|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 22, 2026, 12:09 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 209911 | 4.3 | 警告 | F5 Networks | - | 複数の F5 BIG-IQ シリーズ製品の REST API における任意のユーザの認証トークンを取得される脆弱性 |
CWE-310 CWE-Other |
CVE-2015-4637 | 2015-07-23 15:58 | 2015-07-6 | Show | GitHub Exploit DB Packet Storm |
| 209912 | 6.8 | 警告 | Free Reprintables | - | Free Reprintables ArticleFR におけるクロスサイトリクエストフォージェリの脆弱性 |
CWE-352
同一生成元ポリシー違反 |
CVE-2015-5530 | 2015-07-23 15:35 | 2015-06-21 | Show | GitHub Exploit DB Packet Storm |
| 209913 | 4.3 | 警告 | Free Reprintables | - | Free Reprintables ArticleFR におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2015-5529 | 2015-07-23 15:24 | 2015-06-21 | Show | GitHub Exploit DB Packet Storm |
| 209914 | 4.3 | 警告 | Syed Balkhi | - | WordPress 用 Floating Social Bar プラグインの class-floating-social-bar.php におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2015-5528 | 2015-07-23 15:05 | 2015-02-27 | Show | GitHub Exploit DB Packet Storm |
| 209915 | 9.3 | 危険 | SAP | - | SAP Enterprise Central Component における権限を取得される脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2015-3621 | 2015-07-23 14:40 | 2015-06-25 | Show | GitHub Exploit DB Packet Storm |
| 209916 | 7.2 | 危険 | SAP | - | SAP Afaria の Windows クライアントにおける権限を取得される脆弱性 |
CWE-Other
その他 |
CVE-2015-3449 | 2015-07-23 14:40 | 2015-02-10 | Show | GitHub Exploit DB Packet Storm |
| 209917 | 6.8 | 警告 | Xen プロジェクト | - | Xen の xl コマンドラインユーティリティにおけるスタックベースのバッファオーバーフローの脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2015-3259 | 2015-07-23 14:07 | 2015-07-7 | Show | GitHub Exploit DB Packet Storm |
| 209918 | 5 | 警告 | ジュニパーネットワークス | - | Juniper SRX Series のサービスゲートウェイの Junos OS 内の SRX Network Security Daemon におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-Other
その他 |
CVE-2015-5363 | 2015-07-23 12:23 | 2015-07-8 | Show | GitHub Exploit DB Packet Storm |
| 209919 | 7.8 | 危険 | シスコシステムズ | - | Cisco Videoscape Distribution Suite Service Broker および Videoscape Distribution Suite for Internet Streaming におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2015-0725 | 2015-07-23 11:56 | 2015-07-15 | Show | GitHub Exploit DB Packet Storm |
| 209920 | 4 | 警告 | IBM | - | IBM InfoSphere Master Data Management Collaborative Edition におけるアクセス制限を回避される脆弱性 |
CWE-200 CWE-264 |
CVE-2015-1984 | 2015-07-23 11:39 | 2015-06-26 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 22, 2026, 4:08 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 1531 | 7.8 |
HIGH
Local |
microsoft |
windows_server_2012 windows_server_2016 windows_server_2019 windows_server_2022 windows_server_2022_23h2 windows_server_2025 |
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-35420 | 2026-05-15 03:06 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1532 | 7.8 |
HIGH
Local |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Heap-based buffer overflow in Windows GDI allows an unauthorized attacker to execute code locally. |
CWE-122
Heap-based Buffer Overflow |
CVE-2026-35421 | 2026-05-15 03:05 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1533 | 6.5 |
MEDIUM
Network |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Authentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network. |
CWE-288
Authentication Bypass Using an Alternate Path or Channel |
CVE-2026-35422 | 2026-05-15 03:04 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1534 | 6.1 |
MEDIUM
Network |
osgeo | mapserver | MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker t… |
CWE-80
Basic XSS |
CVE-2026-42030 | 2026-05-15 03:04 | 2026-05-9 | Show | GitHub Exploit DB Packet Storm |
| 1535 | 5.4 |
MEDIUM
Network |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network. |
CWE-125
Out-of-bounds Read |
CVE-2026-35423 | 2026-05-15 03:03 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1536 | 6.5 |
MEDIUM
Network |
pwpush | password_pusher | Password Pusher is an open source application to communicate sensitive information over the web. Prior to versions 1.69.3 and 2.4.2, a security issue in OSS PasswordPusher allowed unauthenticated cre… |
CWE-288 NVD-CWE-noinfo Authentication Bypass Using an Alternate Path or Channel |
CVE-2026-41308 | 2026-05-15 03:03 | 2026-05-9 | Show | GitHub Exploit DB Packet Storm |
| 1537 | 5.5 |
MEDIUM
Local |
gpac | gpac | A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. … |
CWE-400 CWE-770 Uncontrolled Resource Consumption Allocation of Resources Without Limits or Throttling |
CVE-2026-8124 | 2026-05-15 03:02 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 1538 | 7.5 |
HIGH
Network |
microsoft |
windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_11_23h2 windows_11_24h2 windows_11_25h2 windows_11_26h1 windows_server_2012 windows_server_2016 w… |
Missing release of memory after effective lifetime in Windows Internet Key Exchange (IKE) Protocol allows an unauthorized attacker to deny service over a network. |
CWE-401
Missing Release of Memory after Effective Lifetime |
CVE-2026-35424 | 2026-05-15 03:02 | 2026-05-13 | Show | GitHub Exploit DB Packet Storm |
| 1539 | 6.5 |
MEDIUM
Network |
8421bit | miniclaw | A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the compone… |
CWE-22
Path Traversal |
CVE-2026-8113 | 2026-05-15 03:02 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |
| 1540 | 9.8 |
CRITICAL
Network |
yarbo |
lawn_mower_firmware lawn_mower_pro_firmware |
A hidden, persistent backdoor was found in Yarbo firmware v2.3.9 that provides remote, unauthenticated (or weakly authenticated) access to privileged functionality. The backdoor is undocumented, cann… |
CWE-912 NVD-CWE-noinfo Hidden Functionality |
CVE-2026-7413 | 2026-05-15 02:54 | 2026-05-8 | Show | GitHub Exploit DB Packet Storm |