Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 16, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2721 7.3 重要
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるパストラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2026-35338 2026-04-28 10:13 2026-04-22 Show GitHub Exploit DB Packet Storm
2722 3.3
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるUnicode エンコーディングの処理に関する脆弱性 CWE-176
Unicode エンコーディングの不適切な処理
CVE-2026-35346 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2723 4.4 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおける入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-35347 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2724 7.7 重要
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるリンク解釈に関する脆弱性 CWE-59
リンク解釈の問題
CVE-2026-35349 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2725 4.2 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるパーミッションの不適切な保持に関する脆弱性 CWE-281
パーミッションの不適切な保持
CVE-2026-35351 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2726 3.3
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態
CVE-2026-35353 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2727 6.3 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態
CVE-2026-35355 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2728 6.3 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態
CVE-2026-35356 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2729 4.4 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおける複数の脆弱性 CWE-281
CWE-459
CVE-2026-35361 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
2730 3.6
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおけるTime-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 CWE-367
Time-of-check Time-of-use (TOCTOU) 競合状態
CVE-2026-35362 2026-04-28 10:12 2026-04-22 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 16, 2026, 4 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
314401 - - - An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with… - CVE-2024-5288 2024-08-28 21:57 2024-08-28 Show GitHub Exploit DB Packet Storm
314402 - - - The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormati… - CVE-2024-45037 2024-08-28 21:57 2024-08-28 Show GitHub Exploit DB Packet Storm
314403 - - - Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the elliptic curve. Meaning k = r mod n. The divisio… - CVE-2024-1544 2024-08-28 21:57 2024-08-28 Show GitHub Exploit DB Packet Storm
314404 - - - An authenticated user can download sensitive files from NX, EX, FX, AX, IVX, and CMS using path traversal for the URL of network anomaly download_artifact. CWE-35
 Path Traversal: '.../...//'
CVE-2024-7608 2024-08-28 18:15 2024-08-27 Show GitHub Exploit DB Packet Storm
314405 - - - Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot… CWE-1392
 Use of Default Credentials
CVE-2024-39584 2024-08-28 15:15 2024-08-28 Show GitHub Exploit DB Packet Storm
314406 - - - Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or D… CWE-59
Link Following
CVE-2023-43078 2024-08-28 15:15 2024-08-28 Show GitHub Exploit DB Packet Storm
314407 5.3 MEDIUM
Network
- - The Mollie Payments for WooCommerce plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 7.7.0. This is due to the error reporting being enabled by default… CWE-200
Information Exposure
CVE-2024-6448 2024-08-28 13:15 2024-08-28 Show GitHub Exploit DB Packet Storm
314408 9.8 CRITICAL
Network
- - The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin is vulnerable to PHP Object Injection via de… - CVE-2024-8030 2024-08-28 12:15 2024-08-28 Show GitHub Exploit DB Packet Storm
314409 5.3 MEDIUM
Network
- - The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST d… - CVE-2024-7573 2024-08-28 12:15 2024-08-28 Show GitHub Exploit DB Packet Storm
314410 - - - A Reflected Cross Site Scripting (XSS) vulnerability was found in "/music/controller.php?page=test" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute ar… - CVE-2024-42789 2024-08-28 05:35 2024-08-27 Show GitHub Exploit DB Packet Storm