Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,455 vulnerabilities

Filters
0
01000
Showing 20 of 196,455 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-4172025

No description available

0.00NeutralYes
Page 161
First PageNext
No
CVE-2025-41662

An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (...

0.00NeutralNoNo
CVE-2025-4162030

No description available

0.00NeutralYesNo
CVE-2025-4162029

No description available

0.00NeutralYesNo
CVE-2025-4162028

No description available

0.00NeutralYesNo
CVE-2025-4162027

No description available

0.00NeutralYesNo
CVE-2025-4162026

No description available

0.00NeutralYesNo
CVE-2025-4162025

No description available

0.00NeutralYesNo
CVE-2025-41452

Post-authenticated external control of system web interface configuration setting vulnerability in Danfoss AK-SM8xxA Series prior to 4.3.1, which coul...

0.00NeutralNoNo
CVE-2025-41451

Improper neutralization of alarm-to-mail configuration fields used in an OS shell Command ('Command Injection') in Danfoss AK-SM8xxA Series prior to v...

0.00NeutralNoNo
CVE-2025-41439

A reflected cross-site scripting vulnerability via a specific parameter exists in SLNX Help Documentation of RICOH Streamline NX. If this vulnerabilit...

0.00NeutralNoNo
CVE-2025-41428

Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON fi...

0.00NeutralNoNo
CVE-2025-41427

WRC-X3000GS, WRC-X3000GSA, and WRC-X3000GSN contain an improper neutralization of special elements used in an OS command ('OS Command Injection') vuln...

0.00NeutralNoNo
CVE-2025-41419

**I. Detailed Description:** This includes scenarios, screenshots, vulnerability reproduction methods. For account-related vulnerabilities, please p...

0.00NeutralNoYes
CVE-2025-41408

Improper authorization in handler for custom URL scheme issue in "Yahoo! Shopping" App for Android versions prior to 14.15.0 allows a remote unauthent...

0.00NeutralNoNo
CVE-2025-41404

Direct request ('Forced Browsing') issue exists in iroha Board versions v0.10.12 and earlier. If this vulnerability is exploited, non-public contents ...

0.00NeutralNoYes
CVE-2025-41393

Reflected cross-site scripting vulnerability exists in the laser printers and MFPs (multifunction printers) which implement Ricoh Web Image Monitor. I...

0.00NeutralNoNo
CVE-2025-41380

Iridium Certus 700 version 1.0.1 has an embedded credentials vulnerability in the code. This vulnerability allows a local user to retrieve the SSH has...

0.00NeutralNoNo
CVE-2025-41379

The Intellian C700 web panel allows you to add firewall rules. Each of these rules has an associated ID, but there is a problem when adding a new rule...

0.00NeutralNoNo
CVE-2025-41378

The SSID field is not parsed correctly and can be used to inject commands into the hostpad.conf file. This can be exploited by an attacker to extend h...

0.00NeutralNoNo