Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 24, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2791 9.1 緊急
Network
レッドハット
GNU Project
GnuTLS
Red Hat Enterprise Linux
Red Hat OpenShift Container Platform
GNU Project等の複数ベンダの製品における整数アンダーフローの脆弱性 CWE-191
整数アンダーフロー
CVE-2026-33845 2026-05-7 11:27 2026-04-30 Show GitHub Exploit DB Packet Storm
2792 5.3 警告
Network
Apache Software Foundation Apache HTTP Server Apache Software FoundationのApache HTTP Serverにおける境界外読み取りに関する脆弱性 CWE-125
境界外読み取り
CVE-2026-33857 2026-05-7 11:27 2026-05-4 Show GitHub Exploit DB Packet Storm
2793 5.3 警告
Network
Apache Software Foundation Apache HTTP Server Apache Software FoundationのApache HTTP Serverにおける複数の脆弱性 CWE-125
CWE-170
CVE-2026-34032 2026-05-7 11:27 2026-05-4 Show GitHub Exploit DB Packet Storm
2794 7.5 重要
Network
Apache Software Foundation Apache HTTP Server Apache Software FoundationのApache HTTP Serverにおけるバッファオーバーリードの脆弱性 CWE-126
バッファオーバーリード
CVE-2026-34059 2026-05-7 11:27 2026-05-4 Show GitHub Exploit DB Packet Storm
2795 6.5 警告
Network
SAP human capital management SAPのhuman capital managementにおけるリクエストに対するレスポンス内容の違いに起因する情報漏えいに関する脆弱性 CWE-204
リクエストに対するレスポンス内容の違いに起因する情報漏えい
CVE-2026-34264 2026-05-7 11:27 2026-04-14 Show GitHub Exploit DB Packet Storm
2796 7.5 重要
Network
Go JOSE project Go JOSE Go JOSE projectのGo JOSEにおけるキャッチされない例外に関する脆弱性 CWE-248
キャッチされない例外
CVE-2026-34986 2026-05-7 11:27 2026-04-6 Show GitHub Exploit DB Packet Storm
2797 5.5 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおける関数の戻り値に対する不適切なチェックに関する脆弱性 CWE-253
関数の戻り値に対する不適切なチェック
CVE-2026-35339 2026-05-7 11:27 2026-04-22 Show GitHub Exploit DB Packet Storm
2798 5.5 警告
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおける関数の戻り値に対する不適切なチェックに関する脆弱性 CWE-253
関数の戻り値に対する不適切なチェック
CVE-2026-35340 2026-05-7 11:27 2026-04-22 Show GitHub Exploit DB Packet Storm
2799 3.3
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおける安全でない一時ファイルに関する脆弱性 CWE-377
安全でない一時ファイル
CVE-2026-35342 2026-05-7 11:27 2026-04-22 Show GitHub Exploit DB Packet Storm
2800 3.3
Local
Uutils uutils coreutils Uutilsのuutils coreutilsにおける常に不適切な制御フローの実装に関する脆弱性 CWE-670
常に不適切な制御フローの実装
CVE-2026-35343 2026-05-7 11:27 2026-04-22 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 24, 2026, 4:05 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
2111 5.5 MEDIUM
Local
jqlang jq jq is a command-line JSON processor. In 1.8.1 and earlier, when decNumberFromString is given a number literal of INT_MAX-1 (2147483646) digits, the D2U() macro overflows during signed-int arithmetic.… CWE-190
 Integer Overflow or Wraparound
CVE-2026-43894 2026-05-14 02:01 2026-05-12 Show GitHub Exploit DB Packet Storm
2112 5.5 MEDIUM
Local
jqlang jq jq is a command-line JSON processor. In 1.8.1 and earlier, the jq bytecode VM's data stack tracks its allocation size in a signed int. When the stack grows beyond ≈1 GiB (via deeply nested generator … CWE-190
CWE-787
 Integer Overflow or Wraparound
 Out-of-bounds Write
CVE-2026-41257 2026-05-14 02:01 2026-05-12 Show GitHub Exploit DB Packet Storm
2113 5.5 MEDIUM
Local
jqlang jq jq is a command-line JSON processor. In 1.8.1 and earlier, Top-level jq programs loaded from a file with -f are truncated at the first embedded NUL byte on current upstream HEAD. A crafted filter fil… CWE-158
 Improper Neutralization of Null Byte or NUL Character
CVE-2026-41256 2026-05-14 02:00 2026-05-12 Show GitHub Exploit DB Packet Storm
2114 8.4 HIGH
Local
- - JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument… CWE-77
CWE-78
Command Injection
OS Command 
CVE-2026-43990 2026-05-14 02:00 2026-05-13 Show GitHub Exploit DB Packet Storm
2115 8.4 HIGH
Local
- - JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constru… CWE-78
CWE-184
OS Command 
 Incomplete Blacklist
CVE-2026-43991 2026-05-14 02:00 2026-05-13 Show GitHub Exploit DB Packet Storm
2116 9.8 CRITICAL
Network
- - JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accept… CWE-200
CWE-312
CWE-522
CWE-532
Information Exposure
 Cleartext Storage of Sensitive Information
 Insufficiently Protected Credentials
 Inclusion of Sensitive Information in Log Files
CVE-2026-43992 2026-05-14 02:00 2026-05-13 Show GitHub Exploit DB Packet Storm
2117 8.2 HIGH
Network
- - JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or reso… CWE-918
Server-Side Request Forgery (SSRF) 
CVE-2026-43993 2026-05-14 02:00 2026-05-13 Show GitHub Exploit DB Packet Storm
2118 5.5 MEDIUM
Local
jqlang jq jq is a command-line JSON processor. In 1.8.1 and earlier, jv_contains recurses into nested arrays/objects with no depth limit. With a sufficiently nested input structure (built programmatically with… CWE-674
 Uncontrolled Recursion
CVE-2026-40612 2026-05-14 02:00 2026-05-12 Show GitHub Exploit DB Packet Storm
2119 7.5 HIGH
Network
golang go A malicious module proxy can exploit a flaw in the go command's validation of module checksums to bypass checksum database validation. This vulnerability affects any user using an untrusted module pr… CWE-347
 Improper Verification of Cryptographic Signature
CVE-2026-42501 2026-05-14 01:59 2026-05-8 Show GitHub Exploit DB Packet Storm
2120 7.5 HIGH
Network
golang go Pathological inputs could cause DoS through consumePhrase when parsing an email address according to RFC 5322. NVD-CWE-noinfo
CVE-2026-42499 2026-05-14 01:59 2026-05-8 Show GitHub Exploit DB Packet Storm