|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 21, 2026, 6:01 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 531 | 10 |
緊急
Network |
vm2 project | vm2 | vm2 projectのvm2におけるコードインジェクションの脆弱性 |
CWE-94
コード・インジェクション |
CVE-2026-43997 | 2026-05-18 12:13 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 532 | 8.5 |
重要
Network |
vm2 project | vm2 | vm2 projectのvm2におけるリンク解釈に関する脆弱性 |
CWE-59
リンク解釈の問題 |
CVE-2026-43998 | 2026-05-18 12:13 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 533 | 9.9 |
緊急
Network |
vm2 project | vm2 | vm2 projectのvm2における不正な認証に関する脆弱性 |
CWE-863
不正な認証 |
CVE-2026-43999 | 2026-05-18 12:13 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 534 | 7.2 |
重要
Network |
vm2 project | vm2 | vm2 projectのvm2における保護メカニズムの不具合に関する脆弱性 |
CWE-693
保護メカニズムの不具合 |
CVE-2026-44000 | 2026-05-18 12:13 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 535 | 8.6 |
重要
Network |
vm2 project | vm2 | vm2 projectのvm2におけるキャッチされない例外に関する脆弱性 |
CWE-248
キャッチされない例外 |
CVE-2026-44001 | 2026-05-18 12:13 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 536 | 5.8 |
警告
Network |
vm2 project | vm2 | vm2 projectのvm2におけるエラーメッセージによる情報漏えいに関する脆弱性 |
CWE-209
エラーメッセージによる情報漏えい |
CVE-2026-44002 | 2026-05-18 12:13 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 537 | 5.8 |
警告
Network |
vm2 project | vm2 | vm2 projectのvm2における保護メカニズムの不具合に関する脆弱性 |
CWE-693
保護メカニズムの不具合 |
CVE-2026-44003 | 2026-05-18 12:12 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 538 | 7.5 |
重要
Network |
vm2 project | vm2 | vm2 projectのvm2における制限またはスロットリング無しのリソースの割り当てに関する脆弱性 |
CWE-770
制限またはスロットリング無しのリソースの割り当て |
CVE-2026-44004 | 2026-05-18 12:12 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 539 | 10 |
緊急
Network |
vm2 project | vm2 | vm2 projectのvm2における複数の脆弱性 |
CWE-1321 CWE-94 |
CVE-2026-44005 | 2026-05-18 12:12 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 540 | 10 |
緊急
Network |
vm2 project | vm2 | vm2 projectのvm2におけるコードインジェクションの脆弱性 |
CWE-94
コード・インジェクション |
CVE-2026-44006 | 2026-05-18 12:12 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 22, 2026, 4:08 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 1261 | 6.7 |
MEDIUM
Local |
microsoft |
windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2019 windows_server_2022 windows_server_2022_… |
Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally. |
CWE-1329
Reliance on Component That is Not Updateable |
CVE-2026-41097 | 2026-05-16 00:36 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1262 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally. |
CWE-416
Use After Free |
CVE-2026-40382 | 2026-05-16 00:32 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1263 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Integer underflow (wrap or wraparound) in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
CWE-191
Integer Underflow (Wrap or Wraparound) |
CVE-2026-40397 | 2026-05-16 00:28 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1264 | 7.4 |
HIGH
Network |
microsoft | edge_chromium | External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network. |
CWE-73 CWE-610 External Control of File Name or Path Externally Controlled Reference to a Resource in Another Sphere |
CVE-2026-41107 | 2026-05-16 00:28 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1265 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Heap-based buffer overflow in Windows Remote Desktop allows an authorized attacker to elevate privileges locally. |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-40398 | 2026-05-16 00:27 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1266 | 8.8 |
HIGH
Network |
microsoft | visual_studio_code | Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature ove… |
CWE-74
Injection |
CVE-2026-41109 | 2026-05-16 00:27 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1267 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2016 windows_server_2019 w… |
Stack-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges locally. |
CWE-121
Stack-based Buffer Overflow |
CVE-2026-40399 | 2026-05-16 00:26 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1268 | 7.1 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service locally. |
CWE-476
NULL Pointer Dereference |
CVE-2026-40401 | 2026-05-16 00:25 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1269 | 9.3 |
CRITICAL
Local |
microsoft |
windows_11_23h2 windows_server_2022 |
Use after free in Windows Hyper-V allows an unauthorized attacker to elevate privileges locally. |
CWE-416
Use After Free |
CVE-2026-40402 | 2026-05-16 00:23 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1270 | 8.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to execute code locally. |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-40403 | 2026-05-16 00:22 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |