Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 23, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
3011 5.5 警告
Local
Foxit pdf editor
pdf reader
Foxitのpdf editor等の複数製品におけるキャッチされない例外に関する脆弱性 CWE-248
キャッチされない例外
CVE-2026-5937 2026-05-1 10:43 2026-04-27 Show GitHub Exploit DB Packet Storm
3012 5.5 警告
Local
Foxit pdf editor
pdf reader
Foxitのpdf editor等の複数製品における不十分な制御フロー管理に関する脆弱性 CWE-691
不十分な制御フロー管理
CVE-2026-5938 2026-05-1 10:43 2026-04-27 Show GitHub Exploit DB Packet Storm
3013 5.5 警告
Local
Foxit pdf editor
pdf reader
Foxitのpdf editor等の複数製品における解放済みメモリの使用に関する脆弱性 CWE-416
解放済みメモリの使用
CVE-2026-5939 2026-05-1 10:43 2026-04-27 Show GitHub Exploit DB Packet Storm
3014 5.5 警告
Local
Foxit pdf editor
pdf reader
Foxitのpdf editor等の複数製品における解放済みメモリの使用に関する脆弱性 CWE-416
解放済みメモリの使用
CVE-2026-5940 2026-05-1 10:43 2026-04-27 Show GitHub Exploit DB Packet Storm
3015 7.1 重要
Local
Foxit pdf editor
pdf reader
Foxitのpdf editor等の複数製品における入力確認に関する脆弱性 CWE-20
CWE-noinfo
CVE-2026-5941 2026-05-1 10:43 2026-04-27 Show GitHub Exploit DB Packet Storm
3016 5.5 警告
Local
Foxit pdf editor
pdf reader
Foxitのpdf editor等の複数製品における解放済みメモリの使用に関する脆弱性 CWE-416
解放済みメモリの使用
CVE-2026-5942 2026-05-1 10:43 2026-04-27 Show GitHub Exploit DB Packet Storm
3017 7.8 重要
Local
Foxit pdf editor
pdf reader
Foxitのpdf editor等の複数製品における解放済みメモリの使用に関する脆弱性 CWE-416
解放済みメモリの使用
CVE-2026-5943 2026-05-1 10:43 2026-04-27 Show GitHub Exploit DB Packet Storm
3018 9.8 緊急
Network
Shenzhen Tenda Technology Co.,Ltd. ch22 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のch22 ファームウェアにおけるパストラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2026-5962 2026-05-1 10:43 2026-04-9 Show GitHub Exploit DB Packet Storm
3019 9.8 緊急
Network
MetaGPT MetaGPT MetaGPTにおける複数の脆弱性 fix: isolate Test.exec_code() namespace and subprocess to prevent CWE-95 code injection via globals() leak by sebastiondev&n…
CVE-2026-5970 2026-05-1 10:43 2026-04-9 Show GitHub Exploit DB Packet Storm
3020 9.8 緊急
Network
MetaGPT MetaGPT MetaGPTにおける複数の脆弱性 CWE-94
CWE-95
CVE-2026-5971 2026-05-1 10:43 2026-04-9 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 23, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
316981 - - - A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /ajax.php?act… CWE-79
Cross-site Scripting
CVE-2024-7359 2024-08-2 21:59 2024-08-2 Show GitHub Exploit DB Packet Storm
316982 - - - Bostr is an nostr relay aggregator proxy that acts like a regular nostr relay. bostr let everyone in even having authorized_keys being set when noscraper is set to true. This vulnerability is fixed i… - CVE-2024-41962 2024-08-2 21:59 2024-08-2 Show GitHub Exploit DB Packet Storm
316983 - - - Cross-Site Request Forgery (CSRF) vulnerability in Martin Gibson WP GoToWebinar allows Cross-Site Scripting (XSS).This issue affects WP GoToWebinar: from n/a through 15.7. CWE-352
 Origin Validation Error
CVE-2024-38776 2024-08-2 17:15 2024-08-2 Show GitHub Exploit DB Packet Storm
316984 - - - In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero. - CVE-2024-42460 2024-08-2 16:16 2024-08-2 Show GitHub Exploit DB Packet Storm
316985 - - - In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended. - CVE-2024-42459 2024-08-2 16:16 2024-08-2 Show GitHub Exploit DB Packet Storm
316986 8.8 HIGH
Network
- - The WordPress Menu Plugin — Superfly Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.29. This is due to missing or incorrect… - CVE-2024-3238 2024-08-2 16:16 2024-08-2 Show GitHub Exploit DB Packet Storm
316987 5.5 MEDIUM
Local
- - InDesign Desktop versions ID18.5.2, ID19.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerabi… CWE-125
Out-of-bounds Read
CVE-2024-39396 2024-08-2 16:16 2024-08-2 Show GitHub Exploit DB Packet Storm
316988 7.8 HIGH
Local
- - InDesign Desktop versions ID18.5.2, ID19.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exp… CWE-122
Heap-based Buffer Overflow
CVE-2024-39392 2024-08-2 16:16 2024-08-2 Show GitHub Exploit DB Packet Storm
316989 - - - The Essential Blocks WordPress plugin before 4.7.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users… - CVE-2024-5595 2024-08-2 15:15 2024-08-2 Show GitHub Exploit DB Packet Storm
316990 9.0 CRITICAL
Network
- - Weak authentication in Microsoft Dynamics 365 allows an unauthenticated attacker to elevate privileges over a network. - CVE-2024-38182 2024-08-2 13:17 2024-08-1 Show GitHub Exploit DB Packet Storm