Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,660 vulnerabilities

Filters
0
01000
Showing 20 of 196,660 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-47417

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse. When Enable Debug Ima...

0.00NeutralNo
Page 160
First PageNext
No
CVE-2025-47416

A vulnerability exists in the ConsoleFindCommandMatchList function in libsymproc. so imported by ctpd that may lead to unauthorized execution of an at...

0.00NeutralNoNo
CVE-2025-47415

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CRESTRON TOUCHSCREENS x70 allows Relative Path Travers...

0.00NeutralNoNo
CVE-2025-47303

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47302

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47301

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47300

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47299

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47298

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47297

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47296

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47293

### Impact _What kind of vulnerability is it? Who is impacted?_ In certain places, powsybl-core XML parsing is vulnerable to an XXE attack and in on p...

0.00NeutralNoYes
CVE-2025-47292

Cap Collectif is an online decision making platform that integrates several tools. Before commit 812f2a7d271b76deab1175bdaf2be0b8102dd198, the `Debate...

0.00NeutralNoNo
CVE-2025-47285

### Impact `concat()` may skip evaluation of side effects when the length of an argument is zero. this is due to a fastpath in the implementation whic...

0.00NeutralNoNo
CVE-2025-47282

A security vulnerability was discovered in Gardener that could allow a user with administrative privileges for a Gardener project or a user with admin...

0.00NeutralNoYes
CVE-2025-47278

In Flask 3.1.0, the way fallback key configuration was handled resulted in the last fallback key being used for signing, rather than the current signi...

0.00NeutralNoYes
CVE-2025-47274

ToolHive is a utility designed to simplify the deployment and management of Model Context Protocol (MCP) servers. Due to the ordering of code used to ...

0.00NeutralNoNo
CVE-2025-47271

### Impact Potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. ### ...

0.00NeutralNoYes
CVE-2025-47240

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed tha...

0.00NeutralNoNo
CVE-2025-47149

The optional feature 'Anti-Virus & Sandbox' of i-FILTER contains an issue with improper pattern file validation. If exploited, the product may treat a...

0.00NeutralNoNo