Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 13, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2221 7.8 重要
Local
レッドハット
gimp
Red Hat Enterprise Linux
gimp
gimp等の複数ベンダの製品における古典的バッファオーバーフローの脆弱性 CWE-120
古典的バッファオーバーフロー
CVE-2026-6384 2026-04-30 10:57 2026-04-15 Show GitHub Exploit DB Packet Storm
2222 7.8 重要
Local
Rapid7 Insight Agent Rapid7のInsight Agentにおける信頼できない制御領域からの機能の組み込みに関する脆弱性 CWE-829
信頼性のない制御領域からの機能の組み込み
CVE-2026-6482 2026-04-30 10:57 2026-04-17 Show GitHub Exploit DB Packet Storm
2223 8.1 重要
Network
Mozilla Foundation Mozilla Thunderbird
Mozilla Firefox
Mozilla FoundationのMozilla Firefox等の複数製品における複数の脆弱性 CWE-125
CWE-416
CWE-787
CVE-2026-6785 2026-04-30 10:57 2026-04-26 Show GitHub Exploit DB Packet Storm
2224 8.1 重要
Network
Mozilla Foundation Mozilla Thunderbird
Mozilla Firefox
Mozilla FoundationのMozilla Firefox等の複数製品における複数の脆弱性 CWE-125
CWE-416
CWE-787
CVE-2026-6786 2026-04-30 10:57 2026-04-26 Show GitHub Exploit DB Packet Storm
2225 7.8 重要
Local
IObit Malware Fighter IObitのMalware Fighterにおける引用されない検索パスまたは要素に関する脆弱性 CWE-428
引用されない検索パスまたは要素
CVE-2016-20059 2026-04-28 10:14 2026-04-4 Show GitHub Exploit DB Packet Storm
2226 6.3 警告
Network
Apache Software Foundation Apache DolphinScheduler Apache Software FoundationのApache DolphinSchedulerにおける信頼できないデータのデシリアライゼーションに関する脆弱性 CWE-502
信頼性のないデータのデシリアライゼーション
CVE-2025-62233 2026-04-28 10:14 2026-04-24 Show GitHub Exploit DB Packet Storm
2227 2.9
Local
オラクル Oracle GraalVM for JDK
Oracle GraalVM
JRE
JDK
オラクルのOracle GraalVM等の複数製品における情報漏えいに関する脆弱性 CWE-200
情報漏えい
CVE-2026-22007 2026-04-28 10:13 2026-04-21 Show GitHub Exploit DB Packet Storm
2228 5.3 警告
Network
オラクル Oracle GraalVM for JDK
Oracle GraalVM
JRE
JDK
オラクルのOracle GraalVM等の複数製品における保護メカニズムの不具合に関する脆弱性 CWE-693
保護メカニズムの不具合
CVE-2026-22013 2026-04-28 10:13 2026-04-21 Show GitHub Exploit DB Packet Storm
2229 7.5 重要
Network
オラクル Oracle GraalVM for JDK
Oracle GraalVM
JRE
JDK
オラクルのOracle GraalVM等の複数製品における複数の脆弱性 CWE-200
CWE-502
CVE-2026-22016 2026-04-28 10:13 2026-04-21 Show GitHub Exploit DB Packet Storm
2230 3.7
Network
オラクル Oracle GraalVM for JDK
Oracle GraalVM
JRE
JDK
オラクルのOracle GraalVM等の複数製品における制限またはスロットリング無しのリソースの割り当てに関する脆弱性 CWE-770
制限またはスロットリング無しのリソースの割り当て
CVE-2026-22018 2026-04-28 10:13 2026-04-21 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 13, 2026, 5:05 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1551 6.4 MEDIUM
Network
- - Marko is a declarative, HTML-based language for building web apps. Prior to marko version 5.38.36 and prior to @marko/runtime-tags 6.0.164, when dynamic text is interpolated into a <script> or <style… CWE-79
Cross-site Scripting
CVE-2026-41591 2026-05-9 01:16 2026-05-9 Show GitHub Exploit DB Packet Storm
1552 10.0 CRITICAL
Network
- - openvpn-auth-oauth2 is a plugin/management interface client for OpenVPN server to handle an OIDC based single sign-on (SSO) auth flows. From version 1.26.3 to before version 1.27.3, when openvpn-auth… CWE-287
Improper Authentication
CVE-2026-41070 2026-05-9 01:16 2026-05-9 Show GitHub Exploit DB Packet Storm
1553 6.3 MEDIUM
Network
- - In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API does not enforce project ownership at any layer. The project_id column in the database is never populated (NULL for every ARQ), da… CWE-282
 Improper Ownership Management
CVE-2026-40214 2026-05-9 01:16 2026-05-8 Show GitHub Exploit DB Packet Storm
1554 7.4 HIGH
Network
- - OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple API endpoints. This unconditionally authorizes any request carrying a valid Keystone token regardless… CWE-863
 Incorrect Authorization
CVE-2026-40213 2026-05-9 01:16 2026-05-8 Show GitHub Exploit DB Packet Storm
1555 8.6 HIGH
Network
- - Inngest is a platform for running event-driven and scheduled background functions with queueing, retries, and step orchestration. Versions 3.22.0 through 3.53.1 contain a vulnerability that allows un… CWE-200
CWE-497
Information Exposure
 Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2026-42047 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
1556 7.3 HIGH
Network
- - This vulnerability, in the MAXHUB Pivot client application versions prior to v1.36.2, may allow an attacker to obtain encrypted tenant email addresses and related metadata from any tenant. Due to t… CWE-327
 Use of a Broken or Risky Cryptographic Algorithm
CVE-2026-6411 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
1557 8.8 HIGH
Network
- - OpenLearnX is an open-source, decentralized learning and assessment platform. Prior to version 2.0.3, a remote code execution (RCE) vulnerability was identified in the OpenLearnX code execution envir… CWE-78
CWE-94
CWE-250
CWE-284
CWE-693
OS Command 
Code Injection
 Execution with Unnecessary Privileges
Improper Access Control
 Protection Mechanism Failure
CVE-2026-41900 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
1558 8.7 HIGH
Network
- - zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization b… CWE-22
CWE-61
Path Traversal
 UNIX Symbolic Link (Symlink) Following
CVE-2026-42275 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
1559 6.1 MEDIUM
Network
- - In Thruk Monitoring through 2.46.3, the login field of the login form is vulnerable to reflected XSS. This vulnerability can be exploited by unauthenticated remote attackers to target users of the mo… CWE-79
Cross-site Scripting
CVE-2022-23961 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm
1560 - - - yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not changed (by setting YETI_AUTH_SECRET_KEY to a value other than SECRET). - CVE-2024-46508 2026-05-9 01:08 2026-05-8 Show GitHub Exploit DB Packet Storm