Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 197,260 vulnerabilities

Filters
0
01000
Showing 20 of 197,260 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-55718

Rejected reason: Not used

0.00NeutralNo
Page 135
First PageNext
No
CVE-2025-55706

URL redirection to untrusted site ('Open Redirect') issue exists in Movable Type. If this vulnerability is exploited, an invalid parameter may be ins...

0.00NeutralNoNo
CVE-2025-55671

Uncontrolled search path element issue exists in TkEasyGUI versions prior to v1.0.22. If this vulnerability is exploited, arbitrary code may be execut...

0.00NeutralNoYes
CVE-2025-55616

No description available

0.00NeutralYesNo
CVE-2025-55555

No description available

0.00NeutralYesNo
CVE-2025-55449

### Summary AstrBot uses a hard-coded JWT signing key, allowing attackers to execute arbitrary commands by installing a malicious plugin. ### Details...

0.00NeutralYesYes
CVE-2025-55349

No description available

0.00NeutralYesNo
CVE-2025-55300

Komari is a lightweight, self-hosted server monitoring tool designed to provide a simple and efficient solution for monitoring server performance. Pri...

0.00NeutralNoYes
CVE-2025-55286

z2d is a pure Zig 2D graphics library. z2d v0.7.0 released with a new multi-sample anti-aliasing (MSAA) method, which uses a new buffering mechanism f...

0.00NeutralNoNo
CVE-2025-55280

This vulnerability exists in ZKTeco WL20 due to storage of Wi-Fi credentials, configuration data and system data in plaintext within the device firmwa...

0.00NeutralNoNo
CVE-2025-55279

This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical acces...

0.00NeutralNoNo
CVE-2025-55214

### Impact Copier suggests that it's safe to generate a project from a safe template, i.e. one that doesn't use [unsafe](https://copier.readthedocs.i...

0.00NeutralNoYes
CVE-2025-55209

contactmanager is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions 15.0.14 and below, 16.0.0 ...

0.00NeutralNoNo
CVE-2025-55207

### Summary Following https://github.com/withastro/astro/security/advisories/GHSA-cq8c-xv66-36gw, there's still an Open Redirect vulnerability in a s...

0.00NeutralNoYes
CVE-2025-55201

### Impact Copier's current security model shall restrict filesystem access through Jinja: - Files can only be read using `{% include ... %}`, which...

0.00NeutralNoYes
CVE-2025-55196

## Summary A vulnerability was discovered in the External Secrets Operator where the `List()` calls for Kubernetes Secret and SecretStore resources pe...

0.00NeutralNoYes
CVE-2025-55193

This vulnerability has been assigned the CVE identifier CVE-2025-55193 ### Impact The ID passed to `find` or similar methods may be logged without es...

0.00NeutralNoYes
CVE-2025-55192

HomeAssistant-Tapo-Control offers Control for Tapo cameras as a Home Assistant component. Prior to commit 2a3b80f, there is a code injection vulnerabi...

0.00NeutralNoNo
CVE-2025-55166

#### Problem The sanitization logic at https://github.com/darylldoyle/svg-sanitizer/blob/0.21.0/src/Sanitizer.php#L454-L481 only searches for lower-c...

0.00NeutralNoYes
CVE-2025-55164

### Impact A prototype pollution vulnerability exists in versions 0.5.0 and earlier, wherein if you provide a policy name called `__proto__` you can o...

0.00NeutralNoYes