Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 14, 2026, 6:01 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
3191 3.8
Network
オラクル Oracle User Management オラクルのOracle User Managementにおけるアクセス制御に関する脆弱性 CWE-284
不適切なアクセス制御
CVE-2026-22014 2026-04-24 11:33 2026-04-21 Show GitHub Exploit DB Packet Storm
3192 4.3 警告
Network
オラクル MySQL Server オラクルのMySQL Serverにおける情報漏えいに関する脆弱性 CWE-200
情報漏えい
CVE-2026-22015 2026-04-24 11:33 2026-04-21 Show GitHub Exploit DB Packet Storm
3193 6.5 警告
Network
オラクル MySQL Server オラクルのMySQL Serverにおけるリソースの枯渇に関する脆弱性 CWE-400
リソースの枯渇
CVE-2026-22017 2026-04-24 11:33 2026-04-21 Show GitHub Exploit DB Packet Storm
3194 7.2 重要
Network
Eaton Intelligent Power Protector EatonのIntelligent Power Protectorにおける入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-22615 2026-04-24 11:33 2026-04-16 Show GitHub Exploit DB Packet Storm
3195 7.5 重要
Network
Eaton Intelligent Power Protector EatonのIntelligent Power Protectorにおける過度な認証試行の不適切な制限に関する脆弱性 CWE-307
過度な認証試行の不適切な制限
CVE-2026-22616 2026-04-24 11:33 2026-04-16 Show GitHub Exploit DB Packet Storm
3196 7.4 重要
Network
Eaton Intelligent Power Protector EatonのIntelligent Power ProtectorにおけるHTTPS セッション内の Secure 属性がない重要な Cookie に関する脆弱性 CWE-614
HTTPS セッション内の Secure 属性がない重要な Cookie
CVE-2026-22617 2026-04-24 11:33 2026-04-16 Show GitHub Exploit DB Packet Storm
3197 7.1 重要
Network
Eaton Intelligent Power Protector EatonのIntelligent Power Protectorにおけるセキュリティチェックに関する脆弱性 CWE-358
不適切に実装されたセキュリティチェック
CVE-2026-22618 2026-04-24 11:33 2026-04-16 Show GitHub Exploit DB Packet Storm
3198 9.9 緊急
Network
Eaton Intelligent Power Protector EatonのIntelligent Power Protectorにおける制御されていない検索パスの要素に関する脆弱性 CWE-427
制御されていない検索パスの要素
CVE-2026-22619 2026-04-24 11:33 2026-04-16 Show GitHub Exploit DB Packet Storm
3199 8.1 重要
Network
VMware Spring Boot VMwareのSpring Bootにおける代替パスまたはチャネルを使用した認証回避に関する脆弱性 CWE-288
代替パスまたはチャネルを使用した認証回避
CVE-2026-22733 2026-04-24 11:33 2026-03-20 Show GitHub Exploit DB Packet Storm
3200 2.6
Network
VMware Spring Framework VMwareのSpring Frameworkにおけるリソースのロックに関する脆弱性 CWE-667
不適切なロック
CVE-2026-22735 2026-04-24 11:33 2026-03-20 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 15, 2026, 4:28 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1021 4.3 MEDIUM
Network
- - A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to ce… New CWE-36
 Absolute Path Traversal
CVE-2026-32175 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1022 7.3 HIGH
Local
- - Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally. New CWE-20
CWE-122
 Improper Input Validation 
Heap-based Buffer Overflow
CVE-2026-32177 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1023 5.5 MEDIUM
Local
- - Files or directories accessible to external parties in Microsoft Teams allows an unauthorized attacker to perform spoofing locally. New CWE-552
 Files or Directories Accessible to External Parties
CVE-2026-32185 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1024 7.8 HIGH
Local
- - External control of file name or path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. New CWE-73
 External Control of File Name or Path
CVE-2026-32204 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1025 9.1 CRITICAL
Network
- - Improper authentication in Azure SDK allows an unauthorized attacker to bypass a security feature over a network. New CWE-287
CWE-347
Improper Authentication
 Improper Verification of Cryptographic Signature
CVE-2026-33117 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1026 7.7 HIGH
Network
- - Improper privilege management in Microsoft Dynamics 365 Customer Insights allows an authorized attacker to elevate privileges over a network. New CWE-269
 Improper Privilege Management
CVE-2026-33821 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1027 8.2 HIGH
Network
- - Improper neutralization of special elements in output used by a downstream component ('injection') in Azure Machine Learning allows an unauthorized attacker to perform spoofing over a network. New CWE-74
Injection
CVE-2026-33833 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1028 4.3 MEDIUM
Network
- - User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network. New CWE-451
 User Interface (UI) Misrepresentation of Critical Information
CVE-2026-35429 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1029 7.3 HIGH
Local
- - Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally. New CWE-20
CWE-190
 Improper Input Validation 
 Integer Overflow or Wraparound
CVE-2026-35433 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm
1030 8.8 HIGH
Local
- - Insufficient granularity of access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally. New CWE-1220
 Insufficient Granularity of Access Control
CVE-2026-35436 2026-05-14 00:34 2026-05-13 Show GitHub Exploit DB Packet Storm