Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 392,393 vulnerabilities

Filters
0
01000
Showing 20 of 392,393 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-22850

Koko Analytics is an open-source analytics plugin for WordPress. Versions prior to 2.1.3 are vulnerable to arbitrary SQL execution through unescaped a...

8.3509NeutralNo
Page 29
PreviousNext
No
CVE-2026-22849

Saleor is an e-commerce platform. Starting in version 3.0.0 and prior to versions 3.20.108, 3.21.43, and 3.22.27, Saleor was allowing users to modify ...

0.00NeutralNoNo
CVE-2026-22844

A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote c...

9.9858NeutralYesNo
CVE-2026-22837

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22836

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22835

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22834

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22833

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22832

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22831

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22830

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22829

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22822

### Summary The `getSecretKey` template function, while introduced for senhasegura Devops Secrets Management (DSM) provider, has the ability to fetch...

0.00NeutralNoYes
CVE-2026-22820

### Summary A TOCTOU race condition vulnerability allows a user to exceed the set number of active tunnels in their subscription plan. ### Details ...

3.7102NeutralNoYes
CVE-2026-22819

### Summary This vulnerability allows a user i.e a free plan user to get more than the desired subdomains due to lack of db transaction lock mechanism...

3.194NeutralNoYes
CVE-2026-22818

## Summary A flaw in Hono’s JWK/JWKS JWT verification middleware allowed the algorithm specified in the JWT header to influence signature verificatio...

6.5216NeutralNoYes
CVE-2026-22817

## Summary A flaw in Hono’s JWK/JWKS JWT verification middleware allowed the JWT header’s `alg` value to influence signature verification when the se...

6.5216NeutralNoYes
CVE-2026-22816

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before...

0.00NeutralNoYes
CVE-2026-22814

### Summary **Description** A Mass Assignment (CWE-915) vulnerability in AdonisJS Lucid may allow a remote attacker who can influence data that is pas...

0.00NeutralNoYes
CVE-2026-22813

### Summary A malicious website can abuse the server URL override feature of the OpenCode web UI to achieve cross-site scripting on `http://localhost:...

6.1272NeutralNoYes