Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 23, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
601 7.5 重要
Network
アップル visionos
iOS
iPadOS
アップルのiPadOS等の複数製品における入力確認に関する脆弱性 CWE-20
不適切な入力確認
CVE-2026-28936 2026-05-18 12:18 2026-05-11 Show GitHub Exploit DB Packet Storm
602 6.5 警告
Network
アップル visionos
watchOS
iOS
tvOS
iPadOS
アップルのiPadOS等の複数製品における解放済みメモリの使用に関する脆弱性 CWE-416
解放済みメモリの使用
CVE-2026-28942 2026-05-18 12:18 2026-05-11 Show GitHub Exploit DB Packet Storm
603 7.5 重要
Network
アップル watchOS
visionos
iOS
iPadOS
アップルのiPadOS等の複数製品におけるログファイルからの情報漏えいに関する脆弱性 CWE-532
ログファイルからの情報漏えい
CVE-2026-28943 2026-05-18 12:18 2026-05-11 Show GitHub Exploit DB Packet Storm
604 4.6 警告
Physics
- アップルのmacOSにおける認証情報の不十分な保護に関する脆弱性 CWE-522
認証情報の不十分な保護
CVE-2026-28961 2026-05-18 12:18 2026-05-11 Show GitHub Exploit DB Packet Storm
605 6.2 警告
Local
アップル visionos
watchOS
iOS
tvOS
iPadOS
アップルのiPadOS等の複数製品におけるバッファエラーの脆弱性 CWE-119
バッファエラー
CVE-2026-28977 2026-05-18 12:18 2026-05-11 Show GitHub Exploit DB Packet Storm
606 5.5 警告
Local
アップル visionos
watchOS
iOS
tvOS
iPadOS
アップルのiPadOS等の複数製品における競合状態に関する脆弱性 CWE-362
競合状態
CVE-2026-28996 2026-05-18 12:18 2026-05-11 Show GitHub Exploit DB Packet Storm
607 7.8 重要
Local
Zoom Video Communications, Inc. Zoom Workplace VDI
Zoom Meeting SDK
Zoom Workplace Desktop
Zoom Video Communications, Inc.のZoom Meeting SDK等の複数製品における例外的な状態のチェックに関する脆弱性 CWE-754
例外的な状態における不適切なチェック
CVE-2026-30900 2026-05-18 12:18 2026-03-11 Show GitHub Exploit DB Packet Storm
608 7.8 重要
Local
Zoom Video Communications, Inc. Zoom Rooms Zoom Video Communications, Inc.のZoom Roomsにおける入力確認に関する脆弱性 CWE-20
CWE-noinfo
CVE-2026-30901 2026-05-18 12:18 2026-03-11 Show GitHub Exploit DB Packet Storm
609 7.8 重要
Local
Zoom Video Communications, Inc. Zoom Workplace VDI
Zoom Rooms
Zoom Workplace Desktop
Zoom Video Communications, Inc.のZoom Rooms等の複数製品における権限管理に関する脆弱性 CWE-269
CWE-noinfo
CVE-2026-30902 2026-05-18 12:18 2026-03-11 Show GitHub Exploit DB Packet Storm
610 9.8 緊急
Network
Zoom Video Communications, Inc. Zoom Workplace VDI
Zoom Workplace Desktop
Zoom Video Communications, Inc.のZoom Workplace Desktop等の複数製品における複数の脆弱性 CWE-610
CWE-73
CVE-2026-30903 2026-05-18 12:18 2026-03-11 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 23, 2026, 4:08 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
811 9.8 CRITICAL
Network
- - Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary … CWE-94
Code Injection
CVE-2026-8838 2026-05-19 23:24 2026-05-19 Show GitHub Exploit DB Packet Storm
812 7.3 HIGH
Network
- - Net::Statsd::Lite versions through 0.10.0 for Perl allowed metric injections. The values from the set_add method were not checked for newlines, colons or pipes. Metrics generated from untrusted sour… CWE-93
CRLF Injection
CVE-2026-8788 2026-05-19 23:16 2026-05-18 Show GitHub Exploit DB Packet Storm
813 9.8 CRITICAL
Network
radare radare2 radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbi… CWE-416
 Use After Free
CVE-2026-8696 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
814 - - - Rejected reason: Voluntarily withdrawn - CVE-2026-6354 2026-05-19 23:16 2026-05-19 Show GitHub Exploit DB Packet Storm
815 6.5 MEDIUM
Network
- - Net::Statsd::Lite versions before 0.9.0 for Perl allowed metric injections. The metric names were not checked for newlines, colons or pipes. Metrics generated from untrusted sources could inject add… CWE-93
CRLF Injection
CVE-2026-46719 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
816 - - - A pre-authentication, code injection vulnerability in version 1.0.0 or later of the ChromaDB Python project allows an unauthenticated attacker to run arbitrary code on the server by sending a malicio… CWE-94
Code Injection
CVE-2026-45829 2026-05-19 23:16 2026-05-19 Show GitHub Exploit DB Packet Storm
817 8.1 HIGH
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) patt… CWE-269
CWE-362
 Improper Privilege Management
Race Condition
CVE-2026-45675 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
818 4.3 MEDIUM
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, Pin/Unpin is a write operation (modifies the message's is_pinned , pinned_by, pinned… CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2026-45386 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
819 5.4 MEDIUM
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.11, an internal-only bypass_filter parameter is exposed on the /openai/chat/completions… CWE-285
Improper Authorization
CVE-2026-45365 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm
820 7.1 HIGH
Network
openwebui open_webui Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a user just needs to use the API endpoint: /api/chat/completions with their own API … CWE-639
 Authorization Bypass Through User-Controlled Key
CVE-2026-45349 2026-05-19 23:16 2026-05-16 Show GitHub Exploit DB Packet Storm