Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 199,348 vulnerabilities

Filters
0
01000
Showing 20 of 199,348 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-22581

Rejected reason: Not used

0.00NeutralNo
Page 16
First PageNext
No
CVE-2026-22580

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22579

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22578

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22577

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22544

An attacker with a network connection could detect credentials in clear text.

0.00NeutralNoNo
CVE-2026-22543

The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher,...

0.00NeutralNoNo
CVE-2026-22542

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the ...

0.00NeutralNoNo
CVE-2026-22541

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since t...

0.00NeutralNoNo
CVE-2026-22540

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board m...

0.00NeutralNoNo
CVE-2026-22539

As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the cha...

0.00NeutralNoNo
CVE-2026-22537

The lack of hardening of the system allows the user used to manage and maintain the charger to consult different files containing clear-text credentia...

0.00NeutralNoNo
CVE-2026-22536

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictio...

0.00NeutralNoNo
CVE-2026-22535

An attacker with the ability to interact through the network and with access credentials, could, thanks to the unsecured (unencrypted) MQTT communicat...

0.00NeutralNoNo
CVE-2026-22461

Missing Authorization vulnerability in WebAppick CTX Feed webappick-product-feed-for-woocommerce allows Exploiting Incorrectly Configured Access Contr...

0.00NeutralNoYes
CVE-2026-22277

Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vuln...

0.00NeutralNoNo
CVE-2026-22243

### Summary **Critical Authenticated SQL Injection in Nextmatch Widget Filter Processing** A critical SQL Injection vulnerability exists in the core ...

0.00NeutralNoYes
CVE-2026-22240

The vulnerability exists in BLUVOYIX due to an improper password storage implementation and subsequent exposure via unauthenticated APIs. An unauthent...

0.00NeutralNoNo
CVE-2026-22239

The vulnerability exists in BLUVOYIX due to design flaws in the email sending API. An unauthenticated remote attacker could exploit this vulnerability...

0.00NeutralNoNo
CVE-2026-22238

The vulnerability exists in BLUVOYIX due to improper authentication in the BLUVOYIX admin APIs. An unauthenticated remote attacker could exploit this ...

0.00NeutralNoNo