Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 10, 2026, 10 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2281 9.1 緊急
Network
BMC Software BMC FootPrints ITSM BMC SoftwareのBMC FootPrints ITSMにおける重要な機能に対する認証の欠如に関する脆弱性 CWE-306
重要な機能に対する認証の欠如 解説
CVE-2025-71257 2026-04-24 11:38 2026-03-19 Show GitHub Exploit DB Packet Storm
2282 7.1 重要
Network
BMC Software BMC FootPrints ITSM BMC SoftwareのBMC FootPrints ITSMにおけるサーバサイドのリクエストフォージェリの脆弱性 CWE-918
サーバサイドリクエストフォージェリ
CVE-2025-71258 2026-04-24 11:38 2026-03-19 Show GitHub Exploit DB Packet Storm
2283 7.1 重要
Network
BMC Software BMC FootPrints ITSM BMC SoftwareのBMC FootPrints ITSMにおけるサーバサイドのリクエストフォージェリの脆弱性 CWE-918
サーバサイドリクエストフォージェリ
CVE-2025-71259 2026-04-24 11:38 2026-03-19 Show GitHub Exploit DB Packet Storm
2284 8.8 重要
Network
BMC Software BMC FootPrints ITSM BMC SoftwareのBMC FootPrints ITSMにおける信頼できないデータのデシリアライゼーションに関する脆弱性 CWE-502
信頼性のないデータのデシリアライゼーション
CVE-2025-71260 2026-04-24 11:38 2026-03-19 Show GitHub Exploit DB Packet Storm
2285 6.1 警告
Network
アドビシステムズ Adobe Connect
Adobe Connect Desktop Application
アドビのAdobe Connect等の複数製品におけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2026-21331 2026-04-24 11:38 2026-04-14 Show GitHub Exploit DB Packet Storm
2286 5.4 警告
Network
オラクル PeopleSoft Enterprise HCM Shared Components オラクルのPeoplesoft Enterprise Hcm Shared Componentsにおけるアクセス制御に関する脆弱性 CWE-284
不適切なアクセス制御
CVE-2026-22019 2026-04-24 11:38 2026-04-21 Show GitHub Exploit DB Packet Storm
2287 6.1 警告
Adjacent
Schneider Electric PowerChute Serial Shutdown Schneider Electric のPowerChute Serial Shutdownにおけるパストラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2026-2399 2026-04-24 11:38 2026-04-14 Show GitHub Exploit DB Packet Storm
2288 4.3 警告
Network
Schneider Electric PowerChute Serial Shutdown Schneider Electric のPowerChute Serial ShutdownにおけるCRLF インジェクションの脆弱性 CWE-93
CRLF インジェクション
CVE-2026-2400 2026-04-24 11:38 2026-04-14 Show GitHub Exploit DB Packet Storm
2289 5 警告
Local
Schneider Electric PowerChute Serial Shutdown Schneider Electric のPowerChute Serial Shutdownにおけるログファイルからの情報漏えいに関する脆弱性 CWE-532
ログファイルからの情報漏えい
CVE-2026-2401 2026-04-24 11:38 2026-04-14 Show GitHub Exploit DB Packet Storm
2290 5.3 警告
Network
Schneider Electric PowerChute Serial Shutdown Schneider Electric のPowerChute Serial Shutdownにおける過度な認証試行の不適切な制限に関する脆弱性 CWE-307
過度な認証試行の不適切な制限
CVE-2026-2402 2026-04-24 11:38 2026-04-14 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 10, 2026, 4:58 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
301 7.1 HIGH
Network
- - PromptHub is an all-in-one AI toolbox for prompt, skill, and agent management. From version 0.4.9 to before version 0.5.4, apps/web/src/routes/skills.ts exposes an authenticated endpoint POST /api/sk… New CWE-20
CWE-693
CWE-918
 Improper Input Validation 
 Protection Mechanism Failure
Server-Side Request Forgery (SSRF) 
CVE-2026-42261 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
302 8.7 HIGH
Network
- - zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization b… New CWE-22
CWE-61
Path Traversal
 UNIX Symbolic Link (Symlink) Following
CVE-2026-42275 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
303 6.1 MEDIUM
Network
- - In Thruk Monitoring through 2.46.3, the login field of the login form is vulnerable to reflected XSS. This vulnerability can be exploited by unauthenticated remote attackers to target users of the mo… New CWE-79
Cross-site Scripting
CVE-2022-23961 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
304 - - - yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not changed (by setting YETI_AUTH_SECRET_KEY to a value other than SECRET). New - CVE-2024-46508 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
305 - - - LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManager::PopulateFromCache(), leading to code execution. New - CVE-2024-53326 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
306 - - - Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative control of the device) via a username that is both a valid SQL statement and a valid regular express… New - CVE-2023-46453 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
307 3.0 LOW
Network
- - In OpenStack Ironic through 35.x, instance_info['ks_template'] is rendered without sandboxing. New CWE-1336
 Improper Neutralization of Special Elements Used in a Template Engine
CVE-2026-44916 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
308 - - - Sync-in Server is a secure, open-source platform for file storage, sharing, collaboration, and syncing. Prior to version 2.2.0, the /api/auth/login endpoint contains a logic flaw that allows unauthen… New CWE-208
 Information Exposure Through Timing Discrepancy
CVE-2026-41161 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
309 8.1 HIGH
Network
- - Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before … New CWE-22
CWE-284
Path Traversal
Improper Access Control
CVE-2026-41491 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
310 - - - CROSS implementation contains reference and optimized implementations of the CROSS post-quantum signature algorithm. Prior to commit fc6b7e7, there is a buffer overflow in crypto_sign_open() caused b… New CWE-121
CWE-122
Stack-based Buffer Overflow
Heap-based Buffer Overflow
CVE-2026-41509 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm