Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 197,738 vulnerabilities

Filters
0
01000
Showing 20 of 197,738 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-6181

The StrongDM Windows service incorrectly handled input validation. Authenticated attackers could potentially exploit this leading to privilege escalat...

0.00NeutralNo
Page 141
First PageNext
No
CVE-2025-6180

The StrongDM Client insufficiently protected a pre-authentication token. Attackers could exploit this to intercept and reuse the token, potentially re...

0.00NeutralNoNo
CVE-2025-61783

### Impact Upon authentication, the user could be associated by e-mail even if the `associate_by_email` pipeline was not included. This could lead to...

0.00NeutralNoYes
CVE-2025-61779

Confidential Containers's Trustee project contains tools and components for attesting confidential guests and providing secrets to them. In versions p...

0.00NeutralNoNo
CVE-2025-61778

### Impact This is a critical network security vulnerability for Akka.Remote **users who have SSL / TLS enabled** on their Akka.Remote connections an...

0.00NeutralNoYes
CVE-2025-61775

Vickey is a Misskey-based microblogging platform. A vulnerability exists in Vickey prior to version 2025.10.0 where unexpired email confirmation links...

0.00NeutralNoNo
CVE-2025-61774

PyVista provides 3D plotting and mesh analysis through an interface for the Visualization Toolkit (VTK). Version 0.46.3 of the PyVista Project is vuln...

0.00NeutralNoYes
CVE-2025-61768

KUNO CMS is a fully deployable full-stack blog application. In versions prior to 1.3.15, an SSRF (Server-Side Request Forgery) vulnerability exists in...

0.00NeutralNoNo
CVE-2025-6176

Scrapy versions up to 2.13.3 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protecti...

0.00NeutralNoYes
CVE-2025-61740

Authentication issue that does not verify the source of a packet which could allow an attacker to create a denial-of-service condition or modify the c...

0.00NeutralNoNo
CVE-2025-61739

Due to Nonce reuse, attackers can perform reply attack or decrypt captured packets.

0.00NeutralNoNo
CVE-2025-61738

Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.

0.00NeutralNoNo
CVE-2025-61736

Successful exploitation of this vulnerability could result in the product failing to re-establish communication once the certificate expires.

0.00NeutralNoNo
CVE-2025-61732

A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.

0.00NeutralNoNo
CVE-2025-61722

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-61721

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-61720

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-61719

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-61718

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-61717

Rejected reason: Not used

0.00NeutralNoNo