Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 18, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
249121 4 警告 Mahara - Mahara における重要な情報を取得される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2011-1404 2012-03-27 18:43 2011-05-13 Show GitHub Exploit DB Packet Storm
249122 6.8 警告 Mahara - Mahara の pieforms の実装におけるクロスサイトリクエストフォージェリの脆弱性 CWE-352
同一生成元ポリシー違反
CVE-2011-1403 2012-03-27 18:43 2011-05-13 Show GitHub Exploit DB Packet Storm
249123 6.5 警告 Mahara - Mahara におけるアクセスをブロックされる脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2011-1402 2012-03-27 18:43 2011-05-13 Show GitHub Exploit DB Packet Storm
249124 3.5 注意 ikiwiki - ikiwiki におけるクロスサイトスクリプティング攻撃をされる脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2011-1401 2012-03-27 18:43 2011-04-11 Show GitHub Exploit DB Packet Storm
249125 6.8 警告 Debian
Canonical
- Debian GNU/Linux squeeze などの製品で使用される shell_escape_commands 命令の初期設定における任意のコードを実行される脆弱性 CWE-16
環境設定
CVE-2011-1400 2012-03-27 18:43 2011-03-22 Show GitHub Exploit DB Packet Storm
249126 5 警告 IBM - IBM WAS の管理コンソールにおけるディレクトリトラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2011-1359 2012-03-27 18:43 2011-09-6 Show GitHub Exploit DB Packet Storm
249127 4.3 警告 IBM - IBM WSRR の agentDetect.jsp におけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2011-1357 2012-03-27 18:43 2011-08-11 Show GitHub Exploit DB Packet Storm
249128 8.8 危険 マイクロソフト - Windows 7 の Microsoft Internet Explorer 8 における任意のファイルを生成される脆弱性 CWE-noinfo
情報不足
CVE-2011-1347 2012-03-27 18:43 2011-03-10 Show GitHub Exploit DB Packet Storm
249129 9.3 危険 マイクロソフト - Windows 7 の Microsoft Internet Explorer 8 における任意のコードを実行される脆弱性 CWE-noinfo
情報不足
CVE-2011-1346 2012-03-27 18:43 2011-03-10 Show GitHub Exploit DB Packet Storm
249130 4.3 警告 IBM - IBM WebSphere MQ における SSL パートナーを偽装される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2011-1224 2012-03-27 18:43 2011-07-7 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 18, 2026, 4:12 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1281 5.3 MEDIUM
Network
- - protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs includes a minimal UTF-8 decoder that accepted overlong UTF-8 byte sequences and decoded … CWE-176
 Improper Handling of Unicode Encoding
CVE-2026-44288 2026-05-14 02:01 2026-05-14 Show GitHub Exploit DB Packet Storm
1282 8.7 HIGH
Network
- - protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbjs static code generation could emit unsafe JavaScript identifiers derived from schema-controlled names. When ge… CWE-94
Code Injection
CVE-2026-44295 2026-05-14 02:01 2026-05-14 Show GitHub Exploit DB Packet Storm
1283 5.5 MEDIUM
Local
jqlang jq jq is a command-line JSON processor. In 1.8.1 and earlier, when decNumberFromString is given a number literal of INT_MAX-1 (2147483646) digits, the D2U() macro overflows during signed-int arithmetic.… CWE-190
 Integer Overflow or Wraparound
CVE-2026-43894 2026-05-14 02:01 2026-05-12 Show GitHub Exploit DB Packet Storm
1284 5.5 MEDIUM
Local
jqlang jq jq is a command-line JSON processor. In 1.8.1 and earlier, the jq bytecode VM's data stack tracks its allocation size in a signed int. When the stack grows beyond ≈1 GiB (via deeply nested generator … CWE-190
CWE-787
 Integer Overflow or Wraparound
 Out-of-bounds Write
CVE-2026-41257 2026-05-14 02:01 2026-05-12 Show GitHub Exploit DB Packet Storm
1285 5.5 MEDIUM
Local
jqlang jq jq is a command-line JSON processor. In 1.8.1 and earlier, Top-level jq programs loaded from a file with -f are truncated at the first embedded NUL byte on current upstream HEAD. A crafted filter fil… CWE-158
 Improper Neutralization of Null Byte or NUL Character
CVE-2026-41256 2026-05-14 02:00 2026-05-12 Show GitHub Exploit DB Packet Storm
1286 8.4 HIGH
Local
- - JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument… CWE-77
CWE-78
Command Injection
OS Command 
CVE-2026-43990 2026-05-14 02:00 2026-05-13 Show GitHub Exploit DB Packet Storm
1287 8.4 HIGH
Local
- - JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constru… CWE-78
CWE-184
OS Command 
 Incomplete Blacklist
CVE-2026-43991 2026-05-14 02:00 2026-05-13 Show GitHub Exploit DB Packet Storm
1288 9.8 CRITICAL
Network
- - JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accept… CWE-200
CWE-312
CWE-522
CWE-532
Information Exposure
 Cleartext Storage of Sensitive Information
 Insufficiently Protected Credentials
 Inclusion of Sensitive Information in Log Files
CVE-2026-43992 2026-05-14 02:00 2026-05-13 Show GitHub Exploit DB Packet Storm
1289 8.2 HIGH
Network
- - JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or reso… CWE-918
Server-Side Request Forgery (SSRF) 
CVE-2026-43993 2026-05-14 02:00 2026-05-13 Show GitHub Exploit DB Packet Storm
1290 5.5 MEDIUM
Local
jqlang jq jq is a command-line JSON processor. In 1.8.1 and earlier, jv_contains recurses into nested arrays/objects with no depth limit. With a sufficiently nested input structure (built programmatically with… CWE-674
 Uncontrolled Recursion
CVE-2026-40612 2026-05-14 02:00 2026-05-12 Show GitHub Exploit DB Packet Storm