|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 24, 2026, 4 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 225121 | 7.5 | 危険 | - | Google Chrome におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2013-2841 | 2013-06-13 16:49 | 2013-05-21 | Show | GitHub Exploit DB Packet Storm | |
| 225122 | 7.5 | 危険 | - | Google Chrome のメディアローダにおけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2013-2840 | 2013-06-13 16:48 | 2013-05-21 | Show | GitHub Exploit DB Packet Storm | |
| 225123 | 5 | 警告 | オラクル | - | Oracle Java SE の Java Runtime Environment における Deployment の処理に関する脆弱性 |
CWE-noinfo
情報不足 |
CVE-2013-0449 | 2013-06-13 16:48 | 2013-02-1 | Show | GitHub Exploit DB Packet Storm |
| 225124 | 7.5 | 危険 | - | Google Chrome におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2013-2839 | 2013-06-13 16:47 | 2013-05-21 | Show | GitHub Exploit DB Packet Storm | |
| 225125 | 5 | 警告 | - | Google Chrome で使用される Google V8 におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-119
バッファエラー |
CVE-2013-2838 | 2013-06-13 16:46 | 2013-05-21 | Show | GitHub Exploit DB Packet Storm | |
| 225126 | 5 | 警告 | オラクル | - | Oracle Java SE の Java Runtime Environment におけるライブラリの処理に関する脆弱性 |
CWE-noinfo
情報不足 |
CVE-2013-0448 | 2013-06-13 16:44 | 2013-02-1 | Show | GitHub Exploit DB Packet Storm |
| 225127 | 10 | 危険 | オラクル | - | Oracle Java SE の JavaFX における脆弱性 |
CWE-noinfo
情報不足 |
CVE-2013-0447 | 2013-06-13 16:39 | 2013-02-1 | Show | GitHub Exploit DB Packet Storm |
| 225128 | 7.5 | 危険 | - | Google Chrome の SVG の実装におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2013-2837 | 2013-06-13 16:36 | 2013-05-21 | Show | GitHub Exploit DB Packet Storm | |
| 225129 | 5 | 警告 | シスコシステムズ | - | Cisco Hosted Collaboration Mediation におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2013-3381 | 2013-06-13 16:34 | 2013-06-12 | Show | GitHub Exploit DB Packet Storm |
| 225130 | 4 | 警告 | シスコシステムズ | - | Cisco Secure Access Control System の Access Control Server における重要な情報を取得される脆弱性 |
CWE-200
情報漏えい |
CVE-2013-3380 | 2013-06-13 16:34 | 2013-06-11 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 24, 2026, 4:05 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 1631 | 5.4 |
MEDIUM
Network |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network. |
CWE-125
Out-of-bounds Read |
CVE-2026-35423 | 2026-05-15 03:03 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1632 | 6.5 |
MEDIUM
Network |
pwpush | password_pusher | Password Pusher is an open source application to communicate sensitive information over the web. Prior to versions 1.69.3 and 2.4.2, a security issue in OSS PasswordPusher allowed unauthenticated cre… |
CWE-288 NVD-CWE-noinfo Authentication Bypass Using an Alternate Path or Channel |
CVE-2026-41308 | 2026-05-15 03:03 | 2026-05-9 | Show | GitHub Exploit DB Packet Storm |
| 1633 | 5.5 |
MEDIUM
Local |
gpac | gpac | A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. … |
CWE-400 CWE-770 Uncontrolled Resource Consumption Allocation of Resources Without Limits or Throttling |
CVE-2026-8124 | 2026-05-15 03:02 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 1634 | 7.5 |
HIGH
Network |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Missing release of memory after effective lifetime in Windows Internet Key Exchange (IKE) Protocol allows an unauthorized attacker to deny service over a network. |
CWE-401
Missing Release of Memory after Effective Lifetime |
CVE-2026-35424 | 2026-05-15 03:02 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1635 | 6.5 |
MEDIUM
Network |
8421bit | miniclaw | A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the compone… |
CWE-22
Path Traversal |
CVE-2026-8113 | 2026-05-15 03:02 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 1636 | 9.8 |
CRITICAL
Network |
yarbo |
lawn_mower_firmware lawn_mower_pro_firmware |
A hidden, persistent backdoor was found in Yarbo firmware v2.3.9 that provides remote, unauthenticated (or weakly authenticated) access to privileged functionality. The backdoor is undocumented, cann… |
CWE-912 NVD-CWE-noinfo Hidden Functionality |
CVE-2026-7413 | 2026-05-15 02:54 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 1637 | 9.8 |
CRITICAL
Network |
yarbo |
lawn_mower_firmware lawn_mower_pro_firmware |
Yarbo firmware v2.3.9 contains hardcoded administrative credentials embedded in the firmware image. These credentials are identical across all devices running this firmware and cannot be changed or r… |
CWE-798
Use of Hard-coded Credentials |
CVE-2026-7414 | 2026-05-15 02:53 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 1638 | 7.8 |
HIGH
Local |
microsoft |
windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2025 |
Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. |
CWE-822
Untrusted Pointer Dereference |
CVE-2026-40369 | 2026-05-15 02:52 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1639 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Heap-based buffer overflow in Windows Cryptographic Services allows an authorized attacker to elevate privileges locally. |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-40377 | 2026-05-15 02:52 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1640 | 9.8 |
CRITICAL
Network |
yarbo |
lawn_mower_firmware lawn_mower_pro_firmware |
The MQTT broker embedded in Yarbo firmware v2.3.9 is configured to allow anonymous connections with no topic-level read or write ACLs. Any host on the same network can subscribe to sensitive telemetr… |
CWE-306
Missing Authentication for Critical Function |
CVE-2026-7415 | 2026-05-15 02:50 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |