Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 199,448 vulnerabilities

Filters
0
01000
Showing 20 of 199,448 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-23644

### Summary The [commit](https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16) does not actually fix the path traversal ...

0.00NeutralNo
Page 11
First PageNext
Yes
CVE-2026-23630

Docmost is open-source collaborative wiki and documentation software. In versions 0.3.0 through 0.23.2, Mermaid code block rendering is vulnerable to ...

0.00NeutralNoNo
CVE-2026-23582

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23581

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23580

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23579

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23578

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23577

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23576

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23575

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23574

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23528

### Impact When [Jupyter Lab](https://jupyterlab.readthedocs.io/en/latest/), [jupyter-server-proxy](https://github.com/jupyterhub/jupyter-server-proxy...

0.00NeutralNoYes
CVE-2026-23526

CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.0.0 through 2.54.0, users that have the staff st...

0.00NeutralNoNo
CVE-2026-23518

### Summary A vulnerability in Fleet’s Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not proper...

0.00NeutralNoYes
CVE-2026-23517

### Summary A broken access control issue in Fleet allowed authenticated users to access debug and profiling endpoints regardless of role. As a resul...

0.00NeutralNoYes
CVE-2026-23516

CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execu...

0.00NeutralNoNo
CVE-2026-23478

Cal.com is open-source scheduling software. From 3.1.6 to before 6.0.7, there is a vulnerability in a custom NextAuth JWT callback that allows attacke...

0.00NeutralYesNo
CVE-2026-23014

In the Linux kernel, the following vulnerability has been resolved: perf: Ensure swevent hrtimer is properly destroyed With the change to hrtimer_tr...

0.00NeutralNoYes
CVE-2026-23013

In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request...

0.00NeutralNoYes
CVE-2026-23012

In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: remove call_control in inactive contexts If damon_call() is execu...

0.00NeutralNoYes