|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 19, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 2711 | 9.1 |
緊急
Network |
Froxlor | Froxlor | Froxlorにおけるコードインジェクションの脆弱性 |
CWE-94
コード・インジェクション |
CVE-2026-41229 | 2026-04-30 12:27 | 2026-04-23 | Show | GitHub Exploit DB Packet Storm |
| 2712 | 8.5 |
重要
Network |
Froxlor | Froxlor | FroxlorにおけるCRLF インジェクションの脆弱性 |
CWE-93
CRLF インジェクション |
CVE-2026-41230 | 2026-04-30 12:27 | 2026-04-23 | Show | GitHub Exploit DB Packet Storm |
| 2713 | 7.5 |
重要
Network |
Froxlor | Froxlor | Froxlorにおけるリンク解釈に関する脆弱性 |
CWE-59
リンク解釈の問題 |
CVE-2026-41231 | 2026-04-30 12:27 | 2026-04-23 | Show | GitHub Exploit DB Packet Storm |
| 2714 | 5 |
警告
Network |
Froxlor | Froxlor | Froxlorにおける不正な認証に関する脆弱性 |
CWE-863
不正な認証 |
CVE-2026-41232 | 2026-04-30 12:27 | 2026-04-23 | Show | GitHub Exploit DB Packet Storm |
| 2715 | 5.4 |
警告
Network |
Froxlor | Froxlor | Froxlorにおける不正な認証に関する脆弱性 |
CWE-863
不正な認証 |
CVE-2026-41233 | 2026-04-30 12:27 | 2026-04-23 | Show | GitHub Exploit DB Packet Storm |
| 2716 | 8.6 |
重要
Local |
OpenClaw | OpenClaw | OpenClawにおけるシステム構成または設定の外部制御に関する脆弱性 |
CWE-15
システム構成または設定の外部制御 |
CVE-2026-41294 | 2026-04-30 12:26 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
| 2717 | 7.8 |
重要
Local |
OpenClaw | OpenClaw | OpenClawにおける信頼できない制御領域からの機能の組み込みに関する脆弱性 |
CWE-829
信頼性のない制御領域からの機能の組み込み |
CVE-2026-41295 | 2026-04-30 12:26 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
| 2718 | 8.2 |
重要
Network |
OpenClaw | OpenClaw | OpenClawにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 |
CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態 |
CVE-2026-41296 | 2026-04-30 12:26 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
| 2719 | 7.6 |
重要
Network |
OpenClaw | OpenClaw | OpenClawにおけるサーバサイドのリクエストフォージェリの脆弱性 |
CWE-918
サーバサイドリクエストフォージェリ |
CVE-2026-41297 | 2026-04-30 12:26 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
| 2720 | 5.4 |
警告
Network |
OpenClaw | OpenClaw | OpenClawにおける認証の欠如に関する脆弱性 |
CWE-862
認証の欠如 |
CVE-2026-41298 | 2026-04-30 12:26 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 20, 2026, 4:14 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 313891 | 6.2 |
MEDIUM
Local |
microsoft |
windows_10_1507 windows_10_1809 windows_server_2019 windows_server_2022 windows_11_21h2 windows_11_22h2 windows_11_23h2 windows_server_2022_23h2 windows_10_1607 windows_ser… |
Windows Authentication Information Disclosure Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-38254 | 2024-09-14 00:16 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |
| 313892 | 6.5 |
MEDIUM
Network |
zoneminder | zoneminder | ZoneMinder is a free, open source Closed-circuit television software application. In WWW/AJAX/watch.php, Line: 51 takes a few parameter in sql query without sanitizing it which makes it vulnerable to… |
CWE-89
SQL Injection |
CVE-2023-41884 | 2024-09-14 00:08 | 2024-08-13 | Show | GitHub Exploit DB Packet Storm |
| 313893 | 5.5 |
MEDIUM
Local |
microsoft |
windows_server_2008 windows_server_2012 windows_10_1507 windows_10_1809 windows_server_2019 windows_10_1607 windows_server_2016 windows_10_22h2 windows_10_21h1 |
Windows Kernel-Mode Driver Information Disclosure Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-38256 | 2024-09-14 00:05 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |
| 313894 | 7.5 |
HIGH
Network |
microsoft |
windows_server_2008 windows_server_2012 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2016 |
Windows Remote Desktop Licensing Service Information Disclosure Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-38258 | 2024-09-14 00:00 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |
| 313895 | 7.5 |
HIGH
Network |
microsoft |
windows_server_2008 windows_server_2012 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2016 |
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-38263 | 2024-09-13 23:55 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |
| 313896 | 8.8 |
HIGH
Network |
microsoft |
windows_server_2008 windows_server_2012 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2016 |
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-38260 | 2024-09-13 23:53 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |
| 313897 | 7.1 |
HIGH
Network |
microsoft |
windows_server_2008 windows_server_2012 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2016 |
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-43454 | 2024-09-13 23:52 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |
| 313898 | 9.8 |
CRITICAL
Network |
microsoft |
windows_server_2008 windows_server_2016 windows_server_2012 windows_server_2019 windows_server_2022 windows_server_2022_23h2 |
Windows Remote Desktop Licensing Service Spoofing Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-43455 | 2024-09-13 23:50 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |
| 313899 | 7.2 |
HIGH
Network |
microsoft | sharepoint_server | Microsoft SharePoint Server Remote Code Execution Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-43464 | 2024-09-13 23:48 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |
| 313900 | 7.8 |
HIGH
Local |
microsoft |
365_apps office excel office_long_term_servicing_channel office_online_server |
Microsoft Excel Elevation of Privilege Vulnerability |
NVD-CWE-noinfo
|
CVE-2024-43465 | 2024-09-13 23:46 | 2024-09-11 | Show | GitHub Exploit DB Packet Storm |