Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 392,208 vulnerabilities

Filters
0
01000
Showing 20 of 392,208 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-23951

SumatraPDF is a multi-format reader for Windows. All versions contain an off-by-one error in the validation code that only triggers with exactly 2 rec...

5.5133NeutralNo
Page 14
PreviousNext
No
CVE-2026-23950

**TITLE**: Race Condition in node-tar Path Reservations via Unicode Sharp-S (ß) Collisions on macOS APFS **AUTHOR**: Tomás Illuminati ### Details A...

8.8545NeutralNoYes
CVE-2026-2395

No description available

0.00NeutralYesNo
CVE-2026-23949

### Summary There is a Zip Slip path traversal vulnerability in the jaraco.context package affecting setuptools as well, in `jaraco.context.tarball()`...

8.6659NeutralNoYes
CVE-2026-23947

### Impact Arbitrary code execution in environments consuming generated clients This issue is similar in nature to the recently-patched MCP vulnerabi...

0.00NeutralYesYes
CVE-2026-23946

A critical deserialization vulnerability exists in Tendenci Helpdesk module (NOTE, by default, Helpdesk is NOT enabled), affecting the version 15.3.11...

6.8400NeutralNoYes
CVE-2026-23944

Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to version 1.13.2, unauthenticated requests could be proxi...

0.00NeutralNoNo
CVE-2026-23917

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23916

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23915

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23914

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23913

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23912

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23911

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23910

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23909

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-23893

openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. Versions 2.3.2 and above are vulnerable to symlink-following when running in...

6.8247NeutralNoYes
CVE-2026-23890

### Summary A path traversal vulnerability in pnpm's bin linking allows malicious npm packages to create executable shims or symlinks outside of `node...

0.00NeutralNoYes
CVE-2026-23889

### Summary A path traversal vulnerability in pnpm's tarball extraction allows malicious packages to write files outside the package directory on Wind...

0.00NeutralNoYes
CVE-2026-23888

### Summary A path traversal vulnerability in pnpm's binary fetcher allows malicious packages to write files outside the intended extraction director...

0.00NeutralNoYes