Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 196,938 vulnerabilities

Filters
0
01000
Showing 20 of 196,938 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-52933

Rejected reason: 3rd party vulnerability

0.00NeutralNo
Page 167
First PageNext
No
CVE-2025-52885

Poppler ia a library for rendering PDF files, and examining or modifying their structure. A use-after-free (write) vulnerability has been detected in ...

0.00NeutralNoYes
CVE-2025-52884

### Impact Prior to 2.1.1 and 2.2.0, the `Steel.validateCommitment` Solidity library function will return `true` for a crafted commitment with a dige...

0.00NeutralNoYes
CVE-2025-52882

Claude Code extensions in VSCode and forks (e.g., Cursor, Windsurf, and VSCodium) and JetBrains IDEs (e.g., IntelliJ, Pycharm, and Android Studio) are...

0.00NeutralNoYes
CVE-2025-52861

A path traversal vulnerability has been reported to affect VioStor. If a remote attacker gains an administrator account, they can then exploit the vul...

0.00NeutralNoNo
CVE-2025-5279

### Summary [Amazon Redshift Python Connector](https://docs.aws.amazon.com/redshift/latest/mgmt/python-redshift-driver.html) is a pure Python connecto...

0.00NeutralNoYes
CVE-2025-52709

Deserialization of Untrusted Data vulnerability in wpeverest Everest Forms allows Object Injection. This issue affects Everest Forms: from n/a through...

0.00NeutralNoYes
CVE-2025-52671

Debug information disclosure in the SQL error message to in Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes non-admin users to acquire inf...

0.00NeutralYesNo
CVE-2025-52669

Insecure design policies in the user management system of Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes non-admin users to have access t...

0.00NeutralYesNo
CVE-2025-52666

Improper neutralisation of format characters in the settings of Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes an administrator user to d...

0.00NeutralYesNo
CVE-2025-52583

Reflected cross-site scripting (XSS) vulnerability in desknet's Web Server allows execution of arbitrary JavaScript in a user’s web browser.

0.00NeutralNoNo
CVE-2025-52580

Insertion of sensitive information into log file issue exists in "region PAY" App for Android prior to 1.5.28. If exploited, sensitive user informatio...

0.00NeutralNoNo
CVE-2025-52570

### Impact The connection limiter is implemented incorrectly. It allows an arbitrary amount of simultaneously incoming connections (TCP, UDP and Unix...

0.00NeutralNoYes
CVE-2025-52569

GitForge.jl is a unified interface for interacting with Git "forges." Versions prior to 5.9.1 lack input validation of input validation for user-provi...

0.00NeutralNoNo
CVE-2025-52568

NeKernal is a free and open-source operating system stack. Prior to version 0.0.3, there are several memory safety issues that can lead to memory corr...

0.00NeutralNoNo
CVE-2025-52561

HTMLSanitizer.jl is a Whitelist-based HTML sanitizer. Prior to version 0.2.1, when adding the style tag to the whitelist, content inside the tag is in...

0.00NeutralNoNo
CVE-2025-52558

### Impact XSS - Errors in filters from website page change detection watches were not being filtered. ### Patches 0.50.4

0.00NeutralNoYes
CVE-2025-52557

Mail-0's Zero is an open-source email solution. In version 0.8 it's possible for an attacker to craft an email that executes javascript leading to ses...

0.00NeutralNoNo
CVE-2025-52556

### Impact `rfc3161-client` 1.0.2 and earlier contain a flaw in their timestamp response signature verification logic. In particular, it performs cha...

0.00NeutralNoYes
CVE-2025-52551

E2 Facility Management Systems use a proprietary protocol that allows for unauthenticated file operations on any file in the file system.

0.00NeutralNoNo