Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 21, 2026, 6:01 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
711 7.4 重要
Network
マイクロソフト Microsoft Authenticator Microsoft Authenticator の情報漏えいの脆弱性 CWE-200
情報漏えい
CVE-2026-41615 2026-05-18 11:30 2026-05-14 Show GitHub Exploit DB Packet Storm
712 6.5 警告
Network
Distribution Distribution Distributionにおける不正な認証に関する脆弱性 CWE-863
不正な認証
CVE-2026-41888 2026-05-18 11:30 2026-05-14 Show GitHub Exploit DB Packet Storm
713 7.5 重要
Network
Signal K Signal K Server Signal KのSignal K Serverにおける過度な認証試行の不適切な制限に関する脆弱性 CWE-307
過度な認証試行の不適切な制限
CVE-2026-41893 2026-05-18 11:30 2026-05-9 Show GitHub Exploit DB Packet Storm
714 9.8 緊急
Network
Open Knowledge Foundation CKAN Open Knowledge FoundationのCKANにおけるSQL インジェクションの脆弱性 CWE-89
SQLインジェクション
CVE-2026-42031 2026-05-18 11:30 2026-05-13 Show GitHub Exploit DB Packet Storm
715 9.1 緊急
Network
Open Knowledge Foundation CKAN Open Knowledge FoundationのCKANにおける不正な認証に関する脆弱性 CWE-863
不正な認証
CVE-2026-42032 2026-05-18 11:30 2026-05-13 Show GitHub Exploit DB Packet Storm
716 4.9 警告
Network
argoproj Argo Workflows Argo Project AuthorsのArgo Workflowsにおける認証情報の不十分な保護に関する脆弱性 CWE-522
認証情報の不十分な保護
CVE-2026-42295 2026-05-18 11:30 2026-05-9 Show GitHub Exploit DB Packet Storm
717 8.1 重要
Network
argoproj Argo Workflows Argo Project AuthorsのArgo Workflowsにおける不正な認証に関する脆弱性 CWE-863
不正な認証
CVE-2026-42296 2026-05-18 11:30 2026-05-9 Show GitHub Exploit DB Packet Storm
718 8.3 重要
Network
argoproj Argo Workflows Argo Project AuthorsのArgo Workflowsにおける認証の欠如に関する脆弱性 CWE-862
認証の欠如
CVE-2026-42297 2026-05-18 11:30 2026-05-9 Show GitHub Exploit DB Packet Storm
719 6.8 警告
Network
pyLoad-ng project pyLoad-ng pyLoad-ng projectのpyLoad-ngにおける複数の脆弱性 CWE-295
CWE-306
CWE-863
CVE-2026-42312 2026-05-18 11:30 2026-05-11 Show GitHub Exploit DB Packet Storm
720 8.3 重要
Network
pyLoad-ng project pyLoad-ng pyLoad-ng projectのpyLoad-ngにおける複数の脆弱性 CWE-441
CWE-863
CWE-918
CVE-2026-42313 2026-05-18 11:30 2026-05-11 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 21, 2026, 4:10 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
311831 - - - Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service. - CVE-2024-47971 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311832 - - - Meshtastic is an open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices. Meshtastic firmware is an open source firmware implementation for the broader projec… CWE-345
 Insufficient Verification of Data Authenticity
CVE-2024-47079 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311833 - - - Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potent… CWE-20
CWE-121
 Improper Input Validation 
Stack-based Buffer Overflow
CVE-2024-31449 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311834 - - - Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands suc… CWE-674
 Uncontrolled Recursion
CVE-2024-31228 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311835 - - - Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and su… CWE-20
 Improper Input Validation 
CVE-2024-31227 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311836 - - - BlueCMS 1.6 suffers from Arbitrary File Deletion via the file_name parameter in an /admin/database.php?act=del request. - CVE-2024-45894 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311837 - - - An issue was discovered in the m2m scaler driver in Samsung Mobile Processor and Wearable Processor Exynos 9820, 9825, 980, 990, 850,and W920. A Use-After-Free in the mobile processor leads to privil… - CVE-2024-44068 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311838 - - - Missing Authentication - User & System Configuration - CVE-2024-47555 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311839 - - - RuoYi v4.7.9 and before has a security flaw that allows escaping from comments within the code generation feature, enabling the injection of malicious code. - CVE-2024-46076 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm
311840 - - - D-Link COVR-2600R FW101b05 is vulnerable to Buffer Overflow. In the function sub_24E28, the HTTP_REFERER is obtained through an environment variable, and this field is controllable, allowing it to be… - CVE-2024-44674 2024-10-10 21:57 2024-10-8 Show GitHub Exploit DB Packet Storm