Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 17, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2361 8.8 重要
Network
BMC Software Control-M Managed File Transfer BMC SoftwareのControl-M Managed File TransferにおけるSQL インジェクションの脆弱性 CWE-89
SQLインジェクション
CVE-2026-23780 2026-04-30 12:14 2026-04-10 Show GitHub Exploit DB Packet Storm
2362 9.8 緊急
Network
BMC Software Control-M Managed File Transfer BMC SoftwareのControl-M Managed File Transferにおけるハードコードされた認証情報の使用に関する脆弱性 CWE-798
ハードコードされた認証情報の使用
CVE-2026-23781 2026-04-30 12:14 2026-04-10 Show GitHub Exploit DB Packet Storm
2363 7.5 重要
Network
BMC Software Control-M Managed File Transfer BMC SoftwareのControl-M Managed File Transferにおけるアクセス制御に関する脆弱性 CWE-284
不適切なアクセス制御
CVE-2026-23782 2026-04-30 12:14 2026-04-10 Show GitHub Exploit DB Packet Storm
2364 9.9 緊急
Network
Doorman Doorman Doormanにおける権限管理に関する脆弱性 CWE-269
不適切な権限管理
CVE-2026-30269 2026-04-30 12:14 2026-04-20 Show GitHub Exploit DB Packet Storm
2365 7.5 重要
Network
PowerDNS PowerDNS Recursor
dnsdist
PowerDNS Authoritative Server
PowerDNSのPowerDNS Authoritative Server等の複数製品における制限またはスロットリング無しのリソースの割り当てに関する脆弱性 CWE-770
制限またはスロットリング無しのリソースの割り当て
CVE-2026-33257 2026-04-30 12:14 2026-04-22 Show GitHub Exploit DB Packet Storm
2366 7.5 重要
Network
PowerDNS PowerDNS Recursor
dnsdist
PowerDNS Authoritative Server
PowerDNSのPowerDNS Authoritative Server等の複数製品における制限またはスロットリング無しのリソースの割り当てに関する脆弱性 CWE-770
制限またはスロットリング無しのリソースの割り当て
CVE-2026-33260 2026-04-30 12:14 2026-04-22 Show GitHub Exploit DB Packet Storm
2367 8.8 重要
Network
litellm litellm LiteLLMにおける保護されていない代替チャネルに関する脆弱性 CWE-420
保護されていない代替チャネル
CVE-2026-40217 2026-04-30 12:14 2026-04-10 Show GitHub Exploit DB Packet Storm
2368 7.8 重要
Local
radare radare2 radareのradare2におけるOS コマンドインジェクションの脆弱性 CWE-78
OSコマンド・インジェクション
CVE-2026-40517 2026-04-30 12:14 2026-04-22 Show GitHub Exploit DB Packet Storm
2369 6.7 警告
Local
The GnuPG Project Libgcrypt The GnuPG ProjectのLibgcryptにおける境界外書き込みに関する脆弱性 CWE-787
境界外書き込み
CVE-2026-41989 2026-04-30 12:14 2026-04-23 Show GitHub Exploit DB Packet Storm
2370 9.8 緊急
Network
OFFIS DCMTK OFFISのDCMTKにおける複数の脆弱性 CWE-77
CWE-78
CVE-2026-5663 2026-04-30 12:14 2026-04-6 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 18, 2026, 4:12 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1041 9.1 CRITICAL
Network
microsoft dynamics_365 Execution with unnecessary privileges in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network. CWE-250
NVD-CWE-noinfo
 Execution with Unnecessary Privileges
CVE-2026-42833 2026-05-14 23:26 2026-05-13 Show GitHub Exploit DB Packet Storm
1042 6.5 MEDIUM
Local
microsoft azure_monitor_agent Untrusted search path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. CWE-426
 Untrusted Search Path
CVE-2026-42830 2026-05-14 23:26 2026-05-13 Show GitHub Exploit DB Packet Storm
1043 7.0 HIGH
Local
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally. CWE-416
 Use After Free
CVE-2026-42825 2026-05-14 23:26 2026-05-13 Show GitHub Exploit DB Packet Storm
1044 9.9 CRITICAL
Network
microsoft azure_logic_apps Improper access control in Azure Logic Apps allows an authorized attacker to elevate privileges over a network. CWE-284
Improper Access Control
CVE-2026-42823 2026-05-14 23:25 2026-05-13 Show GitHub Exploit DB Packet Storm
1045 6.2 MEDIUM
Local
microsoft 365_copilot Improper access control in M365 Copilot for Desktop allows an unauthorized attacker to perform spoofing locally. CWE-284
Improper Access Control
CVE-2026-41614 2026-05-14 23:25 2026-05-13 Show GitHub Exploit DB Packet Storm
1046 7.5 HIGH
Network
haxx curl Using libcurl, when a custom `Host:` header is first set for an HTTP request and a second request is subsequently done using the same *easy handle* but without the custom `Host:` header set, the seco… CWE-319
Cleartext Transmission of Sensitive Information
CVE-2026-6276 2026-05-14 23:21 2026-05-13 Show GitHub Exploit DB Packet Storm
1047 5.3 MEDIUM
Network
haxx curl When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, libcurl could leak the password used for the first host to the followed-to host under certain circumstances. NVD-CWE-noinfo
CVE-2026-6429 2026-05-14 23:18 2026-05-13 Show GitHub Exploit DB Packet Storm
1048 5.3 MEDIUM
Network
haxx curl When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and inste… CWE-295
Improper Certificate Validation 
CVE-2026-7009 2026-05-14 23:17 2026-05-13 Show GitHub Exploit DB Packet Storm
1049 7.5 HIGH
Network
vercel next.js Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts wit… CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-45109 2026-05-14 23:14 2026-05-14 Show GitHub Exploit DB Packet Storm
1050 5.3 MEDIUM
Network
haxx curl Successfully using libcurl to do a transfer over a specific HTTP proxy (`proxyA`) with **Digest** authentication and then changing the proxy host to a second one (`proxyB`) for a second transfer, reu… CWE-294
Authentication Bypass by Capture-replay 
CVE-2026-7168 2026-05-14 23:12 2026-05-13 Show GitHub Exploit DB Packet Storm