Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 392,598 vulnerabilities

Filters
0
01000
Showing 20 of 392,598 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2026-22582

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (MicrositeUr...

9.8596NeutralNo
Page 37
PreviousNext
No
CVE-2026-22581

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22580

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22579

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22578

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22577

Rejected reason: Not used

0.00NeutralNoNo
CVE-2026-22544

An attacker with a network connection could detect credentials in clear text.

0.00NeutralNoNo
CVE-2026-22543

The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher,...

0.00NeutralNoNo
CVE-2026-22542

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the ...

0.00NeutralNoNo
CVE-2026-22541

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since t...

0.00NeutralNoNo
CVE-2026-22540

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board m...

0.00NeutralNoNo
CVE-2026-22539

As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the cha...

0.00NeutralNoNo
CVE-2026-22537

The lack of hardening of the system allows the user used to manage and maintain the charger to consult different files containing clear-text credentia...

0.00NeutralNoNo
CVE-2026-22536

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictio...

0.00NeutralNoNo
CVE-2026-22535

An attacker with the ability to interact through the network and with access credentials, could, thanks to the unsecured (unencrypted) MQTT communicat...

0.00NeutralNoNo
CVE-2026-22522

Missing Authorization vulnerability in Munir Kamal Block Slider allows Exploiting Incorrectly Configured Access Control Security Levels.This issue aff...

6.5273NeutralNoYes
CVE-2026-22521

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in G5Theme Handmade Framework al...

7.5379NeutralNoYes
CVE-2026-22519

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BuddyDev MediaPress allows Stored XSS.This issue...

6.5311NeutralNoYes
CVE-2026-22518

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pencilwp X Addons for Elementor allows DOM-Based...

6.5311NeutralNoYes
CVE-2026-22517

Missing Authorization vulnerability in Passionate Brains GA4WP: Google Analytics for WordPress allows Exploiting Incorrectly Configured Access Control...

5.4185NeutralNoYes