Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 198,441 vulnerabilities

Filters
0
01000
Showing 20 of 198,441 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-67851

A flaw was found in Moodle. This formula injection vulnerability occurs when data fields are exported without proper escaping. A remote attacker could...

0.00NeutralNo
Page 71
First PageNext
Yes
CVE-2025-67850

A flaw was found in Moodle. This vulnerability, known as Cross-site Scripting (XSS), occurs due to insufficient checks on user-provided data in the fo...

0.00NeutralNoYes
CVE-2025-6785

Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages ...

0.00NeutralNoNo
CVE-2025-67849

A flaw was found in Moodle. This Cross-site Scripting (XSS) vulnerability, caused by improper sanitization of AI prompt responses, allows attackers to...

0.00NeutralNoYes
CVE-2025-67848

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperabilit...

0.00NeutralNoYes
CVE-2025-67749

PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.377 and below, an unchecked offset and size used in a memcpy operation i...

0.00NeutralNoYes
CVE-2025-67746

### Impact Attackers controlling remote sources that Composer downloads from might in some way inject ANSI control characters in the terminal output o...

0.00NeutralNoYes
CVE-2025-67731

### Impact The Express server uses `express.json()` without a size limit, which can allow attackers to send extremely large request bodies. This may l...

0.00NeutralNoYes
CVE-2025-67721

### Summary Incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allows remote attackers to read previou...

0.00NeutralNoYes
CVE-2025-67719

### Impact The vulnerability is in the password change dialog in the back office. During the transition from v4 to v5 a mistake was made in the valida...

0.00NeutralNoYes
CVE-2025-67718

# Security Advisory: Unauthorized permission elevation through specially crafted request path **Summary:** A flaw in path handling could allow an att...

0.00NeutralNoYes
CVE-2025-67694

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67693

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67692

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67691

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67690

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67689

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67688

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67687

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67686

Rejected reason: Not used

0.00NeutralNoNo