|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 21, 2026, 4 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 2161 | 8.8 |
重要
Adjacent |
Quantum Networks | QN-I-470 Firmware | Quantum NetworksのQN-I-470 Firmwareにおける過度な認証試行の不適切な制限に関する脆弱性 |
CWE-307
過度な認証試行の不適切な制限 |
CVE-2026-41037 | 2026-05-8 12:11 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
| 2162 | 8.8 |
重要
Adjacent |
Quantum Networks | QN-I-470 Firmware | Quantum NetworksのQN-I-470 Firmwareにおける脆弱なパスワードの要求に関する脆弱性 |
CWE-521
脆弱なパスワードポリシー |
CVE-2026-41038 | 2026-05-8 12:11 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
| 2163 | 7.5 |
重要
Network |
Quantum Networks | QN-I-470 Firmware | Quantum NetworksのQN-I-470 Firmwareにおける重要な機能に対する認証の欠如に関する脆弱性 |
CWE-306
重要な機能に対する認証の欠如 解説 |
CVE-2026-41039 | 2026-05-8 12:11 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
| 2164 | 8.8 |
重要
Adjacent |
D-Link Systems, Inc. | DIR-605L ファームウェア | D-Link CorporationのDIR-605L ファームウェアにおけるハードコードされた認証情報の使用に関する脆弱性 |
CWE-798
ハードコードされた認証情報の使用 |
CVE-2026-42372 | 2026-05-8 12:11 | 2026-05-4 | Show | GitHub Exploit DB Packet Storm |
| 2165 | 8.8 |
重要
Adjacent |
D-Link Systems, Inc. | DIR-605L ファームウェア | D-Link CorporationのDIR-605L ファームウェアにおけるハードコードされた認証情報の使用に関する脆弱性 |
CWE-798
ハードコードされた認証情報の使用 |
CVE-2026-42373 | 2026-05-8 12:11 | 2026-05-4 | Show | GitHub Exploit DB Packet Storm |
| 2166 | 8.8 |
重要
Adjacent |
D-Link Systems, Inc. | DIR-600L ファームウェア | D-Link CorporationのDIR-600L ファームウェアにおけるハードコードされた認証情報の使用に関する脆弱性 |
CWE-798
ハードコードされた認証情報の使用 |
CVE-2026-42374 | 2026-05-8 12:11 | 2026-05-4 | Show | GitHub Exploit DB Packet Storm |
| 2167 | 8.8 |
重要
Adjacent |
D-Link Systems, Inc. | DIR-600L ファームウェア | D-Link CorporationのDIR-600L ファームウェアにおけるハードコードされた認証情報の使用に関する脆弱性 |
CWE-798
ハードコードされた認証情報の使用 |
CVE-2026-42375 | 2026-05-8 12:11 | 2026-05-4 | Show | GitHub Exploit DB Packet Storm |
| 2168 | 9.8 |
緊急
Network |
MIYAGAWA (Tatsuhiko Miyagawa) | Plack::Middleware::Session::Cookie | MIYAGAWA (Tatsuhiko Miyagawa)のPlack::Middleware::Session::Cookieにおける検証および完全性チェックを行っていない Cookie への依存に関する脆弱性 |
CWE-565
検証および完全性チェックを行っていない Cookie への依存 |
CVE-2014-125112 | 2026-05-8 12:11 | 2026-03-26 | Show | GitHub Exploit DB Packet Storm |
| 2169 | 7.5 |
重要
Network |
Lobster DATA GmbH | Lobster_pro | Lobster DATA GmbHのLobster_proにおけるXML 外部エンティティの脆弱性 |
CWE-611
XML 外部エンティティ参照の不適切な制限 |
CVE-2024-13971 | 2026-05-8 12:11 | 2026-04-30 | Show | GitHub Exploit DB Packet Storm |
| 2170 | 9.8 |
緊急
Network |
D-Link Systems, Inc. | DIR-1253 Firmware | D-Link CorporationのDIR-1253 Firmwareにおける権限管理に関する脆弱性 |
CWE-269
不適切な権限管理 |
CVE-2025-29165 | 2026-05-8 12:11 | 2026-03-5 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 21, 2026, 4:10 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 1491 | 7.5 |
HIGH
Network |
vllm | vllm | vLLM is an inference and serving engine for large language models (LLMs). From 0.6.1 to before 0.20.0, there is a a Token Injection vulnerability in vLLM’s multimodal processing. Unauthenticated, tex… |
CWE-129
Improper Validation of Array Index |
CVE-2026-44222 | 2026-05-15 00:38 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1492 | 10.0 |
CRITICAL
Network |
vm2_project | vm2 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be usi… |
CWE-94
Code Injection |
CVE-2026-43997 | 2026-05-15 00:37 | 2026-05-14 | Show | GitHub Exploit DB Packet Storm |
| 1493 | 8.5 |
HIGH
Network |
vm2_project | vm2 | vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the all… |
CWE-59
Link Following |
CVE-2026-43998 | 2026-05-15 00:36 | 2026-05-14 | Show | GitHub Exploit DB Packet Storm |
| 1494 | 7.2 |
HIGH
Network |
vm2_project | vm2 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, a sandbox boundary violation in vm2 allows host object identity to cross into the sandbox through host Promise resolution. When a host-s… |
CWE-693
Protection Mechanism Failure |
CVE-2026-44000 | 2026-05-15 00:35 | 2026-05-14 | Show | GitHub Exploit DB Packet Storm |
| 1495 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Integer overflow or wraparound in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
CWE-190 CWE-416 Integer Overflow or Wraparound Use After Free |
CVE-2026-34330 | 2026-05-15 00:27 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1496 | 7.0 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
CWE-362 CWE-416 Race Condition Use After Free |
CVE-2026-34331 | 2026-05-15 00:26 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1497 | 8.0 |
HIGH
Network |
microsoft | windows_server_2025 | Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a network. |
CWE-416
Use After Free |
CVE-2026-34332 | 2026-05-15 00:25 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1498 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
CWE-190 CWE-416 Integer Overflow or Wraparound Use After Free |
CVE-2026-34333 | 2026-05-15 00:25 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1499 | 7.0 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows TCP/IP allows an authorized attacker to elevate privileges locally. |
CWE-362
Race Condition |
CVE-2026-34334 | 2026-05-15 00:23 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1500 | 5.8 |
MEDIUM
Network |
vm2_project | vm2 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, vm2's CallSite wrapper class (intended as a safe wrapper for V8's native CallSite) blocks getThis() and getFunction() to prevent host ob… |
CWE-209
Information Exposure Through an Error Message |
CVE-2026-44002 | 2026-05-15 00:23 | 2026-05-14 | Show | GitHub Exploit DB Packet Storm |