Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2021-1675

Microsoft Windows Print Spooler contains an unspecified vulnerability that allows for remote code execution.

7.8891ViralYes
Page 22
PreviousNext
Yes
CVE-2021-1647

Microsoft Defender contains an unspecified vulnerability that allows for remote code execution.

7.8814NeutralYesYes
CVE-2021-1048

Android kernel contains a use-after-free vulnerability that allows for privilege escalation.

7.8857NeutralYesYes
CVE-2020-8515

DrayTek Vigor3900, Vigor2960, and Vigor300B routers contain an unspecified vulnerability that allows for remote code execution.

9.8999LowYesYes
CVE-2020-8468

Trend Micro Apex One, OfficeScan, and Worry-Free Business Security agents contain a content validation escape vulnerability that could allow an attack...

8.8927NeutralYesYes
CVE-2020-8467

Trend Micro Apex One and OfficeScan contain an unspecified vulnerability within a migration tool component that allows for remote code execution.

8.8999NeutralYesYes
CVE-2020-6820

Mozilla Firefox and Thunderbird contain a race condition vulnerability when handling a ReadableStream under certain conditions. The race condition cre...

8.1908NeutralYesYes
CVE-2020-6819

Mozilla Firefox and Thunderbird contain a race condition vulnerability when running the nsDocShell destructor under certain conditions. The race condi...

8.1908NeutralYesYes
CVE-2020-6418

Google Chromium V8 Engine contains a type confusion vulnerability allows a remote attacker to potentially exploit heap corruption via a crafted HTML p...

8.8841LowYesYes
CVE-2020-3569

Cisco IOS XR Distance Vector Multicast Routing Protocol (DVMRP) incorrectly handles Internet Group Management Protocol (IGMP) packets. Exploitation co...

8.6833NeutralYesYes
CVE-2020-3566

Cisco IOS XR Distance Vector Multicast Routing Protocol (DVMRP) incorrectly handles Internet Group Management Protocol (IGMP) packets. Exploitation co...

8.6833NeutralYesYes
CVE-2020-27950

Apple iOS, iPadOS, macOS, and watchOS contain a memory initialization vulnerability that may allow a malicious application to disclose kernel memory.

5.5508NeutralYesYes
CVE-2020-27932

Apple iOS, iPadOS, macOS, and watchOS contain a type confusion vulnerability that may allow a malicious application to execute code with kernel privil...

7.8728NeutralYesYes
CVE-2020-27930

Apple iOS, iPadOS, macOS, and watchOS FontParser contain a memory corruption vulnerability which may allow for code execution when processing maliciou...

7.8857NeutralYesYes
CVE-2020-25213

WordPress File Manager plugin contains a remote code execution vulnerability that allows unauthenticated users to execute PHP code and upload maliciou...

9.8999RisingYesYes
CVE-2020-17087

Microsoft Windows kernel contains an unspecified vulnerability that allows for privilege escalation.

7.8749LowYesYes
CVE-2020-16017

Google Chrome contains a use-after-free vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform ...

9.6902NeutralNoYes
CVE-2020-16013

Google Chromium V8 Engine contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption ...

8.8868NeutralNoYes
CVE-2020-16010

Google Chrome for Android UI contains a heap buffer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to...

9.6999NeutralYesYes
CVE-2020-16009

Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted H...

8.8970NeutralYesYes