|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 23, 2026, 4 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 256421 | 9.3 | 危険 | アップル | - | Windows 上で稼働する Apple QuickTime における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2010-0536 | 2010-04-26 16:59 | 2010-03-31 | Show | GitHub Exploit DB Packet Storm |
| 256422 | 9.3 | 危険 | アップル | - | Windows 上で稼働する Apple QuickTime の QuickTime.qts における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2010-0529 | 2010-04-26 16:59 | 2010-03-31 | Show | GitHub Exploit DB Packet Storm |
| 256423 | 9.3 | 危険 | アップル | - | Windows 上で稼働する Apple QuickTime における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2010-0528 | 2010-04-26 16:58 | 2010-03-31 | Show | GitHub Exploit DB Packet Storm |
| 256424 | 9.3 | 危険 | アップル | - | Apple QuickTime における整数オーバーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2010-0527 | 2010-04-26 16:58 | 2010-03-31 | Show | GitHub Exploit DB Packet Storm |
| 256425 | 5 | 警告 | アップル サイバートラスト株式会社 Ruby-lang.org レッドハット |
- | Ruby の BigDecimal ライブラリにおけるサービス運用妨害 (DoS) の脆弱性 |
CWE-189
数値処理の問題 |
CVE-2009-1904 | 2010-04-26 16:46 | 2009-06-9 | Show | GitHub Exploit DB Packet Storm |
| 256426 | 6.9 | 警告 | アップル Vim |
- | Vim の Python インターフェースの src/if_python.c における信頼性のない検索パスの脆弱性 |
CWE-Other
その他 |
CVE-2009-0316 | 2010-04-26 16:45 | 2009-01-28 | Show | GitHub Exploit DB Packet Storm |
| 256427 | 9.3 | 危険 | アップル サイバートラスト株式会社 Vim レッドハット |
- | Vim におけるエスケープ文字を適切に処理しないことに関する任意のコマンドを実行される脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2008-4101 | 2010-04-26 16:45 | 2008-10-9 | Show | GitHub Exploit DB Packet Storm |
| 256428 | 9.3 | 危険 | アップル サイバートラスト株式会社 Vim レッドハット |
- | Vim における適切に入力をサニタイズしないことに関する任意のコードを実行される脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2008-2712 | 2010-04-26 16:45 | 2008-10-9 | Show | GitHub Exploit DB Packet Storm |
| 256429 | 4.3 | 警告 | VMware | - | VMware Server の WebAccess におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2010-1193 | 2010-04-21 17:54 | 2010-03-29 | Show | GitHub Exploit DB Packet Storm |
| 256430 | 7.5 | 危険 | VMware | - | 複数の VMware 製品の WebAccess におけるリクエストの発信元を偽装される脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2010-0686 | 2010-04-21 17:53 | 2010-03-29 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 23, 2026, 4:08 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 258031 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response fra… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13088 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258032 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowin… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13087 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258033 | 6.8 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decry… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13086 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258034 | 6.8 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13084 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258035 | 8.1 |
HIGH
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13082 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258036 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio ran… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13081 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258037 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13080 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258038 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio rang… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13079 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258039 | 5.3 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13078 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |
| 258040 | 6.8 |
MEDIUM
Adjacent |
debian freebsd canonical opensuse redhat w1.fi suse |
debian_linux freebsd ubuntu_linux leap enterprise_linux_server enterprise_linux_desktop hostapd wpa_supplicant linux_enterprise_server linux_enterprise_desktop openstack… |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, dec… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13077 | 2024-11-21 12:10 | 2017-10-17 | Show | GitHub Exploit DB Packet Storm |