Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 9, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
252581 6.9 警告 Google - Android における Manifest.permission.CAMER および Manifest.permission.AUDIO_RECORD の設定を回避される脆弱性 CWE-94
コード・インジェクション
CVE-2009-2348 2011-02-23 15:19 2009-05-26 Show GitHub Exploit DB Packet Storm
252582 7.5 危険 Google - Android の PackageManagerService クラスにおけるアプリケーションのデータにアクセスされる脆弱性 CWE-287
不適切な認証
CVE-2009-1754 2011-02-23 15:17 2009-05-26 Show GitHub Exploit DB Packet Storm
252583 5 警告 シスコシステムズ - Cisco Adaptive Security Appliances デバイス上で稼働する emWEB におけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2010-4677 2011-02-23 15:14 2011-01-7 Show GitHub Exploit DB Packet Storm
252584 6.8 警告 シスコシステムズ - Cisco Adaptive Security Appliances デバイスにおけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2010-4676 2011-02-23 15:11 2011-01-7 Show GitHub Exploit DB Packet Storm
252585 9 危険 シスコシステムズ - Cisco Adaptive Security Appliances デバイスにおけるサービス運用妨害 (DoS) の脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2010-4675 2011-02-23 15:09 2011-01-7 Show GitHub Exploit DB Packet Storm
252586 7.8 危険 シスコシステムズ - Cisco Adaptive Security Appliances デバイスにおけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2010-4673 2011-02-23 15:05 2011-01-7 Show GitHub Exploit DB Packet Storm
252587 7.8 危険 シスコシステムズ - Cisco Adaptive Security Appliances デバイスにおけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2010-4672 2011-02-23 14:59 2011-01-7 Show GitHub Exploit DB Packet Storm
252588 5 警告 シスコシステムズ - Cisco Adaptive Security Appliances デバイスにおけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2009-5037 2011-02-23 14:56 2011-01-7 Show GitHub Exploit DB Packet Storm
252589 7.8 危険 シスコシステムズ - Cisco Adaptive Security Appliances デバイスにおけるサービス運用妨害 (DoS) の脆弱性 CWE-noinfo
情報不足
CVE-2010-4692 2011-02-23 14:54 2011-01-7 Show GitHub Exploit DB Packet Storm
252590 7.8 危険 シスコシステムズ - Cisco Adaptive Security Appliances デバイスにおけるサービス運用妨害 (DoS) の脆弱性 CWE-noinfo
情報不足
CVE-2010-4691 2011-02-23 14:50 2011-01-7 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 9, 2026, 5:07 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
255171 8.8 HIGH
Network
gnu
debian
wget
debian_linux
The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to re… CWE-119
Incorrect Access of Indexable Resource ('Range Error') 
CVE-2017-13089 2024-11-21 12:10 2017-10-28 Show GitHub Exploit DB Packet Storm
255172 7.8 HIGH
Local
advantech webop A Heap-Based Buffer Overflow issue was discovered in Advantech WebOP. A maliciously crafted project file may be able to trigger a heap-based buffer overflow, which may crash the process and allow an … CWE-119
Incorrect Access of Indexable Resource ('Range Error') 
CVE-2017-12705 2024-11-21 12:10 2017-10-25 Show GitHub Exploit DB Packet Storm
255173 9.8 CRITICAL
Network
openmrs openmrs The Reporting Compatibility Add On before 2.0.4 for OpenMRS, as distributed in OpenMRS Reference Application before 2.6.1, does not authenticate users when deserializing XML input into ReportSchema o… CWE-502
 Deserialization of Untrusted Data
CVE-2017-12796 2024-11-21 12:10 2017-10-23 Show GitHub Exploit DB Packet Storm
255174 8.1 HIGH
Network
vip vip The VIP.com application for IOS and Android allows remote attackers to obtain sensitive information and hijack the authentication of users via a rogue access point and a man-in-the-middle attack. CWE-200
Information Exposure
CVE-2017-13127 2024-11-21 12:10 2017-10-21 Show GitHub Exploit DB Packet Storm
255175 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response fra… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13088 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
255176 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowin… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13087 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
255177 6.8 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decry… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13086 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
255178 6.8 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, … CWE-330
 Use of Insufficiently Random Values
CVE-2017-13084 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
255179 8.1 HIGH
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing … CWE-330
 Use of Insufficiently Random Values
CVE-2017-13082 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm
255180 5.3 MEDIUM
Adjacent
debian
freebsd
canonical
opensuse
redhat
w1.fi
suse
debian_linux
freebsd
ubuntu_linux
leap
enterprise_linux_server
enterprise_linux_desktop
hostapd
wpa_supplicant
linux_enterprise_server
linux_enterprise_desktop
openstack…
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio ran… CWE-330
 Use of Insufficiently Random Values
CVE-2017-13081 2024-11-21 12:10 2017-10-17 Show GitHub Exploit DB Packet Storm