Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 22, 2026, 10 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
4481 7.8 重要
Local
Microvirt Memu MicrovirtのMemuにおける重要な機能に対する認証の欠如に関する脆弱性 CWE-306
重要な機能に対する認証の欠如 解説
CVE-2019-25568 2026-04-23 10:15 2026-03-21 Show GitHub Exploit DB Packet Storm
4482 4.1 警告
Local
- デルのemc powerscale onefs における例外的な状態のチェックに関する脆弱性 CWE-754
例外的な状態における不適切なチェック
CVE-2025-43883 2026-04-23 10:15 2026-04-16 Show GitHub Exploit DB Packet Storm
4483 4.4 警告
Local
- デルのemc powerscale onefs におけるリソースの不適切なシャットダウンおよびリリースに関する脆弱性 CWE-404
リソースの不適切なシャットダウンおよびリリース
CVE-2025-43935 2026-04-23 10:15 2026-04-16 Show GitHub Exploit DB Packet Storm
4484 6.6 警告
Local
- デルのemc powerscale onefs におけるログファイルからの情報漏えいに関する脆弱性 CWE-532
ログファイルからの情報漏えい
CVE-2025-43937 2026-04-23 10:15 2026-04-16 Show GitHub Exploit DB Packet Storm
4485 6.5 警告
Network
Git for Windows Git for Windows Git for Windowsにおける複数の脆弱性 CWE-200
CWE-307
CVE-2025-66413 2026-04-23 10:15 2026-03-10 Show GitHub Exploit DB Packet Storm
4486 10 緊急
Network
NLTK NLTK NLTKにおける入力確認に関する脆弱性 CWE-20
CWE-noinfo
CVE-2026-0848 2026-04-23 10:15 2026-03-5 Show GitHub Exploit DB Packet Storm
4487 7.5 重要
Network
GNU Project
レッドハット
Red Hat Hardened Images
GnuTLS
GNU Project等の複数ベンダの製品におけるNULL ポインタデリファレンスに関する脆弱性 CWE-476
NULL ポインタデリファレンス
CVE-2026-1584 2026-04-23 10:15 2026-04-9 Show GitHub Exploit DB Packet Storm
4488 7.5 重要
Network
レッドハット
p11-kit project
p11-kit
Red Hat Hardened Images
Red Hat Enterprise Linux
p11-kit project等の複数ベンダの製品における初期化されていないポインタのアクセスに関する脆弱性 CWE-824
初期化されていないポインタのアクセス
CVE-2026-2100 2026-04-23 10:15 2026-03-26 Show GitHub Exploit DB Packet Storm
4489 9.6 緊急
Network
Imagination Technologies Limited GPU DDK Imagination Technologies LimitedのGPU DDKにおける複数の脆弱性 CWE-787
CWE-823
CVE-2026-21732 2026-04-23 10:15 2026-03-20 Show GitHub Exploit DB Packet Storm
4490 7.8 重要
Local
Imagination Technologies Limited GPU DDK Imagination Technologies LimitedのGPU DDKにおける同期の欠如に関する脆弱性 CWE-820
同期の欠如
CVE-2026-22163 2026-04-23 10:15 2026-03-20 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 22, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
141 8.4 HIGH
Local
- - Improper input validation, Unrestricted upload of file with dangerous type vulnerability in Gmission Web Fax allows Remote Code Inclusion. This issue affects Web Fax: from 3.0 before 3.1. New CWE-20
CWE-434
 Improper Input Validation 
 Unrestricted Upload of File with Dangerous Type 
CVE-2026-9157 2026-05-22 00:24 2026-05-21 Show GitHub Exploit DB Packet Storm
142 - - - (Externally Controlled Reference to a Resource in Another Sphere), (Authorization Bypass Through User-Controlled Key) vulnerability in Apache Camel K. Authorized users in a Kubernetes namespace can c… New CWE-610
CWE-639
Externally Controlled Reference to a Resource in Another Sphere
 Authorization Bypass Through User-Controlled Key
CVE-2026-45760 2026-05-22 00:24 2026-05-21 Show GitHub Exploit DB Packet Storm
143 5.3 MEDIUM
Network
isc bind BIND resolvers are vulnerable to an amplified resource consumption/exhaustion attack. If a victim resolver makes a query to a specially crafted zone, the resolver will consume disproportionate resou… New CWE-408
 Incorrect Behavior Order: Early Amplification
CVE-2026-3592 2026-05-22 00:24 2026-05-20 Show GitHub Exploit DB Packet Storm
144 8.8 HIGH
Network
- - An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 through 4.4.2 allows a remote authenticated attacker to obtain unauthorized access to data, modify data, or cause a denial o… New CWE-89
SQL Injection
CVE-2026-44047 2026-05-22 00:20 2026-05-21 Show GitHub Exploit DB Packet Storm
145 8.8 HIGH
Network
- - A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of servi… New CWE-121
Stack-based Buffer Overflow
CVE-2026-44048 2026-05-22 00:20 2026-05-21 Show GitHub Exploit DB Packet Storm
146 7.5 HIGH
Network
- - An out-of-bounds write due to improper null termination in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of serv… New CWE-787
 Out-of-bounds Write
CVE-2026-44049 2026-05-22 00:20 2026-05-21 Show GitHub Exploit DB Packet Storm
147 9.9 CRITICAL
Network
- - A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk 2.0.0 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code with escalated privileges or cause… New CWE-122
Heap-based Buffer Overflow
CVE-2026-44050 2026-05-22 00:20 2026-05-21 Show GitHub Exploit DB Packet Storm
148 8.1 HIGH
Network
- - An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink c… New CWE-59
Link Following
CVE-2026-44051 2026-05-22 00:20 2026-05-21 Show GitHub Exploit DB Packet Storm
149 7.5 HIGH
Network
- - Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output in cleartext, which allows an attacker with access to the log files to obtain LDAP credentials. New CWE-532
 Inclusion of Sensitive Information in Log Files
CVE-2026-44052 2026-05-22 00:20 2026-05-21 Show GitHub Exploit DB Packet Storm
150 7.4 HIGH
Network
- - Netatalk 1.5.0 through 4.2.2 uses a broken cryptographic algorithm in the DHCAST128 UAM, which allows a remote attacker to obtain authentication credentials or impersonate a user via cryptanalytic at… New CWE-327
 Use of a Broken or Risky Cryptographic Algorithm
CVE-2026-44053 2026-05-22 00:20 2026-05-21 Show GitHub Exploit DB Packet Storm