Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,664 vulnerabilities

Filters
0
01000
Showing 20 of 196,664 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-47421

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in CRESTRON TOUCHSCREENS x70 allows Argument Injectio...

0.00NeutralNo
Page 173
First PageNext
No
CVE-2025-47420

266 vulnerability in Crestron Automate VX allows Privilege Escalation.This issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49.

0.00NeutralNoNo
CVE-2025-47419

Cleartext Transmission of Sensitive Information vulnerability in Crestron Automate VX allows Sniffing Network Traffic. The device allows Web UI and A...

0.00NeutralNoNo
CVE-2025-47418

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse. There is no visible ind...

0.00NeutralNoNo
CVE-2025-47417

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse. When Enable Debug Ima...

0.00NeutralNoNo
CVE-2025-47416

A vulnerability exists in the ConsoleFindCommandMatchList function in libsymproc. so imported by ctpd that may lead to unauthorized execution of an at...

0.00NeutralNoNo
CVE-2025-47415

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CRESTRON TOUCHSCREENS x70 allows Relative Path Travers...

0.00NeutralNoNo
CVE-2025-47303

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47302

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47301

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47300

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47299

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47298

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47297

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47296

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47293

### Impact _What kind of vulnerability is it? Who is impacted?_ In certain places, powsybl-core XML parsing is vulnerable to an XXE attack and in on p...

0.00NeutralNoYes
CVE-2025-47292

Cap Collectif is an online decision making platform that integrates several tools. Before commit 812f2a7d271b76deab1175bdaf2be0b8102dd198, the `Debate...

0.00NeutralNoNo
CVE-2025-47285

### Impact `concat()` may skip evaluation of side effects when the length of an argument is zero. this is due to a fastpath in the implementation whic...

0.00NeutralNoNo
CVE-2025-47282

A security vulnerability was discovered in Gardener that could allow a user with administrative privileges for a Gardener project or a user with admin...

0.00NeutralNoYes
CVE-2025-47278

In Flask 3.1.0, the way fallback key configuration was handled resulted in the last fallback key being used for signing, rather than the current signi...

0.00NeutralNoYes