Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 198,330 vulnerabilities

Filters
0
01000
Showing 20 of 198,330 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-67868

Rejected reason: Not used

0.00NeutralNo
Page 74
First PageNext
No
CVE-2025-67867

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67866

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67865

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67864

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67863

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67859

A Improper Authentication vulnerability in TLP allows local users to arbitrarily control the power profile in use as well as the daemon’s log settings...

0.00NeutralNoYes
CVE-2025-67858

A Improper Neutralization of Argument Delimiters vulnerability in Foomuuri can lead to integrity loss of the firewall configuration or further unspeci...

0.00NeutralNoYes
CVE-2025-6785

Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages ...

0.00NeutralNoNo
CVE-2025-67749

PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.377 and below, an unchecked offset and size used in a memcpy operation i...

0.00NeutralNoYes
CVE-2025-67746

### Impact Attackers controlling remote sources that Composer downloads from might in some way inject ANSI control characters in the terminal output o...

0.00NeutralNoYes
CVE-2025-67731

### Impact The Express server uses `express.json()` without a size limit, which can allow attackers to send extremely large request bodies. This may l...

0.00NeutralNoYes
CVE-2025-67721

### Summary Incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allows remote attackers to read previou...

0.00NeutralNoYes
CVE-2025-67719

### Impact The vulnerability is in the password change dialog in the back office. During the transition from v4 to v5 a mistake was made in the valida...

0.00NeutralNoYes
CVE-2025-67718

# Security Advisory: Unauthorized permission elevation through specially crafted request path **Summary:** A flaw in path handling could allow an att...

0.00NeutralNoYes
CVE-2025-67694

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67693

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67692

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67691

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-67690

Rejected reason: Not used

0.00NeutralNoNo