Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,680 vulnerabilities

Filters
0
01000
Showing 20 of 196,680 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-47778

### Impact A admin user can upload SVG which may load external data via XML DOM library, specially this can be used for eventually reference none sec...

0.00NeutralNo
Page 148
First PageNext
Yes
CVE-2025-47774

### Impact the `slice()` builtin can elide side effects when the output length is 0, and the source bytestring is a builtin (`msg.data` or `<address>....

0.00NeutralNoNo
CVE-2025-47771

### Impact _What kind of vulnerability is it? Who is impacted?_ This is a disclosure for a security vulnerability in the `SparseMatrix` class. The vu...

0.00NeutralNoYes
CVE-2025-47770

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47769

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47768

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47767

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47766

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47765

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47764

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47763

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47762

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47698

An adjacent attacker without authentication can exploit this vulnerability to retrieve a set of user-privileged credentials. These credentials are p...

0.00NeutralNoNo
CVE-2025-4762

Insecure Direct Object Reference (IDOR) vulnerability in the eSignaViewer component in eSigna product versions 1.0 to 1.5 on all platforms allow an un...

0.00NeutralNoNo
CVE-2025-4754

### Impact Session tokens remain valid on the server after user logout, creating a security gap where: - Compromised tokens (via XSS, network interc...

0.00NeutralNoYes
CVE-2025-4748

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Trave...

0.00NeutralNoYes
CVE-2025-47421

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in CRESTRON TOUCHSCREENS x70 allows Argument Injectio...

0.00NeutralNoNo
CVE-2025-47420

266 vulnerability in Crestron Automate VX allows Privilege Escalation.This issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49.

0.00NeutralNoNo
CVE-2025-47419

Cleartext Transmission of Sensitive Information vulnerability in Crestron Automate VX allows Sniffing Network Traffic. The device allows Web UI and A...

0.00NeutralNoNo
CVE-2025-47418

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse. There is no visible ind...

0.00NeutralNoNo