Font Size Change

HOMEIT SecurityMeasures for Information Security VulnerabilitiesQuarterly ReportsVulnerability Countermeasure Information Database JVN iPedia Registration Status [2018 1st Quarter (Jan. - Mar.)]


IT Security

Vulnerability Countermeasure Information Database JVN iPedia Registration Status [2018 1st Quarter (Jan. - Mar.)]

May 25, 2018
IT Security Center

1. 2018 1st Quarter: Vulnerability Countermeasure Information Database JVN iPedia Registration Status

The vulnerability countermeasure information database JVN iPedia ( is endeavoring to become a comprehensive vulnerability database where vulnerability information is aggregated for easy access for IT users. JVN iPedia collects and/or translates the vulnerability information published by 1) domestic software developers, 2) JVN (*1), a vulnerability information portal run by JPCERT/CC and IPA, and 3) NVD (*2), a vulnerability database run by NIST (*3). JVN iPedia has been making vulnerability information available to the public since April 25, 2007.

1-1. Vulnerabilities Registered in 2018/1Q

~ JVN iPedia now stores 81,523 vulnerabilities ~

The summary of the vulnerability information registered to the Japanese version of JVN iPedia during the 1st quarter of 2018 (January 1 to March 31, 2018) is shown in the table below. As of the end of March 2018, the total number of vulnerabilities stored in JVN iPedia is 81,523 (Table 1-1, Figure 1-1).

As for the English version, the total of 1,881 vulnerabilities are available as shown in the lower half of the table.

Table 1-1. Registered Vulnerabilities in 1st Quarter of 2018
  Information Source Registered Cases Cumulative Cases
Japanese Version Domestic Product Developers 2 cases 198 cases
JVN 89 cases 7,953 cases
NVD 3,022 cases 73,372 cases
Total 3,113 cases 81,523 cases
English Version Domestic Product Developers 4 cases 198 cases
JVN 41 cases 1,683 cases
Total 45 cases 1,881 cases

2. Details on JVN iPedia Registered Data

2-1. Types of Vulnerabilities Reported

Figure 2-1 shows the number of vulnerabilities newly added to JVN iPedia during the 1st quarter of 2018, sorted by the CWE vulnerability types.

The type of the vulnerabilities reported most in the 1st quarter is CWE-79 (Cross-Site Scripting) with 414 cases, followed by CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) with 326, CWE-20 (Improper Input Validation) with 326, CWE-200 (Information Exposure) with 274, CWE-89 (SQL Injection) with 255. CWE-79, the most reported vulnerability type this quarter, could allow attackers to redirect users to fake web pages or cause information exposure.

Software developers need to make sure to implement necessary security controls from the planning and design phase of software development to mitigate vulnerability. IPA provides tools and guidelines, such as "How to Secure Your Website" (*4), "Secure Programing Guide" (*5) and "AppGoat" (*6), a hands-on venerability learning tool, for website developers and operators to build secure websites.

2-2. Severity of Vulnerabilities Reported

Figure 2-2 shows the yearly change in the CVSSv2 rating scale based severity of vulnerabilities registered to JVN iPedia.

As for the vulnerabilities added to JVN iPedia in 2018, 30.6 percent are "level III" (7.0 - 10.0), 57.9 percent are "level II" (4.0 – 6.9) and 11.5 percent are "level I" (0.0 – 3.9). This means 88.5 percent of all vulnerabilities registered are level II or higher, which are potentially critical enough to cause damage like information exposure or data modification.

Figure 2-3 shows the yearly change in the CVSSv3 rating scale based severity of vulnerabilities registered to JVN iPedia.

As for the vulnerabilities added to JVN iPedia in 2018, 17.0 percent are "Critical" (9.0 – 10.0), 45.1 percent are "High" (7.0 – 8.9), 36.6 percent are "Medium" (4.0 – 6.9) and 1.3 percent are "Low" (0.1 – 3.9).

To mitigate threats imposed by the known vulnerabilities, IT users should pay close attention to vulnerability information and update software they are using to a fixed version or apply a security patch as soon as possible when they become available.

When a serious vulnerability or attack is reported, IPA issues an emergency security alert. The alerts can be received as soon as they are issued through the service called "icat for JSON" (*7). IT users can also check vulnerabilities newly published on JVN iPeia via RSS feed as well.

2-3. Types of Software Reported with Vulnerability

Figure 2-4 shows the yearly change in the type of software reported with vulnerability. Application vulnerabilities have been published most, accounting for 81.0 percent (2,520 out of 3,113) of the 2018 total.

Since 2007, vulnerability in industrial control systems (ICS) used in critical infrastructure sectors has started to be added to JVN iPedia. As of March 2018, the total of 1,318 ICS vulnerabilities have been registered (Figure 2-5).

2-4. Products Reported with Vulnerability

Table 2-1 lists the top 20 software whose vulnerabilities were most registered to JVN iPedia during the 1st quarter (January to March) of 2018. A lot of Linux OS vulnerabilities were published, such as Debian GNU/Linux (ranked 1st with 117 vulnerabilities) and Linux Kernel (ranked 4th with 50 vulnerabilities).

Besides those in the top 20 list, JVN iPedia stores vulnerabilities about a variety of software used in office and at home. IPA hopes software developers and users will make good use of JVN iPedia to efficiently check vulnerability information about the software they are using and take necessary action in a timely manner (*8).

Table 2-1. Top 20 Software Products Vulnerabilities Were Most Registered [Jan. – Mar. 2018]
RankCategoryProduct Name (Vendor) Number of
1 OS Debian GNU/Linux (Debian) 117
2 OS Android (Google) 104
3 ERP Package HPE Intelligent Management Center
(Hewlett Packard Enterprise)
4 OS Linux Kernel (Linux) 50
5 Browser Microsoft Edge (Microsoft) 46
6 PDF Viewer Foxit Reader (Foxit Software Inc) 43
6 Execution Environment ChakraCore (Microsoft) 43
8 PDF Viewer Adobe Reader (Adobe Systems) 39
8 PDF Viewer/Editor Adobe Acrobat DC (Adobe Systems) 39
8 PDF Viewer Adobe Acrobat Reader DC (Adobe Systems) 39
8 PDF Viewer/Editor Adobe Acrobat (Adobe Systems) 39
12 Firmware DP300 Firmware (Huawei) 36
13 OS Microsoft Windows 10 (Microsoft) 35
14 OS Microsoft Windows Server Version 1709 (Microsoft) 32
14 Firmware TE30 Firmware (Huawei) 32
16 Firmware RP200 Firmware (Huawei) 31
16 Image Processing ImageMagick (ImageMagic) 31
18 Security Software K7 Antivirus (K7 Computing) 29
18 OS Microsoft Windows Server 2016 (Microsoft) 29
18 Network Analyzer Wireshark (Wireshark) 29

3. Most Accessed Vulnerability Countermeasure Information

Table 3-1 lists the top 20 most accessed vulnerability information in JVN iPedia during the 1st quarter of 2018 (January – March).

The 1st ranked vulnerabilities, collectively named “Meltdown” and “Specter”, could affect a wide variety of products and drew lots of attention. The 4th tanked vulnerability in Oracle WebLogic Server was first published in October 2017, but is still ranked in the top 5 this quarter. Since attacks that exploited this vulnerability were observed in late December 2017, IPA issued an emergency security alert in January 2018 (*9), making it a high-profile vulnerability in 2018 as well.

Table 3-1. Top 20 Most Accessed Vulnerability Countermeasure Information in JVN iPedia [Jan. – Mar. 2018]
1 JVNDB-2018-001001 Side channel attacks to CPU (in Japanese only) 4.4 4.7 2018/1/4 18,016
2 JVNDB-2018-000001 Lhaplus vulnerable to improper verification when expanding ZIP64 archives 4.3 3.3 2018/1/11 8,171
3 JVNDB-2018-000008 Spring Security and Spring Framework vulnerable to authentication bypass 5.0 5.3 2018/2/2 7,070
4 JVNDB-2017-008734 Vulnerability in WLS Security in Oracle WebLogic Server in Oracle Fusion Middleware (in Japanese only) 7.5 9.8 2017/10/26 6,137
5 JVNDB-2018-000013 Insecure DLL Loading issue in multiple Trend Micro products 6.8 7.8 2018/2/15 6,111
6 JVNDB-2018-001570 Updates released for multiple vulnerabilities in Apache Tomcat (in Japanese only) N/A N/A 2018/2/26 5,286
7 JVNDB-2018-000003 GroupSession vulnerable to open redirect 2.6 4.7 2018/1/19 4,735
7 JVNDB-2018-000002 Nootka App for Android vulnerable to OS command injection 5.1 7.5 2018/1/19 4,735
9 JVNDB-2018-001389 XXE Vulnerability in Hitachi Device Manager 7.8 7.4 2018/2/14 4,676
10 JVNDB-2018-000009 The installer of Anshin net security for Windows may insecurely load Dynamic Link Libraries 6.8 7.8 2018/2/6 4,475
11 JVNDB-2018-001388 Multiple Vulnerabilities in Hitachi Command Suite 5.8 6.1 2018/2/14 4,444
12 JVNDB-2017-000247 Qt for Android environment variables alteration 5.1 5.3 2017/12/11 4,437
13 JVNDB-2017-000241 Multiple vulnerabilities in Wireless mobile storage "Digizo ShAirDisk" PTW-WMS1 10.0 9.8 2017/11/30 4,415
14 JVNDB-2018-000014 Application and self-extracting archive containing the application of "FLET'S v4/v6 address selection tool" may insecurely load Dynamic Link Libraries 6.8 7.8 2018/2/13 4,398
15 JVNDB-2017-000238 Robotic appliance COCOROBO vulnerable to session management 4.3 4.6 2017/11/16 4,384
16 JVNDB-2018-000017 Multiple vulnerabilities in WXR-1900DHP2 8.3 8.8 2018/2/26 4,372
17 JVNDB-2017-000244 Multiple vulnerabilities in multiple Buffalo broadband routers 4.3 6.1 2017/12/1 4,336
18 JVNDB-2018-000004 The installer of "FLET'S VIRUS CLEAR Easy Setup & Application Tool" and "FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool" may insecurely load Dynamic Link Libraries 6.8 7.8 2018/1/22 4,322
19 JVNDB-2017-000245 The installer of The Public Certification Service for Individuals "The JPKI user's software" may insecurely load Dynamic Link Libraries 6.8 7.8 2017/12/6 4,297
20 JVNDB-2017-009884 QND Advance/Standard vulnerable to directory traversal 9.4 9.1 2017/11/28 4,277

Table 3-2 lists the top 5 most accessed vulnerability information among those reported by domestic product developers.

Table 3-2. Top 5 Most Accessed Vulnerabilities Reported by Domestic Developers [Jan. - Mar. 2018]
1 JVNDB-2017-010236 Cross-site Scripting Vulnerability in Fujitsu NetCOBOL 3.5 4.8 2017/12/8 3,987
2 JVNDB-2017-004687 Cross-site Scripting Vulnerability in Fujitsu Interstage List Works 4.3 6.1 2017/7/5 3,785
3 JVNDB-2017-010275 Cross-site Scripting Vulnerability in JP1/Service Support and JP1/Integrated Management - Service Support 3.5 4.1 2017/12/11 3,402
4 JVNDB-2017-010043 Cross-site Scripting Vulnerability in JP1/Operations Analytics 3.5 4.1 2017/12/1 3,294
5 JVNDB-2017-008411 XXE Vulnerability in Hitachi Command Suite 7.5 8.1 2017/10/18 3,247

Note 1) Color Code for CVSSv2 Severity Rating Scale

CVSS Base Score = 0.0~3.9
Severity = Level I (Low)
CVSS Base Score = 4.0~6.9
Severity = Level II (Medium)
CVSS Base Score = 7.0~10.0
Severity = Level III (High)

Note 2) Color Code for CVSSv3 Severity Rating Scale

CVSS Base Score =
Severity = Low
CVSS Base Score =
Severity = Medium
CVSS Base Score =
Severity = High
CVSS Base Score =
Severity = Critical

Note 3) Color Code for Published Date

Published in 2016 or before Published in 2017 Published in 2018


(*1) Japan Vulnerability Notes: A portal for vulnerability countermeasure information including information on vendor response to the reported vulnerabilities and security support. Operated in the collaboration of IPA and JPCERT/CC.

(*2) National Vulnerability Database: A vulnerability database operated by NIST.

(*3) National Institute of Standards and Technology: A U.S federal agency that develops and promotes measurement, standards and technology.

(*4) How to Secure Your Websites (latest version in Japanese only )

(*5) Secure Programing Guide (in Japanese only)

(*6) AppGoat (in Japanese only)

(*7) IPA Cyber Security Alert Service "icat for JSON" (in Japanese only)

(*8) IPA Technical Watch - Daily Practice Guide: Tips on Vulnerability Management
The guide gives tips on how to efficiently and efficiently collect and leverage vulnerability information. (in Japanese only)

(*9) Oracle WebLogic Server Vulnerability (CVE-2017-10271): Attacks eploiting this vulnerability have been reported (in Japanese only)

Past Quarterly Reports


IT Security Center,
Information-technology Promotion Agency, Japan (ISEC/IPA)