Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 19, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2661 8.1 重要
Adjacent
フィリップス Hue Bridge V2 ファームウェア フィリップスのHue Bridge V2 ファームウェアにおける暗号化処理のナンスおよび鍵ペアの再利用に関する脆弱性 CWE-323
暗号化処理のナンスおよび鍵ペアの再利用
CVE-2026-3559 2026-04-30 12:29 2026-03-16 Show GitHub Exploit DB Packet Storm
2662 8.8 重要
Adjacent
フィリップス Hue Bridge V2 ファームウェア フィリップスのHue Bridge V2 ファームウェアにおけるヒープベースのバッファオーバーフローの脆弱性 CWE-122
ヒープオーバーフロー
CVE-2026-3560 2026-04-30 12:29 2026-03-16 Show GitHub Exploit DB Packet Storm
2663 8 重要
Adjacent
フィリップス Hue Bridge V2 ファームウェア フィリップスのHue Bridge V2 ファームウェアにおけるヒープベースのバッファオーバーフローの脆弱性 CWE-122
ヒープオーバーフロー
CVE-2026-3561 2026-04-30 12:29 2026-03-16 Show GitHub Exploit DB Packet Storm
2664 8.8 重要
Adjacent
フィリップス Hue Bridge V2 ファームウェア フィリップスのHue Bridge V2 ファームウェアにおけるデジタル署名の検証に関する脆弱性 CWE-347
デジタル署名の不適切な検証
CVE-2026-3562 2026-04-30 12:29 2026-03-16 Show GitHub Exploit DB Packet Storm
2665 6.5 警告
Network
OpenClaw OpenClaw OpenClawにおけるパストラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2026-3689 2026-04-30 12:29 2026-04-11 Show GitHub Exploit DB Packet Storm
2666 7.4 重要
Network
OpenClaw OpenClaw OpenClawにおける認証時の IP アドレスへの依存に関する脆弱性 CWE-291
認証時の IP アドレスへの依存
CVE-2026-3690 2026-04-30 12:29 2026-04-11 Show GitHub Exploit DB Packet Storm
2667 5.3 警告
Network
OpenClaw OpenClaw OpenClawにおける情報漏えいに関する脆弱性 CWE-200
情報漏えい
CVE-2026-3691 2026-04-30 12:29 2026-04-11 Show GitHub Exploit DB Packet Storm
2668 7.3 重要
Network
Shenzhen Tenda Technology Co.,Ltd. w30e ファームウェア Shenzhen Tenda Technology Co.,Ltd.のw30e ファームウェアにおけるコマンドインジェクションの脆弱性 CWE-77
コマンドインジェクション
CVE-2026-38834 2026-04-30 12:29 2026-04-21 Show GitHub Exploit DB Packet Storm
2669 9.8 緊急
Network
Shenzhen Tenda Technology Co.,Ltd. w30e ファームウェア Shenzhen Tenda Technology Co.,Ltd.のw30e ファームウェアにおけるコマンドインジェクションの脆弱性 CWE-77
コマンドインジェクション
CVE-2026-38835 2026-04-30 12:29 2026-04-21 Show GitHub Exploit DB Packet Storm
2670 5.4 警告
Network
pyLoad pyLoad pyLoadにおける不正な認証に関する脆弱性 CWE-863
不正な認証
CVE-2026-40071 2026-04-30 12:29 2026-04-9 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 19, 2026, 4:16 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
313871 - - - In wifi_item_edit_content of styles.xml , there is a possible FRP bypass due to Missing check for FRP state. This could lead to local escalation of privilege with no additional execution privileges n… - CVE-2024-40650 2024-09-12 23:35 2024-09-11 Show GitHub Exploit DB Packet Storm
313872 - - - In DevmemIntPFNotify of devicemem_server.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution pri… - CVE-2024-23716 2024-09-12 23:35 2024-09-11 Show GitHub Exploit DB Packet Storm
313873 - - - An attacker with authenticated access to VICIdial as an "agent" can execute arbitrary shell commands as the "root" user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell comma… - CVE-2024-8504 2024-09-12 23:35 2024-09-11 Show GitHub Exploit DB Packet Storm
313874 - - - Renwoxing Enterprise Intelligent Management System before v3.0 was discovered to contain a SQL injection vulnerability via the parid parameter at /fx/baseinfo/SearchInfo. - CVE-2024-43040 2024-09-12 23:35 2024-09-11 Show GitHub Exploit DB Packet Storm
313875 5.5 MEDIUM
Local
linux linux_kernel In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fixed bug on error when unloading amdgpu Fixed bug on error when unloading amdgpu. The error message is as follows: … NVD-CWE-noinfo
CVE-2023-52912 2024-09-12 23:35 2024-08-21 Show GitHub Exploit DB Packet Storm
313876 9.0 CRITICAL
Network
beckhoff twincat\/bsd
ipc_diagnostics_package
The IPC-Diagnostics package in TwinCAT/BSD is susceptible to improper input neutralization by a low-privileged local attacker. CWE-79
Cross-site Scripting
CVE-2024-41174 2024-09-12 23:33 2024-08-27 Show GitHub Exploit DB Packet Storm
313877 5.4 MEDIUM
Network
ankitpokhrel dynamic_featured_image The Dynamic Featured Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘dfiFeatured’ parameter in all versions up to, and including, 3.7.0 due to insufficient input sani… CWE-79
Cross-site Scripting
CVE-2024-6929 2024-09-12 23:32 2024-09-5 Show GitHub Exploit DB Packet Storm
313878 5.3 MEDIUM
Network
msoftplugins security_antivirus_firewall The Security, Antivirus, Firewall – S.A.F plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.3.5. This is due to insufficient restrictions on where the IP A… NVD-CWE-Other
CVE-2022-4529 2024-09-12 23:29 2024-09-5 Show GitHub Exploit DB Packet Storm
313879 5.5 MEDIUM
Local
beckhoff ipc_diagnostics_package
twincat\/bsd
The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local denial-of-service attack by a low privileged attacker. CWE-770
 Allocation of Resources Without Limits or Throttling
CVE-2024-41175 2024-09-12 23:25 2024-08-27 Show GitHub Exploit DB Packet Storm
313880 4.3 MEDIUM
Network
helloasso helloasso The HelloAsso plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ha_ajax' function in all versions up to, and including, 1.1.10. This ma… CWE-862
 Missing Authorization
CVE-2024-7605 2024-09-12 23:24 2024-09-5 Show GitHub Exploit DB Packet Storm