Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 21, 2026, 6:01 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
1741 8.6 重要
Network
Mervin Praison (MervinPraison) PraisonAI Mervin Praison (MervinPraison)のPraisonAI等の複数製品におけるクラスまたはコードを選択する外部から制御された入力の使用に関する脆弱性 CWE-470
クラスまたはコードを選択する外部から制御された入力の使用
CVE-2026-44339 2026-05-11 11:04 2026-05-8 Show GitHub Exploit DB Packet Storm
1742 7.5 重要
Network
Mervin Praison (MervinPraison) PraisonAI Mervin Praison (MervinPraison)のPraisonAIにおける複数の脆弱性 CWE-22
CWE-59
CVE-2026-44340 2026-05-11 11:04 2026-05-8 Show GitHub Exploit DB Packet Storm
1743 7.8 重要
Local
ZTE ZXCLOUD iRAI ZTEのZXCLOUD iRAIにおける制御されていない検索パスの要素に関する脆弱性 CWE-427
制御されていない検索パスの要素
CVE-2026-44406 2026-05-11 11:04 2026-05-7 Show GitHub Exploit DB Packet Storm
1744 7.5 重要
Network
Zcash Foundation Zebrad Zcash FoundationのZebradにおける計算の誤りに関する脆弱性 CWE-682
計算の誤り
CVE-2026-44498 2026-05-11 11:04 2026-05-8 Show GitHub Exploit DB Packet Storm
1745 5.3 警告
Network
Zcash Foundation zebra-network
Zebra-chain
Zebrad
Zcash FoundationのZebra-chain等の複数製品における制限またはスロットリング無しのリソースの割り当てに関する脆弱性 CWE-770
制限またはスロットリング無しのリソースの割り当て
CVE-2026-44500 2026-05-11 11:04 2026-05-8 Show GitHub Exploit DB Packet Storm
1746 7.5 重要
Network
The Tor Project Tor The Tor ProjectのTorにおける単一、固有のアクションの実施に関する脆弱性 CWE-837
単一、固有のアクションの不適切な実施
CVE-2026-44601 2026-05-11 11:04 2026-05-7 Show GitHub Exploit DB Packet Storm
1747 7.5 重要
Network
The Tor Project Tor The Tor ProjectのTorにおけるNULL ポインタデリファレンスに関する脆弱性 CWE-476
NULL ポインタデリファレンス
CVE-2026-44602 2026-05-11 11:04 2026-05-7 Show GitHub Exploit DB Packet Storm
1748 5.5 警告
Local
Open Source Geospatial Foundation GDAL Open Source Geospatial FoundationのGDALにおける複数の脆弱性 CWE-119
CWE-125
CVE-2026-8084 2026-05-11 11:04 2026-05-7 Show GitHub Exploit DB Packet Storm
1749 7.8 重要
Local
Open Source Geospatial Foundation GDAL Open Source Geospatial FoundationのGDALにおける複数の脆弱性 CWE-119
CWE-122
CVE-2026-8086 2026-05-11 11:04 2026-05-7 Show GitHub Exploit DB Packet Storm
1750 7.8 重要
Local
Open Source Geospatial Foundation GDAL Open Source Geospatial FoundationのGDALにおける複数の脆弱性 CWE-119
CWE-122
CVE-2026-8087 2026-05-11 11:04 2026-05-7 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 21, 2026, 4:10 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
2081 7.2 HIGH
Network
- - A vulnerability in the command line interface of Access Points running AOS-10 could allow an authenticated remote attacker to perform command injection. Successful exploitation could allow an attacke… CWE-77
Command Injection
CVE-2026-23823 2026-05-14 00:35 2026-05-13 Show GitHub Exploit DB Packet Storm
2082 9.1 CRITICAL
Network
- - Hitachi Vantara Pentaho Data Integration & Analytics of all versions contain a JDBC driver for H2 databases which is vulnerable to external script execution when a new connection is created by a data… - CVE-2025-11159 2026-05-14 00:35 2026-05-13 Show GitHub Exploit DB Packet Storm
2083 4.3 MEDIUM
Network
- - A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to ce… CWE-36
 Absolute Path Traversal
CVE-2026-32175 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2084 7.3 HIGH
Local
- - Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally. CWE-20
CWE-122
 Improper Input Validation 
Heap-based Buffer Overflow
CVE-2026-32177 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2085 7.8 HIGH
Local
- - External control of file name or path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. CWE-73
 External Control of File Name or Path
CVE-2026-32204 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2086 8.2 HIGH
Network
- - Improper neutralization of special elements in output used by a downstream component ('injection') in Azure Machine Learning allows an unauthorized attacker to perform spoofing over a network. CWE-74
Injection
CVE-2026-33833 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2087 7.3 HIGH
Local
- - Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally. CWE-20
CWE-190
 Improper Input Validation 
 Integer Overflow or Wraparound
CVE-2026-35433 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2088 8.3 HIGH
Network
- - Missing authorization in Windows Admin Center allows an authorized attacker to elevate privileges over a network. CWE-862
 Missing Authorization
CVE-2026-35438 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2089 8.8 HIGH
Network
- - External control of file name or path in SQL Server allows an authorized attacker to execute code over a network. CWE-73
 External Control of File Name or Path
CVE-2026-40370 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2090 9.3 CRITICAL
Network
- - Exposure of sensitive information to an unauthorized actor in Azure Entra ID allows an unauthorized attacker to perform spoofing over a network. CWE-200
Information Exposure
CVE-2026-40379 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm