Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 197,267 vulnerabilities

Filters
0
01000
Showing 20 of 197,267 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-55725

Rejected reason: Not used

0.00NeutralNo
Page 143
First PageNext
No
CVE-2025-55724

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-55723

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-55722

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-55721

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-55720

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-55719

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-55718

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-55706

URL redirection to untrusted site ('Open Redirect') issue exists in Movable Type. If this vulnerability is exploited, an invalid parameter may be ins...

0.00NeutralNoNo
CVE-2025-55671

Uncontrolled search path element issue exists in TkEasyGUI versions prior to v1.0.22. If this vulnerability is exploited, arbitrary code may be execut...

0.00NeutralNoYes
CVE-2025-55616

No description available

0.00NeutralYesNo
CVE-2025-55555

No description available

0.00NeutralYesNo
CVE-2025-55449

### Summary AstrBot uses a hard-coded JWT signing key, allowing attackers to execute arbitrary commands by installing a malicious plugin. ### Details...

0.00NeutralYesYes
CVE-2025-55349

No description available

0.00NeutralYesNo
CVE-2025-55300

Komari is a lightweight, self-hosted server monitoring tool designed to provide a simple and efficient solution for monitoring server performance. Pri...

0.00NeutralNoYes
CVE-2025-55286

z2d is a pure Zig 2D graphics library. z2d v0.7.0 released with a new multi-sample anti-aliasing (MSAA) method, which uses a new buffering mechanism f...

0.00NeutralNoNo
CVE-2025-55280

This vulnerability exists in ZKTeco WL20 due to storage of Wi-Fi credentials, configuration data and system data in plaintext within the device firmwa...

0.00NeutralNoNo
CVE-2025-55279

This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical acces...

0.00NeutralNoNo
CVE-2025-55214

### Impact Copier suggests that it's safe to generate a project from a safe template, i.e. one that doesn't use [unsafe](https://copier.readthedocs.i...

0.00NeutralNoYes
CVE-2025-55209

contactmanager is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions 15.0.14 and below, 16.0.0 ...

0.00NeutralNoNo