Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 392,438 vulnerabilities

Filters
0
01000
Showing 20 of 392,438 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-22584

Improper Control of Generation of Code ('Code Injection') vulnerability in Salesforce Uni2TS on MacOS, Windows, Linux allows Leverage Executable Code ...

9.8751NeutralNo
Page 36
PreviousNext
Yes
CVE-2026-22583

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesU...

9.8596NeutralNoNo
CVE-2026-22582

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (MicrositeUr...

9.8596NeutralNoNo
CVE-2026-22581

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22580

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22579

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22578

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22577

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22544

An attacker with a network connection could detect credentials in clear text.

0.00NeutralNoNo
CVE-2026-22543

The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher,...

0.00NeutralNoNo
CVE-2026-22542

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the ...

0.00NeutralNoNo
CVE-2026-22541

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since t...

0.00NeutralNoNo
CVE-2026-22540

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board m...

0.00NeutralNoNo
CVE-2026-22539

As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the cha...

0.00NeutralNoNo
CVE-2026-22537

The lack of hardening of the system allows the user used to manage and maintain the charger to consult different files containing clear-text credentia...

0.00NeutralNoNo
CVE-2026-22536

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictio...

0.00NeutralNoNo
CVE-2026-22535

An attacker with the ability to interact through the network and with access credentials, could, thanks to the unsecured (unencrypted) MQTT communicat...

0.00NeutralNoNo
CVE-2026-22522

Missing Authorization vulnerability in Munir Kamal Block Slider allows Exploiting Incorrectly Configured Access Control Security Levels.This issue aff...

6.5273NeutralNoYes
CVE-2026-22521

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in G5Theme Handmade Framework al...

7.5379NeutralNoYes
CVE-2026-22519

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BuddyDev MediaPress allows Stored XSS.This issue...

6.5311NeutralNoYes