|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 23, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 2511 | 9.8 |
緊急
Network |
TRENDnet | TEW-713RE FIRMWARE | TRENDnetのTEW-713RE FIRMWAREにおける複数の脆弱性 |
CWE-74 CWE-77 |
CVE-2026-5183 | 2026-05-7 12:28 | 2026-03-31 | Show | GitHub Exploit DB Packet Storm |
| 2512 | 8.8 |
重要
Network |
nothings | stb_truetype.h | nothingsのstb_truetype.hにおける複数の脆弱性 |
CWE-119 CWE-125 |
CVE-2026-5314 | 2026-05-7 12:28 | 2026-04-1 | Show | GitHub Exploit DB Packet Storm |
| 2513 | 8.8 |
重要
Network |
nothings | stb_truetype.h | nothingsのstb_truetype.hにおける複数の脆弱性 |
CWE-119 CWE-125 |
CVE-2026-5315 | 2026-05-7 12:28 | 2026-04-2 | Show | GitHub Exploit DB Packet Storm |
| 2514 | 6.5 |
警告
Network |
nothings | stb vorbis.c | nothingsのstb vorbis.cにおける複数の脆弱性 |
CWE-400 CWE-770 |
CVE-2026-5316 | 2026-05-7 12:28 | 2026-04-2 | Show | GitHub Exploit DB Packet Storm |
| 2515 | 8.8 |
重要
Network |
nothings | stb vorbis.c | nothingsのstb vorbis.cにおける複数の脆弱性 |
CWE-119 CWE-787 |
CVE-2026-5317 | 2026-05-7 12:28 | 2026-04-2 | Show | GitHub Exploit DB Packet Storm |
| 2516 | 8.8 |
重要
Network |
Shenzhen Tenda Technology Co.,Ltd. | ch22 ファームウェア | Shenzhen Tenda Technology Co.,Ltd.のch22 ファームウェアにおける複数の脆弱性 |
CWE-119 CWE-121 |
CVE-2026-5604 | 2026-05-7 12:28 | 2026-04-5 | Show | GitHub Exploit DB Packet Storm |
| 2517 | 8.8 |
重要
Network |
Shenzhen Tenda Technology Co.,Ltd. | ch22 ファームウェア | Shenzhen Tenda Technology Co.,Ltd.のch22 ファームウェアにおける複数の脆弱性 |
CWE-119 CWE-121 |
CVE-2026-5605 | 2026-05-7 12:28 | 2026-04-6 | Show | GitHub Exploit DB Packet Storm |
| 2518 | 8.8 |
重要
Network |
Shenzhen Tenda Technology Co.,Ltd. | HG3 Firmware | Shenzhen Tenda Technology Co.,Ltd.のHG3 Firmwareにおける複数の脆弱性 |
CWE-77 CWE-78 |
CVE-2026-7119 | 2026-05-7 12:28 | 2026-04-27 | Show | GitHub Exploit DB Packet Storm |
| 2519 | 8.8 |
重要
Network |
Shenzhen Tenda Technology Co.,Ltd. | HG3 Firmware | Shenzhen Tenda Technology Co.,Ltd.のHG3 Firmwareにおける複数の脆弱性 |
CWE-119 CWE-121 |
CVE-2026-7151 | 2026-05-7 12:28 | 2026-04-27 | Show | GitHub Exploit DB Packet Storm |
| 2520 | 8.8 |
重要
Network |
Shenzhen Tenda Technology Co.,Ltd. | HG3 Firmware | Shenzhen Tenda Technology Co.,Ltd.のHG3 Firmwareにおける複数の脆弱性 |
CWE-74 CWE-77 |
CVE-2026-7160 | 2026-05-7 12:28 | 2026-04-27 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 24, 2026, 4:05 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 1351 | 8.8 |
HIGH
Network |
arubanetworks |
arubaos sd-wan |
Command injection vulnerabilities exist in the web-based management interface of AOS-8 and AOS-10 Operating Systems. Successful exploitation of these vulnerabilities could allow an authenticated remo… |
CWE-77
Command Injection |
CVE-2026-44866 | 2026-05-16 00:49 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1352 | 5.9 |
MEDIUM
Network |
vercel | next.js | Next.js is a React framework for building full-stack web applications. From 12.2.0 to before 15.5.16 and 16.2.5, an external client could send a x-nextjs-data header on a normal request to a path han… |
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data |
CVE-2026-44572 | 2026-05-16 00:46 | 2026-05-14 | Show | GitHub Exploit DB Packet Storm |
| 1353 | 7.8 |
HIGH
Local |
microsoft |
windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
External control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
CWE-73
External Control of File Name or Path |
CVE-2026-41088 | 2026-05-16 00:45 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1354 | 9.8 |
CRITICAL
Network |
microsoft |
windows_server_2012 windows_server_2016 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network. |
CWE-121
Stack-based Buffer Overflow |
CVE-2026-41089 | 2026-05-16 00:42 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1355 | 7.8 |
HIGH
Local |
microsoft |
windows_server_2012 windows_server_2016 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally. |
CWE-416
Use After Free |
CVE-2026-41095 | 2026-05-16 00:40 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1356 | 9.8 |
CRITICAL
Network |
microsoft |
windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2022_23h2 windows_server_2025 |
Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network. |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-41096 | 2026-05-16 00:38 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1357 | 6.7 |
MEDIUM
Local |
microsoft |
windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2019 windows_server_2022 windows_server_2022_… |
Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally. |
CWE-1329
Reliance on Component That is Not Updateable |
CVE-2026-41097 | 2026-05-16 00:36 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1358 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally. |
CWE-416
Use After Free |
CVE-2026-40382 | 2026-05-16 00:32 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1359 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Integer underflow (wrap or wraparound) in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
CWE-191
Integer Underflow (Wrap or Wraparound) |
CVE-2026-40397 | 2026-05-16 00:28 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1360 | 7.4 |
HIGH
Network |
microsoft | edge_chromium | External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network. |
CWE-73 CWE-610 External Control of File Name or Path Externally Controlled Reference to a Resource in Another Sphere |
CVE-2026-41107 | 2026-05-16 00:28 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |