Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 392,438 vulnerabilities

Filters
0
01000
Showing 20 of 392,438 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-22977

In the Linux kernel, the following vulnerability has been resolved: net: sock: fix hardened usercopy panic in sock_recv_errqueue skbuff_fclone_cache...

0.00NeutralNo
Page 28
PreviousNext
Yes
CVE-2026-22976

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_re...

0.00NeutralNoYes
CVE-2026-22920

The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.

7.5386NeutralNoYes
CVE-2026-22919

An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, lead...

4.8202NeutralNoYes
CVE-2026-22918

An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web p...

8.2489NeutralNoYes
CVE-2026-22917

Improper input handling in a system endpoint may allow attackers to overload resources, causing a denial of service.

7.5386NeutralNoYes
CVE-2026-22916

An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentia...

5.4121NeutralNoYes
CVE-2026-22915

An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.

6.5209NeutralNoYes
CVE-2026-22914

An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.

6.5209NeutralNoYes
CVE-2026-22913

Improper handling of a URL parameter may allow attackers to execute code in a user's browser after login. This can lead to the extraction of sensitive...

6.1272NeutralNoYes
CVE-2026-22912

Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various ri...

6.1207NeutralNoYes
CVE-2026-22911

Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized...

7.5514NeutralNoYes
CVE-2026-22910

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This...

9.1568NeutralNoYes
CVE-2026-22909

Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentiall...

9.1632NeutralNoYes
CVE-2026-22908

Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confid...

9.1568NeutralNoYes
CVE-2026-22907

An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.

9.1568NeutralNoYes
CVE-2026-22876

Path Traversal vulnerability exists in multiple Network Cameras TRIFORA 3 series provided by TOA Corporation. If this vulnerability is exploited, arbi...

0.00NeutralNoNo
CVE-2026-22871

## Summary A **path traversal vulnerability** exists in GuardDog's `safe_extract()` function that allows malicious PyPI packages to write arbitrary f...

9.8711NeutralNoYes
CVE-2026-22870

## Summary GuardDog's `safe_extract()` function does not validate decompressed file sizes when extracting ZIP archives (wheels, eggs), allowing attac...

7.5487NeutralYesYes
CVE-2026-22869

Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution fro...

0.00NeutralNoNo