Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,668 vulnerabilities

Filters
0
01000
Showing 20 of 196,668 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-47698

An adjacent attacker without authentication can exploit this vulnerability to retrieve a set of user-privileged credentials. These credentials are p...

0.00NeutralNo
Page 195
First PageNext
No
CVE-2025-4762

Insecure Direct Object Reference (IDOR) vulnerability in the eSignaViewer component in eSigna product versions 1.0 to 1.5 on all platforms allow an un...

0.00NeutralNoNo
CVE-2025-4754

### Impact Session tokens remain valid on the server after user logout, creating a security gap where: - Compromised tokens (via XSS, network interc...

0.00NeutralNoYes
CVE-2025-4748

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Trave...

0.00NeutralNoYes
CVE-2025-47421

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in CRESTRON TOUCHSCREENS x70 allows Argument Injectio...

0.00NeutralNoNo
CVE-2025-47420

266 vulnerability in Crestron Automate VX allows Privilege Escalation.This issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49.

0.00NeutralNoNo
CVE-2025-47419

Cleartext Transmission of Sensitive Information vulnerability in Crestron Automate VX allows Sniffing Network Traffic. The device allows Web UI and A...

0.00NeutralNoNo
CVE-2025-47418

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse. There is no visible ind...

0.00NeutralNoNo
CVE-2025-47417

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse. When Enable Debug Ima...

0.00NeutralNoNo
CVE-2025-47416

A vulnerability exists in the ConsoleFindCommandMatchList function in libsymproc. so imported by ctpd that may lead to unauthorized execution of an at...

0.00NeutralNoNo
CVE-2025-47415

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CRESTRON TOUCHSCREENS x70 allows Relative Path Travers...

0.00NeutralNoNo
CVE-2025-47303

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47302

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47301

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47300

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47299

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47298

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47297

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47296

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47293

### Impact _What kind of vulnerability is it? Who is impacted?_ In certain places, powsybl-core XML parsing is vulnerable to an XXE attack and in on p...

0.00NeutralNoYes