Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 198,972 vulnerabilities

Filters
0
01000
Showing 20 of 198,972 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-8263

A vulnerability was found in prettier up to 3.6.2. It has been declared as problematic. Affected by this vulnerability is the function parseNestedCSS ...

0.00NeutralNo
Page 77
First PageNext
No
CVE-2025-8197

A global buffer overflow vulnerability was found in the soup_header_name_to_string function in Libsoup. The `soup_header_name_to_string` function does...

0.00NeutralNoNo
CVE-2025-8193

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

0.00NeutralNoNo
CVE-2025-8192

There exists a TOCTOU race condition in TvSettings AppRestrictionsFragment.java that lead to start of attacker supplied activity in Settings’ context,...

0.00NeutralNoNo
CVE-2025-8153

Cross-site Scripting vulnerability in NEC Corporation UNIVERGE IX from Ver.9.5 to Ver.10.7, from Ver.10.8.21 to Ver.10.8.36, from Ver.10.9.11 to Ver.1...

0.00NeutralNoNo
CVE-2025-8130

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

0.00NeutralNoNo
CVE-2025-8101

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Linkify (linkifyjs) allows XSS Targeting HT...

0.00NeutralNoYes
CVE-2025-8086

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

0.00NeutralNoNo
CVE-2025-8070

The Windows service configuration of ABP and AES contains an unquoted ImagePath registry value vulnerability. This allows a local attacker to execute ...

0.00NeutralNoNo
CVE-2025-8066

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Bunkerity Bunker Web on Linux allows Phishing.This issue affects Bunker Web: 1.6....

0.00NeutralNoYes
CVE-2025-8058

The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accompli...

0.00NeutralNoYes
CVE-2025-8022

Rejected reason: Bun Shell does not invoke /bin/sh, or any other interpreter, for template literals created with the $ function. Each ${…} interpolati...

0.00NeutralNoNo
CVE-2025-8006

Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arb...

0.00NeutralNoNo
CVE-2025-8005

Ashlar-Vellum Cobalt XE File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitra...

0.00NeutralNoNo
CVE-2025-8004

Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arb...

0.00NeutralNoNo
CVE-2025-8003

Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arb...

0.00NeutralNoNo
CVE-2025-8002

Ashlar-Vellum Cobalt CO File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitra...

0.00NeutralNoNo
CVE-2025-8001

Ashlar-Vellum Cobalt CO File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbi...

0.00NeutralNoNo
CVE-2025-8000

Ashlar-Vellum Cobalt LI File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitra...

0.00NeutralNoNo
CVE-2025-7999

Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitra...

0.00NeutralNoNo