|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 17, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 2751 | 5.5 |
警告
Local |
River Past Ringtone Converter Project | River Past Ringtone Converter | River Past Ringtone Converter ProjectのRiver Past Ringtone Converterにおける境界外書き込みに関する脆弱性 |
CWE-787
境界外書き込み |
CVE-2019-25665 | 2026-04-28 10:11 | 2026-04-5 | Show | GitHub Exploit DB Packet Storm |
| 2752 | 7.8 |
重要
Local |
River Past Video Clear Project | River Past Video Clear | River Past Video Clear ProjectのRiver Past Video Clearにおける境界外書き込みに関する脆弱性 |
CWE-787
境界外書き込み |
CVE-2019-25670 | 2026-04-28 10:11 | 2026-04-5 | Show | GitHub Exploit DB Packet Storm |
| 2753 | 7.8 |
重要
Local |
iBoysoft | NTFS for Mac | iBoysoftのNTFS for Macにおける重要なリソースに対する不適切なパーミッションの割り当てに関する脆弱性 |
CWE-732
重要なリソースに対する不適切なパーミッションの割り当て |
CVE-2026-2637 | 2026-04-28 10:11 | 2026-03-3 | Show | GitHub Exploit DB Packet Storm |
| 2754 | 6.6 |
警告
Local |
Saurabh Kumar | python-dotenv | Saurabh Kumarのpython-dotenvにおける複数の脆弱性 |
CWE-59 CWE-61 |
CVE-2026-28684 | 2026-04-28 10:11 | 2026-04-20 | Show | GitHub Exploit DB Packet Storm |
| 2755 | 10 |
緊急
Network |
Smallstep | Step CA | SmallstepのStep CAにおける複数の脆弱性 |
CWE-287 CWE-295 CWE-295 |
CVE-2026-30836 | 2026-04-28 10:11 | 2026-03-19 | Show | GitHub Exploit DB Packet Storm |
| 2756 | 4.7 |
警告
Local |
GL.iNet | Comet (GL-RM1) Firmware | GL.iNetのComet (GL-RM1) Firmwareにおけるデータの信頼性についての不十分な検証に関する脆弱性 |
CWE-345
データの信頼性についての不十分な検証 |
CVE-2026-32290 | 2026-04-28 10:11 | 2026-03-17 | Show | GitHub Exploit DB Packet Storm |
| 2757 | 6.8 |
警告
Physics |
GL.iNet | Comet (GL-RM1) Firmware | GL.iNetのComet (GL-RM1) Firmwareにおける重要な機能に対する認証の欠如に関する脆弱性 |
CWE-306
重要な機能に対する認証の欠如 解説 |
CVE-2026-32291 | 2026-04-28 10:11 | 2026-03-17 | Show | GitHub Exploit DB Packet Storm |
| 2758 | 7.5 |
重要
Network |
GL.iNet | Comet (GL-RM1) Firmware | GL.iNetのComet (GL-RM1) Firmwareにおける過度な認証試行の不適切な制限に関する脆弱性 |
CWE-307
過度な認証試行の不適切な制限 |
CVE-2026-32292 | 2026-04-28 10:11 | 2026-03-17 | Show | GitHub Exploit DB Packet Storm |
| 2759 | 3.7 |
低
Network |
GL.iNet | Comet (GL-RM1) Firmware | GL.iNetのComet (GL-RM1) Firmwareにおける証明書検証に関する脆弱性 |
CWE-295
不正な証明書検証 |
CVE-2026-32293 | 2026-04-28 10:11 | 2026-03-17 | Show | GitHub Exploit DB Packet Storm |
| 2760 | 6.5 |
警告
Network |
オラクル | PeopleSoft Enterprise FIN Contracts | オラクルのPeopleSoft Enterprise FIN Contractsにおける情報漏えいに関する脆弱性 |
CWE-200
情報漏えい |
CVE-2026-34300 | 2026-04-28 10:11 | 2026-04-21 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 18, 2026, 4:12 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 761 | 5.5 |
MEDIUM
Local |
gpac | gpac | A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. … Update |
CWE-400 CWE-770 Uncontrolled Resource Consumption Allocation of Resources Without Limits or Throttling |
CVE-2026-8124 | 2026-05-15 03:02 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 762 | 7.5 |
HIGH
Network |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Missing release of memory after effective lifetime in Windows Internet Key Exchange (IKE) Protocol allows an unauthorized attacker to deny service over a network. Update |
CWE-401
Missing Release of Memory after Effective Lifetime |
CVE-2026-35424 | 2026-05-15 03:02 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 763 | 6.5 |
MEDIUM
Network |
8421bit | miniclaw | A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the compone… Update |
CWE-22
Path Traversal |
CVE-2026-8113 | 2026-05-15 03:02 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 764 | 9.8 |
CRITICAL
Network |
yarbo |
lawn_mower_firmware lawn_mower_pro_firmware |
A hidden, persistent backdoor was found in Yarbo firmware v2.3.9 that provides remote, unauthenticated (or weakly authenticated) access to privileged functionality. The backdoor is undocumented, cann… Update |
CWE-912 NVD-CWE-noinfo Hidden Functionality |
CVE-2026-7413 | 2026-05-15 02:54 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 765 | 9.8 |
CRITICAL
Network |
yarbo |
lawn_mower_firmware lawn_mower_pro_firmware |
Yarbo firmware v2.3.9 contains hardcoded administrative credentials embedded in the firmware image. These credentials are identical across all devices running this firmware and cannot be changed or r… Update |
CWE-798
Use of Hard-coded Credentials |
CVE-2026-7414 | 2026-05-15 02:53 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 766 | 7.8 |
HIGH
Local |
microsoft |
windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2025 |
Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. Update |
CWE-822
Untrusted Pointer Dereference |
CVE-2026-40369 | 2026-05-15 02:52 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 767 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Heap-based buffer overflow in Windows Cryptographic Services allows an authorized attacker to elevate privileges locally. Update |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-40377 | 2026-05-15 02:52 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 768 | 9.8 |
CRITICAL
Network |
yarbo |
lawn_mower_firmware lawn_mower_pro_firmware |
The MQTT broker embedded in Yarbo firmware v2.3.9 is configured to allow anonymous connections with no topic-level read or write ACLs. Any host on the same network can subscribe to sensitive telemetr… Update |
CWE-306
Missing Authentication for Critical Function |
CVE-2026-7415 | 2026-05-15 02:50 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 769 | 6.2 |
MEDIUM
Physics |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Heap-based buffer overflow in Volume Manager Extension Driver allows an authorized attacker to execute code with a physical attack. Update |
CWE-122 CWE-125 CWE-197 Heap-based Buffer Overflow Out-of-bounds Read Numeric Truncation Error |
CVE-2026-40380 | 2026-05-15 02:49 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 770 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. Update |
CWE-843
Type Confusion |
CVE-2026-34344 | 2026-05-15 02:48 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |