Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,742 vulnerabilities

Filters
0
01000
Showing 20 of 196,742 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-48745

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-49113. Reason: This candidate is a reservation duplicate of CVE-2025-49113. No...

0.00NeutralNo
Page 153
First PageNext
No
CVE-2025-48741

A Broken Access Control vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, and 5.4.0 before 5.4.10 allows remote, authentic...

0.00NeutralNoNo
CVE-2025-48740

A Cross-Site Request Forgery (CSRF) vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 befor...

0.00NeutralNoNo
CVE-2025-48739

A Server-Side Request Forgery (SSRF) vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 befo...

0.00NeutralNoNo
CVE-2025-48738

An e-mail flooding vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1 allows un...

0.00NeutralNoNo
CVE-2025-48699

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidat...

0.00NeutralNoNo
CVE-2025-48507

The security state of the calling processor into Arm® Trusted Firmware (TF-A) is not used and could potentially allow non-secure processors access to ...

0.00NeutralYesNo
CVE-2025-48501

An OS command injection issue exists in Nimesa Backup and Recovery v2.3 and v2.4. If this vulnerability is exploited, an arbitrary OS commands may be ...

0.00NeutralNoNo
CVE-2025-48497

Cross-site request forgery vulnerability exists in iroha Board versions v0.10.12 and earlier. If a user accesses a specially crafted URL while being l...

0.00NeutralNoNo
CVE-2025-48491

Project AI is a platform designed to create AI agents. Prior to the pre-beta version, a hardcoded API key was present in the source code. This issue h...

0.00NeutralNoNo
CVE-2025-48490

A validation bypass vulnerability was discovered prior to version 2.13.0, where multiple validations defined for the same attribute could be silently...

0.00NeutralNoYes
CVE-2025-48427

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-48426

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-48425

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-48424

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-48423

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-48422

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-48421

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-48420

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-48419

Rejected reason: Not used

0.00NeutralNoNo