Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 12, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
255141 10 危険 ヒューレット・パッカード - 複数の Symantec 製品の VRTSweb における任意のコードを実行される脆弱性 CWE-287
不適切な認証
CVE-2009-3027 2010-02-1 11:51 2009-12-8 Show GitHub Exploit DB Packet Storm
255142 9.3 危険 KDE project
Glyph & Cog, LLC
GNOME Project
サイバートラスト株式会社
レッドハット
- Xpdf、gpdf および kpdf の FoFiType1::parse 関数における任意のコードを実行される脆弱性 CWE-94
コード・インジェクション
CVE-2009-4035 2010-01-29 09:54 2009-12-16 Show GitHub Exploit DB Packet Storm
255143 7.8 危険 Mozilla Foundation - Mozilla Firefox/SeaMonkey の GeckoActiveXObject 関数における重要な情報を取得される脆弱性 CWE-200
情報漏えい
CVE-2009-3987 2010-01-29 09:54 2009-12-15 Show GitHub Exploit DB Packet Storm
255144 7.6 危険 サイバートラスト株式会社
Mozilla Foundation
レッドハット
- Mozilla Firefox/SeaMonkey における任意の JavaScript を実行される脆弱性 CWE-94
コード・インジェクション
CVE-2009-3986 2010-01-29 09:54 2009-12-15 Show GitHub Exploit DB Packet Storm
255145 6.8 警告 サイバートラスト株式会社
Mozilla Foundation
レッドハット
- Mozilla Firefox/SeaMonkey におけるコンテンツを偽装される脆弱性 CWE-Other
その他
CVE-2009-3985 2010-01-29 09:53 2009-12-15 Show GitHub Exploit DB Packet Storm
255146 6.8 警告 サイバートラスト株式会社
Mozilla Foundation
レッドハット
- Mozilla Firefox/SeaMonkey における http URL または file URL の SSL インジケータを偽装される脆弱性 CWE-Other
その他
CVE-2009-3984 2010-01-29 09:53 2009-12-15 Show GitHub Exploit DB Packet Storm
255147 6.8 警告 サイバートラスト株式会社
Mozilla Foundation
レッドハット
- Mozilla Firefox/SeaMonkey における認証されたリクエストを任意のアプリケーションに送信される脆弱性 CWE-Other
その他
CVE-2009-3983 2010-01-29 09:53 2009-12-15 Show GitHub Exploit DB Packet Storm
255148 9.3 危険 Mozilla Foundation - 複数の Mozilla 製品の libtheora における任意のコードを実行される脆弱性 CWE-189
数値処理の問題
CVE-2009-3389 2010-01-28 12:16 2009-12-15 Show GitHub Exploit DB Packet Storm
255149 9.3 危険 Mozilla Foundation - 複数の Mozilla 製品の liboggplay における任意のコードを実行される脆弱性 CWE-399
リソース管理の問題
CVE-2009-3388 2010-01-28 12:16 2009-12-15 Show GitHub Exploit DB Packet Storm
255150 9.3 危険 Mozilla Foundation - 複数の Mozilla 製品の JavaScript エンジンにおける任意のコードを実行される脆弱性 CWE-noinfo
情報不足
CVE-2009-3982 2010-01-28 12:16 2009-12-15 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 13, 2026, 5:05 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
223081 6.1 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file app\contacts\contact_import.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS. CWE-79
Cross-site Scripting
CVE-2019-16987 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223082 6.5 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file resources\download.php uses an unsanitized "f" variable coming from the URL, which takes any pathname and allows a download of it. (resources\secure_download.php i… CWE-22
Path Traversal
CVE-2019-16986 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223083 6.5 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file app\xml_cdr\xml_cdr_delete.php uses an unsanitized "rec" variable coming from the URL, which is base64 decoded and allows deletion of any file of the system. CWE-22
Path Traversal
CVE-2019-16985 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223084 6.1 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file app\recordings\recording_play.php uses an unsanitized "filename" variable coming from the URL, which is base64 decoded and reflected in HTML, leading to XSS. CWE-79
Cross-site Scripting
CVE-2019-16984 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223085 6.1 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file resources\paging.php has a paging function (called by several pages of the interface), which uses an unsanitized "param" variable constructed partially from the UR… CWE-79
Cross-site Scripting
CVE-2019-16983 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223086 6.1 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file app\access_controls\access_control_nodes.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. CWE-79
Cross-site Scripting
CVE-2019-16982 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223087 6.1 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file app\conference_profiles\conference_profile_params.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to … CWE-79
Cross-site Scripting
CVE-2019-16981 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223088 6.5 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file app/music_on_hold/music_on_hold.php uses an unsanitized "file" variable coming from the URL, which takes any pathname (base64 encoded) and allows a download of it. CWE-22
Path Traversal
CVE-2019-16990 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223089 8.8 HIGH
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file app\call_broadcast\call_broadcast_edit.php uses an unsanitized "id" variable coming from the URL in an unparameterized SQL query, leading to SQL injection. CWE-89
SQL Injection
CVE-2019-16980 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm
223090 6.1 MEDIUM
Network
fusionpbx fusionpbx In FusionPBX up to v4.5.7, the file app\contacts\contact_urls.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. CWE-79
Cross-site Scripting
CVE-2019-16979 2024-11-21 13:31 2019-10-22 Show GitHub Exploit DB Packet Storm