Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 198,061 vulnerabilities

Filters
0
01000
Showing 20 of 198,061 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-64454

Rejected reason: Not used

0.00NeutralNo
Page 133
First PageNext
No
CVE-2025-64453

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-64452

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-64451

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-64450

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-64449

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-64448

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-64444

Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in NCP-HG100 1.4.48.16 and earlier. If exploit...

0.00NeutralNoNo
CVE-2025-64443

### Impact When ran in sse or streaming mode (--transport), the Docker MCP Gateway is vulnerable to a DNS rebinding attack. Vulnerability allows for...

0.00NeutralNoYes
CVE-2025-64439

# Summary Prior to `langgraph-checkpoint` version `3.0` , LangGraph’s `JsonPlusSerializer` (used as the default serialization protocol for all checkp...

0.00NeutralNoYes
CVE-2025-64438

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1...

0.00NeutralNoYes
CVE-2025-64431

### Summary ZITADEL's Organization V2Beta API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users with sp...

0.00NeutralNoYes
CVE-2025-6443

Mikrotik RouterOS VXLAN Source IP Improper Access Control Vulnerability. This vulnerability allows remote attackers to bypass access restrictions on a...

0.00NeutralNoNo
CVE-2025-64389

The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol.

0.00NeutralNoNo
CVE-2025-64388

Denial of service of the web server through specific requests to this protocol

0.00NeutralNoNo
CVE-2025-64387

The web application is vulnerable to a so-called ‘clickjacking’ attack. In this type of attack, the vulnerable page is inserted into a page controlled...

0.00NeutralNoNo
CVE-2025-64386

The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This w...

0.00NeutralNoNo
CVE-2025-64385

The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturer’s software. Using...

0.00NeutralNoNo
CVE-2025-6438

CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could cause manipulation of SOAP API calls and XML external e...

0.00NeutralNoNo
CVE-2025-64346

### Impact A malicious user could feed a specially crafted archive to this library causing RCE, modification of files or other bad things in the cont...

0.00NeutralNoYes