Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 197,158 vulnerabilities

Filters
0
01000
Showing 20 of 197,158 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-54664

Rejected reason: Not used

0.00NeutralNo
Page 168
First PageNext
No
CVE-2025-54663

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-54662

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-54661

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-54657

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-54590

### Description The lookup function takes a user address for checking accounts as a feature, however, as per the ActivityPub spec (https://www.w3.org/...

0.00NeutralNoYes
CVE-2025-54582

Rejected reason: Reason: This candidate was issued in error. Valid Netty requests are issued via https://github.com/netty/netty.

0.00NeutralNoNo
CVE-2025-54572

### Summary A denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs beca...

0.00NeutralNoYes
CVE-2025-5455

An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user...

0.00NeutralNoYes
CVE-2025-54520

Improper Protection Against Voltage and Clock Glitches in FPGA devices, could allow an attacker with physical access to undervolt the platform resulti...

0.00NeutralNoNo
CVE-2025-54515

The Secure Flag passed to Versal™ Adaptive SoC’s Arm® Trusted Firmware for Cortex®-A processors (TF-A) for Arm’s Power State Coordination Interface (P...

0.00NeutralNoNo
CVE-2025-5448

Rejected reason: This CVE id was assigned but later discarded.

0.00NeutralNoNo
CVE-2025-54476

Improper handling of input could lead to a cross-site scripting (XSS) vector in the checkAttribute method of the input filter framework class.

0.00NeutralNoYes
CVE-2025-54475

A SQL injection vulnerability in the JS Jobs plugin versions 1.3.2-1.4.4 for Joomla allows low-privilege users to execute arbitrary SQL commands.

0.00NeutralNoNo
CVE-2025-54474

A SQLi vulnerability in DJ-Classifieds component 3.9.2-3.10.1 for Joomla was discovered. The issue allows privileged users to execute arbitrary SQL co...

0.00NeutralNoNo
CVE-2025-54473

An authenticated RCE vulnerability in Phoca Commander component 1.0.0-4.0.0 and 5.0.0-5.0.1 for Joomla was discovered. The issue allows code execution...

0.00NeutralNoNo
CVE-2025-54465

This vulnerability exists in ZKTeco WL20 due to hard-coded MQTT credentials and endpoints stored in plaintext within the device firmware. An attacker ...

0.00NeutralNoNo
CVE-2025-54464

This vulnerability exists in ZKTeco WL20 due to storage of admin and user credentials without encryption in the device firmware. An attacker with phys...

0.00NeutralNoNo
CVE-2025-54461

ChatLuck contains an insufficient granularity of access control vulnerability in Invitation of Guest Users. If exploited, an uninvited guest user may ...

0.00NeutralNoNo
CVE-2025-54433

## Summary In affected versions, ingestion paths construct file locations directly from untrusted `event_id` input without validation. A specially cr...

0.00NeutralNoYes