Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes
HomeCVEs

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeCVEsCVE-2026-22184

CVE-2026-22184

Published: January 28, 2026
Last updated:12 hours ago (January 28, 2026)
Exploit: NoZero-day: NoPatch: YesTrend: Neutral
TL;DR
Updated January 28, 2026

CVE-2026-22184 is a critical severity vulnerability with a CVSS score of 9.8. No known exploits currently, and patches are available.

Key Points
  • 1Critical severity (CVSS 9.8/10)
  • 2No known public exploits
  • 3Vendor patches are available
  • 4Strobes Priority Score: 717/1000 (High)
  • 5Affects products from: Zlib
Severity Scores
CVSS v39.8
CVSS v20.0
Priority Score717.0
EPSS Score0.0
Critical
Exploitation LikelihoodMinimal
0.00%EPSS

Very low probability of exploitation

Monitor and patch as resources allow
0.00%
EPSS
9.8
CVSS
No
Exploit
Yes
Patch
Medium Priority
critical severity

EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.

Description

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.

CVSS v3 Breakdown
Attack Vector:Network
Attack Complexity:Local
Privileges Required:Network
User Interaction:Network
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability:High
Trend Analysis
Neutral
Vulnerable Products
VendorProduct
ZlibZlib
Advisories
GitHub AdvisoryNVD
Cite This Page
APA Format
Strobes VI. (2026). CVE-2026-22184 - CVE Details and Analysis. Strobes VI. Retrieved January 28, 2026, from https://vi.strobes.co/cve/CVE-2026-22184
Quick copy link + title

Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.