Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 21, 2026, 6:01 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
401 7.8 重要
Local
Linux Foundation Automotive Grade Linux Linux FoundationのAutomotive Grade Linuxにおけるアクセス制御に関する脆弱性 New CWE-284
不適切なアクセス制御
CVE-2026-37526 2026-05-20 13:20 2026-05-1 Show GitHub Exploit DB Packet Storm
402 9.8 緊急
Network
Linux Foundation Automotive Grade Linux Linux FoundationのAutomotive Grade Linuxにおける複数の脆弱性 New CWE-22
CWE-367
CVE-2026-37531 2026-05-20 13:20 2026-05-1 Show GitHub Exploit DB Packet Storm
403 6.5 警告
Network
Timo Sirainen
Open-Xchange
Dovecot Pro
Dovecot
Timo Sirainen等の複数ベンダの製品におけるリソースの枯渇に関する脆弱性 New CWE-400
リソースの枯渇
CVE-2026-40016 2026-05-20 13:20 2026-05-12 Show GitHub Exploit DB Packet Storm
404 4.3 警告
Network
Timo Sirainen
Open-Xchange
Dovecot Pro
Dovecot
Timo Sirainen等の複数ベンダの製品におけるアクセス制御に関する脆弱性 New CWE-284
CWE-noinfo
CVE-2026-40020 2026-05-20 13:20 2026-05-12 Show GitHub Exploit DB Packet Storm
405 7.8 重要
Local
マイクロソフト Azure Connected Machine Agent Azure Connected Machine Agent の特権の昇格の脆弱性 New CWE-284
不適切なアクセス制御
CVE-2026-40381 2026-05-20 13:20 2026-05-12 Show GitHub Exploit DB Packet Storm
406 9.8 緊急
Network
エレコム株式会社 WRC-XE5400GS-G
WRC-BE72XSD-B
WAB-BE72-M
WRC-X1800GS-B
WRC-BE65QSD-B
WRC-X6000QSA-G
WRC-X3000GS2A-B
WRC-W702-B
WRC-X6000XS-G
WAB-BE36-M
WRC-X6000XST-G
WRC-X3000GS2-B
エレコム製無線LANルーターおよび無線アクセスポイントにおける複数の脆弱性(2026年5月) Update CWE-78
CWE-79
CWE-Other
CVE-2026-25107
CVE-2026-35506
CVE-2026-40621
CVE-2026-42062
CVE-2026-42948
CVE-2026-42950
CVE-2026-42961
2026-05-19 17:24 2026-05-12 Show GitHub Exploit DB Packet Storm
407 - - (複数のベンダ) (複数の製品) CISA ICS Advisory / ICS Medical Advisory(2026年05月14日) - - 2026-05-18 14:06 2026-05-15 Show GitHub Exploit DB Packet Storm
408 5.5 警告
Local
Linux Linux Kernel LinuxのLinux Kernelにおける不特定の脆弱性 CWE-noinfo
情報不足
CVE-2025-71297 2026-05-18 12:19 2026-05-8 Show GitHub Exploit DB Packet Storm
409 5.5 警告
Local
Linux Linux Kernel LinuxのLinux Kernelにおける不特定の脆弱性 CWE-noinfo
情報不足
CVE-2025-71298 2026-05-18 12:19 2026-05-8 Show GitHub Exploit DB Packet Storm
410 5.5 警告
Local
Linux Linux Kernel LinuxのLinux Kernelにおける不特定の脆弱性 CWE-noinfo
情報不足
CVE-2025-71299 2026-05-18 12:19 2026-05-8 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 21, 2026, 4:10 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
311731 - - - A vulnerability was discovered in DI_8200-16.07.26A1, which has been classified as critical. This issue affects the upgrade_filter_asp function in the upgrade_filter.asp file. Manipulation of the pat… - CVE-2024-44413 2024-10-15 21:57 2024-10-12 Show GitHub Exploit DB Packet Storm
311732 9.8 CRITICAL
Network
dlink dir-x4860_firmware Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inj… CWE-798
 Use of Hard-coded Credentials
CVE-2024-45698 2024-10-15 19:15 2024-09-16 Show GitHub Exploit DB Packet Storm
311733 - - - The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upg… - CVE-2024-47944 2024-10-15 18:15 2024-10-15 Show GitHub Exploit DB Packet Storm
311734 - - - The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh sc… - CVE-2024-47943 2024-10-15 18:15 2024-10-15 Show GitHub Exploit DB Packet Storm
311735 9.8 CRITICAL
Network
- - AIM LINE Marketing Platform from Esi Technology does not properly validate a specific query parameter. When the LINE Campaign Module is enabled, unauthenticated remote attackers can inject arbitrary … CWE-89
SQL Injection
CVE-2024-9982 2024-10-15 17:15 2024-10-15 Show GitHub Exploit DB Packet Storm
311736 7.3 HIGH
Network
- - The The AADMY – Add Auto Date Month Year Into Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.1. This is due to the software allowi… CWE-94
Code Injection
CVE-2024-9837 2024-10-15 17:15 2024-10-15 Show GitHub Exploit DB Packet Storm
311737 - - - Rejected reason: Unable to reproduce. - CVE-2024-1342 2024-10-15 07:15 2024-02-17 Show GitHub Exploit DB Packet Storm
311738 - - - Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-9823. Reason: This candidate is a reservation duplicate of CVE-2024-9823. Notes: All CVE users should reference CV… - CVE-2023-45817 2024-10-15 03:15 2024-10-15 Show GitHub Exploit DB Packet Storm
311739 - - - External Control of File Name or Path, : Incorrect Permission Assignment for Critical Resource vulnerability in Olgu Computer Systems e-Belediye allows Manipulating Web Input to File System Calls.Thi… CWE-73
CWE-732
 External Control of File Name or Path
 Incorrect Permission Assignment for Critical Resource
CVE-2024-9142 2024-10-15 01:35 2024-09-25 Show GitHub Exploit DB Packet Storm
311740 - - - Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-48251. Reason: This candidate is a reservation duplicate of CVE-2024-48251. Notes: All CVE users should reference CVE-2024-4825… - CVE-2024-48261 2024-10-15 00:15 2024-10-15 Show GitHub Exploit DB Packet Storm