Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 199,658 vulnerabilities

Filters
0
01000
Showing 20 of 199,658 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-24476

Shaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which starting with `"` prematurely ends the `<input>` ta...

0.00NeutralNo
Page 14
First PageNext
Yes
CVE-2026-24474

Dioxus Components is a shadcn-style component library for the Dioxus app framework. Prior to commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a, `use_ani...

0.00NeutralNoNo
CVE-2026-24471

continuwuity is a Matrix homeserver written in Rust. This vulnerability allows an attacker with a malicious remote server to cause the local server to...

0.00NeutralNoNo
CVE-2026-2447

Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, and Firefox ESR < 115.32.1.

0.00NeutralNoYes
CVE-2026-24466

Products provided by Oki Electric Industry Co., Ltd. and its OEM products (Ricoh Co., Ltd., Murata Machinery, Ltd.) register Windows services with unq...

0.00NeutralNoNo
CVE-2026-24465

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

0.00NeutralNoNo
CVE-2026-24449

For WRC-X1500GS-B and WRC-X1500GSA-B, the initial passwords can be calculated easily from the system information.

0.00NeutralNoNo
CVE-2026-24447

If a malformed data is input to the affected product, a CSV file downloaded from the affected product may contain such malformed data. When a victim u...

0.00NeutralNoNo
CVE-2026-24414

The Icinga PowerShell Framework provides configuration and check possibilities to ensure integration and monitoring of Windows environments. In versio...

0.00NeutralNoNo
CVE-2026-24413

Icinga 2 is an open source monitoring system. Starting in version 2.3.0 and prior to versions 2.13.14, 2.14.8, and 2.15.2, the Icinga 2 MSI did not se...

0.00NeutralNoYes
CVE-2026-24402

Rejected reason: GitHub cannot issue a CVE for this Security Advisory because this advisory includes information about more than one vulnerability. ...

0.00NeutralNoNo
CVE-2026-24400

An XML External Entity (XXE) vulnerability exists in `org.assertj.core.util.xml.XmlStringPrettyFormatter`: the `toXmlDocument(String)` method initiali...

0.00NeutralNoYes
CVE-2026-2439

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::...

0.00NeutralNoYes
CVE-2026-24344

Multiple Buffer Overflows in Admin UI of EZCast Pro II version 1.17478.146 allow attackers to cause a program crash and potential remote code executio...

0.00NeutralNoNo
CVE-2026-24342

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-24341

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-24340

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-24339

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-24338

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-24337

Rejected reason: Not used

0.00NeutralNoNo