Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,682 vulnerabilities

Filters
0
01000
Showing 20 of 196,682 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-47788

Atheos is a self-hosted browser-based cloud IDE. Prior to v602, similar to GHSA-rgjm-6p59-537v/CVE-2025-22152, the `$target` parameter in `/controller...

0.00NeutralNo
Page 157
First PageNext
No
CVE-2025-47782

### Summary Using a constructed (camera) device path with the `config/add`/`add_camera` motionEye web API allows an attacker with motionEye admin user...

0.00NeutralNoYes
CVE-2025-47778

### Impact A admin user can upload SVG which may load external data via XML DOM library, specially this can be used for eventually reference none sec...

0.00NeutralNoYes
CVE-2025-47774

### Impact the `slice()` builtin can elide side effects when the output length is 0, and the source bytestring is a builtin (`msg.data` or `<address>....

0.00NeutralNoNo
CVE-2025-47771

### Impact _What kind of vulnerability is it? Who is impacted?_ This is a disclosure for a security vulnerability in the `SparseMatrix` class. The vu...

0.00NeutralNoYes
CVE-2025-47770

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47769

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47768

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47767

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47766

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47765

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47764

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47763

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47762

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-47698

An adjacent attacker without authentication can exploit this vulnerability to retrieve a set of user-privileged credentials. These credentials are p...

0.00NeutralNoNo
CVE-2025-4762

Insecure Direct Object Reference (IDOR) vulnerability in the eSignaViewer component in eSigna product versions 1.0 to 1.5 on all platforms allow an un...

0.00NeutralNoNo
CVE-2025-4754

### Impact Session tokens remain valid on the server after user logout, creating a security gap where: - Compromised tokens (via XSS, network interc...

0.00NeutralNoYes
CVE-2025-4748

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Trave...

0.00NeutralNoYes
CVE-2025-47421

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in CRESTRON TOUCHSCREENS x70 allows Argument Injectio...

0.00NeutralNoNo
CVE-2025-47420

266 vulnerability in Crestron Automate VX allows Privilege Escalation.This issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49.

0.00NeutralNoNo