Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 198,011 vulnerabilities

Filters
0
01000
Showing 20 of 198,011 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-63915

No description available

0.00NeutralYes
Page 90
First PageNext
No
CVE-2025-6386

The parisneo/lollms repository is affected by a timing attack vulnerability in the `authenticate_user` function within the `lollms_authentication.py` ...

0.00NeutralNoYes
CVE-2025-63821

No description available

0.00NeutralYesNo
CVE-2025-63820

No description available

0.00NeutralYesNo
CVE-2025-63700

An issue was discovered in Clerk-js 5.88.0 allowing attackers to bypass the OAuth authentication flow by manipulating the request at the OTP verificat...

0.00NeutralYesNo
CVE-2025-63624

SQL Injection vulnerability in Shandong Kede Electronics Co., Ltd IoT smart water meter monitoring platform v.1.0 allows a remote attacker to execute ...

0.00NeutralNoNo
CVE-2025-63572

No description available

0.00NeutralYesNo
CVE-2025-63571

No description available

0.00NeutralYesNo
CVE-2025-6338

There is an incomplete cleanup vulnerability in Qt Network's Schannel support on Windows which can lead to a Denial of Service over a long period.This...

0.00NeutralNoYes
CVE-2025-63374

This vulnerability allows local attackers to escalate privileges on affected installations of CyberArk Endpoint Privilege Management. An attacker must...

0.00NeutralNoNo
CVE-2025-63372

Articentgroup Zip Rar Extractor Tool 1.345.93.0 is vulnerable to Directory Traversal. The vulnerability resides in the ZIP file processing component, ...

0.00NeutralNoNo
CVE-2025-62908

Missing Authorization vulnerability in gerritvanaaken Podlove Web Player podlove-web-player allows Accessing Functionality Not Properly Constrained by...

0.00NeutralNoYes
CVE-2025-62893

Authorization Bypass Through User-Controlled Key vulnerability in mediavine Create by Mediavine mediavine-create allows Exploiting Incorrectly Configu...

0.00NeutralNoYes
CVE-2025-62878

### Impact A malicious user can manipulate the [parameters.pathPattern](https://github.com/rancher/local-path-provisioner/blob/d4f71b4b03a321e9f54be0...

0.00NeutralNoYes
CVE-2025-62876

A Execution with Unnecessary Privileges vulnerability in lightdm-kde-greeter allows escalation from the service user to root.This issue affects light...

0.00NeutralNoNo
CVE-2025-62842

An external control of file name or path vulnerability has been reported to affect HBS 3 Hybrid Backup Sync. If an attacker gains local network access...

0.00NeutralNoNo
CVE-2025-62840

A generation of error message containing sensitive information vulnerability has been reported to affect HBS 3 Hybrid Backup Sync. If an attacker gain...

0.00NeutralNoNo
CVE-2025-62835

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-62834

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-62833

Rejected reason: Not used

0.00NeutralNoNo