Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 392,393 vulnerabilities

Filters
0
01000
Showing 20 of 392,393 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-22981

In the Linux kernel, the following vulnerability has been resolved: idpf: detach and close netdevs while handling a reset Protect the reset path fro...

0.00NeutralNo
Page 27
PreviousNext
Yes
CVE-2026-22980

In the Linux kernel, the following vulnerability has been resolved: nfsd: provide locking for v4_end_grace Writing to v4_end_grace can race with ser...

0.00NeutralNoYes
CVE-2026-22979

In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in skb_segment_list for GRO packets When skb_segment_list()...

0.00NeutralNoYes
CVE-2026-22978

In the Linux kernel, the following vulnerability has been resolved: wifi: avoid kernel-infoleak from struct iw_point struct iw_point has a 32bit hol...

0.00NeutralNoYes
CVE-2026-22977

In the Linux kernel, the following vulnerability has been resolved: net: sock: fix hardened usercopy panic in sock_recv_errqueue skbuff_fclone_cache...

0.00NeutralNoYes
CVE-2026-22976

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_re...

0.00NeutralNoYes
CVE-2026-22920

The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.

7.5386NeutralNoYes
CVE-2026-22919

An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, lead...

4.8202NeutralNoYes
CVE-2026-22918

An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web p...

8.2489NeutralNoYes
CVE-2026-22917

Improper input handling in a system endpoint may allow attackers to overload resources, causing a denial of service.

7.5386NeutralNoYes
CVE-2026-22916

An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentia...

5.4121NeutralNoYes
CVE-2026-22915

An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.

6.5209NeutralNoYes
CVE-2026-22914

An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.

6.5209NeutralNoYes
CVE-2026-22913

Improper handling of a URL parameter may allow attackers to execute code in a user's browser after login. This can lead to the extraction of sensitive...

6.1272NeutralNoYes
CVE-2026-22912

Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various ri...

6.1207NeutralNoYes
CVE-2026-22911

Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized...

7.5514NeutralNoYes
CVE-2026-22910

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This...

9.1568NeutralNoYes
CVE-2026-22909

Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentiall...

9.1632NeutralNoYes
CVE-2026-22908

Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confid...

9.1568NeutralNoYes
CVE-2026-22907

An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.

9.1568NeutralNoYes