Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 16, 2026, 10:01 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2721 7.3 重要
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるパストラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2026-35338 2026-04-28 10:13 2026-04-22 Show GitHub Exploit DB Packet Storm
2722 3.3
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるUnicode エンコーディングの処理に関する脆弱性 CWE-176
Unicode エンコーディングの不適切な処理
CVE-2026-35346 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2723 4.4 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおける入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-35347 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2724 7.7 重要
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるリンク解釈に関する脆弱性 CWE-59
リンク解釈の問題
CVE-2026-35349 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2725 4.2 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるパーミッションの不適切な保持に関する脆弱性 CWE-281
パーミッションの不適切な保持
CVE-2026-35351 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2726 3.3
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態
CVE-2026-35353 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2727 6.3 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態
CVE-2026-35355 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2728 6.3 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態
CVE-2026-35356 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2729 4.4 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおける複数の脆弱性 CWE-281
CWE-459
CVE-2026-35361 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2730 3.6
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態
CVE-2026-35362 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 16, 2026, 4 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
314371 6.5 MEDIUM
Network
upkeeper upkeeper_manager Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue … CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2024-42464 2024-08-29 05:35 2024-08-16 Show GitHub Exploit DB Packet Storm
314372 9.8 CRITICAL
Network
upkeeper upkeeper_manager Improper Restriction of Excessive Authentication Attempts vulnerability in upKeeper Solutions product upKeeper Manager allows Authentication Abuse.This issue affects upKeeper Manager: through 5.1.9. CWE-307
mproper Restriction of Excessive Authentication Attempts
CVE-2024-42465 2024-08-29 05:32 2024-08-16 Show GitHub Exploit DB Packet Storm
314373 7.2 HIGH
Network
versa-networks versa_director The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center… CWE-434
 Unrestricted Upload of File with Dangerous Type 
CVE-2024-39717 2024-08-29 04:47 2024-08-23 Show GitHub Exploit DB Packet Storm
314374 - - - A vulnerability in Pantera CRM versions 401.152 and 402.072 allows unauthorized attackers to bypass IP-based access controls by manipulating the X-Forwarded-For header. - CVE-2024-40530 2024-08-29 04:15 2024-08-6 Show GitHub Exploit DB Packet Storm
314375 8.3 HIGH
Network
microsoft edge_chromium Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability NVD-CWE-noinfo
CVE-2024-43472 2024-08-29 04:13 2024-08-17 Show GitHub Exploit DB Packet Storm
314376 5.3 MEDIUM
Network
softlabbd radio_player The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_player function in versions up to, and including, 2.0.73. This… CWE-862
 Missing Authorization
CVE-2023-4024 2024-08-29 03:32 2024-08-17 Show GitHub Exploit DB Packet Storm
314377 5.3 MEDIUM
Network
softlabbd radio_player The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_player function in versions up to, and including, 2.0.73. This… CWE-862
 Missing Authorization
CVE-2023-4025 2024-08-29 03:30 2024-08-17 Show GitHub Exploit DB Packet Storm
314378 9.8 CRITICAL
Network
alientechnology alr-f800_firmware A vulnerability was found in Alien Technology ALR-F800 up to 19.10.24.00. It has been classified as critical. Affected is an unknown function of the file /var/www/cmd.php. The manipulation of the arg… CWE-285
Improper Authorization
CVE-2024-7578 2024-08-29 03:27 2024-08-7 Show GitHub Exploit DB Packet Storm
314379 8.8 HIGH
Network
alientechnology alr-f800_firmware A vulnerability was found in Alien Technology ALR-F800 up to 19.10.24.00. It has been declared as critical. Affected by this vulnerability is the function popen of the file /var/www/cgi-bin/upgrade.c… CWE-78
OS Command 
CVE-2024-7579 2024-08-29 03:26 2024-08-7 Show GitHub Exploit DB Packet Storm
314380 7.8 HIGH
Local
okta verify Okta Verify for Windows is vulnerable to privilege escalation through DLL hijacking. The vulnerability is fixed in Okta Verify for Windows version 5.0.2. To remediate this vulnerability, upgrade to 5… CWE-427
 Uncontrolled Search Path Element
CVE-2024-7061 2024-08-29 03:25 2024-08-8 Show GitHub Exploit DB Packet Storm