|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 12, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 255081 | 5 | 警告 | オラクル | - | BEA Product Suite の WebLogic Server コンポーネントにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0068 | 2010-02-15 19:32 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 255082 | 4.3 | 警告 | オラクル | - | Oracle Application Server の J2EE コンポーネントにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0070 | 2010-02-15 19:31 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 255083 | 5 | 警告 | オラクル | - | Oracle Application Server の J2EE コンポーネントにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0067 | 2010-02-15 19:31 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 255084 | 5 | 警告 | オラクル | - | Oracle Application Server の Access Manager Identity Server コンポーネントにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-0066 | 2010-02-15 19:31 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 255085 | 7.8 | 危険 | サイバートラスト株式会社 Linux レッドハット |
- | Linux kernel の e1000_clean_rx_irq 関数における整数アンダーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2009-1385 | 2010-02-15 11:03 | 2009-06-4 | Show | GitHub Exploit DB Packet Storm |
| 255086 | 4.6 | 警告 | サイバートラスト株式会社 Todd C. Miller |
- | sudo の Perl スクリプト実行時における権限昇格の脆弱性 | - | CVE-2005-4158 | 2010-02-15 11:03 | 2005-11-8 | Show | GitHub Exploit DB Packet Storm |
| 255087 | 1 | 注意 | オラクル | - | Oracle Database および Oracle Application Server の Unzip コンポーネントにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-3412 | 2010-02-12 12:22 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 255088 | 3.2 | 注意 | オラクル | - | Oracle Database の Oracle Spatial コンポーネントにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-3413 | 2010-02-12 12:22 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 255089 | 3.6 | 注意 | オラクル | - | Oracle Database の RDBMS コンポーネントにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-3410 | 2010-02-12 12:21 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 255090 | 4 | 警告 | オラクル | - | Oracle Database の Logical Standby コンポーネントにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-1996 | 2010-02-12 12:21 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 12, 2026, 5:06 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 255591 | 9.8 |
CRITICAL
Network |
openmrs | openmrs | The Reporting Compatibility Add On before 2.0.4 for OpenMRS, as distributed in OpenMRS Reference Application before 2.6.1, does not authenticate users when deserializing XML input into ReportSchema o… |
CWE-502
Deserialization of Untrusted Data |
CVE-2017-12796 | 2024-11-21 12:10 | 2017-10-23 | Show | GitHub Exploit DB Packet Storm |
| 255592 | 8.1 |
HIGH
Network |
vip | vip | The VIP.com application for IOS and Android allows remote attackers to obtain sensitive information and hijack the authentication of users via a rogue access point and a man-in-the-middle attack. |
CWE-200
Information Exposure |
CVE-2017-13127 | 2024-11-21 12:10 | 2017-10-21 | Show | GitHub Exploit DB Packet Storm |
| 255593 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response fra… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13088 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255594 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowin… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13087 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255595 | 6.8 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decry… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13086 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255596 | 6.8 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13084 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255597 | 8.1 |
HIGH
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13082 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255598 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio ran… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13081 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255599 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13080 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 255600 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio rang… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13079 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |