Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2020-15999

Google Chrome uses FreeType, an open-source software library to render fonts, which contains a heap buffer overflow vulnerability in the function Load...

9.6999LowYes
Page 23
PreviousNext
Yes
CVE-2020-14871

Oracle Solaris and Oracle ZFS Storage Appliance Kit contain an unspecified vulnerability causing high impacts to confidentiality, integrity, and avail...

10.0999NeutralYesYes
CVE-2020-1464

Microsoft Windows contains a spoofing vulnerability when Windows incorrectly validates file signatures, allowing an attacker to bypass security featur...

7.8728NeutralYesYes
CVE-2020-1380

Microsoft Internet Explorer contains a memory corruption vulnerability which can allow for remote code execution in the context of the current user.

7.8857NeutralYesYes
CVE-2020-12271

Sophos Firewall operating system (SFOS) firmware contains a SQL injection vulnerability when configured with either the administration (HTTPS) service...

9.8999NeutralYesYes
CVE-2020-1027

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited th...

7.8857NeutralYesYes
CVE-2020-1020

Microsoft Windows Adobe Font Manager Library contains an unspecified vulnerability when handling specially crafted multi-master fonts (Adobe Type 1 Po...

8.8970NeutralYesYes
CVE-2020-10148

SolarWinds Orion API contains an authentication bypass vulnerability that could allow a remote attacker to execute API commands.

9.8999NeutralYesYes
CVE-2020-0938

Microsoft Windows Adobe Font Manager Library contains an unspecified vulnerability when handling specially crafted multi-master fonts (Adobe Type 1 Po...

7.8857NeutralYesYes
CVE-2020-0674

Microsoft Internet Explorer contains a memory corruption vulnerability due to the way the Scripting Engine handles objects in memory. Successful explo...

7.5804LowYesYes
CVE-2019-9978

WordPress Social Warfare plugin contains a cross-site scripting (XSS) vulnerability that allows for remote code execution. This vulnerability affects ...

6.1569ViralYesYes
CVE-2019-7816

ColdFusion versions Update 2 and earlier, Update 9 and earlier, and Update 17 and earlier have a file upload restriction bypass vulnerability. Success...

0.00NeutralNoYes
CVE-2019-7287

Apple iOS contains a memory corruption vulnerability which could allow an attacker to perform remote code execution.

7.8857NeutralYesYes
CVE-2019-7286

Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for privilege escalation.

7.8857NeutralYesYes
CVE-2019-5786

Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a craf...

6.5635NeutralYesYes
CVE-2019-3568

A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target pho...

9.8999NeutralYesYes
CVE-2019-2729

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected a...

9.8999LowYesYes
CVE-2019-17026

Mozilla Firefox and Thunderbird contain a type confusion vulnerability due to incorrect alias information in the IonMonkey JIT compiler when setting a...

8.8841NeutralYesYes
CVE-2019-1458

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k EoP.

7.8857LowYesYes
CVE-2019-1429

Microsoft Internet Explorer contains a memory corruption vulnerability which can allow for remote code execution in the context of the current user.

7.5804NeutralYesYes