Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 199,078 vulnerabilities

Filters
0
01000
Showing 20 of 199,078 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-9289

A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation require...

0.00NeutralNo
Page 58
First PageNext
No
CVE-2025-9283

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles EtherNet/IP Step Limi...

0.00NeutralNoNo
CVE-2025-9282

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles Comprehensive limited...

0.00NeutralNoNo
CVE-2025-9281

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles Comprehensive step li...

0.00NeutralNoNo
CVE-2025-9280

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. Fuzzing performed using Defensics causes the device to...

0.00NeutralNoNo
CVE-2025-9279

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles EtherNet/IP Step Limi...

0.00NeutralNoNo
CVE-2025-9278

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. After running a Burp Suite active scan, the device los...

0.00NeutralNoNo
CVE-2025-9276

Cockroach Labs cockroach-k8s-request-cert Empty Root Password Authentication Bypass Vulnerability. This vulnerability could allow remote attackers to ...

0.00NeutralNoYes
CVE-2025-9275

Oxford Instruments Imaris Viewer IMS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers ...

0.00NeutralNoNo
CVE-2025-9274

Oxford Instruments Imaris Viewer IMS File Parsing Uninitialized Pointer Remote Code Execution Vulnerability. This vulnerability allows remote attacker...

0.00NeutralNoNo
CVE-2025-9273

CData API Server MySQL Misconfiguration Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive informa...

0.00NeutralNoYes
CVE-2025-9269

A Server-Side Request Forgery (SSRF) vulnerability has been identified in the embedded web server in various Lexmark devices. This vulnerability can b...

0.00NeutralNoNo
CVE-2025-9267

In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the curre...

0.00NeutralYesNo
CVE-2025-9265

A broken authorization vulnerability in Kiloview NDI N30 allows a remote unauthenticated attacker to deactivate user verification, giving them access ...

0.00NeutralNoNo
CVE-2025-9197

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

0.00NeutralNoNo
CVE-2025-9190

The configuration of Cursor on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary...

0.00NeutralNoNo
CVE-2025-9178

A denial-of-service security issue exists in the affected product and version. The security issue is caused through CIP communication using crafted pa...

0.00NeutralNoNo
CVE-2025-9177

A denial-of-service security issue exists in the affected product and version. The security issue stems from a high number of requests sent to the web...

0.00NeutralNoNo
CVE-2025-9173

A weakness has been identified in Emlog Pro up to 2.5.18. This issue affects some unknown processing of the file /admin/media.php?action=upload&sid=0....

0.00NeutralNoNo
CVE-2025-9164

Docker Desktop Installer.exe is vulnerable to DLL hijacking due to insecure DLL search order. The installer searches for required DLLs in the user's D...

0.00NeutralNoNo