|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 24, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 225611 | 1.9 | 注意 | IBM | - | Windows 上で稼働する IBM WebSphere Application Server におけるバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2013-0541 | 2013-04-25 15:33 | 2013-04-15 | Show | GitHub Exploit DB Packet Storm |
| 225612 | 3.5 | 注意 | IBM | - | IBM WebSphere Application Server の Liberty Profile におけるアクセス制限を回避される脆弱性 |
CWE-287
不適切な認証 |
CVE-2013-0540 | 2013-04-25 15:28 | 2013-04-15 | Show | GitHub Exploit DB Packet Storm |
| 225613 | 1.9 | 注意 | - | Google Authenticator の PAM モジュールにおけるアクセス制限を回避される脆弱性 |
CWE-200
情報漏えい |
CVE-2012-6140 | 2013-04-25 15:19 | 2012-03-28 | Show | GitHub Exploit DB Packet Storm | |
| 225614 | 7.2 | 危険 | ヒューレット・パッカード | - | HP ElitePad 900 の BIOS における BIOS 制限を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2012-5218 | 2013-04-25 15:05 | 2013-04-23 | Show | GitHub Exploit DB Packet Storm |
| 225615 | 6.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1283 | 2013-04-25 10:26 | 2013-04-9 | Show | GitHub Exploit DB Packet Storm |
| 225616 | 7.1 | 危険 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2013-1291 | 2013-04-25 10:24 | 2013-04-9 | Show | GitHub Exploit DB Packet Storm |
| 225617 | 6.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1292 | 2013-04-25 10:23 | 2013-04-9 | Show | GitHub Exploit DB Packet Storm |
| 225618 | 6.9 | 警告 | マイクロソフト | - | 複数の Microsoft Windows 製品の NTFS カーネルモードドライバにおける権限昇格の脆弱性 |
CWE-Other
その他 |
CVE-2013-1293 | 2013-04-25 10:22 | 2013-04-9 | Show | GitHub Exploit DB Packet Storm |
| 225619 | 5 | 警告 | Opus Codec |
- | Google Chrome で使用される Opus の src/opus_decoder.c における整数オーバーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2013-0899 | 2013-04-24 19:13 | 2013-02-21 | Show | GitHub Exploit DB Packet Storm |
| 225620 | 7.5 | 危険 | - | Google Chrome におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2013-0898 | 2013-04-24 19:07 | 2013-02-21 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 25, 2026, 4:01 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 211031 | 9.8 |
CRITICAL
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the cloud1234 password for the a1@chopin account default credentials. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15323 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211032 | 9.8 |
CRITICAL
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the wbboEZ4BN3ssxAfM hardcoded password for the debian-sys-maint account. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15322 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211033 | 9.8 |
CRITICAL
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the axzyxel password for the livedbuser account. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15321 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211034 | 9.8 |
CRITICAL
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the axiros password for the root account. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15320 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211035 | 5.9 |
MEDIUM
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded RSA SSH key for the root account within the /opt/mysql chroot directory tree. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15319 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211036 | 5.9 |
MEDIUM
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded DSA SSH key for the root account within the /opt/mysql chroot directory tree. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15318 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211037 | 5.9 |
MEDIUM
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded RSA SSH key for the root account within the /opt/axess chroot directory tree. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15317 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211038 | 5.9 |
MEDIUM
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded ECDSA SSH key for the root account within the /opt/axess chroot directory tree. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15316 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211039 | 5.9 |
MEDIUM
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded DSA SSH key for the root account within the /opt/axess chroot directory tree. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15315 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |
| 211040 | 5.9 |
MEDIUM
Network |
zyxel | cloudcnm_secumanager | Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded RSA SSH key for the root account. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-15314 | 2024-11-21 14:05 | 2020-06-30 | Show | GitHub Exploit DB Packet Storm |