|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 18, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 256301 | 10 | 危険 | サイバートラスト株式会社 XEmacs |
- | XEmacs の glyphs-eimage.c における整数オーバーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2009-2688 | 2010-01-12 14:48 | 2009-08-5 | Show | GitHub Exploit DB Packet Storm |
| 256302 | 6.8 | 警告 | IBM | - | IBM WebSphere Application Server (WAS) におけるクロスサイトリクエストフォージェリの脆弱性 |
CWE-352
同一生成元ポリシー違反 |
CVE-2009-2746 | 2010-01-12 14:48 | 2009-11-13 | Show | GitHub Exploit DB Packet Storm |
| 256303 | 5 | 警告 | アップル | - | Apple Safari におけるローカル HTML ファイルを読まれる脆弱性 |
CWE-Other
その他 |
CVE-2009-2842 | 2010-01-7 12:09 | 2009-11-11 | Show | GitHub Exploit DB Packet Storm |
| 256304 | 5.5 | 警告 | シックス・アパート株式会社 | - | Movable Type におけるアクセス制限回避の脆弱性 |
CWE-264
認可・権限・アクセス制御 |
- | 2010-01-6 15:01 | 2010-01-6 | Show | GitHub Exploit DB Packet Storm |
| 256305 | 9.3 | 危険 | マイクロソフト | - | Microsoft Office Word および Open XML File Format Converter における、任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2009-3135 | 2010-01-6 14:44 | 2009-11-10 | Show | GitHub Exploit DB Packet Storm |
| 256306 | 5 | 警告 | トレンドマイクロ 日本電気 Apache Software Foundation 富士通 サイバートラスト株式会社 サン・マイクロシステムズ ヒューレット・パッカード レッドハット |
- | Apache Tomcat の Apache HTTP Server との組合せによるディレクトリトラバーサルの脆弱性 |
CWE-22
パス・トラバーサル |
CVE-2007-0450 | 2010-01-6 14:43 | 2007-03-16 | Show | GitHub Exploit DB Packet Storm |
| 256307 | 9.3 | 危険 | マイクロソフト | - | Microsoft Office Excel および Open XML File Format Converter におけるオブジェクトを含むスプレッドシートの処理に関する任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2009-3133 | 2010-01-5 16:18 | 2009-11-10 | Show | GitHub Exploit DB Packet Storm |
| 256308 | 9.3 | 危険 | マイクロソフト | - | Microsoft Office Excel および Open XML File Format Converter における BIFF レコードの処理に関する任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2009-3130 | 2010-01-5 16:18 | 2009-11-10 | Show | GitHub Exploit DB Packet Storm |
| 256309 | 9.3 | 危険 | マイクロソフト | - | 複数の Microsoft 製品におけるエクセルファイルのフォーマットの処理に関する任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2009-3134 | 2010-01-5 16:18 | 2009-11-10 | Show | GitHub Exploit DB Packet Storm |
| 256310 | 9.3 | 危険 | マイクロソフト | - | 複数の Microsoft 製品における計算式を含むスプレッドシートの処理に関する任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2009-3132 | 2010-01-5 16:18 | 2009-11-10 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 18, 2026, 4:12 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 257281 | 8.8 |
HIGH
Network |
gnu debian |
wget debian_linux |
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doe… |
CWE-119
Incorrect Access of Indexable Resource ('Range Error') |
CVE-2017-13090 | 2024-11-21 12:10 | 2017-10-28 | Show | GitHub Exploit DB Packet Storm |
| 257282 | 8.8 |
HIGH
Network |
gnu debian |
wget debian_linux |
The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to re… |
CWE-119
Incorrect Access of Indexable Resource ('Range Error') |
CVE-2017-13089 | 2024-11-21 12:10 | 2017-10-28 | Show | GitHub Exploit DB Packet Storm |
| 257283 | 7.8 |
HIGH
Local |
advantech | webop | A Heap-Based Buffer Overflow issue was discovered in Advantech WebOP. A maliciously crafted project file may be able to trigger a heap-based buffer overflow, which may crash the process and allow an … |
CWE-119
Incorrect Access of Indexable Resource ('Range Error') |
CVE-2017-12705 | 2024-11-21 12:10 | 2017-10-25 | Show | GitHub Exploit DB Packet Storm |
| 257284 | 9.8 |
CRITICAL
Network |
openmrs | openmrs | The Reporting Compatibility Add On before 2.0.4 for OpenMRS, as distributed in OpenMRS Reference Application before 2.6.1, does not authenticate users when deserializing XML input into ReportSchema o… |
CWE-502
Deserialization of Untrusted Data |
CVE-2017-12796 | 2024-11-21 12:10 | 2017-10-23 | Show | GitHub Exploit DB Packet Storm |
| 257285 | 8.1 |
HIGH
Network |
vip | vip | The VIP.com application for IOS and Android allows remote attackers to obtain sensitive information and hijack the authentication of users via a rogue access point and a man-in-the-middle attack. |
CWE-200
Information Exposure |
CVE-2017-13127 | 2024-11-21 12:10 | 2017-10-21 | Show | GitHub Exploit DB Packet Storm |
| 257286 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response fra… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13088 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 257287 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowin… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13087 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 257288 | 6.8 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decry… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13086 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 257289 | 6.8 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13084 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 257290 | 8.1 |
HIGH
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13082 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |