|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 22, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 224361 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer 9 および 10 における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2013-3193 | 2013-08-15 15:50 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224362 | 4.3 | 警告 | マイクロソフト | - | Microsoft Internet Explorer 6 から 10 におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2013-3192 | 2013-08-15 15:48 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224363 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer 9 および 10 における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2013-3191 | 2013-08-15 15:46 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224364 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer 8 から 10 における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2013-3190 | 2013-08-15 15:45 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224365 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer 8 および 9 における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2013-3189 | 2013-08-15 15:44 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224366 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer 8 および 9 における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2013-3188 | 2013-08-15 15:43 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224367 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer 9 および 10 における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2013-3187 | 2013-08-15 15:41 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224368 | 7.6 | 危険 | マイクロソフト | - | Microsoft Internet Explorer 7 から 10 の保護モード機能における特権の昇格の脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2013-3186 | 2013-08-15 15:39 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224369 | 5 | 警告 | マイクロソフト | - | Microsoft Active Directory フェデレーションサービスにおける重要な情報を取得される脆弱性 |
CWE-200
情報漏えい |
CVE-2013-3185 | 2013-08-15 15:38 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
| 224370 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer 7 から 10 における任意のコードを実行される脆弱性 |
CWE-119
バッファエラー |
CVE-2013-3184 | 2013-08-15 15:36 | 2013-08-13 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 23, 2026, 4:08 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 611 | 9.8 |
CRITICAL
Network |
- | - | The TinyZero project thru commit 6652a63c57fa7e5ccde3fc9c598c7176ff15b839 (2025-58-24) contains a critical command injection vulnerability (CWE-78) in its HDFS file operation utilities. The vulnerabi… |
CWE-78
OS Command |
CVE-2026-31226 | 2026-05-20 03:14 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 612 | 8.8 |
HIGH
Local |
microsoft |
365_apps office office_long_term_servicing_channel |
Insufficient granularity of access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally. |
CWE-1220
Insufficient Granularity of Access Control |
CVE-2026-35436 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 613 | 5.5 |
MEDIUM
Local |
microsoft |
365_apps office office_long_term_servicing_channel word |
Files or directories accessible to external parties in Microsoft Office Word allows an unauthorized attacker to disclose information locally. |
CWE-552
Files or Directories Accessible to External Parties |
CVE-2026-35440 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 614 | 8.4 |
HIGH
Local |
microsoft |
365_apps office office_long_term_servicing_channel |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
CWE-416
Use After Free |
CVE-2026-40358 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 615 | 7.8 |
HIGH
Local |
microsoft |
365_apps excel office office_long_term_servicing_channel office_online_server |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
CWE-416
Use After Free |
CVE-2026-40359 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 616 | 7.8 |
HIGH
Local |
microsoft |
365_apps excel office office_long_term_servicing_channel office_online_server |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
CWE-125
Out-of-bounds Read |
CVE-2026-40360 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 617 | 8.4 |
HIGH
Local |
microsoft |
365_apps office office_long_term_servicing_channel word |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
CWE-416
Use After Free |
CVE-2026-40361 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 618 | 7.8 |
HIGH
Local |
microsoft |
365_apps excel office office_long_term_servicing_channel office_online_server |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-40362 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 619 | 8.4 |
HIGH
Local |
microsoft |
365_apps office office_long_term_servicing_channel |
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally. |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-40363 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 620 | 8.4 |
HIGH
Local |
microsoft |
365_apps office office_long_term_servicing_channel word |
Access of resource using incompatible type ('type confusion') in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
CWE-122 CWE-843 CWE-908 Heap-based Buffer Overflow Type Confusion Use of Uninitialized Resource |
CVE-2026-40364 | 2026-05-20 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |