Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 23, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
2991 7.1 重要
Network
wolfSSL Inc. wolfSSL wolfSSL Inc.のwolfSSLにおける暗号化処理のナンスおよび鍵ペアの再利用に関する脆弱性 CWE-323
暗号化処理のナンスおよび鍵ペアの再利用
CVE-2026-5446 2026-05-1 10:44 2026-04-9 Show GitHub Exploit DB Packet Storm
2992 7.5 重要
Network
wolfSSL Inc. wolfSSL wolfSSL Inc.のwolfSSLにおけるヒープベースのバッファオーバーフローの脆弱性 CWE-122
ヒープオーバーフロー
CVE-2026-5447 2026-05-1 10:44 2026-04-9 Show GitHub Exploit DB Packet Storm
2993 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. AC10 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のAC10 ファームウェアにおける複数の脆弱性 CWE-77
CWE-78
CVE-2026-5547 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
2994 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. AC10 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のAC10 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5548 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
2995 7.5 重要
Network
Shenzhen Tenda Technology Co.,Ltd. AC10 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のAC10 ファームウェアにおける複数の脆弱性 CWE-320
CWE-321
CVE-2026-5549 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
2996 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. AC10 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のAC10 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5550 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
2997 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. m3 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のm3 ファームウェアにおける複数の脆弱性 CWE-119
CWE-120
CVE-2026-5567 2026-05-1 10:44 2026-04-5 Show GitHub Exploit DB Packet Storm
2998 8.8 重要
Network
Belkin International F9K1122 ファームウェア Belkin InternationalのF9K1122 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5608 2026-05-1 10:44 2026-04-6 Show GitHub Exploit DB Packet Storm
2999 8.8 重要
Network
Shenzhen Tenda Technology Co.,Ltd. I12 ファームウェア Shenzhen Tenda Technology Co.,Ltd.のI12 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5609 2026-05-1 10:44 2026-04-6 Show GitHub Exploit DB Packet Storm
3000 8.8 重要
Network
Belkin International F9K1015 ファームウェア Belkin InternationalのF9K1015 ファームウェアにおける複数の脆弱性 CWE-119
CWE-121
CVE-2026-5610 2026-05-1 10:44 2026-04-6 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 23, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1771 5.5 MEDIUM
Local
microsoft windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2025
Out-of-bounds read in Windows DWM Core Library allows an authorized attacker to disclose information locally. CWE-125
Out-of-bounds Read
CVE-2026-35419 2026-05-15 00:52 2026-05-13 Show GitHub Exploit DB Packet Storm
1772 7.1 HIGH
Local
m2team nanazip NanaZip is an open source file archive. From 5.0.1252.0 to before 6.0.1698.0, a stack-based out-of-bounds read exists in the ZealFS filesystem image parser in NanaZip. The vulnerability is triggered … CWE-125
Out-of-bounds Read
CVE-2026-42446 2026-05-15 00:49 2026-05-13 Show GitHub Exploit DB Packet Storm
1773 7.1 HIGH
Network
m2team nanazip NanaZip is an open source file archive. From 5.0.1252.0 to before 6.0.1698.0, a one-byte heap out-of-bounds null write exists in the UFS/UFS2 filesystem image parser in NanaZip. The vulnerability is … CWE-787
 Out-of-bounds Write
CVE-2026-44215 2026-05-15 00:48 2026-05-13 Show GitHub Exploit DB Packet Storm
1774 8.8 HIGH
Adjacent
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Heap-based buffer overflow in Windows Message Queuing allows an unauthorized attacker to execute code over an adjacent network. CWE-122
Heap-based Buffer Overflow
CVE-2026-34329 2026-05-15 00:43 2026-05-13 Show GitHub Exploit DB Packet Storm
1775 7.5 HIGH
Network
vllm vllm vLLM is an inference and serving engine for large language models (LLMs). From 0.6.1 to before 0.20.0, there is a a Token Injection vulnerability in vLLM’s multimodal processing. Unauthenticated, tex… CWE-129
 Improper Validation of Array Index
CVE-2026-44222 2026-05-15 00:38 2026-05-13 Show GitHub Exploit DB Packet Storm
1776 10.0 CRITICAL
Network
vm2_project vm2 vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be usi… CWE-94
Code Injection
CVE-2026-43997 2026-05-15 00:37 2026-05-14 Show GitHub Exploit DB Packet Storm
1777 8.5 HIGH
Network
vm2_project vm2 vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the all… CWE-59
Link Following
CVE-2026-43998 2026-05-15 00:36 2026-05-14 Show GitHub Exploit DB Packet Storm
1778 7.2 HIGH
Network
vm2_project vm2 vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, a sandbox boundary violation in vm2 allows host object identity to cross into the sandbox through host Promise resolution. When a host-s… CWE-693
 Protection Mechanism Failure
CVE-2026-44000 2026-05-15 00:35 2026-05-14 Show GitHub Exploit DB Packet Storm
1779 7.8 HIGH
Local
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Integer overflow or wraparound in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. CWE-190
CWE-416
 Integer Overflow or Wraparound
 Use After Free
CVE-2026-34330 2026-05-15 00:27 2026-05-13 Show GitHub Exploit DB Packet Storm
1780 7.0 HIGH
Local
microsoft windows_10_1607
windows_10_1809
windows_10_21h2
windows_10_22h2
windows_11_23h2
windows_11_24h2
windows_11_25h2
windows_11_26h1
windows_server_2012
windows_server_2016
w…
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. CWE-362
CWE-416
Race Condition
 Use After Free
CVE-2026-34331 2026-05-15 00:26 2026-05-13 Show GitHub Exploit DB Packet Storm