Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 198,095 vulnerabilities

Filters
0
01000
Showing 20 of 198,095 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-65321

No description available

0.00NeutralYes
Page 114
First PageNext
No
CVE-2025-65120

Reflected cross-site scripting vulnerability exists in GroupSession Free edition prior to ver5.7.1, GroupSession byCloud prior to ver5.7.1, and GroupS...

0.00NeutralNoNo
CVE-2025-65109

Minder is an open source software supply chain security platform. In Minder Helm version 0.20241106.3386+ref.2507dbf and Minder Go versions from 0.0.7...

0.00NeutralNoYes
CVE-2025-65106

## Context A template injection vulnerability exists in LangChain's prompt template system that allows attackers to access Python object internals th...

0.00NeutralNoYes
CVE-2025-65102

PJSIP is a free and open source multimedia communication library. Prior to version 2.16, Opus PLC may zero-fill the input frame as long as the decoder...

0.00NeutralNoYes
CVE-2025-65100

Isar is an integration system for automated root filesystem generation. In versions 0.11-rc1 and 0.11, defining ISAR_APT_SNAPSHOT_DATE alone does not ...

0.00NeutralNoNo
CVE-2025-65097

RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4....

0.00NeutralNoNo
CVE-2025-65096

RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4....

0.00NeutralNoNo
CVE-2025-65095

Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other. Prior to version 1.35...

0.00NeutralNoNo
CVE-2025-65092

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.1, 5.4.3, and 5.3.4, when the ESP32-P4 uses its hardware JPEG...

0.00NeutralNoNo
CVE-2025-65081

An out-of-bounds read vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged ...

0.00NeutralNoNo
CVE-2025-65080

A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an...

0.00NeutralNoNo
CVE-2025-65079

A heap-based buffer overflow vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be lev...

0.00NeutralNoNo
CVE-2025-65078

An untrusted search path vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be l...

0.00NeutralNoNo
CVE-2025-65077

A relative path traversal vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be ...

0.00NeutralNoNo
CVE-2025-65072

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65071

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-65070

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-6507

A vulnerability in the h2oai/h2o-3 repository allows attackers to exploit deserialization of untrusted data, potentially leading to arbitrary code exe...

0.00NeutralNoNo
CVE-2025-65069

Rejected reason: Not used

0.00NeutralNoNo