Browse all 4 CVE security advisories affecting Japan Computer Emergency Response Team Coordination Center (JPCERT/CC). AI-powered Chinese analysis, POCs, and references for each vulnerability.
JPCERT/CC serves as Japan's national computer security incident response team, coordinating vulnerability information and providing security guidance to organizations. The team commonly addresses remote code execution, cross-site scripting, and privilege escalation vulnerabilities across various systems. With only four CVEs currently on record, JPCERT/CC maintains a focused approach to security coordination rather than large-scale incident reporting. The organization emphasizes information sharing and best practices dissemination to strengthen Japan's cybersecurity posture, though it has not been publicly associated with major security incidents like some international counterparts.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-33566 | LogonTracer 安全漏洞 — LogonTracerCWE-943 | 7.5AI | HighAI | 2026-04-27 |
| CVE-2026-33277 | LogonTracer 操作系统命令注入漏洞 — LogonTracerCWE-78 | 9.8AI | CriticalAI | 2026-04-27 |
| CVE-2026-28704 | EmoCheck 代码问题漏洞 — EmocheckCWE-427 | 7.8AI | HighAI | 2026-04-10 |
| CVE-2023-38752 | JPCERT Coordination Center Special Interest Group Network for Analysis and Liaison 安全漏洞 — Special Interest Group Network for Analysis and Liaison | 4.3 | - | 2023-08-09 |
This page lists every published CVE security advisory associated with Japan Computer Emergency Response Team Coordination Center (JPCERT/CC). Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.