Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 22, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
251511 4.3 警告 Craig Barratt - BackupPC の View.pm におけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2011-4923 2012-02-21 16:41 2012-02-18 Show GitHub Exploit DB Packet Storm
251512 9.3 危険 TYPO3 Association - TYPO3 の workspaces system エクステンションにおける PHP リモートファイルインクルージョンの脆弱性 CWE-94
コード・インジェクション
CVE-2011-4614 2012-02-21 16:40 2011-12-16 Show GitHub Exploit DB Packet Storm
251513 4.3 警告 Craig Barratt - BackupPC の CGI/Browse.pm におけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2011-3361 2012-02-21 16:34 2012-02-18 Show GitHub Exploit DB Packet Storm
251514 7.5 危険 Earl Miles - Drupal 用 Views モジュールにおける SQL インジェクションの脆弱性 CWE-89
SQLインジェクション
CVE-2011-4113 2012-02-21 16:33 2012-02-17 Show GitHub Exploit DB Packet Storm
251515 2.1 注意 Robert Ancell - LightDM における任意のファイルの所有権を変更される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2011-4105 2012-02-21 16:26 2012-02-17 Show GitHub Exploit DB Packet Storm
251516 6.4 警告 マイクロソフト - Microsoft Windows Server 2008 における無効なドメイン名の継続的な名前解決を可能にされる脆弱性 CWE-Other
その他
CVE-2012-1194 2012-02-21 16:25 2012-02-17 Show GitHub Exploit DB Packet Storm
251517 6.4 警告 PowerDNS - PowerDNS における無効なドメイン名の継続的な名前解決を可能にされる脆弱性 CWE-DesignError
CVE-2012-1193 2012-02-21 16:24 2012-02-17 Show GitHub Exploit DB Packet Storm
251518 6.4 警告 Stichting NLnet Labs - Unbound における無効なドメイン名の継続的な名前解決を可能にされる脆弱性 CWE-DesignError
CVE-2012-1192 2012-02-21 16:22 2012-02-17 Show GitHub Exploit DB Packet Storm
251519 6.4 警告 Daniel J. Bernstein - Daniel J. Bernstein djbdns における無効なドメイン名の継続的な名前解決を可能にされる脆弱性 CWE-20
CWE-DesignError
CVE-2012-1191 2012-02-21 16:20 2012-02-17 Show GitHub Exploit DB Packet Storm
251520 5 警告 PowerDNS - PowerDNS Authoritative Server の common_startup.cc におけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2012-0206 2012-02-21 15:50 2012-01-10 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 23, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
258031 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response fra… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13088 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258032 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowin… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13087 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258033 6.8 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decry… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13086 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258034 6.8 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, … CWE-330
 Use of Insufficiently Random Values
CVE-2017-13084 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258035 8.1 HIGH
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing … CWE-330
 Use of Insufficiently Random Values
CVE-2017-13082 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258036 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio ran… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13081 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258037 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13080 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258038 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio rang… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13079 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258039 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points … CWE-330
 Use of Insufficiently Random Values
CVE-2017-13078 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
258040 6.8 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, dec… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13077 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm