|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 17, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 224691 | 7.5 | 危険 | Digineo | - | Ruby 用 Thumbshooter gem の lib/thumbshooter.rb における任意のコマンドを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2013-1898 | 2013-04-11 19:42 | 2013-03-25 | Show | GitHub Exploit DB Packet Storm |
| 224692 | 7.5 | 危険 | Dan Kubb | - | Ruby 用 extlib gem におけるオブジェクトインジェクション攻撃を実行される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2013-1802 | 2013-04-11 19:41 | 2013-01-14 | Show | GitHub Exploit DB Packet Storm |
| 224693 | 7.5 | 危険 | John Nunemaker | - | Ruby 用 httparty gem におけるオブジェクトインジェクション攻撃を実行される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2013-1801 | 2013-04-11 19:41 | 2013-01-14 | Show | GitHub Exploit DB Packet Storm |
| 224694 | 7.5 | 危険 | John Nunemaker | - | Ruby 用 crack gem におけるオブジェクトインジェクション攻撃を実行される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2013-1800 | 2013-04-11 19:40 | 2013-01-14 | Show | GitHub Exploit DB Packet Storm |
| 224695 | 7.5 | 危険 | Daniel Harrington | - | Ruby 用 nori gem におけるオブジェクトインジェクション攻撃を実行される脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2013-0285 | 2013-04-11 19:39 | 2013-01-14 | Show | GitHub Exploit DB Packet Storm |
| 224696 | 5 | 警告 | New Relic | - | Ruby Agent における重要な情報を取得される脆弱性 |
CWE-200
情報漏えい |
CVE-2013-0284 | 2013-04-11 19:38 | 2013-02-13 | Show | GitHub Exploit DB Packet Storm |
| 224697 | 6.8 | 警告 | Michael Bleigh and Intridea, Inc. | - | Ruby 用 omniauth-oauth2 gem におけるクロスサイトリクエストフォージェリの脆弱性 |
CWE-352
同一生成元ポリシー違反 |
CVE-2012-6134 | 2013-04-11 19:37 | 2013-02-25 | Show | GitHub Exploit DB Packet Storm |
| 224698 | 5.8 | 警告 | Apache Software Foundation | - | Apache Maven のデフォルト設定におけるサーバになりすまされる脆弱性 |
CWE-16
環境設定 |
CVE-2013-0253 | 2013-04-11 17:36 | 2013-04-2 | Show | GitHub Exploit DB Packet Storm |
| 224699 | 4.3 | 警告 | fedorahosted.org | - | cronie におけるファイル記述子が漏えいする脆弱性 |
CWE-200
情報漏えい |
CVE-2012-6097 | 2013-04-11 17:35 | 2013-01-9 | Show | GitHub Exploit DB Packet Storm |
| 224700 | 2.1 | 注意 | Gluster, Inc. レッドハット |
- | Red Hat Storage の GlusterFS 機能における任意のファイルを上書きされる脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2012-5635 | 2013-04-11 17:35 | 2013-03-28 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 18, 2026, 4:12 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 381 | 9.8 |
CRITICAL
Network |
microsoft |
windows_server_2012 windows_server_2016 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network. Update |
CWE-121
Stack-based Buffer Overflow |
CVE-2026-41089 | 2026-05-16 00:42 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 382 | 7.8 |
HIGH
Local |
microsoft |
windows_server_2012 windows_server_2016 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally. Update |
CWE-416
Use After Free |
CVE-2026-41095 | 2026-05-16 00:40 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 383 | 9.8 |
CRITICAL
Network |
microsoft |
windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2022_23h2 windows_server_2025 |
Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network. Update |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-41096 | 2026-05-16 00:38 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 384 | 6.7 |
MEDIUM
Local |
microsoft |
windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2019 windows_server_2022 windows_server_2022_… |
Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally. Update |
CWE-1329
Reliance on Component That is Not Updateable |
CVE-2026-41097 | 2026-05-16 00:36 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 385 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally. Update |
CWE-416
Use After Free |
CVE-2026-40382 | 2026-05-16 00:32 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 386 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Integer underflow (wrap or wraparound) in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. Update |
CWE-191
Integer Underflow (Wrap or Wraparound) |
CVE-2026-40397 | 2026-05-16 00:28 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 387 | 7.4 |
HIGH
Network |
microsoft | edge_chromium | External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network. Update |
CWE-73 CWE-610 External Control of File Name or Path Externally Controlled Reference to a Resource in Another Sphere |
CVE-2026-41107 | 2026-05-16 00:28 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 388 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Heap-based buffer overflow in Windows Remote Desktop allows an authorized attacker to elevate privileges locally. Update |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-40398 | 2026-05-16 00:27 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 389 | 8.8 |
HIGH
Network |
microsoft | visual_studio_code | Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature ove… Update |
CWE-74
Injection |
CVE-2026-41109 | 2026-05-16 00:27 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 390 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2016 windows_server_2019 w… |
Stack-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges locally. Update |
CWE-121
Stack-based Buffer Overflow |
CVE-2026-40399 | 2026-05-16 00:26 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |