Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 392,325 vulnerabilities

Filters
0
01000
Showing 20 of 392,325 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-22699

### Summary A denial-of-service vulnerability exists in the SM2 PKE decryption path where an invalid elliptic-curve point (C1) is decoded and the res...

7.5471NeutralNo
Page 31
PreviousNext
Yes
CVE-2026-22698

### Summary A critical vulnerability exists in the SM2 Public Key Encryption (PKE) implementation where the ephemeral nonce `k` is generated with sev...

0.00NeutralNoYes
CVE-2026-22697

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications...

7.5386NeutralNoYes
CVE-2026-22696

## Impact This vulnerability involves a critical gap in the cryptographic verification process within the dcap-qvl. The library fetches QE Identity c...

0.00NeutralNoYes
CVE-2026-22695

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.5...

7.1407NeutralYesYes
CVE-2026-22694

AliasVault is a privacy-first password manager with built-in email aliasing. AliasVault Android versions 0.24.0 through 0.25.2 contained an issue in h...

6.1173NeutralNoNo
CVE-2026-22693

HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create funct...

5.3124NeutralNoYes
CVE-2026-22691

### Impact An attacker who exploits this vulnerability can craft a PDF which leads to possibly long runtimes for invalid `startxref` entries. When reb...

5.3124NeutralNoYes
CVE-2026-22690

### Impact An attacker who exploits this vulnerability can craft a PDF which leads to possibly long runtimes for actually invalid files. This can be a...

5.3124NeutralNoYes
CVE-2026-22689

**Summary** The Mailpit WebSocket server is configured to accept connections from any origin. This lack of Origin header validation introduces a Cross...

6.5209NeutralNoYes
CVE-2026-22688

### Vulnerability **Description** --- **Vulnerability Overview** This issue is a command injection vulnerability (CWE-78) that allows authenticate...

8.8708NeutralNoYes
CVE-2026-22687

### Summary After WeKnora enables the Agent service, it allows users to call the database query tool. Due to insufficient backend validation, an attac...

9.8717NeutralNoYes
CVE-2026-22686

A critical sandbox escape vulnerability exists in **enclave-vm** (affected: **< 2.6.0**, patched: **2.7.0**) that can allow untrusted, sandboxed JavaS...

10.0856NeutralYesYes
CVE-2026-22685

DevToys is a desktop app for developers. In versions from 2.0.0.0 to before 2.0.9.0, a path traversal vulnerability exists in the DevToys extension in...

8.8553NeutralNoNo
CVE-2026-22646

Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with va...

4.3128NeutralNoNo
CVE-2026-22645

The application discloses all used components, versions and license information to unauthenticated actors, giving attackers the opportunity to target ...

5.3196NeutralNoNo
CVE-2026-22644

Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and...

5.3132NeutralNoNo
CVE-2026-22643

In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vul...

0.00NeutralNoNo
CVE-2026-22642

An open redirect vulnerability has been identified in Grafana OSS organization switching functionality. Prerequisites for exploitation: - Multiple org...

0.00NeutralNoNo
CVE-2026-22641

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path. Us...

0.00NeutralNoNo