Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 21, 2026, 2 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2041 7.3 重要
Network
osrg GoBGP osrgのGoBGPにおける複数の脆弱性 CWE-119
CWE-120
CVE-2026-7735 2026-05-8 12:20 2026-05-4 Show GitHub Exploit DB Packet Storm
2042 7.5 重要
Network
osrg GoBGP osrgのGoBGPにおける複数の脆弱性 CWE-189
CWE-191
CVE-2026-7736 2026-05-8 12:20 2026-05-4 Show GitHub Exploit DB Packet Storm
2043 7.5 重要
Network
osrg GoBGP osrgのGoBGPにおける複数の脆弱性 CWE-119
CWE-125
CVE-2026-7737 2026-05-8 12:20 2026-05-4 Show GitHub Exploit DB Packet Storm
2044 7.2 重要
Network
D-Link Systems, Inc. di-8100 ファームウェア D-Link Corporationのdi-8100 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-7851 2026-05-8 12:20 2026-05-5 Show GitHub Exploit DB Packet Storm
2045 9.8 緊急
Network
D-Link Systems, Inc. di-8100 ファームウェア D-Link Corporationのdi-8100 ファームウェアにおける複数の脆弱性 CWE-119
CWE-120
CVE-2026-7853 2026-05-8 12:20 2026-05-5 Show GitHub Exploit DB Packet Storm
2046 9.8 緊急
Network
D-Link Systems, Inc. di-8100 ファームウェア D-Link Corporationのdi-8100 ファームウェアにおける複数の脆弱性 CWE-119
CWE-120
CVE-2026-7854 2026-05-8 12:20 2026-05-5 Show GitHub Exploit DB Packet Storm
2047 7.2 重要
Network
D-Link Systems, Inc. di-8100 ファームウェア D-Link Corporationのdi-8100 ファームウェアにおける複数の脆弱性 CWE-119
CWE-120
CVE-2026-7855 2026-05-8 12:20 2026-05-5 Show GitHub Exploit DB Packet Storm
2048 7.2 重要
Network
D-Link Systems, Inc. di-8100 ファームウェア D-Link Corporationのdi-8100 ファームウェアにおける複数の脆弱性 CWE-119
CWE-120
CVE-2026-7856 2026-05-8 12:20 2026-05-5 Show GitHub Exploit DB Packet Storm
2049 7.2 重要
Network
D-Link Systems, Inc. di-8100 ファームウェア D-Link Corporationのdi-8100 ファームウェアにおける複数の脆弱性 CWE-119
CWE-120
CVE-2026-7857 2026-05-8 12:20 2026-05-5 Show GitHub Exploit DB Packet Storm
2050 8.8 重要
Network
Google Google Chrome GoogleのGoogle Chromeにおける不変と仮定される Web パラメータの外部制御に関する脆弱性 CWE-472
不変と仮定される Web パラメータの外部制御
CVE-2026-7896 2026-05-8 12:19 2026-05-6 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 21, 2026, 4:10 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
2081 7.2 HIGH
Network
- - A vulnerability in the command line interface of Access Points running AOS-10 could allow an authenticated remote attacker to perform command injection. Successful exploitation could allow an attacke… CWE-77
Command Injection
CVE-2026-23823 2026-05-14 00:35 2026-05-13 Show GitHub Exploit DB Packet Storm
2082 9.1 CRITICAL
Network
- - Hitachi Vantara Pentaho Data Integration & Analytics of all versions contain a JDBC driver for H2 databases which is vulnerable to external script execution when a new connection is created by a data… - CVE-2025-11159 2026-05-14 00:35 2026-05-13 Show GitHub Exploit DB Packet Storm
2083 4.3 MEDIUM
Network
- - A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to ce… CWE-36
 Absolute Path Traversal
CVE-2026-32175 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2084 7.3 HIGH
Local
- - Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally. CWE-20
CWE-122
 Improper Input Validation 
Heap-based Buffer Overflow
CVE-2026-32177 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2085 7.8 HIGH
Local
- - External control of file name or path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. CWE-73
 External Control of File Name or Path
CVE-2026-32204 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2086 8.2 HIGH
Network
- - Improper neutralization of special elements in output used by a downstream component ('injection') in Azure Machine Learning allows an unauthorized attacker to perform spoofing over a network. CWE-74
Injection
CVE-2026-33833 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2087 7.3 HIGH
Local
- - Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally. CWE-20
CWE-190
 Improper Input Validation 
 Integer Overflow or Wraparound
CVE-2026-35433 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2088 8.3 HIGH
Network
- - Missing authorization in Windows Admin Center allows an authorized attacker to elevate privileges over a network. CWE-862
 Missing Authorization
CVE-2026-35438 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2089 8.8 HIGH
Network
- - External control of file name or path in SQL Server allows an authorized attacker to execute code over a network. CWE-73
 External Control of File Name or Path
CVE-2026-40370 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
2090 9.3 CRITICAL
Network
- - Exposure of sensitive information to an unauthorized actor in Azure Entra ID allows an unauthorized attacker to perform spoofing over a network. CWE-200
Information Exposure
CVE-2026-40379 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm