Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 6, 2026, noon

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2761 9.8 緊急
Network
ImageMagick ImageMagick ImageMagickにおける複数の脆弱性 CWE-122
CWE-190
CVE-2026-23876 2026-02-2 19:33 2026-01-20 Show GitHub Exploit DB Packet Storm
2762 8.7 重要
Adjacent
Linux Containers Incus Linux ContainersのIncusにおけるCRLF インジェクションの脆弱性 CWE-93
CRLF インジェクション
CVE-2026-23953 2026-02-2 19:33 2026-01-22 Show GitHub Exploit DB Packet Storm
2763 8.7 重要
Adjacent
Linux Containers Incus Linux ContainersのIncusにおけるパストラバーサルの脆弱性 CWE-22
パス・トラバーサル
CVE-2026-23954 2026-02-2 19:33 2026-01-22 Show GitHub Exploit DB Packet Storm
2764 8 重要
Network
Horilla Horilla Horilla Inc.のHorillaにおける複数の脆弱性 CWE-434
CWE-474
CWE-74
CVE-2026-24010 2026-02-2 19:33 2026-01-22 Show GitHub Exploit DB Packet Storm
2765 5.4 警告
Network
Horilla Horilla Horilla Inc.のHorillaにおける危険なタイプのファイルの無制限アップロードに関する脆弱性 CWE-434
危険なタイプのファイルの無制限アップロード
CVE-2026-24034 2026-02-2 19:32 2026-01-22 Show GitHub Exploit DB Packet Storm
2766 4.3 警告
Network
Horilla Horilla Horilla Inc.のHorillaにおけるアクセス制御に関する脆弱性 CWE-284
不適切なアクセス制御
CVE-2026-24035 2026-02-2 19:32 2026-01-22 Show GitHub Exploit DB Packet Storm
2767 5.3 警告
Network
Horilla Horilla Horilla Inc.のHorillaにおけるアクセス制御に関する脆弱性 CWE-284
不適切なアクセス制御
CVE-2026-24036 2026-02-2 19:32 2026-01-22 Show GitHub Exploit DB Packet Storm
2768 5.4 警告
Network
Horilla Horilla Horilla Inc.のHorillaにおけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2026-24037 2026-02-2 19:32 2026-01-22 Show GitHub Exploit DB Packet Storm
2769 8.1 重要
Network
Horilla Horilla Horilla Inc.のHorillaにおける認証に関する脆弱性 CWE-287
不適切な認証
CVE-2026-24038 2026-02-2 19:32 2026-01-22 Show GitHub Exploit DB Packet Storm
2770 4.3 警告
Network
Horilla Horilla Horilla Inc.のHorillaにおけるアクセス制御に関する脆弱性 CWE-284
不適切なアクセス制御
CVE-2026-24039 2026-02-2 19:32 2026-01-22 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 6, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
481 7.8 HIGH
Local
- - In the Linux kernel, the following vulnerability has been resolved: net: mana: fix use-after-free in add_adev() error path If auxiliary_device_add() fails, add_adev() jumps to add_fail and calls au… - CVE-2026-43056 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
482 7.5 HIGH
Network
- - In the Linux kernel, the following vulnerability has been resolved: scsi: target: file: Use kzalloc_flex for aio_cmd The target_core_file doesn't initialize the aio_cmd->iocb for the ki_write_strea… - CVE-2026-43055 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
483 8.1 HIGH
Adjacent
- - In the Linux kernel, the following vulnerability has been resolved: HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq The wacom_intuos_bt_irq() function processes Bluetooth HID reports with… - CVE-2026-43051 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
484 8.8 HIGH
Adjacent
- - In the Linux kernel, the following vulnerability has been resolved: HID: core: Mitigate potential OOB by removing bogus memset() The memset() in hid_report_raw_event() has the good intention of cle… - CVE-2026-43048 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
485 7.8 HIGH
Local
- - In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Check to ensure report responses match the request It is possible for a malicious (or clumsy) device to respond … - CVE-2026-43047 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
486 7.8 HIGH
Local
- - In the Linux kernel, the following vulnerability has been resolved: crypto: caam - fix DMA corruption on long hmac keys When a key longer than block size is supplied, it is copied and then hashed i… - CVE-2026-43044 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
487 7.1 HIGH
Local
- - In the Linux kernel, the following vulnerability has been resolved: mpls: add seqcount to protect the platform_label{,s} pair The RCU-protected codepaths (mpls_forward, mpls_dump_routes) can have a… - CVE-2026-43042 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
488 9.8 CRITICAL
Network
- - In the Linux kernel, the following vulnerability has been resolved: net: ti: icssg-prueth: fix missing data copy and wrong recycle in ZC RX dispatch emac_dispatch_skb_zc() allocates a new skb via n… - CVE-2026-43039 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
489 9.8 CRITICAL
Network
- - In the Linux kernel, the following vulnerability has been resolved: ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() Sashiko AI-review observed: In ip6_err_gen_icmpv6_unreach(), the … - CVE-2026-43038 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm
490 7.8 HIGH
Local
- - In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption When decrypting data that is not in-place (src … - CVE-2026-43033 2026-05-3 16:16 2026-05-2 Show GitHub Exploit DB Packet Storm