Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 20, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2521 9 緊急
Network
Jenkins プロジェクト GitHub JenkinsのGitHubにおけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2026-42523 2026-05-7 10:51 2026-04-29 Show GitHub Exploit DB Packet Storm
2522 8 重要
Network
Jenkins プロジェクト HTML Publisher Plugin JenkinsのHTML Publisher Pluginにおけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2026-42524 2026-05-7 10:51 2026-04-29 Show GitHub Exploit DB Packet Storm
2523 4.3 警告
Network
Jenkins プロジェクト Azure AD JenkinsのAzure ADにおけるオープンリダイレクトの脆弱性 CWE-601
オープンリダイレクト
CVE-2026-42525 2026-05-7 10:51 2026-04-29 Show GitHub Exploit DB Packet Storm
2524 8.8 重要
Adjacent
TP-LINK Technologies TL-WR841N ファームウェア TP-LINK TechnologiesのTL-WR841N ファームウェアにおけるデフォルトの暗号鍵の使用に関する脆弱性 CWE-1394
デフォルトの暗号鍵の使用
CVE-2026-5039 2026-05-7 10:51 2026-04-23 Show GitHub Exploit DB Packet Storm
2525 7.3 重要
Network
GNU Project GNU C Library GNU ProjectのGNU C Libraryにおける境界外書き込みに関する脆弱性 CWE-787
境界外書き込み
CVE-2026-5435 2026-05-7 10:51 2026-04-28 Show GitHub Exploit DB Packet Storm
2526 7.5 重要
Network
Progress Software Corporation Telerik UI for ASP.NET AJAX Progress Software CorporationのTelerik UI for ASP.NET AJAXにおけるリソースの枯渇に関する脆弱性 CWE-400
リソースの枯渇
CVE-2026-6022 2026-05-7 10:51 2026-04-22 Show GitHub Exploit DB Packet Storm
2527 9.8 緊急
Network
Progress Software Corporation Telerik UI for ASP.NET AJAX Progress Software CorporationのTelerik UI for ASP.NET AJAXにおける信頼できないデータのデシリアライゼーションに関する脆弱性 CWE-502
信頼性のないデータのデシリアライゼーション
CVE-2026-6023 2026-05-7 10:51 2026-04-22 Show GitHub Exploit DB Packet Storm
2528 2.7
Network
Tanium Tanium Server TaniumのTanium Serverにおける認証情報の不十分な保護に関する脆弱性 CWE-522
認証情報の不十分な保護
CVE-2026-6408 2026-05-7 10:51 2026-04-22 Show GitHub Exploit DB Packet Storm
2529 5.5 警告
Local
Wireshark Wireshark WiresharkにおけるNULL ポインタデリファレンスに関する脆弱性 CWE-476
NULL ポインタデリファレンス
CVE-2026-6525 2026-05-7 10:51 2026-05-2 Show GitHub Exploit DB Packet Storm
2530 7.5 重要
Network
TYPO3 Association TYPO3 TYPO3 AssociationのTYPO3における重要な情報の平文保存に関する脆弱性 CWE-312
重要な情報の平文保存
CVE-2026-6553 2026-05-7 10:51 2026-04-21 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 20, 2026, 4:14 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1121 7.8 HIGH
Local
microsoft windows_server_2012
windows_server_2016
windows_server_2019
windows_server_2022
windows_server_2022_23h2
windows_server_2025
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. CWE-122
Heap-based Buffer Overflow
CVE-2026-35420 2026-05-15 03:06 2026-05-13 Show GitHub Exploit DB Packet Storm
1122 7.8 HIGH
Local
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Heap-based buffer overflow in Windows GDI allows an unauthorized attacker to execute code locally. CWE-122
Heap-based Buffer Overflow
CVE-2026-35421 2026-05-15 03:05 2026-05-13 Show GitHub Exploit DB Packet Storm
1123 6.5 MEDIUM
Network
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Authentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network. CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-35422 2026-05-15 03:04 2026-05-13 Show GitHub Exploit DB Packet Storm
1124 6.1 MEDIUM
Network
osgeo mapserver MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker t… CWE-80
Basic XSS
CVE-2026-42030 2026-05-15 03:04 2026-05-9 Show GitHub Exploit DB Packet Storm
1125 5.4 MEDIUM
Network
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network. CWE-125
Out-of-bounds Read
CVE-2026-35423 2026-05-15 03:03 2026-05-13 Show GitHub Exploit DB Packet Storm
1126 6.5 MEDIUM
Network
pwpush password_pusher Password Pusher is an open source application to communicate sensitive information over the web. Prior to versions 1.69.3 and 2.4.2, a security issue in OSS PasswordPusher allowed unauthenticated cre… CWE-288
NVD-CWE-noinfo
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-41308 2026-05-15 03:03 2026-05-9 Show GitHub Exploit DB Packet Storm
1127 5.5 MEDIUM
Local
gpac gpac A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. … CWE-400
CWE-770
 Uncontrolled Resource Consumption
 Allocation of Resources Without Limits or Throttling
CVE-2026-8124 2026-05-15 03:02 2026-05-8 Show GitHub Exploit DB Packet Storm
1128 7.5 HIGH
Network
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Missing release of memory after effective lifetime in Windows Internet Key Exchange (IKE) Protocol allows an unauthorized attacker to deny service over a network. CWE-401
 Missing Release of Memory after Effective Lifetime
CVE-2026-35424 2026-05-15 03:02 2026-05-13 Show GitHub Exploit DB Packet Storm
1129 6.5 MEDIUM
Network
8421bit miniclaw A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the compone… CWE-22
Path Traversal
CVE-2026-8113 2026-05-15 03:02 2026-05-8 Show GitHub Exploit DB Packet Storm
1130 9.8 CRITICAL
Network
yarbo lawn_mower_firmware
lawn_mower_pro_firmware
A hidden, persistent backdoor was found in Yarbo firmware v2.3.9 that provides remote, unauthenticated (or weakly authenticated) access to privileged functionality. The backdoor is undocumented, cann… CWE-912
NVD-CWE-noinfo
 Hidden Functionality
CVE-2026-7413 2026-05-15 02:54 2026-05-8 Show GitHub Exploit DB Packet Storm