Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,567 vulnerabilities

Filters
0
01000
Showing 20 of 196,567 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-4570

An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communica...

0.00NeutralNo
Page 168
First PageNext
No
CVE-2025-4569

An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communica...

0.00NeutralNoNo
CVE-2025-4568

Improper neutralization of input provided by an unauthorized user into changes__reference_id parameter in URL allows for boolean-based Blind SQL Injec...

0.00NeutralNoNo
CVE-2025-4562

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

0.00NeutralNoNo
CVE-2025-45407

No description available

0.00NeutralYesNo
CVE-2025-4516

There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding o...

0.00NeutralNoYes
CVE-2025-45080

YONO SBI: Banking & Lifestyle v1.23.36 was discovered to use unencrypted communicatons, possibly allowing attackers to execute a man-in-the-middle att...

0.00NeutralNoNo
CVE-2025-45072

No description available

0.00NeutralYesNo
CVE-2025-4475

Issue in my product in blah version x on y allows bad person to break

0.00NeutralNoNo
CVE-2025-44603

No description available

0.00NeutralYesNo
CVE-2025-4436

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

0.00NeutralNoNo
CVE-2025-4434

The Remote Images Grabber plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 0.6 due to insuff...

0.00NeutralNoYes
CVE-2025-4430

Unauthorized access to "/api/Token/gettoken" endpoint in EZD RP allows file manipulation.This issue affects EZD RP in versions before 20.19 (published...

0.00NeutralNoNo
CVE-2025-44228

No description available

0.00NeutralYesNo
CVE-2025-442025

No description available

0.00NeutralYesNo
CVE-2025-44201

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed tha...

0.00NeutralNoNo
CVE-2025-4412

On macOS systems, by utilizing a Launch Agent and loading the viscosity_openvpn process from the application bundle, it is possible to load a dynamic ...

0.00NeutralNoNo
CVE-2025-44017

"Gunosy" App contains a vulnerability where sensitive information may be included in the application's outbound communication. If a user accesses a cr...

0.00NeutralNoNo
CVE-2025-43901

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-43900

Rejected reason: Not used

0.00NeutralNoNo