Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2021-33771

Microsoft Windows kernel contains an unspecified vulnerability that allows for privilege escalation.

7.8749NeutralYes
Page 19
PreviousNext
Yes
CVE-2021-33742

Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for remote code execution.

7.5804NeutralYesYes
CVE-2021-33739

Microsoft Desktop Window Manager (DWM) Core Library contains an unspecified vulnerability that allows for privilege escalation.

8.4815NeutralYesYes
CVE-2021-32789

woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce site...

7.5811NeutralYesYes
CVE-2021-31979

Microsoft Windows kernel contains an unspecified vulnerability that allows for privilege escalation.

7.8749NeutralYesYes
CVE-2021-31956

Microsoft Windows New Technology File System (NTFS) contains an unspecified vulnerability that allows attackers to escalate privileges via a specially...

7.8728LowYesYes
CVE-2021-31955

Microsoft Windows Kernel contains an unspecified vulnerability that allows for information disclosure. Successful exploitation allows attackers to rea...

5.5486NeutralYesYes
CVE-2021-31201

Microsoft Enhanced Cryptographic Provider contains an unspecified vulnerability that allows for privilege escalation.

5.2413NeutralYesYes
CVE-2021-31199

Microsoft Enhanced Cryptographic Provider contains an unspecified vulnerability that allows for privilege escalation.

5.2413NeutralYesYes
CVE-2021-31010

In affected versions of Apple iOS, macOS, and watchOS, a sandboxed process may be able to circumvent sandbox restrictions.

7.5709NeutralNoYes
CVE-2021-30883

Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for remote code execution.

7.8626NeutralNoYes
CVE-2021-30869

Apple iOS, iPadOS, and macOS contain a type confusion vulnerability in the XNU which may allow a malicious application to execute code with kernel pri...

7.8626NeutralNoYes
CVE-2021-30860

Apple iOS, iPadOS, macOS, and watchOS CoreGraphics contain an integer overflow vulnerability which may allow code execution when processing a maliciou...

7.8728NeutralYesYes
CVE-2021-30858

Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web conten...

8.8970NeutralYesYes
CVE-2021-30807

Apple iOS, iPadOS, macOS, and watchOS IOMobileFrameBuffer contain a memory corruption vulnerability which may allow an application to execute code wit...

7.8857NeutralYesYes
CVE-2021-30762

Apple iOS WebKit contains a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerabil...

8.8970NeutralYesYes
CVE-2021-30761

Apple iOS WebKit contains a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnera...

8.8970NeutralYesYes
CVE-2021-30713

Apple macOS Transparency, Consent, and Control (TCC) contains an unspecified permissions issue which may allow a malicious application to bypass priva...

7.8814NeutralYesYes
CVE-2021-30666

Apple iOS WebKit contains a buffer-overflow vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerabi...

8.8927NeutralYesYes
CVE-2021-30665

Apple iOS, iPadOS, macOS, watchOS, and tvOS WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously ...

8.8970NeutralYesYes