|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 18, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 256291 | 6.8 | 警告 | アップル GNU Project サン・マイクロシステムズ サイバートラスト株式会社 レッドハット |
- | GNU tar の contains_dot_dot() 関数におけるディレクトリトラバーサルの脆弱性 | - | CVE-2007-4131 | 2010-01-18 12:21 | 2007-08-23 | Show | GitHub Exploit DB Packet Storm |
| 256292 | 4.6 | 警告 | IBM | - | IBM DB2 の dasauto における管理者権限を持たないユーザが実行可能な脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2009-4150 | 2010-01-15 14:10 | 2009-12-2 | Show | GitHub Exploit DB Packet Storm |
| 256293 | 2.1 | 注意 | サン・マイクロシステムズ | - | Sun Solaris の ldap_cachemgr におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-Other
その他 |
CVE-2009-4080 | 2010-01-15 14:10 | 2009-11-24 | Show | GitHub Exploit DB Packet Storm |
| 256294 | 5 | 警告 | サン・マイクロシステムズ | - | Sun Solaris の sshd におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-4075 | 2010-01-15 14:09 | 2009-11-23 | Show | GitHub Exploit DB Packet Storm |
| 256295 | 2.6 | 注意 | オラクル | - | Oracle Application Server におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
- | 2010-01-14 15:01 | 2010-01-14 | Show | GitHub Exploit DB Packet Storm |
| 256296 | 9.3 | 危険 | マイクロソフト | - | Microsoft Internet Explorer に脆弱性 |
CWE-94
コード・インジェクション |
CVE-2009-3672 | 2010-01-14 12:08 | 2009-11-25 | Show | GitHub Exploit DB Packet Storm |
| 256297 | 9.3 | 危険 | サン・マイクロシステムズ VMware |
- | Sun Java SE の java.lang パッケージにおける脆弱性 |
CWE-362
競合状態 |
CVE-2009-2724 | 2010-01-14 12:08 | 2009-08-10 | Show | GitHub Exploit DB Packet Storm |
| 256298 | 10 | 危険 | サン・マイクロシステムズ VMware |
- | Sun Java SE の Provider クラスにおける脆弱性 |
CWE-noinfo
情報不足 |
CVE-2009-2721 | 2010-01-14 12:08 | 2009-08-10 | Show | GitHub Exploit DB Packet Storm |
| 256299 | 5 | 警告 | 有限会社シースリー | - | WebCalenderC3 におけるディレクトリトラバーサルの脆弱性 |
CWE-22
パス・トラバーサル |
CVE-2010-0348 | 2010-01-12 15:01 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
| 256300 | 4.3 | 警告 | 有限会社シースリー | - | WebCalenderC3 におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2010-0349 | 2010-01-12 15:00 | 2010-01-12 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 19, 2026, 4:16 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 551 | 9.1 |
CRITICAL
Network |
apache | tomcat | Improper Authorization vulnerability when multiple method constraints define an HTTP method for the same extension in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21,… Update |
CWE-285
Improper Authorization |
CVE-2026-43515 | 2026-05-16 00:52 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 552 | 8.8 |
HIGH
Network |
arubanetworks |
arubaos sd-wan |
Command injection vulnerabilities exist in the web-based management interface of AOS-8 and AOS-10 Operating Systems. Successful exploitation of these vulnerabilities could allow an authenticated remo… Update |
CWE-77
Command Injection |
CVE-2026-44866 | 2026-05-16 00:49 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 553 | 5.9 |
MEDIUM
Network |
vercel | next.js | Next.js is a React framework for building full-stack web applications. From 12.2.0 to before 15.5.16 and 16.2.5, an external client could send a x-nextjs-data header on a normal request to a path han… Update |
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data |
CVE-2026-44572 | 2026-05-16 00:46 | 2026-05-14 | Show | GitHub Exploit DB Packet Storm |
| 554 | 7.8 |
HIGH
Local |
microsoft |
windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
External control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. Update |
CWE-73
External Control of File Name or Path |
CVE-2026-41088 | 2026-05-16 00:45 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 555 | 9.8 |
CRITICAL
Network |
microsoft |
windows_server_2012 windows_server_2016 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network. Update |
CWE-121
Stack-based Buffer Overflow |
CVE-2026-41089 | 2026-05-16 00:42 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 556 | 7.8 |
HIGH
Local |
microsoft |
windows_server_2012 windows_server_2016 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally. Update |
CWE-416
Use After Free |
CVE-2026-41095 | 2026-05-16 00:40 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 557 | 9.8 |
CRITICAL
Network |
microsoft |
windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2022_23h2 windows_server_2025 |
Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network. Update |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-41096 | 2026-05-16 00:38 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 558 | 6.7 |
MEDIUM
Local |
microsoft |
windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2019 windows_server_2022 windows_server_2022_… |
Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally. Update |
CWE-1329
Reliance on Component That is Not Updateable |
CVE-2026-41097 | 2026-05-16 00:36 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 559 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally. Update |
CWE-416
Use After Free |
CVE-2026-40382 | 2026-05-16 00:32 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 560 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Integer underflow (wrap or wraparound) in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. Update |
CWE-191
Integer Underflow (Wrap or Wraparound) |
CVE-2026-40397 | 2026-05-16 00:28 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |