Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 21, 2026, 6:01 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
3281 6.3 警告
Local
Flatpak XDG Desktop Portal (xdg-desktop-portal) FlatpakのXDG Desktop Portal (xdg-desktop-portal)におけるUNIX Symbolic Link のフォローに関する脆弱性 CWE-61
UNIX Symbolic Link のフォロー
CVE-2026-40354 2026-04-30 12:13 2026-04-11 Show GitHub Exploit DB Packet Storm
3282 5.3 警告
Local
Veeam one サムスンのOneにおける整数オーバーフローの脆弱性 CWE-190
整数オーバーフローまたはラップアラウンド
CVE-2026-40448 2026-04-30 12:13 2026-04-22 Show GitHub Exploit DB Packet Storm
3283 6.6 警告
Local
Veeam one サムスンのOneにおける整数オーバーフローの脆弱性 CWE-190
整数オーバーフローまたはラップアラウンド
CVE-2026-40449 2026-04-30 12:13 2026-04-22 Show GitHub Exploit DB Packet Storm
3284 6.6 警告
Local
Veeam one サムスンのOneにおける整数オーバーフローの脆弱性 CWE-190
整数オーバーフローまたはラップアラウンド
CVE-2026-40450 2026-04-30 12:13 2026-04-22 Show GitHub Exploit DB Packet Storm
3285 8.2 重要
Network
UltraDAG UltraDAG UltraDAGにおける複数の脆弱性 CWE-460
CWE-696
CVE-2026-40583 2026-04-30 12:13 2026-04-21 Show GitHub Exploit DB Packet Storm
3286 7.5 重要
Network
RansomLook RansomLook RansomLookにおける情報漏えいに関する脆弱性 CWE-200
情報漏えい
CVE-2026-40584 2026-04-30 12:13 2026-04-21 Show GitHub Exploit DB Packet Storm
3287 5.6 警告
Local
Home Assistant Ecosystem Home Assistant Command-line Interface (hass-cli) Home Assistant EcosystemのHome Assistant Command-line Interface (hass-cli)における複数の脆弱性 CWE-1336
CWE-94
CVE-2026-40602 2026-04-30 12:13 2026-04-21 Show GitHub Exploit DB Packet Storm
3288 5.5 警告
Local
Dayuan Jiang (DayuanJiang) Next AI Draw.io Dayuan Jiang (DayuanJiang)のNext AI Draw.ioにおける制限またはスロットリング無しのリソースの割り当てに関する脆弱性 CWE-770
制限またはスロットリング無しのリソースの割り当て
CVE-2026-40608 2026-04-30 12:12 2026-04-21 Show GitHub Exploit DB Packet Storm
3289 8.1 重要
Network
Zcash Foundation Zebra-consensus
Zebrad
Zcash FoundationのZebra-consensus等の複数製品における誤った要素を使用した比較に関する脆弱性 CWE-1025
誤った要素を使用した比較
CVE-2026-40880 2026-04-30 12:12 2026-04-21 Show GitHub Exploit DB Packet Storm
3290 7.5 重要
Network
Zcash Foundation zebra-network
Zebrad
Zcash Foundationのzebra-network等の複数製品における制限またはスロットリング無しのリソースの割り当てに関する脆弱性 CWE-770
制限またはスロットリング無しのリソースの割り当て
CVE-2026-40881 2026-04-30 12:12 2026-04-21 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 22, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
1661 7.1 HIGH
Network
- - An Editor can overwrite a dashboard not owned by them to acquire admin on that specific dashboard. The user must have write access to the dashboard to escalate privilege. - CVE-2026-33377 2026-05-15 01:21 2026-05-14 Show GitHub Exploit DB Packet Storm
1662 6.5 MEDIUM
Network
- - Using the $__timeGroup macro, one can achieve an OOM by overloading the server. This requires a SQL datasource. If the server is set up to auto-restart, the impact is minimal or non-existent, as the … CWE-400
 Uncontrolled Resource Consumption
CVE-2026-33378 2026-05-15 01:21 2026-05-14 Show GitHub Exploit DB Packet Storm
1663 6.3 MEDIUM
Network
- - A vulnerability in SQL Expressions allows an authenticated attacker to read arbitrary files from the Grafana server's filesystem. Only instances with the sqlExpressions feature toggle enabled are vul… CWE-552
 Files or Directories Accessible to External Parties
CVE-2026-33380 2026-05-15 01:21 2026-05-14 Show GitHub Exploit DB Packet Storm
1664 5.9 MEDIUM
Network
- - When a user's access to mint tokens for a service account is revoked, it is sometimes still possible to do so for a few seconds after the event. The user will eventually lose access to do this. CWE-284
Improper Access Control
CVE-2026-33381 2026-05-15 01:21 2026-05-14 Show GitHub Exploit DB Packet Storm
1665 9.8 CRITICAL
Network
- - Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows Blind SQL Injection. Th… CWE-89
SQL Injection
CVE-2025-11024 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1666 9.8 CRITICAL
Network
- - Authorization bypass through User-Controlled key vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows Session Hijacking. This issue affects E-Commerce Website: b… CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2026-2347 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1667 8.8 HIGH
Network
- - Authorization bypass through User-Controlled key vulnerability in APPYAP Technology and Information Inc. Yaay Social Media App allows Accessing Functionality Not Properly Constrained by ACLs. This i… CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2025-12008 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1668 6.8 MEDIUM
Network
- - Authorization bypass through User-Controlled key vulnerability in Im Park Information Technology, Electronics, Press, Publishing and Advertising, Education Ltd. Co. DijiDemi allows Privilege Abuse. … CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2026-6008 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1669 8.8 HIGH
Network
- - Authorization bypass through User-Controlled key vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Ex… CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2025-15025 2026-05-15 01:20 2026-05-14 Show GitHub Exploit DB Packet Storm
1670 10.0 CRITICAL
Network
vm2_project vm2 vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying … CWE-94
CWE-1321
Code Injection
 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2026-44005 2026-05-15 01:16 2026-05-14 Show GitHub Exploit DB Packet Storm