Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 19, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
231691 6.8 警告 sphpblog - SPHPBlog におけるクロスサイトスクリプティングの脆弱性 - CVE-2006-6032 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231692 7.5 危険 property pro - Property Pro の vir_Login.asp における SQL インジェクションの脆弱性 - CVE-2006-6029 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231693 10 危険 リアルネットワークス - Real Networks Helix Server などにおけるヒープベースのバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2006-6026 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231694 5 警告 クアルコム - QUALCOMM Eudora WorldMail におけるサービス運用妨害 (DoS) の脆弱性 - CVE-2006-6025 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231695 7.5 危険 クアルコム - Eudora Worldmail および Worldmail におけるバッファオーバーフローの脆弱性 - CVE-2006-6024 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231696 4 警告 WordPress.org - WordPress におけるサービス運用妨害 (DoS) の脆弱性 - CVE-2006-6017 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231697 4 警告 WordPress.org - WordPress の wp-admin/user-edit.php における任意のユーザのメタデータを読まれる脆弱性 - CVE-2006-6016 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231698 5 警告 SAP - SAP Web Application Server におけるサービス運用妨害 (DoS) の脆弱性 - CVE-2006-6011 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231699 5 警告 SAP - SAP における重要な情報を取得される脆弱性 - CVE-2006-6010 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
231700 5 警告 webevents - WebEvents の save_profile.asp における任意のユーザのプロフィールなどの情報を変更される脆弱性 - CVE-2006-6007 2012-12-20 18:02 2006-11-21 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 20, 2026, 4:14 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
291 6.5 MEDIUM
Network
- - Net::Statsd::Lite versions before 0.9.0 for Perl allowed metric injections. The metric names were not checked for newlines, colons or pipes. Metrics generated from untrusted sources could inject add… New CWE-93
CRLF Injection
CVE-2026-46719 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
292 - - - A pre-authentication, code injection vulnerability in version 1.0.0 or later of the ChromaDB Python project allows an unauthenticated attacker to run arbitrary code on the server by sending a malicio… New CWE-94
Code Injection
CVE-2026-45829 2026-05-19 23:16 2026-05-19 Show GitHub Exploit DB Packet Storm
293 8.1 HIGH
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) patt… New CWE-269
CWE-362
 Improper Privilege Management
Race Condition
CVE-2026-45675 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
294 4.3 MEDIUM
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, Pin/Unpin is a write operation (modifies the message's is_pinned , pinned_by, pinned… New CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2026-45386 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
295 5.4 MEDIUM
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.11, an internal-only bypass_filter parameter is exposed on the /openai/chat/completions… New CWE-285
Improper Authorization
CVE-2026-45365 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
296 7.1 HIGH
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a user just needs to use the API endpoint: /api/chat/completions with their own API … New CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2026-45349 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
297 7.7 HIGH
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend … New CWE-79
Cross-site Scripting
CVE-2026-45303 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
298 7.3 HIGH
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a stored cross-site scripting (XSS) vulnerability that allows any authenticated user… New CWE-79
Cross-site Scripting
CVE-2026-44721 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
299 7.3 HIGH
Network
- - Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.1.124, when attaching files to a promp, the name of the file is derived from the original… New CWE-22
CWE-434
Path Traversal
 Unrestricted Upload of File with Dangerous Type 
CVE-2026-44566 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
300 5.4 MEDIUM
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the channel router does not call filter_allowed_access_grants on either create or up… New CWE-862
 Missing Authorization
CVE-2026-44558 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm