Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 14, 2026, 6:01 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
1671 6.5 警告
Network
Canonical Juju CanonicalのJujuにおける認可に関する脆弱性 CWE-285
不適切な認可
CVE-2026-5412 2026-05-1 10:44 2026-04-10 Show GitHub Exploit DB Packet Storm
1672 7.1 重要
Network
wolfSSL Inc. wolfSSL wolfSSL Inc.のwolfSSLにおける暗号化処理のナンスおよび鍵ペアの再利用に関する脆弱性 CWE-323
暗号化処理のナンスおよび鍵ペアの再利用
CVE-2026-5446 2026-05-1 10:44 2026-04-9 Show GitHub Exploit DB Packet Storm
1673 7.5 重要
Network
wolfSSL Inc. wolfSSL wolfSSL Inc.のwolfSSLにおけるヒープベースのバッファオーバーフローの脆弱性 CWE-122
ヒープオーバーフロー
CVE-2026-5447 2026-05-1 10:44 2026-04-9 Show GitHub Exploit DB Packet Storm
1674 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. AC10 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のAC10 ファームウェアにおける複数の脆弱性 CWE-77
CWE-78
CVE-2026-5547 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
1675 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. AC10 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のAC10 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5548 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
1676 7.5 重要
Network
Shenzhen Tenda Technology Co.,Ltd. AC10 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のAC10 ファームウェアにおける複数の脆弱性 CWE-320
CWE-321
CVE-2026-5549 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
1677 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. AC10 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のAC10 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5550 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
1678 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. m3 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のm3 ファームウェアにおける複数の脆弱性 CWE-119
CWE-120
CVE-2026-5567 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
1679 8.8 重要
Network
Belkin International F9K1122 ファームウェア Belkin InternationalのF9K1122 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5608 2026-05-1 10:44 2026-04-6 Show GitHub Exploit DB Packet Storm
1680 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. I12 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のI12 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5609 2026-05-1 10:44 2026-04-6 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 15, 2026, 4:28 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1131 8.1 HIGH
Network
- - SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the co… New CWE-94
Code Injection
CVE-2026-8430 2026-05-14 00:26 2026-05-13 Show GitHub Exploit DB Packet Storm
1132 7.6 HIGH
Network
- - Heym before 0.0.21 contains a path traversal vulnerability in the file upload endpoint that allows authenticated users to write attacker-controlled files to arbitrary locations by supplying a crafted… New CWE-22
Path Traversal
CVE-2026-45225 2026-05-14 00:26 2026-05-13 Show GitHub Exploit DB Packet Storm
1133 7.1 HIGH
Network
- - Heym before 0.0.21 contains an authorization bypass vulnerability in workflow execution that allows authenticated users to execute arbitrary workflows by referencing victim workflow UUIDs without pro… New CWE-863
 Incorrect Authorization
CVE-2026-45226 2026-05-14 00:26 2026-05-13 Show GitHub Exploit DB Packet Storm
1134 6.5 MEDIUM
Network
- - The The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.9.2.3. This is due to the software allowing users … New CWE-94
Code Injection
CVE-2025-15463 2026-05-14 00:26 2026-05-13 Show GitHub Exploit DB Packet Storm
1135 5.3 MEDIUM
Network
- - Zephyr sockets created with `IPPROTO_TLS_1_3` can still negotiate a TLS 1.2 connection when both TLS versions are enabled in Kconfig, because the socket-level protocol selection is not propagated to … New CWE-757
Algorithm Downgrade
CVE-2026-1677 2026-05-14 00:25 2026-05-11 Show GitHub Exploit DB Packet Storm
1136 5.3 MEDIUM
Network
- - The check user account lock states feature within the email OTP flow fails to validate user input, allowing an attacker to infer the existence of registered user accounts. The discovery of valid use… New CWE-204
 Response Discrepancy Information Exposure
CVE-2024-0391 2026-05-14 00:25 2026-05-11 Show GitHub Exploit DB Packet Storm
1137 7.3 HIGH
Network
- - Due to a lack of user account state validation during authentication, locked user accounts can be successfully authenticated using Magic Link or Pass Key methods. This bypasses the intended security … New CWE-863
 Incorrect Authorization
CVE-2025-10908 2026-05-14 00:25 2026-05-11 Show GitHub Exploit DB Packet Storm
1138 5.3 MEDIUM
Network
- - In Webhook API invocations, the component accepts user-supplied input for HTTP request headers without sufficient validation or sanitization, allowing these headers to be injected into HTTP responses… New CWE-74
Injection
CVE-2025-8154 2026-05-14 00:25 2026-05-11 Show GitHub Exploit DB Packet Storm
1139 6.3 MEDIUM
Network
- - The software fails to enforce role-based access controls for certain Gateway API invocations. Users with the 'Internal/Everyone' role can invoke these APIs, bypassing intended permission checks. This… New CWE-281
 Improper Preservation of Permissions
CVE-2025-8325 2026-05-14 00:25 2026-05-11 Show GitHub Exploit DB Packet Storm
1140 8.6 HIGH
Network
- - The Magic Link authentication flow accepts multiple invalid authentication requests without adequate rate limiting or resource control, leading to uncontrolled memory usage growth. This vulnerabilit… New CWE-400
 Uncontrolled Resource Consumption
CVE-2025-10470 2026-05-14 00:25 2026-05-11 Show GitHub Exploit DB Packet Storm