Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 198,086 vulnerabilities

Filters
0
01000
Showing 20 of 198,086 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-65092

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.1, 5.4.3, and 5.3.4, when the ESP32-P4 uses its hardware JPEG...

0.00NeutralNo
Page 125
First PageNext
No
CVE-2025-65081

An out-of-bounds read vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged ...

0.00NeutralNoNo
CVE-2025-65080

A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an...

0.00NeutralNoNo
CVE-2025-65079

A heap-based buffer overflow vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be lev...

0.00NeutralNoNo
CVE-2025-65078

An untrusted search path vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be l...

0.00NeutralNoNo
CVE-2025-65077

A relative path traversal vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be ...

0.00NeutralNoNo
CVE-2025-65072

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65071

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65070

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-6507

A vulnerability in the h2oai/h2o-3 repository allows attackers to exploit deserialization of untrusted data, potentially leading to arbitrary code exe...

0.00NeutralNoNo
CVE-2025-65069

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65068

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65067

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65066

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65065

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65064

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65017

### Impact Private data exports can lead to data leaks in cases where the UUID generation causes collisions for the generated UUIDs. The bug was intr...

0.00NeutralNoYes
CVE-2025-65011

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) an unauthorised user can view configuration files by directly referencing the resour...

0.00NeutralNoNo
CVE-2025-65010

WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) is vulnerable to Broken Access Control in initial configuration wizard.cgi endpoint. Ma...

0.00NeutralNoNo
CVE-2025-65009

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) admin password is stored in configuration file as plaintext and can be obtained by u...

0.00NeutralNoNo