Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 20, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2401 7.5 重要
Network
- 4D SASの4D ServerにおけるXML 外部エンティティの脆弱性 CWE-611
XML 外部エンティティ参照の不適切な制限
CVE-2024-39847 2026-05-7 11:29 2026-04-30 Show GitHub Exploit DB Packet Storm
2402 9.1 緊急
Network
rti RTI Connext Professional rtiのRTI Connext ProfessionalにおけるXML 外部エンティティの脆弱性 CWE-611
XML 外部エンティティ参照の不適切な制限
CVE-2025-14543 2026-05-7 11:29 2026-04-30 Show GitHub Exploit DB Packet Storm
2403 7.5 重要
Network
XWiki CryptPad XWikiのCryptPadにおける制限またはスロットリング無しのリソースの割り当てに関する脆弱性 CWE-770
制限またはスロットリング無しのリソースの割り当て
CVE-2025-51846 2026-05-7 11:29 2026-04-30 Show GitHub Exploit DB Packet Storm
2404 6.4 警告
Local
レッドハット process automation manager レッドハットのprocess automation managerにおける不適切なデフォルトパーミッションに関する脆弱性 CWE-276
不適切なデフォルトパーミッション
CVE-2025-58713 2026-05-7 11:29 2026-04-8 Show GitHub Exploit DB Packet Storm
2405 4.8 警告
Network
GNU Project GNU Wget2 GNU ProjectのGNU Wget2における入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-1858 2026-05-7 11:28 2026-04-29 Show GitHub Exploit DB Packet Storm
2406 6.5 警告
Adjacent
シスコシステムズ Cisco Firepower Threat Defense ソフトウェア
Adaptive Security Appliance (ASA) Software
シスコシステムズのAdaptive Security Appliance (ASA) Software等の複数製品における範囲外のポインタオフセットの使用に関する脆弱性 CWE-823
範囲外のポインタオフセットの使用
CVE-2026-20022 2026-05-7 11:28 2026-03-4 Show GitHub Exploit DB Packet Storm
2407 6.5 警告
Adjacent
シスコシステムズ Cisco Firepower Threat Defense ソフトウェア
Adaptive Security Appliance (ASA) Software
シスコシステムズのAdaptive Security Appliance (ASA) Software等の複数製品における境界外書き込みに関する脆弱性 CWE-787
境界外書き込み
CVE-2026-20023 2026-05-7 11:28 2026-03-4 Show GitHub Exploit DB Packet Storm
2408 5.7 警告
Adjacent
シスコシステムズ Cisco Firepower Threat Defense ソフトウェア
Adaptive Security Appliance (ASA) Software
シスコシステムズのAdaptive Security Appliance (ASA) Software等の複数製品におけるバッファエラーの脆弱性 CWE-119
バッファエラー
CVE-2026-20024 2026-05-7 11:28 2026-03-4 Show GitHub Exploit DB Packet Storm
2409 8.6 重要
Network
シスコシステムズ Adaptive Security Appliance (ASA) Software シスコシステムズのAdaptive Security Appliance (ASA) Softwareにおける有効なライフタイム後のリソースの解放の欠如に関する脆弱性 CWE-772
有効なライフタイム後のリソースの解放の欠如
CVE-2026-20082 2026-05-7 11:28 2026-03-4 Show GitHub Exploit DB Packet Storm
2410 5 警告
Network
Cloud Foundry, Inc. routing release
cf-deployment
Cloud Foundry, Inc.のCf-deployment等の複数製品における意図するエンドポイントとの通信チャネルの制限に関する脆弱性 CWE-923
意図するエンドポイントとの通信チャネルの不適切な制限
CVE-2026-22726 2026-05-7 11:28 2026-05-1 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 20, 2026, 4:14 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1251 7.1 HIGH
Network
- - An Editor can overwrite a dashboard not owned by them to acquire admin on that specific dashboard. The user must have write access to the dashboard to escalate privilege. - CVE-2026-33377 2026-05-15 01:21 2026-05-14 Show GitHub Exploit DB Packet Storm
1252 6.5 MEDIUM
Network
- - Using the $__timeGroup macro, one can achieve an OOM by overloading the server. This requires a SQL datasource. If the server is set up to auto-restart, the impact is minimal or non-existent, as the … CWE-400
 Uncontrolled Resource Consumption
CVE-2026-33378 2026-05-15 01:21 2026-05-14 Show GitHub Exploit DB Packet Storm
1253 6.3 MEDIUM
Network
- - A vulnerability in SQL Expressions allows an authenticated attacker to read arbitrary files from the Grafana server's filesystem. Only instances with the sqlExpressions feature toggle enabled are vul… CWE-552
 Files or Directories Accessible to External Parties
CVE-2026-33380 2026-05-15 01:21 2026-05-14 Show GitHub Exploit DB Packet Storm
1254 5.9 MEDIUM
Network
- - When a user's access to mint tokens for a service account is revoked, it is sometimes still possible to do so for a few seconds after the event. The user will eventually lose access to do this. CWE-284
Improper Access Control
CVE-2026-33381 2026-05-15 01:21 2026-05-14 Show GitHub Exploit DB Packet Storm
1255 9.8 CRITICAL
Network
- - Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows Blind SQL Injection. Th… CWE-89
SQL Injection
CVE-2025-11024 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1256 9.8 CRITICAL
Network
- - Authorization bypass through User-Controlled key vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows Session Hijacking. This issue affects E-Commerce Website: b… CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2026-2347 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1257 8.8 HIGH
Network
- - Authorization bypass through User-Controlled key vulnerability in APPYAP Technology and Information Inc. Yaay Social Media App allows Accessing Functionality Not Properly Constrained by ACLs. This i… CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2025-12008 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1258 6.8 MEDIUM
Network
- - Authorization bypass through User-Controlled key vulnerability in Im Park Information Technology, Electronics, Press, Publishing and Advertising, Education Ltd. Co. DijiDemi allows Privilege Abuse. … CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2026-6008 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1259 8.8 HIGH
Network
- - Authorization bypass through User-Controlled key vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Ex… CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2025-15025 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1260 10.0 CRITICAL
Network
vm2_project vm2 vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying … CWE-94
CWE-1321
Code Injection
 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2026-44005 2026-05-15 01:16 2026-05-14 Show GitHub Exploit DB Packet Storm