
サン・マイクロシステムズ
ターボリナックス
ヒューレット・パッカード
OpenSSL Project
レッドハット
- OpenSSL の SSL_get_shared_ciphers() 関数における一つずれエラーの脆弱性 CWE-189
数値処理の問題
CVE-2007-5135 2010-01-5 13:31 2007-10-12 Show GitHub Exploit DB Packet Storm
254435 7.8 危険 マイクロソフト - Microsoft Windows で稼働している Active Directory の LDAP サービスにおけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2009-1928 2010-01-4 15:24 2009-11-10 Show GitHub Exploit DB Packet Storm
254436 9.3 危険 マイクロソフト - Microsoft Windows の kernel における任意のコードを実行される脆弱性 CWE-94
コード・インジェクション
CVE-2009-2514 2010-01-4 15:24 2009-11-10 Show GitHub Exploit DB Packet Storm
254437 6.8 警告 マイクロソフト - Microsoft Windows の kernel の Graphics Device Interface (GDI) における権限を取得される脆弱性 CWE-20
不適切な入力確認
CVE-2009-2513 2010-01-4 15:24 2009-11-10 Show GitHub Exploit DB Packet Storm
254438 6.8 警告 マイクロソフト - Microsoft Windows の kernel における権限を取得される脆弱性 CWE-20
不適切な入力確認
CVE-2009-1127 2010-01-4 15:24 2009-11-10 Show GitHub Exploit DB Packet Storm
254439 10 危険 マイクロソフト - Microsoft Windows の License Logging Server (llssrv.exe) における任意のコードを実行される脆弱性 CWE-119
バッファエラー
CVE-2009-2523 2010-01-4 15:24 2009-11-10 Show GitHub Exploit DB Packet Storm
254440 9.3 危険 マイクロソフト - Microsoft Windows の Web Services on Devices API (WSDAPI) における任意のコードを実行される脆弱性 CWE-94
コード・インジェクション
CVE-2009-2512 2010-01-4 15:23 2009-11-10 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 7, 2026, 4:22 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
212811 7.5 HIGH
Network
eq-3 homematic_ccu2_firmware eQ-3 Homematic CCU2 outdated base software packages allows Denial of Service. CCU2 affected versions: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. NVD-CWE-noinfo
CVE-2019-9582 2024-11-21 13:51 2019-08-15 Show GitHub Exploit DB Packet Storm
212812 8.1 HIGH
Adjacent
google
apple
canonical
debian
opensuse
redhat
huawei
android
mac_os_x
watchos
iphone_os
tvos
ubuntu_linux
debian_linux
leap
enterprise_linux_server
enterprise_linux_for_real_time
enterprise_linux_for_real_time_for_nfv
e…
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This al… CWE-327
 Use of a Broken or Risky Cryptographic Algorithm
CVE-2019-9506 2024-11-21 13:51 2019-08-15 Show GitHub Exploit DB Packet Storm
212813 7.5 HIGH
Network
apple
apache
canonical
debian
synology
fedoraproject
opensuse
redhat
oracle
mcafee
nodejs
swiftnio
traffic_server
ubuntu_linux
debian_linux
skynas
diskstation_manager
vs960hd_firmware
fedora
leap
software_collections
jboss_core_services
enterprise_linux
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-s… CWE-770
 Allocation of Resources Without Limits or Throttling
CVE-2019-9518 2024-11-21 13:51 2019-08-14 Show GitHub Exploit DB Packet Storm
212814 7.5 HIGH
Network
apple
apache
canonical
debian
synology
fedoraproject
opensuse
redhat
oracle
mcafee
netapp
nodejs
swiftnio
traffic_server
http_server
ubuntu_linux
debian_linux
skynas
diskstation_manager
vs960hd_firmware
fedora
leap
software_collections
jboss_core_services
ente…
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without const… CWE-770
 Allocation of Resources Without Limits or Throttling
CVE-2019-9517 2024-11-21 13:51 2019-08-14 Show GitHub Exploit DB Packet Storm
212815 6.5 MEDIUM
Network
apple
apache
canonical
debian
fedoraproject
synology
opensuse
redhat
oracle
mcafee
f5
nodejs
swiftnio
traffic_server
ubuntu_linux
debian_linux
fedora
skynas
diskstation_manager
vs960hd_firmware
leap
software_collections
jboss_core_services
enterprise_linux
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, … CWE-770
 Allocation of Resources Without Limits or Throttling
CVE-2019-9516 2024-11-21 13:51 2019-08-14 Show GitHub Exploit DB Packet Storm
212816 7.5 HIGH
Network
apple
apache
debian
nodejs
swiftnio
traffic_server
debian_linux
node.js
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queu… CWE-400
 Uncontrolled Resource Consumption
CVE-2019-9512 2024-11-21 13:51 2019-08-14 Show GitHub Exploit DB Packet Storm
212817 7.5 HIGH
Network
apple
apache
canonical
debian
synology
fedoraproject
opensuse
redhat
oracle
mcafee
f5
nodejs
swiftnio
traffic_server
ubuntu_linux
debian_linux
skynas
diskstation_manager
vs960hd_firmware
fedora
leap
software_collections
jboss_core_services
enterprise_linux
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the… CWE-770
 Allocation of Resources Without Limits or Throttling
CVE-2019-9515 2024-11-21 13:51 2019-08-14 Show GitHub Exploit DB Packet Storm
212818 7.5 HIGH
Network
apple
apache
debian
canonical
synology
fedoraproject
opensuse
redhat
oracle
mcafee
netapp
f5
nodejs
swiftnio
traffic_server
debian_linux
ubuntu_linux
skynas
diskstation_manager
vs960hd_firmware
fedora
leap
enterprise_linux_workstation
enterprise_linux_server
softwar…
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that shou… CWE-770
 Allocation of Resources Without Limits or Throttling
CVE-2019-9514 2024-11-21 13:51 2019-08-14 Show GitHub Exploit DB Packet Storm
212819 7.5 HIGH
Network
apple
apache
canonical
debian
fedoraproject
synology
opensuse
redhat
oracle
mcafee
f5
nodejs
swiftnio
traffic_server
ubuntu_linux
debian_linux
fedora
skynas
diskstation_manager
vs960hd_firmware
leap
software_collections
jboss_core_services
enterprise_linux
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the st… NVD-CWE-Other
CVE-2019-9513 2024-11-21 13:51 2019-08-14 Show GitHub Exploit DB Packet Storm
212820 7.5 HIGH
Network
apple
apache
canonical
debian
synology
fedoraproject
opensuse
redhat
oracle
mcafee
f5
nodejs
swiftnio
traffic_server
ubuntu_linux
debian_linux
skynas
diskstation_manager
vs960hd_firmware
fedora
leap
software_collections
jboss_core_services
enterprise_linux
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data… CWE-770
 Allocation of Resources Without Limits or Throttling
CVE-2019-9511 2024-11-21 13:51 2019-08-14 Show GitHub Exploit DB Packet Storm