|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 11, 2026, 12:16 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 252091 | 9.3 | 危険 | アドビシステムズ ターボリナックス |
- | Adobe Reader および Acrobat における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2011-2103 | 2011-06-29 12:10 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252092 | 9.3 | 危険 | アドビシステムズ ターボリナックス |
- | Adobe Reader および Acrobat におけるアクセス制限を回避される脆弱性 |
CWE-noinfo
情報不足 |
CVE-2011-2102 | 2011-06-29 12:08 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252093 | 9.3 | 危険 | アドビシステムズ ターボリナックス |
- | Adobe Reader および Acrobat におけるバッファオーバーフローの脆弱性 |
CWE-94
コード・インジェクション |
CVE-2011-2101 | 2011-06-29 12:07 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252094 | 6.9 | 警告 | アドビシステムズ ターボリナックス |
- | Windows 上で稼働する Adobe Reader および Acrobat における権限昇格の脆弱性 |
CWE-Other
その他 |
CVE-2011-2100 | 2011-06-29 12:06 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252095 | 9.3 | 危険 | アドビシステムズ ターボリナックス |
- | Adobe Reader および Acrobat における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2011-2099 | 2011-06-29 12:05 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252096 | 9.3 | 危険 | アドビシステムズ ターボリナックス |
- | Adobe Reader および Acrobat における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2011-2098 | 2011-06-29 12:04 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252097 | 9.3 | 危険 | アドビシステムズ ターボリナックス |
- | Adobe Reader および Acrobat におけるバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2011-2097 | 2011-06-29 12:02 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252098 | 9.3 | 危険 | アドビシステムズ ターボリナックス |
- | Adobe Reader および Acrobat におけるヒープベースのバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2011-2096 | 2011-06-29 12:00 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252099 | 9.3 | 危険 | アドビシステムズ ターボリナックス |
- | Adobe Reader および Acrobat におけるバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2011-2095 | 2011-06-29 11:55 | 2011-06-14 | Show | GitHub Exploit DB Packet Storm |
| 252100 | 4 | 警告 | アップル サイバートラスト株式会社 MySQL AB ターボリナックス レッドハット |
- | MySQL におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-189
数値処理の問題 |
CVE-2010-3835 | 2011-06-29 10:25 | 2010-09-10 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 11, 2026, 4:09 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 255401 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio ran… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13081 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255402 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13080 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255403 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio rang… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13079 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255404 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13078 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255405 | 6.8 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, dec… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13077 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255406 | 5.3 |
MEDIUM
Network |
silverstripe | silverstripe | Response discrepancy in the login and password reset forms in SilverStripe CMS before 3.5.5 and 3.6.x before 3.6.1 allows remote attackers to enumerate users via timing attacks. |
CWE-200
Information Exposure |
CVE-2017-12849 | 2024-11-21 12:10 | 2017-10-13 | Show | GitHub Exploit DB Packet Storm |
| 255407 | 9.8 |
CRITICAL
Network |
epson | easymp | The Epson "EasyMP" software is designed to remotely stream a users computer to supporting projectors.These devices are authenticated using a unique 4-digit code, displayed on-screen - ensuring only t… |
CWE-521
Weak Password Requirements |
CVE-2017-12861 | 2024-11-21 12:10 | 2017-10-10 | Show | GitHub Exploit DB Packet Storm |
| 255408 | 9.8 |
CRITICAL
Network |
epson | easymp | The Epson "EasyMP" software is designed to remotely stream a users computer to supporting projectors.These devices are authenticated using a unique 4-digit code, displayed on-screen - ensuring only t… |
CWE-798
Use of Hard-coded Credentials |
CVE-2017-12860 | 2024-11-21 12:10 | 2017-10-10 | Show | GitHub Exploit DB Packet Storm |
| 255409 | 9.8 |
CRITICAL
Network |
qnap | music_station | QNAP discovered a number of command injection vulnerabilities found in Music Station versions 4.8.6 (for QTS 4.2.x), 5.0.7 (for QTS 4.3.x), and earlier. If exploited, these vulnerabilities may allow … |
CWE-77
Command Injection |
CVE-2017-13069 | 2024-11-21 12:10 | 2017-10-7 | Show | GitHub Exploit DB Packet Storm |
| 255410 | 7.5 |
HIGH
Network |
qnap | qts_helpdesk | QNAP has already patched this vulnerability. This security concern allows a remote attacker to perform an SQL injection on the application and obtain Helpdesk application information. A remote attack… |
CWE-89
SQL Injection |
CVE-2017-13068 | 2024-11-21 12:10 | 2017-10-7 | Show | GitHub Exploit DB Packet Storm |