Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 21, 2026, 10 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
671 8.8 重要
Network
Google Google Chrome GoogleのGoogle Chromeにおける解放済みメモリの使用に関する脆弱性 CWE-416
解放済みメモリの使用
CVE-2026-8581 2026-05-18 11:23 2026-05-14 Show GitHub Exploit DB Packet Storm
672 4.3 警告
Network
GitLab.org GitLab GitLab.orgのGitLabにおけるアセットへのアクセス後に実装されたアクセス制御チェックに関する脆弱性 CWE-1280
アセットへのアクセス後に実装されたアクセス制御チェック
CVE-2026-3607 2026-05-18 11:23 2026-05-14 Show GitHub Exploit DB Packet Storm
673 9.8 緊急
Network
フォーティネット FortiSandbox
FortiSandbox PaaS
FortiSandbox Cloud
フォーティネットのFortiSandbox等の複数製品における認証の欠如に関する脆弱性 CWE-862
認証の欠如
CVE-2026-26083 2026-05-18 11:23 2026-05-12 Show GitHub Exploit DB Packet Storm
674 7.5 重要
Network
アドビシステムズ C2PA (Coalition for Content Provenance and Authenticity)
(Content Authenticity Initiative) c2pa-web
アドビの(Content Authenticity Initiative) c2pa-web等の複数製品におけるリソースの枯渇に関する脆弱性 CWE-400
リソースの枯渇
CVE-2026-34665 2026-05-18 11:23 2026-05-12 Show GitHub Exploit DB Packet Storm
675 6.2 警告
Local
アドビシステムズ C2PA (Coalition for Content Provenance and Authenticity)
(Content Authenticity Initiative) c2pa-web
アドビの(Content Authenticity Initiative) c2pa-web等の複数製品における入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-34666 2026-05-18 11:23 2026-05-12 Show GitHub Exploit DB Packet Storm
676 6.2 警告
Local
アドビシステムズ C2PA (Coalition for Content Provenance and Authenticity)
(Content Authenticity Initiative) c2pa-web
アドビの(Content Authenticity Initiative) c2pa-web等の複数製品における整数アンダーフローの脆弱性 CWE-191
整数アンダーフロー
CVE-2026-34667 2026-05-18 11:23 2026-05-12 Show GitHub Exploit DB Packet Storm
677 6.2 警告
Local
アドビシステムズ C2PA (Coalition for Content Provenance and Authenticity)
(Content Authenticity Initiative) c2pa-web
アドビの(Content Authenticity Initiative) c2pa-web等の複数製品における入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-34668 2026-05-18 11:23 2026-05-12 Show GitHub Exploit DB Packet Storm
678 6.2 警告
Local
アドビシステムズ C2PA (Coalition for Content Provenance and Authenticity)
(Content Authenticity Initiative) c2pa-web
アドビの(Content Authenticity Initiative) c2pa-web等の複数製品における入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-34669 2026-05-18 11:23 2026-05-12 Show GitHub Exploit DB Packet Storm
679 6.2 警告
Local
アドビシステムズ C2PA (Coalition for Content Provenance and Authenticity)
(Content Authenticity Initiative) c2pa-web
アドビの(Content Authenticity Initiative) c2pa-web等の複数製品における入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-34670 2026-05-18 11:23 2026-05-12 Show GitHub Exploit DB Packet Storm
680 6.2 警告
Local
アドビシステムズ C2PA (Coalition for Content Provenance and Authenticity)
(Content Authenticity Initiative) c2pa-web
アドビの(Content Authenticity Initiative) c2pa-web等の複数製品における整数オーバーフローの脆弱性 CWE-190
整数オーバーフローまたはラップアラウンド
CVE-2026-34671 2026-05-18 11:23 2026-05-12 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 21, 2026, 4:10 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1331 7.8 HIGH
Local
microsoft windows_server_2012
windows_server_2016
windows_server_2019
windows_server_2022
windows_server_2022_23h2
windows_server_2025
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. CWE-122
Heap-based Buffer Overflow
CVE-2026-35420 2026-05-15 03:06 2026-05-13 Show GitHub Exploit DB Packet Storm
1332 7.8 HIGH
Local
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Heap-based buffer overflow in Windows GDI allows an unauthorized attacker to execute code locally. CWE-122
Heap-based Buffer Overflow
CVE-2026-35421 2026-05-15 03:05 2026-05-13 Show GitHub Exploit DB Packet Storm
1333 6.5 MEDIUM
Network
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Authentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network. CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-35422 2026-05-15 03:04 2026-05-13 Show GitHub Exploit DB Packet Storm
1334 6.1 MEDIUM
Network
osgeo mapserver MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker t… CWE-80
Basic XSS
CVE-2026-42030 2026-05-15 03:04 2026-05-9 Show GitHub Exploit DB Packet Storm
1335 5.4 MEDIUM
Network
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network. CWE-125
Out-of-bounds Read
CVE-2026-35423 2026-05-15 03:03 2026-05-13 Show GitHub Exploit DB Packet Storm
1336 6.5 MEDIUM
Network
pwpush password_pusher Password Pusher is an open source application to communicate sensitive information over the web. Prior to versions 1.69.3 and 2.4.2, a security issue in OSS PasswordPusher allowed unauthenticated cre… CWE-288
NVD-CWE-noinfo
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-41308 2026-05-15 03:03 2026-05-9 Show GitHub Exploit DB Packet Storm
1337 5.5 MEDIUM
Local
gpac gpac A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. … CWE-400
CWE-770
 Uncontrolled Resource Consumption
 Allocation of Resources Without Limits or Throttling
CVE-2026-8124 2026-05-15 03:02 2026-05-8 Show GitHub Exploit DB Packet Storm
1338 7.5 HIGH
Network
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Missing release of memory after effective lifetime in Windows Internet Key Exchange (IKE) Protocol allows an unauthorized attacker to deny service over a network. CWE-401
 Missing Release of Memory after Effective Lifetime
CVE-2026-35424 2026-05-15 03:02 2026-05-13 Show GitHub Exploit DB Packet Storm
1339 6.5 MEDIUM
Network
8421bit miniclaw A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the compone… CWE-22
Path Traversal
CVE-2026-8113 2026-05-15 03:02 2026-05-8 Show GitHub Exploit DB Packet Storm
1340 9.8 CRITICAL
Network
yarbo lawn_mower_firmware
lawn_mower_pro_firmware
A hidden, persistent backdoor was found in Yarbo firmware v2.3.9 that provides remote, unauthenticated (or weakly authenticated) access to privileged functionality. The backdoor is undocumented, cann… CWE-912
NVD-CWE-noinfo
 Hidden Functionality
CVE-2026-7413 2026-05-15 02:54 2026-05-8 Show GitHub Exploit DB Packet Storm